CSP25 Homework 03

CSP25 Homework 03

Part 1 : Use a Wordprocessor to type ANSWERS only. Save file as pdf then submit pdf file.

1. Write four statements only that will be part of an Assembly program that will define
four constants (use your own name) and each will store the decimal value 29 in decimal,
binary, octal and hexadecimal.
2. Write a statement that will be part of the data definition of an Assembly program that
will define a double word that will store in memory in big endian format.
3. Given the number 456789Abh, list out the byte values in little endian.
4. Write a statement that will be part of the data definition of an Assembly program that
will define an array of 120 uninitialized unsigned double words. CSP25 Homework 03.

ORDER A PLAGIARISM-FREE PAPER NOW

Part 2
For these questions, submit screenshot of your code plus 2 outputs for part (b) and (d) of test
values given above.
Put all the same file as your work above.
5. Write an Assembly program that will add two numbers 9 and 4. Store result in EAX first
but later after the addition, move the result to a variable called sum which was defined
as a double word and intialzied to 0
6. Write an Assembly program that will add two numbers 9 and 4. Store result in AX first
but later after the addition, move the result to a variable called sum which was defined
as a word and intialzied to 0

Submit one pdf file that has all your work. CSP25 Homework 03.

Literature Review Needed For Dissertation Report

Literature Review Needed For Dissertation Report

The topic is Inclusive City. I have developed an application that is mainly related to data visualisation. It solely focuses on accessibility needs of the people(mainly wheelchair and visually impaired users currently). The data is visualised and shown in the map as circles with different colors(one color per accessibility). The size of the circle is determined by the number of reviews each place has. The more the number of reviews, the big the circle is. Places can be any place like restaurants, museums, malls..etc The user can add a review for any place(review is solely based on accessibility and nothing else).

In short, the application is like a tripadvisor for accessibility only. There is a list view so that the screen readers will be able to read as many visually impaired users will find it difficult to access the map. I have attached few snapshots of the application.

I want a Literature Review section of minimum 5000 words backed up with references for my dissertation report. I will need it in 5-6 days. Literature Review Needed For Dissertation Report

ORDER A PLAGIARISM -FREE PAPER NOW

The section should mainly include:

* Brief introduction about Inclusive City(Why cities should be accessible)

* Challenges facing the disabled people

* Why is there a need to build an application that would benefit the disabled

* The local disabled population

* Related Work

* How this application can benefit them

Beginners Coumputer Science

Beginners Coumputer Science

  1. (15 points) Summarize the large data set given in the excel sheet by creating pivot tables. The data set consists of 213 records and 6 fields. Order ID, Product, Category, Amount, Date, and Country. To get the total amount exported of each product, drag the following fields to the different areas.
  • Product field to the Rows area.
  • Amount field to the Values area.
  • Country field to the Filters area.
  1. Show your pivot table. Beginners Coumputer Science
  1. Sort and show the table
  • To get the total amount exported to each country, of each product, drag the following fields to the different areas.
  • Country field to the Rows area.
  • Product field to the Columns area.
  • Amount field to the Values area.
  • Category field to the Filters area.

    ORDER A PLAGIARISM -FREE PAPER NOW

Show your two-dimensional pivot table.

To easily compare these numbers create and show the pivot chart from the above two-dimensional pivot table.

  1. (5 Points) Write a program that transforms the following formula into Python code. Identify the inputs and outputs. Compile and run the program. Show the program and results.

temp =

 

  1. (5 Points) Body Mass Index (BMI) is a measure of health on weight. The interpretation of BMI for people 16 years or older is as follows:

BMI < 18.5 “Underweight”

Else if BMI < 25 “Normal”

Else if BMI < 30 “Overweight”

Else  “Obese”.

Transform the above rules into a Python program. Make sure to read the BMI from the keyboard. Compile and run the program. Show your program and the output.

Coding Exercise 5: Stripping HTML

Coding Exercise 5: Stripping HTML

  • One common class of attack is to insert malicious code (often JavaScript) into input data in the hope that the data will end up somewhere that it can be executed
  •  Requires a lot of trial and error, but malicious users have lots of time
  • Cleansing the request means checking for, and removing, data that could constitute

malicious code

  • Three techniques

Using a white or blacklist — Stripping HTML
Checking for SQL code

EXERCISE

  1. The method in Fig 9-2 takes a string as input, and returns a string that is:
    1. Same as the input string if the input string does not contain any characters between the characters “<“ and “>”
    2. Same as the input string, but with the characters between the characters “<“ and “>” (both included) removed and replaced with “ <> “
  2. However, there is a bug in Fig 9-2. Spend a few minutes reading the code in Fig 9-2 and trace through the code using an example input string – see how the code behaves. This will help you figure out where the bug is and will give you a reference to write your own stripHTML method which you have to do next. Coding Exercise 5: Stripping HTML
  3. You will write code that is inspired from the code in Fig 9-2 to strip potential HTML tags from usernames and passwords that the user types into the banking application. Here are the changes you should make to UiServices.java
    1. Add a new method, called stripHTML, that does the following:
      1. Take as input a string
      2. Returns a string same as the input string if the input string does not contain the characters “<“ and “>”. For example, if the input string is job, the string returned by stripHTML should be job.

        ORDER A PLAGIARISM -FREE PAPER NOW

  • Returns a sanitized string using the following logic: If the characters “<” and “> are seen in the input string, the code should remove the characters between the characters of < and > and return a sanitized string but also add the characters <> to the end of the sanitized string. For example, if the input string is jo<html>b, the sanitized string returned by the method should be job<>
  1. Then, modify your cleanseInput method so that it also calls stripHTML. Note now that the way you check the returned value from stripHTML is different because stripHTML returns a string and not a Boolean value. The method cleanseInput

should return TRUE if either blacklist characters or HTML are found in the input string, and FALSE otherwise. It should also print out a message if any blacklist characters are found, and another message if HTML is found.

  1. Finally, you need to modify the code in UiServices so that, the program repeatedly asks the user to enter the input if cleanseInput returns TRUE. If you have already done this in Exercise 4, you will not need to make further changes for this portion. Coding Exercise 5: Stripping HTML

 

 

Report On Cloud Computing

Report On Cloud Computing

Students will individually review one recent peer-reviewed published paper/article and also thoughtfully discuss the research papers content on the developments and technologies in Cloud Computing. Choose one topic that you are interested in, or discuss with the instructor if you have any questions.The assessment is based on the presentation and report rubrics.

  • 30 points for report paper assessed
  • 20 points for the slides and presentation

I. Report paper (30 points): The main body of the paper should not exceed 5 pages.

  • Submit a 5-page report (double spaced, font size 10, single column, excluding cover and references) in a single PDF file.
  • Also submit a PDF file of the reference reviewed.
  • The cover page includes assignment title on the particular reference, author info. For example,
    • Title: Review on (reference title here) Report On Cloud Computing.
    • Author: student information
  • Introduce the topic/problem and related background knowledge, review the solution/approach/algorithm/example, and discuss your learning, analyses and conclusions.
  • May use additional references while discuss the topic
  • Use appropriate references and citations. Refer to the following links: https://pitt.libguides.com/citationhelp/ieee or https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf
  • This will not only review the reference, but also be a thoughtful discussion of the research paper content pertaining to cloud computing.
  • Paper and article from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor.
  • Avoid review/survey paper/article.

    ORDER A PLAGIARISM-FREE PAPER NOW

One example of reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017. Report On Cloud Computing.

This article covers many subjects and expands more. II. Presentation (20 points)

  • The presentation will be scheduled at the class time in October.
  • The presentation content should align with the report.
  • Prepare a 8 minutes presentation, which will be followed by 4 minutes in class Q/A.
  • Make sure to rehearse presentation and prepare well so you can clearly communicate the topic and answer questions. Report On Cloud Computing.

Python Socket And Packet Tracer Weather Monitoring System

Python Socket And Packet Tracer Weather Monitoring System

Report: attach a report with your solution that includes:

1. Screenshot of the program output.

2. Types of sensors used and threshold you define for each sensor.

3. Protocol messages you specify between the cloud and sensor n

Instructions:

  1. Your solution should be uploaded as a single compressed zip file. Name the individual parts as cloud.py, edge.pkt. Also, Include a screenshot of the output Figure in Problem 1.
  2. Use meaningful names for variables and identifiers. Add comment to your code. Python Socket And Packet Tracer Weather Monitoring System.

 

Homework Problems:

Problem 1: (100 Points) A Smart Weather Monitoring System:

A weather monitoring service includes various instruments to monitor weather-related readings such as temperature, pressure, wind speed, etc. You are required to build a simulation of a weather monitoring application consisting of a cloud and an edge layers. The cloud layer consists of a single server process which displays a dashboard showing the latest updates, while the edge layer contains weather sensors located at remote locations. Figure 1 shows an architectural view of the system.

ORDER A PLAGIARISM-FREE PAPER NOW

 

The cloud service periodically polls the sensor nodes to retrieve weather data and plot the data using animated graph. If the sensor reading exceeds certain threshold, a warning light will be turned on inside PT. You need to implement the sensor nodes and lights inside PT (Using MCU or SBC) and the cloud service outside PT (using Python Script).

Use the TCP/UDP port number as shown in the Figure. Your system must implement the following requirements:

  1. The cloud service polls each sensor node once every 100 ms to request the sensor reading.
  2. The cloud service must display a live line chart showing the readings of each sensor. Figure 2 shows an example of the expected output. Python Socket And Packet Tracer Weather Monitoring System.
  3. The reading should be continuous, and plots should keep updating continuously.
  4. You need to define a simple protocol (messages) to request turning on/off the warning lights.

 

You are free to choose the sensors you want but you must have two different sensors. You may use a generic sensor and use PT APIs to read the relevant sensor data from the environment. Connect your sensors to an SBC or MCU to enable connectivity. For programming in PT, use the RealTCPServer(), RealUDPServer() , RealTCPClient() and/or RealUDPClient() template.

 

Report: attach a report with your solution that includes:

  1. Screenshot of the program output.
  2. Types of sensors used and threshold you define for each sensor.
  3. Protocol messages you specify between the cloud and sensor nodes.

 

 

Hint: The Client should be the python file out of the Packet Tracer. As their will be two servers inside the Packet tracer. Python Socket And Packet Tracer Weather Monitoring System.

 

The Cloud WWW Issues Essay

The Cloud WWW Issues Essay

Research and learn about the three topics listed below.

1. Dataveillance

2. Distributed Denial of Service Attacks

3. Internet Parental Control Software

4. Internet Anonymity

5. Cryptography

6. Biometrics

ORDER A PLAGIARISM FREE PAPER NOW

 

7. Big Data (Data Analytics) The Cloud WWW Issues Essay

8. Artificial Intelligence (AI – deep learning applications)

9. Browser fingerprinting

10. Facial Recognition

11. Virtualization

12. Blockchain

13. Machine Learning

14. Application Security

15. Cryptojacking

16. Cyber-Physical Attacks

17. Autonomous Vehicles

18. Smart Medical Devices

19. Electronic Medical Records

20. Smart Systems/Devices

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric) The Cloud WWW Issues Essay

Requirements:
Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation
Upload your presentation in the assignment box.

Additional Sources:
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote The Cloud WWW Issues Essay

Data Flow Diagram

Data Flow Diagram

After reviewing the proposed project, you saw the following:
1) Client is using OMS with Fidessa and is sending in drop copies of post trade messages from themselves as well as orders via FIX 4.2 protocol.
2) Fidessa OMS sends out pre-trade compliance checks back to client and gets the results back.
3) Post trade information is sent back to client in two ways: Data Flow Diagram

ORDER A PLAGIARISM-FREE PAPER NOW

 

a) Batch file which is triggered at the end of the day and is placed on the Internet facing SFTP server managed by Fidessa.
b) Post trade messages are sent to Fidessa hosted middleware in real-time and the results are sent to the client’s database via a Fidessa installed service in the client’s datacenter. The connection between Fidessa and the client is over a private circuit managed by Fidessa.
Please create a simple and clean data flow diagram using any program of your choice for the scenario described. Please copy/paste the diagram here as a picture. Data Flow Diagram

Information Governance Essay

Information Governance Essay

Discussion 1: Digital Archival

Word count: 300+

Chapter 17 – Long-Term Digital Preservation

Chapter 18 – Maintaining an Information Governance Program and Culture of Compliance

ORDER A PLAGIARISM FREE PAPER NOW

Digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained. Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records. Information Governance Essay

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

Remember to cite your sources. Share an applicable personal experience
. Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
* At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post.

 

Discussion 2: Reflection Activity

Word count: 300+

During this semester, we examined several areas of governance and ways in which governance models are applied and regulated by governments and industry since you have already examined several research articles, choose an interesting topic on governance models, frameworks, regulations, etc. Information Governance Essay

Here are some pointers that will help critically evaluate some viable topics.• Is the topic attainable for a first-time dissertation student?

• Is the problem rooted in the literature?

• Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?

• Is there a theoretical model or framework discussed?

Discuss the topic, the problem the model has been used in the research, and any present findings.

 

Portfolio project:

Attached is the document for reference on what is already completed.

Please make sure to fill in the pieces that are required in the below description.

No. of pages: 2 (for 2 and 5 points listed below)
The entire milestone should be a minimum of 2 pages with 10 peer-reviewed scholarly articles.

You must include at least one figure or table. These must be of your own creation. Do not copy from other sources.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Information Governance Essay

Scenario:
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department. The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business, or customers. The company also desires to leverage the marketing power of social media but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective. The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. Information Governance Essay

Part3: This is the final part of the portfolio project. Please include the below sections:

1. Executive Summary (Abstract) – beginning of the project ie; after title page.

2. Introduction – COMPLETED

3. Annotated Bibliography and Literature review – COMPLETED

4. Program and technology recommendations, including:

a. Metrics

b. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

c. Regulatory, security, and privacy compliance expectations for your company

d. Email and social media strategy

e. Cloud Computing strategy

5. Conclusion Information Governance Essay

Textbook: Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 3 assignments. Please provide answers in separate documents. Information Governance Essay

Migration Presentation And Diagrams Essay

Migration Presentation And Diagrams Essay

GTR is now focused on more practical matters like migration of data from the various applications and is wondering how this will work when they have many systems, databases, and tools that don’t integrate. Migration Presentation And Diagrams Essay

ORDER A PLAGIARISM FREE PAPER NOW

Prepare a 10- to 12-slide Microsoft® PowerPoint® presentation, with speaker notes, focusing on migration, migration services, and tools. Your presentation should:

State the common operational drivers that cause companies to migrate to the cloud.
Explain the stages of cloud adoption in general terms to help GTR understand some of the key steps involved.
Describe the Migration Process.
Define the 6 common migration strategies and identify one that would be useful to your organization.
Note: Be sure to include title and reference slides.

Create high-level Visio® diagrams of the stages of cloud adoption and the migration process. Save each of the diagrams separately and insert into your slide deck (.jpg, .gif, .png, .eps, .psd, .qti, .tiff) or as a PDF file and include as addition as to your slide presentation. (See the Student Success Guide for instructions on downloading a free copy of Microsoft® Visio®.)

Cite all sources in APA and give attribution where appropriate. Migration Presentation And Diagrams Essay