CEIS490 M2 PPT Template (1) (2) (1)
.pptx
keyboard_arrow_up
School
DeVry University, Chicago *
*We aren’t endorsed by this school
Course
490
Subject
Computer Science
Date
Jun 18, 2024
Type
pptx
Pages
5
Uploaded by BaronNeutronButterfly254
CEIS490 Course Project
Module 2 IoT device registration
Edriann Nazareth
Rubric
Activity
Requirements
Points
Register a device.
Screenshot
10
Create an IoT client certificate.
Screenshot
20
Create an IoT Core policy.
Screenshot
20
This screenshot should show the myComputer page with the Thing ARN being displayed.
Register a device
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Laboratory Exercise Party Planner Objective: At the end of the exercise, the students should be able to: Create a menu bar with multiple user options. Apply event. Software Requirements: Latest version of NetBeans IDE Java Development Kit (JDK) 8 Procedure: 1. Create a folder named LastName_FirstName (ex. Reyes_Mark) in your local drive. 2. Create a new project named LabExer8. Set the project location to your own folder. 3. Construct import statements to use the packages listed below: javax.swing java.awt java.awt.event 4. Extend the JFrame class and implement the ActionListener interface. 5. Create a JMenuBar named mainBar and two (2) Menu objects named menut and menu2. Set the text of menu 1 as File and the text of menu2 as Event Type. 6. Create the items that will appear in the menus. The File menu shall contain an Exit submenu. Name the object exit. The Event Types menu shall contain two (2) submenus: Adult and Child. Name the objects adult and hild, respectively. The bmenu consist…
arrow_forward
using a code in Linux As a developer, a local Library approaches you and requests you to develop a library management system for them. Some of the requirements stated by the library are:
The Admin should be able to create accounts for different users of the system
Librarian
User
Do everything that all types of users can do
The Program should be menu driven,
The Librarian should have the following on their menu:
Insert a book (in a book_Records)
View Issued Books
Display all books available on the system
Search for a book (in a book_Records)
Delete a book
A Registered User should be able to
Search for a book,
Issue a book
Display all books available
Unregistered User should be able to :
Display all books in the library
Search for a book
The book_Records file should be auto-updated after Insertion and Deletion
Every book in the system should have the following details :
Book_id
Book_name
Author
Publishing_house
Year_of_publishing
arrow_forward
Written Use Case
Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovals
arrow_forward
Powershell Commands
Create two groups for two teams in your company (server development) and (software testing). There are 3 members in each team need to create. They are (Jaspreet, Lina and Hanh) for the server development team, and (Nina, David and Rahul) for the software testing team. Each member has to have some role description. Lina temporarily left so her account must be disabled. Rahul left the company to a new job. Lina came back to work so her account must be enabled again. The company decided to change the name of the server development to (software development).
arrow_forward
Creating Directories (Folders), Subdirectories, and Files
Open the CMD window
Move to the upper most directory (the root): CD\
Create a new directory and name it as: YourLastName
Change directory to YourLastName : CD YourLastName
Inside YourLastName directory create the following Subdirectories:
CIS100
CIS115
CIS120
CIS165
CIS200…
arrow_forward
You are going to create a Login and Registration page using CodeIgniter 4.
Login
Email Address
Password
Require to have validation of user input
Valid email address
Validate the email address and password before showing home page
(Picture as example)
arrow_forward
Create a program that a user can use to manage the primary email address and phone number for a
contact.
Console
Contact Manager
COMMAND MENU
list - Display all contacts
view - View a contact
add - Add a contact
del
exit
Delete a contact
Exit program
Command: list
1. Guido van Rossum
2. Eric Idle
Command: view
Number: 2
Name: Eric Idle
Email: eric@ericidle.com
Phone: +44 20 7946 0958
Command: add
Name: Mike Murach
Email: mike@murach.com
Phone: 559-123-4567
Mike Murach was added.
Command: del
Number: 1
Guido van Rossum was deleted.
Command: list
1. Eric Idle
2. Mike Murach
Command: exit
Bye!
Specifications
Use a list of lists to store the data for the contacts. Provide starting data for two or more contacts.
For the view and del commands, display an error message if the user enters an invalid contact
number.
When you exit the program, all changes that you made to the contact list are lost.
arrow_forward
Design a Windows Classic Desktop application and write the code that will execute according to the program requirements in Figure 7-62. Before designing the user interface, create a Use Case Definition. Before writing the
code, create an event planning document for each event in the program.
REQUIREMENTS DOCUMENT
Date:
October 19, 2019
Date Submitted:
Application Title: Body Mass Index (BMI) Calculator with CDC Chart
Purpose:
This Windows Classic Desktop application allows the user to enter a height and
weight and computes the user's body mass index. An interpretation according to CDC
standards is displayed correlating to the BMI value.
Program
Procedures:
The user will enter a height and weight using either the imperial or metric system.
Algorithms,
Processing, and
Conditions:
1. The user first views a Windows application that displays a title, a BMI graphic, a
ListBox object to select the imperial or metric system, and labels to enter information
for the user's height and weight.
2.…
arrow_forward
Deluxe Bath Controller (This scenario is used by questions 14 and 15.)
At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath.
What is the name given to the security attack when an opponent prevents messages from reaching a destination?
Denial of service
Masquerading
Modification of messages
Eavesdropping
Which of these is the highest-level part of the directory structure on Linux?
Directory
Topmost Directory
File Allocation Table
Superblock
Which security goal aims to protect information from disclosure?
Integrity
Confidentiality
Authenticity
Accountability
What does a network switch do?
It broadcasts messages to all the computers that are connected to it
It job is to disable part of the network
It collects all the network cables in one place
Routes a message…
arrow_forward
What is the reason for not having a filename beginning with a hyphen (-)?
Group of answer choices
Command options starts with hyphen and hence filename could be confused as an option
File name can only contain letters and digits
The rule for filename states filename cannot start with hyphen
It is okay to have filename start with hyphen because shell knows all the options
arrow_forward
One way to place a copy of a file into a different folder is to hold down the ________ key and drag the file into the folder.
Multiple Choice
Control
Delete
Command
Option
arrow_forward
The mode portion of the command format is made up of the following parts:
Category of users you are working with: u = user, g = group, o = other or a = all
Permissions: r = read, w = write or x = execute
Assume the file, pfile1, has the following permissions, r----x-w-. Use symbolic mode to change the permissions to rwxrw-r--.
arrow_forward
The user's Documents folder is the first thing to show up in the Open dialog box. How can I prioritize a certain directory for previewing?
arrow_forward
After you have finished setting up inventory item records for Hi-Fi Way, Isabella asks which of the following shows the correct series of actions to open an MYOB window that must be used to create a new item record.
Command centre icon
Flowchart task icon
Other icon
Inventory
Items List
New
Card File
Cards List
New
Purchases
Purchases Register
New Item
Inventory
Inventory Register
Item Card
arrow_forward
Question 9
Type in the command used in the terminal/command prompt to show a list of all installed packages in the environment.
Use the editor to format your answer
arrow_forward
Marsha and Moira belong to the Sales group that has full control permissions to the K:\Sales folder. Within
this folder, Marsha is assigned read permission to a file named SalesPipeline. Moira is assigned read and
execute permissions to the same file. Marsha also belongs to the Marketing group that has read permissions
denied to the K:\Sales folder, while Moira also belongs to the Legal group that has write permissions denied
to the K:\Sales folder.
Which of the following is TRUE of the effective permissions in this scenario?
a) Marsha can modify the SalesPipeline file.
b) Moira can modify the SalesPipeline file.
C) Marsha cannot open the Sales folder.
a) Moira cannot open the Sales folder.
e) Neither can access the K:\ given this information.
f) Both CAN access every folder on the K:
arrow_forward
Using C# in Visual Studio.
Create a form with a button that will insert new data into a Database, the read button will retrieve data from a database and display it on the form, Update button will update a record into the database using the full name, and the delete button will delete a record into the database using full name.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Laboratory Exercise Party Planner Objective: At the end of the exercise, the students should be able to: Create a menu bar with multiple user options. Apply event. Software Requirements: Latest version of NetBeans IDE Java Development Kit (JDK) 8 Procedure: 1. Create a folder named LastName_FirstName (ex. Reyes_Mark) in your local drive. 2. Create a new project named LabExer8. Set the project location to your own folder. 3. Construct import statements to use the packages listed below: javax.swing java.awt java.awt.event 4. Extend the JFrame class and implement the ActionListener interface. 5. Create a JMenuBar named mainBar and two (2) Menu objects named menut and menu2. Set the text of menu 1 as File and the text of menu2 as Event Type. 6. Create the items that will appear in the menus. The File menu shall contain an Exit submenu. Name the object exit. The Event Types menu shall contain two (2) submenus: Adult and Child. Name the objects adult and hild, respectively. The bmenu consist…arrow_forwardusing a code in Linux As a developer, a local Library approaches you and requests you to develop a library management system for them. Some of the requirements stated by the library are: The Admin should be able to create accounts for different users of the system Librarian User Do everything that all types of users can do The Program should be menu driven, The Librarian should have the following on their menu: Insert a book (in a book_Records) View Issued Books Display all books available on the system Search for a book (in a book_Records) Delete a book A Registered User should be able to Search for a book, Issue a book Display all books available Unregistered User should be able to : Display all books in the library Search for a book The book_Records file should be auto-updated after Insertion and Deletion Every book in the system should have the following details : Book_id Book_name Author Publishing_house Year_of_publishingarrow_forwardWritten Use Case Follow the sample format shown in the attached photo.Sample have its label, while the one you should make a written use case is the one who have blue ovalsarrow_forward
- Powershell Commands Create two groups for two teams in your company (server development) and (software testing). There are 3 members in each team need to create. They are (Jaspreet, Lina and Hanh) for the server development team, and (Nina, David and Rahul) for the software testing team. Each member has to have some role description. Lina temporarily left so her account must be disabled. Rahul left the company to a new job. Lina came back to work so her account must be enabled again. The company decided to change the name of the server development to (software development).arrow_forwardCreating Directories (Folders), Subdirectories, and Files Open the CMD window Move to the upper most directory (the root): CD\ Create a new directory and name it as: YourLastName Change directory to YourLastName : CD YourLastName Inside YourLastName directory create the following Subdirectories: CIS100 CIS115 CIS120 CIS165 CIS200…arrow_forwardYou are going to create a Login and Registration page using CodeIgniter 4. Login Email Address Password Require to have validation of user input Valid email address Validate the email address and password before showing home page (Picture as example)arrow_forward
- Create a program that a user can use to manage the primary email address and phone number for a contact. Console Contact Manager COMMAND MENU list - Display all contacts view - View a contact add - Add a contact del exit Delete a contact Exit program Command: list 1. Guido van Rossum 2. Eric Idle Command: view Number: 2 Name: Eric Idle Email: eric@ericidle.com Phone: +44 20 7946 0958 Command: add Name: Mike Murach Email: mike@murach.com Phone: 559-123-4567 Mike Murach was added. Command: del Number: 1 Guido van Rossum was deleted. Command: list 1. Eric Idle 2. Mike Murach Command: exit Bye! Specifications Use a list of lists to store the data for the contacts. Provide starting data for two or more contacts. For the view and del commands, display an error message if the user enters an invalid contact number. When you exit the program, all changes that you made to the contact list are lost.arrow_forwardDesign a Windows Classic Desktop application and write the code that will execute according to the program requirements in Figure 7-62. Before designing the user interface, create a Use Case Definition. Before writing the code, create an event planning document for each event in the program. REQUIREMENTS DOCUMENT Date: October 19, 2019 Date Submitted: Application Title: Body Mass Index (BMI) Calculator with CDC Chart Purpose: This Windows Classic Desktop application allows the user to enter a height and weight and computes the user's body mass index. An interpretation according to CDC standards is displayed correlating to the BMI value. Program Procedures: The user will enter a height and weight using either the imperial or metric system. Algorithms, Processing, and Conditions: 1. The user first views a Windows application that displays a title, a BMI graphic, a ListBox object to select the imperial or metric system, and labels to enter information for the user's height and weight. 2.…arrow_forwardDeluxe Bath Controller (This scenario is used by questions 14 and 15.) At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath. What is the name given to the security attack when an opponent prevents messages from reaching a destination? Denial of service Masquerading Modification of messages Eavesdropping Which of these is the highest-level part of the directory structure on Linux? Directory Topmost Directory File Allocation Table Superblock Which security goal aims to protect information from disclosure? Integrity Confidentiality Authenticity Accountability What does a network switch do? It broadcasts messages to all the computers that are connected to it It job is to disable part of the network It collects all the network cables in one place Routes a message…arrow_forward
- What is the reason for not having a filename beginning with a hyphen (-)? Group of answer choices Command options starts with hyphen and hence filename could be confused as an option File name can only contain letters and digits The rule for filename states filename cannot start with hyphen It is okay to have filename start with hyphen because shell knows all the optionsarrow_forwardOne way to place a copy of a file into a different folder is to hold down the ________ key and drag the file into the folder. Multiple Choice Control Delete Command Optionarrow_forwardThe mode portion of the command format is made up of the following parts: Category of users you are working with: u = user, g = group, o = other or a = all Permissions: r = read, w = write or x = execute Assume the file, pfile1, has the following permissions, r----x-w-. Use symbolic mode to change the permissions to rwxrw-r--.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
- EBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage