CMIS147 Introduction to Programing

 

Part1) Write a Java program which prompts a user for two numerical values as input, does some calculation on them and then print the result along with meaningful message to the console. Use some interesting formula and not a simple summation.

Submit your program as an attached  .java file and post a screen shot to show that you have been able to successfully run that program. Make sure you submission adheres to the SubmissionRequirements document.

Be sure to create a program different from any of the programs already posted by your classmates or the examples in class materials.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python

Python and the database tool SQLite will develop a functional project of your choice from the Capstone Project List. You will begin with an approach/strategy statement of the project, use the topics covered in class and document your code using comments inline to the code. And most of all, have fun building a project!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3/1 Devote

During the COVID-19 stay-at-home requirements, many people worked from home. To carry on business, companies utilized various web-based meeting tools (such as Zoom). Some of these tools lacked robust security. A company, being proactive, sought to assure security against those attempting to take over such sessions.

In Christianity, God brings to mind those things we need to ensure protection against, including issues related to computer security. We again look to the word of God for Scripture that tells us that safety can be found in the Lord. Psalm 140:4 says, “Keep me safe, Lord, from the hands of the wicked; protect me from the violent, who devise ways to trip my feet” (NIV). We find in the Bible the admonition to seek the Lord in our activities as protection from those that would trick us.

  1. Review the material in the Getting Started section, including the specific Bible passage.
  2. Be sure to address to the following prompts in your paper:
    1. How do you see this verse applying to the attackers’ attempts at social engineering?
    2. How would you apply the principles of these verses in your workplace?
  3. Your paper should be at least 250 words in length.
  4. Submit your assignment by the end of the workshop.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3/2 Reading

  1. Read Chapters 9–13 in your textbook (Textbook: Principles of Computer Security: CompTIA Security and Beyond)
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. While responding to your classmates is not necessary for this discussion, read a couple of your fellow classmates’ posts to learn from their experiences. You must make your initial post first in order to see theirs.
  4. Your initial post is due by the end of the workshop.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3/3 Discussion

  1. Read Chapters 9–13 in your textbook.
  2. Using the discussion link below, respond to the following prompts and questions:
    1. Identify the security components necessary to protect the information systems infrastructure. What key hardware components should be implemented?
    2. Why are authentication methods important in assuring that only authorized users are accessing the system? Classify the levels of access controls.
    3. Explain the use of an intrusion detection system (IDSs). How does such a system identify an intrusion? Differentiate between network level and host-based IDSs.
  3. Your initial post should be at least 300 words and supported with at least three references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Journal Assignment – 3 pages

 

What makes data, information, and knowledge an essential element to machine learning?

This assignment is to be 6-8 paragraphs APA format (7th edition), 4 references used from peer-review articles.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ethical hacking

  

Black box testing:

In the black-box test function, the login tester is placed in the middle hacker role, with no internal information of the targeted system. Examiners are not provided with any architectural drawings or source code that are not publicly available. The black box entry test determines the risk to the operating system outside the network.

Gray box testing:

The next step from the black box test is to check the gray box. If the black box tester checks the system from an external perspective, the gray box inspector has access levels and user information, which may have higher privileges in the system. Gray-box pentester usually has some internal network information, which may include design and build documentation as well as an internal network account.

White box testing:

The white box test comes in a number of different terms, including clear-box, open-box, app and intelligently run tests. It falls on the other side of the spectrum from the black box test: entry inspectors are given full access to source code, architectural documentation and more. A major challenge with white box testing is to evaluate the large amount of data available to identify potentially weak points, which has made it a very time-consuming type of entry test.

Tiger Box Testing:

This hacking is usually done on a laptop with a collection of OS and hacking tools. This inspection helps the entry inspectors and security inspectors to conduct a risk and attack assessment.

THE QUESTION –> Find any real case and mention it by link and snapshot for each one?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

describe system process in computers

describe system process in computers

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

111

Find a peer-reviewed scholarly journal article discussing big data analytics. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use Google Scholar to find these types of articles. Once you find the article, you will read it and write a review of it.  This is considered a research article review. Your paper should meet these requirements: 

  • 6 pages APA format 
  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Logical Modeling Design & Relational Schema

 

work on the Logical Modeling Design and to specify the entries, columns and their relationship. Use an entity-relationship ER diagram to visualize the database. 

Your schema should include some attributes that make it possible to include some transactions that involve aggregate functions. For example, a school schema would allow for queries to calculate enrollment in each section of the average enrollment in courses for a given department, or the total courses being taught by each instructor, etc. This should also make interesting constraints and triggers possible. Review this basic example of a requirements document and Conceptual Data Model.

Turn your ER diagram into a normalized relational database design for the (subset of the) domain (i.e. a set of tables, each with appropriate attributes, a primary key, and appropriate foreign keys. The database should be based on the ER diagram, but one-to-one and one-to-many relationships may be implemented by appropriate attirbutes in the “one” entity, rather than as separate tables. You relational database must be at least in 3NF. Remember to determine the cardinality of the relationships. You may want to decide on cardinality when you are creating an Entity–relationship diagram ERD relationship table.

see sample below

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now