assignment

Using Section 15-3a, starting on page 717, as your guide:
Create a sample XML document and DTD for the exchange of customer data.
Create a sample XML document and DTD for the exchange of product and pricing data.
Create a sample XML document and DTD for the exchange of order data.
Create a sample XML document and DTD for the exchange of student transcriipt data. Use your college transcriipt as a sample.
Prepare these XML documents using a text editor and save them as XML files. Then, submit these XML files for your assignment.
the materil will be linked in the file. Since it is a assignment for creating XML files, there won’t be nned of too much writing, just focus on creating the files, and there are 4 xml files in total, with a little explanation on the side.

Problem solving

Open the LifesAnimalShelter-04 database start file.
The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor
Enable content in the database.
Right-click the PetsWithoutMatchingOwner report and select Layout View to open the report in Layout view.
Change the report to a landscape orientation.
Click the Page Setup tab.
Click the Landscape button [Page Layout group].
Adjust the width of the report columns
Select a text box in the Why I’d make a great companion column.
Press and hold Shift and click to select the Why I’d make a great companion label.
Press F4 to open the Property Sheet and click the Format tab if necessary.
Enter 3.2″ in the Width property. You must press Enter or Tab after entering the value so that Access recognizes a changed value.
Enter 7″ in the Left property.
Select a text box in the Color column. Press and hold Shift and click to select the Color label.
Enter 1.5″ in the Width property.
Enter 5.3″ in the Left property.
Set the Width property of the Gender column and label to .6″ and set the Left property to 4.6″.
Set the Width property of the Age column and label to .5″ and set the Left property to 4″.
Set the Width property of the Breed column and label to 1.3″ and set the Left property to 2.5″.
Click a text box in the Breed column to select only the text box and to deselect the Breed label.
Enter .5″ in the Height property.
Set the Width property of the Type column and label to .7″ and set the Left property to 1.7″.
Set the Width property of the Pet Name column and label to .8″ and set the Left property to .8″. The report should look similar to Figure 4-141.
Layout view of report excerpt displays header, and two records.
Figure 4-141 PetsWithoutMatchingOwner report
Save the report.
Edit the header and footer sections.
Click the text box containing the Date.
Enter 7.4″ in the Left property.
Click to select the title label and then click the label again to open the edit mode.
Change the label to Pets Available for Adoption.
Click outside the label to save the changes.
Scroll down to the bottom of the report and select the page number text box.
Enter 9″ in the Left property.
Press F4 to close the Property Sheet.
Add grouping and sorting to the report.
Click the Group & Sort button [Design tab, Grouping & Totals group] to open the Group, Sort, and Total pane at the bottom of the report.
Alternate Instruction for Microsoft 365 Apps iconClick the Group & Sort button [Report Layout Design tab, Grouping & Totals group] to open the Group, Sort, and Total pane at the bottom of the report.
Click Add a group in the Group, Sort, and Total pane.
Select the Type field from the Group on select field list.
Click More in the Group, Sort, and Total pane.
Select the do not keep group together on one page arrow and then select keep header and first record together on one page (Figure 4-142).
Expanded Group, Sort, and Total pane with pointer on desired option in drop-down list.
Figure 4-142 Keep header and first record together on one page option
Click Add a sort in the Group, Sort, and Total pane.
Select the ID field from the Sort by select field list.
Close the Group, Sort, and Total pane by clicking the X in the upper-right corner of the Group, Sort, and Total pane. Be careful not to click the Delete symbol inside the pane or you remove the group.
Scroll to the top of the report. The first record should be for “Martin,” Pet ID number 6. Because the grouping uses a stepped layout, the word “Cat” appears in the Type column on the line above Martin.
Add conditional formatting to the report.
Click any cell in the Gender column.
Click the Conditional Formatting button [Format tab, Control Formatting group] to open the Conditional Formatting Rules Manager dialog box. Gender displays in the Show formatting rules for box.
Click the New Rule button to open the New Formatting Rule dialog box.
Select the Check values in the current record or use an expression rule type in the Select a rule type box if necessary.
Select equal to as the comparison.
Type M into the value box.
Select bold and choose the Dark Blue font color from the first row of Standard Colors.
Click OK. The completed rule displays in the Conditional Formatting Rules Manager dialog box (Figure 4-143).
Conditional formatting rule
Figure 4-143 Conditional formatting rule
Click Apply.
Click OK.
Save the report.
Add totals to the report to count how many of each type of pet is available.
Select a text box in the Pet ID column.
Click the Totals button [Design tab, Grouping & Totals group].
Alternate Instruction for Microsoft 365 Apps iconClick the Totals button [Report Layout Design tab, Grouping & Totals group].
Select Count Records. The report updates to show the total at the end of each group and a grand total at the end of the report.
Save the report.
Preview the report.
Select the View button [Design tab, Views group] and select Print Preview. The report should look similar to Figure 4-144.
Alternate Instruction for Microsoft 365 Apps iconSelect the View button [Report Layout Design tab, Views group] and select Print Preview. The report should look similar to Figure 4-144.
Report excerpt displays header, two records in detail section, and page number in footer.
Figure 4-144 Print Preview of completed report
Click the One Page button [Print Preview tab, Zoom group] if necessary.
Use the navigation arrows to move among pages.
Click the Close Print Preview button.
Close the report.
Create a split form and adjust control positions on the form.
Click to select the Owners table in the Navigation Pane.
Click the More Forms button [Create tab, Forms group] and select Split Form to create a new form. Depending on the width of the Access window, your form may display the fields in two columns in the top half of the form.
Click the Arrange tab.
Click the Select Layout button.
Click the Control Padding button.
Select Medium.
Click inside the form to deselect the control layout. The completed form should look similar to Figure 4-145.
Layout view of Owners split form. Data about OwnerID 0100 displays in top section while multiple records display in Datasheet view in the bottom section.
Figure 4-145 Completed split form
Save the form. Accept the suggested form name by clicking OK.
Switch to Form view by clicking the Form View icon in the Status bar.
Use the navigation buttons to move among records.
Close the form.
Close the database.
Upload and save your project file.
Submit project for grading.

Exploring SDLCs: Methodology or Madness?

Systems development life cycles and methodologies guide the development of software, services, and other products and may serve other purposes within an organization. For example, the Mesquida and Mas (2015, February) article describes how software life cycle processes were used as a framework to help support the integration of information security best practices into software development and use.
Consider your studies, reflect on your experience with the development processes in organizations, and provide your own analysis to respond to the following questions in your initial post:
What systems development processes have you been a part of in your work history? Briefly describe the type of methodology used by an organization with which you are familiar. Also, describe any roles you have had during a systems life cycle process.
What are your observations about how these processes worked? What did the methodology help the developers and organization achieve? Was the organization using the methodology to support activities other than systems development?
How important do you think it is for an organization to use a formal methodology in its systems development efforts?
What are the benefits of following a systems development methodology, and what are the downsides?

Project 2: Troubleshooting and Tool Report

This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.

UCB Statement of Purpose

A nefarious act of cyberbullying in my sophomore year was the onset of my passion and the need to get into network security to alleviate such issues in our society. There are dangerous applications with privacy issues flooding markets, and we need the know-how of individuals and quick action against them while the danger still looms. Thus, the desire to ensure safety in the applications and avoid cyberbullying has heightened my desire to join the MSCS.
Owing to my interest and projection that I would further my studies in this field, I have consciously undertaken various academic projects to groom myself for it adequately. While taking a course related to computer architecture, professor People A(University of Michigan) proposed that usable privacy is essential for users to adopt. With the inspiration of that idea, I worked with him and his graduate student. In our research, we implemented a Sequester Encryption, or SE, to ensure data security while computing data. SE keeps sensitive information under encryption and controls it by hardware enclave. The host CPU will communicate with the SE enclave, which is physically isolated from host hardware; this design ensures security while performance is not affected by a significant overhead. Our project, in the meanwhile, conducted a paper that introduced a collection of optimizations that reduce communication costs for FPGA-based latency-sensitive acceleration applications, where I contributed to general profiling of the reuse rate and memory consumption by recording and calculating the object’s lifecycle. We also evaluated a domain developed in a data-oblivious manner while only the SE enclave can see plain values. I hope these experiences will help in my graduate study, and I will keep challenging myself to toughen up further.
Not only technology platform is needed, but users’ perception of the technology is also important and might be exploited. This is what I’ve learned through my next project. I was involved in a three-day workshop on outdated cookie consent with research revealing misleading category names. The current cookie consent category names were defined ten years ago and proven to be misleading from prior research. Therefore, our study intends to ensure that the kind of privacy people are comfortable exposing to the website is consistent with their choice of cookie usage. In the study, Professor People B(Carnegie Mellon University) mentored us to perform an experiment by renaming the cookies to improve people’s perception of cookie categories. Our impressive work provided a statistically significant difference when selecting the correct cookie definition in 2 out of 4 categories. This study enforced my understanding of user-center privacy, and I considered that we could achieve privacy protection easier if people had easy access to security information and technology.
As I was pursuing my passion in this regard, the need to also prove that the computer science field is not male-only has pushed me my resolve to join the MSCS and succeed. This is borne from a research conference I attended aimed at improving the current situation of gender inequality. Inspired by the words of an old professor at the conference who experienced discrimination, I began to learn from female predecessors and the discrimination they encountered. There is a need to have allies in the field, and by going into it, I would have increased the number to offer each other support. Ultimately, with the preparation leaning towards security tenets, I am capable of completing rigorous projects at a high standard, thus pushing the scientific knowledge boundaries further through extensive research.
At UCB, I look forward to furnishing myself with knowledge in security and networks. The knowledge sought will entail network security and the interdisciplinary of AI and security. The topics will give insights into the security field, building into my future career where I would delve into researching academia. I would be involved in lab research to gain more experience as I work to be a senior academician and provide solutions to the security menace. I love to see top-notch online security ensuring people’s safety and well-being. Also, the distinguished professors at UCB are renowned academic leaders equipped with expertise and knowledge, which provides an enviable learning platform to a desirable fraternity. I am interested in Professor Sylvia Ratnasamy’s research topic (design and implement networked system) and her research center, The NetSys lab. I am curious about the lab’s past projects, such as RCS and Smarter Prefetching. Professor David Wagner and Ion Stoica also attract me to join the program. Their range of specializations includes AI and security interaction, an area I have deprivation of knowledge of, cloud computing, distributed systems, and networking. The impressive professors and a hands-on course focusing on students’ strengths and sharpening them to alleviate weaknesses make UCB a crucial place to undertake the program. I look forward to a chance at UCB, which will be a dream come true.

How to prevent social engineering attacks.

For this assignment, you will be required to write a six-page paper about the area of cybersecurity forensics that was approved by your instructor in Week 1. Use APA style for all your references and citations. You can refer to the the Purdue OWL website for tips on APA citation.
Six pages include a title page/citations/table of contents. (3 pages of ‘content’)