Wednesday, December 28, 2011

HCSD Data Structure Case Studies

Instructions:

  • Read each case studies and answer the questions given.
  • Post your answers in your blog
  • There are a total of three (3) case studies
  • I will be checking your answers before January 5, 2011
Case Study 1

THE WICKED WORM THAT WASN'T
by Steven Musil

Millions of Windows users braced themselves for the much-feared Conficker worm, worried that the exploit would wreak havoc on their systems on April 1.

Conficker was expected to shut down security services, block computers from connecting to security Web sites, and download a Trojan. It was also expected to reach out to other infected computers via peer-to-peer networking and include a list of 50,000 different domains, of which 500 would be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions.

Then nothing happened. Was it all an elaborate April Fools' joke?

The Conficker worm may have failed to cause the digital pandemonium that some may have feared, but that doesn't mean we are in the clear. Just because the worm failed to create much of a stir on the day it was set to activate doesn't mean it won't wake up and act later.

Today, as on any day, PC users should make sure their systems are patched and running the latest security software. People should patch their systems to close the hole in Windows that Conficker exploits and should update their antivirus software. The major antivirus vendors all have free Conficker removal tools.

The worm also can spread via network shares and removable storage devices like USB thumb drives. So people are advised to use strong passwords when sharing files on a network and to download a patch Microsoft released to address the Autorun feature problem in Windows that makes using removable storage risky.

So, in the end, was the hype a good thing or a bad thing?

Instruction:

Write your comments and reflection in concern with the above article in no less than 200 words.

Case Study 2
CASE STUDY NO.2
Romanian hacker charged with breaching NASA computers
Agence France-Presse
Last updated 07:05am (Mla time) 06/27/2007
BUCHAREST -- A young Romanian has been charged with hacking into NASA computers and causing more than 1.5 million dollars (1.1 million euros) of damage for the US space agency, prosecutors said Tuesday.

Victor Faur, 26, from the western town of Arad, was also accused of breaking into the computers of the US navy and the Department of Energy between November 2005 and September 2006, a statement said.

Romanian police alerted NASA in July last year that its servers had been breached by unknown people based in Romania.

An ensuing probe, launched jointly by Romanian police and the FBI, led to Faur.

NASA had to rebuild its systems and scientists and engineers had to manually communicate with spacecraft, resulting in huge losses for NASA.

Faur, meanwhile, said in television interviews that his action was aimed at "proving that several computers are vulnerable to attack," and underlined that he had not tried to make any "material gains."

"I had neither modified nor erased the files, nor destroyed the communications systems," said Faur, who was formally put under investigation in December and has been barred from leaving the country.

An earlier indictment by the US Attorney's Office charges Faur with leading a hacking group called the "WhiteHat Team," which broke into the systems because of their reputation of being among the most secure in the world.

Instruction:
1. Make your comment/s on the news article if you agree or not with what happened to the hacker in no less than 300 words.


Case Study 3

Read the fictitious KILLER ROBOT case found at the web site for the Online Ethics Center for Engineering and Science at www.onlineethics.com (look under Computer Science and Internet cases) or go directly to this link http://www.onlineethics.org/Resources/19049/killerrobot.aspx.

The case begins with the indictment of a programmer for manslaughter for writing faulty codes that resulted in the death of a robot operator. Slowly, over the course of many articles, you are introduced to several factors within the corporation that contributed to the accident. Read this case and answer the following questions.

a. Responsibility for an accident is rarely clearly defined and able to be traced to one or two individuals or causes. In this fictitious case, it is clear that a larger number of people share responsibility for the accident. Identify all the people who you think were at least partially responsible for the death of Bart Matthews, and why you think so?

b. Imagine that you are the leader of a task force assigned to correct the problems uncovered by this accident. Develop your “top-ten” list of actions that need to be taken to avoid future problems. What process would you use to identify the most critical actions?

c. If you were in Ms. Yardley’s position, what would you have done when Rays Jonhson told you to fake the test result? How would you justify your decision?

Instructions:
  • Your answers should be no less than 100 words each.

Read more...

Sunday, June 19, 2011

HCSD IT314 DBMS Assignment 1: Designing an ERD

Consider the following set of requirements for a University database. Design an ER diagram for this application:

  • The university keeps track of each student's name, student number, social security number, current address and phone number, permanent address and phone number, birthdate, sex, class (freshman, graduate), major department, minor department (if any), degree program (B.A., B.S., ... Ph.D.). Some user applications need to refer to the city, state, and zip code of the student's permanent address and to the student's last name. Both social security number and student number are unique for each student. All students will have at least a major department.
  • Each department is described by a name, department code, office number, office phone, and college. Both the name and code have unique values for each department.
  • Each course has a course name, description, course number, number of credits, level and offering department. The course number is unique for each course.
  • Each section has an instructor, semester, year, course, and section number. The section number distinguishes sections of the same course that are taught during the same semester/year; its value is an integer (1, 2, 3, ... up to the number of sections taught during each semester).
  • A grade report must be generated for each student that lists the section, letter grade, and numeric grade (0,1,2,3, or 4) for each student and calculates his or her average GPA.
Instructions:
  • Printed, Short
  • Use Chen's Notation
  • To be submitted next Saturday June 25, 2011

Read more...

Saturday, May 21, 2011

CS323: Case Study 4

Using the process state diagram, explain why there is no transition:
• From the READY to WAITING.
• From the WAITING to RUNNING.

Instructions:
• Your answers should reach in not less than 300 words.
• Post your answers to your electronic journal.
• Date of submission: May 22, 2011 12:00 midnight
• Once I found out that you have a duplicated answer from a classmate, automatic 50 grade.




Read more...

Saturday, May 14, 2011

CS323: Case Study 3

Load the following jobs into memory using fixed partition following a certain memory allocation method (a. best-fit, b. first-fit, c. worst-fit).

Memory Block

Size

Block 1

50K

Block 2

200K

Block 3

70K

Block 4

115K

Block 5

15K





a. Job1 (100k) f. Job6 (6k)

turnaround: 3 turnaround: 1

b. Job2 (10k) g. Job7 (25k)

turnaround: 1 turnaround: 1

c. Job3 (35k) h. Job8 (55k)

turnaround: 2 turnaround: 2

d. Job4 (15k) i. Job9 (88k)

turnaround: 1 turnaround: 3

e. Job5 (23k) j. Job10 (100k)

turnaround: 2 turnaround: 3

*turnaround – how long it will stay in the memory.

Instructions:
  • Post your answers to your electronic journal.
  • Date of submission: Today (May 15, 2011) 12:00 midnight.
  • Once I found out that you have a duplicated answer from a classmate, automatic 50 grade.

Read more...

Saturday, May 7, 2011

IT111: Intro to IT Case Study

Case Study 2

Select two of the following professionals:

  • An insurance adjuster
  • A delivery person for a courier service
  • A newspaper reporter
  • A doctor (general practitioner)
  • Manager in a supermarket

Put forward a theory about how that person might use a hand held computer in their work

Instructions:

  • Your answers should reach in not less than 300 words.
  • Post your answers to your electronic journal.
  • Date of submission: Today (May 8, 2011)
  • Once I found out that you have a duplicated answer from a classmate, automatic 50 grade.

Read more...

CS323: Case Study 2

Computer Architecture

Case Study 2

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. Name at least two of these problems. Can we ensure the same degree of security in a time-share machine as we have in a dedicated machine? Explain your answer

Instructions:


· Your answers should reach in not less than 500 words.


· Post your answers to your electronic journal.


· Date of submission: Today (May 8, 2011)


· Once I found out that you have a duplicated answer from a classmate, automatic 50 grade.

Read more...

Saturday, April 16, 2011

CS323: Case Study 1

Computer Architecture Case Study 1

Explain why we need to study Computer Architecture? What is its significance with your field as an IT or CS student? Differentiate Computer Architecture and Computer Organization?

Instructions:

  • Your answers should not be less than 250 words.
  • Due: April 17, 2011 4pm
  • DONT COPY AND PASTE!

Read more...

CS323: Blogs

CS323 Students:


Post your Name, blog url as a comment.

Read more...

Sunday, March 6, 2011

IT16 Case Study 12: The KILLER ROBOT

Read the fictitious KILLER ROBOT case found at the web site for the Online Ethics Center for Engineering and Science at www.onlineethics.com (look under Computer Science and Internet cases) or go directly to this link http://www.onlineethics.org/Resources/19049/killerrobot.aspx .

The case begins with the indictment of a programmer for manslaughter for writing faulty codes that resulted in the death of a robot operator. Slowly, over the course of many articles, you are introduced to several factors within the corporation that contributed to the accident. Read this case and answer the following questions.

a. Responsibility for an accident is rarely clearly defined and able to be traced to one or two individuals or causes. In this fictitious case, it is clear that a larger number of people share responsibility for the accident. Identify all the people who you think were at least partially responsible for the death of Bart Matthews, and why you think so?

b. Imagine that you are the leader of a task force assigned to correct the problems uncovered by this accident. Develop your “top-ten” list of actions that need to be taken to avoid future problems. What process would you use to identify the most critical actions?

c. If you were in Ms. Yardley’s position, what would you have done when Rays Jonhson told you to fake the test result? How would you justify your decision?

Instructions:
  • Your answers should be no less than 200 words each.
  • Due: March 14, 2011

Read more...
Web Marketingdrive recovery software