- Research 14-1 – Application security or penetration testing methodology. APA formatting is expected. Research various application security testing or penetration testing methodologies. Compare and contrast the pros and cons of each methodology and recommend your preferred approach.
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Python Programming
Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department. Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))
> python myproject.py
Choose a semester: 1) Sprint 2021 2)Fall 2020 3)Summer II 4)Summer I 5)Spring 2020
Selection: 2
Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.
Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources
…
…
30) Social Work
31) Theatre
Q)Go back
Selection: 3
Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??
Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level.
Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show
PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532
as first 5 rows.
You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.
For this program you need to develop at least one class (chapter 10) with (possible) many methods.
Assignment
(1). FORENSIC DESIGN ASSESSMENTS
This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.
For this task, take a close look at the data representation choices:
- Start by identifying all the charts and their types
- How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
- Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
- Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
- Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?
Assignment Link: http://book.visualisingdata.com/chapter/chapter- 6
is there anyone who knows ardunio in python????????
EXPERT KINDLY MENTION “” ARDUNIO IN PYTHON”
Practical Connection
This is the Practical Connection Assignment for this course. The purpose of this assignment is to help connect the concepts learned in this course to real-world situations that you may face as an IT professional.
For this assignment, you will write an essay addressing the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional. Your essay should address the following.
- a definition and overview your selected law or regulation
- consideration of the duties of an Information Technology professional
- an analysis of the application of that law or regulation in the context of the identified duties
- a reference page(s)
To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. This is not a formal paper, but should maintain scholarly tone and rigor, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/
This assignment must be YOUR OWN WORK! This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus.
Here are a few details about the overall research paper.
- Your paper does not require a Title page.
- Your paper must include a Reference page.
- Your paper should NOT include an abstract.
- Your paper must include a minimum of 4 peer-reviewed resources (articles or papers)
- Cited sources must directly support your paper (i.e. not incidental references)
- Your paper must be at least 500 words in length
- Reference pages are NOT included in calculating the paper length. (Neither are Title pages or abstracts if present).
If you are not sure how to identify peer-reviewed papers or articles, please visit the following resources:
http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles
portfolio assignment
This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.
Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?
Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
• Be approximately seven to ten pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Discussion 7 erm
Please answer the following two questions.
- What are some of the potential risks involved with cloud computing?
- Does the research and model in this article propose a viable solution to cloud-based risk management?
Please make your initial post should have 500 words and the post will do at least TWO of the following:
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Risk Assessment
Briefly provide an overview/description of your fictitious company.
Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.
Assignment 5
You shall write a C++ program that:
- Reads an arbitrary number of whitespace-delimited tokens from standard input.
- Determines and prints (to standard output) two decimal integer values:
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
/srv/datasets/scrabble-hybrid
. - The total number of points that all those words would be worth in Scrabble, according to the letter values in
/srv/datasets/scrabble-letter-values
.
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
Specific Requirements
- You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
- Open and read the contents of each relevant data file exactly once.
- Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
- Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.
Sample Executable and Expected Output
A sample executable named cs19_scrabble_total
is available on the server, which demonstrates expected behavior of your program, e.g.:
$ cs19_scrabble_total <<< 'spinnaker'
1 word worth 15 points
$ cs19_scrabble_total < /srv/datasets/many-english-words.txt
519135 words worth 7566688 points
$ cs19_scrabble_total < /srv/datasets/shakespeare-othello.txt
17531 words worth 105915 points
$ cs19_scrabble_total < /srv/datasets/king-james.txt
650865 words worth 4305807 points
Proof reading
Very urgent!
I have done writing this paper which is a scholarly paper, but I want to add more relevant content to the paper from the topics inside it, so the paper can be longer. It’s IEEE style. I want you to add about two more pages ( 4 columns ).
First, read the paper, then add the relevant content and information.