Computer Engineering Discussion

Description

1.Discussion Question: Summary & Critical Thinking

In this discussion question you have the opportunity to be creative and to relate what you have learned to your professional lives. Please explore and critically think about some of the learning objectives and concepts presented in this course. Please effectively communicate how you would lead an organization (or a group of people within the organization) by applying the knowledge you have learned ethically and responsibly. Your discussion should also include innovative thinking, and information-technology aspects (such as the Internet, social-media, computers, and so forth) that may assist you in decision-making. You may frame your discussion around any functional component of business, and in any context; problem-solving, management, leadership, organizational behavior, and so forth.

2.CLA 2 Comprehensive Learning Assessment

During this course various concepts regarding Software Engineering have been introduced.

Research the following:

1. Three (3) different processes that can be used to manage a software design project.

2. Explain the Software Lifecycle Process to include what occurs during each phase.

Your APA-formatted report should be a minimum of 6-8-pages, and include a minimum of 6 peer-reviewed or academic resources.

*Please refer to the Grading Criteria for Comprehensive Learning Assessments (CLAs) in the University Policies for specific guidelines and expectations.

Please follow these guidelines to answer:

  • 7 to8-page paper (1,800-word minimum excluding title and references pages)
  • APA formatted paper
  • Reference at least eight (8) peer-reviewed sources beyond the course materials
  • Use the textbook for research and reference it as a source with corresponding intext citations
  • Avoid bulleted and numbered lists
  • No lengthy direct quotes
  • Be clear, well-organized, and specific
  • Use paragraphs to express ideas

3.CLA2 Comprehensive Learning Assessment (CLA 2) Presentation

In addition to your CLA2 report, please prepare a professional PowerPoint presentation summarizing your findings for CLA2. The presentation will consist of your major findings, analysis, and recommendations in a concise presentation of 15 slides (minimum). You should use content from your CLA2 report as material for your PowerPoint presentation. In addition, you should include learning outcomes from all your major assignments. This would include PA1, CLA1, PA2, and of course, CLA2 (unless otherwise specified by your Professor). An agenda, executive summary, and references slides should also be included. Please keep in mind that the university is moving towards a more digital footprint for our students. This means that your final CLA2 presentation may be recorded, so that you may include it in your “e-portfolio” (graduating students should have all of their CLA2 presentations on a flash-drive, in addition to student biography, resume, interests, and so forth). Students will present their PowerPoint during the last week of class in either the On-Campus Class Session or the online Virtual Class Session, as determined by the professor. Presentations should not exceed 15 minutes.

*Please refer to the Grading Criteria for CLA2 Presentations in the University Policies for specific guidelines and expectations.

  • Models based on the system Requirements
  • Software Maintenance concepts.
  • Reason for using Reuse Components.
  • Service-Oriented Architecture.
  • Real-Time Software Engineering
  • Project Management
  • Project Planning
  • Quality and Configuration Managements

Briefly explain these concepts in CLA2 presentation slides upto 15 pages.

Boston University Algorithms Worksheet

Description

Problem 1:Let n be a positive integer. Partition the following set of 15 functions into equivalence classes

such that f(n) and g(n) are in the same equivalence class if and only if f(n) = ?(g(n)). (If a base of a

logarithm is not specified, it is assumed to be equal 2.)

9 log 3

? n

n n 8e 2 +

1

e n

4 log 8 + 2 n log(4 n )

nlog(n!) 4 (

n

2 )

n 2 4 n + n 5 (0.5) n

n! n n + n! 2 2n n 2 logn log 5 (n

1

3 )

Then arrange the equivalence classes into a sequence

C 1 ,C 2 ,C 3 ···

such that for any f(n) ? C i and g(n) ? C i+1 f(n) = O(g(n)).

Problem 2: An elevator brought you to the ground floor of a building. You want to exit the building.

You don’t know, where the exit from the building is. There are 5 different paths that you can take. The

problem is that all five paths are infinitely long, and only one of them has a door that you can use to exit

the building. The distance between the elevator and the door is no less than 30 steps. (Make sure to use

this information!) You don’t know, which of the four paths has the door, but you will see it once you are in

front of it. Design an algorithm that enables you to find the door by walking at most O(n) steps, where n

is the number of steps that you would have taken if you knew where the door is and walked directly to it.

What is the constant multiple in the big-O bound for your algorithm?

Problem 3: Use the method of iterative substitution to solve the following recurrence. Give the asymptotic

solution as well. Assume that T(n) is constant for n ? 5.

1

Homework 1: CS 141

(Asymptotic notations)

Intermediate Data Structures and Algorithms

T(n) =

(

c if n ? 5

T(n ? 4) + log(n) if n > 5

Problem 4:

(a) Use the method of iterative substitution to solve the following recurrence.

T(n) =

(

2 if n ? 7

T(n 1/3 ) + ?(loglogn) if n > 7

(b) Use mathematical induction to prove that your asymptotic solution for (a) is correct.

Problem 5: Euclid’s algorithm uses the following simple formula, which leads to the algorithm below.

Euclid’s rule If x and y are positive integers with x ? y, then gcd(x,y) = gcd(x mod y,y).

procedure Euclid(a, b)

input: a,b are integers with a ? b ? 0

output: gcd(a,b)

if b = 0 : return a

return Euclid(b,a mod b)

Here, we will look at an alternative algorithm based on divide and conquer.

(a) Show that the following rule is true.

gcd(a,b) =

?

?

?

?

?

2gcd(a/2,b/2) if a,b are even

gcd(a,b/2) if a is odd, b is even

gcd((a ? b)/2,b) if a,b are odd

(b) Give an efficient divide-and-conquer algorithm for greatest common divisor. (You can write it in plain

English or use pseuodocode.) Argue the correctness and running time of your algorithm.

Purdue University Global Weekly Vulnerability & Security Updates Presentation

Description

Using the US-Cert Advisories, during the Department Meeting on Thursday, inform the team of the latest updates and advisories from CISA.

Create a slide and send to the Manager and Lead(s)

Additional information:

Google Releases Security Updates for Chrome

Original release date: April 15, 2022

Google has released Chrome version 100.0.4896.127 for Windows, Mac, and Linux. This version addresses a vulnerability that an attacker could exploit to take control of an affected system. This vulnerability has been detected in exploits in the wild.

CISA encourages users and administrators to review the Chrome Release Note and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

VMware Releases Security Updates for Cloud Director

Original release date: April 15, 2022

VMware has released security updates to address a remote code execution vulnerability in Cloud Director. An attacker could exploit this vulnerability to take control of an affected system.

CISA encourages users and administrators to review VMware Security Advisory VMSA-2022-0013 and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

CISA Adds Nine Known Exploited Vulnerabilities to Catalog

Original release date: April 15, 2022

CISA has added nine new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow on the of the “Date Added to Catalog” column, which will sort by descending dates.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the meet the specified criteria.

This product is provided subject to this Notification and this Privacy & Use policy.

UMGC week 5 Framing Decision Discussion

Description

MDQ STEP TWO: FRAMING THE DECISION

There are three components to a decision frame in the MDQ model:

  • Purpose – What does Harry Hannah hope to accomplish by making the decision?
  • Scope – What should Harry Hannah include and exclude in the decision?
  • Perspective – What is Harry Hannah’s point of view about the decision? What are the ways he wants to approach, or others may approach, making the decision? (Framing is like the zoom feature of the camera. What we include in the picture is the scope of the decision it, the angle for the best lighting and view is the perspective and what kind of picture we want, an action or landscape shot, is the purpose.)

The goal of this discussion for you to apply step two of the MDQ model, define the three components to Hannah’s Hats’ decision frame, and narrow down four objectives.

, complete the following:

    • Use the Decision Statement that you selected in the Week 4 Discussion (Step One). This could be the one that was provided or one that you came up with on your own.
    • Explain what “Framing the Decision” means in terms of the three components (Purpose, Scope, and Perspective). You do this by addressing, discussing and supporting each of the terms – purpose, scope, and perspective (MDQ model). Discuss the biases and traps that must be avoided in Framing the Decision.
    • Explain the meaning and purpose in using objectives in the MDQ model. Discuss the specific biases and traps that must be avoided.
    • Identify the Decision Statement again so it is clear what the Decision Statement you are using is. Then, identify the best four objectives for the Decision Statement that you selected.
    • Explain why these objectives are the best for Hannah’s Hats and Harry Hannah as the decision maker to help frame the decision. Be sure to explain specifically what constitutes a sound objective and why it is important to making the decision.

THREE OR MORE DAYS THROUGHOUT THE WEEK, complete the following:

    • Respond to a minimum of three classmates’ posts that have a decision statement that differs from your own. You will need to review their post and determine whether you agree that their objectives help frame the decision and why or why not. Make sure to support your statements with facts from the case study as well as information about the model (purpose, scope, and perspective). Additionally, your follow-up posts should be substantive and should move the discussion forward. Discussion posts that simply tell a student they did a good job on their posting or discussions that agree with the other student’s response will not count.
    • You must use course material to support your responses and make sure to use APA formatting and a reference listing for any sources you use.

CUP Dijkstra’s Algorithm Data structures C++ Project

Description

Instructions

For C++ Programming  you will be implementing an undirected weighted Graph ADT and performing Dijkstra’s Algorithm to find the shortest path between two vertices. Your graph can be implemented using either an adjacency list, adjacency matrix, or an incidence matrix. Your graph will implement methods that add and remove vertices, add and remove edges, and calculate the shortest path. Each vertex in your graph will have a string label that will help identify that vertex to you and the test file.

A large portion of this assignment is researching and implementing Dijkstra’s Algorithm. There is information about this algorithm in your textbook and widely available on the web.

Abstract Class Methods

void addVertex(std::string label)

Creates and adds a vertex to the graph with label. No two vertices should have the same label.

void removeVertex(std::string label)

Removes the vertex with label from the graph. Also removes the edges between that vertex and the other vertices of the graph.

void addEdge(std::string label1, std::string label2, unsigned long weight)

Adds an edge of value weight to the graph between the vertex with label1 and the vertex with label2. A vertex with label1 and a vertex with label2 must both exist, there must not already be an edge between those vertices, and a vertex cannot have an edge to itself.

void removeEdge(std::string label1, std::string label2)

Removes the edge from the graph between the vertex with label1 and the vertex with label2. A vertex with label1 and a vertex with label2 must both exist and there must be an edge between those vertices

unsigned long shortestPath(std::string startLabel, std::string endLabel, std::vector<std::string> &path)

Calculates the shortest path between the vertex with startLabel and the vertex with endLabel using Dijkstra’s Algorithm. A vector is passed into the method that stores the shortest path between the vertices. The return value is the sum of the edges between the start and end vertices on the shortest path.

Examples

Below in an example of the functionality of the implemented graph:

std::vector<std::string> vertices1 = { “1”, “2”, “3”, “4”, “5”, “6” };

std::vector<std::tuple<std::string, std::string, unsigned long>> edges1 = { {“1”, “2”, 7}, {“1”, “3”, 9}, {“1”, “6”, 14}, {“2”, “3”, 10}, {“2”, “4”, 15}, {“3”, “4”, 11}, {“3”, “6”, 2}, {“4”, “5”, 6}, {“5”, “6”, 9} };

for (const auto label : vertices1) g.addVertex(label);

for (const auto &tuple : edges1) g.addEdge(std::get<0>(tuple), std::get<1>(tuple), std::get<2>(tuple));

g.shortestPath(“1”, “5”, path); // == 20

g.shortestPath(“1”, “5”, path); // = { “1”, “3”, “6”, “5” }

Deliverables

Please submit complete projects as zipped folders. The zipped folder should contain:

  • Graph.cpp (Your written Graph class)
  • Graph.hpp (Your written Graph class)
  • GraphBase.hpp (The provided base class)
  • PP4Test.cpp (Test file)
  • catch.hpp (Catch2 Header)

And any additional source and header files needed for your project.

Hints

Though it may be appealing to use an adjacency matrix, it might be simpler to complete this algorithm using an adjacency list for each vertex.

I suggest using a separate class for your edge and vertex.

Remember to write a destructor for your graphs!

EDP University of Puerto Rico Autobiografía Presentation

Description

Objetivo de la actividad

Mediante esta actividad el estudiante logrará desarrollar una presentación de su autobiografía en la que aplique las destrezas aprendidas en el módulo.

Instrucciones

Antes de realizar el ejercicio acceda a los recursos, incluyendo los tutoriales. Esta actividad se califica una sola vez. La actividad es de carácter individual.

Antes de iniciar la creación de su presentación, aprenda qué es una autobiografía, el concepto, características y ejemplos (Cáceres-Ramírez, 2018). Además, conozca de las partes que componen una autobiografía. (Revista educativa Partesdel.com, 2017-09).

El propósito de esta actividad es que el estudiante desarrolle una presentación utilizando MS PowerPoint.

¿Qué vamos a hacer?

La meta consiste desarrollar una presentación con su autobiografía que lleve el mensaje de forma atractiva.

¿Cómo van a hacer?

  1. Acceda a las lecturas sobre Autobiografía.
  2. Utilice la aplicación MS PowerPoint 2016.
  3. El documento debe ser grabado con el título de su trabajo; por ejemplo: Autobiografía – María De Los Oliveros.
  4. Las partes del trabajo son:
    Portada, Indice, Introducción, Datos Personales, Desarrollo, Conclusión, Recomendaciones
  5. Utilice un tema (themes). Observe las recomendaciones dadas en los recursos.
  6. Los títulos y subtítulos deben estar en “bold” y centralizados
  7. Debe alinear en “justify” el contenido de los “slides”
  8. La letra no debe ser menor de 30.
  9. Debe contener header. El header debe ser su nombre y apellidos. Debe tener la fecha de creación. Debe tener el número de slide.
  10. Debe estar libres de errores gramaticales y ortográficos. Pueden utilizar el “Spelling & Grammar”, deben haber configurado el “Language” (Review).

Entregable

Destrezas que se evaluarán (vea criterios de evaluación):

  1. Creación de la presentación y guardar con el nombre correcto
  2. Utilizar themes
  3. Añadir imágenes
  4. Movimiento de transición en los slides
  5. Movimientos de animación en texto y gráficos (imágenes)
  6. Utilizar, al menos, tres tipos de layout (diseño)
  7. Tipo y tamaño de letras
  8. Libre de errores
  9. Uso del área de notas
  10. En cuanto a contenido, se evaluará que esté presente todas las partes de la autobiografía

La actividad es de carácter individual. El trabajo debe ser entregado a tiempo, sin errores ortográficos ni gramaticales. Los trabajos serán sometidos a la herramienta para detectar similitud de contenidos (ahora Urkund). Debe incluir las referencias en formato APA, de tres años o menos.

De tener dudas o preguntas debe publicarlas en el Foro Dudas y Preguntas con tiempo para poderles ayudar de forma oportuna.

Valor de la actividad

20 puntos

Disponibilidad de la actividad

La actividad estará disponible para entregar en cualquier momento de la semana. (Lunes a Domingo).

Recursos de revisión básicos

Recurso de revisión complementario

Massachusetts Institute of Technology Computer Science Essay

Description

I will attach the presentation from the last project later. This work needs to be 3 pages Project 2: Client Response Memo

Top of Form

Instructions

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

COMM 305 George Washington University Website Worksheet

Description

In this assignment, you’ll be creating a micro-site about a topic of your choice, by creating three basic HTML pages, linked together. You’ll style them with a single external style sheet.

Instructions

Select a single topic for your micro-site . It could be about life in the pandemic, an organization you’re a part of, a how-to guide — pretty much anything. But it must be focused and you must be able to construct three web pages about it.?I suggest making a website about a specific city travel promotion such as Los Angeles or Miami.?

Once you have your topic, decide what the three pages of your micro-site should be. You’ll have some sort of landing page (index.html) and then two other pages. It’s up to you to determine how to best organize your content.

For each page, create a new plain-text doc and add your structural HTML elements, including <!DOCTYPE html>, <html>, <head>, <body>, <meta /> and <title> tags. Be sure to give each page a Title in the <title>tag. Then, within the appropriate sections, write your content.

For HTML requirements, each page must contain at least:

one <h1> tag (titling the page for the user on the front end),

two <h2> tags (organizing the content on that particular page),

two relative links, opening in the same tab (linking to the other two pages of your micro-site),

three external links, opening in new tabs (linking to related content elsewhere on the web)

three embedded elements (which could include pictures, videos, tweets, SoundCloud files, etc.)

three <p> tags (used for at least three paragraphs of content that you’ll write).

  • For CSS requirements, your external style sheet must contain at least:

one font-family rule (which could apply to either headings or paragraph text or both),

  • one font-size rule (again, either headings, paragraph text or both),

two color rules (which could apply to font color or background color),

  • three other style rules of your choosing (they could be anything we’ve covered or any of those listed in the book).

Remember, to apply your CSS to each of your HTML docs, you’ll have to add a <link> tag within the <head> tag of each page.

  • When you’re finished, save all three HTML docs, the CSS sheet and any other media/files in the same folder.

Requirements

three HTML pages, linked together by relative links

  • three paragraphs of content on each of those pages

structural HTML elements on each page

  • all of the listed HTML requirements

all of the listed CSS requirements, in an external style sheet

University of North Texas Metasploit Framework Vulnerability Assesment

Description

Begin with a Vulnerability Scan on the Metasploitable 2 VM exactly as you did from the previous homework (steps 1-3 below). You do not have to re-do this portion if you don’t want to. The scan that you preformed from Lab 2 should have the info you need.

______________________________________________________

1. Download and setup Metasploitable 2 as a VM @

http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ (Links to an external site.)Links to an external site.

2. Run Metasploitable 2 and make sure it’s connected to your VM network… might take a bit of Linux shell power. I recommend separating your Kali and Metasploitable 2 VM’s so that they can only talk to each other and are not connected to the rest of your home network. You may need to break this initially in order to update and upgrade your Kali instance.

3. Use Kali to host a network vulnerability scanning tool (OpenVAS, Nessus, Nexpose, Retina, etc) to scan the Metasploitable 2 OS for vulnerabilities. DO NOT INCLUDE any of the rest of your home network. Output the results in a format that you can submit here and evaluate for future homework. No editing required this one time. The direct output from the tool will be acceptable. Analyze the results looking for major weaknesses and potential false positives .

______________________________________________________

4. From the result from step 3, identify the SAMBA service. Alternatively, if your tool does not catch the SAMBA vulnerability, note that. You can then get this result via a simple nmap scan either external to or within Metasploit. Exploit Metasploitable 2 via a SAMBA vulnerability using Metasploit from your Kali machine.

TIP: In order to do this, you will first need to determine what version of SAMBA is running on on Metasploitable 2 (auxiliary/scanner/smb/smb_version) and then identify and appropriate vulnerability for this version. (Hint: exploit/multi/samba/usermap_script)
***YOU MUST LIST THE RESOURCE THAT YOU USED TO IDENTIFY THIS VULNERABILITY. This needs to be independent of any walkthroughs or tutorials for Metasploitable*** (exploit/multi/samba/usermap_script)

5. Demonstrate that this exploit actually gives you some level of control over the Metasploitable 2 machine via your Kali box. Showing that you can perform “root” functions would be a good example of this.

6. Create a BRIEF report showing the output from your vulnerability scan identifying the SAMBA vulnerability and showing a few screenshots with descriptions of your execution of Metasploit to exploit the vulnerability.

IT 600 Southern New Hampshire University Operating Systems Discussion

Description

PART 1: DISCUSSION

Shared memory pages are an example of a topic where a picture is worth a thousand words. Find at least one illustration in Google Images by entering the search key “shared memory pages” in the search box. Be sure to enter it in the search box with quotes so the entire phrase is interpreted by the search engine as a single string.

Using an illustration you find, make that picture the focus of your post. Create a Discussion Topic post that outlines the function of shared memory pages. Go into detail about the proper operation of shared memory pages as described by the course textbook. If you find an illustration that does not agree with the course textbook, be sure to use it and make any inconsistencies the focus of your post.

It is very important that you properly attribute the image by listing the original author(s) of the illustration you find. Go to Citing Your Sources Guide to find instructions and examples of using proper attribution.

After your initial post, respond constructively to two of your peers’ posts after comparing your initial post to their initial posts. Justify your suggestions for the addition or revision of any of the benefits and drawbacks of using shared pages.

Comment on the accuracy of their specification of the conditions under which the practice provides performance benefits, as well as the specific instances when efficiency is negatively impacted.

To complete this assignment, review the Discussion Rubric PDF document.

PART 2:

Create a journal assignment in preparation for the memory management assessment elements of your final project.

Identify a graphical or command line utility that displays the allocation of virtual memory on your workstation. For example, memory_pressure provides information about the state of memory pages on OS X. The command or utility you choose must be part of the standard operating system’s distribution. Do not use third-party utilities. You are encouraged to select an operating system different from the one you used in previous lab exercises.

Execute the command and report on your findings in a journal assignment that provides insight into how the command you selected displays physical and virtual memory.

For additional details, please refer to the Module Five Journal Guidelines and Rubric PDF document.

ALL RUBRICS AND MATERIALS WILL BE SENT TO YOU.