Examine and analyze the principles of

  

Examine and analyze the principles of inheritance. Use the Library to get started on finding resources.

Individual Portion

Each team member should take a term and explain it. Examples should be offered for each principle. Explanations should be offered about the principle’s importance and how it relates to Java as opposed to other programming languages.

Each team member must submit their work to the Small Group Submitted File area for easy access.  

Se493 week 6

Apa format & citations 350 words each questions and no plagiarism 

Question 1

Software systems are not isolated systems but are essential components of broader systems that have a human, social or organizational purpose.

Read Chapter 10  and review Lecture slides (posted under week 5), and reputable articles/journals and List and discuss The Sociotechnical Systems Stack. 

Question 2

Please read Chapter 11 of your textbook and review Lecture slides and IGU online library and reputable journals/resources and describe and explain Good practice guidelines for dependable programming.

This program calculates the shipping charge for an item

  

This program calculates the shipping charge for an item. The program has one function named ShippingCharge that you call in the main that prints out a header and then prompts the user for the weight of the item in kilograms to be shipped. The shipping charge is calculated and printed using a constant RATE that is equal to $5.35 per kilogram. Your function requires declaring a float kg, used to store information entered from the keyboard. Place the constants, function prototypes, function code, and function calls in the appropriate files.

Physical Security Plan

Go to the Physical Security Plan Assignment Resources page.

Download the maps and save the file as FirstName_LastName_Physical_Security_Plan.

For each map, click the icons in the map key and drag them to the place on the map you believe they should be located. If you want to place an icon multiple times, you can copy it by right-clicking or selecting it and clicking CTRL+C.

Then answer the follow-up questions in the Physical Security Plan Template.

How Will My Work Be Evaluated?

As an information security professional, you must consider potential threats to the physical security of an enterprise and plan to implement controls to mitigate associated risk. The security recommendations in your three physical control diagrams demonstrate your understanding of how the physical environment and infrastructure can affect the confidentiality, integrity, and availability of information systems.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 10.1.1: Identify the problem to be solved.
  • 12.3.1: Select controls.
  • 12.3.2: Describe the implementation of controls.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.1.2: Describe the various processes that affect policies, processes, and procedures.

When you are finished, submit your Physical Security Plan Maps and Physical Security Plan by using the box below. (Note: You will upload two separate files: a PowerPoint file with the security maps and the Physical Security Plan template document with your responses to the follow-up questions.

Due Date 

Linux Shellcode Development (Based on the buffer overflow topic) Lab

– You need to submit PPT slides, a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets and/or commands followed by explanation. Simply attaching code/command or only screenshots without any explanation will not receive credits. Successful completion is required. 

-You also need to make a  Demo video should be 15 minutes (Unlisted YouTube link only) detailing all the steps of the presented attack and countermeasures. Also, power point presentation should be included in your video as well. Attack has to be demonstrated successfully to receive credit. 

-You must use this command export PS1=”F Dehghan@fdehghan:~$”  

as your first command to change the name in the  Linux terminal

Deadline: 4/30/2021

Assignment 3

Answer Questions 1, 2 and 3 on Page 427

1. Rank the values below from 1 through 15 in order of their importance to you, with 1 being most important and 15 being least important. Then work with a few classmates to compare your rankings. Add the numbers for each value to see which values are important to the group. Discuss why people ranked the values as they did. honesty justice equality compassion

recognition altruism self-sufficiency community peace freedom nature family friendship health success 

2. What value is implied by each of the following well-known sayings? For instance, the proverb “Give a man a fish and you feed him for a day; teach a man to fish and he’ll eat forever” advocates the value of education. Different strokes for different folks. A penny saved is a penny earned. Where there’s a will, there’s a way. What goes around comes around. Stop and smell the roses. 

Haste makes waste. Look before you leap. Pretty is as pretty does. 3. Discuss the values implied by these sayings from other cultures.

Even a sheet of paper has two sides. (Japanese) Bury the hatchet beneath the root of the tree. (Native American) One does evil enough when one does nothing good. (German) Shrouds are made without pockets. (Yiddish) Unjustly got wealth is snow sprinkled with hot water. (Chinese) One head cannot hold all wisdom. (Maasai)