Client Side Web Programming

  

PART 1 (20 points): Gather data from Itunes Feed

https://itunes.apple.com/rss can generate RSS feeds for many different products in the iTunes store. For this project, we will be using the topsongs feed. The general URL for topsongs is:

https://itunes.apple.com/CODEFORCOUNTRY/rss/topsongs/limit=NUMBEROFTOPSONGS/xml 

where CODEFORCOUNTRY can be “us” for United States or “ng” for Nigeria or “tr” for Turkey and NUMBEROFTOPSONGS can be in the range of 10-300.

Write Javascript using jQuery to display the following information from the XML feed to an HTML page:

a. The title of the song (3 points)

b. The name of the artist (3 points)

c. The album of the song (4 points)

d. The image associated with the song (Note that there are 3 images of different size, choose one size only) (5 points)

e. The link to audio clip (5 points) (Note that there are two link tags. Choose one.)

You can get any other information from the feed that is of interest to you. WK13 exercise will be helpful.

PART 2 (5 points): Play Audio Clips

This part requires you to teach yourself how to use the audio tag. Based on your HTML knowledge, you should be able to figure this out. For reference, look here: http://www.w3schools.com/html/html5_audio.asp 

PART 3 (20 points): Add User Interaction (UI)

Add the following to your HTML & JavaScript:

a. A drop down menu to choose the top songs of one of three countries of your choice. Of the three countries, choose one country (non-English speaking) whose song you have never heard. WK11 PPT slides will be helpful. (3)

b. Use a slider widget to choose the number of songs to display with a range of 5-30. WK11 exercise/demoWidgets will be helpful. (6)

c. Javascript/jQuery code to take user input and update the following link where the value for CODEFORCOUNTRY will be taken from (a) and the value for NUMBEROFTOPSONGS will be taken from (b) (8)

https://itunes.apple.com/CODEFORCOUNTRY/rss/topsongs/limit=NUMBEROFTOPSONGS/xml 

d. A button when clicked will parse/read the itunes feed (3)

For every search, make sure you clear the div section where you are displaying the song information.

PART 4 (10 points): Use the YouTube API

Here is the YOUTUBE API link where searchTerm, SomeNumber and YOUR_API_KEY need to be filled:

https://www.googleapis.com/youtube/v3/search?q=searchTerm&part=snippet&maxResults=SomeNumber&type=video&key=YOUR_API_KEY 

For each song in the itunes feed, create a search term from the data you collected from the RSS feed. What would be an appropriate search term? What would be an appropriate number for maxResults? 

Parse/read the data you get from the YOUTUBE API to get the id of the video. Use the id to create a clickable link to the youtube video. For example, if the id is “RFinNxS5KN4”, then the link will be “http://www.youtube.com/watch?v=” + id. Do not embed the video. 

Create the HTML to display the video link including all other information you gathered from the itunes feed earlier. Make sure you append the HTML within the function that parses/reads the YOUTUBE API data. WK13 exercise will be very helpful.

Error Checking: When a video id of a song is not found, instead of displaying a youtube link, print that the video for that song was not found. Test and make sure this works by searching for something that will return no result.

Code Comments (5 points)

Include comments to your code- both HTML and JavaScript. Comments should be accurate and detailed enough so that anyone who reads your code will be able to understand the program without any explanation from you. Another way to think about it is that if you read this code one year from now, you should be able to understand what the program does. If there are any issues with your code or quirks that I should be aware of during grading, include them in a readme.txt file. 

Creativity (10 points)

Add your own creative style to the webpage- make it your own and impress yourself! However, do keep in mind that other people would be using the webpage (in this case, me!) so keep the colors, font size, layout, graphics etc. readable and usable. Do not choose red font on a blue background for example.

Spr1.3

Assignment 1

Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

· People: stakeholders, audience.

· Constraints: pressures, rules.

· Consumption: frequency, setting.

· Deliverables: quantity, format.

· Resources: skills, technology

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Project Part 3.

Refer to the “Project Part 3-Malware Protection Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

2 Assignments (Malware Attacks and Online Interactions)

 Assignment #1

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.  

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.  

Complete the following in your outline: 

  • Provide details of the malware. 
  • Identify the exploited vulnerability and its attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Note: You will use content from this #1 assignment as part of the #2 Signature Assignment

Assignment #2

Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.  

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.  

Include the following information in this section: 

  • Describe 2 threats this interaction poses on the company.
  • Provide step-by-step instructions on how to mitigate each interaction. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Combine This assignment #2 with your revised assignment #1 – 

Apply: Malware Attacks sections of your Playbook

Cite at least 2 resources to support each assignment.

Format each assignment according to APA guidelines.

Cyber security planning and management

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

 There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/
https://www.techrepublic.com/

E-Business Strategy – Paper discussing attached Amazon Article Paper and Memo to the CEO Amazon

Subhject: E-Business Strategy

Instruction:

* Read the attached Amazon Article. 

* Discuss the eight unique features Ubiquity,Global Reach,Universal Standards,Richness,Information Density,Interactivity,Personalization/Customization,Social Technology in relvant to article.

* Discuss Amazon’s dominance and disruption mentioned in the article. 

* Also, analyze the e-Business strategies discussed in the article and the impact these strategies have on the marketplace

Important DELIVERABLES: Two items:

————————————————–

*** Item # 1. A 4-5 paper with 4 minimum references.

*** Item # 2. A short memo to the CEO of Amazon stating your opinion of Amazon’s e-Business strategies.

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:

  • How will security be implemented in the Linux systems—both workstations and servers?
     
  • End users have expressed some concern about completing their  day-to-day tasks on Linux. How would activities such as web browsing  work? How would they work with their previous Microsoft Office files?
     
  • The current Windows administrators are unsure about administering  Linux systems. How are common tasks, such as process monitoring and  management, handled in Linux? How does logging work? Do we have event  logs like we do in Windows?
     
  • Some folks in IT raised questions about the Linux flavor that was  recommended. They would like to see comparisons between your  recommendation and a couple of other popular options. What makes your  recommendation the best option?
     
  • How does software installation work on Linux? Can we use existing Windows software?
     
  • How can Linux work together with the systems that will continue to  run Windows? How will we share files between the different system types?
     

The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Template

  

Go2Linux, Inc.

 

Provide a brief summary of your recommendation

of a specific version of Linux. Explain how your choice meets the business need of Faster 

Computing, Inc.

The bold text questions below represent the specifics you need to focus on. For 

each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 

assignment you will provide technical details for Information Technology personnel.

Any example Linux commands should be properly displayed (e.g., in lower case) 

and any acronyms explained on first use (e.g., Secure Shell (SSH)).

·

How will you implement security in the Linux systems?

o

Start by outlining how you plan to migrate the existing Windows 

Servers to Linux. Ho

w will users authenticate? What technologies will be used? What 

kind of access controls will be used?

o

Will you recommend simple authentication mechanisms or employ 

multiple factors? For passwords, what policy(ies) will you recommend?

needed>

o

How will you handle data-at-rest and data-in-transit?

needed>

o

How will you enforce software installations and control which 

applications may run on the network?

·

End users have expressed some concern about completing their day-to-day tasks on 

Linux. How would activities such as email/web browsing work? How would they work 

with their previous Microsoft Office files?

o

There are several ways to address the use of existing applications. 

Conduct research to determine the available options.

o

For web browsing, you should provide at least 2 alternatives and 

consider the impact to initial configuration (bookmarks, extensions, plugins)

needed>

o

For Microsoft Office, provide a full discussion on how users will 

continue to open/edit/save office docs in the Linux environment. You should provide at 

least 2 alternatives.

·

The current Windows administrators are unsure about administering Linux systems. How

are common tasks, such as process monitoring and management, handled in Linux? 

How does logging work? Do we have event logs like we do in Windows?

o

Discuss your logging and monitoring approach in this section. You 

should include the location of specific Linux log files.

o

Discuss how admins can manage processes. It may be helpful to 

compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 

stop processes, including the corresponding commands.

·

Some folks in IT raised questions about the Linux flavor that was recommended. They 

would like to see comparisons between your recommendation and a couple of other 

popular options. What makes your recommendation the best option?

o

o

The key differentiator is …

·

How does software installation work on Linux? Can we use existing Windows software?

o

Discuss a Linux package management specific to your distro. How will

you automate updates?

o

Discuss how specific Windows applications can be installed and used,

if at all.

·

How can Linux work together with the systems that will continue to run Windows? How 

will we share files between the different system types?

o

Discuss how file and printer sharing will work. Will the users need to 

do anything “different”? What underlying technology will need to be implemented?

as needed>

Warm regards,

Go2Linux

Linux Deployment Manager

References

to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 

Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm

l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 

Encryption. [Accessed December 1, 2019]. 

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 

Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 

December 6, 2019].

… and so on …

truncatabel prime

  

Assignment 4: Truncatable Primes

Background

A left-truncatable prime number is one where the numbers resulting from removing the left-most digits are also prime. For instance, the number 9137 is a left-truncatable prime since 9137, 137, 37 and 7 are all prime.

A right-truncatable prime number is similarly defined, but removes a digit from the right. For example, 31193 is a right-truncatable prime since 31193, 3119, 311, 31, 3 are all prime.

A truncatable prime, also known as a two-sided prime, is one that is both left-truncatable and right-truncatable simultaneously. An example of such a prime is 3797.

We will be writing a program to explore these truncatable primes.

As a side note, the property of truncatable is dependent upon the base that the number is represented in. For this program, only worry about base 10.

Analysis

First note that the property of truncatability always produces a chain of numbers that terminate in single digit prime numbers. Therefore we can identify prime numbers by starting at the end of that chain and build numbers by adding digits. That is, we should be able to identify 3797 as a truncatable prime by building it from the right as in 7, 97, 797, then 3797, all the while verifying each step is left-truncatable.

Next note that when building from the right, we can only add odd digits. If we were to add a 0, 2, 4, 6, or 8, the resulting number would be divisible by 2 and thus not prime.

Finally, all of the single digit prime numbers are 2, 3, 5, and 7. These form the basis of our search.

Approach

Based upon the analysis above, we can find truncatable primes by building primes that are right-truncatable by construction, and verify they are left truncatable as we go. This suggest the following recursive algorithm

Build Truncatable Primes(int start)

if (start is not prime)

return

if (start is left truncatable)

found one. print it out

Build Truncatable Primes (start * 10 + 1)

Build Truncatable Primes (start * 10 + 3)

Build Truncatable Primes (start * 10 + 7)

Build Truncatable Primes (start * 10 + 9)

For left-truncatable, consider testing the number 12345. We know that we need to check 12345, 2345, 345, 45, and 5. But since all must be prime, the order they are tested in does not matter. In particular, we can check them in the order 5, 45, 345, 2345, 12345. What is nice about that order is we can get those digits by modding by successive powers of 10. Therefore you can use a loop that starts at 10, and updates by multiplying by 10.

Tips

· Start by writing an is_prime function.

· Next write an is_left_truncatable function.

· Using the modulus operator with powers of 10 can cut off digits from the left side.

· Write the algorithm specified above.

· Start the algorithm with all possible single digit prime numbers.

Sample Output

The truncatable primes are:

2

23

3

313

3137

317

37

373

3797

5

53

7

73

739397

797

Week 8 Assignment

Discussion: (One Page)

This week we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important.

Assignemnt: (One Page min)

Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section?