Can someone do these problems please?
Question 11
This discussion topic is to be reflective of the course material. Therefore, use your own words to respond to the following questions:
1. What other topics would you have liked to have covered in this course?
2. What reading did you find most interesting and why?
3. How has this course changed your perspective or outlook moving forward?
4. Any other topic of interest that you would like to add.
reaction screening- animation
Link to video to react to: https://www.nfb.ca/film/ryan/
Consider and explain how animation creates meaning in this piece. The use of 3-D animation expresses a specific aspect of this narrative that isn’t told through words. Also consider color and texture in this context
Most of the animation takes place in a mirrored space (you will notice this if you pay attention to the backgrounds). Why do you think this is? How does this formal choice create meaning?
3 pages please double spaced
Microsoft PowerPoint Project Assignment.
Need you to adequately follow the RUBRIC guidelines in responding to this assignment. Thanks
Malware Lab
Part 3: Analyzing Malicious Windows Programs (Lab 7.1 from PMA)
Complete all the steps mentioned in the below attached document for part 3 of this project:
Project part 3_ Analyzing Malicious Windows Programs.pdf
Part 4: Analyzing Code Constructs in Malware (Lab 6.1 from PMA)
Part 4 of this project is based on Lab 6-1 in “Practical Malware Analysis” textbook chapter 6.
Based on the knowledge gained in all previous lab assignments, you will have to complete lab 6-1
individually (with minimal or no supervision) by following the instructions given in Lab 6-1 in the
textbook. There are more detailed solutions in the back of the book.
1. Open and analyze the malware found in the file Lab06-01.exe using IDA Pro.
2. Answer all the questions (Q1 to Q3) found in Lab 6-1 in your own words.
3. List all the steps you followed in setting up the software environment and the screenshots captured
while analyzing the malware in IDA Pro (Hint: The steps that you list for Lab 6-1 should be something
similar to the steps that were given to you in all previous lab assignment instructions).
Submission Requirements for all four parts of the project:
Format: Microsoft Word
Font: Arial, 12-Point, Double-Space
Citation Style: APA
Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum
of 6 pages (excluding title page and bibliography).
Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0
Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0
Exp19 Access Ch01 CapAssessment Latte Delights Inventory 1.0
EX19_AC_CH01_GRADER_CAP_AS
Project Description:
In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters.
Steps to Perform:
Step
Instructions
Points Possible
1
Start Access. Open the downloaded Access file named Exp19_Access_Ch01_CapAssessment_Latte_Delights_Inventory.accdb. Grader has automatically added your last name to the beginning of the filename.
0
2
Add the following records to the Sales Reps table, letting Access assign the SalesRepID:
LastName
FirstName
Address
City
State
ZIP
Eissler
Karean
13 Oak Lane
Montgomery
PA
17752
Rai
Namrata
1000 Ogden Blvd
New Castle
DE
19720
Pellum
Katryn
286 Bergen Rd
Salford
PA
18957
Close the table.
16
3
Open the Customers form in Form view. Use Search to locate the record for Baker Auto Supply. Modify the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form.
12
4
Open the Products form in Form view. Add a new product (Access will automatically add the Product ID): Coffee-Arabica Premium. The Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form.
12
5
Open the Products report and check that the report contains the new product P0026, Coffee-Arabica Premium. View the layout of the report in Print Preview and then change the page layout to Landscape. Save the report and close Print Preview.
12
6
Open the Customers table. Sort the table by Customer Name in ascending order. Save the changes and close the table.
12
7
Open the Revenue Stats query and sort the City field in ascending order. Apply Filter by Selection so that only stats for the last name Pellum display. Save and close the filtered query.
16
8
Open the Products table. Use Filter by Form to create a filter that will identify all premium brands in the Brand field that were introduced after 2017. Apply the filter and preview the filtered table. Close the table and save the changes.
20
9
Close all database objects. Close the database and then exit Access. Submit the database as directed.
0
Total Points
100
If-else statement and loop
4 parts of the assignment:
Part 1: Check out the lecture notes and read chapter 6 of the text book before attempting these problems (see attachment)
1) Write a program that prompts the user for a number, tests to see whether that number is even or odd and prints out “Number is Even” if it is even, or “Number is Odd” if it is odd.
Hint: An even number is one that is dividable by 2 and has no remainder! Look up the % operator.
Part 2: 2) Write a program that stores your name in a variable. Then ask the user to guess your name. If heshe guesses right, display the message “Well done, good guess work!”, otherwise display the message “Try again next time!” and just exit the program at that point (we’ll see how to loop, i.e. keep on asking the user for names till heshe gets the right one, next week!).
Part 3: Modify the question above so that you keep on asking the user for names till heshe gets it right! So heshe has to guess your name right BEFORE you exit the program. Use a while loop.
Part 4:Write a program that asks the user for 5 numbers, using a for loop and one input function call inside that for loop. Sum the numbers as you are getting them from the user, then display the sum and average to the user at the end.
Clojure Programming Assignment
1. (5 points) In Clojure, implement Quicksort. Do so in a function called quicksort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (quicksort [2 6 1 9 1]) returns (1 1 2 6 9).
2. (5 points) In Clojure, implement Mergesort. Do so in a function called mergesort with one argument, a vector of numbers. The function returns a sequence of sorted numbers. For example (mergesort [2 6 1 9 1]) returns (1 1 2 6 9).
3. (5 points) Test the two functions to ensure they sort correctly.
4. (5 points) Implement Quicksort and Mergesort in any other language and make sure they sort correctly. 5. (5 points) In both languages, time your quicksort and merge sort functions on a sorted list of 1,000,000 numbers. Time them on a reverse sorted list of 1,000,000 numbers. If 1,000,000 numbers are not enough to see a difference between the two algorithms, increase the input size.
6. (15 points) Evaluate your results. Which program was faster on the sorted input? Was it also faster on the input that was in reverse sorted order? Is the result the same in both languages? Explain your results. Were the results as expected? Can you say anything about the languages used for sorting in terms of performance and ease of implementation?
7. (Extra Credit 5 points) Compare the performance of your implementations in both languages with the performance of the built-in sort function in each language. Explain the result.
Computer Science assignment
Please follow the instruction as attached.
The file(s) that you need for doing this assignment are attached as well.
week-11
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.
Select one of these compromises and explain how it could be avoided.