Computer Science
[SOLVED] Hacking Manufacturing Systems
Write two page single space essay on hacking manufacturing systems. Discuss following:Recent hacks happened for the automotive industryWhat was the impactHow they got hackedHow to secure their infrastructureAny other relevant discussion
[SOLVED] Effective Business Program
In the CTU library, find an article that discusses the structure of an effective business intelligence program. Write 12 paragraphs that explain the key components of the structure. Write 12 paragraphs that explain how knowledge management systems fit into the structure. Provide at least 1 example to support your response.
[SOLVED] Plan Memo Cybersecurity
Please Read:Betty and Harold are a retired couple in their 70s. Betty has two math degrees and worked with Christine Darden and other women featured in the Hidden Figures book as human computers at NASA and then taught computer science classes at the local college. Harold was in the United States Air Force in Vietnam (he flew B-57s) and then worked for IBM. Harold discovered that his great-grandfather was a cowboy in Texas in the late 19th century who was put out of work by barbed wire. Harold, as his retirement hobby, makes peace with that past by constructing art out of barbed wire and selling it at craft shows as “Harold’s Barbed Wire Widgets.” His customers begged him to start selling his art online and so he and Betty set up a web server in the basement and opened a basic online storefront. They are both good with computers but want to make sure they’ve thought of everything and whether they could do things better. They’ve asked your cybersecurity consulting team to do threat modeling for their business.Answer QuestionHow would you proceed to assist Betty and Harold? What process would you take them through? What questions do you need to ask them? If brainstorming is part of your process, what tools would you use? Write up your plan as an appropriate memo for Betty and Harold.250 words
[SOLVED] A Javascript Program
You will be modifying a javascript program. Javascript is a powerful computer language which works with browser software to add buttons, menus, etc.This assignment will be out of 1000 possible points.Getting started:Right-click on the link hello_java.html and choose “Save Link As…” Save the link to your desktop.This will create a file called “hello_java” on your desktop. You can open this in a text editor (such as Notepad or Notepad++ for Windows or Textedit or BBEdit for Mac).To open the file in a text editor, do not just double-click on “hello_java”. Either right click on the icon and choose your text editor, or open the text editor and open hello_java from there.Tips:Play with the webpage before editing it.Read through the webpage code before you edit it.Quickly view the website code within the browser by right-clicking on the webpage and selecting “View page source” (or keyboard shortcut Ctrl-U).Pay attention to the comments within the website code.Firefox and Internet Explorer are the recommended browsers (Chrome and Safari sometimes have problems displaying the webpage).Notepad++ for Windows and BBEdit for Mac are better alternatives to Notepad and Textedit. (See Assignment 2 for download links.)Required Items:Add your name and UCSC login so we know who you are.Replace “My name is:” with your full name. (50 points)Replace “My username is:” with your UCSC username. (50 points)There is a button that reads “Click me!” Change this text from “Click me!” to any other text. (50 points)When clicked, the button will create a pop-up window reading “Good job!”. Replace this text with a different message. (50 points)Add the current date, which should update to reflect whatever day it is when viewed. (100 points)The script that accomplishes this is already in the file, but as a comment.Read the comments carefully. They will explain what to do.Modify the file so that it is possible to say two more things (other than hello and hate), such as “I like [person’s name]” and “I love [person’s name]”. To accomplish this, you will need to make the appropriate changes in two places:Add two new options to the pull-down menu (100 points, 50 points each). Currently, there are the options Hate and Hello. Add two more, such as Love and Like.Add two new cases to the function my_function (100 points, 50 points each). This means that when the user selects Love or Like, the appropriate response will be displayed when the user clicks the “Greet” button.The pulldown menu only shows one item at a time. Make it so two items are displayed at a time. Note: This only shows up properly in Internet Explorer and Firefox. (100 points)The left edge of the textbox (next to NAME) should be lined up with the left edge of the menu below it. Add spaces to push the textbox to the right. (100 points)Look in the source code. A couple spaces have already been added.The spacing need not be perfect, just closer.There is a hyperlink that goes to the class webpage. It has several problems, which you will fix. The hyperlink says “Place your mouse on and off of this”.Change the background color action:When the mouse first hovers over the text, the background will turn yellow. Make it turn pink instead. (100 points)After the mouse moves off the text, the background remains the same color. Alter this so that moving the mouse off the text changes the background to blue. (100 points) The command for turning the background blue works the same way as the code that changes it to yellow (or pink), except it is “onMouseOut” instead of “onMouseOver”.Change the text and the URL for the hyperlink:Replace “Place your mouse on and off of this” with new text, indicating that the person is going to a different web page. (50 points)Replace the URL with the URL of your choice. (50 points)SUBMIT your “hello_java.html” file to Canvas.Extra credit: Change the font of the page to Courier, Garamond, or Impact. (100 points)
[SOLVED] Data Mining Software
a. Economic environment- What is the local economy like? When making a statement,back it up with facts relating to 2020 & 2021. When determining the economicenvironment where you will operate your business, consider using the documents inour D2L class drop box. Listed in Course Materials, Contents, Class ExamplesInformation. See "US & SC Economic Report," and "State, County, City DemographicSites." You should also consider reviewing links in the city, county and state whereyou plan to operate your business. Google Charleston economy or something similar& youll get lots of data.b. Social environment what does society think of your product? Pizza? Carb heavy,but acceptable in a vacation environment (not so much in a hospital canteen). Stripperbar? Likely not well received (by everyone) in downtown Summerville.c. Competitive environment you will likely have many, often 5-0 to 100.List all within a four-mile radius for food establishments, or an areadiscussed with me for non-food businesses. Google Earth (free download) letsyou map roads (tools, ruler).List direct and indirect competition. For a semi-casual restaurant, McDonalds& the deli section in the next door Bi-Lo would be indirect competition. For ahotel, B&B's and www.airbnb.com are indirect competition. For a childcareoperation, nannies & a baby sitter association would be indirect competition.d. Legal environment what licenses do you need to operate? City, county & statelicense? DHEC approval? Alcohol? Servesafe certificate?
[SOLVED] Local Government Laws
What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws, and the establishment of regulations and policies for access control? Cite such laws, regulations and policies in your particular state.(my state georgia)200-to-300 words.
[SOLVED] Cybersecurity Threats
Step 14: Submit the PresentationYou now have the information needed to develop the slide presentationthat John requested for senior management. The presentation shouldclearly explain current known weaknesses in your organizationssecurity (to include people, technology, and policy) that could result insuccessful exploitation of known vulnerabilities and/or threatsDevelop a narrated slide presentation of 16 to 20 slides that concludeswith the recommended way forward (e.g., continue to accept risks,accept some risks (identify them), mitigate some risks (identify them),mitigate all risks, etc.).Submit your presentation for review when complete.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below,which your instructor will use to evaluate your work. A good practicewould be to use each competency as a self-check to confirm you haveincorporated all of them. To view the complete grading rubric, click MyTools, select Assignments from the drop-down menu, and then clickthe project title.? 5.2: Examine architectural methodologies and components usedin the design and development of information systems.? 6.2: Create an information security program and strategy, andmaintain alignment of the two.? 7.2: Evaluate international cybersecurity policy.? 7.3: Evaluate enterprise cybersecurity policy.? 8.2: Evaluate specific cybersecurity threats and the combinationof technologies and policies that can address them.Submission for Cybersecurity RecommendationsPresentation
[SOLVED] Creative Commons License
Research: Is it legal for me to use images, songs, and videos found on the Web?Read about the Creative Commons License.Describe its purpose and the licenses under which it operates.Locate one photo, one music file, and one video that are covered under the Creative Commons License. For each, explain any restrictions you must consider if you wish to share or use the content.List the URL for each object, do not insert the object..The document must be a properly formatted document.Upload the Word document to Moodle
[SOLVED] Auto-Implemented Properties
Create a class called Employee that includes three pieces of information as either instance variables or auto-implemented propertiesa first name (type string), a last name (type string) and a monthly salary (decimal). Your class should have a constructor that initializes the three values. Provide a property with a get and set accessor for any instance variables. If the monthly salary is negative, the set accessor should leave the instance variable unchanged. Write a test app named EmployeeTest that demonstrates class Employees capabilities. Create two Employee objects and display each objects yearly salary. Then give each Employee a 10% raise and display each Employees yearly salary again.Please use C# and submit as a zip file.
[SOLVED] Cyber Security Managment
Gather all final project material:final paperpower pointotherCreate a single archive, attach here and submit(ZIP not RAR please)final research topic: Penetration Testing.
Use Promo Code: FIRST15