25 Questions of multiple choices.
4 Questions of short writing
25 Questions of multiple choices.
4 Questions of short writing
How has tech influenced agriculture in developing world??
Project 12-2: Assign tickets with time slots
For this project, you’ll develop an application that assigns tickets that include a time slot when a guest can return to visit an attraction without waiting in line, similar to the way the Fast Pass system works at Disneyland.
The design of the Tickets form
Operation
· To issue a ticket, the user clicks the Issue Ticket button. A ticket with the next ticket number in the next available time slot is issued.
· Each time a ticket is issued, it is added to the list box.
· The title bar for this form displays the current time and an indication of whether the current time slot is open or closed. This information is updated once per second.
· The labels in the Ticket Availability section of the form indicate how many tickets are outstanding and the time slot that will be assigned to the next ticket that’s issued. These labels are updated as tickets are issued and the time changes.
· When a time slot begins, any outstanding tickets for that time slot are removed from the list box and the beginning and ending ticket numbers assigned to that slot are displayed in the label inside the group box at the top of the form.
· To change the options for issuing tickets, the user clicks the Options button. Before the Options dialog box is displayed, a dialog box is displayed that warns the user that all outstanding tickets will be deleted and confirms that the user wants to continue.
The design of the Options form
Operation
· The user can enter values into the Options dialog box to specify the number of minutes for each time slot, the number of guests allowed into the attraction during each time slot, the time the attraction opens, the time the attraction closes, and the number for the first ticket. The defaults are five minutes per time slot, five guests per time slot, a start time of the current time, an end time of four hours after the current time, and an initial ticket number of 1.
· When the user clicks the OK button, the Tickets form is displayed.
Specifications
· Use a Timer control to display the current time in the title bar of the main form and to determine the current time slot.
· When the application starts, it should display the Options dialog box from the Load event handler for the Tickets form. For this to work without an exception being thrown, you’ll need to disable the Timer control until the Options dialog box is completed.
· The data the user enters in the Options dialog box should be validated to be sure that the minutes per time slot, guests per time slot, and first ticket number are integers; that the start and end times are DateTime values; and that the difference between the start time and the end time provides for at least two time slots.
· Create a class that represents a time slot for assigning tickets. This class should have public fields that indicate the time the time slot begins, the length of the time slot, and the number of tickets that have been issued for the time slot. This class should also have a property that gets the time the time slot ends. Use this class to create a time slot object for each time slot between the start and end times entered on the Options dialog box, and store these objects in a collection.
· Create a class that represents a ticket. This class should have public fields that store the ticket number and the time slot that’s assigned to the ticket and a method that sets the next ticket number. As each ticket is issued, the application should create a ticket object with the next ticket number and add it to a queue. Then, when the time slot for the ticket begins, the ticket should be removed from the queue.
· Once a time slot begins and the tickets in that time slot are removed from the outstanding list of tickets, the user should not be able to issue any more tickets in that time slot even if the maximum number of tickets for that time slot haven’t been issued.
Notes:
This project requires only minimal object-oriented programming skills (chapter 12 is sufficient) but has extensive collection and date/time requirements. It also requires that you research and use the Timer control, which isn’t presented in the book.
The complexity of the project can be varied as follows:
· Implement just the ticket assignment portion of the application, with no real-time monitoring of the time.
· Issue a ticket for the current time slot if tickets are still available.
· Instead of issuing a ticket for the next available time slot, let the user choose the time slot for the ticket. Then, the tickets in the current time slot will have to be listed individually at the top of the form. Depending on how you design the data store, this may result in a major redesign of the application.
· Use NumericUpDown controls to select the minutes per window and guests per window from the Options dialog box, and use the DateTimePicker control to select the start and end times. This will require some additional research.
Deliverable: Working/Annotated Bibliography
As you begin researching you will conduct a preliminary source review which should include a variety of articles related to the research topic. Your focus should be on the more formal sources (i.e. peer reviewed articles). Websites, internet articles, newspapers, interviews, etc. are useful in identifying sources. They can also help support your points.
After reading each article, create an annotated bibliographic entry reflecting the reading using the format described above.
The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)
https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/
When Ethical Hacking Can’t Compete
https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/
Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.
refer to the attached images for the details
Write two policies to ensure Web browsers and Web servers are secure. All procedures and guidelines will be designed to fulfill the policies you create.
Answer the following questions for Web browser and Web server software:
1. What functions should this software application provide?
2. What functions should this software application prohibit?
3. What controls are necessary to ensure this applications software operates as intended?
4. What steps are necessary to validate that the software operates as intended?
Once you have answered the questions above, fill in the following details to develop your policies to secure application software. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.
Ø Type of application software
Ø Description of functions this software should allow
Ø Description of functions this software should prohibit
Ø Known vulnerabilities associated with software
Ø Controls necessary to ensure compliance with desired functionality
Ø Method to assess security control effectiveness
You will write two policies—one for Web server software and one for Web browser software.
Case Scenario for Rationale
Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building.
Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including:
• Raw material costs
• Labor costs
• Materials and labor requirements for products
• Purchasing requirements
Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:
• Administrators—maintain ERP data and system operation.
• Planners—run planning software and generate requirements reports.
• Shop Floor users —enter operational data (receiving, shipping, and product progress during manufacturing).
• Managers—manage department personnel.
• Purchasing users—generate purchasing documents based on planning requirements.
• Accounting users—maintain cost and accounting data.
Access controls limit what users or roles can do with different types of data. For example, consider the following types of data:
• Cost information—raw materials and labor costs, including the cost of finished goods.
• Manufacturing details—cost, amount of labor, and time required to produce finished goods.
• Purchasing requirements—rules for determining when raw materials, components, or supplies should be purchased.
Through access control:
• Cost information can be viewed only by Accounting users.
• Manufacturing details can be viewed only by Shop Floor users.
• Purchasing requirement can be viewed only by Purchasing users.
During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data.
• Accounting users are able to login to shop floor computers.
• Purchasing users are able to access human resource (HR) applications and data.
The ERP implementation team suggested the following access control measures to protect restricted data.
• Create an organizational unit (OU) in Active Directory for shop floor computers.
• Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.
• Define data access controls in the ERP software to deny access for all non-HR users to restricted data.
Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits.
The use of digital and social media can have a profound effect on society. This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others.
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
– What is penetration testing
– Testing Stages
– Testing Methods
– Testing, web applications, and firewalls
Your paper should meet the following requirements:
– Be approximately four pages in length, not including the required cover page and reference page.
– Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
– Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.
No Plagiarism
1) Project goals.
2) Database description: A general description of the database, what data is stored in the database.
How the database will benefit the users.
3) Data model & design:
o Completed ER/EER diagram, 5 tables minimum (8 tables in case the group has 2
members)
MUST use https://www.draw.io to draw the ER diagram, and then take a
snapshot.
Include a snapshot of the diagram in the report.
o Business rules.
o Data dictionary: For each one of the tables, list columns, data types, column restrictions,
column descriptions.
4) Implementation:
o Use MySQL Server and MySQL Workbench to create the database/tables.
Include a snapshot of the SQL code in your report
o Populate the each table with a minimum of 20 rows of sample data. Make sure the
entered data is descriptive (not just random numbers and letters.
Include a snapshot of the SQL code in your report.
o Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:
Snapshot of the code and the output in the report.
In about 2 lines, explain what the query returns.
Queries:
1 trivial query. Simple select with ordering.
2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.
1 query that uses subquery.
2 queries that uses join (1 inner join, 1 left or right outer join).
1 view (query must use join – hint: you can use one of the queries from the
previous question).
1 query that uses union.
1 custom stored function.
1 custom stored procedure.
ENTITIES WITH ATTRIBUTES
CHILDREN: Id, First Name, Last Name ,Age, Gender, Instructor Id, Guardian Number PROFESSOR : Id, First Name, Last Name, Home Address, Department, Office Hours, Office Phone
ACCOUNTING: Date, Rental fee, Electricity,Servicing , Tax paid ,Earning , Worker’s salary , Contribution
HEALTH SECTOR: Children Id, Sickness, Disabled, Hypersensitive, Vaccination, Health Records, Prescription
CATALOG: Books, Cardboard, Ink-pen, Highlighter, pencil
List of the 10 questions
1. Display all the columns and rows of the children’s table whose first name starts with the letter B for every class.
2. Display all the columns from the professor table whose office phone starts with 6.
3. Display how many children have each professor has.
4. Display worker’s salary and electricity bill of 2020.
5. Display Guardian Number of the children with prescription.
6. Display the name of the children with disabilities whose names start with c, d, and f.
7. Display the name of the children who are healthy and have no medical history.
8. Display the name of the children who have hypersensitive.
9. Display the name of the children who are using cardboard and have medical prescriptions.
10. Display tax paid and contribution.