Microsoft Access Project

The instructions for creating the data base is in the link below.

https://lms.pennfoster.edu/nodes/microsoft-access-graded-project-unit-cloned-1579636842/objectives/create-a-home-inventory-database-that-can-be-referred-to-in-of-20180621-cloned-1579636842/resources/graded-project-microsoft-access-2016-resource-54740-1-cloned-1579636842

Dictionary Attack in Python

  

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

IT203 week 7

 

System Development Lifecycle (SDLC)

Define System Development Lifecycle (SDLC) and describe the steps involved.

Submit a one to two page paper in APA format. citation 

Apply: Configuring and Deploying a Private Cloud with System Center

 

Assignment Content

  1. The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

    Using the links provided, research at least 2 of the following codes of ethics:

Questions

1. Meals on the wheels organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short? (250 words)

write a one-page paper describing the Meals on wheels organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

2.  Data mining (250 words)

Regression and classification are categorized under the same umbrella of supervised machine learning. For your assignment this week

 1) Write a short paper  on the comparison and contrast between regression and classification methods.  Provide a formal definition for Regression and one for classification (20 point).

 2) Using the require text Only, write an essay that discussed Two similarities and Two differences between Regression and Classification. (40 Points)

(3) Provide one example to illustrate each similarity and differences discussed (40 points)

Requirement

  • Your response must be written in no less than 250 word,
  • Use  properly formatted APA in-text citation
  • Use your Text Book as the sole reference to support all writing for this assignment
  • You will need a thesis statement in the first paragraph
  • One paragraph should focus on a single idea

/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

3. 250 words:

 

The focus of this week’s discussion is on your reading of Chapter 4 for this week

Part 1. Describe in your own words two (2) differences between “shallow” neural networks and deep neural networks discussed in this section. (20 Points). Only support from your the required textbook is needed.

Part 2. List and discuss  two (2) characteristics of Deep Learning. (20 points)  Only support from your the required textbook is needed.

NOTE: Label each response with numbers. I don’t have to search through your post to find your response to each question. 

IA week8 DB

 

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Describe some ways that an organization can recover it’s IT resources from a natural disaster (fire, flood, hurricane, tornado etc.). What controls should have been in place in order to be able to retrieve this data?

An initial post must be between 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

executive summaries

 1 page discussion

  1. Search the internet for sample executive summaries.
  2. From your research, describe 3 items that need to be in an executive summary and your reasons why.
  3. Include in your report the ways that you would ensure that your executive summary would get buy-in from the key stakeholders of this project.

Organizational Analysis Paper

 

Each student will write an 5-7 page paper on a conflict that he or she experienced in an organizational setting.  The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font.  The organizational analysis will contain the following sections:

  • Background and history that led to the conflict.
  • How/why did the conflict escalate?
  • How was the conflict resolved?
  • What would the student have done differently, based on what he or she has learned in the class?

BSWFP

Final Project Topic Name:  Data Center Security

In 100 words (1)

1.  Include a short paragraph describing your project (Data Center Security ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (Data Center Security ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography
Please include the following:  

 What is (Data Center Security ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References: