Category: Computer Science

  • Computer Science Question

    Assignment 2 Using GEM5 with a Hello World Program for the x86 ISA

    Requirements: Explaiantion +source code and screenshots

  • Incident Response

    Hello,

    Can you go to this website and I will share the log in information, and complete this lab?

    and after you submit create the screen shots and give them to me please.

    (Lab Activity – Applied Lab: Using Network Sniffers)

    The website:

    Requirements: No plagiarism

  • 1 individual Project

    Assignment Details

    Unit 9 – Individual Project (125 points)

    Due: Sun, Feb 1 |

    Description

    Assignment Details:

    Research at least 5 draft proposals, other acts, or publications that are designed to enhance, replace, or supplement the SarbanesOxley Act (SOX). Write a 46-page paper, not including title or reference pages. Complete the following:

    • Outline and describe the key components and features, and discuss the strengths and shortcomings of each.
    • Construct a comparison framework or table. What is your conclusion form this analysis?

    Please submit your assignment.

    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

    Individual Project Rubric

    The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. Its the roadmap that can help you in the development of your IP.

    Expectation Points Possible Points Earned Comments
    Assignment-Specific: Outlines and describes the key components and features of each proposal, other act, or publication that is designed to enhance, replace, or supplement the SarbanesOxley Act

    35

    Assignment-Specific: Discusses the strengths and shortcomings of each proposal, other act, or publication that is designed to enhance, replace, or supplement the SarbanesOxley Act

    35

    Assignment-Specific: Constructs a comparison framework or table and discusses their conclusion from this analysis

    35

    Assignment-Specific: Demonstrates the utilization of the course readings and other scholarly or professional materials to complete the assignment

    10

    Professional Language: Assignment contains accurate grammar, spelling, and punctuation with few or no errors. (APA formatting is required or style specified in assignment).

    10

    Total Points

    125

    Total Points Earned

    Requirements: see instructions

  • Generative AI Adoption Strategy

    In this final, individual assignment, you will create a comprehensive generative AI adoption strategy for an organization (your own or 1 from the “601 Real-World Gen AI Use Cases from the World’s Leading Organizations” article). Your strategy should include sections for each of the following: 1. Executive Summary: Concisely summarize the strategy, highlighting key recommendations and expected benefits. 2. Situational Analysis: Industry Readiness: Analyze the chosen industry’s readiness for AI adoption based on the “5 Key Dimensions of Vertical AI Readiness.” Use insights from the Deloitte report explored with NotebookLM. Current State: Assess the organization’s current AI capabilities (if any), data infrastructure, and technological maturity. Challenges: Identify internal and external challenges to AI adoption (e.g., technical limitations, workforce skill gaps, competitive pressures, and ethical concerns). 3. Proposed AI Solutions: Phase 1: Low-Hanging Fruit: Identify immediate opportunities for AI integration that can deliver quick wins and demonstrate return on investment. Feel free to go back to the “Low Hanging Fruit: Quick Wins with Generative AI” video for a quick recap. Phase 2: Strategic Expansion: Outline a longer-term vision for AI integration, including more complex and transformative applications. Agentic AI Opportunities: Dedicate a section to exploring the potential of agentic AI within the organization, drawing on your research from the “Agentic AI” exercise. Propose specific use cases where agentic AI could provide significant value. Tool Selection: Recommend specific AI tools for each proposed solution, justifying your choices based on the “Your AI Power Stack” activity from Week 1, as well as the available tools list and course learnings. Address budget considerations and potential vendor relationships. 4. Workforce Adaptation Plan: Training and Reskilling: Develop a comprehensive plan to upskill the workforce for an AI-powered future. Address potential job displacement concerns and outline strategies for role transformation. New Roles: Identify new roles and responsibilities that may be needed to support AI initiatives (e.g., AI trainers, prompt engineers, or AI ethicists). Organizational Culture: Propose strategies to foster a culture of collaboration between humans and AI, emphasizing the “human-in-the-loop” approach. 5. Business Model Innovation: Explore how generative AI could enable new business models or significantly transform existing ones. Draw inspiration from the “AI-Driven Business Model Innovation” video and examples like Stitch Fix, UPS, and Nike. 6. Challenges/Risk Assessment and Mitigation: Technical Risks: Address potential technical challenges (e.g., data security, system integration, AI “hallucinations”) and propose mitigation strategies. Ethical Risks: Analyze potential ethical concerns (e.g., bias, fairness, transparency, accountability) and outline proactive measures to address them throughout the AI lifecycle. Business Risks: Identify potential business risks (e.g., over-reliance on AI, job displacement, competitive disadvantage) and propose strategies to minimize their impact. 7. ROI Measurement Plan: Define specific, measurable, achievable, relevant, and time-bound (SMART) metrics to track the success of the AI adoption strategy. Outline a plan for data collection, analysis, and reporting. Explain how ROI will be calculated and communicated to stakeholders. 8. Ethical Considerations: Weave ethical considerations throughout the entire strategy, not just in a separate section. Demonstrate a commitment to responsible AI development and deployment. 9. Conclusion: Reiterate the key benefits of the proposed AI adoption strategy. Emphasize the organization’s commitment to ethical and responsible AI. Offer a compelling vision for the future of the organization in an AI-powered world. 10. References: Include all relevant references used in the assignment. Your strategy should be presented in either a Word or PDF document and should between 4-5 pages long. Please upload your strategy below when you have finished.
  • Chapter_01_essay_jones.doc

    Select one article that is of particular interest to you. Perform additional internet research on that topic and then write a summary of that article. Include why you were interested in the article, what you learned from it, and how you could use it in your career as a working professional.
  • computer science question

    Discuss in detail how modern operating systems manage memory using a combination of paging, segmentation, and virtual memory. In your answer, explain how each technique works individually, how they complement one another, and the challenges they solve in terms of process isolation, efficient memory utilization, and system performance. Additionally, analyze the role of the Memory Management Unit (MMU), page tables, and TLB (Translation Lookaside Buffer) in translating virtual addresses to physical addresses. Finally, evaluate the potential problems such as page thrashing and fragmentation, and propose strategies that operating systems use to mitigate these issues.

    Requirements:

  • IT532 | Computer Forensics | Week 3 Discussion: Forum Field…

    Week 3 Discussion: Forum Field Response Kit

    Number of replies: 1

    Discussion Topic:

    Describe what tools you might include in a field response kit and briefly explain why each tool is necessary.

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources.
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum 2 thoughtful and valuable replies to others (50 words each).

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each

  • IT532 | Computer Forensics | Discussion 3: Data Center Physi…

    Discussion 3: Data Center Physical Infrastructure

    Number of replies: 12

    Discussion:

    Given the environmental impact of massive data centers, should the future of cloud engineering prioritize liquid cooling and renewable energy over raw performance scaling?.

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources.
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each)

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each)

  • Computer Science Question

    An algorithm is a step-by-step set of instructions used to solve a problem or complete a task.

    Example:

    Steps to find the largest number in a list:

    Start with the first number as the largest.

    Compare it with the next number.

    If the next number is bigger, make it the largest.

    Repeat until the list ends.

    This step-by-step process is an algorit

    Requirements:

  • cmap 645 week 3 discuss

    Unit 3 Discussion

    Overview

    Begin your response to the prompts by considering the emphasis on aspects such as privacy and safety.

    • Reflect on the significance of hacking and ransomware
    • Consider the ethical and normative questions in paying ransoms

    Once you’ve clearly distinguished in your mind the differences between these concepts, subsequent posts may focus on their various applications. For the mandatory post, you will consider ethics. Then, in your additional prompt, you will offer an example or add personal observations.

    Discussion Prompts

    1. Mandatory Prompt
      • Discuss the ethical implications of using laws to promote cybersecurity, in particular on the protection of data and how government and corporations gather, store and use data in response to hacking and ransomware incidents.
    2. Choose One Additional Prompt
      • Offer an example of how a particular corporation or municipality was affected by ransomware and whether the ransom was or wasnt paid. You can draw from recent news, historical events or cases discussed in the readings.
      • Share any personal experiences or observations concerning the payment or non-payment of ransoms. What would the loss of data mean to an entity like a school system or healthcare organization? Do the laws sufficiently address the severity of the criminal acts and/or prohibit the payment of ransoms?

    Initial Post

    • All students are required to respond to the mandatory prompt. Additionally, select and answer one of the additional prompts provided below. Your initial post should fully address both prompts and include links to real-world situations.
    • When constructing your initial post, remember to critically analyze the prompts and add substantial thought to the topic. Utilizing the resources provided in your course materials will enhance your understanding and response to the prompts.
    • To illustrate your points, use concrete examples drawn from current events, historical instances or personal experiences.

    Reply to at least two peers considering the following prompts

    • Provide substantive replies to at least two classmates’ initial posts, utilizing at least one reference to a source for support. These replies should offer new insights, provide a critique or expand on the ideas presented.
    • Add at least one concept or fact that your peer did not consider in their initial post.
    • Replies that only say things such as good job or that regurgitate the initial post of your peer are not sufficient and should be avoided.

    Posting Guidelines

    Requirements: 8p