Category: Computer Science

  • Formatting Text and graphics

    I am needing this document to be formatted correctly. I will attach all files including instructions on changes that need to be made.

    Requirements: Needs to match the instructions

  • CSC340L Digital Logic Design Lab 1

    Lab 1: Instructions

    Complete the Pre-Lab Readings, Lab Procedures, and Lab Assignment instructions below.

    Download a printable version of this lab:

    Vivado Installation and Setup


    Pre-Lab Reading

    • Study the following materials:
      • Vivado Design Suite Release Notes, Installation, and License Guide
      • Vivado Design Suite Installation Overview
      • Vivado Licensing and Activation Overview
      • How to install Xilinx Vivado 2023 for free
    • Verilog Reference Guide by Xilinx (this is a file that is provided to be linked in the course area): Chapter 1
    • Lab Report and Rubrics

    Lab Procedures

    Task 1: Download and install the current version of Vivado Design Suite

    Use all the resources identified in the Pre-Lab Reading to help you locate the current version of Vivado Design Suite. Download and install this version of Vivado Design Suite. Acquire the necessary licenses and activate your Vivado Design Suite.

    Task 2: Create your CSC340L file directory.

    Vivado Design Suite can be very picky about its file directory. Create a folder as follows: C:CSC340LYourFirstName_LastName. This will be the folder for all your CSC340L labs and projects and will be referred to as your CSC340L directory.

    Note: If the number of the course differs from this example, use the same logic/pattern to create your directory with the actual course number.

    Task 3: Create your first project named Lab1.

    Create this empty project and make sure it is created successfully. You can check whether the project is created successfully by doing one or both of the following:

    1. Verify Lab1 directory is created under your CSC340L directory.
    2. In Vivado Design Suite, close the project by selecting File > Project > Close. Then reopen the project by selecting File > Project > Open.

    Lab Assignment

    Video Report for Lab 1 that includes the following:

    • The accurate and complete walkthrough of the Vivado Design Suite download and installation in Task 1. This shall include enough details for a new student of CSC340L to follow and install and activate Vivado Design Suite successfully.
    • Successful reopening of the Lab1 project as described in Task 3.

    Zip file the design directory that you created in Task 3, name your file name your zip file YourFirstName_LastName_Lab1.

    For each lab, you are required to submit all of the following items:

    1. Screen Recording of your work
    2. ZIP file of the complete Xilinx/Vivado project folder
    3. Lab Report (PDF format)

    Lab Report (PDF) Requirements

    Each lab report must include the following clearly and professionally organized sections:

    • Student Name
    • Student ID
    • Lab / Homework Title
    • Problem Statement(s)
    • Solution(s)

    For each solution, you must include:

    • Methodology: A clear explanation of how you approached and completed the lab
    • Screenshots of both types of code (e.g., Verilog modules and testbench, if applicable)
    • Screenshots of schematics and simulations generated in Vivado
    • Clear explanations connecting your code, schematics, and results

    Important Notes

    • Submissions without a properly formatted PDF lab report will be considered incomplete.
    • This format will be used consistently for all lab submissions up to Week 6.
    • Make sure all files are clearly named and uploaded under the correct assignment.

    Requirements: Screen Recording of your work ZIP file of the complete Xilinx/Vivado project folder Lab Report (PDF format)

  • Homework 4

    Below, we have provided a suggested format to help you organize your work. Youre welcome to use it or adapt it to your own style just be sure your final submission meets all the requirements in the rubric.

    For each assignment, we suggest submitting two files:

    1. Your code file – contains all your work.
    2. Your answers file walks graders through what you did and what you found. For each coding question, include:
      • Methodology functions used, models implemented, and how the model was evaluated.
      • Results equations, graphs, tables, and performance metrics
      • Discussion of Results discuss what your results mean for this dataset. Mention anything surprising, possible reasons for weak performance, ways to improve the model, other analyses worth exploring, and any ethical or legal considerations

    Requirements: Complete

  • someone that is good at word

    Requirements: word project

  • someone that is good at word

    Requirements: word project

  • someone that is good at word

    Requirements: word project

  • Neek 4 – Sky’s the Limit, What’s Your Dream Event?

    My name is Cornelius Moneybags and I’m one of those extravagantly wealthy venture capitalists you have heard about on the news. My child really wants to go to an Esports event for {Your Game Here}. Money is no object for you, I simply want to make this the best possible event imaginable.

    Please respond with your plan on how to make such an event occur.

    Where is the venue going to be located?
    Who will be assisting in your project?
    What is your timeline to make this all work?

    Who will be competing?
    Is there another event that you’re going to potentially base this on?

    I look forward to reading your 2-page planning document describing answers to all of these questions and any other information you want to share with me, Cornelius Moneybags. Oh also, I’d only to worry about this event for a weekend, so please limit it to 2 days.

    Requirements: 2pages

  • Cybersecurity Fundamentals Exploration

    Assignment 1.1: Cybersecurity Fundamentals Exploration (100 points total)

    1. Current Threat Research (40 points)

    Research and analyze three major cybersecurity incidents that occurred between 2024 and 2026. For each incident, address the following:

    • The attack vector used
    • The business impact (financial, operational, reputational)
    • How the incident could have been prevented through secure software development practices

    Length: 23 paragraphs per incident

    2. CIA Triad Application (30 points)

    Select a software system you use regularly (e.g., online banking, social media, e-commerce).

    • Explain how Confidentiality, Integrity, and Availability apply to the selected system
    • Identify two potential threats for each CIA component
    • Propose basic security controls to mitigate each threat

    3. Security Design Principles (30 points)

    Define and provide real-world examples for each of the following principles:

    • Principle of Least Privilege
    • Defense in Depth
    • Fail Securely

    Deliverables

    Submit the following as a single package:

    • 68 page research paper (properly cited)
    • Executive summary
    • Professional development plan (focused on cybersecurity skills growth)

    Submission Guidelines

    • Submission Method: Course Management System or Email
    • File Naming Convention: LastName_FirstName_Module1_Assignment
    • Due Date: Next class session
    • Late Policy: Contact me in advance if you require an extension due to extenuating circumstances
    • Academic Integrity: All work must be original and properly cited
  • discussion replies –

    Each reply must be 250 words

    Attached Files (PDF/DOCX): discussion replies 2-8.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • web infrastructure and policies

    Discuss at least three different aspects of the physical web infrastructure that are important to secure such as the end user devices, the backend network, web servers, storage, networking devices, and monitoring/event management. Also, if you were setting security policy for managing end user devices in a company, how far would you go from an ethical and biblical point of view in monitoring and reporting upon end-user activity and installed applications? thread must be 350 words in current APA format and must demonstrate course-related knowledge. A minimum of 3 academic references is required, including external references beyond the textbook as well as biblical integration with specific verses.