Cybersecurity

 

Google Dorking

Google dorking, or using advanced Google search techniques to find sensitive information, has been likened to “online dumpster diving.” Use the Internet to research Google dorking. First, use the Internet to determine how the following advanced Google search engine operators are used: allintext, allintitle, allinurl, cache, filetype, inanchor, intest, intitle, link, site, +, |, and *. Then, use at least five of the operators to create potential Google dorking searches. Finally, try out your searches to see if they are effective. How easy is it for a threat actor to use Google dorking? How can users and organizations combat this? List your Google dorking searches, the results, and the defenses that should be used against it. Write a one-page paper on your activity. 

Programming

Research and development on autonomous navigation and path planning using ANFIS or any AI technique and using sensor fusion of LiDAR and Camera for a car-like mobile robot.
remaining instructions in the attached filed

project management

  

1. Create your project schedule in Microsoft Project. Include tasks, durations, dependencies, resources, and a Gantt chart.

2. Develop a budget in Microsoft Project or Excel that includes the cost for each task, as well as subtotals for each of the five phases and a total cost.

3. Add references to your project budget and schedule, in the Project Plan Template.

Submit your final project plan, including your budget and schedule 

Virtuous Business in Global marketing

Part 1 

  1. Write an initial response to the following key question(s) or prompt(s):
    1. In Workshop Two, you will be exploring ways to improve global supply chains through transparency. Refer the below article Tiffany, Unilever Create New Standard for Supply Chain.

https://sustainablebrands.com/read/supply-chain/tiffany-unilever-create-new-standards-for-supply-chain-transparency

  1. What are ethical pitfalls in the global supply chain that Tiffany is seeking to avoid?
  2. What are Tiffany’s ethical challenges mediation strategies that your company should consider before deciding to initiate a low-cost country outsourcing model?
  3. Why did you select these challenges and their mediations? Provide a one or two sentence explanation for each.

Part 2 

Ezekiel 34:18 (ESV) Is it not enough for you to feed on the good pasture, that you must tread down with your feet the rest of our pasture; and to drink of clear water, that you must muddy the rest of the water with your feet?

Elaborate on the above topic with few major points

Need part 1 and part 2 answered with two each references and part 1 (250-300 words) and part 2 (100 words)

Correlation1

correlation of course and Job

Course name  

Data Analysis 

EDD 771 

 

Course Objectives

           Doctoral candidates will… 

  • Candidates will identify and apply statistical methods of analysis that are appropriate for the data being used. 
  • Candidates will read and comprehend statistical results and discussions. 
  • Candidates will distinguish between good and poor data interpretation. 
  • Candidates will describe the results of statistical analyses in clear, accurate language. 

Course Requirements 

  1. Readings: Prior to each class period, chapters in the text and/or journal articles will be assigned for reading.   
  2. Article Reflection: Each week, students will apply lesson concepts to current peer reviewed research and comment on the process.  
  3. SPSS Activities: These are practice activities embedded within the Chapter PDF slides to be completed as students learn the material.  
  4. SPSS Assignments: Several activities that utilize the statistical software, SPSS, will be given through the course of the class.  These may begin during class, but require completion at a later time 

GO19_AC_CH03_GRADER_3G_AS – Workshop Rooms 1.0

  

GO19_AC_CH03_GRADER_3G_AS – Workshop Rooms 1.0

  

In this project, you will use a database to track workshops and the rooms where the workshops are held at a college. You will create forms, add and delete records by using a form, filter records, and modify a form in Layout view and Design view. You will create reports, modify a report in Layout view and Design view, group data in a report, and keep grouped data together for a printed report.

     

Start Access. Open the file Student_Access_3G_Workshop_Rooms.accdb downloaded with this project.
 

  View the relationship between the Rooms table and the Workshops table. One   room can be used for many workshops. Close the Relationships window.

 

Use   the Form tool to create a form based on the Workshops table. Save the form as   Workshop Form and then display the form in Form   view. Using the Workshop Form, add the following new record to the underlying   Workshops table:

  

Field

Data

 

Workshop ID

W-5034

 

Workshop Name

Job Portfolio

 

Room ID

RM-208

 

# Registrations

23

 

Workshop Category

Guide to Finding a     Job

Assignment 300 words

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.