Final Research Paper

 

Choose a publicly available data visualization. (be sure to provide the link, cite, and reference).

Analyze the visualization within the context of the data visualization workflow.

Create a proposal of enhancements to create a better user/viewer experience.

Use the data visualization workflow as framework for both your analysis and your proposal.

Consider the various roles of the project team as specified by Kirk’s concept of “hats”.

APA compliance required.

References and In-text citations required.

Minimum word count = 1500.

One Page

Your company is writing an end-user security guide for a client.  You have been tasked with writing a User Guide on Physical Defense, Social Vulnerability Defense, or Social Media Vulnerabilities Defense.  Write a user guideline of best practices to defend against attacks by cybercriminals. 

Some Considerations:  vulnerabilities, penatration testing and activities, best practices, networks and systems,  password complexity, social networking, personal and corporate issues and other areas .

(minimum 1 page )

Ethics

 What is your opinion of the recent controversy over government monitoring of citizens’ phone and email communications?  Consider: Should a line be drawn on further invasions of privacy? 

DQ

Discussion 1

This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.

Discussion 2

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Practical connection paper 

2 pages 

Attached course below

ITSD322U3IP

 

Assignment Details

Create a Java application called “RateCalculator.” In this application, create a custom class named “Calculator.” In the Calculator class, create a method called “Multiply” which accepts two incoming integer variables. Within the Multiply method, create an integer variable to store the total, then calculate the total based on the two incoming variables. Return the total.

In the project class, within the main() method, declare integer variables named “firstNum” and “secondNum” and set their initial values to any number between 1 and 9. Create an additional integer variable called “output.” Then write code to declare a member of the Calculator class called “myCalc” and then utilize myCalc to call the Multiply method to calculate the result of firstNum times secondNum. Store the result in “output”, and present the result on screen.

Within the Calculator class, create methods similar to Multiply called “Add”, “Subtract”, and “Divide.” Create appropriate logic within these methods, and display their use in the main method of the project class. (These methods will not be utilized when the program runs, but the code must be present.)

Write appropriate in-line comments in both the project class and the Calculator class to explain each line of code in your program.

Summary:

  • Create an application called “RateCalculator”
  • Create a custom class with the name and features listed above
  • Create methods within the Calculator class to perform the calculations
  • Write code in the Calculator class (in the main() method) to execute the methods from the Calculator class

Your deliverable for this assignment is the NetBeans project you created using the steps above (ZIP the whole folder that contains the project).

Note: There is no user input in this program. The values that will be calculated are the values that you state when you declare “firstNum” and “secondNum”.

Unit 1 Assignment: ERP

 

SAP is an enterprise resource planning (ERP) manufacturing software that offers industry-specific functionalities designed to help midsize companies boost operational efficiency, strengthen customer relationships, and enhance business agility.  The use of ERP encourages an integrated view of business processes to better manage financials, inventory, human resources, product development, sales, and marketing.  

Refer to the attached document for assignment details and grading rubric.

2 -3 pages not including title page , reference page

Cybercrimes and cryptographic attacks

 

1.This week students will look at some of the  different cybercrimes, how to develop a security policy and various security and privacy regulations

Identify various cybercrimes

  • Explain various regulations on minimizing cybercrimes

Read textbook chapter 4

Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089 https://academicjournals.org/journal/JIIS/article-full-text-pdf/930ADF960210

2. students will examine some of the different types of cryptographic attacks such as those on social media platforms.

  • Identify different Cryptographic Attacks
  • Explain how attacks on social networks work

Read: Textbook: Chapters 7 and 8

Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103 https://pdfs.semanticscholar.org/9f00/15e099290d0ba1584b82517e044de1413bcc.pdf

Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices. https://arxiv.org/abs/2003.01218 There is a link to the PDF of this article in the right column of this record under Download.

Visual Basic

   

Project 2-1: Calculate area and perimeter form

For this project, you’ll create a form that accepts the length and width of a rectangle from the user. This is simply a design and does not need to fully function. It must be the following specifications.

The design of the Area And Perimeter form

· Pay attention to the alignment of the labels. (There are a total of 6 labels on this form. Know the difference between labels and text boxes.)

· Pay attention to the alignment of the contents of the text boxes.

· Only 7 objects need meaningful names (Form, both text boxes, 2 labels and both buttons). Make sure you use the one or three letter identifier in the names you choose for your objects. (Example: Form name is fAreaPerimeter or frmAreaPerimeter; tLength or txtLength for one textbox.)

· Make sure all the textboxes and labels are the same size, aligned with each other and are evenly spaced.

· Make sure the buttons are the same size and are aligned with each other.

Specifications

· Set the solution name to AreaAndPerimeter.

· Give the form, textboxes, the two important labels, and the buttons meaningful names.

· Clear the TEXT properties of the textboxes and the labels that show the results.

· Use Area and Perimeter for the form’s TEXT property.

· Set “C” as the access key for the Calculate button and “x” as the access key for the Exit button.

· Set the form’s ACCEPTBUTTON property to the Calculate button object.

· Set the form’s CANCELBUTTON property to the Exit button object.

· Set the form’s STARTPOSITION property to center screen.

· Set the tab order so that focus is on the first textbox, then the second textbox, then the Calculate button, and finally the Exit button.

Hint

· To get the labels that display the area and perimeter to look like the ones shown above, you’ll need to set the AutoSize property of the labels to False and the BorderStyle property to Fixed3D.