Home work 12

  Write short answers, uploaded as a WORD DOCUMENT and attach references. 

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

MIS 433- Module 2: Database Design

Use Access to construct a database for a college bookstore store based on the step-by-step instructions listed below.

Create a database and one table:

  • The name of the database will be Inventory_YourLastname.
  • Create a table named PRODUCTS based on data in Table 1.
  • Determine the appropriate data type for each field.
  • Assign an AutoNumber field to serve as the Primary Key. This should be the first field of the table and named PRODUCTID.
  • Populate the table with data from Table 1.

PRODUCT_NAMEDEPARTMENTQUANTITYPRICESUPPLIERAvocado DipF60.99Jay’sBall Point PenP1500.89BicChipsF770.65Lay’sClass RingC5098.95BalfourDictionaryB2212.95ColumbiaDoritosF1452.49Lay’sFelt-tip PenP760.98BicLogo T-ShirtC2509.99ChampionPencilP2000.15BicPepsiF4440.65PepsiSchool JacketC10034.95ChampionSchool TieC1517.50Field’sThesaurusB 1218.00ColumbiaThree-Hole PaperA2001.98MeadThree-Ring BinderA1223.50Mead

Add a new table to the Inventory database:

You now want to include the supplier information in the INVENTORY database. Use the information below:

  • Create a table named SUPPLIERS based on Table 2.
  • Determine the appropriate data type for each field.
  • Assign the SUPPLIER field as SUPPLIERS table Primary Key.
  • Use the Telephone number input mask to format the telephone number.
  • Populate the table with data from Table 2.

SUPPLIERCONTACTSTREET ADDRESSCITYSTATEZIP CODEPHONE NUMBERBalfourCoffinWall Street PlazaNew YorkNY100052122690800BicZeienPrudential TowerBostonMA22199ChampionOwen3141 MonroeRochesterNY146037163853200ColumbiaQuigleyColumbia College

New York

NY100270Field’s11 N StateChicagoIL606030Jay’s1504 W 44thChicagoIL606530Lay’sBeeby7701 Legacy DrPlanoTX750242146244700MeadRobertsCourthouse PlazaDaytonOH454635134956323PepsiCallowayAnderson Hill RoadPurchaseNY105779142532000

Relating the two tables:

You will need to establish a link between the PRODUCTS and SUPPLIERS tables.

  • Determine the common attribute between the PRODUCTS and SUPPLIERS tables.
  • Use the common field and create a relationship.

Perform Sort, Filter and:

  • Open the SUPPLIERS table and sort the records based on CITY. Save as CitySort.
  • Open the PRODUCTS table and create a filter of your own choice.
  • Use the ‘Aggregate’ function to calculate the average price in the PRODUCTS table.

Close and Submit:

  • Close your database.
  • Submit your database to the assignment submission folder that follows this page.

Unbiased Recommendations

 

Assignment Content

  1. Constructing a rationale requires research, and research requires identifying unbiased sources of information. Clearly, you cannot rely on a company’s own marketing materials to be unbiased in its evaluation of its own products.

    Write a 150-word response about how you approached locating and vetting high-quality, unbiased sources of information when researching trends, vendors, and other easily hyped topics. How satisfied are you with your ability to identify unbiased recommendations for a specific project type? Why?

    Submit your assignment.

     

Ubuntu Install

  

In this SLP assignment, you will learn more about operating systems  by installing Ubuntu on your computer. Ubuntu is a variation of Linux  and was created in 2004 by Mark Shuttleworth. Shuttleworth wanted to  create a free system that is user friendly and powerful enough to  compete with other operating systems. Shuttleworth enhanced Linux by  addressing its weaknesses. With more people using the system, Ubuntu has  gained increased popularity worldwide. 

SLP Assignment Expectations

Ubuntu is a free, open-source Linux operating system with three  officially released editions: desktop, server, and core. It is a popular  operating system, especially for cloud computing.

In this assignment, you are required to download it to your computer.  Following the instructions in the tutorial below, install Ubuntu on  your own machine.

https://tutorials.ubuntu.com/tutorial/tutorial-install-ubuntu-desktop?_ga=2.85992796.552410234.1571164628-924200267.1571164628#0

Write a paper with the following components:

  • Your experience with Ubuntu, any difficulties encountered when installing Ubuntu, and how you solved these difficulties.
  • Screenshots to show your Ubuntu trial and/or installation.

The Caesar Cipher

  

The Caesar Cipher

Create a program that decodes messages. The messages will be encoded using a Caesar cipher, with each letter being decoded by replacing it with the previous letter in the alphabet. (Supposedly, this was invented by Julius Caesar.)

The message: J MPWF KBWB would be decoded as I LOVE JAVA.

Offer the user a menu with the following choices:

1. Decode a message.

2. Encode a message.

3. Display the alphabet.

4. Exit the program.

If the user selects option 1, prompt the user to enter an encoded phrase or sentence of text. Convert it to uppercase. Decode it. Print out each decoded letter as you convert it.

If the user selects option 2, prompt the user to enter a decoded phrase or sentence of text. Convert it to uppercase. Encode it. Print out each encoded letter as you convert it.

If the user selects option 3, display the alphabet on the monitor screen.

If the user selects option 4, the program should terminate.

Your program should redisplay the menu after each translation is finished. 

Each task should be in its own method: load the data, display the menu, read the data/phrase entered at the keyboard, translate the encoded message, translate the decoded message, display the alphabet.

Your program must also handle the spaces between the words. 

Do not use or anticipate any punctuation in the input.

Use my examples for test data. Method Definitions on the next page.

Encoded Message  Decoded Message

J mpwf Kbwb  I LOVE JAVA

Uijt jt gvo  THIS IS FUN

Kbwb jt nz gbwpsjuf  JAVA IS MY FAVORITE

Chapter Summary

Due Sep 12, 11:59pm, PT…………20 hours left

Need to write about 2 pages (1.5 line spacing and 11 or 12 font size) of summary of chapter, so that it contains:

(part 1) important concepts of the chapter

(part 2) experience/application/opinions of the chapter.  

paper

For the submission describe/explain/answer the following:

  1. Describe in short standard ways to represent data, make selections, navigation patterns, and display quick alerts to the user.
  2. Explain the use of offline storage.
  3. What is GPS device Accelerometer used for?

Building the Derby App in Titanium –  Page 297.  see Chapter 10

The impact of Data Mining in the Healthcare Sector

Write a  5-page research paper(cover and reference page inclusive) on the topic 

“The impact of Data Mining in the Healthcare Sector”

Requirements:

1.Use Times New Roman font size 12 and double spaced.

2. Include a cover page and reference page. Use section headers for good readership.

3. Use figures and tables if needed(not mandatory).

4. Use Self-Assign to check your research paper and similarity score should be less than 15%.

5. Use APA for in-text citations and references(in-text citations must match reference list)

6. Provide at least 3 scholarly references.