Bubble sort analysis with graph

 In this assignment, you will write a program to test bubble sort average efficiency. You  need to implement the bubble sort version which runs another pass over the numbers  ONLY if the previous pass had at least one swap. You will not do another pass over the  numbers if the last pass had no swaps. In such a case, you will return to the calling  function the number of passes used to sort the numbers.  The goal is to run bubble sort many times (1000 or 10,000) over a randomized set of  elements, then graph the results using Excel to see the likelihood of only a few passes to  sort the data. If the likelihood (probability) is very low, then the swap-based bubble sort  may not be a good performed on average. Below is my graph from 4 runs of 10,000 bubble sorts of 50 numbers. Note the average is  about 42 passes (49 passes is the maximum) Bubble Sort Analysis Graph 50 elements in array 4 program runs of 10,000 trials each 

Cybersecurity

 

Begin by discussing about the lost of theft of a mobile device and how several security features can be used to locate the device or limit the damage. Many of these can be used through an installed third-party app. Use the Internet to identify four apps, two each for iOS and Android, and create a table that compares their features.Include a paragraph that outlines which app you would prefer for iOS and Android.

Now expand your discussion to include IoT, use the Internet to research the Internet of Things (IoT). In your own words, what is IoT? How is it being used today? How will it be used in the near future? What impact will IoT have on technology, society, and the economy over the next five years? What are its advantages and disadvantages? Finally, visit the IoT List site (iotlist.co or http://iotlineup.com/) and identify five of the most unusual IoT devices. Write a one-page paper on the information that you find.

Include your Table, paragraph outlining which app you would prefer for iOS and Android, and IoT discussion and findings.

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

#Exp19 Access Ch06 Capstone – Northwind Traders Sales Analysis 1.0

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

Project Description:

Northwind Traders is a small international gourmet foods wholesaler.  You will update the company’s database by increasing the price of all of  the meat and poultry products. You will make a table for archiving  older order information. You will also summarize quantities sold by  category and identify customers who have no orders.

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Northwind.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Using a select query, you will identify   all of the products with a  category of meat or poultry, and then use an   update query to increase  the prices of the products.
 

  Create a select query that includes the CategoryID from the  Categories table   and the UnitPrice and ProductName fields from the  Products table (in that   order). Run the query and note the CategoryID  for Meat/Poultry.

Add the appropriate CategoryID   criterion to limit the query output  to only Meat/Poultry. Convert the query   to an update query. Update the  UnitPrice for Meat/Poultry only by increasing   it by 6 percent.

View   the query in Datasheet view prior to running it to make sure  you are updating   the correct (four) records. Return to Design view and  run the query. Save the   query as Update Meat/Poultry   Prices.   Close the query.

You will identify orders shipped   during the first half of the year  and create a new table in which to store   them. You will then delete  the orders from the current orders table.
 

  Create a select query that identifies all of the orders shipped Between 1/1/2020 and   3/31/2020. Include all fields from the Orders   table.

Convert   the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive Table. Close the query.

Make   a copy of the Make Orders Archive   Table query and save it as Append Orders Archive   Table.   Open the Append Orders Archive Table query   in Design view. Convert the make table query to an append query. The query   will append to the Orders Archive table.

Modify   the criteria to append orders shipped Between 4/1/2020   and 6/30/2020. Run the query, save it, and then   close it.

Open   the Orders Archive table in Design   view and set OrderID as the   primary key field. Switch to Datasheet view, then save and close the table.

Make a copy of the Append Orders Archive Table query and   save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append   query to a delete query.

Modify the criteria to delete all   archived orders from the Orders table (six records). Run, save, and then   close the query.

You   want to determine how sales are performing with respect to each  product   category. You will create a crosstab query that displays  quantities by   category and salesperson.
 

  Open the Profit query in Design view and add the LastName field from the Employees table to the last column of the   design grid. Run, save, and close the query.

Use the query wizard to create a   crosstab query based on the Profit   query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept   the query name as Profit_Crosstab.

Modify the query to display CategoryName as the row heading field   and LastName as the column heading   field. Run, save, and close the query.

You will create a query to determine   which customers have no  matching orders. The customers will be contacted to   determine if they  would like to place an order.
 

  Create a query to find out if any of the customers have no current  order   details. Add all of the fields from the Customers table to the  results. Save   the query as Customers With No Orders. Run the query and close it.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Vulnerability Scanner

You will be using your virtual machine from last week and installing, configuring, and then running a vulnerability scanner to scan your virtual machine.  

You will be using a free open-source scanner named Vuls. To help you get it installed and running, you can follow these instructions, which recommend that you use an account named “Sammy.” I did these instructions using my root account and ignored the Sammy parts. (Admittedly, this is poor practice, but for a virtual machine we are deleting at the end of the course, we can bend the rules of best practices a bit.) Follow steps 1 through 6. 

In our instructions for the week, we need to edit a couple commands along the way. This is due to the author of the utilities changing the way that certain command arguments are processed. The functionality still works but the commands will differ. Please make sure you use these modifications in order to not have errors. Again, copy/paste will be the easiest way to capture the changes so you don’t miss a dash or space.

ORIGINAL: for i in `seq 2002 $(date +”%Y”)`; do sudo go-cve-dictionary fetchnvd -dbpath /usr/share/vuls-data/cve.sqlite3 -years $i; done

CHANGE: sudo go-cve-dictionary fetch nvd –dbpath /usr/share/vuls-data/cve.sqlite3

ORIGINAL: sudo goval-dictionary fetch-ubuntu -dbpath=/usr/share/vuls-data/oval.sqlite3 18

CHANGE: sudo goval-dictionary fetch ubuntu –dbpath=/usr/share/vuls-data/oval.sqlite3 18

At the conclusion of Step 6, you will have run the scanner against your virtual machine. There will be vulnerabilities, many of which will be unpatchable. Attach a screenshot to your submission of your results screen. Pick one of the vulnerabilities and answer the following questions: 

  • What is the CVE number of your chosen vulnerability?
  • What year was this CVE discovered? (Hint: this is part of the CVE number!)
  • What software programs are affected?  
  • In your own words, what is the summary of this vulnerability?  
  • Perform an analysis of the likelihood of this vulnerability being exploited. In other words, would this program’s vulnerability be easily exposed to an attacker or would it require a complex scenario to make this exposed?
  • In your opinion, given the CVE criticality and the likelihood, do you feel comfortable with this vulnerable software on your system? 

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

Computer Security Lab

 

Part 3: Analyzing Malicious Windows Programs (Lab 7.1 from PMA)

Complete all the steps mentioned in the below attached document for part 3 of this project:

Project part 3_ Analyzing Malicious Windows Programs.pdf

Part 4: Analyzing Code Constructs in Malware (Lab 6.1 from PMA)

Part 4 of this project is based on Lab 6-1 in “Practical Malware Analysis” textbook chapter 6.

Based on the knowledge gained in all previous lab assignments, you will have to complete lab 6-1

individually (with minimal or no supervision) by following the instructions given in Lab 6-1 in the

textbook. There are more detailed solutions in the back of the book.

1. Open and analyze the malware found in the file Lab06-01.exe using IDA Pro.

2. Answer all the questions (Q1 to Q3) found in Lab 6-1 in your own words.

3. List all the steps you followed in setting up the software environment and the screenshots captured

while analyzing the malware in IDA Pro (Hint: The steps that you list for Lab 6-1 should be something

similar to the steps that were given to you in all previous lab assignment instructions).

Submission Requirements for all four parts of the project:

Format: Microsoft Word

Font: Arial, 12-Point, Double-Space

Citation Style: APA

Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum

of 6 pages (excluding title page and bibliography).

*******************************************Please read first to see if you can do the job.*********************

final discussion

In the final discussion posting please describe what components of cryptography impacted you the most.  Because of the short week, you will only create an initial posting.  There are no follow up postings for the week.

Discussion boards – 3

DB1 (400 – 600 words) 

Create a main post that highlights 2 best practices regarding the implementation of a security plan. This can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff).

  • Describe and evaluate each strategy.

DB 2 (400 – 600 Words)

 

The security awareness program for your company should include a time line of activities (such as security fair, or special “brown bag” meetings) and the types of communications (newsletters, placards, etc.) that would need to be sent to the users. Consider best practices for implementing your Enterprise Security Strategy Plan.

Identify at least 3 activities that would be part of your Enterprise Security Strategy Plan, and provide the following:

  • Approximate timing for roll out
  • Required communications
  • A brief explanation for choosing this implementation activity

DB 3 (400 – 600 Words)

 

Create a main post that highlights 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Explain why you have chosen these areas. Provide both the values you would hope to see and the actions you would take if what you saw was not in alignment with that optimal range.

Some examples are the following:

  • Security incidents (per week, month, or year)
  • Viruses detected
  • Administration violations (unauthorized changes)
  • Spam not detected
  • Invalid log-in attempts

Computer programming

 Yabe Online Auctions requires its sellers to post items for sale for a six-week period during which the price of any unsold item drops 12 percent each week. For example, an item that costs $10.00 during the first week costs 12 percent less, or $8.80, during the second week. During the third week, the same item is 12 percent less than $8.80, or $7.74. Design a modular program that allows a user to input prices until an appropriate sentinel value is entered and displays the price of each item for weeks one through six.