SE493 week 4

Apa format 200 words each questions and citations 

Question 1

Pease read chapter 7 textbook and library resources and reputable journals and review PP slides chapter 7 pages 53 to 57 and in your own word discuss your understanding of:

What is an Open Source Software? What is the idea behind open source software?

What are open source issues and why more product companies are using an open source approach to development?

If you are in charge of developing a new software application will you use some open source components in your software application, and why?

Question 2 

Assignment Description

Please read chapter 6, what is Layered Architecture? When used? Advantages and Disadvantages of Layered Architecture?

Hint: You can use Unix as an example of layered architecture

CBSC610: Case Study 2.1

 Case Study:

You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least two peer reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

risk register

Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

Complete the following tasks:

  1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
  2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
  3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.

Submit your risk register with the response strategy and explanation.

Operating System

To simplify our explanations about magnetic disk access speeds, in this chapter, we use rotation speeds of 3,600 rpm and sustained data transfer rates on the order of one megabyte per second. However, current technology has pushed those numbers higher. Research current rotation speeds and data transfer rates for magnetic disks. Cite your sources, dates of the published research, and the type of computer (laptop, desktop, and so on) that uses the disk.

Ransomware Attacks

 

You work as the head of the IT department for a local hospital. Another hospital in your state was recently the target of a ransomware attack. Fearing a similar attack, senior management of your hospital has asked you if your hospital is prepared for such an attack.

They have requested a 1- to 2-page memo that describes the hospital’s protections against a ransomware attack. In your memo, include a chart with columns for Authorization, Authentication, Roles, and Mitigation. In each column, list related security protections the hospital should use to protect against ransomware attacks. Additionally, based on your chart, provide a final summary on how the hospital can mitigate the risk of a ransomware attack and how the hospital can respond if it does face such an attack.

Write a 1- to 2-page memo.

Include the chart in your memo.

java coding

A Fighter/Mage is one of the stronger multi-classes at the end of Baldur’s Gate 2, the seminal role-playing video game (cRPG) developed by BioWare. For character creation of a Fighter/Mage, the highest dice rolls should be allocated to strength (STR), intelligence (INT), dexterity (DEX), and constitution (CON) – in that order – and the lower statistics should go into wisdom (WIS) and charisma (CHA). Fill in code at the three (3) places marked YOUR CODE HERE. Upload your program.

 

import java.util.ArrayList;

import java.util.Collections;

import java.util.List;

import java.util.Random;

public class Main {

public static class dndCharacter {

private String name;

private int STR;

private int INT;

private int DEX;

private int CON;

private int WIS;

private int CHA;

public dndCharacter(String myName) {

name = myName;

List statList = new ArrayList();

// get 6 random stats

for (int i = 0; i < 6; i++) {

statList.add(characterStat());

}

// order statList low to high

Collections.sort(statList);

// access elements with statList.get(index) for index f

rom 0 to 5

// assign the character statistics high to low STR INT

DEX CON WIS CHA

// with values from the ordered statList

// YOUR CODE HERE

}

public String about() {

String aboutMe = “”;

aboutMe += “Hi! My name is ” + name+”n”;

aboutMe += “I am a Fighter/Mage”+”n”;

if (STR + INT + DEX + CON + WIS + CHA > 6 * 9) {

aboutMe += “I am rather good at questingn”;

aboutMe += “Strength: ” + STR+”n”;

aboutMe += “Intelligence: ” + INT+”n”;

aboutMe += “Dexterity: ” + DEX+”n”;

aboutMe += “Constitution: ” + CON+”n”;

aboutMe += “Wisdom: ” + WIS+”n”;

aboutMe += “Charisma: ” + CHA+”n”;

} else {

aboutMe += “But enough about me…”;

}

// create the correct return statement

// YOUR CODE HERE

}

static int characterStat() {

Random random = new Random();

int d1 = random.nextInt(5) + 1;

int d2 = random.nextInt(5) + 1;

int d3 = random.nextInt(5) + 1;

int d4 = random.nextInt(5) + 1;

int diceSum = d1 + d2 + d3 + d4;

int min = Math.min(d1, d2);

min = Math.min(min, d3);

min = Math.min(min, d4);

diceSum -= min;

return diceSum;

}

}

public static void main(String[] args) {

// YOUR CODE HERE

// modify myName to initialize dndCharacter

Main.dndCharacter FighterMage = new dndCharacter(“”);

System.out.println(FighterMage.about());

}

}

Cryptography

you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  You must use a minimum of  four scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 2 pages

KP- Cloud Computing

 Kavis, Michael J. (2014). Architecting the Cloud: Design Decisions for Cloud Computing
Service Models, (3rd Edition). Hoboken, New Jersey: John Wiley & Sons, Inc., ISBN-
13: 978-1118617618 

Exp19_Excel_AppCapstone_CompAssessment_Manufacturing

 

Exp19_Excel_AppCapstone_CompAssessment_Manufacturing

 

 You have recently become the CFO for Beta Manufacturing, a small cap company that produces auto parts. As you step into your new position, you have decided to compile a report that details all aspects of the business, including: employee tax withholding, facility management, sales data, and product inventory. To complete the task, you will duplicate existing formatting, utilize various conditional logic functions, complete an amortization table with financial functions, visualize data with PivotTables, and lastly import data from another source.

1

Start Excel. Download and open   the file named Exp19_Excel_AppCapstone_ComprehensiveAssessment- Manufacturing.xlsx. Grader has   automatically added your last name to the beginning of the filename. 

2

Group all the worksheets in the   workbook and fill the range A1:F1 from the Insurance worksheet across all   worksheets including the formatting. Ungroup the worksheets after the fill is   complete and ensure the Insurance worksheet is active.

3

Click cell I5, and enter a   function that determines the number of full-time employees, (FT).

4

Enter a database function in   cell I6 that determines the average salary of all full-time employees with at   least one dependent. Format the results in Accounting Number Format.

5

Enter a lookup function in cell   E5 that returns the tax deduction amount for the number of dependents listed   in the cell C5. Use   the table in range H13:I17 to complete the function. The maximum deduction is   $500.00; therefore, employees with more than four dependents will receive no   additional deductions.

6

Use Auto Fill to copy the   function down, completing column E. Be sure to use the appropriate cell   referencing. Format the data in column E with the Accounting Number Format.

7

Enter a logical function in cell   F5 that calculates employee FICA withholding. If the employee is full-time   and has at least one dependent, then he or she pays 7% of the annual salary   minus any deductions. All other employees pay 5% of the annual salary minus   any deductions. Copy the function down through column F. Format the data in   column F with Accounting Number Format.

8

Apply conditional formatting to   the range C5:C34   that highlights any dependents that are greater than 3 with Light Red Fill and Dark Red Text.

9

Click cell H10, and enter an   AVERAGEIFS function to determine the average salary of full-time employees   with at least one dependent. Format the results in Accounting Number Format.

10

Use Advanced Filtering to   restrict the data to only display full-time employees with at least one   dependent. Place the results in cell A37. Use the criteria in the range   H24:M25 to complete the function.

11

Ensure that the Facilities   worksheet is active. Use Goal Seek to reduce the monthly payment in cell B6   to the optimal value of $6000. Complete this task by changing the Loan amount in cell E6.

12

Create the following three   scenarios using Scenario Manager. The scenarios should change the cells B7, B8,   and E6.
 

Good   
  B7 = .0325
  B8 = 5
  E6 = 275000
 

Most   Likely
  B7 = .057
  B8 = 5
  E6 = 312227.32
 

Bad
  B7 = .0700
  B8 = 3
  E6 = 350000
 

  Create a Scenario Summary Report based on the value in cell B6. Format the   new report appropriately.

13

Ensure that the Facilities   worksheet is active. Enter a reference to the beginning loan balance in cell   B12 and enter a   reference to the payment amount in cell C12

14

Enter a function in cell D12,   based on the payment and loan details, that calculates the amount of interest   paid on the first payment. Be sure to use the appropriate absolute, relative,   or mixed cell references.

15

Enter a function in cell E12,   based on the payment and loan details, that calculates the amount of   principal paid on the first payment. Be sure to use the appropriate absolute,   relative, or mixed cell references.

16

Enter a formula in cell F12 to   calculate the remaining balance after the current payment. The remaining   balance is calculated by subtracting the principal payment from the balance   in column B.

17

Enter a function in cell G12, based on the payment   and loan details, that calculates the amount of cumulative interest paid on   the first payment. Be sure to use the appropriate absolute, relative, or   mixed cell references.

18

Enter a function in cell H12,   based on the payment and loan details, that calculates the amount of   cumulative principal paid on the first payment. Be sure to use the   appropriate absolute, relative, or mixed cell references.

19

Enter a reference to the   remaining balance of payment 1 in cell B13. Use the fill handle to copy the functions created in   the prior steps down to complete the amortization table. 

20

Ensure the Sales worksheet is   active. Enter a function in cell B8 to create a custom transaction number.   The transaction number should be comprised of the item number listed in cell   C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use   Auto Fill to copy the function down, completing the data in column B.

21

Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than   or equal to $4000. Otherwise, the function will display a blank cell. Use Auto   Fill to copy the function down, completing the data in column G. 

22

Create a data validation list in   cell D5 that displays Quantity, Payment Type, and Amount (in that order).

23

Type the Trans# 30038C in cell B5, and select Quantity from the validation list in   cell D5.

24

Enter a nested lookup function   in cell F5 that evaluates the Trans # in cell B5 as well as the Category in   cell D5, and returns the results based on the data in the range A8:F32.

25

Create a PivotTable based on the   range A7:G32. Place the PivotTable in cell I17 on the current worksheet.   Place Payment Type in the Rows box and Amount in the Values box. Format the   Amount with Accounting Number Format.

26

Insert a PivotChart using the   Pie chart type based on the data. Place the upper-left corner of the chart   inside cell I22. Format the Legend of the chart to appear at the bottom of   the chart area. Format the Data Labels to appear on the Outside end of the   chart.

27

Insert a Slicer based on Date.   Place the upper-left corner of the Slicer inside cell L8.

28

Use PowerQuery to connect to the   Access database Exp19_Excel_AppCapstone_Comprehensive_Inventory.accdb.   Load the Inventory table into a new worksheet named Inventory.
 

  Note, Mac users, download and import the delimited Inventory.txt file into a new worksheet named Inventory starting in cell A1.

29

Create a footer with your name   on the left, the sheet code in the center, and the file name on the right for   each worksheet.

30

Save the file Exp19_Excel_AppCapstone_ComprehensiveAssessment-   Manufacturing.xlsx. Exit Excel. Submit the file as directed.

Cybercrimes and cryptographic attacks

 

1.This week students will look at some of the  different cybercrimes, how to develop a security policy and various security and privacy regulations

Identify various cybercrimes

  • Explain various regulations on minimizing cybercrimes

Read textbook chapter 4

Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089 https://academicjournals.org/journal/JIIS/article-full-text-pdf/930ADF960210

2. students will examine some of the different types of cryptographic attacks such as those on social media platforms.

  • Identify different Cryptographic Attacks
  • Explain how attacks on social networks work

Read: Textbook: Chapters 7 and 8

Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103 https://pdfs.semanticscholar.org/9f00/15e099290d0ba1584b82517e044de1413bcc.pdf

Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices. https://arxiv.org/abs/2003.01218 There is a link to the PDF of this article in the right column of this record under Download.