Description
Unformatted Attachment Preview
Project2 Chapter3
Write a Python program to choose one of the following two options for your summer vacation.
Your options are:
1. Hawaii
2. Bahamas
Your program should select one of the above options using if…elif…else statements.
Once an option is selected, your program should select one of the following two options using.
if…else if…else if…else statement for airline ticket.
1. US Air
2. Delta
Once one of the above options is selected, your program should read the air fare for
a round trip. Your program should also select one of the following three options for number of
passengers using if…elif…else statements:
1. One person
2. Two persons
3. Three persons
Once number of passengers is read, then your program should ask how many passengers are
underage of 18. There will be 25% discount for travelers underage of 18.
Compute the total cost of air fare for one family. Display round trip ticket price for adult, air
fare, round trip ticket price for person(s) underage of 18, airline name, location of vacation and
total cost of vacation.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
View attached ex...
Completion Status:
100%
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4
24/7 Study Help
Stuck on a study question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
CST 630 University of Maryland Risk Management Network Security Baseline Analysis
Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of th ...
CST 630 University of Maryland Risk Management Network Security Baseline Analysis
Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the Security, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
Log Collection and SIEM Discussion
Log
collection and management strategy is one of the most important
decisions an organization can make as these logs p ...
Log Collection and SIEM Discussion
Log
collection and management strategy is one of the most important
decisions an organization can make as these logs provide pertinent event
data that is used to identify potential compromises from external and
internal threat actors, as well as organizational policy violations. For
this week's discussion board posting, I want you to respond to the
following questions:1) What are some log collection/management considerations that an organization might need to bear in mind?2)
Do log files unto themselves provide an organization with complete
visibility into what's occurring on the organization's network or to
support internal investigations? If not, what other data sources might
you think would provide enrichment to the existing data set?3)
Research centralized security incident and event management systems.
Provide a summary of the features they contain and provide your
assessment on how these features can be used by an organization (SOC
analyst, threat hunting team, or incident responder) to help support
investigations? Are there any particular features that might be useful
to help with regulatory compliance reporting?As always, please provide citations when applicable.
Post University Cyber Security Discussion
Discuss the objectives, activities, and assessment in either vulnerability management or environment hardening.
Post University Cyber Security Discussion
Discuss the objectives, activities, and assessment in either vulnerability management or environment hardening.
Discussion Forum :: Hardening the System
Comment on the following statements: Hardening is the process of making computers more secure. The process involves identi ...
Discussion Forum :: Hardening the System
Comment on the following statements: Hardening is the process of making computers more secure. The process involves identifying vulnerabilities and implementing mitigation controls.Provide an example of a malicious attacker and how an authorized user can be a threat to system security. Do you think malicious attackers or authorized users are more of a threat to computer security? Why? Support your answers with information and examples from your text and your experiences.
HSA4109 South University Zeus Books Web Server Technology Discussion
InstructionsThe Internet has turned into an around the clock battle ground of attackers and attackees. It is estimated tha ...
HSA4109 South University Zeus Books Web Server Technology Discussion
InstructionsThe Internet has turned into an around the clock battle ground of attackers and attackees. It is estimated that there are millions of compromised computers and servers known as bots, which are distributed throughout the world at any given time. Bots are responsible for becoming spam bots, web spiders, DDoS attackers, and can be used for other destructive and illegal activities.To ensure that the Zeus Books web server doesn't become a bot, it is important the web server is secured and protected from being compromised through exploits and attacks. Zeus Books is requesting you to perform a web server security mitigation assessment.In the assessment, Zeus Books has requested that you provide three known exploits on the following products and the solutions to mitigate any possible attacks leveraging versions you are currently running the Zeus Books website on:WindowsHypervisor ( choose one VMware (ESXi), Microsoft (Hyper-V), and Citrix (XenServer).Apache 2.XPHPBased on your understanding of web server security, create a 4- to 5page report in a Microsoft Word document answering the following:Discuss three known vulnerabilities or exploits on the technologies above.Discuss how you will be able to mitigate the known vulnerabilities or exploits.Discuss any security software or hardware components which should be used to protect Zeus's website.Discuss how you plan to monitor the Zeus Books web server for ongoing security alerting.Submission Details:Support your responses with examplesCite any sources in APA format.Name your document SU_ITS4109_W5_PP5_LastName_FirstInitial.doc.
Similar Content
ITS405 Portfolio Project Scenario
Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and
they are currentl...
Assignment 1: Designing FERPA Technical Safeguards
Imagine you are an Information Security consultant for a small college registrar’s office consisting of the registrar an...
IT 405 Saudi Electronic University PHP and MySQL Project
College of Computing and Informatics
Project
Deadline: Thursday 12/05/2022 @ 23:59
[Total Mark is 15]
Student Details:
C...
Related Tags
Book Guides
Get 24/7
Study help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
CST 630 University of Maryland Risk Management Network Security Baseline Analysis
Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of th ...
CST 630 University of Maryland Risk Management Network Security Baseline Analysis
Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the Security, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
Log Collection and SIEM Discussion
Log
collection and management strategy is one of the most important
decisions an organization can make as these logs p ...
Log Collection and SIEM Discussion
Log
collection and management strategy is one of the most important
decisions an organization can make as these logs provide pertinent event
data that is used to identify potential compromises from external and
internal threat actors, as well as organizational policy violations. For
this week's discussion board posting, I want you to respond to the
following questions:1) What are some log collection/management considerations that an organization might need to bear in mind?2)
Do log files unto themselves provide an organization with complete
visibility into what's occurring on the organization's network or to
support internal investigations? If not, what other data sources might
you think would provide enrichment to the existing data set?3)
Research centralized security incident and event management systems.
Provide a summary of the features they contain and provide your
assessment on how these features can be used by an organization (SOC
analyst, threat hunting team, or incident responder) to help support
investigations? Are there any particular features that might be useful
to help with regulatory compliance reporting?As always, please provide citations when applicable.
Post University Cyber Security Discussion
Discuss the objectives, activities, and assessment in either vulnerability management or environment hardening.
Post University Cyber Security Discussion
Discuss the objectives, activities, and assessment in either vulnerability management or environment hardening.
Discussion Forum :: Hardening the System
Comment on the following statements: Hardening is the process of making computers more secure. The process involves identi ...
Discussion Forum :: Hardening the System
Comment on the following statements: Hardening is the process of making computers more secure. The process involves identifying vulnerabilities and implementing mitigation controls.Provide an example of a malicious attacker and how an authorized user can be a threat to system security. Do you think malicious attackers or authorized users are more of a threat to computer security? Why? Support your answers with information and examples from your text and your experiences.
HSA4109 South University Zeus Books Web Server Technology Discussion
InstructionsThe Internet has turned into an around the clock battle ground of attackers and attackees. It is estimated tha ...
HSA4109 South University Zeus Books Web Server Technology Discussion
InstructionsThe Internet has turned into an around the clock battle ground of attackers and attackees. It is estimated that there are millions of compromised computers and servers known as bots, which are distributed throughout the world at any given time. Bots are responsible for becoming spam bots, web spiders, DDoS attackers, and can be used for other destructive and illegal activities.To ensure that the Zeus Books web server doesn't become a bot, it is important the web server is secured and protected from being compromised through exploits and attacks. Zeus Books is requesting you to perform a web server security mitigation assessment.In the assessment, Zeus Books has requested that you provide three known exploits on the following products and the solutions to mitigate any possible attacks leveraging versions you are currently running the Zeus Books website on:WindowsHypervisor ( choose one VMware (ESXi), Microsoft (Hyper-V), and Citrix (XenServer).Apache 2.XPHPBased on your understanding of web server security, create a 4- to 5page report in a Microsoft Word document answering the following:Discuss three known vulnerabilities or exploits on the technologies above.Discuss how you will be able to mitigate the known vulnerabilities or exploits.Discuss any security software or hardware components which should be used to protect Zeus's website.Discuss how you plan to monitor the Zeus Books web server for ongoing security alerting.Submission Details:Support your responses with examplesCite any sources in APA format.Name your document SU_ITS4109_W5_PP5_LastName_FirstInitial.doc.
Earn money selling
your Study Documents