Pros and Cons of Blog

 Discuss the pros and cons of using a blog to present content on behalf of a company. Discuss the type of content for which a blog may be most appropriate.  Use at least one source to support  and Need to be in APA 7 format

Software Technology – Testing Software Testing

 

IT213-4: Apply the debugging process and testing process to programs containing fundamental concepts such as decision statements, iteration, functions and arrays.

GEL-7.02: Apply ethical reasoning to ethical issues within the field of Information Technology.

Purpose

In this assignment, you will be addressing what is entailed in each of the testing levels that will occur in a professional software development environment. You will also consider an ethical dilemma as it relates to software testing and share from your personal experience, perspective, readings and research.

Assignment Instructions

Write a 4–6 page paper addressing the following:

  • Define the following four levels of testing for software development: 1) unit testing, 2) integration testing, 3) systems testing, and acceptance testing.
  • Explain the purpose of each testing level, and provide your reasoning for why it is important that each level of testing is performed for any software development project.
  • Describe how the four testing levels are related to one another.
  • Additionally, conclude your paper by addressing the following ethical dilemma providing your perspective on how to approach this decision:

There is a “first to market at all costs” culture that exists at some well-known corporations today. They would rather send out a “buggy” product if it meant being first. There have been many inferior products to rise to the top simply because they took the biggest chunk of the market share before anyone else. If you worked for a major software corporation as a software developer and were assigned a role on a project, what would you do if your manager pushed to rush a product to market without sufficient debugging and testing. What are the ethical implications of delivering a quality product versus meeting a deadline? How would you approach this decision?

Be sure to cite your sources in this paper and use correct APA format.

Information Technology and Organizational Learning Assignment:

Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

EH intership paper

Hello,

i need this paper by 10/27 afternoon.

Strictly No plagiarism please use your own words.

Will you adjust your Internet behavior now that you know how your data is used?
If yes, how?

300 words paper and 4 slides  PPT needed.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

File based database implementation in java

 

Objective

You are to implement a simple database using a sorted file of fixed length records. The data that you are to use for testing is in file: Parks.csv Windows compatible (cr lf). This data contains the visitation records for the US National Parks from 1904 to 2016.. The goal of this assignment is to understand and practice using file management techniques to implement a database system. Your file-based database needs to handle overflow by writing records to an overflow file that contains unsorted records.

First, create a file of fixed length records from the data provided interleaved with blank records. Your file should create space for insertions by writing one blank record between each real record. Meta-information should be stored in a non-fixed length way in a separate configuration file, e.g., “Parks.config”. The config file must also store useful data like the names of the fields (for display), the number of records, and anything else you would want to add.

So, the initial file will have 764 records, half of which are blank. When a record is inserted, the file is searched (using binary search) to find the correct location. If there is a blank record where the new record needs to go, then the blank record is simply overwritten. However, if there is no empty record available in the correct location, the original file should be re-written with new blanks inserted, including after the new record. For example, if we do 3 inserts into blank records, we would now have 385 real records in our file of 764 total records. If the next insert fails, we would create a new file with 770 total records in it (the 385 real records, each with one blank record after it).

You must not read the whole data file into memory at a time

Program Description

Create a program which offers the user the following menu of operations:

1) Create new database
2) Open database
3) Close database
4) Display record
5) Update record
6) Create report
7) Add record
8) Delete record
9) Quit

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

WEB Answer

 

  1. Pitch Deck
    Overview
    You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
    Instructions
    You will need to answer the following questions:

    • What kind of domain names will you register (that is .com, .biz, .net, et cetera)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
    • Will you register the site using multiple domains? Why is or isn’t this necessary?
    • Will you need to secure any portion of your site? Why? (See the section on HTTPS.)
    • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
    • What browsers do you anticipate your visitors will be using based on information available today?
    • Does the browser have any impact on your design?
    • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?
    • Requirements
      You may use any one of a variety of formats to create a pitch deck. PowerPoint is highly recommended, with extra points for creating a presentation using a video device or software that you can upload to YouTube or another easily accessible online hosting service. (If you choose this option, you must coordinate ahead of time with your instructor, to ensure that your instructor will be able to access your video.) Note: You’ve already been hired, but remember that you still need to show off how awesome you are.
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Present information and requirements for a website design to a customer.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

vulnerable dependencies by using two different SCA tools “Snyk” and “Dependency-Check

 My task for this assignment is to use two different SCA tools “Snyk” and “Dependency-Check” to find vulnerable dependencies in open-source projects. Each tool requires a different setup method that can be found in the online documentation of the tool. You are required to follow the instructions in the online documentation to set up the environment, perform a scan, and prepare reports in a useful format. The ability to use online documentation is part of this assessment.

Required Tools

  • Ubuntu Linux VM
  • Snyk
  • Dependency-Check

Part 1

For Part 1 of this assignment, you will be using Snyk to scan a customized ”Gemfile.lock” file (also attached below) that contains a list of modules used by an open-source Ruby application and identify vulnerable dependencies. Snyk is a security tool that enables you to find and fix known vulnerabilities in open-source software. Watch this video to learn more about Snyk:

  • Create a free account with Snyk
  • Setup Snyk CLI on your Linux VM. For instructions, check the “CLI – Installation” page. 
  • Create a directory called “CYB505-Snyk” and copy ”Gemfile.lock” there.
  • Change to the newly created directory and run a test using Snyk CLI (refer to installation documentation for more details).
  • Login back to Snyk portal and observe the results. A new project should have been created by executing the test from the CLI. It will show you a summary of the findings. Clicking on the project name takes you to the finding details.
  • Summarize the findings in the format of a report. See the “Deliverables” section below.

 Part 2

For Part 2, you will be using Dependency-Check, which is an open-source SCA tool from OWASP.  You are required to install this tool on your Linux VM and run a test on another open-source tool from OWASP, Juice Shop.

To complete Part 2 of the assignment, follow the instructions:

  • Create a folder on your Linux VM called “CYB505-DC”.
  • Download OWASP Juice Shop (if you have not already done so for Discussion 7.1). Unzip and copy it to the newly created folder.
  • Download OWASP Dependency Check binaries zip file from the following link: https://bintray.com/jeremy-long/owasp/dependency-check under downloads.
  • Extract the zip file and look for the executable script called “dependency-check.sh” in the bin folder.
  • Run the scan and output the results into an HTML file. Use the command help option(“.dependency-check -h”) for guidance. Hints: Check out -f and -o arguments and ensure that your command line is in the directory with the .sh file.
  • Summarize the findings in the report format. See the “Deliverables” section below.

Deliverables

Submit a zip file that contains the following three files:

  1. A single assessment report PDF file that contains findings from both scans. The report should include:
  • An executive summary that summarizes the findings for the upper-management audience using limited technical knowledge.
  • Findings
    • Vulnerability overview
    • Detailed dependencies paths
    • Risk rating
    • Remediation recommendations
    • Your analysis of the proposed remediation method, ONLY for “High” rated findings. I.e., if it is possible to do, what are the challenges, etc.
  • You are free to choose the report format and headings, but points are allocated for a professional-looking, industry-standard level report. The report should be readable and eye-catching, yet accurate and informative for the technical audience.
  • PDF export of the Snyk report
  • PDF export of the Dependency-Check HTML report.