Capture the Flag (CTF) Solution Presentation

 Your PowerPoint should contain 10-15 slides. You can use Microsoft Teams to record the audio narration of your PowerPoint presentation (preferred). You can then share the Microsoft Teams recording link with your teammates, instructor, and the entire class in the week 8 discussion. You could also add this Microsoft Teams recording link to your resume as a portfolio item.Please cover the following topics in this presentation:

  • The CTF category
  • Problem solved
  • Steps used to solve
  • The solution
  • Strategies, pitfalls, lessons learned
  • Workplace relevance

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_Cap_Farm.accdb. Grader has automatically added your last name to the   beginning of the filename. Save the file to the location where you are   storing your files.

Create   a form using the Form tool based on the Presenters table. Change the title in   the Form Header to Enter/Edit Presenters.

Reduce   the field value control widths to approximately half their original size (to   approximately 3.6″). Delete   the subform.

Sort   the records by LastName in   ascending order. Save the form as Edit Presenters.   Close the form.

Open   the Location Information form in Layout view. Apply the Stacked Layout   control to the form. Save and close the form.

Create   a new report based on the Exhibits   with Presenters query using the Report Wizard. Select all available   fields, choose to view the data by Presenters, ensure that FirstName,   LastName is the only grouping level, use Date as the primary sort field in   ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule.

Apply   the Integral theme to this report only. Save the report.

Modify   the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last   field (appearing to the right of LocationID). In Design view, ensure that the   left edge of the field is at the 8.5-inch mark on the ruler, and then return   to Layout view.

Change   the title of the Presenter Schedule report to Schedule by   Presenter.

Change   the sort so the StartingTime is a   secondary sort field (that is, so that the first sort is Date, and the second   sort is StartingTime). Save and close the report.

Create a new labels report based on the Presenters table. Use the Avery USA 8660   label template. Accept the default font options, and set the labels up so the first and last name appear on the top line, the Address on the second line,   and the City, State, and ZipCode appear on the final line. Your first label   should look like this:
 

Shannon Beck
368 Graham Avenue
Graham, KY 42344
 

  Do not add any sorting. Name the report Presenter Mailing   Labels.   Close the labels.

Discussion 3- Strategy applied in Project Mngt

Chapter. 5 Estimating Project Times and Costs

Chapter. 6 Developing a Project Plan

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Why is it difficult to estimate mega project (i.e., costs and benefits (i.e. airports, stadiums, etc.) costs and benefits?
  2. Define what a “white elephant” is in project management? Provide a real life example.
  3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS?

Text-

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

Need detailed Paper on the Following Topic….format should be in IEEE Format

Topic:  Combined Wireless Network Intrusion Detection Model Based on Deep Learning 

Instructions:

The term paper it should be of professional quality and be in the format of an IEEE transaction style. 

Figures must be clear and drawn by you. 

Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:

1. Title page.

2. Abstract (summary of the paper).

3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).

4. (i) Description of existing algorithms/protocols for survey papers; 

   (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.

5. (i)   Comparison   among   existing   algorithms/protocols   and   discussion   on   possible improvements/enhancements; 

  (ii) project results (derivation, proof, justification, or detailed

design/simulation) in one or more numbered sections for research-oriented papers.

6. Conclusions (evaluation of results, suggestions for improvements, or future work).

7. References must follow IEEE Transactions format (at least 10 references). Proper citation of

references must be embedded in the term paper.

8) please have some diagrams as well…

One of the example is attached for reference….

Apply: Select a Business Scenario

 

Assignment Content

  1. All projects begin by answering one of two questions:
    • How can I make business scenario ABC better or more efficient?
    • What business scenario can I automate to benefit organization XYZ?
    • For this assignment, select a business scenario you would like to develop into a project over the next five weeks. You have two options:
    • You may select one of the two business scenarios described in Select a Business Scenario.
    • You may select a business scenario of your choosing. This can be a scenario from your workplace; for example, a frustrating process you have been eager to rework or a potential process you have been thinking of that does not exist yet but that you think would be valuable to your organization if it were developed into an IT project.
    • Note: If you decide to select a business scenario of your choosing, you must obtain approval from your instructor for your scenario before beginning the project proposal assignment, which is also due this week.

      Download Select a Business Scenario and read through the options.

      You can to do the following:
      1) Download the Select a Business Scenario document and read through the options
      2) Do not delete any of the options or anything at all from the downloaded document
      3) Type your selection (Scenario A, Scenario B, or Scenario C) directly into the Select a Business Scenario document (on the space provided next to each scenario) . Please see the example PDF document below.
      4) Save and then submit the document
      Select a Business Scenario Example screenshot.pdf
       

Agile Methodology

 

Agile Methodology

Overview

In this assignment you focus on the process methodology of Section 5, Standards and Procedures of your software development plan (SDP)—choosing, diagramming, explaining and finally applying your choice of Agile development methodology to CapraTek. The choices that you make here drive the rest of the SDP, so it is an appropriate starting point.

Preparation

Use the assignment Resources to complete the following:

  • View the CapraTek scenario in the CapraTek Overview document.
  • Download the Software Development Plan Template. Save it as “CapraTek_SDP_u1” and use it to complete and submit your assignments for this course.

Directions 

Consider the CapraTek scenario and address the items below in Section 5 of the CapraTek SDP document.

  • Select an Agile methodology and briefly justify why your chosen Agile methodology is appropriate for CapraTek.
  • Create a Unified Modeling Language (UML) activity diagram that illustrates the process methodology life cycle.
  • Describe each of the phases depicted in the process methodology diagram with relation to the software development process. Keep your descriptions generic—the point is to explain the processes involved in each phase to illustrate the concept.
    • Partial Example: Scrum initial requirements steps: “During the initial requirements steps, the product owner examines the product backlog and gets feedback from the customer and other stakeholders. The product owner then informs the development team of the items from the product backlog . . .”
  • Select two of the phases and describe how each would manifest itself in the context of CapraTek. Consider CapraTek’s requirements, resources, time constraints, et cetera. 

Save and submit your SDP.

Datebase HW Week 6

 3.44 What is a referential integrity constraint? Define the term, and give an example of its use. Are null values allowed in foreign key columns with a referential integrity constraint? How does the referential integrity constraint contribute to database integrity? 

3.45 Explain the role of referential integrity constraints in normalization. 

3.46 Do relations StudID_SocialSecurityNumber and SocialSecurityNumber_StudName contain a transitive dependency? 

3.47 In normalization example 3, why is the EXTENDED_PRICE relation “silly”? 

3.48 In normalization example 4, under what conditions is the functional dependency (StudentID, Activity) S ActivityFee more accurate than Activity S ActivityFee 

3.49 If a determinant is part of a candidate key, is that good enough for BCNF? 

 3.50 In normalization example 5, why are the following two tables not correct? DEPARTMENT (Department, DeptBudgetCode, Buyer) SKU_DATA_4 (SKU, SKU_Description, Department) 

3.51 How does a multivalued dependency differ from a functional dependency? 

3.52 Consider the relation: PERSON (Name, Sibling, ShoeSize) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Describe deletion, modification, and insertion anomalies for this relation. 

3.53 Why is BCNF referred to as the best of the forms? 

3.54 Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Name S S Hobby Describe deletion, modification, and insertion anomalies for this relation. 

3.55 What must we know in order to find functional dependencies in a table? 

3.56 What is a multivalued dependency? 

3.57 How do the conditions for DK/NF correspond to the conditions for BCNF 

chapter 3

 There are hundreds of database types and numerous database classes (relational, graph, NoSQL, flat file, etc.). Why do you believe technology firms keep on re-inventing the wheel and coming up with a new medium for data management (virtually every day). Please cite at least three examples and elaborate with business use cases.  

DQ

Q1:

We live in a society where there are many forms of presence. Most recently, we have had to resort to telepresence and virtual presence. What do you feel are social and emotional interaction dynamic consequence for users when they are limited in their abilities express themselves at a distance. Use scholarly research sources to justify your responses.