Database Essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? Include an interesting meaningful title.Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)With atleast 3 references

Read more

Browser Add-Ins

Course: Information Assurance (ISSC 361)The assignment must be a minimum of 2-full pages in length with a minimum of 2 – sources. Please be sure to follow APA v6 guidelines for the entire paper.Assignment 7. Go online and search for information about security threats posed by browser add-ins, such as Java applets and ActiveX controls (Do not use either of these examples). Note that most of these programs are small in size and downloaded onto computers over the Internet. Look for a specific example of a security problem resulting from such add-ins, and document the problem in a case study.

Read more

Mixed-Method Thesis

5 pages excluding references(references from academic journal)Find a quantitative, a qualitative and a mixed-method thesis that may be closely related to the selected topic journal on bigdata. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the thesis tried to examine.

Read more

Dynamic Programming

Quiz 4 Advanced Algorithm Analysis Marks 20Q 1. (10 points) Team work. You’re managing a consulting team of expert computer hackers, and each week you have to choose a job for them to undertake. Now, as you can well imagine, the set of possible jobs is divided into those that are low-stress (e.g., setting up a website) and those that are high-stress (e.g., approaching deliverable deadlines for a major client). The basic question, each week, is whether to take on a low-stress job or a high-stress job.If you select a low-stress job for your team in week i, then you get a revenue of li > 0 dollars; if you select a high-stress job you get a revenue of hi > 0 dollars. The catch, however, is that in order for the team to take on a high-stress job in week i, it’s required that they do no job (of either type) in week i ? 1; they need a full week of prep time to get ready for the crushing stress level. On the other hand, it’s okay for them to take a low stress job in week i even if they have done a job (of either type) in week i ? 1. So, given a sequence of n weeks, a plan is specified by a choice of “low-stress,” “high-stress,” or “none” for each of the n weeks, with the property that if “high-stress” is chosen for week i > 1, then “none” has to be chosen for week i ? 1. (It’s okay to choose a high-stress job in week 1.) The value of the plan is determined in the natural way: for each i, you add li to the value if you choose “low-stress” in week i, and you add hi to the value if you choose “high-stress” in week i (You add 0 if you choose “none” in week i.)The problem. Given sets of values l1, l2, · · · , ln and h1,h2, · · · ,hn, find a plan of maximum value. (Such a plan will be called optimal.)Example. Suppose n = 4, and the values of li and hi are given by the following table. Then the plan of maximum value would be to choose “none” in week 1, a high-stress job in week 2, and low-stress jobs in weeks 3 and 4. The value of this plan would be 0 + 50 + 10 + 10 = 70.Week 1 Week 2 Week 3 Week 4l 10 1 10 10 h 5 50 5 1First try. Below is an algorithm to plan the jobs taken.For iterations i = 1 to n If hi+1 > li + li+1 thenOutput ‘‘Choose no job in week i’’ Output ‘‘Choose a high-stress job in week i + 1’’ Continue with iteration i + 2Else Output ‘‘Choose a low-stress job in week i’’ Continue with iteration i + 1End If End ForTo avoid problems with overflowing array bounds, we define hi = li = 0 when i > n.(a) (3 points) Show that the above algorithm does not correctly solve this problem, by giving an instance on which it does not return the correct answer. In your example, say what the correct answer is and also what the above algorithm finds. Now use dynamic programming. Work out an efficient algorithm that takes values for l1, l2, · · · , ln and h1,h2, · · · ,hn and returns the value of an optimal plan.(b) (2 points) Draw the linearized DAG (topological ordering) for the example in the problem statement.(c) (2 points) List down the optimal substructure for the problem.(d) (4 points) Write the recursive formulation using the substructure.(e) (3 points) Write the enumerated pseudocode of the solution.(f) (2 points) How many subproblems?(g) (2 points) What is the time per subproblem?(h) (2 points) Determine the total running time?Page 1 of 1

Read more

Systems Analyst

According to the textbook, one of the toughest problems in investigating systems requirements is ensuring that they are complete and comprehensive. Imagine that you are a systems analyst. Decide the primary way in which you would ensure that you secure the necessary information during an interview session with a client.Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.

Read more

Professional Jobs

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction’?2. are we working more and earning less?3. Would you want a telecommuting job? Why or why not?4. Does the gig economy appeal to you? Why or why not?5. How is an employee differentiated from a contracter under US law?6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?8. How much monitoring of employee activities at work is appropriate?9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?10. What is the relationship betwee BYOD (bring your own device) and shadow IT.11. What is cyberloafing?

Read more

Ethics In Computing

In a COVID-19 situation identify the guidelines for ethical use of the computers and networks in any organisation.Please discuss the NETIQUETTE technique and explain how it can help professionals to embrace ethical use of networks in the current pandemic situation. You need to use some cases in the discussion to add value to your discussion.

Read more

Data scientists

1. What are some major data mining methods and algorithms? Data scientists make extensive use of visualization to study and present data. Discuss three visualization tools available on the market and applications well suited for each. Then, assume you must select one tool for use by your organization. Select a tool and justify the reasons for your choice.2. What are the key differences between the major data mining tasks? Give examples of situations in which classification would be an appropriate data mining technique. Give examples of situations in which regression would be an appropriate data mining technique.Please provide 2 pages [ one question each page]

Read more

Online Data

Local Breach of Sensitive Online DataThe EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.EducationS officials told the local newspaper that access to the information was immediately shut down as soon as the company was informed about the problem. “This brings up two big questions,” said Alex Graham, a senior technology consultant with information technology (IT) security and control firm Lizos. “Are companies doing enough to protect their data? Also, do companies really need to keep all this kind of data?” A competing test preparation firm discovered the flaw. The competitor contacted the local newspaper with the story, according to Alex, who said the play-out points to the high stakes were now involved with a data breach. If companies have not heard this before, it is a huge reminder that security is important not just for the company’s customers, but for the company’s reputation as well.While the publishing of birth dates may not seem like a massive leak, Alex said the information is a good stepping-stone for someone who is attempting to steal an identity. This is the second time in a month a public breach has involved birth dates. A glitch in a test version of social networking site, Facebook, inadvertently exposed the birthdays of its 80 million members last month. Alex discovered the bug while checking Facebook’s new design. He noticed that the birth dates of some of his privacy-obsessed acquaintances were popping up when they should have been hidden. The fact that the people affected by this latest breach were children adds to the general background radiation about security, or lack thereof, of peoples’ data on the Web.

Read more

Programming Assignment

Please state the assignment title / brief. Please specify details such as:Answer the questions on the accompanying sheet.Learning OutcomesPlease state the programme and related module learning outcomes that this assignment is assessing.1,2,4, 5,6Assessment CriteriaPlease state the assessment criteria applied to this assignment, such as: Correctness of the work.Presentation, including compliance with the specified file format. Evidence of critical thinking andanalysis. Originality, quality and thoroughness of the work. Research correct academic approach. Propertreatment of sources.Question 1Consider a large two-dimensional array of size [1000,1000] filled with single digit numbers between 0 to9, your task is to implement a parallel solution using OpenMP and MPI that search for a two-digitnumber, can be hard coded. The search will be horizontal, vertical, diagonal, and counter diagonal fromleft to right and up to down.

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.