Question 11

  

This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:

1. What other topics would you have liked to have covered in this course?

2. What reading did you find most interesting and why?

3. How has this course changed your perspective or outlook moving forward?

4. Any other topic of interest that you would like to add.

reaction screening- animation

Link to video to react to: https://www.nfb.ca/film/ryan/

Consider and explain how animation creates meaning in this piece. The use of 3-D animation expresses a specific aspect of this narrative that isn’t told through words. Also consider color and texture in this context

Most of the animation takes place in a mirrored space (you will notice this if you pay attention to the backgrounds). Why do you think this is? How does this formal choice create meaning?

3 pages please double spaced

Malware Lab

Part 3: Analyzing Malicious Windows Programs (Lab 7.1 from PMA)

Complete all the steps mentioned in the below attached document for part 3 of this project:

Project part 3_ Analyzing Malicious Windows Programs.pdf

Part 4: Analyzing Code Constructs in Malware (Lab 6.1 from PMA)

Part 4 of this project is based on Lab 6-1 in “Practical Malware Analysis” textbook chapter 6.

Based on the knowledge gained in all previous lab assignments, you will have to complete lab 6-1

individually (with minimal or no supervision) by following the instructions given in Lab 6-1 in the

textbook. There are more detailed solutions in the back of the book.

1. Open and analyze the malware found in the file Lab06-01.exe using IDA Pro.

2. Answer all the questions (Q1 to Q3) found in Lab 6-1 in your own words.

3. List all the steps you followed in setting up the software environment and the screenshots captured

while analyzing the malware in IDA Pro (Hint: The steps that you list for Lab 6-1 should be something

similar to the steps that were given to you in all previous lab assignment instructions).

Submission Requirements for all four parts of the project:

Format: Microsoft Word

Font: Arial, 12-Point, Double-Space

Citation Style: APA

Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum

of 6 pages (excluding title page and bibliography).

Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0

Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0

Exp19 Access Ch01 CapAssessment Latte Delights Inventory 1.0

EX19_AC_CH01_GRADER_CAP_AS

Project Description:

In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters.

Steps to Perform:

Step

Instructions

Points    Possible

1

Start   Access. Open the downloaded Access file named Exp19_Access_Ch01_CapAssessment_Latte_Delights_Inventory.accdb.   Grader has automatically added your last name to the beginning of the   filename.

0

2

Add the following records to the Sales Reps table,   letting Access assign the SalesRepID:

LastName

FirstName

Address

City

State

ZIP

Eissler

Karean

13 Oak Lane

Montgomery

PA

17752

Rai

Namrata

1000 Ogden Blvd

New Castle

DE

19720

Pellum

Katryn

286 Bergen Rd

Salford

PA

18957

  Close the table.

16

3

Open   the Customers form in Form view. Use Search to locate the record for Baker Auto   Supply. Modify   the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form.

12

4

Open the Products form in Form view. Add a new   product (Access will automatically add the Product ID): Coffee-Arabica   Premium. The   Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the   Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form.

12

5

Open   the Products report and check that the report contains the new product P0026,   Coffee-Arabica Premium. View the layout of the report in Print Preview and   then change the page layout to Landscape. Save the report and close Print   Preview.

12

6

Open the Customers table. Sort the table by   Customer Name in ascending order. Save the changes and close the table.

12

7

Open   the Revenue Stats query and sort the City field in ascending order. Apply   Filter by Selection so that only stats for the last name Pellum display. Save and close the filtered query.

16

8

Open the Products table. Use Filter by Form to   create a filter that will identify all premium brands in the Brand field that   were introduced after 2017. Apply the filter and preview the filtered table. Close the   table and save the changes.

20

9

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

0

Total   Points

100

If-else statement and loop

4 parts of the assignment:

Part 1: Check out the lecture notes and read chapter 6 of the text book before attempting these problems (see attachment)

1) Write a program that prompts the user for a number, tests to see whether that number is even or odd and prints out “Number is Even” if it is even, or “Number is Odd” if it is odd.

Hint: An even number is one that is dividable by 2 and has no remainder! Look up the % operator.

Part 2: 2) Write a program that stores your name in a variable. Then ask the user to guess your name. If heshe guesses right, display the message “Well done, good guess work!”, otherwise display the message “Try again next time!” and just exit the program at that point (we’ll see how to loop, i.e. keep on asking the user for names till heshe gets the right one, next week!).

Part 3: Modify the question above so that you keep on asking the user for names till heshe gets it right! So heshe has to guess your name right BEFORE you exit the program. Use a while loop.

Part 4:Write a program that asks the user for 5 numbers, using a for loop and one input function call inside that for loop. Sum the numbers as you are getting them from the user, then display the sum and average to the user at the end.

Clojure Programming Assignment

1. (5 points) In Clojure, implement Quicksort. Do so in a function called quicksort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (quicksort [2 6 1 9 1]) returns (1 1 2 6 9). 

2. (5 points) In Clojure, implement Mergesort. Do so in a function called mergesort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (mergesort [2 6 1 9 1]) returns (1 1 2 6 9). 

3. (5 points) Test the two functions to ensure they sort correctly. 

4. (5 points) Implement Quicksort and Mergesort in any other language and make sure they sort correctly. 5. (5 points) In both languages, time your quicksort and merge sort functions on a sorted list of 1,000,000 numbers. Time them on a reverse sorted list of 1,000,000 numbers. If 1,000,000 numbers are not enough to see a difference between the two algorithms, increase the input size. 

6. (15 points) Evaluate your results. Which program was faster on the sorted input? Was it also faster on the input that was in reverse sorted order? Is the result the same in both languages? Explain your results. Were the results as expected? Can you say anything about the languages used for sorting in terms of performance and ease of implementation? 

7. (Extra Credit 5 points) Compare the performance of your implementations in both languages with the performance of the built-in sort function in each language. Explain the result.

week-11

 

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.