MySql and Database

Show the results (using screenshots) of executing each SQL statement against the database you created. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

Journal Analysis

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format and only use journal articles

word document edit

 

  1. Open the StudentSuccess-03.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Review and delete selected comments and tracked changes.
    1. Change the Display for Review view to All Markup.
    2. Read the comment at top of the document and then delete the comment.
    3. Find the first tracked change in the document (left, right, and top margin changed) and Reject Format Change.
    4. Review the changes in the document and then Accept All Changes and Stop Tracking.
  4. Apply styles to the title and headings.
    1. Apply the Title style to the title on the first page.
    2. Apply the Heading 1 style to all the bold headings
    3. Apply the Heading 2 style to all the underlined headings.
  5. Insert footnotes and apply text formatting.
    1. On the first page, insert a footnote after “Weekly Schedules” in the “Schedule Your Time” section.
    2. Type Weekly Schedules are available from your counselor or in the college bookstore. as the footnote text.
    3. Insert a footnote at the end of “Be sure to schedule your time for all these in your 119 hours.” (after the period) in the “Schedule Your Time” section.
    4. Type Be sure to schedule recreational time in your 119 hours. as the footnote text.
  6. Move a footnote and modify footnote number format.
    1. Select the first footnote reference marker (in the body) and move it so it appears after “Weekly Schedule” in the “Track Your Time” section (use drag and drop or cut and paste).
    2. Deselect the moved footnote and change the footnote number format to a, b, c.
  7. Insert placeholders in the body of the document.
    1. In the “Introduction” section on the first page, insert a new placeholder named Navarro at the end of the body paragraph (and before the period).
    2. In the “Test Anxiety” section on the second page, insert a new placeholder named Sierra at the end of the body paragraph (and before the period).
    3. In the “Goal Setting” section on the fourth page, insert the Navarro placeholder (not a new placeholder) at the end of the intro paragraph (and before the period).
  8. Use the Source Manager dialog box to update placeholder reference information.
    1. Open the Source Manager and edit the Navarro placeholder to include the following information. Check the Show All Bibliography Fields box if necessary.
      Type of Source: Book
      Author: Tessa C. Navarro
      Title: Study Skills for College Students
      Year: 2018
      City: Chicago
      Publisher: McGraw-Hill
    2. Edit the Sierra placeholder to include the following information.
      Type of Source: Document from Web site
      Corporate Author: Sierra Pacific Community College District
      Name of Web Page: Tips for Student Success
      Name of Web Site: spccd.edu
      Year: 2019
      Year Accessed: 2020
      Month Accessed: February
      Day Accessed: 2
      URL: http://www.spccd.edu/tips4success.pdf
  9. Change bibliography style and insert a works cited page.
    1. Change the bibliography style to MLA.
    2. Place your insertion point on the blank line at the end of the document and insert a page break.
    3. Insert a Works Cited page.
  10. Insert a table of contents.
    1. Place your insertion point at the beginning of the document and insert a page break.
    2. Type Student Success Tips on the first line on the new first page (before the page break) and press Enter.
    3. On the blank line below “Student Success Tips,” insert the Automatic Table 1 table of contents.
    4. Apply the Title style to “Student Success Tips” on the new first page.
  11. Insert a footer and add custom content.
    1. Edit the footer on the first page of the document (table of contents).
    2. Check the Different Odd & Even Pages box. The insertion point displays in the odd page footer.
    3. Insert the Accent Bar 2 from the Page Number, Current Position drop-down list.
    4. Press Tab two times and insert the Document Title (or Title) document property field.
    5. Go to the even page footer and insert the Accent Bar 2 from the Page Number, Current Position drop-down list.
    6. Press Tab two times and insert the Company document property field.
    7. Change the font size to 10 pt and apply bold formatting to all footer content in both the even and odd page footers.
    8. Close the footer.
  12. Insert and customize a cover page.
    1. Insert the Slice (Light) cover page.
    2. Delete the Subtitle (“Document subtitle”) and Course (“Course title”) document property fields.
    3. Change the font size of the title on the cover page to 40 pt and apply bold formatting.
  13. Insert a page break before the “Physical Signs of Test Anxiety” heading.
  14. Update the entire table of contents and save your document.
  15. Save and close the document (Figure 3-132).
  16. Upload and save your project file.
  17. Submit project for grading.

Assignment

 

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples.

Why Is Enterprise Architecture Important for healthcare industry ?

final grad project : Ethical Hacking

 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Java Programming

 I have an assignment that is almost complete but there are some lines of code causing it not compile and I can’t get to any of the logic errors. I would like these fixed along with some explanation of what you did. You can put this is lines of comment and I can delete them later. 

The syntax errors I caught are as follows on the lines I see: Controller class: 167; Person class: 139, 143 (there was a third at the end but i got rid of an extra }) Several lines in the Controller class don’t have a syntax error but they probably are logic errors: 39, 42, 69, 74, 79, 82, 86, 108, 111, 127, 130, 150, 153, 159, 163. 

There could also be logic errors elsewhere. There may also be typographical errors as well because the professor has always had at least one. 

Analyze how advanced security concepts are applied to develop secure code

You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.

  1. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
    • What is the value of secure communications to the company?
    • Are there any international transactions that the company produces?
    • Are there governmental restrictions about secure communications to consider?
    • What external threats might be present now and in the immediate future?
    • What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
  2. Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.

*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.

  1. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
  2. Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
    1. The names or vulnerability codes of the known vulnerabilities
    2. A brief description and recommended solutions provided by the dependency check report
    3. Attribution (if any) that documents how this vulnerability has been identified or documented previously
  3. Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

*Please note: You do not need to fix these vulnerabilities in this project.

HackerView Vulnerability Assessment

 Prepare answers according to the questions given in this week’s homework document.  The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment”  I have attached a sample assignment as a guide and a pdf that need to be followed. 

I have to submit this assignment on 11/5 2020 at 11:00 pm EST