Showing posts with label java. Show all posts
Showing posts with label java. Show all posts

Friday, 13 November 2020

CO3102/CO7102 Mobile and Web Applications

UK assignment helper

CO3102/CO7102 Mobile and Web Applications 

Coursework 1 

XML and JSON 

Important Dates: 

Handed out: 12-Oct-2020

Deadline: 3-Nov-2020 at 16:59 GMT 

Please ensure that you submit your work on time.

  • This coursework counts as 10% of your final mark. 
  • Please read guidelines on plagiarism in the study guide and course documentation. 
  • This coursework requires knowledge about XML Schema, XSLT, JSON and Document Parsing. 
  • Learning outcome:

 ◦ Use data-interchange formats (XML and JSON) and techniques appropriately to create documents and handle data. 

 Data Description

           Consider an XML document (WebAppInterface.xml): 


<?xml version="1.0" encoding="UTF-8"?>

<interface id="RESTController">

 <package>uk.ac.le.cs.wt</package>

<extends>

<from>Remote</from>

</extends>

<import>java.rmi.Remote</import>

<import>java.rmi.RemoteException</import>

<import>java.net.*</import>

<abstract_method name="authenticateUser">

<access_level>public</access_level>

<arguments>

<parameter type="String">user</parameter>

<parameter type="String">password</parameter>

</arguments>

<throws>

<exception>RemoteException</exception>

<exception>SecurityException</exception>

</throws>

<return>boolean</return>

</abstract_method>

<abstract_method name="activateUser">

<access_level>public</access_level>

<arguments>

<parameter type="URL">link</parameter>

</arguments>

<return>void</return>

</abstract_method>

</interface>

This XML document describes a Java interface below:

package uk.ac.le.cs.wt;

import java.rmi.Remote;

import java.rmi.RemoteException;

import java.net.*;

interface RESTController extends Remote{

public boolean authenticateUser (String user, String password)

throws RemoteException, SecurityException;

public void activateUser(URL link);

}

Tasks:

Task 1: [40 Marks]

Write an XML Schema (WebAppInterface.xsd) that allows validation of the provided XML document. Note that the schema must be consistent with these rules in Java: 

• An interface may extend one or many interfaces. 

• There can be only one package statement 

• There can be zero to many import statements 

• An interface can have zero to many abstract methods 

• A method only allows one value to be returned (or void) 

• A method can only have zero or one visibility modifier * 

• A method can accept zero to many arguments

 • Exception(s) may be thrown from a method 

* If a method has no visibility modifier then it is accessible only within its own package (default visibility); assuming all methods are non-static. (Hint: Related lab exercise – Week 1)

(Hint: Related lab exercise – Week 1)

Task 2: [30 Marks] 

Write an XSLT stylesheet (WebAppInterface.xslt) that takes the provided XML document as input and generates an HTML document as follows: 

RESTControler

Operation

Argument(s)

Return

authenticateUser

User:String,password:string

Boolean

ActivateUser

Link: URL

Void

Note: You may show the result in a different page layout or colour scheme. The page must display the controller id, return type and the parameter list of each method. (Hint: Related lab exercise – Week 2/3)

{

 "abstract_method": [

 {

 "name": "authenticateUser",

 "access_level": "public",

 "arguments": [

 {

 "type": "String",

 "variable": "user"

 },

 {

 "type": "String",

 "variable": "password"

 }

 ],

 "throws": [

 "RemoteException",

 "SecurityException"

 ],

 "return": "boolean"

 },

 {

 "name": "activateUser",

 "access_level": "public",

 "arguments": {

 "parameter": {

 "type": "URL",

 "variable": "link"

 }

 },

 "return": "void"

 }

 ]

}

Note: A Java template (WebAppInterfaceParser.java, and you will need xercesImpl.jar and xmlapis.jar which are provided on Blackboard) is provided for Task 3. However, you are allowed to use any programming languages or parsers for this task as you wish. If so, please include a text file README.txt explaining how to run your code. 

Note that this JSON output was deliberately formatted in this way to prevent people from using offthe-shelf XMLtoJSON function provided by certain APIs. If there is only one parameter in the method then it should be structured as an object (e.g. parameter: {}) while if there are multiple parameters, you should print it as an JSON array using [].

(Note: You are free to use any parsers, but the implementation of the parsing technique must be your work. The program must generate the JSON output specified above (e.g. must not contain “package”, “import”), which means you are not allowed not use any off-the-shelf XML-to-JSON libraries for the conversion e.g. toJSONObject)

Submission 

• Zip all files in a single zip file for submission. 

o WebAppInterface.xsd 

o WebAppInterface.xslt 

o WebAppInterfaceParser.java (or in your language of choice) 





• The archive should be named CO3102_CW1_email_id.zip or CO7102_CW1_email_id.zip (e.g. CO3102_CW1_yh37.zip). 

Your submission should also include a completed coursework plagiarism coversheet (print and signed PDF or image). You need to submit the zip file via Blackboard and you are allowed to resubmit as many times as you like before the deadline. Marks for any coursework which does not have the accompanying cover sheet will be withheld till you provide one.  

Marking Scheme

Note: In addition to the sample XML provided in Table 1, additional XML documents will be included in the test suite.

 Part 1: XML Schema validity checking will be automated. In total, a test suite consisting of 12 XML documents will be used for the assessment. The marks will be distributed according to test results. 

Part 2: XSLT will be compiled and applied to 7 test cases (XML documents) for the assessment. All HTML pages will be checked by TA(s) manually. The marks will be distributed according to test results. 

Part 3: In total, 7 test cases (XML documents) will be used the assessment. Any JSON generated by your XML Parser will be checked by an JSON validator. The marks will be distributed according to test results. 

Anonymous marking 

We operate an anonymous marking scheme. All submitted files will be renamed using anonymous fingerprinting generated by SHA256. 

Monday, 28 September 2020

Java programing assesment

UK assignment helper


 

Computer support (5726) Programming Utility Software 962-068 Section 05817 Assignment 2 Due date: September 15 2020 before 23:30 Submission: via Lea in Omnivox Late Submissions: Percentage will be subtracted depending of the late time Evaluation: 20% of the final grade General Guidelines When Writing Programs: - Include the following comments at the top of your source codes // -------------------------------------------------------- // 


Assignment 02 // Written by: (include your name and student id) // 962-068 Programming Utility Software Section 05831 // -------------------------------------------------------- - In a comment, give a general explanation of what your program does. - Include comments in your program describing the main steps in your program. - Display a welcome message. - Display clear prompts for users when you are expecting the user to enter data from the keyboard. - All output should be displayed with clear messages and in an easy to read format. - End your program with a closing message so that the user knows that the program has terminated. 


Guidelines for submitting the Assignment: - Create files Q1.java and Q2.java that contain the source code for Question 1 and 2 respectively - Create one A2.zip file, containing the source files (Q1.java and Q2.java) for your assignment - Submit A2.zip file in the Lea "Assignment 2" placeholder before 23h30m, September 15, 2020 Question 1 (10%) Write a Java program that asks the user how many males and females are registered in the class. Once that information is entered, your program should display the total number of students registered in the class and the percentage of male and female students, in both decimal and percentage notation. 


You can assume the user will enter valid integers. Here are sample outputs to illustrate the expected behavior of your program: Note: user input is highlighted in grey Bonus points: Two (2%) bonus points will be awarded for adding a loop for checking the correctness of the user input (only 0 and positive integers are allowed) Question 2 (10%) The date June 10, 1960, is special because when we write it in the following format 6/10/1960, the month times the day equals the last 2 digits of the year. Write a Java program that asks the user to enter a day, month (in numeric form) and a 4-digit year. The program should then determine whether the month times the day equals the last 2 digits of the year. If so, it should display the date in the form dd/mm/yyyy saying the date is magic, or not magic if it is not. You can assume the user enters a correct date. 


Here are sample outputs to illustrate the expected behavior of your program. Note: user input is highlighted in grey Bonus points: - One (1%) bonus point will be awarded for adding a loop for checking the correctness of the user input (only positive integers are allowed); - Another one (1%) bonus point will be awarded for adding a check that the user input for the Date is between 1 and 31 inclusive (0 < Date < 32); - Additional one (1%) bonus point will be awarded for adding a check that the user input for the Month is between 1 and 12 inclusive (0 < Month < 13)

Thursday, 10 September 2020

Case Study Analysis Guidelines and Rubric

UK assignment helper

  




IT 380 Module Three Case Study Analysis Guidelines and Rubric

Overview: This case study analysis will help you analyze a cybersecurity scenario and identify which principles were violated. Each skill in this paper is an essential part of the final project and accompanying milestones in this course.

Prompt: Use the articles from the Module Three required resources to analyze the cyber security occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence.

Scenario: In February 2015, as many as 80 million customers of the nation’s second‐largest health insurance company, Anthem Inc., had their account information stolen. This compromise affected customers in at least 14 different states where Anthem provided services.

The hackers gained access to Anthem’s computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information including income data. Both current and former customers were exposed during this breach.

So, while this was an attack against a medical provider and it resulted in a massive data breach, regulatory requirements were not sufficient to help prevent this breach. Because no actual medical information appears to have been stolen, the breach would not come under Health Insurance Portability and Accountability Act (HIPAA) rules, which govern the confidentiality and security of medical information.

Based on the Test Out sections from this module and the additional module resources you have reviewed, your paper should address the following critical elements:

 Identification of cyber security principles that were violated and rationale of cause

 Analysis of cryptography that would have helped prevent this breach

 Recommendation of additional policies that would have been useful to mitigate the breach or even prevent the breach


Rubric

Guidelines for Submission: Your paper should be submitted as a 2‐ to 3‐page (in addition to the cover and reference pages) Microsoft Word document with double spacing, 12‐point Times New Roman font, and one‐inch margins. All sources must be cited in APA format.

Critical Elements

Exemplary (100%)

Proficient (90%)

Needs Improvement (70%)

Not Evident (0%)

Value

Identification of Cybersecurity Principles That Were Violated

Meets “Proficient” criteria and correctly identifies which principles were violated with empirical supporting examples

Correctly identifies which principles were violated with supporting examples

Identifies which principles were violated but supporting examples have gaps

Does not identify a single principle

30

Analysis of Cryptography and Prevention

Meets “Proficient” criteria and analysis demonstrates keen insight of cryptography and prevention methods

Analysis demonstrates accurate knowledge of cryptography and prevention methods

Analysis demonstrates knowledge of cryptography but needs additional information to support prevention ideas

Does not analyze the cryptography and prevention methods

30

Policy Recommendation

Meets “Proficient” criteria and recommendation demonstrates understanding of policies that would remedy the situation appropriately

Recommends policies to ensure proper resolution of scenario

Recommends a single policy to remedy situation but recommendation has gaps in strategic implementation

Does not recommend any policies

30

Proper Use of Writing, Mechanics, and Grammar

Paper is free of errors in organization and grammar with applicable sources cited

Paper is mostly free of errors of organization and grammar; errors are marginal and rarely interrupt the flow; cites applicable sources

Paper contains errors of organization and grammar but errors are limited enough so that assignments can be understood; cites applicable sources

Paper contains errors of organization and grammar making the content difficult to understand

10

Total

100%

Tuesday, 8 September 2020

Computer network design, implementation and testing.

UK assignment helper

 





 

Southampton Solent University

Coursework Assessment Brief

Assessment Details

 

Unit Title:

Networks

Unit Code:

COM712

Unit Leader:

Warren Earle

Level:

7

Assessment Title:

Report referral

Assessment Number:

AE3

Assessment Type:

Report

Restrictions on Time/Word Count:

3000

Consequence of not meeting time/word count limit:

 

There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.

 

Assignments should be presented appropriately in line with the restrictions stated above; if an assignment exceeds the time/word count this will be taken in account in the marks given using the assessment criteria shown.

 

Individual/Group:

Individual

Assessment Weighting:

50%

Issue Date:

July 6th 2020

Hand In Date:

4th September 2020

Planned Feedback Date:

4th September 2020

Mode of Submission:

on-line

Number of copies to be submitted:

Where on-line submission via ‘Solent Online Learning’ is used, students are not required to submit a hard copy.

Anonymous Marking

 

This assessment:

Will be marked anonymously

 

Assessment Task

The assessment task is to rework a report on a computer network design, implementation and testing.

Please see enclosed details

Networking Report – please read very carefully

 

         

XYZ are a company in the South of England. They have an office in Southampton with staff in three departments, Sales, Marketing and Admin. A new network is proposed. Each department will have its own router. The router in the Admin department will have a connection to an Internet Service Provider router to provide Internet connectivity for all departments. The business network must use an interior gateway routing protocol.

 

 


The tasks are as follows:

1)           Design an IPv4 and IPv6 addressing scheme for the network (including the interfaces on the ISP routers connected to the company office).

Use 192.168.0.0/24 network address subnetted into three networks for Sales, Marketing and Admin each with 62 possible usable addresses.

Use 198.51.100.0/30 as the network address for the ISP

Use the following IPv6 network addresses do not subnet them.

2001:db8:cafe:1::/64

2001:db8:cafe:2::/64

2001:db8:cafe:3::/64

  Design, implement and test a network with routers and switches and essential additional services including DHCP, DNS and a webserver to provide network services and business network applications.

2)           Run tests to demonstrate that you have formulated a correct solution to the problem and full network connectivity is possible using ipv4 and ipv6.

3)           Recommend and demonstrate configuration of device security policies  for routers and switches on the network.

Write up your work in the form of a report that discusses and analyses the design of the network and the addressing scheme. Also discuss and analyse the configuration and commands that you used to configure the addresses, routing protocols and authentication. Discuss and analyse the results of the tests that you made on the network.  Formulate conclusions and recommendations from your work and the results. The report should address all points raised in the marking scheme below.

 

 

 

Assessment criteria

Evidence of knowledge, problem solving, implementation and professional skills will be required. See enclosed details.

 

Learning Outcomes

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit

T1      Present information and evaluation on an independently researched topic descriptors.

C1      Design an addressing scheme to fulfil given requirements in IPv4 and IPv6 networks.

P1      Demonstrate a sound justification for the approach adopted in designing an Ethernet network using routers and switches.

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions

 

Students are reminded that:

 

i.         If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;

ii.        If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;

iii.      If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy-annex-1-assessment-regulations.pdf?t=1411116004479

 

Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not 'fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.

 

A summary of guidance notes for students is given below:

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-4/4p-extenuating-circumstances-procedures-for-students.pdf?t=1472716668952

 

 

Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.

 

Procedures relating to student academic misconduct are given below:

 

http://portal.solent.ac.uk/support/official-documents/information-for-students/complaints-conduct/student-academic-misconduct.aspx

 

 

 

Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.

 

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2s-university-ethics-policy.pdf

 

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.

 

Policy:             http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf

 

 

Guidance for online submission through Solent Online Learning (SOL)

 

http://learn.solent.ac.uk/onlinesubmission

 



Criteria

F3...........................................F1

D3..........................................D1

C3.........................................C1

B3.............................................B1

A4..................................................A1

1. Design & implementation of ipv4 and ipv6 addressing scheme & referencing (30%)

Little attempt to produce satisfactory or workable ipv4 and/or no description at how the scheme was derived, and/or no references.

Satisfactory introduction and description of how a workable ipv4 addressing scheme was derived. Some references used.

 

Good introduction and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a range of references.

Very good introduction and discussion of networking design requirements and discussion of decisions made that evidence a correctly formulated ipv4 addressing scheme. Supported by a good range of references.

Excellent introduction and analysis of networking design requirements and comprehensive justification of decisions made that evidence a full and correctly formulated ipv4 scheme. Analysis is supported by an excellent range of references.

2. Research and specify static routes or  routing protocols to meet defined requirements & referencing (30%)

Poor discussion of an/or evidence of a working solution with little proof of support from tests and /or no references

 

Satisfactory introduction and discussion of working solutions to the problem evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution to the problem evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and demonstrates very good understanding of the routing design requirements and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and demonstrates excellent and professional understanding of the routing design requirements and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

3. Design, implementation and testing  (20%)

Poor discussion of an/or evidence of a working solutions with little proof of support from tests and/or no references

 

Satisfactory introduction and discussion of working solutions for some additional services evidenced by description of test results. Some references used.

Good introduction and discussion and demonstration of a working solution for additional services evidenced by discussion of a sequence of test results. Supported by a range of references.

Introduces and Demonstrates very good understanding of the additional services required and is able to discuss and prove a working solution to meet them evidenced by analysis of a sequence of test results. Supported by a good range of references.

Introduces and Demonstrates excellent and professional understanding of the additional services required and is able to comprehensively analyse and prove a fully working solution to meet all of them evidenced by comprehensive analysis of a thorough sequence of test results. Analysis of solutions supported by an excellent range of references.

4. Conclusions and recommendations that relate to the case study & referencing P1 (20%)

Poor conclusions and recommendations. Doesn’t relate to the case study and/or no references.

Satisfactory conclusions and recommendations that relate to the case study by evaluating the effectiveness of the solution. Some references used.

Good conclusions and recommendations that relate well to the case study and evaluation of the effectiveness of the solution. Supported by a range of references.

Very good conclusions and recommendations that relate fully to the case study, fully evaluating the solution and alternatives. Supported by a good range of references.

Excellent and professional conclusions and recommendations that are fully justified and meaningful in the context of the case study, including professional evaluation of effectiveness of the solution informed by excellent references.

Report      (50% of unit mark)   Marking scheme