Category: Computer Science

  • Boolean Search Exercise

    Read the attached instructions to complete this assignment.

    I have also attached some resources for you to use, including this one here:

    Make sure this is well-formatted like a REPORT.

    Use APA format for your citations.

    You can use other sources as well.

    (Ignore the assembly language; this needs to be in a Word Doc)

    Requirements: 3-4 pages, not including References section and title page. | Assembly Language

  • word project The instructions is long.

    follow instruction of what to do in the other word file

    Requirements: word project

  • Computer Science Question

    Editing the paper perfectly according to the IEEE conference template template.

    convert the doc to word edit them perfectly as mentioned in instructions and convert to pdf and send me

    we have identified certain issues that must be corrected.

    The following concerns were observed:

    1. The manuscript does not fully conform to the IEEE formatting guidelines (template structure, font, spacing, alignment, etc.).
    2. All references are not yet cited in the text.

    We request you to kindly revise the manuscript addressing all the above points and resubmit the corrected camera-ready version passed with PDF EXPRESSED within 24 hours.

    Please ensure that the updated submission strictly follows the IEEE format and all references, figures, and tables are appropriately cited in the text.

    Requirements: 1000

  • Data Analysis and Visualisation 3 tasks

    3 tasks to do with database in excel

    Requirements: 4000

  • I will do that part of the assignment

    Step 1: Download and Extract Files

    1. Download the zipped folder linked below:
    2. Extract or unzip the folder. You should see four files inside.
    3. TIP: If you’re not sure how to extract a zipped folder, search your operating system’s help feature or refer to the
    4. in the Course Introduction.

    Step 2: Identify the Files

    1. Create a new document using Word, Google Docs, or another word processing tool of your choice. Type your name, the date, and your course information at the top of the document.
    2. In the document, list each of the four extracted files by name and identify their file type based on the file extension.
    3. Example: MyPhoto.jpg – Image File (JPG)
    4. TIP: If the file extensions are hidden, you will need to unhide, or display, them. If you’re unsure how to do this, refer to the lesson materials or do a Google search.

    Step 3: Take a Screenshot

    1. Open your File Explorer (Windows) or Finder (MAC) to view the extracted files. Make sure that your screen shows all 4 files.
    2. Take a screenshot showing the files and their extensions. Paste or insert the screenshot into your document below the list you created in Step 2.
    3. TIP: If you’re not sure how to take a screenshot, search your operating system’s help feature or refer to the
    4. in the Course Introduction.

    Step 4: Organize the Files

    1. On your desktop, create a new folder and name it: CIS101 Coursework
    2. Inside that folder, create a subfolder named: Lesson 2
    3. Move or copy the four extracted files into the Lesson 2 folder on your desktop.
    4. Take a screenshot showing your folder structure with the files inside theLesson 2 folder. Insert this second screenshot into your document.

    Step 5: Short-Answer Reflection Questions

    Answer the following short-answer questions in your document:

    1. Cloud Storage:
    • What are the benefits and potential risks of using cloud storage?
    • Do you currently use a cloud storage service (like Google Drive, OneDrive, or iCloud)? If not, which one would you consider using and why?
    1. File Organization:
    • Why is it important to keep your files and folders organized, especially when working on school or professional projects?
    1. Mac vs. PC:
    • What operating system are you using for this projectMac or Windows?
    • What do you see as the biggest difference between the two, and which do you prefer using (and why)?

    Step 6: Save and Submit

    1. Save your document inside the Lesson 2 folder using the following filename format: MEID_Lesson2_Project (Replace MEID with your actual MEID or student ID.)
    2. Zip the entire Lesson 2 folder.
    3. Submit the zipped folder using the link in .

    Submission Checklist:

    Document includes a list of the 4 files with file types

    Document includes 2 screenshots: one of extracted files, one of the organized folder

    Reflection questions are answered thoughtfully

    Document is named correctly and saved in the Lesson2 folder

    Zipped Lesson2 folder contains 4 original files and MEID_Lesson2_Project file

  • cmap 665 – cybersec policy management

    Step 1

    Review NIST SP 800-161 Rev. 1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.

    Your review should focus on understanding the cyber risks posed by supply chains to organizations and how cybersecurity professionals can address and mitigate these risks.

    Supply chains, in their complexity and interconnectedness, present significant cyber risks to organizations. These risks stem from various factors such as:

    1. Third-Party Dependencies: Organizations often rely on numerous third-party vendors, suppliers, and service providers within their supply chains. Each of these entities represents a potential vulnerability that could be exploited by threat actors.
    2. Information Sharing: Supply chains involve the sharing of sensitive information across multiple parties. This increases the likelihood of data breaches or unauthorized access to proprietary information.
    3. Product Integrity: The introduction of compromised or counterfeit components into the supply chain can compromise the integrity and security of products or systems, leading to potential vulnerabilities.
    4. Complexity and Opacity: Supply chains can be highly complex and opaque, making it challenging for organizations to fully understand and manage the cyber risks associated with each link in the chain.

    To address and mitigate these potential risks, cybersecurity professionals can implement several key strategies:

    1. Risk Assessment and Management: Conduct thorough risk assessments to identify vulnerabilities and potential threats.
    2. Vendor Management: Implement robust vendor management practices, including due diligence assessments, contractually binding security requirements, and regular monitoring of vendor compliance with security standards.
    3. Information Sharing and Collaboration: Foster collaboration and information sharing with supply chain partners to enhance collective cybersecurity posture.
    4. Supply Chain Resilience: Develop strategies to enhance the resilience of the supply chain against cyber threats, such as redundancy planning, diversification of suppliers, and contingency measures.
    5. Security Controls and Standards: Implement robust cybersecurity controls and adhere to industry standards and frameworks.

    By adopting these proactive measures, cybersecurity professionals can help organizations mitigate the inherent cyber risks associated with supply chains, thereby safeguarding critical assets and ensuring business continuity.

    Requirements: 3p

  • cmap 645 – cybersec law and regulations

    JKL Corporation offers end-to-end encryption services to customers in its proprietary messaging application. JKL prides itself in offering private communications that are not subject to eavesdropping. Given their high level of encryption, the messages of suspected criminals cannot be viewed by law enforcement. Court orders and authorized search warrants demanding access to customer communications have begun to be served on JKL to access customer profile information and content. JKL faces a dilemma of not wanting to provide user content, which it claims it cannot independently access and being unwilling to grant law enforcement access to its encryption keys. Before responding, consider the following prompts:

    • Reflect on the significance of the constitutional concerns and legal implications of government surveillance addressing cybersecurity.
    • How do we evaluate the government’s need to offer cybersecurity safety?
    • Reflect on the importance of existing federal legislation allowing for eavesdropping on electronic communications.

    Discussion Prompts

    1. Mandatory Prompt
      • How does the Fifth Amendment apply to the governments request for decryption?
    2. Choose One Additional Prompt
      • What ethical concerns and theories apply to JKLs dilemma?
      • How can JKL avoid compliance with court-ordered action forcing decryption?
      • If JKL software engineers were able to access customer data and messaging along with discovered illegal activity, to whom should they report it?

    Initial Post

    • All students are required to respond to the mandatory prompt. Next, select and answer one of the additional prompts provided above. Your initial post should fully address both prompts and include real-world links/applications.
    • When constructing your initial post, remember to critically analyze the topic and add substantial thought to the subject area. Utilizing the resources provided in your course materials will enhance your understanding and response to the questions.
    • Use concrete examples drawn from current events, historical instances or personal experiences to illustrate your points in discussing your selected prompt…..

    Reply to at least two peers considering the following prompts

    • Provide substantive replies to at least two classmates’ initial posts, utilizing at least one reference to support your argument. These replies should offer new insights and critique or expand upon the ideas presented.
    • Add at least one concept or fact that your peer did not consider in their initial post.
    • Replies that only say things such as good job or that regurgitate the initial post of your peer are not sufficient and should be avoided.

    Posting Guidelines

    Requirements: 2p

  • Design and implementation of a prototype ui for a casino slo…

    The dissertation concerns the design and implementation of a prototype Casino Page (UI only), where users can browse slot games metadata. The system will not include real-money gambling or user accounts. It will only use legal, non-personal slot metadata (e.g., title, provider, RTP, volatility, release date, category). The project must include: Design and implementation of a Trending Slots tab A simple ranking algorithm (e.g., based on release date and metadata features) Filtering options (category, provider, volatility) Display of contextual information (RTP, volatility, provider, release date) Integration of responsible gambling principles in the UI (information prompts, voluntary limits messaging, awareness messages) Application of privacy-by-design principles (no behavioural tracking, no personal data collection) Technical stack: Python for data processing and ranking logic C# (.NET MAUI or WPF) for the front-end UI Local JSON or SQLite database This is a desk-based software engineering project. No human participants are involved. Ethical form attached.

    Attached Files (PDF/DOCX): ethicalappro-1 (1).docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Incident Response

    Hello,

    Can you go to this website and I will share the log in information, and complete this lab?

    and after you submit create the screen shots and give them to me please.

    Assisted Lab: Using Nontraditional Vulnerability Scanning Tools

    The website:

    Requirements: You need to pass, even take more than 1 time