Description
8. Which of these can a worksheet within a spreadsheet contain?
a chart
multiple charts
data
all of these
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Answer: all of these
Completion Status:
100%
Review
Review
Anonymous
Excellent resource! Really helped me get the gist of things.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
4 pages
Pki And Encryption At Work
infrastructure (PKI) and encryption solutions. The PKI and encryption solutions will assist the company in protecting data ...
Pki And Encryption At Work
infrastructure (PKI) and encryption solutions. The PKI and encryption solutions will assist the company in protecting data and information. PKI is ...
CIS 22C De Anza College Binary Search Trees Lab 5 & 6 Reports
Using C++Lab 5 - Binary Search TreesDeclare and implement a BSTNode ADT with a data attribute and two pointer attributes, ...
CIS 22C De Anza College Binary Search Trees Lab 5 & 6 Reports
Using C++Lab 5 - Binary Search TreesDeclare and implement a BSTNode ADT with a data attribute and two pointer attributes, one for the left child and the other for the right child. Implement the usual getters/setters for these attributes.Declare and implement a BST as a link-based ADT whose data will be Currency objects - the data will be inserted based on the actual money value of your Currency objects as a combination of the whole value and fractional value attributes. For the BST, implement the four traversal methods as well as methods for the usual search, insert, delete, print, count, isEmpty, empty operations and any other needed.Your pgm will have at least 10 Currency objects created from data in an input text file - one per line in the right form as for Lab 1A.Also, create an output file to write program output as specified in one or more instructions below.The data files can be anywhere on the machine, so prompt the user for the full path of the file.Perform adequate data validation when reading data from the file - if any data item is invalid, ignore the data item and continue to next item but print a message to output (both screen and output file ) to indicate which data items were ignored.Read the data to create your Currency database using the BST.Provide interactivity for the user to add/search/delete nodes from the console after the data has been seeded into the application. Once the user selects the option to print data or exits the program, the data in the BST should be printed out to both screen and output file in all four traversal methods in the specific sequence of breadth-first, in-order, pre-order, post-order. Ensure I can run the programs by using my own input file without having to fix your code for file locations - the file name and location is unknown to you.Lab 6 Makeup - Hash TablesWrite a program to do the following:Use the input data file you provided for Lab 5 (your BST homework) as input to enter data into a hash table.Declare a hash table of size 29 elements.To hash your currency objects into the hash table, use the pseudorandom hash scheme - (m*w + n*f) % size - where size = 29, m = 2, n = 3, w = whole value, f = fractional value.For collision resolution, use quadratic probing in the same direction always. Remember to circle around to the start of the array if needed.Your main will first load the data file into the hash table and print the number of data items loaded, load factor and number of collisions. Then it will ask the user in a loop to enter a Currency to search for. If the Currency object is found in the hash table, it will print the index where found, otherwise it will print 'Invalid Data'. Then it will ask the user if they want to check again or end the program.I will test your program with my own version of the data file which may exist in any folder on my machine and the number of entries in the file are unknown to you when coding.
CIS542 Strayer University Malicious Activity Report
Assignment: Malicious Activity You are a manager of a Web development team for a fictional international delivery service ...
CIS542 Strayer University Malicious Activity Report
Assignment: Malicious Activity You are a manager of a Web development team for a fictional international delivery service. Please give your fictional business a name, and provide a sentence or two of background information about the company. Your team maintains all of the e-commerce servers, including creating and updating all of the content on the Web pages and the database that stores customer information. These are mission critical servers. You have 4 clustered nodes that are used for load balancing. These nodes are located in 4 cities around the globe. Two are in the USA, one is in Europe, and one is in Asia. The choices of cities and countries is yours: Node1: City___________Country___________ Node2: City___________Country___________ Node3: City___________Country___________ Node4: City___________Country___________ Each site is interconnected, and gets regular updates from the home office, located in a different city & country that you will choose. A TCPDUMP is scheduled daily so the team can analyze real time traffic using WireShark. A team member alerts you to a potential problem found in <NODE OF YOUR CHOICE> capture. There is an alarming amount of activities from port 40452, which shows a redirect to the index.php page instead of the login.php page. It appears this node has been compromised with a SQL Injection Attack. You rely on these sites so you are unable to shut down all e-commerce activities. For this Assignment, please write a report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully-developed explainations, address each of the following: Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site. Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified. Evaluate the OWASP Top 10 2017, found at https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk.Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Note: Test the links to ensure they work before submitting your paper. Format your assignment according to the following formatting requirements: Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.Include a reference page. Citations and references must follow professional business language format. The reference page is not included in the required page length. The specific course learning outcomes associated with this assignment are: Analyze Web traffic and log files for malicious activitiesAnalyze common Website attacks, weaknesses, and security best practices.Use technology and information resources to research issues in securing Web-based applications.Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions. Note: Use quality resources and assignment will be check for plagiarism. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 175 Assignment 1: Malicious Activity Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Weight: 30% Did not submit or incompletely explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Partially explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Satisfactorily explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Thoroughly explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. 2. Summarize the steps required to mitigate all future occurrences of this type of attack, and how to verify the vulnerability has been rectified. Weight: 30% Did not submit or incompletely summarized the steps required to mitigate all future occurrences of this type of attack, and did not summarize how to verify the vulnerability has been rectified. Partially summarized the steps required to mitigate all future occurrences of this type of attack, and partially summarized how to verify the vulnerability has been rectified. Satisfactorily summarized the steps required to mitigate all future occurrences of this type of attack, and satisfactorily summarized how to verify the vulnerability has been rectified. Thoroughly summarized the steps required to mitigate all future occurrences of this type of attack, and thoroughly summarized how to verify the vulnerability has been rectified. 3. Evaluate the OWASP Top 10 2017 and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk. Weight: 30% Did not submit or incompletely evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Did not provide specific mitigation strategies to address each risk. Partially evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Partialy provided specific mitigation strategies to address each risk. Satisfactorily evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Satisfactorily provided specific mitigation strategies to address each risk. Thoroughly evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Thoroughly provided specific mitigation strategies to address each risk. 5. Provide four (4) quality references Weight: 5% No references provided. Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 7. Clarity, writing mechanics, and formatting requirements Weight: 5% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present
6 pages
Data Mining
1. Data mining refers to the process of data analysis from various perspectives and processing it into required form. Data ...
Data Mining
1. Data mining refers to the process of data analysis from various perspectives and processing it into required form. Data mining software is an ...
Cybersecurity Web Accessibility Evaluation Tool Presentation
1. WAVE is a web accessibility evaluation tool found at this URL http://wave.webaim.org (Links to an external site.) ...
Cybersecurity Web Accessibility Evaluation Tool Presentation
1. WAVE is a web accessibility evaluation tool found at this URL http://wave.webaim.org (Links to an external site.)Evaluate the accessibility of MU’s home page (www.marymount.edu (Links to an external site.)) and answer the following:
How many accessibility errors were generated by the tool?
What are the errors?
What do the errors mean?
Why do the errors matter?
How can the errors be fixed?
2. Conduct research on usability testing tools. Identify 5 tools and briefly describe how each tool works and what type of software (mobile or desktop) it supports. and how much it costs?
9 pages
20991763 China S Cyber Espionage A Danger To The Us National Security
CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SE ...
20991763 China S Cyber Espionage A Danger To The Us National Security
CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY
Similar Content
Assignment
How do regulations impact your daily lives and what controls do you see that enable their effectiveness (such as Consumer ...
Accessing Content Discussion
Many organizations allow vendors/partners/collaborators to
access their content either remotely or only in-house. Under...
IT 244 Saudi Electronic University Mansour Project
You must submit two separate copies (one Word file and one PDF file) using this Template on Blackboard via the allocated f...
University of the Cumberlands Computer Science Discussion
Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how ...
Hello, I need help with one Task?
Week 3 discussion topic: Choose one of the real-world exercises at the end of the chapter on page 123 (3-1 through 3-4). P...
San Jose State University Statistical Quantitative Research Approach Paper
your report paper should meet the following requirements: Be approximately 4-5 pages in length, not including the required...
Access Database.edited
It would be important for a future legal law officer to have an access database. This would be important as a legal databa...
Ema Workbench
Explain how you could use the EMA Workbench software to develop a model to The EMA Workbench Software tool is an important...
Discussion Replies
Good post. I commend the work you have done in elaborating the types and techniques of anomaly detection. Your post is ver...
Related Tags
Book Guides
The Road
by Cormac McCarthy
Into the Wild
by Jon Krakauer
Cry the Beloved Country
by Alan Paton
The Age of Innocence
by Edith Wharton
Untamed
by Glennon Doyle
Sense And Sensibility
by Jane Austen
Death on the Nile
by Agatha Christie
Extreme Ownership - How US Navy SEALs Lead and Win
by Jocko Willink and Leif Babin
The Calcutta Chromosome
by Amitav Ghosh
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
4 pages
Pki And Encryption At Work
infrastructure (PKI) and encryption solutions. The PKI and encryption solutions will assist the company in protecting data ...
Pki And Encryption At Work
infrastructure (PKI) and encryption solutions. The PKI and encryption solutions will assist the company in protecting data and information. PKI is ...
CIS 22C De Anza College Binary Search Trees Lab 5 & 6 Reports
Using C++Lab 5 - Binary Search TreesDeclare and implement a BSTNode ADT with a data attribute and two pointer attributes, ...
CIS 22C De Anza College Binary Search Trees Lab 5 & 6 Reports
Using C++Lab 5 - Binary Search TreesDeclare and implement a BSTNode ADT with a data attribute and two pointer attributes, one for the left child and the other for the right child. Implement the usual getters/setters for these attributes.Declare and implement a BST as a link-based ADT whose data will be Currency objects - the data will be inserted based on the actual money value of your Currency objects as a combination of the whole value and fractional value attributes. For the BST, implement the four traversal methods as well as methods for the usual search, insert, delete, print, count, isEmpty, empty operations and any other needed.Your pgm will have at least 10 Currency objects created from data in an input text file - one per line in the right form as for Lab 1A.Also, create an output file to write program output as specified in one or more instructions below.The data files can be anywhere on the machine, so prompt the user for the full path of the file.Perform adequate data validation when reading data from the file - if any data item is invalid, ignore the data item and continue to next item but print a message to output (both screen and output file ) to indicate which data items were ignored.Read the data to create your Currency database using the BST.Provide interactivity for the user to add/search/delete nodes from the console after the data has been seeded into the application. Once the user selects the option to print data or exits the program, the data in the BST should be printed out to both screen and output file in all four traversal methods in the specific sequence of breadth-first, in-order, pre-order, post-order. Ensure I can run the programs by using my own input file without having to fix your code for file locations - the file name and location is unknown to you.Lab 6 Makeup - Hash TablesWrite a program to do the following:Use the input data file you provided for Lab 5 (your BST homework) as input to enter data into a hash table.Declare a hash table of size 29 elements.To hash your currency objects into the hash table, use the pseudorandom hash scheme - (m*w + n*f) % size - where size = 29, m = 2, n = 3, w = whole value, f = fractional value.For collision resolution, use quadratic probing in the same direction always. Remember to circle around to the start of the array if needed.Your main will first load the data file into the hash table and print the number of data items loaded, load factor and number of collisions. Then it will ask the user in a loop to enter a Currency to search for. If the Currency object is found in the hash table, it will print the index where found, otherwise it will print 'Invalid Data'. Then it will ask the user if they want to check again or end the program.I will test your program with my own version of the data file which may exist in any folder on my machine and the number of entries in the file are unknown to you when coding.
CIS542 Strayer University Malicious Activity Report
Assignment: Malicious Activity You are a manager of a Web development team for a fictional international delivery service ...
CIS542 Strayer University Malicious Activity Report
Assignment: Malicious Activity You are a manager of a Web development team for a fictional international delivery service. Please give your fictional business a name, and provide a sentence or two of background information about the company. Your team maintains all of the e-commerce servers, including creating and updating all of the content on the Web pages and the database that stores customer information. These are mission critical servers. You have 4 clustered nodes that are used for load balancing. These nodes are located in 4 cities around the globe. Two are in the USA, one is in Europe, and one is in Asia. The choices of cities and countries is yours: Node1: City___________Country___________ Node2: City___________Country___________ Node3: City___________Country___________ Node4: City___________Country___________ Each site is interconnected, and gets regular updates from the home office, located in a different city & country that you will choose. A TCPDUMP is scheduled daily so the team can analyze real time traffic using WireShark. A team member alerts you to a potential problem found in <NODE OF YOUR CHOICE> capture. There is an alarming amount of activities from port 40452, which shows a redirect to the index.php page instead of the login.php page. It appears this node has been compromised with a SQL Injection Attack. You rely on these sites so you are unable to shut down all e-commerce activities. For this Assignment, please write a report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully-developed explainations, address each of the following: Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site. Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified. Evaluate the OWASP Top 10 2017, found at https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk.Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Note: Test the links to ensure they work before submitting your paper. Format your assignment according to the following formatting requirements: Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.Include a reference page. Citations and references must follow professional business language format. The reference page is not included in the required page length. The specific course learning outcomes associated with this assignment are: Analyze Web traffic and log files for malicious activitiesAnalyze common Website attacks, weaknesses, and security best practices.Use technology and information resources to research issues in securing Web-based applications.Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions. Note: Use quality resources and assignment will be check for plagiarism. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 175 Assignment 1: Malicious Activity Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Weight: 30% Did not submit or incompletely explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Partially explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Satisfactorily explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. Thoroughly explained the immediate steps you would instruct your team to use to contain the attack, and also to maintain the service to the e-commerce site. 2. Summarize the steps required to mitigate all future occurrences of this type of attack, and how to verify the vulnerability has been rectified. Weight: 30% Did not submit or incompletely summarized the steps required to mitigate all future occurrences of this type of attack, and did not summarize how to verify the vulnerability has been rectified. Partially summarized the steps required to mitigate all future occurrences of this type of attack, and partially summarized how to verify the vulnerability has been rectified. Satisfactorily summarized the steps required to mitigate all future occurrences of this type of attack, and satisfactorily summarized how to verify the vulnerability has been rectified. Thoroughly summarized the steps required to mitigate all future occurrences of this type of attack, and thoroughly summarized how to verify the vulnerability has been rectified. 3. Evaluate the OWASP Top 10 2017 and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk. Weight: 30% Did not submit or incompletely evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Did not provide specific mitigation strategies to address each risk. Partially evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Partialy provided specific mitigation strategies to address each risk. Satisfactorily evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Satisfactorily provided specific mitigation strategies to address each risk. Thoroughly evaluated the OWASP Top 10 2017 and list three more potential vulnerabilities. Thoroughly provided specific mitigation strategies to address each risk. 5. Provide four (4) quality references Weight: 5% No references provided. Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 7. Clarity, writing mechanics, and formatting requirements Weight: 5% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present
6 pages
Data Mining
1. Data mining refers to the process of data analysis from various perspectives and processing it into required form. Data ...
Data Mining
1. Data mining refers to the process of data analysis from various perspectives and processing it into required form. Data mining software is an ...
Cybersecurity Web Accessibility Evaluation Tool Presentation
1. WAVE is a web accessibility evaluation tool found at this URL http://wave.webaim.org (Links to an external site.) ...
Cybersecurity Web Accessibility Evaluation Tool Presentation
1. WAVE is a web accessibility evaluation tool found at this URL http://wave.webaim.org (Links to an external site.)Evaluate the accessibility of MU’s home page (www.marymount.edu (Links to an external site.)) and answer the following:
How many accessibility errors were generated by the tool?
What are the errors?
What do the errors mean?
Why do the errors matter?
How can the errors be fixed?
2. Conduct research on usability testing tools. Identify 5 tools and briefly describe how each tool works and what type of software (mobile or desktop) it supports. and how much it costs?
9 pages
20991763 China S Cyber Espionage A Danger To The Us National Security
CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SE ...
20991763 China S Cyber Espionage A Danger To The Us National Security
CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY CHINA’S CYBER ESPIONAGE; A DANGER TO THE US NATIONAL SECURITY
Earn money selling
your Study Documents