Computer Science week 8 assignment

 

Week 8 Assignment

Instructions

Week 8 Assignment:

In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                                  Question Below

Discuss the steps involved in conducting black box testing.

Exp22_Word_Ch04_HOE – Research 1.1

Exp22_Word_Ch04_HOE – Research 1.1

Exp22 Word Ch04 HOE Research 1.1

Word Chapter 4 Hands-On Exercise – Research

  

Project Description:

You have completed a draft of an analysis of the short story “A White Heron.” As a requirement for the literature class in which you are enrolled, you must format the paper according to MLA style, including citations and a bibliography. In addition, you will include a cover page

     

Start Word. Download and open   the file named Exp22_Word_Ch04_HOE_Research.docx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Click or display the Review tab   and ensure that No Markup is selected in the Tracking group. Accept all   changes and stop tracking. Apply the following formatting to the whole   document:
  • Document is double-spaced.
  • The font is Times New Roman 12 pt.
  • There is no paragraph spacing before or after any paragraph.

 

Insert an unformatted header and   type Belew. Follow the name with a space   and a plain page number. Make sure the page number is inserted as a field,   not simply typed. (On a Mac, choose to right align the page number.)   Right-align the name in the header so that it shows on the right side of the   header along with the page number. Format the header as Times New Roman 12   pt. Close the header.

 

Change the writing style to APA   Sixth Edition. Place the insertion point after the ending quotation mark and   before the ending period in Jewett’s notation in the first body paragraph   (ending in straying about out-of-doors).   Insert a citation, selecting the Jewett   source. (On a Mac, click or select Citations on the References tab and   double-click the citation.) 

 

Place the insertion point after   the ending quotation mark and before the ending period in Hovet’s notation in   the second body paragraph (ending in functions   that are also present in “A White Heron”). Insert a citation, selecting   the Hovet source.

 

Click or select Jewett’s   parenthetical citation in the first body paragraph beside the words straying about out-of-doors. Click or   select the Citation Options arrow and click or select Edit Citation. Type 532 in the Pages box. Edit the Hovet   citation to suppress the display of Author, Year, and Title, but showing a   page number of 63.

 

Insert a blank page at the end   of the report. On the blank page, insert a bibliography, selecting the Works   Cited option.

 

Click or position the insertion point after the quotation mark ending   the first sentence in the last paragraph on page 1, ending in As A Fairy Tale. Insert a footnote,   typing Dr. Theodore Hovet is a renowned   researcher at the University of Southern Colorado. (Include the period.) Modify the footnote style to include a font   size of 12 pt. 

 

Insert a page break at the   beginning of the document and place the insertion point at the top of the new   blank page. Click or display the Home tab and click or select Center   alignment in the Paragraph group. Change the font size to 16 pt and font   color to Black, Text 1. Create a cover page by completing the following   steps:
 

  Press Enter five times.
  Type AN ANALYSIS OF THE WHITE HERON. (Do not include the period.)
  Press Enter three times and type Cindy Belew. (Do not include the period.)
  Press Enter three times and type ENG 420. (Do not include the period.)
  Press Enter three times and type March 10,   2023. (Do   not include the period.)

 

Double-click in the header area.   Select Different First Page in the Options group to ensure that the header is   not displayed on the cover page. Close the header.

 

Click the Review tab and change   the view in the Tracking group to Simple Markup. Ensure that Show Comments is   selected in the Comments group. View the third comment on the second page and   note that you need to add a citation. Click after the quotation mark and   before the period in the sentence in the last paragraph on the second page   (ending with for the course of action).   Add a new source as follows:
 

  Type of Source: Book
  Author: Propp, Vladimir
  Title: Morphology   of a Folk Tale
  Year: 2004
  City: New   York
  Publisher: Anniston

 

Scroll to the end of the   document and click or position the insertion point anywhere in the   bibliography text. Click or select Update Citations and Bibliography. (On a Mac, click or select the Bibliography   arrow and select Update Citations and Bibliography.) Select the bibliography,   including the Works Cited title, and change the line spacing to double.   Paragraph spacing should be set to 0 pt before and after, and all font should   be Times New Roman 12 pt. Center the Works Cited title and ensure that it is   not bold. 

 

Point to the third comment on   page 2, and click or select Resolve. (On a Mac, right-click the comment and   click or select Resolve Comment.)

 

Scroll up and view the second   comment on page 2. Click or position the insertion point before the word Although in the sentence in the first   body paragraph (that begins with Although   wracked with guilt). Type She is too tenderhearted to give up the heron family to   the hunter.   (Include the period.) Press SPACEBAR. Resolve the comment.

 

Click Reply in the first comment   on page 2. (On a Mac, right-click the comment and click Reply to Comment.)   Type Please   check my revisions.   (Include the period.)

 

Save and close Exp22_Word_Ch04_HOE_Research.d ocx.   Exit Word. Submit the file as directed.

Malware

 Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

1000 words

APA format with References needed.

Quiz for Electronic Document and record Management-IT

1-Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual

PII.

Paradata.

Metadata.

EDMS.

2-Which of the following items is NOT the component of Open Government?

Transparency.

Privacy.

Public participation.

Collobartion between the public and the government.

3-Process of obscuring or removing sensitive information for release

A-Records management
B-Content management
C-Information redundancy
D-Redaction

4-Agroup of authoritative records from which information is retrieved for a given identifier

PII
Data at rest
System of record
Access control

5-schedule lists the length of time each record will be retained as an active record in the system.

Metadata
Paradata
Retention
Classification

6-Which of the following is an example of PII?

SSN
Driver license
Medical records
All of the above are considered as PII.

7-Which of the following items is NOT regarded as unstructured data?

E-mail
Instant messaging
Web data
Database files

8-In the Amex vs. Vinhnie Case that we discussed in class, what rationale(s) the Judge used to decide that the evidence provided by Amex was not admissible to the court?

Amex failed to provide  adequate information about its computer policy.

Amex  failed to show how changes to the data were recorded or logged

Amex could not corroborate that their backup practices were in place.

All of the above

9-“Big Data” is a term used when there is a large amount of:

Unstructured data
Information transparency
Deduplication
MS Office documents

10-A record that is essential for the functioning and survival of an organization after an emergency:

electronic record
vital record
duplicate record
sensitive record

11-Information about a document, apart from the thing itself

Paradata.
Unstructured data.
Electronic document.
Metadata.

12Prediction of how a third party will behave

Trust.
Transparency.
Data integrity.
Access control.

13-Which of the following aspects is NOT the functionality requirements of EDRMS?

Compliance.
Software testing.
Content Management.
Creation and transfer.

14-The purpose of a digital signature is to:

validate that the message was sent by  the purported sender.

ensure that the message was delivered to the purported receiver.

have an electronic version of the signature.

encrypt the document.

15-Security features that control who can access what type of resources

Intrusion detection system.
Proxy Server.
Access control.
Firewall.

16-Process of developing decision recommendations based on insights derived through the application of statistical models and analysis of the data

E-discovery.
Encryption.
Analytics.
Validation.

17-Refers to all data in computer storage while excluding data that is traversing a network or temporarily residing in computer memory to be read or updated

Transparency.
System dependence.
Data at rest.
Information redundancy.

18-Respecting the desires of individuals as compatible with the aims of the larger community is the definition for:

security.
integrity.
Privacy.
authenticity.

19-BYOD (Bring Your Own Device)was coined to describe business acceptance of the use of personal devices to conduct business.

True.
False.

Certifications

 

Chapter 14 of your text lists several professional certifications, both vendor-neutral and vendor-specific.

Which type of certification do you think is the most value? Why? Of that type, which do you think you’ll pursue? How do you see the knowledge gained from that certification aiding you in your career?

Your paper should be 3-4 pages long, with at least two scholarly resources published in the last year.

Illustrate Trojans, malware, and cryptology attacks

Part 1: Hacking Windows and Linux

Respond to the following:

  1. How can you distinguish between different operation systems by examining a listing of host services? 200 words minimum.
  2. Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum. 
  3. How are UNIX/Linux and the Apple OS X related? 200 words minimum. 

Part 2: Windows 2000™ and Firewall Issues

Respond to the following:

  1. When Windows first released Windows 2000, a default install resulted in IIS being installed and running. Why do you think Microsoft was criticized for this? 200 words minimum.
  2. What are some of the problems that might result from only deploying a firewall at the perimeter of an organization? Do most Linux distros come with a firewall? If so, explain it. What are some of the features of Microsoft’s “Internet Connection Firewall”? 300 words minimum.

HW

 

This unit’s assignment asks you to consider all elements discussed in chapter 20 and 21. Answer the questions below in a 2 full-page (minimum) paper and provide examples or use additional resources to highlight your points. You paper should have a solid introduction, body and conclusion (hint: assume that the reader of your paper has not read chapters 20 or 21 – what key points from the chapters would you share with them?)

  • Performance evaluation of a portfolio is difficult. What challenges can investment managers face and what recommendations would you make in effort to meet these challenges?
  • Portfolio insurance has always had an intuitive appeal to investors, particularly if the cost isn’t too great. What are some advantages and disadvantages that investment managers should be aware of? 

Write a project to display

  

Write a project to display Publishers table from the Contacts.mdf database from you StudentDataDatabaseFiles folder on the text website. The Publishers table has the following fields: PubID(the key field), Name, Company Name, Address, City, State, ZIP, Telephone, and FAX.

 
 

Allow the user to select the publisher name from a sorted drop-down list; display the rest of the fields in labels.

dq computer 2

 

  • Identify the uses of personal interest applications: lifestyle, medical, entertainment, convenience, and education 

 answer in 3 to 4 line.