To view HTML

  

1. (TCO 2) To view HTML in Visual Studio.NET, you would _______. 

open the web page in Notepad
open the web page through the Solution Explorer
open the “Code” tab on the web page
right-click on the web page and left-click on “Open”
open the “Source” tab on the web page

 

2. (TCO 2) The default appearance of the heading and body text is determined by _______. 

the Visual Studio.NET settings
the web.config settings
the Cascading Style Sheet associated with the web page
the code associated with the web page
the browser

 

3. (TCO 2) How would you generate Style attributes? 

Open the New Style dialog box and set the font properties
Open the web.config and set the “Style” property to the font and size
Open the Global.asax and set the “Style” property to the font and size
Open the Cascading Style Sheet Builder and set the font properties
Open the web page’s “Style” property and set the font properties

 

4. (TCO 2) The number of pixels between cells in a tables can be specified by what? 

Width
Colspan
Cellspacing
Rowspan
Cellpadding

 

5. (TCO 2) ____ allow users to select controls by keyboard shortcuts. 

Alternative keys
Alternative options
Attributes
Focus controls
Access keys

 

6. (TCO 2) You can use the ________ to specify the maximum amount of characters that can be entered in a textbox. 

Maxlength property
Width property
Size Property
MaxSize property
Size setting in the database

 

7. (TCO 2) The CheckedChanged Event for a radio button occurs _________. 

only when the radio option does not have a check mark
whenever the radio option is checked or unchecked
only when the radio button has focus
only when the radio option has a check mark
None of the above

 

8. (TCO 2) The Rows and SelectionMode properties apply to _______. 

all controls
textboxes
listboxes
dropdown boxes
radio controls

 

9. (TCO 2) The radio buttons represent a list of _______. 

all options you select
mutually exclusive options
any two or more options selected
any options selected which you can force the minimum amount
all-inclusive options

 

10. (TCO 2) The ________ displays a text box and button for users to browse, select, and upload a file. 

Text box control
Upload text box control
Upload file control
File menu
Upload menu

 

security risks

 

Introduction

O’Keefe State University located in New Mexico has recently started using Canvas for online course delivery. Canvas hosts all the data in its own cloud storage. Students may log in to the systems form any personal device (laptops, phones, etc.). On-campus students can also use library computers. Note that the browsers may store student credentials (IDs and passwords) in a browser.

Directions 

Write a two-page security risk analysis to identify all possible security risks associated with the usage of Canvas in the library or on home computers.

Specifically address whether Canvas cloud architecture increases or decreases the cybersecurity risks associated with it, when compared to an old learning system that stored all student data on a servers located on-campus and managed by the university IT personnel.

Paper with minimum of 6-8-pages.

Research and identify three large scale hacks or violations of Internet security that have occurred over the past five years. For each of the hacks, identify the suspected hacker or hacker group, what the hack consisted of, what the hackers wanted, and how the hacked entity was able to fend off the attack, or how the entity resolved the hack if it was successful. 

Compare and contrast each of these and write a proposal for an information security review for The New York Times newspaper. This review should include the potential threats, ease of access to reporters and staff accounts, and so on. You should also identify the top three threats to the newspaper in your review.

Your APA-formatted report should be a minimum of 6-8-pages, and include a minimum of 6 peer-reviewed or academic resources.

Discussion 9- Project Risk

Chapter 11: Project Risk Knowledge ManagementInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What is knowledge at risk?
  2. What are the key challenges of knowledge management?
  3. What are the advantages and disadvantages of knowledge management systems?
  4. What is the impact of knowledge management in the modern world?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Discussion 4002

  1. Read Chapters 1 and 2 in your textbook (Textbook: Principles of Information Systems).
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
    3. 300 words minimum. 

Reflection Paper for Database Management

In a short paper (1-2pages), please address each of the topics below with a 1-2 paragraph narrative for each section.

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.

Research Paper Topic Proposal and outline

 

Instructions

Database Security Research Paper and Outline

In this course, each student is required to conduct research and write a paper that covers an approved topic area of database security.  Present your choice of topic for the Database Security Research Paper.  Your topic proposal should be at least one paragraph in length with citations to at least two references (besides the book) that help support the topic you wish to research.  A brief summary of these references should be included.  In addition, you must provide a one (1) page, high-level outline of your paper.  Draft and final versions of the research paper are due by the end of Weeks 5 and 7, respectively.  Although this is not a graded assignment, the quality of the research paper proposal and outline will factor into the overall research paper grade.  Topics for the Database Security Research Paper 

Below are examples of the topics students may choose from, or one can be suggested by the student for approval by the instructor.

Anonymization/Pseudonymization, Data Hiding, Metadata and Security, XML Security, Authorization and Access Control, Data Integrity, Privacy Preserving Data Mining, Statistical Database Security, Control of Data Disclosure, Private Information Retrieval, Secure Stream Processing, Secure Auditing, Data Retention, Search on Encrypted Data, Digital and Enterprise Rights Management, Multimedia Security and Privacy, Private Authentication, Identity Management, Privacy Enhancing Technologies, Security and Semantic Web, Security and Privacy in Ubiquitous Computing, Security and Privacy of Health Data, Web Service Security, Trust Management, Policy Management, Applied Cryptography

Hacking on Social Media Platforms

Assignment Content

  1. Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 
  2. Compare and contrast articles – Form to fill out

     2. Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)
    Put them in an order that makes sense given how you compared and contrasted them.
    Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)
    compare and contrast words

    Submit BOTH assignments here.

Literature second part 

  1. Put it all together in 1, 2, 3 order! Write your Literature review!

    Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

    Submit the marked-up checklist and your literature review here, with a title and references page.

  1. References
  2. Du, H.S., Chu, S.K.W., Chan, R.C.H. and He, W. (2016), “Collaborative writing with wikis: an empirical investigation”, Online Information Review, 40(3), 380- 399. https://doi.org/10.1108/OIR-06-2015-0173
  3. Ecklebe, S. and Löffler, N. (2021), “A question of quality: perceptions of internal communication during the Covid-19 pandemic in Germany”, Journal of Communication Management, 25(3), 214-232. https://doi.org/10.1108/JCOM-09-2020-0101
  4. Malik, A., Dhir, A., Kaur, P., &Johri, A. (2020). Correlates of social media fatigue and academicperformance decrement: a large cross-sectional study. Information Technology & People.https://doi.org/10.1108/JCOM-01-2019-0002