Computer science html/css project

Just looking for an old html/css project thats multiple pages that you may have done in the past. no need for anything new just an old project done for yourself/someone else is good. preferably one with a header with difference choices to open the different webpages.

IR Plan Review

We will be focusing on reviewing an incident response plan. Some organizations treat these as sensitive and secret. Others post them online for anyone to read. In this exercise, you will be making use of a publicly posted one. Do some Internet searches to find a suitable incident response plan. Download it and submit it as part of your submission work.

For the next part of your work, you will be reviewing that plan and comparing it against the NIST 800-61 guidelines (Links to an external site.). Focus on section 2.3.2 Plan Elements. In your submission, compare your chosen plan against the elements in the NIST document. Document which sections are included, which are missing, and which are additional. State, in your opinion, whether the missing sections are impacting the effectiveness of the plan and whether the additional sections are adding value to the plan.  

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

erlang program

 

Write an Erlang program that counts the word frequencies in the file assign3-part2.txt. Erlang uses a list of tuples as a hash table. Write four Erlang functions.

  1. This function has a string file name parameter and returns a list of words in the file. Open the file with file:open. The file lab3-part2.txt was written in a text editor as one line, so io:get_line will read the whole file. string:tokens will separate it into words. Its second argument specifies all the delimiters.
    • file:open(lab3-part2.txt”,read).
    • L1= io:get_line(S, '').
  2. This function has two parameters, a string word and a list of tuples, and returns a list of tuples with the word added appropriately. Each tuple is a word key and a frequency value. The lists:keyfind method will find a tuple if it exists and return false if it does not. If the word is not found use lists:append to add a tuple with the word as key and 1 as the frequency. If the word is found use lists:replace to replace the tuple with a new tuple with frequency increased by one.
  3. This function has a list of words as parameter and returns a hash table of tuples of words and their frequencies. The string:to_lower method will make a word lower case to provided the desired case insensitivity. Use the lists:foldl method to build the answer using the function 2.
  4. This function outputs the final hash table sorted by frequency from high to low using the lists:sort function. Its one parameter is the file name. It uses functions 3 and 1.

COMP247 Data Communications

  

COMP247 Data Communications 

Assignment 2, 2014: Network Technologies 

Objectives 

These are the areas that will be tested: 

 Wireless network technologies 

 Wide Area networking technologies 

 Internet Access Technologies 

Backbone Technologies 

Note 

 All assumptions must be stated clearly in your answers. 

 The explanations you provide do not have to be long, concise is preferred to wandering. They do need to present your case clearly. 

Questions 

1. Wireless Networks [10 marks] 

Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices. 

(b) [3 marks] Which WiFi flavour (a, b, g, n, ac, ad, or other) would you recommend for this new installation? Discuss the options and justify your choice. [Up to 200 words] 

(c) [3 marks]Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice. [Up to 200 words]

2. Backbone Networks [10 marks] 

A backbone network can be constructed as a switched backbone, a routed backbone or a VLAN backbone. Each of these approaches has its advantages and disadvantages. 

(a) [6 marks] Discuss the advantages and disadvantages of each approach. [Up to 400 words] 

(b) [2 marks]Describe an example of a situation where a switched backbone would be preferred. [Up to 150 words] 

3. WANs [10 marks] 

Now! Electronics has four stores in the Sydney region (Hornsby, Penrith, Campbelltown, City) connected in a star topology by leased T-1 lines to its head office in North Ryde. 

(a) [2 marks] Sketch the existing WAN, showing the stores, head office and the leased lines. 

(c) [2 marks]Describe an example of a situation where a VLAN backbone would be preferred. [Up to 150 words] 

(b) [1 mark] What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

(c) [3 marks]A new stock management server is to be installed to track stock in all four stores – all sales will be reported to this server as they happen. Some members of the development team want to install this new server in head office, while others want to install it in the city store because that store has 40% of the total sales. Which option do you prefer and why? [Up to 200 words] 

(d) [4 marks] Now! is planning an aggressive expansion strategy with offices and stores in each Australian state. Compare the merits of expanding the existing T-1 based WAN with moving to a new MPLS-based WAN. [Up to 200 words] 

Mobile device security

 

  1. One of the greatest risks of a mobile device is the loss or theft of the device. Review the list of things that can be done to reduce the risk of theft or loss. Include what you can do once a device is lost.

300 words

Create aSimple Cat Facts application

Create an application that allows the user to search for different cat breeds and to get information about them. The application must use the Cat API (https://thecatapi.com/) – specifically read the documentation (https://docs.thecatapi.com/) for information about how to get an API key, and how to use the API. You can get the free API key and use it for this application without any issues 

You will use the data returned as JSON from the Cat API to list the breeds of cats available through the site in a drop-down (known as a Spinner in Android development). Once the breed is selected, the API may be contacted again to obtain the image of the cat, if one exists. You should keep the spinner in a fragment near the top of the app.

The fragment near the bottom of the app should contain an ImageView, and multiple widgets/views for displaying text about the cat. In addition to displaying the image of the cat, you should show information such as the name, temperament, and origin. The image view and other widgets for the breed information could be kept inside a ScrollView.

Note: Use the Fragment + ViewModel template in android studio to start this assignment. 

Language: Java or Kotlin

Current Affairs Report

Instructions:

Please write an analysis report about a recent Cybersecurity breach (Solarwinds, Colonial Pipeline Ransomware or any other recent attack).  The report must be written using your own analysis, please answer the following questions:

1- What type of attack was launched?
2- What was compromised or breached?
2- How was the attack accomplished if known?
4- Your own analysis and feedback about the attack?

Submission Instructions:

The report must be at least 4-5 pages not including the cover and reference pages and must follow the APA style. You must include at least 3 references. 100% original work. NO PLAGIARISM

Analyzing the Logic of an Article – Popular Journal Article

  1. Read The Miniature Guide to Critical Thinking: Concepts and Tools.
  2. Read chapters 6–14 (pp. 27–55) in Everybody Writes.
  3. Locate a popular article (neither an academic article, nor an industry/trade journal article) suitable for your ADP research focus or a business-related topic that is of interest to you.
  4. Complete the template in its entirety, answering each question fully.
    1. Place the complete APA reference at the top of the first page.
    2. Include your full name in the header of the template. No cover page is needed when placing your name in the header.
  5. Refer the attached Scholarly or Academic Journal Articles(PDF document) document.
  6. Refer the attached  Template for Analyzing the Logic of an Article(Word document).

For this assignment, you will locate and download a popular journal article to analyze the author’s use of logic.

References

Evaluating information sources. (n.d.). What is a popular source? The University of British Columbia. https://guides.library.ubc.ca/EvaluatingSources/ScholarlyPopular(new tab)