Footprinting Lab
.docx
keyboard_arrow_up
School
Bellevue University *
*We aren’t endorsed by this school
Course
525
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by MajorGoldfishMaster955
CYBR 525 - Footprinting Lab
This lab covers multiple tools you may use in the process of footprinting a target. Each of the tools utilized below are available via websites however most also exist as utilities in penetration testing distributions such as Kali Linux. For this lab you will conduct footprinting of the site, bellevue.edu
. This is a publicly accessible web site and the information we are gathering below gathers data from other sites which contain information about the target site. This is an important aspect of footprinting, or open source intelligence collection, we are gathering information about a site but not accessing that site. Remember, you must have explicit permission before conducting invasive pentest activities against a system you do not own.
Your answers to the below questions should be inserted in the blank below each numbered question.
whois
Using a web based whois utility (there are several, and you should try a more than one) determine:
1. Which organization and address registered bellevue.edu? (2 pts)
Bellevue University
1000 Galvin Road S.
Bellevue, NE 68005
USA
2. Who is the domain registrar for bellevue.edu (2pts)
Bellevue University
3. When was the domain (bellevue.edu) activated? (2pts)
14-Sep-1992
4. When does the domain (bellevue.edu) expire? (2pts)
31-Jul-2024
dig
Using dig for DNS lookup (toolbox.googleapps.com has a good utility but there are other sites as
well) answer the below questions
5. What is the public IP of bellevue.edu? Hint: This is held in a DNS A record(2 pts)
50.57.5.31 6. bellevue.edu uses four name servers to resolve DNS requests. What are the names of the four name servers? Hint, this is contained in a DNS NS record. (2pts)
ns-1001.awsdns-61.net
ns-110.awsdns-13.com
ns-1228.awsdns-25.org
ns-1752.awsdns-27.co.uk
Domain Doissier
One of the tools mentioned by your textbook is Domain Dossier (https://centralops.net/co/DomainDossier.aspx). Go to that site and enter bellevue.edu check all the option boxes, and click go.
7. We always want to use multiple information sources to confirm our findings. Does this service
confirm the answers you found in the previous questions about organization address, IP address, domain creation and expiration, name servers? Be specific in your answer, what have you confirmed? (12 pts)
Domain Dossier does indeed confirm all the facts obtained from whois & dig for the name servers, registrant, address, the domain IP, domain activation as well as expiration.
8. Who is the administrative contact in the Whois record for bellevue.edu? (2 pts)
Domain Admin
Bellevue University
1000 Galvin Road South
Bellevue, NE 68005
USA
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
You are required to draw star schema for Happy Music House. It allows you to buy music
compact disk (CD) and provide reviews as well as ratings to other customers. This will
provide an idea of how good that CD music is. The system administrator can add new CDs,
while users can buy those CDs, and then write reviews for them. In order to buy or review
CDs, you must be a registered user for the system. Every user registration has a personal
page in the system where they can see the CDs they bought and access all the information
regarding the CDs. You may use any reasonable attribute for each dimension table.
The purpose of the system is to know what is the rating of each music CD and what
recommendation does the reviewer provide to others.
arrow_forward
Suppose you are thinking of making something like Facebook where users can only upload videos,
images and recordings and add a caption to it. Other users can view those and react, comment and share.
Based on that each user will have a popularity rating which will be automatically updated by the system.
This app will be both mobile based and web based. Now, based on the above scenario answer the
following questions - Which architectural pattern should be used for the overall development of the
project?
Repository
Client-server
Pipe filter
OLayered
arrow_forward
Hands-On Project 9-4
In this project you will work with cookies that stores the fastest time to complete a sliding block puzzle.
Much of the code for the puzzle has already been written. Your task is to write the code that records
the user's best time and stores it within a persistent cookie with a 90-day lifetime.
To complete this task you will have to load your project onto a web server placed on a remote site or
installed on your own computer. If you need to install your own server, you can download free server
software like XAMPP from the web or you can use software supplied by your instructor.
NOTE: If you are unable to get access to a server, you can complete this project using local web
storage by modifying the steps to store data in the localStorage object rather than in a cookie.
Hands-on Project 9-4
Sliding Eight Puzzle
Arrange the blocks in numeric order from 1 to 8. To move a block into the blank space, click a block
adjacent to the space. Click the Start button to scramble…
arrow_forward
What are the necessary steps in order to make a web registration form?
I want to make a registration form, and insert the infos(like name, email and etc) in a local database. In order to do it, I created a local database using mysql workbench. I did make the html, php and .js, changed the database name, pass and etc but nothing happens. While watching youtube videos, all of them seem to use XAMPP, but, can I do it using the server created on mysql workbench? When they access they website they use a URL that looks like "www.localhost..../", but I do not know what that means. Please explain.
arrow_forward
The Department of Academic Affairs for a faculty has decided to develop a Web-based student
registration system. The system will enable the students to add courses. A drop course option should
be enabled. Student may view registered courses either by display or print. Student can send
notification to make appointment with the lecturer. Lecturer can view student registration whereby
he/she can view only his/her own taught course. Lecturer can have option to print the student
registration list. Lecturer can make announcement and have the option to acknowledge appointment
to the student. Nevertheless, lecturers neither create nor remove courses. This job is under the
responsibility of the administrator who can create a new semester. Administrator should provide
option to remove courses. From the system described,
a) Draw the UML use case diagram for student registration system described above.
b) Perform requirement modelling with a detailed user stories (practices in Extreme
Programming…
arrow_forward
DAC - Discretionary Access Control
Bob is rather lazy and grants all his data access privileges (including grant) to Joe thinking he can avoid doing his work this way as Joe
is less senior and would be reluctant to complain.
Joe is not happy about this but is also sneaky, Joe hires someone with the moniker "IworkHARD4U" from a gig economy site he got
an email from and sets them up with their own DB id "IworkHARD4" and grants them all the same privileges that Joe has, and
backdoor into the company servers so they can do there work. Sounds legit huh?
One day things go bad, Bob is afraid he will get caught in his work avoidance and quietly runs
REVOKE Bobs_privilege_list ON * FROM Joe RESTRICT;
To hide the trail he created.
Note that this would show up in audit logs, backups, and other traces, but we never said Bob was bright.
Bob notices that things are still changing in his tables and it is not his programs or himself that is changing them.
So does his manager, he is not happy with…
arrow_forward
URGENT HELP
arrow_forward
follow this please to make the a UML PlantText code: A museum needs a software app to better visitor experience, key needs for the software app are: >>Artwork Management: >>The system has to keeps a comprehensive catalog of the museum's artworks, artifacts, and exhibitions. Every item in the collection should have detailed information like the title, artist, date of creation, historical significance, and exhibition location. The locations are: permanent galleries, exhibition halls, and outdoor spaces. >>Visitor Management: >>The system should facilitate the management of visitor information: ticket purchases and visitor demographics. Visitors can buy tickets online or in-person for many exhibitions, tours, and special events that the museum offers. Exhibitions are held for a duration of time and in a spicific location in the museum, which is mentioned on the purchased tickets. Tours are facilitated on a selected date for a group of 15 to 40 visitors with a…
arrow_forward
Han is a programmer who works with an IT company called No-Solution.com. He is very skilful and his manager respects him for that. One night, while working from home, Han decided that he wants to steal some files containing all the company’s client’s information from the marketing department’s database because he is planning to leave the company and start his own business. Only the marketing staff has access to that database. He uses his laptop to try and hack into the database system, and after several days trying, he finally manages to access the database. After copying the files to his USB drive and deleting the files in the database, he went to bed.
Answer the following question with reference to the Computer Crimes Act 1997.
Han’s action is considered an unauthorised offence. Give five reasons.
arrow_forward
I've been stuck on this for about 3 days now and this is the very last part of my assignment but I don't know how to go about doing it
my friend recommended this site to me 2 days ago and he told me if It is rejected then to just repost it again because it might get to somebody who does know how to solve it so I'm just going to keep going until somebody helps me with this last part
I need help with implementing the changes shown in the image into the code linked at the bottom.
Code must have a function called readEmpFromFile that does what it's supposed to do in the image provided this function is different and should not to be mistaken with the function called readEmployee
Each of these functions does something different than one another
https://onlinegdb.com/jYuB3gpCx
arrow_forward
You created a registration feature for management but the data is not stored anywhere. For this assignment store the user registration information in web storage. The best approach would be to create a User object to store the data and use the email address as the key and the user object as the value.
Create a login button on the homepage and take the user to a login page. Prompt them for their username and password and compare it to the username and password stored for them in web storage. If it matches, display an alert that says "Logged In" If it does not match, display a message on the page that the username or password does not match and try again.
At the bottom of the login form, add a reset password link. Take the user to a reset password page that prompts them for their username and password and changes the password in web storage.
Existing Code:
index.html
<!DOCTYPE html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="X-UA-Compatible"…
arrow_forward
In Python code:
Process: The user (client) requests data from the (server) database. The database sends back the data to the user. At acquisition of the data an XYPlot is drawn.
DataFile: USAStates2020.csv
User Layer:The user selects a country, and passes the country name to the Business Layer. Use TKinter to produce a UI for the user to select a country. Send the selected country to the Business Layer.
Business Layer:Receives the information from the User Layer and constructs a SQL query to send to the Data Layer. The query extracts the yearly data (1970,2020) for the requested country. The data may be queried either country year-by-year or in one query for year range. After receiving the JSON string back from the Data Layer, send the data to the Graphic Layer for plotting.
Data Layer:Construct a SQL Database based on the data from the DataFile. Processes the queries from the Business Layer. Sends back a JSON string for the requested query.
Graphic Layer:Create a graphics…
arrow_forward
Project detail:Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption.Project Part 2Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g.,…
arrow_forward
You have been contracted by a local pizza restaurant, Pizza Byte, to create an online form to allow customers to order pizza online and to be delivered to a specified location. creating a website. This will include the form to submit the order, the processing of the order and the display of an order receipt.
Form:
The owner of the restaurant has given you a mock-up of how he thinks the site should look like:
There should be restraints on the data that is entered into the form. Once the form is submitted, all of the data should be checked to make sure it is valid. I will be using a different script to insert invalid information to check this. If there are any errors, the form should be redisplayed with any valid data already filled in. Once that data has been validated an order receipt for the order should be displayed.
Create PHP script file(s) for the form the entry of the order and redisplay of the order information and the display of the receipt:
Create a script that…
arrow_forward
Joe Green, a system administrator for a large corporation, is installing a new software package on Chuck Dennis’ personal computer. The company has not authorized Joe to read the employees’ e-mail, Web logs, or personal files. However, in the course of installing the software, he accidentally comes across directories containing files with suspicious-looking names. He opens a few files and discovers they contain child pornography. Joe believes possessing such images is unethical for their profession. What should he do?
Acme Corporation licenses a sophisticated software package to many private and government agencies. Kyla is one of Acme's employees who works in the support organization. She mostly provides phone support but also teaches an on-site class from time to time. In fact, she created many of the instructional materials used in these classes. One day Kyla gets a call from Maria, who works for a government agency that uses Acme's software package. Maria offers to pay Kyla Php…
arrow_forward
Web Services
arrow_forward
Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption
Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g., who could be root, what…
arrow_forward
Calculate average and grade of marks through html helper.
Create new C# asp.net MVC project.
Add controller class
Create http get request to return view
Use html helpers to create form for the view
Write http post request for the button percentage to calculate percentage
Display the grade on grade label under the suitable criteria
Percentage Calculator:
arrow_forward
I may need help with this project:
A combined cycle gas turbine power station requires a webbased system to manage the storage and installation of spare parts and the acquisition of new parts from the Central Storage Warehouse (the CSW). The powerstation maintains an inventory of all the parts it owns comprising: part name, description and specification. There are many copies of some parts – each part has a unique ID, known as an asset tag number. The asset tag number is used when there is damage to particular parts. The power station also keeps a catalogue of all the possible spare parts types used.Only registered maintenance engineers and team leaders are allowed to install and repair parts on the plant. Maintenance engineers and team leaders can use the parts catalogue tosearch for part types and can also search the parts inventory. Maintenance engineers work in teams, currently: electrical, mechanical and environmental. Each team has its own team lead. However, the system needs to…
arrow_forward
Font
Paragraph
Styles
Editing
Dictate
Editor
Reuse
aste
Files
Styles
Voice
Sensitivity
Editor
Reuse Files
oboard
You have just been hired as a consultant for a big Health Care provider. Impressed by your
background in databases, they want you to completely redesign their database system.
Talking with the people at the HC provider, you get the following information (be very
careful on some of these attributes, and apply everything you have learned to this
point:
- The database contains information about patients, hospitals and doctors.
- Each patient has an ID, first name, last name, address and age. A patient is
uniquely identified by his or her ID.
- Each hospital has an id, name and budget. The id uniquely identifies a hospital.
- Each doctor an id, a full name, email address and a favorite movie. The id
uniquely identifies a doctor.
- Each patient can be treated at many hospitals, a hospital can treat many patients.
Each doctor can work at only one hospital. A hospital can have many…
arrow_forward
Clean and Build will remove intermediate files generated by a previous build and will
build every file in your project:
not specified by the makefile
only if it has changed since the last build
regardless of whether or not it has changed since the last build
Page 4 of 9
arrow_forward
SAGA (The South African Golf players Association) is hosting a virtual golf competition. Both professional as well as amateur golf players can register to take part in the competition. A professional golf player is defined as a person who is a member of the SAGA and is ranked on the professional list of golf players. Amateur golf players are divided into two categories for the competition, viz.1 - student (university or college) and 2 - adult.On registration the participants need to provide their ID-number and name. Professional golf players also need to indicate the number of years that they have been members of SAGA and their position on the professional golf players’ list. Amateur golf players need to provide the category they will participant in (1 or 2 – see previous paragraph). The information of a number of participants has been captured in the text file players.txt. The text file is provided. Example of the first 4 lines of text in the text file:A registration code must be…
arrow_forward
This is a server-side scripting
This is intended to be a simple assignment to ensure that you all can:
• read the documentation at php.net and call a function using the information found in that documentation
• process information submitted to your script via an HTTP request and incorporate it into an expression Objectives
• Familiarize Yourself with documentation from php.net
• Use mathematical operators in PHP
• Handle form input from a form you did not write Directions In your private directory, create a subdirectory called module02assign02c In the subdirectory module02assign02c create a file called index.php
For the main content, you are to output four different things, but only two that are nontrivial: 0.1. Opening. Within your file, first output some HTML, CSS, and explanatory text that sets the stage for the main content. 0.2. Date.
Call the date function and you are to have it output the following:
• the full name for the day of the week
• a comma
• a space
• the full name…
arrow_forward
I have to You are to create a web page for the following poem/song, entitled "Yesterday":
Yesterday, All those backups seemed a waste of pay. Now my database has gone away. Oh I believe in yesterday. Suddenly, There's not half the files there used to be, And there's a milestone hanging over me. The system crashed so suddenly. I pushed something wrong, What it was I could not say. Now all my data's gone and I long for yesterday-ay-ay-ay. Yesterday, The need for back-ups seemed so far away. I knew my data was all here to stay, Now I believe in yesterday.
How do I do that using
Using either an embedded style sheet or inline styles for all formatting.
Use a <div> for each of the 4 verse containers and the outer container.
The title “Yesterday” uses an <h2> tag with a 16pt Arial font that is blue and italicized. Do not use an <i> tag.
The entire song is embedded in a container that is 600 x 280 pixels, has a two pixel solid blue border, and a five pixel padding. The…
arrow_forward
Case Study:
VeggieZone is a mobile application, that will facilitate gardeners in their kitchen gardening
experience. The application will provide useful information about the cultivation methods of
various vegetables and fruits. Users can create their profile on this application and can connect
with other users/gardeners. For profile creation, users first need to register in this application. Users
can easily view the information of all seasonal vegetable and fruits. It will provide gardeners the
proper record handling with the help of a calendar that keeps them informed about duration of seed
sowing and watering the plants. When the seed is planted, the gardener will simply enter/register
the plant type in the application in a “New Plant” feature, where he will need to enter the date of
seed sowed or seedling planted. The application will notify the user about the plant growth,
watering schedule, watering needs, amount of sun light and amount and type of fertilizer…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- You are required to draw star schema for Happy Music House. It allows you to buy music compact disk (CD) and provide reviews as well as ratings to other customers. This will provide an idea of how good that CD music is. The system administrator can add new CDs, while users can buy those CDs, and then write reviews for them. In order to buy or review CDs, you must be a registered user for the system. Every user registration has a personal page in the system where they can see the CDs they bought and access all the information regarding the CDs. You may use any reasonable attribute for each dimension table. The purpose of the system is to know what is the rating of each music CD and what recommendation does the reviewer provide to others.arrow_forwardSuppose you are thinking of making something like Facebook where users can only upload videos, images and recordings and add a caption to it. Other users can view those and react, comment and share. Based on that each user will have a popularity rating which will be automatically updated by the system. This app will be both mobile based and web based. Now, based on the above scenario answer the following questions - Which architectural pattern should be used for the overall development of the project? Repository Client-server Pipe filter OLayeredarrow_forwardHands-On Project 9-4 In this project you will work with cookies that stores the fastest time to complete a sliding block puzzle. Much of the code for the puzzle has already been written. Your task is to write the code that records the user's best time and stores it within a persistent cookie with a 90-day lifetime. To complete this task you will have to load your project onto a web server placed on a remote site or installed on your own computer. If you need to install your own server, you can download free server software like XAMPP from the web or you can use software supplied by your instructor. NOTE: If you are unable to get access to a server, you can complete this project using local web storage by modifying the steps to store data in the localStorage object rather than in a cookie. Hands-on Project 9-4 Sliding Eight Puzzle Arrange the blocks in numeric order from 1 to 8. To move a block into the blank space, click a block adjacent to the space. Click the Start button to scramble…arrow_forward
- What are the necessary steps in order to make a web registration form? I want to make a registration form, and insert the infos(like name, email and etc) in a local database. In order to do it, I created a local database using mysql workbench. I did make the html, php and .js, changed the database name, pass and etc but nothing happens. While watching youtube videos, all of them seem to use XAMPP, but, can I do it using the server created on mysql workbench? When they access they website they use a URL that looks like "www.localhost..../", but I do not know what that means. Please explain.arrow_forwardThe Department of Academic Affairs for a faculty has decided to develop a Web-based student registration system. The system will enable the students to add courses. A drop course option should be enabled. Student may view registered courses either by display or print. Student can send notification to make appointment with the lecturer. Lecturer can view student registration whereby he/she can view only his/her own taught course. Lecturer can have option to print the student registration list. Lecturer can make announcement and have the option to acknowledge appointment to the student. Nevertheless, lecturers neither create nor remove courses. This job is under the responsibility of the administrator who can create a new semester. Administrator should provide option to remove courses. From the system described, a) Draw the UML use case diagram for student registration system described above. b) Perform requirement modelling with a detailed user stories (practices in Extreme Programming…arrow_forwardDAC - Discretionary Access Control Bob is rather lazy and grants all his data access privileges (including grant) to Joe thinking he can avoid doing his work this way as Joe is less senior and would be reluctant to complain. Joe is not happy about this but is also sneaky, Joe hires someone with the moniker "IworkHARD4U" from a gig economy site he got an email from and sets them up with their own DB id "IworkHARD4" and grants them all the same privileges that Joe has, and backdoor into the company servers so they can do there work. Sounds legit huh? One day things go bad, Bob is afraid he will get caught in his work avoidance and quietly runs REVOKE Bobs_privilege_list ON * FROM Joe RESTRICT; To hide the trail he created. Note that this would show up in audit logs, backups, and other traces, but we never said Bob was bright. Bob notices that things are still changing in his tables and it is not his programs or himself that is changing them. So does his manager, he is not happy with…arrow_forward
- URGENT HELParrow_forwardfollow this please to make the a UML PlantText code: A museum needs a software app to better visitor experience, key needs for the software app are: >>Artwork Management: >>The system has to keeps a comprehensive catalog of the museum's artworks, artifacts, and exhibitions. Every item in the collection should have detailed information like the title, artist, date of creation, historical significance, and exhibition location. The locations are: permanent galleries, exhibition halls, and outdoor spaces. >>Visitor Management: >>The system should facilitate the management of visitor information: ticket purchases and visitor demographics. Visitors can buy tickets online or in-person for many exhibitions, tours, and special events that the museum offers. Exhibitions are held for a duration of time and in a spicific location in the museum, which is mentioned on the purchased tickets. Tours are facilitated on a selected date for a group of 15 to 40 visitors with a…arrow_forwardHan is a programmer who works with an IT company called No-Solution.com. He is very skilful and his manager respects him for that. One night, while working from home, Han decided that he wants to steal some files containing all the company’s client’s information from the marketing department’s database because he is planning to leave the company and start his own business. Only the marketing staff has access to that database. He uses his laptop to try and hack into the database system, and after several days trying, he finally manages to access the database. After copying the files to his USB drive and deleting the files in the database, he went to bed. Answer the following question with reference to the Computer Crimes Act 1997. Han’s action is considered an unauthorised offence. Give five reasons.arrow_forward
- I've been stuck on this for about 3 days now and this is the very last part of my assignment but I don't know how to go about doing it my friend recommended this site to me 2 days ago and he told me if It is rejected then to just repost it again because it might get to somebody who does know how to solve it so I'm just going to keep going until somebody helps me with this last part I need help with implementing the changes shown in the image into the code linked at the bottom. Code must have a function called readEmpFromFile that does what it's supposed to do in the image provided this function is different and should not to be mistaken with the function called readEmployee Each of these functions does something different than one another https://onlinegdb.com/jYuB3gpCxarrow_forwardYou created a registration feature for management but the data is not stored anywhere. For this assignment store the user registration information in web storage. The best approach would be to create a User object to store the data and use the email address as the key and the user object as the value. Create a login button on the homepage and take the user to a login page. Prompt them for their username and password and compare it to the username and password stored for them in web storage. If it matches, display an alert that says "Logged In" If it does not match, display a message on the page that the username or password does not match and try again. At the bottom of the login form, add a reset password link. Take the user to a reset password page that prompts them for their username and password and changes the password in web storage. Existing Code: index.html <!DOCTYPE html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="X-UA-Compatible"…arrow_forwardIn Python code: Process: The user (client) requests data from the (server) database. The database sends back the data to the user. At acquisition of the data an XYPlot is drawn. DataFile: USAStates2020.csv User Layer:The user selects a country, and passes the country name to the Business Layer. Use TKinter to produce a UI for the user to select a country. Send the selected country to the Business Layer. Business Layer:Receives the information from the User Layer and constructs a SQL query to send to the Data Layer. The query extracts the yearly data (1970,2020) for the requested country. The data may be queried either country year-by-year or in one query for year range. After receiving the JSON string back from the Data Layer, send the data to the Graphic Layer for plotting. Data Layer:Construct a SQL Database based on the data from the DataFile. Processes the queries from the Business Layer. Sends back a JSON string for the requested query. Graphic Layer:Create a graphics…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education