Discussion

Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Please conduct the following activity located at the following address:

http://seeingdata.org/developing-visualisation-literacy/rate-these-visualisations/

Tell us what you think of the visualisations that we used in our focus group research. Instructions below!

What to do

  1. Look at the visualisations by clicking on the images below. You can choose to open the visualisation in a NEW tab or window (we recommend this) or view it in a pop-up window if you prefer to stay on this page. Some are interactive (i) and some are static (s).
  2. Place the images on the grid. When you’ve looked at one, go to the grid and position the image according to whether you liked or didn’t like and learned or didn’t learn something from the visualisation (‘learning something’ could also mean confirming something you already knew). Only place the visualisations that you have looked at onto the grid. Click SUBMIT.
  3. Compare your views with others. You can compare your responses to the visualisations with those of others, by clicking COMPARE.

Choose three of your favorite visualisations. Post a 3 – 5 sentence summary of why you chose the visualisations. What caught your attention? Were they effective in presenting the provided data? If possible, explain how you would you do to improve the visualization?

project week 6

we are in the  revision stage. draft has revisions written at the top that need to be made. 

I am going to be implementing this through cloud since i have to demonstrate the project. for page 27, the network design through viso it will need to be fixed to reflect a cloud system. basically just simple user router, cloud diagram. 

do not worry about the yellow and green grammatical errors. i fixed most and will finish the rest. week 5 also needs to be added in paragraph form to the white paper. week 6 also needs to be added to progress log. 

Web Development Timeline and/or Cycle COLLAPSE 1 page paragraph

 

Web Development Timeline and/or Cycle
COLLAPSE

No two websites are developed the same, but there are likely timelines and best practices. Phrases I would focus on would be customer-focussed, user-focussed, internal communication, and external communication.

This is NOT you casually talking about topics. 

You should be REPORTING EVIDENCE and EXAMPLES from what you read.

  1. Identify the topic for this week. The title of this discussion board thread lists topics 
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

EH week11 DB

 

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided. Words 350.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

File based database implementation in java

 

Objective

You are to implement a simple database using a sorted file of fixed length records. The data that you are to use for testing is in file: Parks.csv Windows compatible (cr lf). This data contains the visitation records for the US National Parks from 1904 to 2016.. The goal of this assignment is to understand and practice using file management techniques to implement a database system. Your file-based database needs to handle overflow by writing records to an overflow file that contains unsorted records.

First, create a file of fixed length records from the data provided interleaved with blank records. Your file should create space for insertions by writing one blank record between each real record. Meta-information should be stored in a non-fixed length way in a separate configuration file, e.g., “Parks.config”. The config file must also store useful data like the names of the fields (for display), the number of records, and anything else you would want to add.

So, the initial file will have 764 records, half of which are blank. When a record is inserted, the file is searched (using binary search) to find the correct location. If there is a blank record where the new record needs to go, then the blank record is simply overwritten. However, if there is no empty record available in the correct location, the original file should be re-written with new blanks inserted, including after the new record. For example, if we do 3 inserts into blank records, we would now have 385 real records in our file of 764 total records. If the next insert fails, we would create a new file with 770 total records in it (the 385 real records, each with one blank record after it).

You must not read the whole data file into memory at a time

Program Description

Create a program which offers the user the following menu of operations:

1) Create new database
2) Open database
3) Close database
4) Display record
5) Update record
6) Create report
7) Add record
8) Delete record
9) Quit

Why do we need an automated tool for sql injection?

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end.