Sign In
Not register? Register Now!
Essay Available:
You are here: HomeCourseworkIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
2 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Computer Sciences and Information Technology (Coursework Sample)

Instructions:

Answer ALL the following homework problems from the selected chapters in your textbook:
1. Consider a simplified university database that includes information on courses (name, number, day, time, room number, and max enrollment) and on faculty teaching courses and students attending courses. Suggest a relational database for efficiently managing this information. Hint: Provide the table information for this relational database
2.Discuss how the malware might have gained access to your system. What steps can you take to check whether this has occurred? If you do identify malware on your PC, how can you restore it to safe operation?
3.Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using 0.5-Mbps link? How many per second if the attacker uses a 2-Mbps link? Or an a10-Mbps link? Show your work.
4. How do you reconcile these conflicting demands?
5. Table 9.5 shows a sample of a packet filter firewall rule set for an imaginary network of IP address that range from 192.168.1.0 to 192.168.1.254. Describe the effect of each rule.

source..
Content:

Computer Sciences and Information Technology
Student’s Name
Institutional Affiliation
Course Number
Professor’s Name
Date
Computer Sciences and Information Technology
Relational Database
The best relational database to manage this information is a many-to-many relationship. Many students can enroll in one course, and a faculty can have many courses. The table courses will contain the course details (name, number, day, time, room number, and max enrollment) with courseID as its primary key. The table faculty contains information about the different faculties (such as faculty_name, head_of_faculty, courses) with facultyID as its primary key. The third table (students) will act as a junction table. Each record in this table will include a foreign key that contains the value of the primary keys of the two tables it joins. E.g. (courseID, facultyID, student_name, age, gender).
STUDENTS

courseID
facultyID
student_name
age
gender

188341015113000COURSES

courseID
Name
Number
Day
Time
room number
max enrollment

FACULTIES

facultyID
faculty_name
head_of_faculty courses

4743450479996500
PC Responding Very Slowly To Information Requests
Computer viruses and spyware slow down your PC as they mess around with things like your computer storage or hijacking your browser to pushing advertising or phishing sites. Viruses get into your computer when you click ads or links to insecure websites or open an email message or download a file (Cohen, 2017). This malware silently loads itself onto your pc and multiplies by installing itself in many places. To check whether your pc has viruses, you can perform a malware scan or observe some specific signs such as unexpected pop-up windows, strange sounds, unknown processes running in the background, and slower operations than normal. You can restore your pc to normal by running a malware scan to fix the problem.
Dos Flood Attack
Number of packets per sec=capacity of the link/ (number of packets*number of bits in each byte)
1MBPS 10^6bps and 1 byte is equal to 8bits
Each packet = 500 bytes = 4000 bits
1 Mbps = 1,000,000 bits per second
0.5-Mbps - > (0.5*1000000)/ (500*8) =125 packets per second
2.0-Mbps - > (2.0*1000000)/ (500*8) = 500 packets per second
10-Mbps - > (10*1000000)/ (500*8) = 2500 packets per second
First Step of the Common Attack Methodology
When searching publicly available information, the attacker seeks to characterize and identify the target systems, tries to map target resources, and explore for information on corporate structure, key systems in use, as well as details of specific OS and Web server used. They formulate a plan of attack using the information they obtain. As a legal and organization’s business requirements, organizations need to implement security policies as a form of administrative control (Stellios et al., 2021). Good security policies

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Operating Systems Types and Their Vulnerabilities
    Description: Operating system (OS) entails a set of programs designed to complete one mutual task: hardware resources management. Operating systems also offer various services for application software. Essentially, an OS is an interface linking programs requesting in/out (I/O) and hardware ...
    7 pages/≈1925 words| 6 Sources | APA | IT & Computer Science | Coursework |
  • Application of Information Governance Concepts in Java Programming
    Description: Java developers are some of the most important professional in the information technology sector; they are relevant to the industry since they are responsible for developing new programs for computers and upgrading them for better use-experience....
    2 pages/≈550 words| 1 Source | APA | IT & Computer Science | Coursework |
  • User Interface Design Evaluation
    Description: Effective web design requires a consistency which entails applying identical terminology in menus, prompts, color schemes and commands throughout the site. The site's usability can be improved by use of shortcuts that will enable users to increase the speed of accessing resources on the website. Information...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Coursework |
Need a Custom Essay Written?
First time 15% Discount!