Submit your Research Topic

 

You are only submitting a topic for Approval at this stage. YOU ARE NOT SUBMITTING THE PAPER. A few details about your research paper:

1. You can work individually or in pair. The pair will get the same grade but the expectation is higher.

2. I rarely reject the topic you picked. I suggest you start working on your project immediately after you submit the topic

3. Your paper must be from 6 – 10 pages excluding the required pages like title page, menu and so on.

4. The paper must consists of 4 sections – Introduction. Literature Review, Details and Conclusion

C++ homework project

(1) Learn to create class structure in C++

(2) Create an array of objects in C++

(3) Search and perform operations on the array of objects

Project Description:

The input csv file for this project consists of rows of data that deals with COVID-19 cases and deaths per day for each county in every state in the United States. Here is an example,

date,county,state,fips,cases,deaths

2020-01-21,Snohomish,Washington,53061,1,0

2020-01-22,Snohomish,Washington,53061,1,0

2020-01-23,Snohomish,Washington,53061,1,0

For the purposes of this project, we will assume that the following are char* data types: date, county, and state. FIPS (unique identifier for each county) along with cases and deaths are int data types. Please note the comma delimiter in each row. You need ­­­to carefully read each field knowing that you will have a comma.

You will use redirected input (more later) to read an input txt file that contains the following:

counts  //number of data entries in the csv file

Filename.csv  //this is the file that contains the covid-19 data

Command  //details of what constitutes a command is given below

Command

Command

….

Your C++ program will read the counts value on the first line of the txt file, which represents the number of data entries in the csv file. (Note – the first line of the csv file contains descriptive variable fields, so there will be a total of [number of data entries + 1] lines in the csv file). Then, on the second line, it will read the Filename.csv and open the file for reading (more on how to do this in C++). After you open the file, you will read the data from each row of the csv file and create a COVID19 object. The COVID19 class is given below. You need to implement all of the necessary methods.

class COVID19 {

protected:

char* date;

char* county;

char* state;

int fips;

int cases;

int deaths;

public:

COVID19 (); //default constructor

COVID19 (char* da, char* co, char* s, int f, 

 int ca, int de); //initializer

display ();

//write all accessors and other methods as necessary

};

After your write the above class you will write the following class:

class COVID19DataSet {

protected:

COVID19* allData;

int count; //number of COVID19 objects in allData

int size; //maximum size of array

public:

COVID19DataSet (); //default constructor

COVID19DataSet (int initSize);

void display ();

void addRow (COVID19& oneData);

int findTotalCasesByCounty (char* county, char* state); 

int findTotalDeathsByCounty (char* county, char* state);

int findTotalCasesByState (char* state);

int findTotalDeathsByState (char* state); 

int findTotalCasesBySateWithDateRange (char* state,

char* startDate, char* endDate);

int findTotalDeathsBySateWithDateRange (char* state,

char* startDate, char* endDate);

~COVID19(); //destructor

//other methods as deem important

};

The structure of the main program will be something like this:

#include

using namespace std;

// Write all the classes here

int main () {

int counts; // number of records in Filename.CSV

int command;

COVID19 oneRow;

//read the filename, for example, Filename.csv

//open the Filename.csv using fopen (google it for C++ to find out)

//assume that you named this file as myFile

//read the first integer in the file that contains the number of rows

//call this number counts

COVID19DataSet* myData = new COVID19DataSet (counts);

for (int i=0; i < counts; i++) {

//read the values in each row

//use setters to set the fields in oneRow

(*myData).addRow (oneRow);

} //end for loop

while (!cin.eof()) {

cin >> command;

switch (command) {

case 1: {

//read the rest of the row

(*myData).findTotalCasesByCounty (county, state);

break;

 }

case 2: {

 //do what is needed for command 2

 break;

 }

case 3: {

 //do what is needed for command 3

 break;

 }

case 4: {

 //do what is needed for command 4

 break;

 }

case 5: {

 //do what is needed for command 5

 break;

 }

case 6: {

 //do what is needed for command 6

 break;

 }

default: cout << “Wrong commandn”;

} //end switch

} //end while

delete myData;

return 0;

}

Input Structure:

The input txt file will have the following structure – I have annotated here for understanding and these annotations will not be in the actual input file. After the first two lines, the remaining lines in the input txt file contains commands (one command per line), where there can be up to 6 different commands in any order with any number of entries. The command is indicated by an integer [1 to 6] and can be found at the beginning of each line.

counts // Number of data entries in the csv file 

Covid-19-Data-csv  // Name of the input file that contains the actual Covid-19 data by county and state

1 Cleveland, Oklahoma //command 1 here is for findTotalCasesByCounty

1 Walla Walla, Washington 

1 San Francisco, California

1 Tulsa, Oklahoma

2 Oklahoma, Oklahoma //command 2 here is for findTotalDeathsByCounty

2 Miami, Ohio

2 Miami, Oklahoma

3 Oklahoma //command 3 here is for findTotalCasesByState

3 North Carolina

4 New York //command 4 here is for findTotalDeathsByState

4 Arkansas

5 Oklahoma 2020-03-19 2020-06-06 //5 here is for findTotalCasesBySateWithDateRange

6 New York 2020-04-01 2020-06-06 //6 here is for findTotalDeathsBySateWithDateRange

Redirected Input

Redirected input provides you a way to send a file to the standard input of a program without typing it using the keyboard. To use redirected input in Visual Studio environment, follow these steps: After you have opened or created a new project, on the menu go to project, project properties, expand configuration properties until you see Debugging, on the right you will see a set of options, and in the command arguments type “< input filename”. The < sign is for redirected input and the input filename is the name of the input file (including the path if not in the working directory). A simple program that reads character by character until it reaches end-of-file can be found below.

#include

using namespace std;

//The character for end-of-line is ‘n’ and you can compare c below with this 

//character to check if end-of-line is reached.

int main () {

char c;

cin.get(c);

while (!cin.eof()) {

cout << c;

cin.get(c);

}

return 0;

}

C String

A string in the C Programming Language is an array of characters ends with ‘’ (NULL) character. The NULL character denotes the end of the C string. For example, you can declare a C string like this:

char aCString[9];

Then you will be able to store up to 8 characters in this string. You can use cout to print out the string and the characters stored in a C string will be displayed one by one until ‘’ is reached. Here are some examples:

0

1

2

3

4

5

6

7

8

cout result

Length

u

s

e

r

n

a

m

e

username

8

n

a

m

e

name

4

n

a

m

e

1

2

3

4

name

4

(nothing)

0

Similarly, you can use a for loop to determine the length of a string (NULL is NOT included). We show this in the following and also show how you can dynamically create a string using a pointer

char aCString[] = “This is a C String.”; // you don’t need to provide

// the size of the array

// if the content is provided

char* anotherCString; // a pointer to an array of

// characters

unsigned int length = 0;

while( aCString[length] != ‘’)

{

length++;

}

// the length of the string is now known

anotherCString = new char[length+1]; // need space for NULL character

// copy the string

for( int i=0; i< length+1; i++)

 anotherCString[i] = aCString[i];

 cout << aCString << endl; // print out the two strings

cout << anotherCSring << endl;

delete [] anotherCString; // release the memory after use

You can check http://www.cs.bu.edu/teaching/cpp/string/array-vs-ptr/, other online sources or textbooks to learn more about this.

Output Structure

Stay tuned for the exact format in which the output of your program should be formatted. For now, it is recommended to start working on reading in the input files, storing the data, and accessing the data based on the given commands.

Constraints

1. In this project, the only header you will use is #include and using namespace std.

2. None of the projects is a group project. Consulting with other members of this class our seeking coding solutions from other sources including the web on programming projects is strictly not allowed and plagiarism charges will be imposed on students who do not follow this.

Rules for Gradescope (Project 1):

1. Students have to access GradeScope through Canvas using the GradeScope tab on the left, or by clicking on the Project 1 assignment submission button.

2. Students should upload their program as a single cpp file and cannot have any header files. If, there are header files (for classes) you need to combine them to a single cpp file and upload to GradeScope.

3. Students have to name their single cpp file as ‘project1.cpp’. All lower case. The autograder will grade this only if your program is saved as this name.

4. Sample input files and output files are given. Your output should EXACTLY match the sample output file given. Please check the spaces and new lines before your email us telling that the ‘output exactly matches but not passing the test cases’. Suggest using some type of text comparison to check your output with the expected.

5. Students need to have only one header file(iostream) while uploading to GradeScope. You cannot have ‘pch.h’ or ’stdafx.h’.

6. Students cannot have ‘system pause’ at the very end of the cpp file.

Journal Assignment

Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

Chapter-1: The Trust Protocol

 

Journal – The Blockchain Economy

 In chapter 1, the author presents several use cases for blockchain technology.   Describe the use case that aligns most closely with your job role that you would like to hold after finishing your degree program, and how blockchain technology may affect those job functions.  

 

Journal Structure:

  • Title
  • Introduction
  • Content
  • Conclusion
  • Reference list 

You should include a minimum of 500 words APA format for this assignment. 

PLw2

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal.  Include at least one quote enclosed in quotation marks and cited in-line.

IT345 7 discussion

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources

 

Topics:

  • How well can we predict the consequences of a new technology or application?
  • Who should make the decision for a business on what technology the adopt?
  • What does the term “need for reasonable judgement” mean?
  • Do sites like Wikipedia hold any credibility?

Cybersecurity for OPEN Data Initiatives

  

Project 1: Cybersecurity for OPEN Data Initiatives

Scenario:

A federal agency has asked your cybersecurity consulting firm to provide it with a research report that examines the issues of usefulness and security in regards to Open Data. The report is intended for a group of executives at the agency who are currently involved in converting paper-based data sets to digital formats for distribution via digital government websites. This report is particularly important as the agency head has received inquiries from Congressional staff members who are conveying concerns that various elected officials have about potential issues with the integrity and authenticity of downloaded data. The agency’s executives were also surveyed and they provided the following security-related items in a list of concerns for the planned conversion to an Open Data delivery method:

a. Confidentiality / Privacy (ensuring proper redaction)

b. Data integrity

c. Data authenticity

d. Availability (reliability) of the Open Data service (website, network infrastructure)

e. Non-repudiation of data sets

Research:

1. Read / Review the weekly readings. Pay special attention to EO 13800 and the Federal Cybersecurity Risk Determination Report and Action Plan.

2. Research the federal government’s OPEN Data mandate. Here are some sources that you may find useful:

a. Open Data Policy-Managing Information as an Asset – OMB Memorandum M-13-13 (PDF file is in the week 2 readings). This Memorandum includes significant discussion of security issues and policy solutions including references to FIPS 199 and NIST SP-800-53)

b. U.S. Open Data Action Plan (see file us_open_data_action_plan.pdf in week 2 readings).

c. https://www.data.gov

d.  https://www.data.gov/privacy-policy#data_policy   

e. Guidance for Providing and Using Administrative Data for Statistical Purposes – OMB Memorandum M-14-06 (PDF file is in the week 2 readings). This Memorandum includes discussion of privacy and security issues arising from the use of information collected for statistical purposes (e.g. the Census, employment, economic data, etc.).

3. Research how government information, e.g. OPEN Data, is used by businesses and the general public. Here are some sources to get you started:

a. 7 Ways Companies Are Using the Government’s Open Data http://mashable.com/2013/05/30/7-ways-government-open-data/   

b. Government open data proves a treasure trove for savvy businesses http://www.computerworld.com/article/2488683/business-intelligence-government-open-data-proves-a-treasure-trove-for-savvy-businesses.html 

c. Open data: Unlocking innovation and performance with liquid information http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information 

4. Research the issues that can arise when businesses depend upon the confidentiality, integrity, availability, authenticity, and non-repudiation of government provided Open Data. Suggested sources include:

a. Authenticating Digital Government Information http://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1954&context=law-faculty-publications

b. Legal and Institutional Challenges for Opening Data Across Public Sectors http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430297&site=eds-live&scope=site 

c. Risk Analysis to Overcome Barriers to Open Data http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=poh&AN=93550378&site=eds-live&scope=site 

d. Reconciling Contradictions of Open Data Regarding Transparency, Privacy, Security and Trust http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=97430299&site=eds-live&scope=site 

5. Find five or more best practice recommendations for ensuring the security (confidentiality, integrity, availability, authenticity, non-repudiation) of information provided by the federal government through its OPEN Data initiative.  N.B. For the purposes of this assignment, you may treat “licensing” concerns as an “availability” issue.

Write:

Write a five to seven page research report which includes a summary of your research. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your summary must include the following:

1. An introduction or overview of OPEN Data which provides definitions and addresses the laws, regulations, and policies which require federal agencies to identify and publish datasets and information collections. Discuss the role of the executive branch’s Open Data / Open Government policies in making data available via Data.Gov. This introduction should be suitable for an executive audience.

2. A separate section in which you discuss the value (benefits) of Open Data. This section should provide several specific examples of how government provided Open Data is being used by businesses and the general public. 

3. A separate section in which you address security issues (confidentiality, integrity, availability, authenticity, and non-repudiation) which can impact the availability and usefulness of Open Data. Discuss how these issues are currently being addressed by the federal government. Provide examples of issues and mitigations or solutions.

4. A section in which you address best practice recommendations for ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of Open Data. Your recommendations should address use of the NIST Cybersecurity Framework and security & privacy controls from NIST SP 800-53.

5. A separate section in which you summarize your research and recommendations.

Submit For Grading 

Submit your white paper in MS Word format (.docx or .doc file) using the OPEN Data Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5- to 7-page research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. See Course Resources > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 

Cloud computing

A three-tier web application architecture has been generically defined as the presentation, business logic, and data storage tiers. However, Amazon Web Services defines the three-tier web application architecture as the web, application, and storage/database tiers.

Write a paper comparing the generic three-tier web application architecture to that applied by Amazon Web Services.

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.Your paper should be at least 500 words in length using good grammar.

200 words

 

How Does The Artwork Of Jeff Koons Relates To Today’s Media Culture

200 words only