Discussion question, 350 words and 2 references.

We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge-centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them

Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

computer science java

String Wrapper:

Write a program that inputs a string from keyboard and converts all occurrence of letter t(lowercase t and uppercase t) do letter uppercase case d. The input string can have any combination of letters, digits, lowercase or uppercase.

Example: “Tod AND teachers went to parTy” should be replace with “Dod AND Deachers wenD to parDy”

Infrastructure Research A

Submit a draft of (1) which policy framework(s) will be followed for the project and (2) DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains.

A Web page without JavaScript is static

  

A Web page without JavaScript is static. That is, the displayed content does not change once the browser loads the Web page. By using JavaScript, Web pages can be dynamic and interactive and can respond to user actions, such as mouse clicks and keystrokes.

 
 

In this Application, you will create a dynamic Web page that responds to an event, specifically, the user clicking a check box. Your event handler will change the content that is displayed in one section of the page, depending on whether the check box is selected or not.

 
 

use the JavaScript DHTML Playground to write a JavaScript function that performs the following tasks:

 
 When the user selects the check box “Check me,” read the selected item from the select box “Wonder” and display its value in the page footer

 
 

· When the user clears the check box “Check me,” display the selected item from the select box “Category”

 
 

· Assign the JavaScript function as the onclick event handler for the check box “Check me”

 
 

Hint: Each select box has a selectedIndex property that gives the index of the item selected in that box. Each select box also has an options property, which is an array of the option items displayed in that box. The text property of the option item provides the text the user sees in the select box. For example, if the Wonder select box has selectedIndex = 2, the following statement will obtain the text for the second element:

wonder.options[2].text

 
 

Test the JavaScript code by clicking the Run button. Submit a Microsoft Word document that contains your JavaScript code. Include screenshots that show the output, both when the check box “Check me” is selected and when it is cleared.

Cryptography – PCA

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Course : Cryptography

Position: Software Developer

2 pages

Discussion Board, Programming Logic

For this Discussion Board, please complete the following:

Decision-making statements are used to control the flow of the program. For example, you may use a decision-making statement to write a program to determine if a student passes the class based on his or her score. If the score is equal to or greater than 60, the student passes the class. Otherwise, the student fails. Assume that you are the programmer hired by a bank to write a program for its automated teller machines (ATM). Give an example that makes use of a decision-making statement in the program, and answer the following questions:

  • Which decision-making statement will you use, (e.g., if, if-else, or switch) for that example?
  • Why do you use that decision-making statement for that example?

Discussion

– need to write one page

 

  1. In 50-100 words, please explain in your own words how threats are modeled and assessed in the cybersecurity world. 
  2. In 50-100 words, please explain the vulnerabilities of applications and how they are mitigated.
  3. In 50-100 words, please characterize the risks involved in Mobile and Internet of Things (IOT) devices. 

Excel

this assigment have to be done in Excel. I have uploaded two documents. The first one are the instructions and the second one is the format with Excel that I have to complete with the instructions mentioned. 

Discussion (Physical Security week 4)

 

Question: Discuss the Privacy issues related to the use of Biometric devices.

Fully address the question(s) in this discussion; provide a valid rationale or a citation for your choices.

The initial post should be at least 350 words in length. 

– References

– No plagirsam 

– APA7 Format