this essay should be for cybersecurity
Instruction Based on the readings (online textbook and research)
and labs, reflect on how you can practically apply what you have
learned to your current or future desired work environment.
Requirements Please do as follows: Provide a 500 word (or two pages
double spaced) minimum reflection. Follow APA formatting (in-text
citations and references). If information such as findings and
ideas come from others, those must be properly credited (cited and
referenced). Share a personal experience that is related to
specific knowledge and/or learned skill(s) from this course. Show a
connection to your current work environment. If you are not
employed, demonstrate a connection to your desired work
environment. Do not summarize the chapters of the textbook. The
main objective of the assignment is for you to reflect on how you
can apply what you have learned to the present or future desired
work environment

Answers

Answer 1

As an expert in cybersecurity, I would recommend reflecting on the practical application of the knowledge and skills learned in this course to the current or future desired work environment. In this essay, you should provide a minimum of 500 words reflecting on your personal experience related to specific knowledge or learned skills from this course.

You should also demonstrate a connection between what you learned in this course and your current or desired work environment. Additionally, you must follow APA formatting and properly credit any information that comes from other sources.

When reflecting on how you can apply what you have learned in this course to your work environment, you may want to consider the following topics:

1. Network security: You can use the knowledge you gained in this course to secure your network and prevent unauthorized access to your systems. This includes implementing firewalls, intrusion detection systems, and other security measures.

2. Data encryption: You can use encryption to protect your sensitive data from unauthorized access. This includes encrypting data at rest and in transit.

3. Incident response: You can use the skills learned in this course to develop an incident response plan and prepare for potential cyber threats.

4. Cybersecurity awareness: You can use the knowledge gained in this course to raise awareness of cybersecurity among your employees or colleagues. This includes educating them on how to identify and report potential security threats.

As you reflect on your personal experience related to specific knowledge or learned skills from this course, you may want to consider the following questions:

1. What specific skills did you learn in this course that you can apply to your work environment?

2. How can you apply these skills to your work environment to improve security?

3. Have you had any experiences in your current or past work environments that relate to the topics covered in this course?

4. How can you use what you learned in this course to prevent similar incidents from occurring in the future?

In conclusion, this essay should reflect on how you can practically apply what you have learned in this course to your current or future desired work environment. By demonstrating a connection between what you learned in this course and your work environment, you can show how you can improve security and prevent potential cyber threats.


Related Questions

The interconnection structure must support which transfer?
A:: memory to processor
B: processor to memory
C: I/O to or from memory
D: all of the above

Answers

The correct answer is D.

The interconnection structure must support all of the above.

The interconnection structure of a computer system must support various types of data transfer to ensure efficient communication between different components. These transfers include memory to processor, processor to memory, and I/O (Input/Output) to or from memory.

Memory to processor transfer involves fetching data or instructions from the memory to the processor for processing. This is a crucial operation as it allows the processor to access the required data to perform computations.

Processor to memory transfer is needed when the processor needs to write data back to the memory, such as storing computed results or updating variables.

Know more about interconnection structure here:

https://brainly.com/question/32091983

#SPJ11

what is digital native

Answers

A person who was raised in the information age or around digital technology is known as a "digital native."

What is the purpose of digital native?

Digital natives are accustomed to and proficient in technology because they were raised in an IT-centric environment.

The generations born after 1980 are referred to be digital natives since they have spent their entire lives surrounded by technology, social media, mobile devices, computers, and the internet.

Therefore, a person who was raised in the information age or around digital technology is known as a "digital native."

To learn more about digital native, refer to the link:

https://brainly.com/question/8450699

#SPJ1

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn't consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate. What can you tell Larry to check to find out why the clock does not keep the right time?

Answers

Answer + Explanation:

You can tell Larry to set his device's location on 'enabled' at all times. That way, you get the time zone too. For example. if you live in the US, and your Location is not enabled, then the device may think that you are in China, or where the device was last at.

Please please please. Help me.

Use the getDay() method to extract the day of the week from the thisDay variable, storing the value in the wDay variable

Answers

I can give you an example of how to use the getDay() method to extract the day of the week from a date object.

How to do this

Assuming that you have a Date object called thisDay, you can use the getDay() method to extract the day of the week from the date object and store it in a variable called wDay as follows:

The Code

const wDay = thisDay.getDay();

The getDay() method returns a value between 0 and 6, where 0 represents Sunday and 6 represents Saturday. So, if you want to get the name of the day instead of the number, you can use an array to map the number to the corresponding day name, like this:

const daysOfWeek = ['Sunday', 'Monday', 'Tuesday', 'Wednesday', 'Thursday', 'Friday', 'Saturday'];

const wDayName = daysOfWeek[thisDay.getDay()];

In this example, the daysOfWeek array maps the day numbers to the corresponding day names. The wDayName variable will contain the name of the day of the week based on the thisDay date object.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

how to draw a flowchart to compute area of a triangle​

Answers

To draw a flowchart to compute the area of a triangle, you can follow the steps below:

The Steps

Start the flowchart with a start/end symbol.

Ask the user to enter the base and height of the triangle.

Store the values of base and height in variables.

Multiply the base and height and divide the result by 2 to get the area of the triangle.

Display the area of the triangle to the user.

End the flowchart with an end symbol.

The flowchart will look like a series of symbols and arrows, with each symbol representing a different action or decision point in the process.

The symbols used in the flowchart will depend on the specific software or tool you are using to create it, but typical symbols include start/end, input/output, process, decision, and connector symbols.

By following this flowchart, you can easily compute the area of a triangle with just a few simple steps.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

Open the code8-3_anim.css file. Several keyframe animations have already been created for you. Add a keyframe animation named spinCube that contains the following frames:

At 0% apply the transform property with the rotateX() function set to 24deg and the rotateY() function set to 40deg.
At 50% change the value of the rotateX() function to 204deg and the rotateY() function to 220deg
At 100%, change the value of the rotateX() function to 384 and the rotateY() function to 400deg.

Answers

In code 8-3 anim.css, include a keyframe animation called spinCube with frames at 0%, 50%, and 100%. The transform property's rotateX() and rotateY() values should be set to various values.

In CSS, how do you add keyframe animation?

Create a keyframes rule with a name to use keyframes, and the animation-name property will use that name to link an animation to a keyframe declaration.

Which CSS attribute chooses an animation for an element when the keyframes rule is applied?

a property called animation-name. A list of applicable animations is defined by the animation-name parameter. The keyframe at-rule that gives the property values for the animation is chosen using each name.

To know more about code  visit:-

https://brainly.com/question/17293834

#SPJ1

structured application development usually involves a(n) , which proceeds from a general design to a detailed structure.

Answers

Structured application development usually involves a top-down approach, which proceeds from a general design to a detailed structure.

The top-down approach in structured application development begins with defining the overall system architecture and then breaking it down into smaller, more manageable modules or components.

Each module is designed, coded, and tested individually before integrating them into the larger system. This methodology allows for a clear and organized development process, making it easier to identify and resolve potential issues along the way.In summary, structured application development relies on a top-down approach to systematically build and refine the system, moving from a general design to a detailed structure. This approach promotes efficiency, organization, and better management of complex software projects.

To know more about top-down approach visit:

https://brainly.com/question/19672423

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

please help me please(python btw im in gr 11)

please help me please(python btw im in gr 11)

Answers

Answer:

See explanation

Explanation:

This is the pseudocode:

def findNextSquare(n):

   if \(\sqrt{n}\) is an integer:

       return \({(\sqrt{n}+1) } ^{2}\)

   else:

       return -1

Assume a base cuboid of N dimensions contains only p (where p > 3) nonempty base cells, and there is no level associated with any dimension.

What is the maximum number of nonempty cells (including the cell in the base cuboid) possible in such a materialized datacube?
if the minimum support (i.e., iceberg condition) is 3, what is the minimum number of nonempty cells possible in the materialized iceberg c

Answers

The maximum number of nonempty cells in a base cuboid of N dimensions, assuming p nonempty base cells, can be calculated as \(p * 2^N - 1\).

In a base cuboid (Database), each dimension has 2 possible values (empty or nonempty), hence \(2^N\) represents the total number of possible combinations for all dimensions. However, we subtract 1 from the total to exclude the empty combination.

For the materialized iceberg cube with a minimum support of 3, the minimum number of nonempty cells can be calculated based on the number of nonempty base cells (p) and the minimum support threshold. To determine the minimum number of nonempty cells, we consider the scenario where each nonempty base cell satisfies the minimum support condition.

Therefore, the minimum number of nonempty cells in the materialized iceberg cube is p * (N choose 3), where "N choose 3" represents the combination of N dimensions taken 3 at a time.

In summary, the maximum number of nonempty cells in a base cuboid is \(p * 2^N - 1\), while the minimum number of nonempty cells in the materialized iceberg cube with a minimum support of 3 is p * (N choose 3).

To learn more about Database, visit:

https://brainly.com/question/28033296

#SPJ11

T/F: windows cannot open this program because it has been prevented by a software restriction policy

Answers

The statement is true, if a program displays the error message "Windows cannot open this program because it has been prevented by a software restriction policy," it indicates that the program is blocked from running due to a software restriction policy.

When Windows displays the error message stating that a program cannot be opened due to a software restriction policy, it means that the program has been restricted from running by a security policy enforced by the system administrator or by a Group Policy setting. Software restriction policies are a security feature in Windows that allow administrators to control which programs can run on a computer or within a network. These policies are implemented to prevent the execution of unauthorized or potentially malicious software that may pose a security risk.

When a program is blocked by a software restriction policy, it means that the program's executable file or its associated file extensions have been explicitly disallowed from running on the system. This restriction is typically enforced through policies defined at the group or system level, and it applies to all users on the affected computer or network. To resolve this issue, the system administrator or the policy settings need to be modified to allow the program to run. Alternatively, users can seek assistance from their IT department or system administrator to adjust the software restriction policies to permit the execution of the desired program.

Learn more about network here: https://brainly.com/question/30456221

#SPJ11

A(n) ____ is similar to a variable, except it can be assigned a value only once.

Answers

A(n) named constant is similar to a variable, except it can be assigned a value only once.

What is named constant?Variables that represent a fixed constant value are known as named constants. This enables you to represent frequently used values with meaningful names. It might be a good idea to convert a literal into a named constant if you find yourself using it frequently. This improves the readability of your code and makes it simpler to change it if necessary. Named Constants, also referred to as final variables or simply constants, are similar to variables in that once they have been given a value, it is impossible to change it. Named constants can generally be used in the same ways as other variables, aside from that.

To learn more about named constant refer to:

https://brainly.com/question/30078297

#SPJ4

A deleted view can be recovered by account administrators within how many days?.

Answers

Answer:

35 Days

Explanation:

It can be recovered in 35 days.

You administer a NetBIOS-based network that uses the TCP/IP protocol.You are trying to troubleshoot a computer that is unable t ocontact a server by its Net BIOS name.Which command can you use to check the connection?

Answers

As an administrator for a NetBIOS-based network that utilizes the TCP/IP protocol, if you're trying to troubleshoot a computer that is unable to connect to a server by its NetBIOS name, you can use the NBTSTAT command to check the connection.

To troubleshoot a computer that is unable to contact a server by its NetBIOS name in a TCP/IP-based network, you can use the "nbtstat" command.

The "nbtstat" command is a command-line utility available in Windows operating systems. It allows you to display NetBIOS over TCP/IP (NetBT) protocol statistics, as well as troubleshoot NetBIOS name resolution and NetBIOS name cache issues.

To check the connection using the "nbtstat" command, follow these steps:

1. Open the command prompt on the computer experiencing the issue. You can do this by typing "cmd" in the Windows search bar and selecting the "Command Prompt" application.

2. In the command prompt, type the following command and press Enter:

  ```

  nbtstat -a <server_name>

  ```

  Replace "<server_name>" with the NetBIOS name of the server you are trying to contact.

3. The command will display information related to the NetBIOS name and IP address mapping, as well as the status of the connection. Look for the "Host not found" or "Failed" messages, which may indicate issues with name resolution or connectivity.

By using the "nbtstat -a" command with the server's NetBIOS name, you can gather information about the connection and potentially identify any issues preventing the computer from contacting the server.

Learn more about network:https://brainly.com/question/28811877

#SPJ11

the breadth-first search algorithm structure makes use of which abstract data type? group of answer choices hash table priority queue queue stack

Answers

The breadth-first search algorithm structure makes use of the abstract data type queue.

In a breadth-first search algorithm, nodes are explored in a level-by-level order, starting from the root node and moving outwards. The algorithm uses a queue data structure to store the nodes that are waiting to be explored.

Nodes are added to the end of the queue as they are discovered, and they are explored in the order in which they were added to the queue (i.e., the first node added to the queue is the first to be explored).

A queue is a data structure that operates on a first-in, first-out (FIFO) basis. This means that the first element added to the queue is the first to be removed from the queue. In the context of a breadth-first search algorithm, the queue is used to store nodes that have been discovered but have not yet been explored.

Therefore, the answer is "queue".

Learn more about search algorithm here:

https://brainly.com/question/29607067

#SPJ11

write a program that accepts as input: the loan amount the interest rate per year the monthly payment. (enter the interest rate as a percentage. for example, if the interest rate is 7.2% per year, then enter 7.2.)

Answers

Below is the program written in Python 3.10 that accepts the following items as inputs: the loan amount, the interest rate per year, and the monthly payment.

the_loan_amount = float(input('Loan amount: '))

the_interest_rate = float(input('The interest rate: '))

the_monthly_payment = float(input('The monthly payment: '))

Input in Python Programming

You can make Python code to accepts input from the user by creating a variable to store the input using this syntax:

the_variable = float(input('Enter the item: ')

When you expect a float number (numbers with points) as input you can use float type. These variables are different from integer type variables which come with syntax 'int'.

Learn more about programming language https://brainly.com/question/16397886

#SPJ4

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

Maia wants to highlight the word mob in her first paragraph. Choose the steps that Maia will need to do to complete this process.

Answers

Answer: Step 2: Go to the font command group

Step 3: click on the text highlight color button

Step 4: Click on the color

Explanation:

Mala should do this by selecting her paragraphs and choosing Line and Gap from the Paragraph command group.

What are paragraphs?

A paragraph is a standalone section of writing that discusses a single subject or argument. One or more sentences make up a paragraph. Although they are not needed by any language's syntax, paragraphs are typically taken for granted in professional writing and are employed to break up the lengthier text.

The space between her paragraphs can be rapidly and simply adjusted by Maia. She should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this. From the drop-down menu, she should be able to select Add Space Before Paragraph.

The paragraph spacing has to be adjusted. She can choose the Line Spacing option from the same drop-down menu. The dialog box for paragraphs will then open. She will be able to choose the amount of space she wants before and after the paragraph using this option. These two choices are situated and displayed underneath the dialog box for paragraphs.

Therefore, she should select her paragraphs and choose Line and Spacing from the Paragraph command group to accomplish this.

To know more about paragraphs follow

https://brainly.com/question/11600913

#SPJ2

What electronic appliances at your home / school can be controlled remotely? Name any 4
with its uses.

Answers

Answer:

Hi how are you doing today Jasmine

What software maintain and increase the efficiency of a computer system?

Answers

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

which of the following online creation tools will be used if a person wants to create a video presentation?

a. Piktochart
b. Prezi
c. Powtoon
d. Zamzar​

Answers

Answer:

C

Explaination:

Powtoon

5.16 LAB: Output numbers in reverse

Answers

I need like a picture what to do so I can see how to move

To test whether a character is a numeric digit character, use the ________ function.

Answers

To test whether a character is a numeric digit character, use the isdigit() function.

The isdigit() function is a built-in function in many programming languages, including Python. It checks whether a given character is a numeric digit character or not. It returns True if the character is a digit (0-9), and False otherwise. This function is useful when you need to validate user input or perform calculations based on numeric characters.

Using the isdigit() function is straightforward. You simply pass the character you want to check as an argument to the function. For example, in Python, you can use the isdigit() function like this:

```python
char = '5'
if char.isdigit():
   print("The character is a digit.")
else:
   print("The character is not a digit.")
```

In this example, the isdigit() function is used to check if the character '5' is a digit. Since it is, the program will print "The character is a digit." If you change the character to something like 'a', the program will print "The character is not a digit."

In conclusion, the isdigit() function is used to test whether a character is a numeric digit character. It is a useful tool for validating user input and performing calculations based on numeric characters.

Know more about isdigit() here:

https://brainly.com/question/14947571

#SPJ11

the development team at an it company has configured an application load balancer (alb) with a lambda function a as the target but the lambda function a is not able to process any request from the alb. upon investigation, the team finds that there is another lambda function b in the aws account that is exceeding the concurrency limits. how can the development team address this issue?\

Answers

According to the statement Establish reserved concurrency for Vox procedure B so that it locks up if its concurrency exceeds a predetermined threshold.

Describe application using an example.

Applications are a subcategory of software that is intended for human use. This contrasts with systems, which don't necessarily require a user interface but are primarily designed to perform automation, controls, and data processing. Common applications include the following.

How does simple application work?

Updated: October 27, 2022. A compute service called Simple Game Server is made for single-server environments. The service offers lightweight, cloud-based servers that are simple to install and maintain.

To know more about Application visit :

https://brainly.com/question/28206061

#SPJ4

Yael would like to pursue a career where she helps design office spaces that are comfortable and help workers avoid injuries. What should she study? plsss help me with this question.

A. ergonomics

B. semantics

C. botany

D. genomics

Answers

The option that that  Yael should study is A. Ergonomics.

What is the study about?

Ergonomics is the scientific study of designing products, systems, and environments to optimize human comfort and health, including the design of office spaces.

Therefore, Yael could study ergonomics to gain the skills and knowledge necessary to design office spaces that are safe, efficient, and comfortable for workers. An ergonomist might work with architects, interior designers, and other professionals to ensure that the design of an office space takes into account the needs of the workers who will be using it.

Learn more about injuries from

https://brainly.com/question/19573072

#SPJ1

Passwords shall not be transmitted in the clear outside the secure domain
True
False

Answers

True. Passwords should never be transmitted in the clear outside the secure domain. The transmission of passwords in clear text is a major security risk and can lead to unauthorized access and compromise of sensitive information.

When a password is transmitted in clear text, it means that it is not encrypted or protected in any way during the transmission process. This allows anyone who intercepts the communication to easily read and capture the password, exposing it to potential misuse.

To ensure the security of passwords during transmission, it is essential to use secure protocols such as HTTPS or other encrypted communication channels. These protocols employ encryption techniques to protect the sensitive information, including passwords, from unauthorized access.

Additionally, it is crucial to follow best practices such as password hashing and salting on the server-side to store and handle passwords securely. Hashing transforms the password into an irreversible string of characters, making it extremely difficult for attackers to retrieve the original password even if they gain access to the stored data.

By adhering to these security measures, organizations can protect the confidentiality and integrity of user passwords, reducing the risk of unauthorized access and potential security breaches.

For more such questions domain,Click on

https://brainly.com/question/218832

#SPJ8

low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false​

Answers

Answer:

The correct answer is True.

Explanation:

The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.

Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.

Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.

Cheers

Who do you like more?

Lolbit

-or-

Mangle

Who do you like more?Lolbit-or-Mangle

Answers

Answer: lolbit

Explanation: she is my glitchy idol along with the shadows and Mr. Afton's cult.

Who do you like more?Lolbit-or-Mangle

Answer:

Mangle

Explanation: just because.

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

during the step of checkpoint, there is a system crash in the middle of the updates. how does the journaling technique handle such crash to achieve data consitency

Answers

If the crash occurs during updates to achieve data consistency FSCK( file system consistency checks) journal work.

What does "data consistency" mean?

Data consistency indicates that each user sees an identical representation of the data, including any modifications brought about by their own transactions and those of other users.

How can you tell if data is consistent?

Using the online applications CHECK DATA, CHECK INDEX and CHECK LOB is one technique to verify data consistency. When doing a conditional restart, a point-in-time recovery, or data repair, you might want to use these utilities.

To know more about data consistency visit:

https://brainly.com/question/28272691

#SPJ4

Other Questions
Graph the image of this triangle after a dilation with a scale factor of 2 centered at the originUse the polygon tool to graph the triangle.Polygon+Move-10-9-745*O-3-29987-654321-29NYUndo1234Redo567x Reset4a9HELP y+2=3(x4)= whats the missing equation Discuss the role of modern technology in controllimg the damages during the natural and artificial disasters. 12 m12 mtype your answer...meters squared how do you turn 0.03 into a fraction if the 3 is repeating professor jim hollan gave an introduction to human-computer interaction (hci). the use of hci during a task can be best considered an example of: USA Today uses a color scheme with blue and red in order to? (4a) square 3 (b - 2) ; a = 2 and b = 4 question mode multiple choice question need recognition would be greatest in which situation? multiple choice question. claire has run out of chanel no. 5, one of her favorite perfumes. pete returned home from work to find that his refrigerator is broken and that his refrigerated and frozen food must be thrown out. don is taking a four-week backpacking trip around europe and wants a new jacket for the trip. janet is making a fruit salad and has no ap QuestionAm I going to past science class and not go to summer school? when muslim women wear a hijab, this is a form of nonverbal communication. group of answer choices true false i really want to know what 6x6+2= ? a grcery store display has 60 oranges and 18apples. what is the ratio of oranges to apples 7.) After initially being welcomed as a hero back in Saudi Arabia, what was bin Laden soon viewed as? a.) b.) What are the two values of k closest to phi/4 5 for which k sin(x + 5) cos^2 (x + 5) dx phi/4-5 has a value of 1? Give your answers in terms of phik= ks= what are the general characteristicsof coinage metals Need answers too this I will give you a award i need help what would a b and c be which number represents the formed elements involved in fighting infection? 1 4 3 5 how did the Shang dynasty gain control of the yellow river valley