Do research on one-or-two large software systems that were implemented successfully and on one-or-two large software systems that failed in their implementation. Write at least a 3-page Word document, double-spaced, detailing each system. Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of the system, a section to discuss the D.-Development of the system, a section to discuss the I.- Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of the system (successful or failed). Provide the following: 1. An Introduction paragraph describing the assignment and a short description of the systems selected. 2. A section that describes the first Software System (with an appropriate section Heading) and a description of that Software System to include: a. What is its purpose? b. What operations it performs? c. What are its inputs (resources, interfaces, when used)? d. What are its outputs (interfaces, data)? e. The system’s complexity/cost/feasibility. f. Any constraints or risks found during the research. 3. Sections with details for each component of A.D.D.I.E. (with an appropriate section Heading) to include: a. Success or failures identified. b. Issues or findings identified. c. Recommendations or lessons learned. Your paper should then conclude with a Findings section the compares the two systems. Provide the following: 1. What made one system successful but make the other system fail. 2. What could have been done to make the failed system more successful. 3. What could have been done to make the successful system even more successful. You must include at least 3 scholarly references with citations.
Rstudio
Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria. She wants to live in an area with lower crime but wants to know a few things:
Is it more expensive or less expensive to live in FL or NY?
Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
Is the crime rate higher in lower or higher house price areas?
Using the R tool, show the data in the tool to answer each of the questions. Also, show the data visualization to go along with the summary.
If you were Suzie, where would you move based on the questions above?
After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
She has $100,000 to put down for the house.
If she moves to NY she will have a job earning $120,000 per year.
If she moves to FL she will have a job earning $75,000 per year.
She wants to know the following:
On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
Where should she move and why? Please show graphics and thoroughly explain your answer here based on the new information provided above.
You are tasked with creating
Coding Assignment # 5 – Recipe Hunter
You are tasked with creating a Rails app that will display a recipe index based on a keyword entered.
1. Create a rails app called recipe_hunter
2. Generate RecipesController (recipes_controller.rb) that will have an index action
3. The above-mentioned controller should check if a request parameter keyword was passed in.
4. If it was – it should use it, and if not – it should use a default value of “chocolate” instead.
5. Create a model, Recipe (recipe.rb) that will contain a for class method that will take a
keyword to query and query the Recipe Puppy API. (You should already have the Recipe class
from the previous assignment. Remember, that unlike the previous assignment – you will not
need to require ‘httparty’ gem in your code, since loading HTTParty gem should be the Bundler’s
job.)
6. Create your view (with CSS – use your imagination) that might look something like this:
7. I should be able to click on either the title or the thumbnail and go straight to the actual recipe
(out there on the web). Look at image_tag helper for defining an img tag and use this helper
as the first argument to link_to helper.
8. Rails automatically escapes HTML in your strings (mainly to avoid XSS attacks
http://en.wikipedia.org/wiki/Cross-site_scripting). Because of this – some of your titles will look
wrong.
Rails has a sanitize (or raw) helper that will help you display HTML characters properly
9. Instead of having to go to http://localhost:3000/recipes/index all the time – you want this page
to be the default. So, you should be able to go to http://localhost:3000/?keyword=apple%20pie
and see the following
Submission Guidelines
1. Commit all the files to your local repo and push your repo out to your private team repo on
github creating a remote branch called assignment5.
2. For this assignment, it might make the most sense to work on a master branch of a newly
created repo and then do $git push remote_alias_github
master:assignment5 to push it out to github.
3. Deploy your homework to heroku (WARNING: Heroku only allows pushing to a remote master
branch) using a URL pattern of jhu-spring17-teamX-recipes.herokuapp.com (where X is your
team number).
4. Feel free to include a README.txt with any comments, as well as your deployed assignment URL
Computer Forensics – Assignment
download the .ova file. download and install the virtual box tool.
open virtual box and import the ova file .
In this assignment you will work on the first steps of seizing and imaging an evidence disk. And create a well-organized report that has documentation with Text and Pictures about your work.
Objectives:
– Learning how to seize a digital evidence found on the scene of the incident
– Being aware of the Dos and Don’ts when handling the evidence
– Filling the chain of custody and Learning its importance.
– Identifying the tools, both hardware and software, required for imaging the evidence data
– Preforming the imaging process which can be cloning or just imaging
– Validating the created image of evidence data
Context: [Fictional]
Scenario: The XYZ security team received a notification that suspicious cyber activity is taking place in Wilson Building. Surveillance cameras showed that a person, who could be the suspect, was seen in room Wilson 106 and then he left. When the team arrived at the scene, they only found a USB drive that could have been used in implementing the suspicious activity. They decided to seize it so they can perform the needed analysis to identify its content.
Scene Location: Wilson 106
· [For pictures, you can use your own place if you cannot access Wilson 106]
Evidence: A USB drive
· [a please have/use your own USB blank flash drive for this work. For faster performance you can use 8GB or less drives. Also, you can use SAU machines in case your machine is not powerful enough.]
Please follow all the steps/guidelines/phases below, as much as possible, however points in green only will be considered while grading.
· Will a warrant be needed in this case? Justify your answer and Add legal references [ 5 pts] [Based on: Scientific Working Group on Digital Evidence.]
· General Instructions: [Seizing the Evidence]
1- Ensure the safety of all individuals at the scene. [X]
2- Protect the integrity of evidence. [X]
3- Evaluate the scene and formulate a search plan. [X]
4- Identify potential evidence. [The USB drive given to you]
5- All potential evidence should be secured, documented, and photographed. [ 5 pts ]
a. For this assignment No need to secure; just document and photograph.
i. In the report, the caption for photos/figures is required.
6- Conduct interviews. [X]
7- Any item to be removed from the scene should be properly packaged and secured. [X]
· For Removable Drives:
1- Document in writing the location and condition of all removable media [ 2 pts]
a. For this assignment: The only the USB drive.
2- Remove any connected external media (e.g. external drives or thumb drives) after the computer has been powered down. [X]
· Creating the image:
1- Document the tools you plan to use. [ 5 pts ]
a. For this assignment:
i. Hardware [X]
1. Tableau Forensic USB 3.0 Bridge
2. T8u:
a. Firmware:1.5.0.1, Date: 10/31/2016 , Time: 11:47:27
b. Serial: 000ecc13 0008415f
ii. Software.
2- List clearly the steps/work plan for creating the disk image. [ 3 pts ]
3- Use snapshots for each step while creating the disk image using the Parrot Security Linux distribution. [10 pts]
a. Using hashing, Verifying the disk and the image are important [5 pts]
4- Use the Chain-Of-Custody (COC) document to describe the item and fill required information. [ 5 pts]
a. Assume that the evidence was released to another person on the team, and fill the necessary information.
Notes:
· Deliver The above work in a very well formatted and organized report that you will submit, in PDF format. [5 pts]
o Poorly formatted report will badly affect your grade regardless of the accuracy of your work, i.e. > 50% of the grade.
§ Have to have: Title Page, TOC, Pictures with Captions, Divide text into Sections…etc.
· The COC document should be the last page of the report.
EVIDENCE CHAIN OF CUSTODY TRACKING FORM
Case Number: ________________________ Offense: ______________________________
Submitting Officer: (Name/ID#) _______________________________________________
Victim: ______________________________________________________________________
Suspect: _____________________________________________________________________
Date/Time Seized: __________________Location of Seizure: ______________________
Description of Evidence
Item #
Quantity
Description of Item (Model, Serial #, Condition, Marks, Scratches)
Chain of Custody
Item #
Date/Time
Released by
(Signature & ID#)
Received by
(Signature & ID#)
Comments/Location
APD_Form_#PE003_v.1 (12/2012) Page 1 of 2 pages (See back)
EVIDENCE CHAIN-OF-CUSTODY TRACKING FORM
(Continued)
Chain of Custody
Item #
Date/Time
Released by
(Signature & ID#)
Received by
(Signature & ID#)
Comments/Location
Write pseudocode
Write pseudocode for the 5 (five) problems for full credit. There are two ways to complete this quiz. One is to simply download the instructions file (docx) below and do your pseudocode code editing right into the instruction document. Then upload the edited Word file.The other is to type a separate document with your pseudocode and submit the newly created document. Make sure your pseudocode includes the problem descriptions. You get to pick your own poison. You DO NOT need to create C++ source code files for this assignment. Remember pseudocode is intended to be a description/roadmap for your program. Keep it simple but include enough information to define your plan. It is not supposed to look like code. Use the template sections. Purpose: Don’t just repeat the problem description. Think in terms of HOW you are going to do the job. Input: What values (if any) do you need from the user. You can also include known/defined values such as PI. Processing: Describe what processing/calculations need to be done Output: Results to be output. Text and/or calculated values.
Personal Reflection
Need help on Reflection.
responsephp
refer to the attached document
access control
Assignment Requirements
Read the worksheet named “Biometric System Evaluation” and address the following:
Using what you have learned about the biometric method, identify the correct advantages and disadvantages of each listed biometric type.
Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.
Exp22_PowerPoint_Ch03_Cumulative_Bryce_Adventure_Camp
Exp22_PowerPoint_Ch03_Cumulative_Bryce_Adventure_Camp
Exp22 PowerPoint Ch03 Cumulative Bryce Adventure Camp
PowerPoint Chapter 3 Cumulative – Bryce Adventure Camp
Project Description:
Bryce Adventure Camp is a successful outdoor retreat dedicated to the appreciation of the splendor and inspiration of nature for good health. The operation has been so successful in its two years of operation that the owners opened retreats in two additional locations. They now want to open another retreat so even more people can enjoy the exhilaration of nature in magnificent settings. They are meeting with officers of a venture capital corporation, that offers funding for unique opportunities. The representatives have asked for an overview of Bryce Adventure Camp’s philosophy, services and activities, sales for this year and last year, a year-to-year comparison, and charts showing the increase. The owners of Bryce Adventure Camp asked you for help in preparing the presentation for the meeting.
Start PowerPoint. Download and open the file named Exp22_PPT_Ch03_Cumulative_BryceAdventureCamp.pptx. Grader has automatically added your last name to the beginning of the filename.
Insert a Title and Content   layout slide after Slide 1. Type Agenda in the Title Placeholder. Insert a Vertical Box List SmartArt   graphic in the content placeholder.
 
  Type the following in the Text pane:
 
Highlights   and Activities
 Lodging
 Income
 Revenue
 Balance   Sheet
 Assets
 Stock   Performance
 
Change the SmartArt graphic to Lined List.
On Slide 4, convert the bulleted list to a Horizontal Bullet List SmartArt graphic. Apply the Intense Effect style to the SmartArt graphic and change the color to Colored Fill – Accent 6. Change the width to 10.5″.
Create a new slide following Slide 4 using the Title and Content layout. Type Adventure Prices: $10 per voucher in the title placeholder.
On Slide 5, create a table with   four columns and seven rows in the content placeholder. Type the following   into the table:
 
  Row 1, Col 1: Adventure; Col 2: Duration; Col 3: Vouchers   Required Private;   Col 4: Vouchers   Required Group (min 3 people)
 
  Row 2, Col 1: Guided hike; Col 2: 1 hour; Col 3: 3; Col 4: 1
 
  Row 3, Col 1: Rappelling; Col 2: 2 hours; Col 3: 8; Col 4: 4
 
  Row 4, Col 1: ATV tours; Col 2: 2 hours; Col 3: 10; Col 4: 4
 
  Row 5, Col 1: Fitness classes; Col 2: 1 hour; Col 3: 3; Col 4: 1
 
  Row 6, Col 1: Horseback riding; Col 2: 2 hours; Col 3: 6; Col 4: 2
 
  Row 7, Col 1: Zip line; Col 2: 1 ride; Col 3: 1
 
Note: the last entry in the last column is intentionally left blank.
On Slide 5, add a new row at the bottom of the table. Merge the cells in the new row. Type Camp Package: 10 Adventure Vouchers/$90 (All vouchers are non-refundable) in the new row. Set the table height to 4.7″ and the width to 11.7″. Apply the Medium Style 3 – Accent 6 table style to the table.
Make the following changes to   the text in the table on Slide 5:
 
  • Select the table and Center Vertically the text. 
   • Select the column headings and change the font size to 20 pt. 
   • Select the text in rows 2-7 of the third and fourth columns, and align   Center. 
   • Select the text in the last row, and apply Italic.
Create a new slide following   Slide 5 using the Title Only layout. Add the title Increase by   Camp. Start   Excel. Download, open, and save the file named Campprofits.xlsx. Copy the chart from the Increase by Camp   worksheet. Embed the chart using Paste Options – Use Destination Theme &   Embed Workbook on Slide 6. 
 
Change the chart colors to Colorful Palette 1. Apply the Layout 10 Quick Layout to the chart.
Size the chart to a height of 4.8″ and width of 7.8″. Position the chart horizontally at 2.3″ and vertically at 1.9″. Apply a Black, Text 1 outline to the chart with a weight of 3 pt.
Create a new Slide 7 using the   Title and Content layout. Type Top Five Reasons For Visiting Camp as the title. 
 
  Create a Clustered Bar chart with the following data:
   In cell A1, type Reason, then populate A2:B6 with the following values:
 
Location/Sight-seeing 52%
 Adventure   Opportunities 22%
 Relaxation 13%
 Children’s   Activities 8%
 Spa   and Fitness Facilities 5%
 
Change the source data to use the range A1:B6.
Make the following changes to   the clustered bar chart:
   • Apply Chart Style 12 
   • Change the colors to Monochromatic Palette 2
   • Remove the title, legend, and x-axis
   • Increase the font size of the Y-axis to 16 pt and apply Bold
   • Add Outside End Data Labels 
   • Change the font size of data labels to 16 pt and apply Bold
 
Note, Mac users apply Chart Style 13.
Save and close Exp22_PPT_Ch03_Cumulative_BryceAdventureCamp.pptx. Submit the file as directed.
Discussion Board
The bike shop that you outfitted with hardware, software, and operating system back in an earlier assignment has grown. Now the owners need you to use your knowledge of data storage and databases to manage this growth. Prepare a report in which you explain to the owner the options for data storage, database development, and data security and recommend an overall solution for the organization.
In your report, address the following:
- Explain the differences between in-house data storage and cloud storage.
 - Describe the advantages of each storage method for a business organization.
 - Explain the differences between databases and spreadsheets. 
- Be sure to discuss what makes a database relational.
 
 - Recommend a solution for data storage and system development. 
- Support your recommendation based on a critical analysis of alternatives. For example, how would a database help to better manage the bike shop’s inventory, payroll, pricing, and expenses over spreadsheets?
 
 - Describe best practices for database security and data backups.
 - Cite authoritative sources to support assertions.
 - Organize the report so ideas flow logically with smooth transitions.