Please see attached Document
bswa week10 p10
Hello,
i need this paper by 3/24 afternoon 12am.
Strictly No plagiarism please use your own words.
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
- Who is likely to attack your site?
- When are attacks likely to occur?
- What sort of attacks might take place?
- How can you best minimize attacks and protect the integrity of your site?
Write 300 words.Use your own words.
https://www.youtube.com/watch?v=4PAcfTzw1ZE
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
200 word post
Activity 10.2: Analyze a Phishing Email*
You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.
Part 1: Manually analyze an email header
Once you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.
Review the headers and identify what clues you can find.
Report on;
a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,
d) What would you do to identify future phishing emails based on the header information?
Part 2: Analyze the email content
Now that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email.
Report on;
- Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
- Is the link or domain a known-bad link?
Part 3: Use an automated tool
Use one or more automated email header analyzers to review the header from part 1.
Report on
if you identify additional useful data and what that data is.
(Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)
Conclusion
Write a one paragraph conclusion on what you learned.
cpp
Check the Input & Output slide in Week 6. Implement the File Input/Output example presented in pages 25. You need to create your own test.txt file using any text editor. The input file should have some integer values (e.g., 10 values) separated by whitespaces. Normally this input file should be placed in the same directory as the program code resides. But depending on the IDE you use, it may be a different directory in the project. Figure out which directory your IDE reads an input file from and writes an output file to.
Exp19_Excel_AppCapstone_Intro_Collection
#Exp19_Excel_AppCapstone_Intro_Collection
#ExcelAppCapstoneIntroCollection
You are the financial manager for Judi’s Art Gallery. One of your clients, Raymond Chancellor, has a large collection of limited edition signed art by James C. Christensen (1942-2017). Over the years, you have helped Raymond maintain a list of his collection, including the title of the art, medium, issue date, issue price, the price he paid, and current market values. Most of the art is sold out from the publisher, which increases the value of the art. Other art is still readily available or is available in limited quantities. You want to update the list so that he can properly insure his collection.
Select the range A1:A6 on the Christensen worksheet, merge the cells, and apply Middle Align vertical alignment.
Change the width of column K to 17.00, select the range K1:K3, and apply Thick Outside Borders.
Click cell C9, and freeze panes so that rows 1 through 8 and columns A and B are frozen.
Select the range E9:E54 and apply the Mar-12 date format.
Find all occurrences of Retired and replace them with Sold Out.
Click cell H9 on the Christensen worksheet, and insert a formula that calculates the percentage Raymond paid of the issue price by dividing the amount Paid by the Issue Price. Copy the formula from cell H9 to the range H10:H54.
Click cell J9, and insert a formula that calculates the percentage change in value by subtracting the Issue Price from the Current Value and then dividing that result by the Issue Price. Copy the formula from cell J9 to the range J10:J54.
Apply Percent Style with one decimal place to the ranges H9:H54 and J9:J54.
Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calculate the total of all the Current Values. In cell I3, calculate the average current value. in cell I4, calculate the lowest current value. In cell I5, calculate the highest current value.
Click cell C9 and insert a VLOOKUP function that looks up the code in cell B9, compares it to the codes and types of art in the range B2:C6, and returns the type of art. Copy the function in cell C9 to the range C9:C54. Hide column B that contains the codes.
Click cell K9 and insert an IF function that determines if the Issue Price is equal to the Current Value. If the values are the same, display Same as Issue (using the cell reference K2); otherwise, display Increased in Value (using the cell reference K3). Copy the function from cell K9 to the range K10:K54.
Display the Purchase worksheet, insert a row above Monthly Payment. Type Monthly Payments in 1 Year in cell A5 and type 12 in cell B5.
In cell B6 in the Purchasing sheet, insert the payment function to calculate the monthly payment using cell references, not numbers, in the function, and make sure the function displays a positive result. Apply Accounting Number Format and the Output cell style to cell B6.
Display the Christensen worksheet, select the range C1:E6, and create a clustered column chart.
Cut the chart and paste it in cell A57, change the height to 4″, and change the width to 6.5″. Add Alt Text The column chart compares total issue prices to total current values by type of art. (include the period).
Type Raymond’s Art Collection for the chart title, apply bold, and Black, Text 1 font color. Place the legend at the top of the chart. Add Primary Minor Horizontal gridlines.
Create a pie chart using the ranges C2:C6 and E2:E6, and then move the chart to a new chart sheet named Current Values. Move the Current Values sheet to the right of the Purchase sheet.
Type Percentage of Total Current Value as the chart title and change the font size to 18 pt. Choose Colorful Palette 3 for the chart colors. Add this description for Alt Text: The pie chart shows each art type by percentage of total current value. (include the period).
Hide the legend. Add data labels for categories and percentages; remove value data labels. Change the font size to 16 pt, bold, and Black, Text 1 font color for the data labels.
Explode the Masterwork Anniversary Edition slice by 15% and change the fill color to Light Blue.
Display the Christensen worksheet, click in any cell within the dataset, convert the data to a table, assign a table name Collection, and apply Green, Table Style Light 14.
Apply a conditional format to the range J9:J54 that highlights cells where the value is greater than 200% with Green Fill with Dark Green Text.
Sort the dataset by Type of Art in alphabetical order and then within Type of Art, sort by Current Value from largest to smallest.
Set a filter to display art that equals Sold Out as the status.
Add a total row to display the sum of the Issue Price, Paid, and Current Values columns. Remove the total for the Note column.
Select the Purchase sheet, set 2″ top margin, and center horizontally on page.
Select the Christensen sheet, select Landscape orientation, Legal paper size, set 0.2″ left and right margins, 0.5″ top and bottom margins, and set row 8 to repeat at the top of pages.
On the Christensen worksheet, change the width of column A to 27, the width of column D to 11, the width of column J to 12. Wrap text in cell A1 and cell J8.
Create a footer with Exploring Series on the left side, the sheet tab code in the center, and file name code on the right side on the Christensen sheet.
Network diagram
Network diagram for a project.
Fuzz Buzz
Write a function playGame(maxValue) to perform the following task (it’s based on an old school yard game called “Fuzz Buzz”):
Create a loop that depends on a variable x starting with the value 1 and increasing in value by 1 for each iteration of the loop, until x reaches a maximum value specified by the formal parameter maxVal. At each iteration of the loop the value of x should be displayed, unless one of the conditions shown below is true, when the message specified below should be displayed instead:
• If the value of x is divisible by 11, skip to the next value of x and display the word “skip”.
• If the value of x is divisible by 10, display the word “fuzz”
• If the value of x is divisible by 4, display the word “buzz”
• If the value of x is divisible by both 10 and 4, display the words “fuzz”
and “buzz”, unless the first rule applies.
• Otherwise just display the value of x.
You can find out if a number is ***** by another using the modulo operator %. This tells you the remainder after integer division. For example:
8 % 2 equals 0 as 2 goes into 8 four times leaving no remainder.
8 % 3 equals 2 as 3 goes into 8 two times leaving a remainder of 2.
You should then create a function runGame() that invites the user to enter an appropriate value for maxValue, and then calls the playGame() function accordingly.
Abstract #3
*Below is the instructions, and I have attached an SAMPLE EXAMPLE document
Legal Abstracts – Instructions
A sample legal abstract is posted in Blackboard. Use the sample as your template.
Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed.
The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.
Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites.
To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues.
Each abstract must contain the following headings:
Article title
Author
Publication
Publication date
URL
Facts of the dispute
The background of the case or controversy.
Plaintiff’s claim
In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?
Defendant’s claim
How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint.
Applicable law (i.e. statute, regulation, treaty)
Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply.
Issue of law
This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case.
Holding (if an adjudicatory body has rendered a decision)
This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding.
Impact on IT
Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here.
Computer Science Essay
Extra Credit Assignment Test #2 Bonus Points- The Coming Software Apocalypse
Assignment Description
- Read the following article – https://www.theatlantic.com/technology/archive/2017/09/saving-the-world-from-code/540393/
- Or listen to the audio version https://soundcloud.com/user-154380542/the-coming-software-apocalypse-the-atlantic-james-somers
- Summarize the article as a whole in one paragraph (1 paragraph)
- Pick 3 key points from the article that resonated with you the most. Paraphrase those points, and explain why they resonated with you. (1 paragraph for each point).
- No more than 2 pages allowed.
- Default (reasonable) margins and font. 1.15 spacing
Rubric
- 1 points for summary paragraph
- 3 point – 1 points for each key point paragraph.
- 1 Points awarded for general impression of quality, comprehension demonstration, and effort. And, of course, following my (customer) requirements outlined above.
The customer
The customer browses the aisle, selects his book(s), then stands in line at the check-out counter. The cashier takes the book(s) from the customer, reads the price from the cover, then key punches the price into the POS terminal. If the price is missing the cashier summons the clerk from the Warehouse Department to check the price. Invariably, the Warehouse clerk will check with the Accounting Department to verify the price of the book.
Once the price is verified the cashier proceeds to key punch the price. The customer tenders payment in cash, cheque or by credit card once he is told the total owed. After payment is made, the books are handed to the customer. If the customer had brought a bag into the Bookshop, he will collect it from the Baggage Storage Unit before leaving the building.
Draw the context diagram of the check-out process. Draw the diagram from the perspective of the cashier.