H2LoginPage JAVA Required

This assignment requires students to follow the slides of H2LoginPage.pdf and complete the tasks below:Follow the steps as illustrated in H2LoginPage.pdf to create a Login Page, with the solution name “LoginPage” being prefixed by the initials of your given and family names. For example, the solution name needs to be jsLoginPage if the student’s name is ***** *****.

Modify the function okButton_Click() and write C# ***** to allow the modified function to check if a password ***** ***** A valid password ***** have at least six characters with both letters and numbers. In addition, the password ***** start with a letter, and cannot contain characters other than letters and numbers.

While the “Cancel” button still terminates the application, the “OK” button produces the following different messages according to user input:

“Please fill in all slots.” if one or both of the slots are empty;

“Thank you for providing the input.” if the password ***** the requirements;

“A valid password ***** to have at least six characters with both letters and numbers.” in all other cases.

Package the folder containing all files of your solution and submit it online before due.

Hints: please check ASCII table for the code range of letters and numbers, and refer to http://msdn.microsoft.com/en-u… C# ***** codes using string.chars properties.

Discussion 2

Topic :  User-centred Design and Evaluation of Health Information Technology 

 

Post your topic for your dissertation – Cite appropriate scholarly literature (3 – to 5 articles – past 2-3 years) to support your topic area.  What do you know about the topic and what remains to be known?
Do one of the scholarly articiles provide you with an opportunity to extend a current study?  Be sure you have scheduled your one-on-on conversation with Dr. Butler – use the Calendly link in the syllabus to set up your call. To start your your topic idea use this format: 

The scholarly literature tells us that…
What we currently know is…
What remains to be found out is….( OR  the XXXX study on XXXX can be extended with additonal research by….)
Use appropriate APA 7 citations

dataset

Question: Add the functionality of adding a dataset to another dataset. Essentially, using this functionality, one would able to add all data of one dataset to another dataset and use it. It would have one argument of type class dataset and no return value as it adds the parameter dataset’s value to self’s dataset.

For this question, the bottom line is that the below cell should work.

# Do not change this cell

print(len(txt_data))

csv_data.append_dataset(txt_data)

print(len(csv_data)) 

You have to decide where this function would go from the above three classes and implement it.

—– Other Classes —–

#Implement dataset class in this cell

class dataset:

    def __init__(self):

        self.list = []

    def __getitem__(self, index):

        if (len(self.list) > index):

            return (self.list[index])

        else:

            return None

    def __len__ (self):

        return len(self.list)

    def append_data(self, item):

        return self.list.append(item)

    pass

# Implement txt_dataset class in this cell

class txt_dataset(dataset):

    def __init__(self,filename,splitter,encoding):

        super().__init__()

        self.append_file(filename,splitter,encoding)

    def append_file(self,filename,splitter,encoding):

        file=open(filename,encoding=’utf8′)

        line=file.readline()

        while line:

            self.append_data(tuple(line.split(splitter)))

            line=file.readline()

    pass   

# Implement csv_dataset in this cell

import csv

class csv_dataset(dataset):

    def __init__(self,filename,splitter,encoding):

        super().__init__()

        file=open(filename,encoding=’utf8′)

        reader = csv.reader(filename, delimiter=’;’)

        for line in file:

            data_value=line.split(splitter)

            super().append_data(tuple(data_value)) 

      def append_file(self,filename,splitter,encoding):

        reader = csv.reader(filename, delimiter=’;’)

        file = open(filename, encoding=encoding)

        for line in file:

            data_value = line.split(splitter)

            super().append_data(tuple(data_value))

        

Physical Modeling Design & Structured Query Language (SQL)

 

This week we focus on physical modeling design with the “representational aspects” and the “operational aspects” of the database. In the following weeks, we work in the internal DBMS specific operations and processes and how the DBMS interacts with the data, the database and the user. The translation from logical design to physical design assigns “functions” to both the machine (the DBMS) and the user. Functions such as storage and security, and additional aspects such as consistency of data and learnability are dealt with in the physical model/schema. Practically speaking, a physical schema is the SQL code used to build the database.

You can use any of the Online SQL systems discussed in class, Microsoft Access, or download and install a SQL Script Editor for your computer. A copy of the SQL code is required for this assignment. You will build the front-end for the user (DBMS) at the end of the intersession weeks.

Use SQL statements to populate your Database Relational Schema data. Implement your design by generating a file of SQL to create the code script. This should include:the creation of tables, but also (as appropriate) the creation of named, data type, and constraints. Constraints are used to limit the type of data that can go in a table. This ensures the accuracy and reliability of the data in the table. If there is any violation between the constraint and the data action, the action is aborted.

NOTE:  

create statements for the database, tables, views, procedures and such, all of which focus on the structure around the data. They are part of the Data Definition Language (DDL). You’ll need to upload both the physical model ERD and the DDL SQL statements in your submission. The physical model is the logical model with the data types (int, char, varchar, date, timestamp, etc) included in the diagram (week3 diagram with data types). Let me know what platform the SQL statements are for that is, are you using SQL Server, MySQL, Oracle, Amazon’s databases, Azure etc as they all have a common SQL base but have different nuances that I have to account for when I test the code. I challenge you to have both an introduction and a conclusion to your paper. attached are precious document 

Crime & Security

Answer each of these questions in a paragraph with at least five sentences in a word document. Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is there still any faith at all on the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hacktivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

CS 1073 Winter

CS 1073 Winter  Hw#3   

 Submit online   only  your  source code files (extension java), thru Desire to Learn.

Ex#1:   

Write a class called  Student  that represents a typical student with the  attributes:  name, address,

major,  GPA and the operations: setName( ), getName( ), setAddress(), getAdrdress(), setMajor( ), 

getMajor( ), computeGPA( ),  getGPA(). Parameters passing should be set  according  based on

getting or setting a  given attribute.   To compute the GPA, generate a random float number

between 0.5 and 4.5.  Include two constructors, the first takes a name, address, and major and

calls computeGPA to set the GPA. The second only takes a name and address and sets the major

to “Undeclared”. It should also call  computeGPA to set the GPA. Write a short driver to test all the

above methods and constructors with at least at least 4 students.   

Here is a sample of input/output  (use “DecimalFormat…” or something similar to format the GPA)  

Name: Jessica  Brown

Address: 500 Cuyahoga  Street, Saint John

Major: Computer Science

GPA: 2,673

Name: Dan Boulder

Address: 54 Queens Blvd., Quispamsis 

Major: Undeclared

GPA: 3,653

Name: Sarah Al-Kaabi

Address:  135 University Av., Saint John

Major: Business  and History

GPA: 1,194

Name: Shin Yu

Address: 16  Dale Dr.

Major:  Philosophy

GPA: 2,578 

 

 

vul dis 6

 

During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.

For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:

1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:

  • Kali
  • Metasploit
  • Nessus
  • Nmap
  • Process Explorer
  • Splunk
  • Wireshark
  • Any other tool used in the course

2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?

3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?

paper on data and privacy in social media

paraphrase the attached paper and make a table of content as follows:

  

Table of Contents

Introduction. 1

Research problem.. 2

Research importance. 2

Research objectives. 2

Hypotheses. 3

Research limitation. 3

Research difficulties. 3

Research methodology. 3

The research plan. 3

Chapter 1: 

1.1. 

1.2. 

Chapter 2: 

2.1.

2.2. 

2.3. 

2.4. 

Chapter 3: 

3.1. 

3.2. 

3.3. 

Chapter 4:

4.1. 

4.2. 

4.3.

Chapter 5: 

5.1. 

5.2. 

5.3. 

5.4. 

5.5. 

5.6. 

Conclusion. 25

References. 26

 References should be 50 and done by both a footnote and Harvard (each one on a separate page) 

BIAs and BCPs

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.

Please answer below

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

1000 words with APA format and references needed.