Monday, January 30, 2012

HCSD Data Structures Blog URL

Post as comment your blog URL here

Read more...

Friday, January 27, 2012

Ecommerce Case 5 and 6

Download Ecommerce case 5 and 6 here:




just click the image

Read more...

Tuesday, January 17, 2012

E-commerce Case Study 3 and 4

Here is the link for 4shared page for our ecommerce case study 3 and 4. Just click the preview image..


Read more...

Monday, January 16, 2012

HCSD Data Structure Case Study 5

Give at least three scenarios in the real world wherein HASH COLLISION can happen. Include an image.

Give at least three specific software/program/application wherein HASHING and HASH COLLISION might occur. Include the name of the software/program/application, description and a screenshot.

Read more...

HCSD Data Structure Case Study 4

We already discuss hash functions..

But what will happen if it will result to a collision of hash keys?

Answer the following questions:

1. What is hash collision?
2. What really happens during a hash collision? Include an image
3. What are the ways and methods to resolve hash collision? Explain Each

Instructions:

  • Post your answer in your blog.

Read more...

Monday, January 9, 2012

Brokenshire SAD documents outline

Brokenshire SAD documents outline

Download the SAD Project outline here:

http://projectarchive.comuf.com/upload/363.doc

Download the Frontpage template here:

http://projectarchive.comuf.com/upload/364.doc

Read more...

HCSD Data Structure Hash Table

HCSD Data Structure Hash Table

Download the hash table lecture (presentation) here:

http://projectarchive.comuf.com/upload/362.pptx

Read more...

Wednesday, December 28, 2011

HCSD Data Structure Case Studies

Instructions:

  • Read each case studies and answer the questions given.
  • Post your answers in your blog
  • There are a total of three (3) case studies
  • I will be checking your answers before January 5, 2011
Case Study 1

THE WICKED WORM THAT WASN'T
by Steven Musil

Millions of Windows users braced themselves for the much-feared Conficker worm, worried that the exploit would wreak havoc on their systems on April 1.

Conficker was expected to shut down security services, block computers from connecting to security Web sites, and download a Trojan. It was also expected to reach out to other infected computers via peer-to-peer networking and include a list of 50,000 different domains, of which 500 would be contacted by the infected computer on April 1 to receive updated copies or other malware or instructions.

Then nothing happened. Was it all an elaborate April Fools' joke?

The Conficker worm may have failed to cause the digital pandemonium that some may have feared, but that doesn't mean we are in the clear. Just because the worm failed to create much of a stir on the day it was set to activate doesn't mean it won't wake up and act later.

Today, as on any day, PC users should make sure their systems are patched and running the latest security software. People should patch their systems to close the hole in Windows that Conficker exploits and should update their antivirus software. The major antivirus vendors all have free Conficker removal tools.

The worm also can spread via network shares and removable storage devices like USB thumb drives. So people are advised to use strong passwords when sharing files on a network and to download a patch Microsoft released to address the Autorun feature problem in Windows that makes using removable storage risky.

So, in the end, was the hype a good thing or a bad thing?

Instruction:

Write your comments and reflection in concern with the above article in no less than 200 words.

Case Study 2
CASE STUDY NO.2
Romanian hacker charged with breaching NASA computers
Agence France-Presse
Last updated 07:05am (Mla time) 06/27/2007
BUCHAREST -- A young Romanian has been charged with hacking into NASA computers and causing more than 1.5 million dollars (1.1 million euros) of damage for the US space agency, prosecutors said Tuesday.

Victor Faur, 26, from the western town of Arad, was also accused of breaking into the computers of the US navy and the Department of Energy between November 2005 and September 2006, a statement said.

Romanian police alerted NASA in July last year that its servers had been breached by unknown people based in Romania.

An ensuing probe, launched jointly by Romanian police and the FBI, led to Faur.

NASA had to rebuild its systems and scientists and engineers had to manually communicate with spacecraft, resulting in huge losses for NASA.

Faur, meanwhile, said in television interviews that his action was aimed at "proving that several computers are vulnerable to attack," and underlined that he had not tried to make any "material gains."

"I had neither modified nor erased the files, nor destroyed the communications systems," said Faur, who was formally put under investigation in December and has been barred from leaving the country.

An earlier indictment by the US Attorney's Office charges Faur with leading a hacking group called the "WhiteHat Team," which broke into the systems because of their reputation of being among the most secure in the world.

Instruction:
1. Make your comment/s on the news article if you agree or not with what happened to the hacker in no less than 300 words.


Case Study 3

Read the fictitious KILLER ROBOT case found at the web site for the Online Ethics Center for Engineering and Science at www.onlineethics.com (look under Computer Science and Internet cases) or go directly to this link http://www.onlineethics.org/Resources/19049/killerrobot.aspx.

The case begins with the indictment of a programmer for manslaughter for writing faulty codes that resulted in the death of a robot operator. Slowly, over the course of many articles, you are introduced to several factors within the corporation that contributed to the accident. Read this case and answer the following questions.

a. Responsibility for an accident is rarely clearly defined and able to be traced to one or two individuals or causes. In this fictitious case, it is clear that a larger number of people share responsibility for the accident. Identify all the people who you think were at least partially responsible for the death of Bart Matthews, and why you think so?

b. Imagine that you are the leader of a task force assigned to correct the problems uncovered by this accident. Develop your “top-ten” list of actions that need to be taken to avoid future problems. What process would you use to identify the most critical actions?

c. If you were in Ms. Yardley’s position, what would you have done when Rays Jonhson told you to fake the test result? How would you justify your decision?

Instructions:
  • Your answers should be no less than 100 words each.

Read more...

Sunday, June 19, 2011

HCSD IT314 DBMS Assignment 1: Designing an ERD

Consider the following set of requirements for a University database. Design an ER diagram for this application:

  • The university keeps track of each student's name, student number, social security number, current address and phone number, permanent address and phone number, birthdate, sex, class (freshman, graduate), major department, minor department (if any), degree program (B.A., B.S., ... Ph.D.). Some user applications need to refer to the city, state, and zip code of the student's permanent address and to the student's last name. Both social security number and student number are unique for each student. All students will have at least a major department.
  • Each department is described by a name, department code, office number, office phone, and college. Both the name and code have unique values for each department.
  • Each course has a course name, description, course number, number of credits, level and offering department. The course number is unique for each course.
  • Each section has an instructor, semester, year, course, and section number. The section number distinguishes sections of the same course that are taught during the same semester/year; its value is an integer (1, 2, 3, ... up to the number of sections taught during each semester).
  • A grade report must be generated for each student that lists the section, letter grade, and numeric grade (0,1,2,3, or 4) for each student and calculates his or her average GPA.
Instructions:
  • Printed, Short
  • Use Chen's Notation
  • To be submitted next Saturday June 25, 2011

Read more...

Saturday, May 21, 2011

CS323: Case Study 4

Using the process state diagram, explain why there is no transition:
• From the READY to WAITING.
• From the WAITING to RUNNING.

Instructions:
• Your answers should reach in not less than 300 words.
• Post your answers to your electronic journal.
• Date of submission: May 22, 2011 12:00 midnight
• Once I found out that you have a duplicated answer from a classmate, automatic 50 grade.




Read more...
Web Marketingdrive recovery software