Advanced modelling and visualization

provide you with some experience evaluating the use of mark embellishments within visualizations. 
Tasks:

Below is a link to a recently published academic paper that describes a series of experiments on mark embellishments. Read the paper and write a report explaining the underlying research question, the approach taken by the authors, and your personal response to the results of the experiment. Your goal here is to perform an abstract analysis of a research effort using the approaches described in the textbook.

https://kosara.net/papers/2015/Skau-EuroVis-2015.pdf

Your report should consist of three sections on 1-2 pages.

First, describe the underlying research question(s) in your own words. Why perform this research? What’s the impact for the potential outcomes? What principles in the textbook that relate to the research questions?
Second, describe the approach taken by the authors to find answers. How was the paper organized to assist their approach?

Third, discuss your personal response to the results obtained by the authors. Are you convinced by what they found? Do you have any objections to their findings, and if so, why? Are there any counterexamples of visualizations that you believe refute their claims?

TRUE FALSE

  

TRUE/FALSE

1. T F The functions fscanf and fgetc input data from files. 

2. T F Each data file must have an internal and an external name. 

3. T  F The file open mode “w” opens a file for writing. 

4. T  F We can use the fprintf function to write data into a text file. 

5. T F Assume that value is a variable of type int, the function call 

fscanf (stdin, “%d”, &value); is correct. 

6. T F  fscanf( ) and fprintf( ) are declared in the standard header file stdlib.h 

7. T F A text file is terminated by EOF. 

8. T F  The statement ifp = fopen(My_file”, “r”); opens a file for reading: 

9. T F The function sprintf( ) writes characters to a string. 

10. T F When a text file is opened, we have access to it at its beginning or 

end. 

11. T  F The main difference between scanf and sscanf is that sscanf gets its 

input from the string variable, which is its first parameter, whereas 

scanf gets its input from the standard input device. 

12. T  F The standard output function sprintf behaves like printf except it 

stores the output in its first parameter, which is a string variable. 

13. T F  The statement fprintf (test_scores, “%d”, score); writes a datum to a 

file named test_scores that has been opened in output mode. 

14. T  F It is possible to reopen in input mode a file that has been opened in 

output mode without closing it. 

15. T F If the file open mode for a data file is “w” an input statement 

referencing the file will read a datum from it.  

16. T F The output of a computer program can be directed to the standard 

output device, which is usually the monitor screen. 

17. T F  printf (“%d %d”, a; b); is syntactically legal. 

18. T F  scanf (“Enter a value for x: “, c1); is syntactically correct. 

 

Reply to discussion board.

 Requirement for discussion board: 

Response and respond to at least one other post, offering one or two paragraphs of additional insight and details. This could be additional support for their point of view, or it could be arguing a counterpoint. 

Discussion Board of other student is below:

# – Is a cyberattack ever morally justified in response to an enemy conventional attack?

For the discussion topic on ethical considerations for cyber operations, I chose to answer questions 1 and 5.  According to Dipert (2010), cyber warfare and conventional warfare share commonality based on the uncertainty of the outcome of an attack, as well as any side effects that may occur as a result (p 385).  He also believes that the evidence you have to justify an attack should be weighed against the moral conditions for going to war in the first place (p 400).  Therefore, I believe a cyber-attack is morally justified in response to a conventional attack, especially if the war outcome is devasting and the cyber-attack is used prevent further destruction from happening.  My reason is based on Dipert’s (2010) description of cyber tactics in warfare using an electromagnetic force to disrupt a target’s radio communications, machinery, and infrastructure (p 397).  In conventional warfare the attacker is probably already known, and the evidence needed to justify deploying a cyber-attack is likely valid.  My decision to deploy a cyber-attack would be based on what might happen as a result of not stopping the attack.

# – Once a war (cyber- or conventional) has begun what kinds of cyberattacks are morally justified?

Dipert (2010) says that we should think about proportionality and likelihood of success when considering to what extent a cyber-attack is morally justified once a war has begun (p 392).  Based on this theory, proportionality means that however you decide to respond to a conflict, your response should be less harsh than what was inflicted on you (Pope, p 29).  Therefore, under the proportionality criteria the saying ‘eye for an eye’ may not be justified in response to war because it would suggest that I am trying to enforce equal treatment on target solely in retaliation.  I understand why proportionality should be considered in this case because, if not, it could lead to unnecessary casualties and economies being without resources, like food, housing, and utilities for a long period of time.  However, once the war has begun, the kinds of cyber-attacks that could be deployed morally would really depends on the severity or likelihood that the situation will only get worse if nothing is done to stop it.  For instance, I think dismantling electronic devices to prevent communication and machinery to keep it from functioning as it normally would, would be a morally justified cyber-attack.  I would consider taking down any resources that keep an enemy in power.  While I would also be concerned with noncombatant immunity and ensuring that innocent people do not endure inhumane conditions (Pope, 15), I would likely be less concerned with noncombatant immunity of a target if no other options existed for a cyber-attack to be morally justified. 

discuss

 

Topic: Research: Common Hiring Mistakes

Hiring  the right person for the right job is not as easy as it might sound.  For this discussion, research online to find a suitable source about  common hiring mistakes.

For the initial post:

  • In  a first paragraph, explain at least two hiring mistakes examined in the  source you found, writing in your own words. Cite your source properly  using APA in-text citation.
  • In  a second paragraph, describe how these mistakes could be costly for an  IT team or a tech company. Write this paragraph from experience or using  your critical thinking skills, not source material.
  • Provide a full APA reference entry at the end of the post for the source you used in the first paragraph.

CYBERLAWS & ETHICAL HACKING PROJECT

Project Part 3: SQL Injection Response

Scenario

Aim Higher College just learned that sensitive information has been stolen from a student information system and posted on the Web. After reviewing web server and database logs, the Aim Higher IT security team believes that the source of the problem is a SQL injection vulnerability. The vulnerability appears to exist in a web application used by students to register for courses. As part of the incident response report to be submitted to Aim Higher College’s management staff, your supervisor asks you to provide details about this type of vulnerability, how an attacker might exploit it, and methods of detection and removal.

Tasks

Research SQL injection attacks on the Internet to supplement your existing knowledge. Using the information you discovered during this research, in conjunction with what you learned in class, write an incident response report for Aim Higher College’s management detailing the following information:

-A non-technical description of SQL injection vulnerabilities intended for a college management audience.

-The threat that SQL injection poses to the college’s data. Include three possible scenarios that describe how an attacker might conduct this type of attack, the information that they may be able to obtain, and how they might use it maliciously.

-An implementation plan to fortify the college’s web applications against SQL injection attacks

-A monitoring plan that will provide:

-Early warning to developers and security administrators that a SQL injection vulnerability exists in a web application

-Detection of successful and unsuccessful attempts to conduct SQL injection attacks against college systems

Homework

 Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Use your own words. Attach your WORD document here.(200 to 300 words and add references)

TCO

  

1. (TCO 3) Show the source code for a C# console application called “Area” to display the area of a parking lot with length 203.5 ft. and width 30.5 ft. (Note that area is length times width.)

· Declare and initialize appropriate variables for length and width.

· Include at least three descriptive comments.

· State what your program displays when it runs.

· State how you would use the debugger to check the values of your variables as your program runs.

  

2. (TCO 5) Describe two types of loops that can be used to write the C# code required to print every fifth integer from 0 to 500 (i.e., 0, 5, 10, 15, etc.), each on its own line. Which would be a better choice and why? Write the code using that type of loop. 

3. (TCO 8) Briefly describe how parameter passing by-value and by-reference are accomplished in memory. Write statement 1 to call method A below. Write statement 2 to call method B. Which method uses pass by-value? Which method uses pass by-reference?

How could each of the three errors be corrected to improve the user experience?

5. (TCO 2) Although the following code compiles and runs, the programmer made some major readability errors. Describe at least three changes that would make it easier for other programmers to read and understand the code.

6. (TCO 11) Write a C# program to store an array of integers 10 through 19. Use an appropriate loop to add all of the values in the list. Print out the sum. 

Continuation of Proposal Discussion

Now that you have made a proposal, we need to collect evidence! This week you will be researching and collecting data that shows why you believe it is important to pursue your proposal. Make sure to collect as much as information as possible so you can create meaningful charts next week. This week’s work will be the basis for next week’s assignment.

The following resources will be used to complete your assignment:

  • Microsoft Excel

This week you will complete the first draft of your Excel spreadsheet. Follow the steps listed below to complete the first part of your data collection.

  1. Create a new Excel file and call it “YourName_COMP150_W5_Assignment”.
  2. Add two new sheets and name them as “Read Me” and “Main Data”.
  3. The “Read Me” sheet is the place where you will add your name and date. You will also explain the purpose of the document and the type of information you are providing. See an example below.

w5img1.jpg

  1. Based on your research topic, you need to provide a large set of data that can be used for analysis during this week and next. Your data set must be at least of 10 rows and 3 columns and no more than 50 rows or 10 columns. You can make this up or do research to find a data set. The data set must have numbers to help with the calculations in the next steps, so it is recommended to review the entire assignment before you create the data set. 
  2. The table with the dataset must have a header that is merged and center.
  3. The data must be visible so make sure the columns and rows have enough spacing
  4. You are expected to have all of the following calculations
    1. A formula using a relative reference
    2. A formula using absolute reference
    3. Use at least three different functions
  5. Ensure the different types of data have the right formatting. Here are some guidelines
    1. Dates should have “date” formatting
    2. Any currency should have two decimals
    3. Any text should be setup as “text” or “general”
  6. Feel free to be creative by adding images or other formatting, and complete the file. Make sure the file is named “YourName_COMP150_W5_Assignment” and submit the file.

Discussion

  Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • Why is mobile development difficult?  Explain
  • How does design & utility make a difference between good vs great websites?
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.

short answer

 COLLAPSE

A key factor in any IT project is making sure that software applications are designed for effective human-computer interaction as well as universal access, including users with visual, auditory, motor, and cognitive challenges.  Your goal in this discussion is to evaluate how you would apply software design techniques to promote highly usable software applications where the user interface is concerned.  Discuss key user interface concepts that maximize effective human-computer interaction, and suggest techniques that promote universal access.  Explain why you selected the techniques in your solution and present their value to your solution.  Do the same regarding universal access.  In your response post(s), enhance your peer’s posts by adding additional insight not captured in their response.