Technology and Writing

 Choose three sentences from the essay by Leo Marx that struck you as important for our understanding of technology, and describe what they mean in relation to Marx’s argument and to your own understanding of technology in general and writing in particular. 

https://www-jstor-org.ezproxy.umgc.edu/stable/40927986?seq=1#metadata_info_tab_contents

Java

1>>The assignment will be assessed using the following criteria:

  • Does the submission include the file “SuperPower.java”?
  • Does the file include a public class called “SuperPower”?
  • Does the class include a public method called “main”?
  • Is the “main” method static?
  • Does the main method have a String assignment statement that uses “JOptionPane.showInputDialog”?
  • Does the main method have a statement that uses “JOptionPane.showMessageDialog”?
  • Does the program convert the String from “JOptionPane.showInputDialog” using the “toUpperCase” method?
  • Does the submission include a screenshot that shows an Input dialog that asks, “What is your superpower?”
  • Does the submission include a screenshot that shows a Message dialog stating “ TO THE RESCUE!”, where “” is the input converted to upper case?

2>>

The Learning Journal is a tool for self-reflection on the learning process. The Learning Journal will be assessed by your instructor as part of your Final Grade.

Your learning journal entry must be a reflective statement that considers the following questions:

  • Describe what you did. This does not mean that you copy and paste from what you have posted or the assignments you have prepared. You need to describe what you did and how you did it.
  • Describe your reactions to what you did.
  • Describe any feedback you received or any specific interactions you had. Discuss how they were helpful.
  • Describe your feelings and attitudes.
  • Describe what you learned.

Another set of questions to consider in your learning journal statement include:

  • What surprised me or caused me to wonder?
  • What happened that felt particularly challenging? Why was it challenging to me?
  • What skills and knowledge do I recognize that I am gaining?
  • What am I realizing about myself as a learner?
  • In what ways am I able to apply the ideas and concepts gained to my own experience?

Finally, describe one important thing that you are thinking about in relation to the activity.

The Learning Journal entry should be a minimum of 400 words and not more than 750 words. Use APA citations and references if you use ideas from the readings or other sources.

WK9

Download The Attachment and Message Me Please for Detailed Instructions

wk-1

 Relate any incident that has impacted you that relates to a cybersecurity issue 

List the Following Briefly in Five sentences each

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

web browser forensics

 Last week you research potential free and paid tools used for forensic analysis. This week I want you to narrow down your choice of free, or paid if you are willing to pay the cost, forensic tool(s) you will be using to analyze a web browser. Please post a discussion on what you plan to use and why you plan to use it. Also include any familiarity you have with the tool. In addition, you should be downloading and installing the tool you decide to use so that you can become familiar with it. You should then respond to at least 2 others peers on their choice. 

Attached last week assignment

C# Programming (Using Inheritance)

(The last Screenshot; Screenshot 53, is an Example of what the console should look like after the code is complete)

1. Start a ( Console App (.NET Framework) ) project in Visual Studio 2019.

2. Please name it “Using Inheritance”.

3. I attached the main assignment instructions, Please complete them.

Also, please write Without plagiarism. Thank you!

How Do I Become A Successful Web Designer?

Web designing is a very challenging field. To become a successful bespoke website design services provider, you need to have the following skills.

You need to learn web design theory. It contains everything you would need regarding creating attractive and colorful websites. Learning key web tools like Photoshop, WordPress, etc., are also really important if you want to become a successful web developer. You should also know HTML, CSS, and java scripts. These are the top 3 programming languages that developers use most of the time. Moreover, a web developer also has to be Patient and have communication skills. He should also have project management skills and the know-how to sell himself. 

Security Risk Assessments Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

What is a Security Risk Assessment?
A security risk assessment identifies, assesses, and implements security controls within company assets (data, hardware, software, etc.). Threats and vulnerabilities are the main fucus of that risk and the assessment helps to minimize the risk by implementing controls.

What elements does it entail?
There are five elements that include risk analysis, identifying risks to manage, selecting controls, implementing and testing controls, and evaluating the controls.

Does it include or exclude Penetration Testing?
Penetration testing is a type of security risk assessment. This type of testing attempts to evaluate the security of an IT infrastructure by attempting to exploit vulnerabilities in a safe way.

What types of Security Risk Assessments exists? Identify at least 3.
Facility physical vulnerability, information systems vulnerability, and proprietary information risk.

-ROSE

RESPONSE 2:

1. Security Risk Assessments happen on multiple levels. First, identify the IT assets and their significance to an organization, then distinguish the threats and vulnerabilities to the assets and prioritize them. Next, recognizing the probability that one of these vulnerabilities will be abused will ultimately identify the consequence of the risk. Finally, whichever risk is highest should be fixed first. 

2. The elements entailed in a Security Risk Assessment are assessing the risks, identifying risks to manage, selecting controls, implementing and testing the controls, and evaluating controls.  

3. Security Risk Assessments do include Penetration Testing. These tests are used for external networks, Websites, and Web applications and also for internal networks. 

4. Three types of Security Risk Assessments are insider threats posed by people inside the organization, information systems vulnerabilities that can be introduced via malware, backdoor programs, or phishing attacks, and proprietary information risk, which are trade secrets of an organization that could be detrimental if leaked. Joshua