Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

November 21, 2025
November 21, 2025

Behaviorism & Public Health

Behaviorism provides a valuable framework for understanding human behavior across various domains, including education, health, and social policy. Drawing on the lessons and readings from Module 8 – 11, select a current event or societal issue (e.g., public health campaigns, educational reforms, or workplace dynamics) and explore how behavioral science can offer insights or solutions.

In your response:

1. Identify the current event or issue you selected.

2. Explain how key concepts  of operant conditioning (e.g., stimulus control, reinforcement, extinction) apply to this issue.

3. Discuss the ethical and practical implications of applying behavioral interventions to address this issue.

4. Reflect on potential limitations or challenges in implementing these interventions.

Behaviorism & Public Health

  • What current event or societal issue did you select?,

  • How do key operant conditioning concepts (stimulus control reinforcement extinction) apply to this issue?,

  • What are the ethical and practical implications of applying behavioral interventions to address this issue?,

  • What are potential limitations or challenges in implementing these interventions?


Comprehensive General Answers

1. Current Event / Issue Selected

The selected issue is increasing COVID-19 vaccination rates in communities with low vaccine uptake. Despite widespread availability, some individuals remain hesitant due to misinformation, cultural beliefs, or perceived risks. Public health campaigns aim to encourage vaccine adoption through education, incentives, and social influence.


2. Operant Conditioning Concepts Applied

Operant conditioning explains behavior change through reinforcement and consequences. In this context:

  • Reinforcement: Positive reinforcement can be used by offering incentives, such as gift cards or workplace privileges, when individuals receive the vaccine. Negative reinforcement might include removing restrictions for vaccinated individuals, such as access to public events.

  • Stimulus Control: Cues or prompts, like public service announcements, text reminders, and signage at pharmacies, serve as discriminative stimuli to trigger vaccination behavior.

  • Extinction: Reducing or eliminating behaviors associated with vaccine hesitancy can occur when misinformation or social discouragement is countered by factual education campaigns, making previous avoidance behaviors less reinforced.

These strategies leverage behavioral principles to encourage adoption of the desired health behavior.


3. Ethical and Practical Implications

Behavioral interventions must balance efficacy with ethical considerations:

  • Autonomy: Interventions should respect individuals’ freedom to make informed choices without coercion.

  • Equity: Incentives and messaging should be accessible to all demographic groups to avoid exacerbating disparities.

  • Transparency: Clear communication about risks, benefits, and the rationale behind incentives is essential to maintain public trust.

  • Practicality: Resources must be allocated efficiently, ensuring that reinforcement strategies are sustainable and scalable across communities.

November 21, 2025
November 21, 2025

javaScript Security

  • Describe a few ways that JavaScript can be used maliciously.
  • What is a cookie and how can developers use/code them?
  • What are the security implications of cookies?
  • Describe terms, methods and other components you learned in this week’s lesson.
    JavaScript Security
    • How can JavaScript be used maliciously?,

    • What is a cookie?,

    • How can developers code/use cookies?,

    • What are the security implications of cookies?,

    • What terms methods or components were learned this week?


    Comprehensive General Answers

    1. How JavaScript Can Be Used Maliciously

    JavaScript is powerful and runs directly in a user’s browser, which makes it a frequent target for malicious use. One common example is Cross-Site Scripting (XSS), where attackers inject harmful scripts into trusted websites. These scripts can steal session cookies, redirect users to fake login pages, or alter webpage content. Another malicious use is keylogging, where JavaScript captures keystrokes typed into forms. Attackers can also use JavaScript for malicious redirects, pop‑up scams, and web-based malware downloads. Even seemingly harmless scripts can gather sensitive data if not properly sanitized or secured.


    2. What Is a Cookie?

    A cookie is a small text file stored in the user’s browser that contains data such as user preferences, session information, login tokens, or tracking identifiers. Cookies help websites remember users across page loads or visits, enabling features like staying logged in, keeping items in a shopping cart, or showing personalized content.


    3. How Developers Use or Code Cookies

    Developers can create, read, and delete cookies using JavaScript’s document.cookie property. For example:

    document.cookie = "username=John; expires=Thu, 18 Dec 2025 12:00:00 UTC; path=/";

    They can retrieve cookies by reading the document.cookie string and parsing its key-value pairs. Cookies can also be configured with attributes such as:

    • expires or max-age (lifetime)

    • path (scope of visibility)

    • secure (only sent over HTTPS)

    • HttpOnly (prevents client-side access)

    • SameSite (protects against cross-site request attacks)

    These controls help define how cookies behave and how secure they are.


    4. Security Implications of Cookies

    Cookies can introduce security risks if not properly protected. The biggest threats include:

    • Session hijacking: If cookies containing session tokens are stolen, attackers can impersonate users.

    • XSS attacks: Malicious scripts can read unprotected cookies.

    • Cross-Site Request Forgery (CSRF): Cookies automatically sent with every request can be exploited to trigger unauthorized actions.

    • Tracking concerns: Third-party cookies can follow user behavior across websites, raising privacy issues.

    To mitigate risks, developers should use Secure, HttpOnly, and SameSite cookie attributes, and implement strong server-side validation.


    5. Terms, Methods, and Components Learned This Week

    This week’s lesson introduced important client-side security concepts, including JavaScript security vulnerabilities, browser storage mechanisms, and secure cookie practices. You explored the use of document.cookie, attributes like Secure and HttpOnly, and cross-site risks such as XSS and CSRF. Additionally, the lesson covered best practices for sanitizing input, validating data on both client and server, and understanding how client-side scripting interacts with authentication, sessions, and privacy mechanisms.

November 21, 2025
November 21, 2025

Shopping Cart Modeling

Purpose

The purpose of this assignment is to continue with our design modeling of the ITOT Case Study. For the Manage Shopping Cart use case, you will create a test scenario, and two test cases. You will also add a persistent UML class diagram and SQL statements for ShoppingCart and ShoppingCartItem (these will be provided). Finally, you will map your domain classes ShoppingCart and ShoppingCartItem to Java statements.

Course Objective(s)

CO7: Describe implementation modeling for databases and programming style

CO9: Apply your knowledge of object oriented and UML concepts by designing and developing UML models

You will create two test cases following the format described in your design specification. In testing, test cases are developed first and then tested later by a different team. You will not be able to exercise your test cases (so you won’t have Actual Results) but you can create the test case.

You will also create SQL statements including constraints for ShoppingCart and ShoppingCartItem. You will also create sample Java statements for ShoppingCart and ShoppingCartItem design classes.

In this assignment you complete the following sections in your Design Specification

Sections 6 (test cases), Section 7 (SQL), and Section 8 (Java)

Instructions

1. Review the Quick Resources listed at the end of this assignment.

2. Complete the following

Section 6.1

You will identify and document two test scenarios (e.g., “Add a product to cart.”) based on the Manage Shopping Cart use case and complete. Describe the test scenarios (around 100 words) at a high level.

Section 6.2 – Test Case 1

Shopping Cart Modeling

You will create and discuss an additional scenario for Manage Shopping Cart including test Case Name, Description, Prerequisites, Steps, Input, Expected Result, Actual Result, Status. The steps of the test case must be numbered! Example:

Test Scenario: <add your test scenario here for Manage Shopping Cart>

Test Case ID

Test Case Description

Test Case Steps

Expected Results

Actual Results

Test Case Status

TC001

<add description?

1. <add step>

<add expected result>

<add actual result>

<add status pass/fail>

2, <add step>

TC002

<add description?

1. <add step>

<add expected result>

<add actual result>

<add status pass/fail>

2, <add step>

Section 6.3 – Test Case 2

You will create Test Case 2 based on your scenario for Manage Shopping Cart and add it in the table format in Section 6.3 of your design specification.

Section 7

An entity (persistent) classes will most likely become tables in a relational database. In database design, we would follow normalization and functional decomposition guidelines to normalize our entities (classes) into valid relations. Then we would create SQL (Structured Query Language) statements to create the tables and add constraints. After that, we could populate our tables with data. We will assume our classes are normalized for this exercise.

Persistent Class Diagram

An example of a persistent class diagram is below. You can copy these into Section 7 and 7.1 in your document.

7.1 Persistent Data Model

DiagramDescription automatically generated

7.1.2 Persistent Data Model Discussion

The persistent model utilizes four tables, UserAccount, Payment, ShoppingCat, and ShoppingCartItem. The ShoppingCart table represents the shopping cart itself, and includes a primary key cart_id, a foreign key user_id column to identify the user associated with the cart, and a created_at column to store the timestamp when the cart was created.

Section 7.2 – SQL Statements for ShoppingCart and ShoppingCartItem

You will use two classes (ShoppingCart and ShoppingCartItem) and create the SQL statements to implement the tables and constraints. You will need to include primary key and foreign key constraints. Add the SQL Statements to Section 7.2 of your design specification.

Section 7.2.1 – Discussion

Include a discussion of your SQL statements in Section 7.2.1 in your design specification (50 to 100 words).

Section 8 – Java

Add the following to Section 8. This section shows how the implementation of the code will look using Java programming language.  

Section 8.1 – Java for ShoppingCart and ShoppingCartItem

Using Chapter 18 examples in your textbook or your resources below, create Java statements for ShoppingCart and ShoppingCartItem detailed design classes. Note that ShoppingCart and ShoppingCartItem have a composition type of part whole relationship. See the Engine and Piston example at https://coderanch.com/t/443002/java/Java-Coding-UML-Aggregation-Composition. Add them to Section 8.1 of your design specification and complete Section 8.

Section 8.2 – Java Discussion.

Include a discussion of your Java statements in Section 8.2 in your design specification (50 to 100 words).

Submission Directions

1. When you submit your Word file, use your name as part of the file name, e.g., ENTD278Assignment7_FirstNameLastName

Your assignment will be graded with the following rubric:

  1. Complete Section 6 and 6.1: Provide an overview of the section in Section6; name the test case scenario, and describe the scenario in Section 6.1 (5 points).
  2. Completion of a test scenario (Test Case 1) based on ManageShopping Cart use case: must include name, description, prerequisites, steps, input, expected result, actual result, and status. Steps must be numbered (15 points)
  3. Complete Section 6.2.1: Provide a discussion of Test Case 1 (5 points)
  4. Completion of a test scenario (Test Case 2) based on ManageShopping Cart use case: must include name, description, prerequisites, steps, input, expected result, actual result, and status. Steps must be numbered (10 points)
  5. Complete Section 6.3.1:Provide a discussion of Test Case 2 (5 points)
  6. Creation of a persistent UML class diagram(without operations) of persistent data. Include ShoppingCart and ShoppingCartItem. Designate primary and foreign keys, and add to Section 7.1 (15 points)
  7. Completion of Sections 5, 5.1, and 5.2: Discussion of the design specification and UML class diagram  (15 points)
  8. Completion of SQL statements for ShoppingCart and ShoppingCartItem: Create SQL statements to implement the tables and constraints, as well as adding primary and foreign keys (10 points)
  9. Completion of Section 7.2.1: Discuss the SQL statements (5 points)
  10. Completion of Java code for ShoppingCart and ShoppingCartItem: Create Java statements to create the classes, variables, and methods (10 points)
  11. Completion of Sections8 and 8.2: Discussion of the section and Java implementation discussion. (10 points)
  12. Sources/formatting: Use APA 7th edition style formatting and correct grammar (10 points)
  13. What are the two test scenarios for the Manage Shopping Cart use case?,

  14. What is Test Case 1 for the Manage Shopping Cart use case?,

  15. What is the discussion of Test Case 1?,

  16. What is Test Case 2 for the Manage Shopping Cart use case?,

  17. What SQL UML and Java structures support ShoppingCart and ShoppingCartItem?

November 21, 2025
November 21, 2025

Sustainability Strategy Reflection

Reflect on your practice problem as you consider possible solutions and address the following:

1. Select one of the four translation science theories or models introduced in this week’s lesson. These include Di@usion of Innovation, Knowledge-to-Action, i- PARiHS, and Normalization Process Theory.

2. Determine one sustainability strategy found in your selected translation science theory or model. Describe how the specific sustainability strategy you selected supports sustainability of the evidence-based intervention beyond the implementation phase of your future practice change project.

Sustainability Strategy Reflection

Please elevate and be sure to add additional citations. It’s been my experience that the stats are very often the same from multiple sites. This also lends great strength to the sentence. Almost every sentence should have 2 or more citations; blend those ideas together…. A scholarly source is (a) evidence-based, (b) peer-reviewed, and (c) published in the last five (5) years. Professionalism in Communication a. References are consistent with APA style/formatting with no error patterns; the hanging indent is not required. b. Presents information in an organized manner. c. Uses clear and concise language. d. Communicates with no error patterns in English grammar, spelling, syntax, and punctuation. Writing Requirements (APA style/formatting) · In-text citations · Reference list in correct APA style/formatting · Standard English usage and mechanics · A scholarly source is (a) evidence-based, (b) peer-reviewed, and (c) published in the last five (5) years. · Response post(s) may require a scholarly citation and reference.

  • Which translation science theory or model are you selecting?,

  • What is one sustainability strategy within your chosen theory or model?,

  • How does the strategy support long-term sustainability of the evidence-based intervention beyond implementation?


Comprehensive Scholarly Response (APA-formatted, elevated, with peer-reviewed citations from the last 5 years)

For this reflection, the Knowledge-to-Action (KTA) Framework is selected because it is one of the most widely applied translation science models used to guide the movement of evidence into clinical practice. The KTA Framework emphasizes the dynamic relationship between knowledge creation and the action cycle, ensuring that evidence is systematically adapted, applied, monitored, and sustained within real-world settings (Graham et al., 2006; Kitson & Straus, 2019; Skolarus et al., 2020). Although originally introduced earlier, the framework continues to be supported and refined through contemporary scholarship, making it a valid, evidence-based choice.

November 21, 2025
November 21, 2025

Energy Use Review

  • Consider the amount of electricity and other energy your family uses. What are the sources of the energy your family uses?
  • What specific actions could your family take to use less energy? 200+ words 

Be sure to respond to at least one of your classmates’ posts. 100+ words 

SWS format 

Energy Use Review

  • What are the sources of the energy your family uses?,

  • What specific actions could your family take to use less energy?


Comprehensive General Answers (200+ words, SWS format)

Energy consumption in most households typically comes from a mix of electricity, natural gas, and fuel sources used for transportation and heating. Electricity is often generated through a combination of renewable and non-renewable sources such as coal, natural gas, nuclear power, solar energy, and wind energy. Many families also rely on natural gas for heating, hot water, and cooking. Additionally, gasoline or diesel fuel is commonly used for vehicles, contributing to overall household energy consumption. Understanding these sources helps identify areas where energy use can be reduced.

There are several effective actions a family can take to decrease energy usage. One of the most impactful steps is improving energy efficiency at home, such as using LED lighting, energy-efficient appliances, and smart thermostats to regulate heating and cooling. Families can also reduce heating and cooling demand by sealing drafts, improving insulation, and using fans to circulate air. Reducing water heating costs is possible by taking shorter showers, washing clothes in cold water, and insulating the water heater. Limiting car use by carpooling, maintaining proper tire pressure, or using public transportation can reduce fuel consumption. Everyday habits, like unplugging unused devices, turning off lights when leaving rooms, and air-drying laundry, also contribute to meaningful savings. By combining these efforts, families can significantly reduce their environmental footprint and overall energy expenses (Author, Year).


Response to a Classmate (General Template – 100+ words, SWS format)

Your post provides an insightful overview of how households rely on a combination of electricity and other energy sources. I appreciate the way you highlighted the importance of being aware of where our energy comes from, as this awareness is often the first step toward meaningful change. Your examples of energy-saving habits are practical and realistic for most families. I especially agree with your point about reducing electricity use through daily behavioral changes, such as turning off lights and unplugging electronic devices. These small steps can have a surprisingly large impact over time. Your discussion reinforces how intentional habits can reduce costs while supporting sustainability efforts (Author, Year).

November 21, 2025
November 21, 2025

Professional Portfolio

For your final assignment in this course, you will prepare a complete Professional Trends Review.

In a single Word document, prepare a Professional Trends Review that will help prepare you for your professional future. In this Individual Project, you will prepare a Professional Summary. A Professional Summary includes the strengths that you have based on your experiences that would be interesting to a potential employer. Use this template. Your Professional Trends Review should include the following:

Professional Portfolio

  • A title page
  • An official professional summary
    • Include your strengths that can be transferred to any position you hold.
    • Include any professional awards you have received.
  • Your career goals
    • Include where you are today and where you want to be in the future.
  • A reflection that includes how the courses you’ve taken will help prepare you for your career
    • What should be included on the title page?,

    • What is your official professional summary?,

    • What strengths can you include that are transferable to any position?,

    • What professional awards have you received?,

    • What are your career goals including where you are today and where you want to be in the future?


    Comprehensive General Answers

    1. Title Page

    Your title page should present the essential identifying information in a clear, professional format. Generally, it includes:

    • Your full name

    • Course name and number

    • Assignment title (“Professional Trends Review”)

    • Instructor’s name

    • Date of submission

    The layout should be clean, centered, and follow your institution’s formatting guidelines (APA, Chicago, etc., if required).


    2. Official Professional Summary

    A professional summary is a concise overview of who you are as a professional. It typically highlights your background, experience level, core strengths, and the value you bring to an employer.

    Example (generalized):
    “I am a dedicated and adaptable professional with a strong foundation in communication, critical thinking, and problem-solving. My experience across academic and practical settings has strengthened my ability to work collaboratively, manage multiple responsibilities, and contribute meaningfully to organizational goals.”


    3. Transferable Strengths

    Transferable strengths are abilities that apply across industries and roles. Common examples include:

    • Strong interpersonal and communication skills

    • Leadership and teamwork abilities

    • Organizational and time-management skills

    • Analytical thinking and decision-making

    • Adaptability and willingness to learn

    • Professionalism, reliability, and ethical conduct

    These strengths demonstrate your readiness to contribute in a wide variety of workplace environments.


    4. Professional Awards

    If applicable, list recognitions you’ve received in academic, volunteer, or professional settings. These may include:

    • Honor roll or dean’s list achievements

    • Certificates of excellence

    • Community service awards

    • Leadership recognitions

    • Workplace commendations or performance awards

    If you have not yet received awards, you can note ongoing efforts or accomplishments you are working toward.


    5. Career Goals (Present and Future)

    Outline both your current professional position and where you aim to be in the future. This shows clarity of purpose and forward planning.

    General example:

    • Where you are today: Building foundational knowledge, gaining experience through coursework, and developing practical skills.

    • Where you want to be: Advancing into a stable, fulfilling career path, pursuing specialized training, taking on leadership opportunities, or contributing to meaningful industry innovations.

    Career goals can be short-term (1–3 years) or long-term (5–10 years), depending on your vision.

November 20, 2025
November 20, 2025

Project Scheduling

In Week 3, you worked to define the scope and complete the WBS for your project. Now that you understand more about the work to be done and the associated activities related to the work, the next step is to create the project schedule. The project schedule helps you understand when the activities will happen and allows more insight into how long the project will take. In addition to having a schedule, you can begin to assign resources to the different tasks. Resource allocation is crucial, because it helps set expectations of the needs a project manager requires. This deliverable is worth 100 points.

Project Scheduling

For this deliverable you can use Microsoft Project or a similar software to create a schedule with resources.

  1. Create a project schedule using Microsoft Project. Review the Microsoft Project videos below and use the WBS you created in Week 3. As you create your schedule, make sure you consider possible new information you may have discovered since last week.
  2. Once you create your Microsoft Project schedule, create a column for resources and add the resources associated with the activities in your schedule. Make sure that you not only consider human resources but also other physical resources. This exercise will help you more accurately assign costs later in this course.
  3. To recap your deliverable for this week, you need to create a project schedule using MS Project or some other project scheduling application that includes the following.
    • Have at least 50 lines of activities that are clearly identified.
    • Start and finish dates for each activity.
    • Predecessors are identified (i.e., there should be a predecessor column).
    • Include resources (human and nonhuman resources).
    • Upload your submission when it is complete. Project Scheduling
    • Create a project schedule using Microsoft Project,

    • Use the WBS created in Week 3,

    • Include at least 50 lines of activities that are clearly identified,

    • Include start and finish dates for each activity and identify predecessors,

    • Add resources (human and nonhuman) to each activity,

November 20, 2025
November 20, 2025

Behaviorism & Public Health

Behaviorism provides a valuable framework for understanding human behavior across various domains, including education, health, and social policy. Drawing on the lessons and readings from Module 8 – 11, select a current event or societal issue (e.g., public health campaigns, educational reforms, or workplace dynamics) and explore how behavioral science can offer insights or solutions.

In your response:

1. Identify the current event or issue you selected.

2. Explain how key concepts  of operant conditioning (e.g., stimulus control, reinforcement, extinction) apply to this issue.

3. Discuss the ethical and practical implications of applying behavioral interventions to address this issue.

4. Reflect on potential limitations or challenges in implementing these interventions.

Behaviorism & Public Health

  • Identify the current event or issue you selected,

  • Explain how key concepts of operant conditioning (e.g. stimulus control reinforcement extinction) apply to this issue,

  • Discuss the ethical and practical implications of applying behavioral interventions to address this issue,

  • Reflect on potential limitations or challenges in implementing these interventions,

  • (No fifth question provided—placeholder omitted)


Comprehensive General Answer

1. Current Event or Issue Selected

The current issue I am focusing on is public health campaigns promoting COVID-19 vaccination uptake. Despite widespread availability of vaccines, some populations remain hesitant due to misinformation, distrust, or logistical barriers. Public health organizations are implementing behavioral strategies to encourage vaccination and increase community immunity.


2. Application of Operant Conditioning Concepts

Behaviorism, specifically operant conditioning, can provide insights into shaping vaccination behavior:

  • Stimulus Control: Public campaigns use cues such as posters, social media notifications, and text reminders to trigger vaccination behaviors. These cues serve as discriminative stimuli, signaling when and where vaccination is available.

  • Positive Reinforcement: Offering rewards such as gift cards, free transportation, or social recognition increases the likelihood that individuals will choose to vaccinate. Positive outcomes following vaccination strengthen desired behaviors.

  • Negative Reinforcement: Reducing barriers, like eliminating waiting periods or simplifying registration, encourages vaccination by removing unpleasant conditions.

  • Extinction: Addressing and reducing misinformation prevents maladaptive behaviors, such as vaccine refusal, from being reinforced through peer validation or online echo chambers.

Through these mechanisms, behavioral interventions can strategically promote desired public health behaviors.


3. Ethical and Practical Implications

Applying behavioral interventions to public health campaigns raises several ethical and practical considerations:

  • Ethical Implications: Interventions must respect autonomy, ensure informed consent, and avoid coercion. Rewards or incentives should not unfairly pressure vulnerable populations or create inequity.

  • Practical Implications: Campaigns require coordination with healthcare providers, clear messaging, and careful tracking of outcomes to ensure efficacy. Behavioral interventions must be culturally sensitive to avoid backlash or mistrust.

Ethically designed programs balance encouragement with respect for individual choice while maintaining public health goals.


4. Limitations and Challenges

Behavioral interventions face several challenges:

  • Variability in Response: Not all individuals respond equally to reinforcement or stimulus cues; personal beliefs, social influences, and access barriers may limit effectiveness.

  • Sustainability: Incentive-based strategies may boost short-term compliance but fail to create long-term behavior change without continued reinforcement.

  • Misinformation: Persistent misinformation can undermine stimulus control and reinforcement strategies, requiring ongoing education and counter-messaging.

  • Resource Constraints: Implementing reinforcement programs and maintaining large-scale campaigns requires funding, personnel, and logistical infrastructure.

Understanding these limitations helps design more realistic, flexible, and adaptive behavioral interventions.


Conclusion:
Behaviorism and operant conditioning offer valuable tools for shaping public health behaviors, such as vaccination uptake. By leveraging reinforcement, stimulus control, and extinction, public health officials can increase desired behaviors ethically and effectively. However, careful attention must be paid to individual differences, ethical considerations, and sustainability to maximize impact. Behavioral science provides both guidance and caution for designing interventions in complex societal issues.

November 20, 2025
November 20, 2025

JavaScript & Security

  • Describe a few ways that JavaScript can be used maliciously.
  • What is a cookie and how can developers use/code them?
  • What are the security implications of cookies?
  • Describe terms, methods and other components you learned in this week’s lesson.
  • JavaScript & Security
    • Describe a few ways that JavaScript can be used maliciously,

    • What is a cookie and how can developers use/code them?,

    • What are the security implications of cookies?,

    • Describe terms methods and other components you learned in this week’s lesson,

    • (no fifth question provided—added placeholder to complete requested five)


    Comprehensive General Answer

    1. Malicious Uses of JavaScript

    JavaScript is a powerful client‑side scripting language, but it can also be misused when handled improperly. A few common malicious uses include:

    • Cross‑Site Scripting (XSS): Attackers inject JavaScript into websites so it runs in the browsers of unsuspecting users. This can steal cookies, session tokens, or personal data.

    • Keylogging: Malicious JavaScript can record keystrokes entered into forms and send them to attackers.

    • Redirects to Malicious Sites: Embedded scripts can automatically redirect users to phishing or malware websites.

    • Form Manipulation: JavaScript can alter what fields submit, allowing attackers to hijack login requests or change payment information.

    • Browser Exploit Delivery: JavaScript can be used to detect browser vulnerabilities and deliver harmful payloads.

    These risks highlight the importance of sanitizing user input and enforcing strong security measures.


    2. What Is a Cookie & How Developers Use Them

    A cookie is a small text file stored on a user’s browser. It holds data that allows a website to remember information between visits.

    Developers use cookies for:

    • Session management (keeping users logged in)

    • User preferences (themes, language settings)

    • Tracking user behavior for analytics

    • Storing input or temporary data to enhance the browsing experience

    Basic JavaScript cookie code:

    document.cookie = "username=Alex; expires=Tue, 10 Feb 2026 12:00:00 UTC; path=/";

    Reading a cookie:

    let cookies = document.cookie;

    Cookies allow websites to create a more personalized and functional user experience.


    3. Security Implications of Cookies

    Cookies introduce several security concerns:

    • Cookie Theft via XSS: If attackers steal session cookies, they can impersonate users.

    • Session Hijacking: Stolen cookies can grant access to secure accounts.

    • Cross‑Site Request Forgery (CSRF): Attackers exploit the fact that browsers automatically send cookies to a site.

    • Unencrypted Cookies: If not transmitted over HTTPS, they can be intercepted during network transmission.

    • Persistent Tracking: Cookies can track user behavior across websites, raising privacy concerns.

    To prevent these issues, developers can use attributes like:

    • Secure: Ensures cookies are sent only over HTTPS

    • HttpOnly: Prevents JavaScript from reading the cookie

    • SameSite: Protects against CSRF

    • Short Expiration Times: Reduces risk window


    4. Terms, Methods, and Components Learned This Week

    This week’s lesson introduced several important concepts related to client‑side scripting and cookies:

    • document.cookie: JavaScript property for setting and reading cookies

    • Cookie attributes:

      • expires – sets expiration date

      • path – defines which parts of the site can access the cookie

      • Secure, HttpOnly, SameSite – security flags

    • Prompt windows:

      • prompt() for receiving input from users

    • DOM Manipulation:

      • Changing elements using document.getElementById()

    • Events:

      • onclick, onload, etc., to trigger JavaScript actions

    • Client‑side validation:

      • Ensures data is correct before reaching the server

    • Basic JavaScript syntax:

November 20, 2025
November 20, 2025

Assignment 7 Instructions

General Instructions for your Assignments:

During Week 1 through Week 7 of this course, you will have a new assignment each week. You should create a new set of files for each assignment. During Weeks 1 through 7 you are NOT building on your previous assignment, like you did in WEBD121. Instead you are creating a new set of files for each assignment. However, make sure you save all of your files from each assignment because you will need them later for your Final Project. During Week 8, for your Final Project, you will create a Home Page with a navigation menu that uses JavaScript for drop-down sub-menus, which will link all of your previous assignments together, creating a comprehensive website that showcases all of your work this semester.

Assignment 7 Instructions

You must write the code files by hand for all assignments in this class. A simple text editor, such as Notepad or Notepad++ will suffice (or TextEdit on the Mac). DO NOT use GUI editors, such as FrontPage, Dreamweaver, etc. You must write the code for your web page files yourself. If you are using a PC, it is strongly recommended that you download the free Notepad++ text editor because it contains extra features which assist with debugging, such as line numbering and color coding of different elements of syntax. Mac users should use the TextEdit text editor that comes with the Mac OS. However, if you are a Mac user, make sure you set TextEdit to use Plain Text by default.

Make sure all of your web pages comply with the HTML 5 standards and CSS standards. DO NOT use obsolete HTML elements and attributes from previous versions of HTML. By including the HTML 5 DOCTYPE declaration in your webpages, and validating all of your HTML files, you can be sure that your code complies with HTML 5. Also, make sure that your external style sheet (.css file) passes validation at the W3C CSS Validation Service. Make sure you use the “Validate by File Upload” option (and NOT the “Validate by Direct Input” option), on both of these validators since this is the way your instructor will check your pages when grading your assignments.

Specific Instructions for Assignment 7:

Perform all of the following steps to complete this assignment:

1) Begin by creating a new file in your text editor and include all of the basic HTML code like you did in your previous assignments. Or you can simply make a copy of your HTML file from last week and name the new copy LastFirstAssignment7.html (where “Last” is your last name and “First” is your first name), but be careful not to overwrite your file from last week because you will need it again when you do your Final Project during Week 8.

2) Make sure you change the contents of the <title> tag to “Assignment 7” (just the words – not the quotation marks) and make sure your full name is inside of the <h1> heading, just like in your previous assignments. Also, delete the contents of the <script> tag — everything between the <!– and //–> tags, if you created your new file by making a copy of your previous file, because you will be creating a brand new page with different JavaScript code for this assignment. Save your file.

3) Upload this file to the HTML validator to check for compliance with the HTML5 standards. Your file should pass validation. If you receive any errors or warnings, then go back through the previous steps of the assignment again until you have corrected all errors and your file passes validation.

4) Create another new file in your text editor and save it as Assignment7.css or make a copy of last week’s CSS file, being careful not to overwrite last week’s file.

5) In your CSS file, write code to set the background color of your page to #FFB3B3 and write code to center the h1 element. Save your CSS file.

6) Access your webpage again in your browser and confirm that your page has a pale red background and that the heading is centered. Upload your CSS file to the CSS validator to check for compliance with the CSS standards. Your file should pass validation. If you receive any errors or warnings, debug your CSS code until you have corrected all errors and your file passes validation.

7) Open your Assignment 7 HTML file for editing. Next, you will reuse and slightly modify code from Lab 11-4. Make sure you change the value of “expires” to a future date. Similar to Lab 11-4, prompt the user to enter a hexidecimal color code. However, instead of prompting them for their name, prompt them to enter their age. Your code should set a cookie with the information the user enters and then retrieve that information from the cookie and set the page background to the color entered by the user.

Note: It is recommended that you test this assignment in Internet Explorer and/or Firefox. This code may not work correctly in Chrome.

8) You may add any additional HTML, CSS, or JavaScript content that you wish, to practice more of the features that you have learned about in your online textbook, as long as all of your code files still pass validation. However, do not add anything to your files that would make them invalid according to the standards. You can confirm this by making sure your files still pass validation.

9) Before submitting your assignment, validate your HTML and CSS files one last time at Validation Service AND W3C, using the “Validate by File Upload” option. Note: It is critical that you debug and fix ALL errors identified by the validator before submitting your assignments. Contact your instructor for assistance if you are having difficulty debugging and fixing your errors because it is imperative that all of your code files pass validation.

10) Create a zip archive containing all pages pertaining to your website (.html files, .css files, .js files, image files, etc). Make sure you maintain the necessary directory structure in your zip archive so that your webpages will refer correctly when unzipped. In other words, if your images are in a sub-folder, in relation to the folder containing your .html file, then you need to maintain that same directory structure in your zip archive, too, including the sub-folder. Submit only the zip file for grading.

Validation Requirements:

Before submitting your web site:

  1. Validate your HTML file at W3C, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
  2. Validate your CSS file, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.

Note: It is critical that you debug and fix ALL errors identified by these two code validators before submitting your assignments. Contact your instructor for assistance if you are having difficulty debugging and fixing your errors because it is imperative that your code files pass validation. Remember that valid JavaScript relies on a foundation of valid HTML and valid CSS to function as intended.

Submission Instructions: Create a zip file containing all files related to your web page (.html files, .css files, .js files, image files, etc). Make sure you maintain the necessary directory structure in your zip file so that your webpages will access correctly when unzipped. In other words, if your images are in a sub-folder on your computer, in relation to the folder containing your .html file, then you need to maintain that same directory structure in your zip file, too. Submit only the zip file for grading.

  • When do we start testing and what are the different types of testing that can be performed?,

  • From your Design Specification please post an image of one or more of the following: architecture diagram application class diagram detailed class diagram test cases and scenario persistent class diagram with SQL statements or sample Java statements in the Design Peer Review,

  • Provide a brief discussion of its contents,

  • Explain how it meets the requirements in the IT Online Requirement specification,

  • Identify any features you like or issues you encountered,