Question 1:
200-250 words
Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it.
Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.
Python Requests Library( Module)
Needed description of Requests Library Functions.( 1 or 2 pages)
Important point i needed, Examples for about Requests Library Functions. In that examples if you use name one of them supposed to be BURAK.
i needed those examples on WORD PAGE AND ORIGINAL CODING FILES.
A security Incident
Your friend just referred you to his Uncle Harry to help him with a security incident and to conduct an investigation.
Write a 2 – 3 page report for Uncle Harry that includes the following:
- A description of Uncle Harry’s security incident (“make up” your own incident)
- Create an incident response plan to address the incident
- Describe how incidents should be handled in the future by Uncle Harry
- Detail the steps necessary in the investigation process.
Information Technology
https://www.cnet.com/news/lenovo-laptop-deals-get-a-thinkpad-t14-for-900-x1-yoga-for-1266-and-more/
Explore CNET
Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.
CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”
We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.
Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it
Intro to CyberSecurity homework
1. (a) In an environment in which several users share access to a single database, can one user ever block another’s access for an unlimited period of time? (This situation is called indefinite postponement.) (b) Describe a scenario in which two users could cause the indefinite postponement of each other. (c) Describe a scenario in which a single user could cause the indefinite postponement of all users.
2. Using the two-step commit presented in the beginning of this chapter, describe how to avoid assigning one seat to two people, as in the airline example. That is, list precisely which steps the database manager should follow in assigning passengers to seats.
3. Suppose a database manager were to allow nesting of one transaction inside another. That is, after having updated part of one record, the DBMS would allow you to select another record, update it, and then perform further updates on the first record. What effect would nesting have on the integrity of a database? Suggest a mechanism by which nesting could be allowed.
4. Can a database contain two identical records without a negative effect on the integrity of the database? Why or why not?
5. Some operating systems perform buffered I/O. In this scheme, an output request is accepted from a user and the user is informed of the normal I/O completion. However, the actual physical write operation is performed later, at a time convenient to the operating system. Discuss the effect of buffered I/O on integrity in a DBMS.
6. A database transaction implements the command “set STATUS to ‘CURRENT’ in all records where BALANCE-OWED = 0.” (a) Describe how that transaction would be performed with the two-step commit described in this chapter. (b) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS) and (CUSTOMER-ID,BALANCE-OWED). How would the transaction be performed? (c) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS), (CREDIT-ID,CUSTOMER-ID), (CREDIT-ID, BALANCE-OWED). How would the transaction be performed?
7. Show that if longitudinal parity is used as an error detection code, values in a database can still be modified without detection. (Longitudinal parity is computed for the nth bit of each byte; that is, one parity bit is computed and retained for all bits in the 0th position, another parity bit for all bits in the 1st position, etc.)
8. Suppose query Q1 obtains the median ml of a set S1 of values, and query Q2 obtains the median m2 of a subset S2 of S1. If m1 < m2, what can be inferred about S1, S2, and the elements of S1 not in S2?
9. One approach suggested to ensure privacy is the small result rejection, in which the system rejects (returns no result from) any query, the result of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records.
10. Cite a situation in which the sensitivity of an aggregate is greater than that of its constituent values. Cite a situation in which the sensitivity of an aggregate is less than that of its constituent values.
WK 5 Rough Draft
Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as a business field that would benefit from technical writing.
1) 10 pages (double-spaced).
2) Choose any technical topic to write your report about.
3) Identify the purpose and audience of your report.
4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).
5) In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!
6) Use your approved topic.
7) Use your approved outline.
8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
9) Arial 11 or 12-point font or Times New Roman styles.
10) Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations
11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!
I attached an outline of what to write about.
forming effective searching
Directions
As outlined in the lecture, there are various types of strategies and tools that students can use to develop search phrases to find exactly what they need without mining through hundreds of results.
In this assignment, you will develop a search phrase to best locate the information posed in the prompt. Then, using at least 50 words for each search scenario, explain why you picked this approach. Finally, perform the search in question and evaluate the results. In at least 50 words, explain if your search results were what you expected and why or why not this was the case.
Example: You want to find information on the President Teddy Roosevelt.
Search Phrase developed: “Teddy Roosevelt” president
Strategy: I chose this strategy because using quotation marks around the name Teddy Roosevelt will ensure that both pieces of the name are searched for together. When quotation marks aren’t used, results showing the first name and the second name will all show up, which will populate many results unrelated to Teddy Roosevelt such as Franklin D. Roosevelt.
Search Results:
Wikipedia:https://en.wikipedia.org/wiki/Theodore_Roosevelt#:~:text=Theodore%20Roosevelt%20Jr.%20(%2F%CB%88,States%20from%201901%20to%201909.
History: https://www.history.com/topics/us-presidents/theodore-roosevelt
History: https://www.history.com/news/teddy-roosevelt-legacies
Analysis: Yes, these search results were what I expected to see based on my search. The results reflected my usage of the quotation marks as sites that discussed Teddy Roosevelt’s role as president were returned first. All of the sites included both Teddy Roosevelt’s name as well as the word president.
1, You want to find information on Buffalo, NY but not anything related to the Buffalo Bills football team.
⦁ Develop and document a search phrase that you would use in a search engine to find this information.
⦁ Explain why you chose this strategy using at least 50 words.
⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.
2, You want to find information on recipes for stuffed peppers that do not include rice.
⦁ Develop and document a search phrase that you would use in a search engine to find this information.
⦁ Explain why you chose this strategy using at least 50 words.
⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.
3, You want to find videos about astronomy only on YouTube.
⦁ Develop and document a search phrase that you would use in a search engine to find this information.
⦁ Explain why you chose this strategy using at least 50 words.
⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.
4, You want to combine the search for both woodworking and welding.
⦁ Develop and document a search phrase that you would use in a search engine to find this information.
⦁ Explain why you chose this strategy using at least 50 words.
⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 25 words.
5. You want to find information related only to gestational diabetes.
⦁ Develop and document a search phrase that you would use in a search engine to find this information.
⦁ Explain why you chose this strategy using at least 50 words.
⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.
Analysis of Algorithms
1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).
b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course).
2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for
a. lists represented as arrays.
b. lists represented as linked lists.
3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop
b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue
Termpaper on Rockwell Automation – Factory Talk (SCADA)
Term Paper Requirements
REQUIREMENTS AND GRADING
Each student will be required to write their own research paper – no teaming, partnering, or study group papers are permitted. This is an individual assignment and copying or plagiarizing will not be tolerated and will be subject to University disciplinary action up to and including a failing grade for this course.
The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs.
The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.
All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:
- No more than two (2) citations shall be from Wikipedia
- At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
- At least two (2) references from vendor web (html) or printed (pdf) material
- At least two (2) references shall be from independent sources including but not limited to
- News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
- Industry Publications (e.g. Automation, ISSSource, Control)
- Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
- Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.
A template has been provided meeting these requirements.
A list of 11 different vendors and systems have been offered. Selection begins on October 6, 2020 (Week 7) and is expected to be completed by November 17, 2020 (Week 13). You are free to change your selection until the cut-off date. No more than three (3) students can choose the same vendor and system topic, so all selections may not be available at any given time. Failure to complete the selection process early could reduce the number of choices available and not provide sufficient time to complete the term paper and associated presentation.
You will also be required to prepare a short PowerPoint presentation summarizing your paper suitable for presentation. This presentation is expected to have no more than one (1) slide summarizing each of the subject areas aligning with the paper and should be limited to 15 minutes. A PowerPoint template has been prepared and is available for download.
Your paper must be submitted by 7:00pm (end of class) on Tuesday, November 24, 2020 (Week 14), and your presentation must be submitted by 8:00am on Tuesday, December 1, 2020 (Week 15). Eight (8) students will be randomly selected to present their presentation via Zoom Meeting during class time on Tuesday, December 1, 2020. Drawing will occur on December 1, and students will be notified by 10:00am.
The term research paper and associated presentation comprise 20% of your overall course grade and will be assigned a numerical percentage grade based on the following scale:
A = 90% – 100%
B = 80% – 89%
C = 70% – 79%
D = 60% – 69%
F = 59% or less
Grading for term research paper and associated presentation will be based on the following metrics:
20% = Ideas and Analysis
20% = Organization
20% = Development and Support
10% = Style
20% = Mechanics
10% = Presentation
Spelling and grammatical correctness will be used as marking against Mechanics. Use of current review editors such as those included with Microsoft Word are strongly encouraged.
CONTENTS AND STRUCTURE
The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the following areas. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure. The section titles (paper) and slide titles (presentation) in the templates are for reference only.
Your paper and presentation shall address and develop each of the following items:
- System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
- Communication protocols used by the system
- Industry sectors that use the system
- Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
- Potential or actual impact of the vulnerabilities discovered to the industry sectors served
- Cyber security measures taken by the vendor to secure the system
- Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)