Please go through the attached document for full assignment details
Cloud_Computing_week_11
Discussion Topic:
1. Describe how web pages differ from apps and how apps differ from widgets.
2. Discuss why developers say that HTML5 will drive mobile solutions.
Paper:
write a paper on mobile cloud computing. The following are the items to discuss in the paper:
- Define and describe the mobile web.
- Describe the different generations of cell phones.
- Describe how smartphones differ from ordinary cell phones.
- Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.
Paper requirements:
- Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
- Minimum of four (4) references
- Format your paper consistent with APA guidelines
- When submitting the assignment, please ensure you are submitting as an attached MS Word document.
What is Objective
- How do the different views look at the problem of objectivity?
Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more .
Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more .
Strategic IT Exam
Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command
Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
Question 3 of 20 5.0 Points
__________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
Question 9 of 20 5.0 Points
__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
Question 14 of 20 5.0 Points
A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
Question 20 of 20 5.0 Points
Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring
Final project – Ethical hacking
Security practitioners suggest that key IoT security steps include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment – Project Plan (Deliverables):
Address each of the FOUR IoT security steps listed above in terms of IoT devices.
Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
iyktyrfuty6u
APA 001
Automation Testing Script using Celenium Java
Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link
1. Selenium WebDriver – Page Object Model:
1. Visit amazon.com Page
2. Search for Book ‘qa testing for beginners’
3. Click on 1st item in the listed results.
4. Before Click on add to cart Add to Cart asset price from Step3.
5. Click on Add to Cart.
6. Before Click on Proceed to Checkout asset price from Step3.
7. Click on proceed to checkout
5. On the checkout page assert price from Step3.
2. API automation using Rest-assured or Karate API Test
1. Use any 2 methods(Get, and Delete) from end-points listed in
http://dummy.restapiexample.com/
2. Perform assertions for
– Get & Delete – Status code to be Successful.
– Get – Return specific Employee details(Any).
– Delete – “message”: “successfully! deleted Records”.
essay
In this assignment, you will explore current opportunities for entry-level, non-coding jobs within the revenue cycle.
- Use at least two (2) different, credible online sources to find entry-level, non-coding job openings in the revenue cycle.
- Locate at least two (2) current openings for an entry-level, non-coding job in the revenue cycle.
- In a Microsoft Word document, create an organized list that clearly communicates the following details for each of the job openings:
- Job Title and Description
- Link to Job Posting
- Requirements/Preferences for Job Candidate’s:
- Training
- Education
- Work Experience
- Credentials/Certifications
- Salary Information (if listed, otherwise state “Not Provided”)
- Explain why you find the job interesting
PC BUILD AND MANUAL PART 1
1. The PC Build assignment has specific requirements such as using IEEE citations. For most, this will be the first and possibly only time you are required to utilize IEEE standards/formatting. I do not agree with using IEEE due to the remainder of your curriculum at almost any level at any institution utilizing APA formatting. However, no matter what I think, UMUC sets the rules and we must adhere to them, no questions asked. Some other requirements include:
o The PC Build assignment has minimum standards as part of the grading rubric that must be followed as well. You must include your name in the file name you submit in LEO.
o You must include a proper title page.
o Citations must be shown for pictures, paragraphs, and as part of your reference section at the end of the build.
o You must meet the criteria listed for each item in the build.
o You must break the assignment up and submit it as three separate assignments, and not one large one.
o You must include brand and model recommendations for each component so that you can demonstrate a mastery of the material.
o You may resubmit each PC Build draft once, and each must be submitted within 7 days of your original submission. For example, if you submit PC Build Draft 1 on 10/15, you may make changes based on my feedback and resubmit no later than 10/22; after that only your original grade will count.
o NOTE: NO late work is accepted, so you cannot submit or resubmit after the course ends, no exceptions.
2. Failure to follow the instructions above will result in assignments being returned ungraded, or failing grades.
PC Build and Manual (Parts 1-3)
Overview
–
You will provide a comprehensive and detailed manual documenting the step-by-step process for building a computer using the components provided in LabSim 14.1 and for the Video Card only, use information in LabSim 3.12: “Build a Computer from Scratch.” The manual will be used by entry-level technicians, so it should be clear, concise, and formatted using IEEE citation style, with screenshots of each step from LabSim 14.1 and for Video Cards only, use LabSim 3.12. Your manual should be similar to step-by-step instructions on How to Change the Oil in Your Car. Note carefully how in this example, not only is each step described individually, and in detail, but also there is a visual representation of each step. You should model your submission along the same lines. Keep in mind that your manual will be used as a guide for new technicians.
The manual should not document how to complete a LabSim section; rather, it should provide detailed instructions on how to build an actual computer for a potential customer:
“Drag the motherboard from the shelf to the motherboard plate in the system case.”
“After properly grounding yourself, pick up the motherboard and place it inside the area where the motherboard will sit in the case. Align the screw holes on the motherboard with the screw holes on the case. Use appropriate screws to mount the motherboard inside the case, making sure not to scratch the surface of the motherboard.”
To learn about the required parts which must be present in your submissions, and to learn how you will be assessed on this assignment, please take a moment to review the rubrics.
The manual will be submitted in three separate parts. Part 1 addresses Sections 1-5 of the overall manual, Part 2 addresses Sections 6-10, and Part 3 addresses Sections 11-12.
PC Build & Manual Part 1:
1. Workspace Preparation (LabSim 2.0)
2. Installing Motherboard (LabSim 3.3)
3. Installing Power Supply (LabSim 3.2)
4. Installing CPU (LabSim 3.5)
5. Installing RAM (LabSim 3.7/3.8)
Computer Requirements
–
· use the motherboard provided on the shelf
· appropriate power supply that support the motherboard
· fastest processor possible (available on the shelf and compatible with the motherboard)
· maximum memory possible in dual channel mode
· single hard drive
· single CD-DVD drive
· single video card
Manual Sections
–
In addition to including the sections listed below, your manual should
· address the environment in which the computer build will take place. For example, what are the best practices when working in a carpeted room?
· not use computer jargon. Although the manual will be used to train new technicians, it may also be used by someone with limited computer knowledge, so the manual must be easy to understand.
· include explanations on methodology. For example, why is it important to use an antistatic grounding bracelet when working with the computer? Or why is it important to install memory sticks in pairs?
The 12 sections of the overall manual are as follows:
1. Workspace Preparation (LabSim 2.0)
2. Installing Motherboard (LabSim 3.3)
3. Installing Power Supply (LabSim 3.2)
4. Installing CPU (LabSim 3.5)
5. Installing RAM (LabSim 3.7/3.8)
6. Installing Hard Drive (LabSim 5.2)
7. Installing Optical Drive (LabSim 5.3)
8. Installing Video Card (LabSim 3.12)
9. Connecting Monitors, Keyboard, and Mouse (LabSim 4.0)
10. BIOS Configuration (LabSim 3.10)
11. Installing Windows 10 (LabSim 10.3)
12. Configuring Critical Windows Features (LabSim 9.0, 10.0, 11.0, 12.0 and 13.0)