building secure web applications week 9

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 discussion and 1 Assignment

2 discussions 

1 assignment

PFA for details.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advanced Operating Systems Discussion 1

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM. 

Follow these instructions:

Main Discussion : 100 Points( 600 Words)

4 Responses : Each Response 200 words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT Professionals need to provide infrastructure security

 

Private individuals and businesses use information all the time and have different information security needs.

Respond to the following in a minimum of 175 words:

  • Discuss some examples of how an individual’s or business’s fundamental need for privacy, confidentiality, integrity, and/or availability might infer an IT professional’s work in ensuring infrastructure security.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database security

  

Describe in 500 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Intelligence Discussion

Question: What is artificial intelligence and can humans co-exist with it?Review the Podcast instruction Guide in the General above to create your Podcast discussion or review these instructions using Audacity:

Audacity is a free, open-source, cross-platform software for recording and editing sounds. It is available for both Windows, Mac, GNU/Linux, and other operating systems.

Initial Discussion: 300 words

Responses 4 : Each 300 Words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

How to work on a spreed sheet document using the information given

 

Eller Software Services has received contract revenue information in a text file. You import, sort, and filter the data. You also create a PivotTable, prepare a worksheet with subtotals, and format related data as an Excel table.

[Student Learning Outcomes 4.1, 4.3, 4.4, 4.5, 4.6, 4.8]

Files Needed: EllerSoftware-04.xlsx (Available from the Start File link.) and EllerSoftwareText-04.txt (Available from the Resources link.)

Completed Project File Name: [your name]-EllerSoftware-04.xlsx

Skills Covered in This Project

  • Import a text file.
  • Use AutoFilters.
  • Sort data by multiple columns.
  • Create a PivotTable.
  • Format fields in a PivotTable.
  • Use the Subtotal command.
  • Format data in an Excel table.
  • Sort data in an Excel table.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open the EllerSoftware-04.xlsx start file. Click the Enable Editing button. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Import the EllerSoftwareText-04.txt file downloaded from the Resources link and load it to begin in cell A4. The text file is tab-delimited.
  3. Format the values in column H as Currency with zero decimal places.
  4. Click cell G4 and use the AutoFilter arrow to sort by date oldest to newest.
  5. Click cell F4 and use the AutoFilter arrow to sort by product/service name in ascending order.
  6. Filter the Date column to show only contracts for September using the All Dates in the Period option.
  7. Edit the label in cell A2 to display Contract Amounts for September.
  8. Select cells A1:H2 and press Ctrl+1 to open the Format Cells dialog box. On the Alignment tab, choose Center Across Selection.
  9. Change the font size for cells A1:H2 to 20 pt (Figure 4-102) and close the Queries & Connections pane.Date header displays filter icon.Figure 4-102 Imported data sorted and filtered
  10. Copy the Contracts sheet to the end and name the copy Data.
  11. Clear the date filter.
  12. Select cell A5 and click the PivotTable button [Insert tab, Tables group]. The range is identified as the EllerSoftwareText file.
  13. Verify that New Worksheet is selected, deselect the Add this data to the Data Model button, and click OK.
  14. Name the sheet PivotTable. Close the Queries & Connections pane.
  15. Show the Product/Service and Contract fields in the PivotTable.
  16. Drag the Contract field from the Choose fields to add to report area below the Sum of Contract field in the Values area so that it appears twice in the report layout and the pane (Figure 4-103).Values are identical.Figure 4-103 “Contract” field appears twice in the report
  17. Select cell C4 and click the Field Settings button [PivotTable Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
    Alternate Instruction for Microsoft 365 Apps icon Select cell C4 and click the Field Settings button [PivotTable Tools Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
  18. Select cell B4 and set its Custom Name to Total Contracts and the number format to Currency with zero decimal places.
  19. Apply Brown, Pivot Style Dark 3.
  20. Select the Data sheet tab and copy cells A1:A2. Paste them in cell A1 on the PivotTable sheet.
  21. Select Align Left for cells A1:A2 and 16 pt. as the font size. Edit the label in cell A2 to display Contract Amounts, September through December (Figure 4-104).Completed PivotTableFigure 4-104 Completed PivotTable
  22. Copy the Data sheet to the end and name the copy Subtotals.
  23. Select cell D5 and sort by City in A to Z order.
  24. Select cell A5 and convert the table to a range. Select cells A5:H31 and apply No Fill [Home tab, Font group].
  25. Use the Subtotal command to show a SUM for the contract amounts for each city.
  26. Edit the label in cell A2 to display Contract Amounts by City.
  27. Format the sheet to Landscape orientation, center the page vertically, and scale it to fit one page.
  28. Click the Billable Hours sheet tab and select cell A4.
  29. Click the Format as Table button [Home tab, Styles group], use Orange, Table Style Medium 10, and remove the data connections.
  30. Type 5% Add On in cell E4 and press Enter.
  31. Build a formula in cell E5 to multiply cell D5 by 105% and press Enter to copy the formula.
  32. Select cells A1:A2 and left align them. Then select cells A1:E2, click the Launcher for the Alignment group [Home tab], and select Center Across Selection from the Horizontal list.
  33. Use the AutoFilter arrows to sort by date in oldest to newest order.
  34. Save and close the workbook (Figure 4-105).Excel 4-4 completedFigure 4-105 Excel 4-4 completed
  35. Upload and save your project file.
  36. Submit project for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion – Information Governance

We learn from our readings that the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them.

Please make your initial post substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Limantara, N., Kosala, R., Ranti, B., & Supangkat, S. H. (2019). Human and Technology Factors in the Readiness to Use Smart Mobile Devices in Learning Activities. 2019 International Conference on ICT for Smart Society (ICISS), ICT for Smart Society (ICISS), 2019 International Conference On, 7, 1–5. https://doi.org/10.1109/ICISS48059.2019.8969827

Rothstein, M. A., Wilbanks, J. T., Beskow, L. M., Brelsford, K. M., Brothers, K. B., Doerr, M., Evans, B. J., Hammack-Aviran, C. M., McGowan, M. L., & Tovino, S. A. (2020). Unregulated Health Research Using Mobile Devices: Ethical Considerations and Policy Recommendations. Journal of Law, Medicine & Ethics, 48, 196–226. https://doi.org/10.1177/1073110520917047

Shankar, A., & Kumari, P. (2019). A Study of Factors Affecting Mobile Governance (mGov) Adoption Intention in India using an Extension of the Technology Acceptance Model (TAM). South Asian Journal of Management, 26(4), 71–94.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 10- Exe Project

Assigned Readings:Chapter 10. Project Scheduling: Lagging, Crashing, and Activity Networks Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Identify and discuss some of the problems or dangers in using project networks.  Under what circumstances can they be beneficial, and when can they be dangerous?

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 2 Discussion – Telecom

Create a discussion thread and answer the following question:

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now