Internet Programming

 Internet Programming Term Project – Online Banking I. Introduction This project let you apply the programming skills you learned in Internet Programming class by developing an application for online banking using ASP.NET MVC Core with C# language. You will build a website which serves as an online service website, where one can register as a customer. Once registered, a customer can log in and log out the website. Customers can update their profile/personal information, review deposit/withdraw history, check balance, pay bills. Particularly, in the bill pay section, the customers can add/update payee information, pay one or more payees, and review payment history. Another role of the website is a teller. A teller can see the information of all the customers, can perform deposit/withdraw operation, can close customer accounts. II. Requirements 1. There are two roles in this website – customers and tellers. 2. A teller can see all customers’ information. 3. A teller can withdraw and deposit money for a customer. This is just a simulation of the operation that a teller performs at the bank counter when collecting and/or disseminate cash/check from a customer. 4. The website is free. Anyone can register as a customer. Upon registration, the customer information is collected and saved in the database; an id is assigned to the customer. 5. Registered customers can log in and log out the website. The only pages an unregistered person can access is the home page and registration page. 6. A customer can update his/her personal information on the website. 7. On the bill pay page, a customer can add new payee or update existing payee. One customer can have multiple payees. 8. A customer can pick one or multiple payees to pay. When payment is submitted, you only need to save the payment information in the database. A customer can review payment history which can be sorted and filtered by a date range. 9. You need to design a simple database. Three tables are required in the DB:  Customer –information of the registered customer  Payee — each customer can have a saved list of payees with all information necessary to send the payment  PaymentHistory – stores the payment history of all customers You can also add additional tables that you think are needed.  10. You will not only be graded by the correctness, but also by the quality of code. I expect your code to be clear and follow good programming practice. 11. When designing and building the website, keep security and user friendliness in mind! 12. You can work alone or in a team of 4 students maximum. 13. Bonus points will be given to projects with an additional role – manager. If you implemented this feature, make sure to describe it in your video demo and project report. Maximum 10 bonus points. III. Deliverables 1. Project Reports – You need to write a project report, where you need to:  Provide introduction of the project  Show screenshots of the pages you built  Explain how each page work, and how are the pages connected  What skills you learned from class are used in your project  If this is a teamwork, only one report is needed for the team. The report needs to have all team members’ names and clarify each team member’s contribution to the project. 2. Presentation – At the end of the semester, you will prepare a demo video using screen recording software such as “screen cast o matic”, “screencastify”, or zoom (meeting recording functionality). In the video, present your project by briefly going through the code structure and a demo of the website. 3. Code – Zip all the source code into one zip folder.  

Images

Excel 2019 In Practice – Ch 9 Independent Project 9-5

 These instructions are compatible with both Microsoft Windows and Mac operating systems.

At Placer Hills Real Estate, commission is split with other agencies based on price groups. You create a one-variable data table to display results for various split rates. Additionally, you create scenarios for selling price and commission and create a histogram about sales.

[Student Learning Outcomes 9.1, 9.3, 9.4, 9.6]

File Needed: PlacerHills-09.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-PlacerHills-09.xlsx

Skills Covered in This Project

  • Build a one-variable data table.
  • Use Solver.
  • Create and manage scenarios.
  • Create a histogram with a chart.
  1. Open the PlacerHills-09 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor
  2. Enable the content security warning.
  3. Review formulas.
    1. Select cell C14 on the Calculator worksheet. The total commission is calculated by multiplying the selling price by the commission rate.
    2. Select cell C15. The IFS function checks the selling price (C12) to determine the split percentage (column D) based on the price group.
    3. Select cell C16. The IFS function checks the selling price (C12) to determine the administrative fee percentage (column E) and multiplies that percentage by the value in cell C15 to calculate the fee in dollars.
    4. Select cell C17. The net commission is calculated by subtracting the fees from the PHRE amount.
  4. Build one-variable data tables.
    1. Select cell C20 and create a reference to cell C15.
    2. Select cell D20 and create a reference to cell C17. Both formulas depend on cell C12, the one variable.
    3. Use cell D8 as the column input for the data table (Figure 9-87). (You can use any percentage from column D because its value is replaced by the proposed rates in column B in the data table.)ImagesFigure 9-87 Data table setup for commission rates
    4. Decrease the decimal two times for all values in the data table.
  5. Name cell ranges.
    1. Click the Price Solver worksheet tab.
    2. Click cell C12 and name the range Selling_Price. You cannot use spaces in a range name.
    3. Name cell C14 as Total_Commission and cell C17 as PHRE_Commission.
  6. Install the Solver Add-in and the Analysis ToolPak.
  7. Use Solver to find target PHRE net commission amounts.
    1. Build a Solver problem with cell C17 as the objective cell. For the first solution, set the objective to a value of 50000 by changing cell C12. Use the GRG Nonlinear solving method. Save the results as a scenario named $50,000.
    2. Restore the original values and run another Solver problem to find a selling price for a PHRE commission of 75000. Save these results as a scenario named $75,000.
    3. Restore the original values and run a third Solver problem to find a selling price for a net commission of $100,000. Save these results as a scenario and restore the original values.
  8. Manage scenarios.
    1. Show the $50,000 scenario in the worksheet.
    2. Create a Scenario summary report for cells C12, C14, and C17.
  9. Create a histogram for recent sales.
    1. Click the Sales Forecast sheet tab and select cell G13.
    2. Create a bin range of 10 values starting at 350,000 with intervals of 50,000, ending at 800,000 in cell G22.
    3. Use the Analysis ToolPak to create a histogram for cells E5:E26. Do not check the Labels box and select the bin range in your worksheet.
    4. Select cell H3 for the Output Range and include a chart.
    5. Position and size the chart from cell K3 to cell V19.
    6. Edit the horizontal axis title to display Selling Price and edit the vertical axis title to Number of Sales.
    7. Edit the chart title to display Sales by Price Group.
    8. Select and delete the legend.
    9. Delete cells G13:G22 (Figure 9-88).ImagesFigure 9-88 Histogram and chart for sales data
  10. Save and close the workbook (Figure 9-89).
  11. Upload and save your project file.
  12. Submit project for grading.

Foundations of Cybersecurity-SP21

 

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 

Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.

To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  

CC W 15 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Cloud Computing

Topic :Cloud computing infrastructure and cloud security 

In security research, there are three specific areas such as trusted computing, information-centric security, and privacy-preserving models.

Cloud Security protects the data from leakage, theft, disaster, and deletion. With the help of tokenization, VPNs, and firewalls, we can secure our data. Cloud Security is a vast topic and we can use it for more research. The number of organizations using cloud services is increasing. There are some security measures, which will help to implement the cloud security-

Accessibility

Integrity

Confidentiality

Topic: Cloud computing infrastructure and cloud security: 

Abstract:

Background of the problem

Outline of the problem

Research questions minimum three 

Literature review: 4 pages 

Methodology – 1 page

Conclusion

use APA 7th edition only for references

Discussion: Global Technology

Deadline: 5 hours

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

Books/Reference paper

Textbook, Chapter 1 & 2: Olsen, S., & National Academy of Engineering (U.S.). (2011). Global Technology : Changes and Implications: Summary of a Forum. Washington, D.C.: National Academies Press. (Included through library subscription)

Scherz, C., Hahn, J., & Ladikas, M. (2019). Technology Assessment in a Globalized World. Management Systems in Production Engineering, 27(3), 149.

technology assessment in a globalized world – Sciendo

https://content.sciendo.com › 27 › 3 › article-p149

Lynn, L., & Salzman, H. (2007). The Real Global Technology Challenge. Change, 39(4), 8. 

https://rucore.libraries.rutgers.edu/rutgers-lib/45958/PDF/1/play/

APA Format

https://academicwriter.apa.org/6/ 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.