Category: Computer Science

  • Python code to find largest number in a

    I am learning Python and need help writing a program that finds the largest number in a list.

    I tried using a for loop and if statements, but I am not getting the correct result.

    Can someone explain the correct method and provide an example code?

    Requirements:   |   .doc file | Assembly Language

  • Incident Response

    Hello,

    Can you go to this website and I will share the log in information, and complete these 4 labs?

    and for each one you submit create the screen shots and give them to me please.

    The website:

    Week 1 – Lab Activity: Assisted Lab: Using File Analysis Techniques
    Week 2 – Lab Activity: Assisted Lab: Analyzing Potentially Malicious Files

    Week 3 – Lab Activity: Applied Lab: Researching DNS and IP Reputation

    Week 4_ Applied Lab: Using Network Sniffers)

    Requirements: I will share the log in info   |   .doc file

  • Homework 2

    Below, we have provided a suggested format to help you organize your work. Youre welcome to use it or adapt it to your own style just be sure your final submission meets all the requirements in the rubric.

    For each assignment, we suggest submitting two files:

    1. Your code file – contains all your work.
    2. Your answers file walks graders through what you did and what you found. For each coding question, include:
      • Methodology functions used, models implemented, and how the model was evaluated.
      • Results equations, graphs, tables, and performance metrics
      • Discussion of Results discuss what your results mean for this dataset. Mention anything surprising, possible reasons for weak performance, ways to improve the model, other analyses worth exploring, and any ethical or legal considerations

    Requirements: complete

  • Computer Science Question

    Case Study: System Analysis and Information Gathering

    GrocerPlus is a well-established supermarket chain in Metropolis with a successful ten-year run that is looking to revamp its inventory management system. Their current system has begun showing signs of inefficiency with frequent mismanagement leading to overstocking or shortage of items, prompting management at GrocerPlus to invest in a robust system with systems analysts and designers as part of their team for this task.

    Assignment: Your primary responsibility as part of this team of systems analysts and designers is to gather relevant information on the current system to analyze it, identify its deficiencies, and devise an efficient alternative design. Your main sources will include management staff, store employees, data records, etc.

    Your task is to identify and choose interactive yet unobtrusive methods of gathering the required information, which may include interviews, questionnaires, document analysis, observations, or using existing system records as means.

    Instructions: Establish the methods by which you will gather data regarding the current inventory management system. Ensure your approach includes both interactive and passive methods of gathering this information.

    Provide a thorough explanation for each method chosen and their advantages and disadvantages within this project context.

    Details each method that will be implemented, detailing what type of information will be gathered through each approach and its importance to systems analysis and design.

    Last, compile all of your findings and explanations into an exhaustive report that can be submitted for evaluation.

    This case study is intended to challenge your ability to select and justify appropriate information-gathering methods in a real-world setting. Your choices will have a substantial effect on the success of analysis and design processes, so it is crucial to carefully consider each option available. (LO1 & LO2)

    Essential Activities:

    1. Reading Chapters 4-5 of your text will assist you with this exercise.
    2. Watching the videos on ‘Information Gathering” and “Data Gathering” will assist you with the exercise.

    Notes:

    1. This paper must be formatted in APA Style 7th edition. The paper should also have a properly formatted title page, introduction, content body, conclusion, and references.

    Requirements: Explaination Should be 800 words with screenshots

  • Computer Science Question

    Governance, Quality, Compliance and Ethics: EIS852

    Unit 8 – Discussion Board 1 (75 points)

    Due: Thu, Jan 22 |

    Description

    Primary Response is due by Thursday (11:59:59pm Central), Peer Responses are due by Saturday (11:59:59pm Central).

    Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

    Compare and contrast other acts, either from the present or the past, that are similar to the SarbanesOxley Act (SOX). Identify 1 or 2 acts that would be comparable, and answer the following questions about each act:

    • How are they alike?
    • How are they different?
    • Are they successful?
    • In your opinion, is the act comparable, better, or worse than SOX?

    Responses to Other Students:

    Respond to at least 2 of your fellow classmates with at least a 200-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

    • How would you justify a different perspective from your classmates on the topic?
    • How, additionally, would you defend your classmates position?
    • What critique do you offer your classmate in regard to clarity and thoroughness of their post?
    • Please address all prompts. When offering counterargument or justification, consider practice, theory, and examples from your own experience, reading, or current events in presenting your position.

    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

    Discussion Board Rubric

    Expectation

    Points Possible

    Points Earned

    Comments

    Application of Learning Material Content: Initial post demonstrates understanding of Learning Material content.

    25

    Application of Course Knowledge: Initial post contributes unique perspectives or insights gleaned from text/learning resources, or specified by assignment.

    25

    DB Responses: Responds substantively to two posts. Responses encourage interaction in the Discussion Board and classroom community.

    10

    Academic Writing: Initial post presents information logically and is clearly relevant to discussion topic. Posts contain accurate grammar, spelling, and/or punctuation with few or no errors. All resources should be cited in current APA format.

    15

    Total Points

    75

    Total Points Earned

    Unit 8 – Individual Project (125 points)

    Due: Sun, Jan 25 |

    Description

    Assignment Details

    In a paper of 46 pages (not including title and reference pages), outline the key components of the SarbanesOxley Act (SOX) and provide the supported impact for each significant area. During your outline development, the following key areas must be identified:

    • Describe the key points that make up SOX.
    • Explain any sub-areas of importance.
    • Identify any areas that play a key role in policy development (minimum of 2).
    • Identify any areas that play a role in ethical conduct description (minimum of 2).
    • Give a short description for both ethics and policy identification.

    Please submit your assignment.

    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

    Individual Project Rubric

    The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. Its the roadmap that can help you in the development of your IP.

    Expectation

    Points Possible

    Points Earned

    Comments

    Assignment-Specific: Describes the key points that make up the SarbanesOxley Act (SOX) and explains any sub areas of importance

    23

    Assignment-Specific: Identifies any areas that play a key role in policy development (minimum of 2)

    23

    Assignment-Specific: Identifies any areas that play a role in ethical conduct description (minimum of 2)

    23

    Assignment-Specific: Gives a short description for both ethics and policy identification

    23

    Assignment-Specific: Demonstrates the utilization of the course readings and other scholarly or professional materials to complete the assignment.

    23

    Professional Language: Assignment contains accurate grammar, spelling, and punctuation with few or no errors. (APA formatting is required or style specified in assignment).

    10

    Total Points

    125

    Total Points Earned

    Security Management: EIS854

    Unit 8 – Discussion Board (75 points)

    Due: Thu, Jan 22 |

    Description

    Primary Response is due by Thursday (11:59:59pm Central), Peer Responses are due by Saturday (11:59:59pm Central).

    Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

    Discuss the following:

    • Does the body of security policies in an organization provide information security?
    • What is the contribution of security policies to the security of the computing environment? Be specific, and support your position.

    Responses to Other Students:

    Respond to at least 2 of your fellow classmates with at least a 200-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

    • How would you justify a different perspective from your classmates on the topic?
    • How, additionally, would you defend your classmates position?
    • What critique do you offer your classmate in regard to clarity and thoroughness of their post?
    • Please address all prompts. When offering counterargument or justification, consider practice, theory, and examples from your own experience, reading, or current events in presenting your position.

    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

    Discussion Board Rubric

    Expectation

    Points Possible

    Points Earned

    Comments

    Application of Learning Material Content: Initial post demonstrates understanding of Learning Material content.

    25

    Application of Course Knowledge: Initial post contributes unique perspectives or insights gleaned from text/learning resources, or specified by assignment.

    25

    DB Responses: Responds substantively to two posts. Responses encourage interaction in the Discussion Board and classroom community.

    10

    Academic Writing: Initial post presents information logically and is clearly relevant to discussion topic. Posts contain accurate grammar, spelling, and/or punctuation with few or no errors. All resources should be cited in current APA format.

    15

    Total Points

    75

    Total Points Earned

    Unit 8 – Individual Project (125 points)

    Due: Sun, Jan 25 |

    Description

    Assignment Details

    You are the chief information security officer (CISO) of a federal civil agency and have become quite concerned lately that personal identifying information (PII) is not being protected or handled appropriately. Complete the following:

    • Write an appropriate policy that defines PII; establishes responsibility for protecting PII; explains how you will identify and protect elements of PII; and describes auditing, reporting, and incident requirements.
    • You may review published policies and use them as sources, but you should create your own as well.

    Ensure that your paper meets the following requirements:

    • Format your submission using APA formatting.
    • Your submission should include a title page, body, and reference list. There is no need for an abstract for this assignment.
    • The body of your submission should be a minimum of 4 double-spaced pages.
    • All submissions should include at least 2 authority references other than your textbook.
    • Cite all references using APA format.
    • Save your assignment as a new Word document, and name the file using the convention “Unit8_IP_Lastname.”

    Please submit your assignment.

    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.

    Individual Project Rubric

    The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. Its the roadmap that can help you in the development of your IP.

    Expectation

    Points Possible

    Points Earned

    Comments

    Assignment-Specific: Writes an appropriate policy that defines PII and establishes responsibility for protecting PII

    35

    Assignment-Specific: Writes an appropriate policy that explains how it will identify and protect elements of PII

    35

    Assignment-Specific: Writes an appropriate policy that describes auditing, reporting, and incident requirements

    35

    Assignment-Specific: Includes all required components as outlined in the assignment instructions

    10

    Professional Language: Assignment contains accurate grammar, spelling, and punctuation with few or no errors. (APA formatting is required or style specified in assignment).

    10

    Total Points

    125

    Total Points Earned

    Requirements:

  • IT Research

    1. ScienceDirect ArticleTedeschi, P., Sciancalepore, S., & Di Pietro, R. (2022). Satellite-based communications security: A survey of threats, solutions, and research challenges. Computer Networks, 216, 109246.

    Prepare and submit PowerPoint slides describing the research paper
    and including:
    The title for the research topic

    Main points in the paper

    Bibliography

    Present in class the PowerPoint slide-write talking points in notes15 minutes worth of information no more than 10 slides


    ***Do not take assignment if you will be using AI.




    Requirements: no more than 10 pages -15 min

  • IT532 | Computer Forensics | Week 2 Discussion Forum: Forens…

    Week 2 Discussion Forum: Forensics Tool

    Number of replies: 7

    Discussion Topic:

    Search on the internet for a tool that is used to acquire evidence for computer forensics. Share a link in the post.

    Discussion Forums (online and onsite classes):

    The Discussion Board is designed to create class dialogue. Participation in the Discussion Board is part of your attendance/participation and helps to demonstrate student knowledge of course content. Each Discussion Board post will be assessed using a rubric.

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources.
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum 2 thoughtful and valuable replies to others (50 words each).

    Requirements: Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. Citations (10%): Proper use and APA format. Replies (50%): Minimum 2 thoughtful and valuable replies to others (50 words each

  • IT530 | Cloud Computing | Discussion 2: Elasticity, Multi-Te…

    Discussion 2: Elasticity, Multi-Tenancy, and Service Models

    How do providers balance the benefits of high-level service abstractions (SaaS/PaaS) against the operational risks of “provider lock-in”?.

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources,.
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each).

    AWS Cloud Skill Builder

    Create free account inside AWS skillbuilder

    Click link to open resource.

    AWS Cloud Practitioner Essentials Training

    if the link isn’t available search for AWS Cloud Practitioner Essentials inside

    Click link to open resource.

    AWS Certified Cloud Practitioner (CLF-C02) Recommended Path

    Click link to open resource.

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources,. * Citations (10%): Proper use and APA format. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each)