Computer Science
Database Essay
Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? Include an interesting meaningful title.Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)With atleast 3 references
Browser Add-Ins
Course: Information Assurance (ISSC 361)The assignment must be a minimum of 2-full pages in length with a minimum of 2 – sources. Please be sure to follow APA v6 guidelines for the entire paper.Assignment 7. Go online and search for information about security threats posed by browser add-ins, such as Java applets and ActiveX controls (Do not use either of these examples). Note that most of these programs are small in size and downloaded onto computers over the Internet. Look for a specific example of a security problem resulting from such add-ins, and document the problem in a case study.
Mixed-Method Thesis
5 pages excluding references(references from academic journal)Find a quantitative, a qualitative and a mixed-method thesis that may be closely related to the selected topic journal on bigdata. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the thesis tried to examine.
Dynamic Programming
Quiz 4 Advanced Algorithm Analysis Marks 20Q 1. (10 points) Team work. Youre managing a consulting team of expert computer hackers, and each week you have to choose a job for them to undertake. Now, as you can well imagine, the set of possible jobs is divided into those that are low-stress (e.g., setting up a website) and those that are high-stress (e.g., approaching deliverable deadlines for a major client). The basic question, each week, is whether to take on a low-stress job or a high-stress job.If you select a low-stress job for your team in week i, then you get a revenue of li > 0 dollars; if you select a high-stress job you get a revenue of hi > 0 dollars. The catch, however, is that in order for the team to take on a high-stress job in week i, its required that they do no job (of either type) in week i ? 1; they need a full week of prep time to get ready for the crushing stress level. On the other hand, its okay for them to take a low stress job in week i even if they have done a job (of either type) in week i ? 1. So, given a sequence of n weeks, a plan is specified by a choice of low-stress, high-stress, or none for each of the n weeks, with the property that if high-stress is chosen for week i > 1, then none has to be chosen for week i ? 1. (Its okay to choose a high-stress job in week 1.) The value of the plan is determined in the natural way: for each i, you add li to the value if you choose low-stress in week i, and you add hi to the value if you choose high-stress in week i (You add 0 if you choose none in week i.)The problem. Given sets of values l1, l2, · · · , ln and h1,h2, · · · ,hn, find a plan of maximum value. (Such a plan will be called optimal.)Example. Suppose n = 4, and the values of li and hi are given by the following table. Then the plan of maximum value would be to choose none in week 1, a high-stress job in week 2, and low-stress jobs in weeks 3 and 4. The value of this plan would be 0 + 50 + 10 + 10 = 70.Week 1 Week 2 Week 3 Week 4l 10 1 10 10 h 5 50 5 1First try. Below is an algorithm to plan the jobs taken.For iterations i = 1 to n If hi+1 > li + li+1 thenOutput Choose no job in week i Output Choose a high-stress job in week i + 1 Continue with iteration i + 2Else Output Choose a low-stress job in week i Continue with iteration i + 1End If End ForTo avoid problems with overflowing array bounds, we define hi = li = 0 when i > n.(a) (3 points) Show that the above algorithm does not correctly solve this problem, by giving an instance on which it does not return the correct answer. In your example, say what the correct answer is and also what the above algorithm finds. Now use dynamic programming. Work out an efficient algorithm that takes values for l1, l2, · · · , ln and h1,h2, · · · ,hn and returns the value of an optimal plan.(b) (2 points) Draw the linearized DAG (topological ordering) for the example in the problem statement.(c) (2 points) List down the optimal substructure for the problem.(d) (4 points) Write the recursive formulation using the substructure.(e) (3 points) Write the enumerated pseudocode of the solution.(f) (2 points) How many subproblems?(g) (2 points) What is the time per subproblem?(h) (2 points) Determine the total running time?Page 1 of 1
Systems Analyst
According to the textbook, one of the toughest problems in investigating systems requirements is ensuring that they are complete and comprehensive. Imagine that you are a systems analyst. Decide the primary way in which you would ensure that you secure the necessary information during an interview session with a client.Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.
Professional Jobs
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction’?2. are we working more and earning less?3. Would you want a telecommuting job? Why or why not?4. Does the gig economy appeal to you? Why or why not?5. How is an employee differentiated from a contracter under US law?6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?8. How much monitoring of employee activities at work is appropriate?9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?10. What is the relationship betwee BYOD (bring your own device) and shadow IT.11. What is cyberloafing?
Ethics In Computing
In a COVID-19 situation identify the guidelines for ethical use of the computers and networks in any organisation.Please discuss the NETIQUETTE technique and explain how it can help professionals to embrace ethical use of networks in the current pandemic situation. You need to use some cases in the discussion to add value to your discussion.
Data scientists
1. What are some major data mining methods and algorithms? Data scientists make extensive use of visualization to study and present data. Discuss three visualization tools available on the market and applications well suited for each. Then, assume you must select one tool for use by your organization. Select a tool and justify the reasons for your choice.2. What are the key differences between the major data mining tasks? Give examples of situations in which classification would be an appropriate data mining technique. Give examples of situations in which regression would be an appropriate data mining technique.Please provide 2 pages [ one question each page]
Online Data
Local Breach of Sensitive Online DataThe EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.EducationS officials told the local newspaper that access to the information was immediately shut down as soon as the company was informed about the problem. This brings up two big questions, said Alex Graham, a senior technology consultant with information technology (IT) security and control firm Lizos. Are companies doing enough to protect their data? Also, do companies really need to keep all this kind of data?” A competing test preparation firm discovered the flaw. The competitor contacted the local newspaper with the story, according to Alex, who said the play-out points to the high stakes were now involved with a data breach. If companies have not heard this before, it is a huge reminder that security is important not just for the companys customers, but for the companys reputation as well.While the publishing of birth dates may not seem like a massive leak, Alex said the information is a good stepping-stone for someone who is attempting to steal an identity. This is the second time in a month a public breach has involved birth dates. A glitch in a test version of social networking site, Facebook, inadvertently exposed the birthdays of its 80 million members last month. Alex discovered the bug while checking Facebooks new design. He noticed that the birth dates of some of his privacy-obsessed acquaintances were popping up when they should have been hidden. The fact that the people affected by this latest breach were children adds to the general background radiation about security, or lack thereof, of peoples’ data on the Web.
Programming Assignment
Please state the assignment title / brief. Please specify details such as:Answer the questions on the accompanying sheet.Learning OutcomesPlease state the programme and related module learning outcomes that this assignment is assessing.1,2,4, 5,6Assessment CriteriaPlease state the assessment criteria applied to this assignment, such as: Correctness of the work.Presentation, including compliance with the specified file format. Evidence of critical thinking andanalysis. Originality, quality and thoroughness of the work. Research correct academic approach. Propertreatment of sources.Question 1Consider a large two-dimensional array of size [1000,1000] filled with single digit numbers between 0 to9, your task is to implement a parallel solution using OpenMP and MPI that search for a two-digitnumber, can be hard coded. The search will be horizontal, vertical, diagonal, and counter diagonal fromleft to right and up to down.
Use Promo Code: FIRST15