20
Computer Science Week 6 assignment
Instructions
Week 6 Assignment:
In order to complete assignment #6 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #6). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
(Question Below)
Discuss the impact of SQL injections.
Test
Review the below table. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria. She wants to live in an area with lower crime but wants to know a few things:
- Is it more expensive or less expensive to live in FL or NY?
- Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
- Is the crime rate higher in lower or higher house price areas?
Using the R tool, show the data in the tool to answer each of the questions. Also, show the data visualization to go along with the summary.
- If you were Suzie, where would you move based on the questions above?
- After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
- She has $100,000 to put down for the house.
- If she moves to NY she will have a job earning $120,000 per year.
- If she moves to FL she will have a job earning $75,000 per year.
- She wants to know the following:
- On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
- Where should she move and why? Please show graphics and thoroughly explain your answer here based on the new information provided above.
- tableLocationPriceCrime RatingNY225,2508NY3155425NY4502652NY7502501NY5546682NY3221244NY4112582NY3554124NY4662512NY7012511NY2413154NY3452155NY1985629NY1887528NY7412452NY6423153NY4235612NY5214461NY2456858NY2455434FL1203215FL1520154FL2145216FL2352134FL2635312FL2589644FL3256452FL3256411FL3245122FL2451205FL2457844FL2651245FL3521562FL3595213FL3985411FL4012131FL4023151FL2560125FL3140212FL1596328FL2013216FL2042015FL2052364FL2072056FL2062014FL1982655Note: The screenshots should be copied and pasted and must be legible. Only upload the word document. Be sure to answer all of the questions above and number the answers. Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work.
The programmer will write the ExpressionSolverRunner that will use the ExpressionSolver class to solve an integer expression provided by the ExpressionSolver
The programmer will write the ExpressionSolverRunner that will use the ExpressionSolver class to solve an integer expression provided by the ExpressionSolver textfile. An expression will a String and it will be comprised of number and the mathematical operators +, *, /, and -. The % operation will not be a part of this program. In order to read an expression, the user must read the expression from left to right performing the multiplication and division operators before attempting the subtraction arguments. The programmer should be careful to follow the order of operations, or they will not get the correct answer. The calculation is integer mathematics, so there will be no rounding but just truncation. The programmer should take particular care when a multiplication and a division or next to each other and make sure to do the operations from left to right. There will be no parenthesis in the expression.
Discussion 250 -300 words
Discussion Question:
What types of works are exempt from copyright protection? Give specific examples of websites that have content that are not protected by copyright law.
Project 4
Complete your Project Paper. Ensure that it conforms to APA requirements. RUN SPELL CHECK AND GRAMMAR CHECK BEFORE SUBMITTING!
Based on your draft paper, prepare the final version of your paper. Remember, your paper must address the following points:
- Describe the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
- Discuss how group and organizational dynamics may affect the success of your information assurance change initiative.
- Evaluate the leadership style needed to successfully implement your information assurance change initiative.
- Describe your change strategy and the potential resistance factors to be managed.
- Describe the change model most appropriate for your information assurance change initiative.
5G Support for autonomous vehicles
The term paper it should be of professional quality and be in the format of an IEEE transaction style. Figures must be clear and drawn by you. Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:
1. Title page.
2. Abstract (summary of the paper).
3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).
4. (i) Description of existing algorithms/protocols for survey papers; (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.
5. (i) Comparison among existing algorithms/protocols and discussion on possible
improvements/enhancements; (ii) project results (derivation, proof, justification, or detailed
design/simulation) in one or more numbered sections for research-oriented papers.
6. Conclusions (evaluation of results, suggestions for improvements, or future work).
7. References must follow IEEE Transactions format (at least 10 references). Proper citation of
references must be embedded in the term paper.
Note: Please follow the above-mentioned guidelines and prepare my term paper accordingly. Also, I’m attaching my mid-term report.
Cybersecurity
WK 10 discussion – Analyze a Phishing email
Activity 10.2: Analyze a Phishing Email*You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.Part 1: Manually analyze an email headerOnce you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.Review the headers and identify what clues you can find. Report on;a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,d) What would you do to identify future phishing emails based on the header information?
Part 2: Analyze the email contentNow that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email. Report on;
- Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
- Is the link or domain a known-bad link?
Part 3: Use an automated tool Use one or more automated email header analyzers to review the header from part 1. Report on if you identify additional useful data and what that data is. (Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)ConclusionWrite a one paragraph conclusion on what you learned