Week 7

 

Details of the Project:

  1. Research and prepare a report on your selected (selection made in Week 2) current trend in the area of IT Security.
  2. Prepare a 4-6 page paper in Microsoft Word using approved APA format. (1,000 word minimum)
  3. The minimum page count cannot not include your Title page and Reference list.
  4. Include a Title page, Reference list, introduction and concluding statement.
  5. Include a detailed description of the topic.
  6. Include information on technologies involved in your selected area of research.
  7. Include information on future trends indicated in your selected area of research.
  8. References (minimum 5 peer reviewed sources)
  9. 1″ Margins (top/bottom/sides).
  10. Times New Roman or Arial font, in size 12.
  11. Correct spelling and grammar.
  12. APA formatting: Title page, in paragraph citations, and the Reference list.

At a minimum include the following:

– Detailed description of the topic
– Technologies involved
– Future trends
– References (minimum of 5)

Final Paper on Securing Social Network Data from Privacy Threats

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template

My final research question : What have researchers learned about how best to secure social network data from privacy threats?

1 Objective summary for the article below 

Reference

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2021). Secure military social networking andrapid sensemaking in domain specific concept systems: Research issues and future solutions. Future Internet, 4(1), 253-264. https://doi.og/10.3390/fi4010253

2.Literature Review 

Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 

Compare and contrast articles – Form to fill out

  Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)

Put them in an order that makes sense given how you compared and contrasted them.

Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)

compare and contrast words.

Submit BOTH assignments here.

3. Complete Literature review 

Assignment Content

Put it all together in 1, 2, 3 order! Write your Literature review!

Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

Submit the marked-up checklist and your literature review here, with a title and references page.

4. Discussion 3 paragraphs 

Your hard work has paid off (!!!), You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

The attached file

  

1) The attached file (attendance.txt) is a list of email addresses you collected for a conference your company hosted. Create a program that will parse each email address by its name and company. (Note: email parser object is attached). The company should be sorted in the first column and the person’s name associated with the company should be sorted in the second column; separated with tab character. (first sort is by company; secondary sort is by firstname.lastname). Sample output is listed below:

amzn bob.freed

amzn caitlin.thomas

amzn edward.flak

amzn jill.bennet

amzn mike.reade

fb chris.booker

fb fred.smith

fb jane.bland

fb megan.hill

goog gary.teafer

goog john.kohl

goog larry.page

goog phil.heal

goog zara.war

msft alan.gret

msft darlene.neddle

msft don.shaffer

msft ken.smith

msft sue.flemming

orcl  heidi.opal

orcl  john.voy

orcl  larry.lee

orcl  mark.lite

2) Create a histogram on the number of attendees per company for the conference. (can be in same program as #1)

3) Check if bill.gates attended the conference.Output that Bill Gates attended conference. (can be in same program as #1)

4) Create an output text file for the output above so that it can be imported in Excel for further analysis. One method of code to write text to an output file: (can be in same program as #1)

String text = “my textrn”;

BufferedWriter output = null;

try {

File file = new File(“example.txt”);

output = new BufferedWriter(new FileWriter(file));

output.write(text);

} catch ( IOException e ) {

e.printStackTrace();

} finally {

if ( output != null ) {

output.close(); // need to close file to write to a file

}

}

  

Assignment #4:

1)  Write a program(main() method) that reads an arbitrary number of integers that are in the range of 0 to 50 inclusive and counts how many occurrences of each are entered.  After all inputs have been processed, print only the values that have an occurrence of greater than zero.  Also, print the number of occurrences next to the value. [use arrays and indexing ]
        e.g.
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 3
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: -1
        Output:
        The value of 2 has 2 occurrences.
        The value of 3 has 1 occurrences.
        The value of 10 has 3 occurrences.
        The value of 30 has 2 occurrences.
2)  Write a program (main() method) that reads, from the terminal (screen), sequence of names and postal (ZIP) codes for individuals.  Store the data in an object designed to store a first name (String), last name (String), and postal code (int).  Assume each line of input will contain two strings followed by an integer value, each separated by a tab character.  Users will type “quit” when they have completed input entry.  Print the output of the input values by the user to the screen.
[use ArrayList to store object]
[Note:
1)  create an object that will store the first name (String), last name (String), postal code (int)
2)  use ArrayList to store object]
C:Enter Input {first_namelast_namezip_code}:
Bill     Smith   10002
Enter Input {first_namelast_namezip_code}:
Jane     Dome    11354
Enter Input {first_namelast_namezip_code}:
3)  Revise #2 problem to read a list of inputs from a file.  The input file will contain two strings followed by an integer.
Input file:
Bill     Smith   10002
Jill     Ryan    11120
Robert   Johnson 11122
.
.

The purpose of this project is to provide

The purpose of this project is to provide you with practice using conditional statements, loops, and functions. Your task is to write a program that allows a user to display a simple graphic shape using text symbols. Five basic shapes are allowed: V-shape, Hat-shape, X-shape, Right-Arrow-shape, and the Left-Arrow-shape. The shapes are defined as follows:

Type Parameters Limitations Sample Input Sample

Output

V-shape Number of rows

(n)

0 < n < 30 V 4 * *

* *

* *

*

Hat-shape Number of rows

(n)

0 < n < 30 H 4 *

* *

* *

* *

X-shape Number of rows

(n)

0 < n < 30

and

n is odd

X 5 * *

* *

*

* *

* *

Rightarrowshape

Number of rows

(n)

0 < n < 30

and

n is odd

R 5 *

**

***

**

*

Left-arrowshape

Number of rows

(n)

0 < n < 30

and

n is odd

L 5 *

**

***

**

*

Your project should provide an interactive menu system that allows a user to select the type of object to display.

The following menu items must be provided: V, H, X, R, L, and Q. The meanings of these items are:

V – V shape

H – Hat shape

X – X shape

R – Right arrow shape

L – left arrow shape

Q — quit.

The letter indicates which shape to display and will always be followed by a space and an integer value

representing size of the shape. Valid input can be uppercase as well as lowercase characters. All other letters

entered as command inputs are considered invalid. Provide a mechanism to allow a user to recover from an error.

For example, if the user enters a Z, do not terminate the program. Inform the user that an error has occurred,

display an error message, and discard the erroneous information i.e. if an incorrect command is detected, make

sure to flush the input buffer using cin.ignore(80,’n’).

A valid shape command code will always be followed by an integer valued size. The value provided may not be

acceptable based on the limitations outlined in the table. If you detect an invalid size, display a meaningful error

message, reject the command, and allow the user to enter a new command.

Program Design:

To solve this program, you need to decompose the problem into manageable pieces. Fortunately, the program

naturally breaks into functional units based on the different shapes. Design your solution so that your main

program calls functions to complete the various tasks. For example there should be functions to display each

shape, and there should one or more functions to get a valid command code.

Response to Siobhan

In my prior profession, I was in banking. I worked in Commercial Lending and we used Excel for a lot of different things including customer lists, financial planning, budgeting, etc. I worked with one guy who was a total whiz at Excel and he used to formulate so many different documents for us. 

The information from the cheat sheet is very helpful. I think the decipher error values in Excel 2016 formulas would’ve been really helpful to me in the past. I always received “error values” when using an Excel worksheet that was already programmed by someone at my job. “You can tell right away that an Excel 2016 formula has gone haywire because instead of a nice calculated value, you get a strange, incomprehensible message. This weirdness, in the parlance of Excel 2016 spreadsheets, is an error value. Its purpose is to let you know that some element — either in the formula itself or in a cell referred to by the formula — is preventing Excel from returning the anticipated calculated value” (Excel 2016 For Dummies Cheat Sheet, n.d.). The top features section was good information to know as well. It’s been a few years since I’ve used Excel and this information is good to have. I’ll definitely be saving this cheat sheet and sharing it with my husband as he used Excel daily in his line of work. 

Reference:

Excel 2016 For Dummies Cheat Sheet. (n.d.). Retrieved April 17, 2019, from http://www.dummies.com/software/microsoft-office/excel/excel-2016-for-dummies-cheat-sheet/