Spr1.4

 Assignment 1

According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):

· Data acquisition: Gathering the raw material

· Data examination: Identifying physical properties and meaning

· Data transformation: Enhancing your data through modification and consolidation

· Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:

· Daily full server backups with hourly incremental backups

· Redundant array of independent disks (RAID) with periodic full backups

· Replicated databases and folders on high-availability alternate servers

Answer the following question(s):

Which backup strategy would you adopt? Why?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

P13.7 and P13.8 computer science C++ coding assignment

computer science C++ coding assignment

Please see the attachments for the instruction of this assignment

Additional info:

In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.

Application Security to Software development

 

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Computer programing

 Assignment 2 tests your knowledge of Selection (Chapter 4) and Repetition (Chapter 5). Write a program YourName-Assignment2 (replace YourName with your actual name, no spaces) that reads/inputs from a file1 students’ records (one student per line) with the following format: LastName Tests Grade Assignments Grade and computes and outputs (to the console) the STUDENT STATISTICS in a table format one line per student: Student Name Total Points2 Numeric Grade3 Letter Grade4 The table should have the exact table header5 . The program should also compute and output (to the console) in the 2 rows 2 columns table format, the CLASS STATISTICS for the entire class: the number of students6 (row Number) and the average numeric grade7 (row Average) among all students. All text/character columns should have the same width, be aligned to the left and all floating-point values align to the right and formatted with 2 decimals. You can test your program on the attached Grades.txt (do not edit the file) and you can check your output by comparing it to the sample output shown here, but your program should work on any other files that have the correct format, thus, do not hardcode the output or the number of students. The program needs to use loops/repetition statements to read the data from the files and selection statements (Chapter 4) to compute the letter grades. You should write the program in Visual Studio 2019 using only concepts learned in classso far (Chapters 1 to 5, so, without arrays, functions, pointers, references, and any other concepts not studied in class so far). Create a Microsoft Word document called YourName-Assignment2-Screenshots.docx (replace YourName with your name, no spaces) that contains screenshots of your entire C++ code in editor (take multiple screenshots if the code is larger than one screen and is not readable in one screenshot), and the entire program console output in the Console Output Window for the attached Grades.txt (take multiple screenshots if the output is larger than one window). SUBMIT your YourName-Assignment2.cpp Visual Studio 2019 C++ source code and YourName-Assignment2- Screeshots.docx screenshots document files under Assignment2 on eCampus. Do not archive the files (no ZIP, RAR or other archived files) or submit other file formats. 

1 The program should work on any file with that format with different numbers of line. Do not hardcode the number of lines, compute it instead when you read from the file.

 2 You compute the Total Points as the sum between Tests and Assignments.

 3 You compute the Numeric Grade as the total points (from all the evaluations) divided by 2. The value will be between 0 and 100 

4 The Letter Grade is: A if the numeric grade is between 89.5 and 100, B if the numeric grade is between 79.5 and 89.49, C if the numeric grade is between 69.5 and 79.49, D if the numeric grade is between 59.5 and 69.49, and F if the numeric grade is between 0 and 59.49.

 5 The table header should have the exact text, but it does not have to be on 2 separate lines/rows, you can put them on one row (.e.g. “Total Points” on one row)

 6 The number of lines from the file

 7 The sum of all the numeric grades divided by the number of students 

Capstone Assignment week2

Question 1: 400 words

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new inter organizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Minimum of two references and one of the references needs to be from Text book to be used: Reynolds, George W. Information Technology for Managers, 2nd edition.(2016). Cengage Learning. ISBN: 978-1-305-38983-0.

Electronic

 identify the best electronic element to secure a highly secure environment like the NSA 

Computer Science- Dictionary Attack with and without Password Salt program

 PowerPoint of the Slides is attached below.

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

 Explain your program appropriately using comments the source code. 

Hexadecimal Calculator using Swift

Implement a hexadecimal calculator for iOS. Requirements: 

• The calculator should support 4 basic arithmetic operations: + – * and / 

• The calculator will operate on hexadecimal numbers, not decimal numbers 

• The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions.

 • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. 

• The calculator should handle overflow and underflow gracefully. The app must not crash. 

• The calculator should handle division-by-zero error gracefully. The app must not crash. 

• The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. 

Hint:

 • To convert a string to a hex number, use “radix: 16” as an argument. 

For example: var s:String? 

s = “1A” 

var intHex:UInt = 0 

intHex = UInt(s!, radix: 16)! 

print(intHex) 

// shows 26

 intHex = 90

 s = String(intHex, radix: 16).uppercased()

 print(s!)

 // shows 5A

• It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. 

• Strings may be concatenated by using + operator. 

E.g. var s1 = “1234” var s2 = “5” 

print(s1 + s2)

 // shows 12345 

You may want to do string concatenation in the action of each digit button.

 • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. 

• To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. 

• To support different devices and orientations, use stack view, scroll view, or both. 

• Design your algorithm first! 

Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.

Chat application demo (using Angular and spring)

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.