Figure 5.4 AppMaker DFD with data types.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

 

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%. Figure 5.4 AppMaker DFD with data types.

Safety Culture Pamphlet

 

Safety Culture Pamphlet

Create a pamphlet using your choice of publishing software to educate the staff for which you are the nurse leader. The pamphlet must cover a current patient safety issue.

Examples include:

Teaching aging adults to care for themselves at home

Teaching patients about the possible implications of polypharmacy and providing the skills to avoid self-medication errors

Other appropriate safety issues such as workplace safety

If you have a question about a specific topic, check with your instructor.

Your pamphlet must include the following items:

At least five tips describing preventive care for the patient

Information that should be shared with family or caregivers

Local resources in the community that might be available for this type of safety concern

At least three references published in the last five years; APA format must be used

Exp19_Access_Ch01_HOEAssessment – Crowdfunding 1.0

Exp19_Access_Ch01_HOEAssessment – Crowdfunding 1.0  

Exp19 Access Ch01 HOEAssessment Crowdfunding 1.0

EX19_AC_CH01_GRADER_HOE_AS  

  

Project Description:

In the following project, you will open a database containing the records of small crowdfunding corporation, work with a form in which to store key supporter information, add records, and sort tables. You add a record using a form and print a report. You apply a filter by selection to a table and a filter by form to a query and save the results for both filters.

For the task we'll build a class representing a Rectangle. The tests for this task will not check what's happening inside the class you create, so it's up to you as to what data members you use. The tests will also assume you can write methods and con

 

Triangle 2.0 (The name is a hint) Description:

For  the task we’ll build a class representing a Rectangle. The tests for  this task will not check what’s happening inside the class you create,  so it’s up to you as to what data members you use. The tests will also  assume you can write methods and constructors correctly. This means that you have to get the names, returns and parameters correct before the tests will even run.

Okay, now the task itself.

Your  company is doing some consulting work and the client has asked for a  new, more exciting version of their existing Triangle. They want a  Triangle, but with an extra side, which marketing are calling Triangle 2.0.

To meet the specification you need to create a class called Rectangle with the following methods:

  1. A no-parameter constructor that sets all side lengths to 1.
  2. A one parameter constructor that takes an int, and sets all side lengths to that value.
  3. A  two parameter constructor, that takes two ints, and sets two opposite  sides to one length, and the other pair of opposite sides to the other  length.
  4. A method getShortSide that takes no parameters and returns the length of the shortest side as an int.
  5. A method getLongSide that takes no parameters and returns the length of the longest side as an int.
  6. A method isSquare that takes no parameters and returns true if the rectangle is a square, and false otherwise.
  7. A method area that takes no parameters and returns the area of the rectangle as an int.
  8. A  method diagonal that takes no parameters and returns the length of the  diagonals as a double. The library function Math.sqrt(double) may be  useful here.
  9. A method bigger that takes a Rectangle as a  parameter and returns true if the current Rectangle has an area strictly  greater than the area of one given in the parameter.

You  don’t have to worry about not-right-angled quadrilaterals (so there’s  only squares and rectangles, no parallelograms, rhombi, trapezoids  etc.).

You also start with nothing in the scaffold. You will have  to create a suitable file for the class. The run button will assume that  Rectangle has a main method, but it’s not part of the tests, so you  don’t have to write it if you don’t care about it.

Research project

Research the topic “Database STIGs” and “Banking Database STIGs” and prepare the following

1. 5 sources annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

Final Report

 

 My Topic is Research Methods in Cyber Threat Intelligence

Define each area/domain and its significance. 

Define  how significant and relevant that problem to Cybersecurity, and what kind of threats are there which need to be addressed.

In the third section, you will be summarizing, each state of the art techniques focused towards addressing above discussed issues that have been published in the last 10 years.

In the last section you will try to answer the gap or the un-addressed issues, which has yet to be answered (of course in your perspective)

Present it

For sections 1 and 2 you can use any unpublished (but reliable source) information, which includes, Tech. reports, or tech magazines (avoid social media-based articles they are not viable sources of information).For section 3 and 4, you will only have to cite at least 15  peer-reviewed articles, from conferences, journals, and book chapters. No other citation will be accepted. I will check plagiarism using online software, so if you have copied and pasted from anywhere on the internet it will be visible in the report. This means, you are only allowed 20% of overlap with internet material, and you will have to write everything in your own words.  Plagiarism over 20% will simply entail zero marks.  

C++ Linked Lists

  

Instructions: 

1. The declaration of the ReadingList class has been changed, in the private area, to use a std::list instead of an array as its implementing data structure.

Because a std::list can grow arbitrarily long, there is no need to pre-allocate a space to hold the books, so the parameters and function for tracking the capacity have been removed.

2. Your task is to follow through on that change, making the necessary alterations to readingList.h and readingList.cpp to make this a working class. The necessary changes have already been made to the unit tests and to the main mergeLists.cpp application.

3. The major difference between lists and the earlier sequential structures that we have looked at is that elements are accessed via iterators instead of integer-based indices. Accordingly, you will need to: 

– Rewrite the indexing-based code in readingList.cpp with iterator-based code.

– Remove the indexing-based get function from readingList.h and add appropriate declarations of iterator and const_iterator types and associated functions allowing access to a ReadingList object’s sections.

4. To improve the usability of the ReadingList class, you will also need to add

– A constructor to allow ReadingList objects to be constructed from a pair of iterators denoting a range of Book values from some arbitrary container.

– A constructor to allow ReadingList objects to be constructed from an initializer_list of books.

5. Your code will be evaluated both on its ability to function correctly within the mergeLists application and on its ability to pass the various unit tests provided.

– In the test report, tests 0…7 test the mergeLists application. Tests numbered 8…25 check the unit tests.

– Each even-numbered test checks for correct behavior of the code.

– Each odd-numbered test checks to see if that same behavior is correct and entails no memory leaks or other common pointer/memory handling problems.

6. Submit files readingList.h and readingList.cpp

Problem Description: 

This assignment centers on a program that accepts as input two lists of e-books (derived from Project Gutenberg) and merges the two into one, eliminating any duplicate entries during the process. Each e-book is is described by three fields, an ID, the author info, and the title. In input and output, these appear together on a line separated by tab (“t”) characters.

For example, given the input

etext19640  Twain, Mark, 1835-1910   Adventures of Huckleberry Finn
etext13 Carroll, Lewis, 1832-1898   The Hunting of the Snark
etext9038   Twain, Mark, 1835-1910    The Adventures of Tom Sawyer

and

etext9038   Twain, Mark, 1835-1910    The Adventures of Tom Sawyer
etext20595  Twain, Mark, 1835-1910   The Awful German Language
etext23717  Carroll, Lewis, 1832-1898    Jabberwocky

the merge will be

etext13 Carroll, Lewis, 1832-1898   The Hunting of the Snark
etext19640  Twain, Mark, 1835-1910   Adventures of Huckleberry Finn
etext20595  Twain, Mark, 1835-1910   The Awful German Language
etext23717  Carroll, Lewis, 1832-1898    Jabberwocky
etext9038   Twain, Mark, 1835-1910    The Adventures of Tom Sawyer

The output is sorted by the project Gutenberg ID (the “etext…” field).

You are being supplied with a nearly complete working version of the mergeLists application.

Your task is to complete the implementation of the ReadingList class in accordance with the principles for robust and reusable ADTs as described in the lecture notes. You must use a dynamically allocated array as the basis for storing books within the reading list.

System Tests: 

The program takes its input from two files named in the command line and produces its output on standard out (cout). For example, if you have compiled the program into an executable named “mergeLists”, and had saved the sample input above in files tinyList.txt and tinyList2.txt in the same directory, you could run the program as

./mergeLists tinyList.txt tinyList2.txt

If you are working in Windows, use “.” instead of “./”. Of course, if you have your files in different directories or use different names, you will need to adjust your paths in the above command accordingly.

In general, you are responsible for designing and running your own systems tests.

That said, you have been provided with several input files of various lengths that you can use “as is” or chop up and recombine as you see fit.

Unit Tests: 

The unit tests will form a separate executable, named unittest. It can be run without parameters to run all tests on the ReadingList class.

You can, however, list one or more test names as parameters to run those tests only. For example, if you are failing the testRLRemove test, run

./unittest testRLRemove

to focus on just that one test. This can be very useful when debugging your code, because the unit tests are simpler and will get to your Faculty code a great deal more directly than the full application.

You can also abbreviate test names to run all tests beginning with a string.

For example,

./unittest testRLR

would suffice to run that same single test.

Notes: 

  • You may use any of the techniques covered for manipulating data via iterators, including range-based loops, the auto keyword, and generic functions from the next lesson, if you are reading ahead.
  • In designing the iterators for the ReadingList class, consider carefully the options of creating an new iterator class versus reusing an existing iterator type. 
  • The ReadingList class keeps its Books in order. Allowing application code to alter or      reassign the internal sections via an iterator, e.g.,

· ReadingList::iterator it = myReadingList.begin();

· *it = Book(“99999”, “Zzarg, Jonathan”, “The Last Book Ever Written”);

would risk breaking that ordering, making any code that relies on the ordering fail.

That means that ReadingList needs to be one of those classes that use a single const iterator type as both iterator and const_iterator.

  • You may find it a much more efficient use of your time to focus on passing the unit tests first and worry about system testing the full mergeLists application afterwards.

CURRENT ERRORS: 

make all 

touch book.d

touch counted.d

touch mergeLists.d

touch readingList.d

touch sanityCheck.d

touch testReadingList.d

touch unittest.d

cat book.d counted.d mergeLists.d readingList.d sanityCheck.d testReadingList.d unittest.d > make.dep

g++ -g -std=c++17 -MMD -pthread -D_GLIBCXX_DEBUG -Wall -o book.o -c book.cpp

g++ -g -std=c++17 -MMD -pthread -D_GLIBCXX_DEBUG -Wall -o counted.o -c counted.cpp

g++ -g -std=c++17 -MMD -pthread -D_GLIBCXX_DEBUG -Wall -o mergeLists.o -c mergeLists.cpp

mergeLists.cpp: In function ‘ReadingList mergeReadingLists(const ReadingList&, const ReadingList&)’:

mergeLists.cpp:25:39: error: ‘const class ReadingList’ has no member named ‘begin’

   25 |  ReadingList::const_iterator i = cat1.begin();

      |                                       ^~~~~

mergeLists.cpp:26:39: error: ‘const class ReadingList’ has no member named ‘begin’

   26 |  ReadingList::const_iterator j = cat2.begin();

      |                                       ^~~~~

mergeLists.cpp:27:19: error: ‘const class ReadingList’ has no member named ‘end’

   27 |  while (i != cat1.end() && j != cat2.end())

      |                   ^~~

mergeLists.cpp:27:38: error: ‘const class ReadingList’ has no member named ‘end’

   27 |  while (i != cat1.end() && j != cat2.end())

      |                                      ^~~

mergeLists.cpp:29:20: error: invalid type argument of unary ‘*’ (have ‘ReadingList::const_iterator’ {aka ‘int’})

   29 |   const Book& b1 = *i;

      |                    ^~

mergeLists.cpp:30:20: error: invalid type argument of unary ‘*’ (have ‘ReadingList::const_iterator’ {aka ‘int’})

   30 |   const Book& b2 = *j;

      |                    ^~

mergeLists.cpp:42:19: error: ‘const class ReadingList’ has no member named ‘end’

   42 |  while (i != cat1.end())

      |                   ^~~

mergeLists.cpp:44:14: error: invalid type argument of unary ‘*’ (have ‘ReadingList::const_iterator’ {aka ‘int’})

   44 |   result.add(*i);

      |              ^~

mergeLists.cpp:47:19: error: ‘const class ReadingList’ has no member named ‘end’

   47 |  while (j != cat2.end())

      |                   ^~~

mergeLists.cpp:49:14: error: invalid type argument of unary ‘*’ (have ‘ReadingList::const_iterator’ {aka ‘int’})

   49 |   result.add(*j);

      |              ^~

make: *** [makefile:54: mergeLists.o] Error 1

“make all” terminated with exit code 2. Build might be incomplete.

14:37:11 Build Failed. 11 errors, 0 warnings. (took 4s.338ms)

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Enterprise Data Management and Administration

 

Read “GE Bets on the Internet of Things and Big Data Analytics” (see attached)

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)