Ready the instructions I have attached
Project Management
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to find jobs. The system must be tailored to your student or work population and be very easy to use.
- Write a two page paper describing how you would collect requirements for this system, and include at least five requirements in a requirements traceability matrix
- A minimum of 500 words excluding the title page and references is required.
- Use APA format – Refer to APA Style
week
Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
mysql and database (MySql WorkBench)
Show the results (using screenshots) of executing each SQL statement against the database you created for assignment #1. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output).
also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.
Privacy Issues in HealthCare
please write a research paper on “Privacy issues in HealthCare” which should be 7-9 pages long with citations. Need to include HIPPA and other related laws.
py
In this assignment you will compare two implementations of storing text files:
(1) One continuous string (newline char as separator).
(2) List of strings where each string represents a line
Each of these representations has to be implemented as a separate set of functions and, of course, with separate Python file For each implementation, you will write editor functions to move the “cursor”. In each representation, you use a cursor to represent the current position. For example, for (1) the cursor is just the position (index). For (2), the cursor is a pair: the index of the line and the position within the corresponding line string. Finally, for (3) the cursor is a pointer to the node (containing the line) and the position within that line.
Write (and test) the following 10 functions (names are taken from old vi editor) for each implementation
(1) cmd_h: move cursor one character to the left
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(2) cmd_I: move cursor one character to the right
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(3) cmd_j: move cursor vertically up one line
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(4) cmd_k: move cursor vertically down one line
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(5) cmd_X: delete the character to the left of the cursor
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(6) cmd_D: remove on current line from cursor to the end
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(7) cmd_dd: delete current line and move cursor to the
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
beginning of next line
(8) cmd_ddp: transpose two adjacent lines
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(9) cmd_n: search for next occurrence of a string (assume that string to be searched is fully in one line.
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
(10) cmd_wq: write your representation as text file and save it
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
Think of and implement any other 5 functions (your choice)
(11)~(15)
a. string implementation for text editor
b. list implementation for text editor
c. double linked list implementation for text editor
For testing, you will read the following “nerdy” poem (from the “Zen of Python”) into your “file representation”.
Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
After each command, print the contents of your file with character ‘^’ as cursor.
Example: your initial configuration is
^Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
After executing cmd_n(‘better”), your representation should print:
Beautiful is ^better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
FTK Imager to create a triage, or “custom content,” image
Using a Virtual Machine as your suspect device, you will use FTK Imager to create a triage, or “custom content,” image. Remember, your instructor will provide links for any evidence that you might need.
This is done so that you can get a look at some important artifacts without having to image and process an entire drive. It is useful because it can allow you to focus on devices that will give you the most evidence up front and put aside devices that may not be relevant to the case.
Instructions:
Your deliverable for this assignment will be a screen capture of FTK running your custom content image and a short report. Save the custom content image for use later in the course. To create your screen capture, follow these steps:
- If you have not already done so, download the latest version of FTK Imager.
- Create a USB drive with FTK Imager installed. This is a simple process of downloading FTK Imager and installing it on a connected USB drive (SEE TRIAGE USB CREATION INSTRUCTIONS IN LESSON 2.1). Or use FTK Imager Lite, which does not require installation.
- You should be running the provided suspect disk image .vhd file, which you can download from the class resources folder.
- Connect your FTK USB drive to the VMWare machine. This will also be your destination drive for the image you will create, so make sure it is big enough (32 to 64 GB).
- The first step in creating a triage image is to capture RAM! Be sure to do that first. Save the memdump.mem file to your USB.
- Use the VMWare virtual disk as your target, and create a “custom content image” using FTK.
Please write a forensic report which describes the steps you took to complete this assignment. Include the screen capture you took as proof. This does not have to be a narrative report, just a screencap and brief description of the relevant activity to document what you did.
Use of medical information online and barriers facing telehealth
Week 5 Written Assignment
Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.
The title page and bibliography do not count towards the word count.
Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference
After completing the essay, save and upload the document in the Assignments section of the e-classroom.
Each essay will be checked by Turnitin automatically upon submission. You will have access to the originality reports.
Topic: After conducting independent research using at least three sources not used in the class write an essay that examines the use of medical information found online and current barriers facing telehealth or telemedicine.
Denial of Service Attack 2.0
- Define a denial-of-service attack in your own words.
- Explain how this type of attack can adversely impact infrastructure.
- Explain methods organizations can implement to prevent DoS attacks from occurring.
3000 words
Application Development using Object Oriented Paradigm: A Case Study
Problem Statement:
A transportation company operates individual taxis and shuttles. It uses its taxis for transporting in the form of an individual or small group from one location to another. On the other hand, the shuttles have different scenario. They are used to pick up individuals from separate locations and provide them conveyance to several destinations. Any individual can call the company form anywhere. It may be a hotel, a mall, entertainment venue or any tourist company. When the company receives a call from such individuals, it tries schedule any available taxi for pickup service for a fare. If it has no free vehicles, it does not operate any form of queuing system. If the vehicles are available, then it confirms the individual for pick-up. After arrival at the pick-up place the driver notify the company that it has picked up the passenger. The driver notifies the company again at the time of dropping him off at his destination.
The company is now intending to have expansion in its volume. It thinks that this expansion will be vital to get more profit. For this purpose it needs more vehicles in addition to the existing ones. The company is willing to record details of lost fares and details of how each vehicle passes its time. These issues will help assess potential profitability.
Keeping the above mentioned problem statement, explain the following 5 steps in detail
- You need to discover all the classes from problem statement.[1 mark for discovering the classes from the problem statement given]
- Find out the methods associated with all the classes.[2 marks for the methods associated with the classes from the verbs of the problem statement]
- Create the CRC cards for all the classes found from the problem statement.[1 marks for creating all scenarios of CRC ]
- Create a Class relationship diagram using UML symbols [2 marks for creating the class relationship diagram using UML notations].
- As a final step Design (outline) classes and interfaces that have been discovered in the initial design phase [1 mark for outlining the classes and interface.]
- Give complete java programming implementation for at least two classes that were found in design phase. You must mention their most probable instance variables and methods. [2×1.5=3 marks]