word document edit

 

  1. Open the StudentSuccess-03.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Review and delete selected comments and tracked changes.
    1. Change the Display for Review view to All Markup.
    2. Read the comment at top of the document and then delete the comment.
    3. Find the first tracked change in the document (left, right, and top margin changed) and Reject Format Change.
    4. Review the changes in the document and then Accept All Changes and Stop Tracking.
  4. Apply styles to the title and headings.
    1. Apply the Title style to the title on the first page.
    2. Apply the Heading 1 style to all the bold headings
    3. Apply the Heading 2 style to all the underlined headings.
  5. Insert footnotes and apply text formatting.
    1. On the first page, insert a footnote after “Weekly Schedules” in the “Schedule Your Time” section.
    2. Type Weekly Schedules are available from your counselor or in the college bookstore. as the footnote text.
    3. Insert a footnote at the end of “Be sure to schedule your time for all these in your 119 hours.” (after the period) in the “Schedule Your Time” section.
    4. Type Be sure to schedule recreational time in your 119 hours. as the footnote text.
  6. Move a footnote and modify footnote number format.
    1. Select the first footnote reference marker (in the body) and move it so it appears after “Weekly Schedule” in the “Track Your Time” section (use drag and drop or cut and paste).
    2. Deselect the moved footnote and change the footnote number format to a, b, c.
  7. Insert placeholders in the body of the document.
    1. In the “Introduction” section on the first page, insert a new placeholder named Navarro at the end of the body paragraph (and before the period).
    2. In the “Test Anxiety” section on the second page, insert a new placeholder named Sierra at the end of the body paragraph (and before the period).
    3. In the “Goal Setting” section on the fourth page, insert the Navarro placeholder (not a new placeholder) at the end of the intro paragraph (and before the period).
  8. Use the Source Manager dialog box to update placeholder reference information.
    1. Open the Source Manager and edit the Navarro placeholder to include the following information. Check the Show All Bibliography Fields box if necessary.
      Type of Source: Book
      Author: Tessa C. Navarro
      Title: Study Skills for College Students
      Year: 2018
      City: Chicago
      Publisher: McGraw-Hill
    2. Edit the Sierra placeholder to include the following information.
      Type of Source: Document from Web site
      Corporate Author: Sierra Pacific Community College District
      Name of Web Page: Tips for Student Success
      Name of Web Site: spccd.edu
      Year: 2019
      Year Accessed: 2020
      Month Accessed: February
      Day Accessed: 2
      URL: http://www.spccd.edu/tips4success.pdf
  9. Change bibliography style and insert a works cited page.
    1. Change the bibliography style to MLA.
    2. Place your insertion point on the blank line at the end of the document and insert a page break.
    3. Insert a Works Cited page.
  10. Insert a table of contents.
    1. Place your insertion point at the beginning of the document and insert a page break.
    2. Type Student Success Tips on the first line on the new first page (before the page break) and press Enter.
    3. On the blank line below “Student Success Tips,” insert the Automatic Table 1 table of contents.
    4. Apply the Title style to “Student Success Tips” on the new first page.
  11. Insert a footer and add custom content.
    1. Edit the footer on the first page of the document (table of contents).
    2. Check the Different Odd & Even Pages box. The insertion point displays in the odd page footer.
    3. Insert the Accent Bar 2 from the Page Number, Current Position drop-down list.
    4. Press Tab two times and insert the Document Title (or Title) document property field.
    5. Go to the even page footer and insert the Accent Bar 2 from the Page Number, Current Position drop-down list.
    6. Press Tab two times and insert the Company document property field.
    7. Change the font size to 10 pt and apply bold formatting to all footer content in both the even and odd page footers.
    8. Close the footer.
  12. Insert and customize a cover page.
    1. Insert the Slice (Light) cover page.
    2. Delete the Subtitle (“Document subtitle”) and Course (“Course title”) document property fields.
    3. Change the font size of the title on the cover page to 40 pt and apply bold formatting.
  13. Insert a page break before the “Physical Signs of Test Anxiety” heading.
  14. Update the entire table of contents and save your document.
  15. Save and close the document (Figure 3-132).
  16. Upload and save your project file.
  17. Submit project for grading.

assignment 8

  

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. 

Analyze how advanced security concepts are applied to develop secure code

You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.

  1. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
    • What is the value of secure communications to the company?
    • Are there any international transactions that the company produces?
    • Are there governmental restrictions about secure communications to consider?
    • What external threats might be present now and in the immediate future?
    • What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
  2. Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.

*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.

  1. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
  2. Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
    1. The names or vulnerability codes of the known vulnerabilities
    2. A brief description and recommended solutions provided by the dependency check report
    3. Attribution (if any) that documents how this vulnerability has been identified or documented previously
  3. Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

*Please note: You do not need to fix these vulnerabilities in this project.

CS

 

This assignment provides you an opportunity to practice

  • writing a program which uses the Serializable Interface.
  • developing a program which will use the read only mode in Java Binary I/O.
  • developing a program which will use the read write (rw) mode in Java Binary I/O. 

Directions

Please solve three (3) programming problems related to the content presented in Chapter 17 in your text. You can find the programming problems in the attached file (Module 8 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod8-Worksheet-Programming-Last-First.docx. For example, Mod8-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod8-Java-Programming-Last-First, for example, Mod8-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod8Problem#.java, for example, Mod8Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder. In this module, make sure to include Pledge.txt and Stu.dat in this folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted seperately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod8-Java-Programming-Last-First.zip (including .java files, data files, Pledge.txt and Stu.dat).
    • Mod8-Worksheet-Programming-Last-First.docx.

assignment

  

· Pick two (2) charts of different chart type (Categorical, Hierarchical, Relational, Temporal and Spatial) [Do not choose bar, pie and line charts)

· For each use a tool that can be used to create the selected chart. Use a different tool to create each chart.

· For each chart, write how to read the chart and what to look for.

Delivery: A word file with the following information:

1. 2 Charts

2. 2 Screenshots of the charts in development with the tools selected.

3. Paragraphs detailing how to read each chart and what to look for.

Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides” (Ciampa 368-369).

You will create a PowerPoint presentation for a fictitious company regarding wireless security. Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to Tech Republic Article about Powerpoint (Links to an external site.) for proper use of developing presentations in PowerPoint. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

Python dictionary attack for user input passwor, then, salting the password with user given number then again performing dictionary attack and calculating time

  

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

SQL ( fund of data systems)

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.