Excel Worksheet

  

A window blind company owner never knew how exactly how much material he needed for any single project. He would estimate the amount and put that figure into Excel. When he estimated too much, it cost him money for materials he didn’t use. When he estimated too little, it delayed the project’s completion because he had to get more material from his supplier. Plus, he used Excel as if it was just a paper chart.

Solution: Worksheet Creation

· Use Excel to create a worksheet for each order as part of a workbook for orders to his suppliers. 

· After all the individual orders are entered in the workbook as worksheets, the new Excel workbook calculates how much material was needed for was needed for the entire group of orders. 

· The worksheet should demonstrate savings for the company in time and money because the owner could order the right amount of material from his suppliers and allocate it correctly to the customers’ jobs.

Data Mining Techniques in Transportation safety (National Highway Traffic Safety Administration – NHTSA)

For this project, you will write a 10-page APA formatted paper followed by a PowerPoint Presentation on a how a particular organization that has experienced some type of Security or Privacy Challenges around Data. You will explain the following: 1) Why the challenges exist, 2) What is the general approach to solve the challenges, 3) What kind of data tools or databases do you plan to use, and 4) Finally what risk concerns were addressed by solving the Challenges. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures. 

i m looking for research paper and powerpoint PPT 

assignment

  

· Pick two (2) charts of different chart type (Categorical, Hierarchical, Relational, Temporal and Spatial) [Do not choose bar, pie and line charts)

· For each use a tool that can be used to create the selected chart. Use a different tool to create each chart.

· For each chart, write how to read the chart and what to look for.

Delivery: A word file with the following information:

1. 2 Charts

2. 2 Screenshots of the charts in development with the tools selected.

3. Paragraphs detailing how to read each chart and what to look for.

Analyzing and Visualizing Data

  

  • Outline for Assignment 1
    • Refer to the Documenting Research Guide for assistance in organizing your research and developing your outline.
    • You can find this guide in the Useful Information folder, as well.

Outline for Assignment 1

Using the Documenting Research Guide and the assignment 1 instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards in APA 7 for all citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template. The assignment 1 instructions are at the bottom of this content folder.

Submit your outline on or before the due date.

By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

vulnerable dependencies by using two different SCA tools “Snyk” and “Dependency-Check

 My task for this assignment is to use two different SCA tools “Snyk” and “Dependency-Check” to find vulnerable dependencies in open-source projects. Each tool requires a different setup method that can be found in the online documentation of the tool. You are required to follow the instructions in the online documentation to set up the environment, perform a scan, and prepare reports in a useful format. The ability to use online documentation is part of this assessment.

Required Tools

  • Ubuntu Linux VM
  • Snyk
  • Dependency-Check

Part 1

For Part 1 of this assignment, you will be using Snyk to scan a customized ”Gemfile.lock” file (also attached below) that contains a list of modules used by an open-source Ruby application and identify vulnerable dependencies. Snyk is a security tool that enables you to find and fix known vulnerabilities in open-source software. Watch this video to learn more about Snyk:

  • Create a free account with Snyk
  • Setup Snyk CLI on your Linux VM. For instructions, check the “CLI – Installation” page. 
  • Create a directory called “CYB505-Snyk” and copy ”Gemfile.lock” there.
  • Change to the newly created directory and run a test using Snyk CLI (refer to installation documentation for more details).
  • Login back to Snyk portal and observe the results. A new project should have been created by executing the test from the CLI. It will show you a summary of the findings. Clicking on the project name takes you to the finding details.
  • Summarize the findings in the format of a report. See the “Deliverables” section below.

 Part 2

For Part 2, you will be using Dependency-Check, which is an open-source SCA tool from OWASP.  You are required to install this tool on your Linux VM and run a test on another open-source tool from OWASP, Juice Shop.

To complete Part 2 of the assignment, follow the instructions:

  • Create a folder on your Linux VM called “CYB505-DC”.
  • Download OWASP Juice Shop (if you have not already done so for Discussion 7.1). Unzip and copy it to the newly created folder.
  • Download OWASP Dependency Check binaries zip file from the following link: https://bintray.com/jeremy-long/owasp/dependency-check under downloads.
  • Extract the zip file and look for the executable script called “dependency-check.sh” in the bin folder.
  • Run the scan and output the results into an HTML file. Use the command help option(“.dependency-check -h”) for guidance. Hints: Check out -f and -o arguments and ensure that your command line is in the directory with the .sh file.
  • Summarize the findings in the report format. See the “Deliverables” section below.

Deliverables

Submit a zip file that contains the following three files:

  1. A single assessment report PDF file that contains findings from both scans. The report should include:
  • An executive summary that summarizes the findings for the upper-management audience using limited technical knowledge.
  • Findings
    • Vulnerability overview
    • Detailed dependencies paths
    • Risk rating
    • Remediation recommendations
    • Your analysis of the proposed remediation method, ONLY for “High” rated findings. I.e., if it is possible to do, what are the challenges, etc.
  • You are free to choose the report format and headings, but points are allocated for a professional-looking, industry-standard level report. The report should be readable and eye-catching, yet accurate and informative for the technical audience.
  • PDF export of the Snyk report
  • PDF export of the Dependency-Check HTML report.

week 4 individua;

  

Length: Minimum of 600 words

This assignment should be in APA format and have to include at least two references.

GLB/Ethics

  

Chapter 3 – Quiz 3

Instructions:  There are two (2) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 3) shown in your course syllabus.  Please provide appropriate responses in essay form for both.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first two (2) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

1. Based on what you have learned in this chapter and using appropriate components, properly construct an argument to: (1) support or refute the view that all undergraduate students should be required to take a course in cyberethics; and (2) apply the seven steps (in Section 3.8) to your argument.  Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (comprehension)

2. Using appropriate components construct an argument for or against the view that privacy protection should be improved in e-commerce transactions.  Next evaluate your arguments against the rules for valid, inductive, and fallacious arguments.  Does your argument contain any of the common or “informal” fallacies discussed in Section 3.9?  If so, elaborate. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (knowledge)

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

        

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

        

Maximum grade                                                                         100                   100

Data Encryption Standard

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

Discussion Emerging threats

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.