Category: Computer Science

  • Computer Science Question

    help full question for you

  • Computer Science Question

    Instructions
    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    Use Times New Roman font for all your answers.

  • IT402_IT403_~Sabika

    Annual Report

    FY [Year]

    [Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

    Integrated Enterprise Systems

    IT402

    Instructions:

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    • Use Times New Roman font for all your answers.

    Name: ###

    CRN: ###

    ID: ###

    3 Marks

    Learning Outcome (1):

    Explain the interdisciplinary concepts, theories, and trends in ES and their role in supporting business operations

    Question One

    A company has been using an old MRP system for many years. Recently, management noticed that the system cannot support financial planning, customer management, or collaboration with suppliers.

    Evaluate whether upgrading to MRP II or ERP would better support the companys needs. Justify your recommendation by analyzing the differences in scope, integration level, and organizational impact.

    Learning Outcome(4):

    Design ES architectural models for various business processes.

    2 Marks

    Question Two

    A manufacturing process produces 40 units per hour, and the average cycle time for each unit is 0.75 hours.

    Using Littles Law, determine the average inventory within the process. Then explain how reducing cycle time would affect inventory levels and overall process efficiency.

    3 Marks

    Learning Outcome(6):

    Develop robust business intelligence solutions that provide an integrated framework for improved business processes within a global context.

    Question Three

    Srvice company receives frequent complaints about delays and inconsistent service quality. Management wants to redesign its processes to improve quality and reduce errors.

    Propose a quality improvement strategy using techniques such as Poka-Yoke, statistical process control, and continuous improvement methodologies. Explain how each technique would improve the service process.

    Annual Report

    FY [Year]

    [Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

    IT403

    Fundamentals of Databases

    Instructions:

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    • Use Times New Roman font for all your answers.

    Name:

    CRN:

    ID:

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question One

    Reflect on the various types of database users mentioned in Module 1. Choose one type of user (e.g., database administrator, end-user, or designer) and answer the following:

    • Describe their primary responsibilities and interactions with the database management system.
    • Discuss at least two challenges they might face in their role, especially regarding security and data access.
    • Suggest strategies that could be implemented to mitigate these challenges.

    Answers:

    2 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Two

    What is the best concept that describes each of the following definitions/descriptions?

    • Database description; including details about the database structure, relationships, constraints, and data types.
    • An element of the schema or an object within the schema, such as EMPLOYEE, DEPARTMENT, or SNN.
    • Utilized by the DBA and database architects to define the conceptual schema of a database.
    • Integrates all components into a single computer system, including the DBMS software, application programs, user interface processing software, and hardware.

    Answers:

    Write only one concept each.

    1.

    2.

    3.

    4.

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Three

    A company is building an e-commerce web application that serves thousands of customers simultaneously.

    • Which DBMS client-server architecture would you recommend for the proposed application, and why?
    • Identify the role of each tier using the e-commerce scenario.

    Answers

  • LAMAQ_IT402_IT403

    Annual Report

    FY [Year]

    [Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

    IT403

    Fundamentals of Databases

    Instructions:

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    • Use Times New Roman font for all your answers.

    Name: ###

    CRN: ###

    ID: ###

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question One

    Reflect on the various types of database users mentioned in Module 1. Choose one type of user (e.g., database administrator, end-user, or designer) and answer the following:

    • Describe their primary responsibilities and interactions with the database management system.
    • Discuss at least two challenges they might face in their role, especially regarding security and data access.
    • Suggest strategies that could be implemented to mitigate these challenges.

    Answers:

    2 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Two

    What is the best concept that describes each of the following definitions/descriptions?

    • Database description; including details about the database structure, relationships, constraints, and data types.
    • An element of the schema or an object within the schema, such as EMPLOYEE, DEPARTMENT, or SNN.
    • Utilized by the DBA and database architects to define the conceptual schema of a database.
    • Integrates all components into a single computer system, including the DBMS software, application programs, user interface processing software, and hardware.

    Answers:

    Write only one concept each.

    1.

    2.

    3.

    4.

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Three

    A company is building an e-commerce web application that serves thousands of customers simultaneously.

    • Which DBMS client-server architecture would you recommend for the proposed application, and why?
    • Identify the role of each tier using the e-commerce scenario.

    Answers

    Annual Report

    FY [Year]

    [Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

    Integrated Enterprise Systems

    IT402

    Instructions:

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    • Use Times New Roman font for all your answers.

    Name: ###

    CRN: ###

    ID: ###

    3 Marks

    Learning Outcome (1):

    Explain the interdisciplinary concepts, theories, and trends in ES and their role in supporting business operations

    Question One

    A company has been using an old MRP system for many years. Recently, management noticed that the system cannot support financial planning, customer management, or collaboration with suppliers.

    Evaluate whether upgrading to MRP II or ERP would better support the companys needs. Justify your recommendation by analyzing the differences in scope, integration level, and organizational impact.

    Learning Outcome(4):

    Design ES architectural models for various business processes.

    2 Marks

    Question Two

    A manufacturing process produces 40 units per hour, and the average cycle time for each unit is 0.75 hours.

    Using Littles Law, determine the average inventory within the process. Then explain how reducing cycle time would affect inventory levels and overall process efficiency.

    3 Marks

    Learning Outcome(6):

    Develop robust business intelligence solutions that provide an integrated framework for improved business processes within a global context.

    Question Three

    Srvice company receives frequent complaints about delays and inconsistent service quality. Management wants to redesign its processes to improve quality and reduce errors.

    Propose a quality improvement strategy using techniques such as Poka-Yoke, statistical process control, and continuous improvement methodologies. Explain how each technique would improve the service process.

  • TAHANI_IT403_405

    Annual Report

    FY [Year]

    [Add a quote here from one of your company executives or use this space for a brief summary of the document content.]

    IT403

    Fundamentals of Databases

    Instructions:

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.

    It is your responsibility to check and make sure that you have uploaded both the correct files.

    Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).

    Email submission will not be accepted.

    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.

    You must use this template, failing which will result in zero mark.

    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.

    Late submission will result in ZERO mark.

    The work should be your own, copying from students or other resources will result in ZERO mark.

    • Use Times New Roman font for all your answers.

    Name: ###

    CRN: ###

    ID: ###

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question One

    Reflect on the various types of database users mentioned in Module 1. Choose one type of user (e.g., database administrator, end-user, or designer) and answer the following:

    • Describe their primary responsibilities and interactions with the database management system.
    • Discuss at least two challenges they might face in their role, especially regarding security and data access.
    • Suggest strategies that could be implemented to mitigate these challenges.

    Answers:

    2 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Two

    What is the best concept that describes each of the following definitions/descriptions?

    • Database description; including details about the database structure, relationships, constraints, and data types.
    • An element of the schema or an object within the schema, such as EMPLOYEE, DEPARTMENT, or SNN.
    • Utilized by the DBA and database architects to define the conceptual schema of a database.
    • Integrates all components into a single computer system, including the DBMS software, application programs, user interface processing software, and hardware.

    Answers:

    Write only one concept each.

    1.

    2.

    3.

    4.

    3 Marks

    Learning Outcome(s):

    CLO4: Design a database starting from the conceptual design to the implementation of database schemas.

    Question Three

    A company is building an e-commerce web application that serves thousands of customers simultaneously.

    • Which DBMS client-server architecture would you recommend for the proposed application, and why?
    • Identify the role of each tier using the e-commerce scenario.

    Answers

  • Computer Science Question

    Summary:This assignment accepts group work (no more than 3).Building Lap:

    Steps:

    1. Select and research the virtualization software you will use to build your virtual digital forensics lab. Examples of software you may choose include VirtualBox, VMware, Hyper-V, or other virtualization software.
    2. Install the Software: Install the virtualization software on your computer. Ensure that your computer meets the minimum requirements for the software.
    3. Create a virtual machine within the virtualization software. Ensure that the virtual machine meets the recommended specifications for digital forensics work. You may choose to use a pre-built virtual machine template or create one from scratch.
    4. Install an operating system on the virtual machine. Ensure that the operating system is a version that is commonly used in digital forensics work, such as Windows or Linux.
    5. Install digital forensics tools on the virtual machine. Examples of tools you may choose to install include Autopsy, Forensic Toolkit (FTK), Sleuth Kit, or other tools that are commonly used in digital forensics work.
    6. Configure the virtual network to ensure that the virtual machine can communicate with other devices on the network.
    7. Test the virtual lab to ensure that all components are working correctly. You may choose to test the lab by conducting a basic digital forensics investigation


    Write Paper documentation:

    Note: For each student in a group the minimum word count is 500 words per student. So if you are working with another student your written blog must have a minimum of 1000 words. For three students, 1500 words is the minimum.
    Steps:

    1. Document the steps you took to build your virtual digital forensics lab. This documentation should include:
      1. the purpose of your digital forensics machine
      2. the system requirements to include hardware and software requirement
      3. a list of the digital forensics tools you’ve installed or that are already included within the operating system you selected. Be sure the tools aligns with the purpose of your digital forensics lab
      4. any issues you encountered during the process and how you resolved them,
      5. and the rationale behind your design choices from stat to finish.
      6. screenshots of your process (your own screenshots)
      7. appropriate hyperlinks to resources such official developer page and other resources.

    Submit 2-3 APA format paper with at least 2 peer reviewed resources

  • Computer Science Question

    Summary:Assignment Instructions :

    1. Choose one incident response framework that was discussed (e.g. NIST, SANS, etc).
    2. Research and review the key steps involved in the framework you have chosen.
    3. Develop a personal incident response plan that outlines the steps you would take if you were the victim of a cyber attack or security breach.
    4. Your plan should include the following components:
    a. An overview of your incident response team, including their roles and responsibilities.
    b. A description of the types of incidents that your plan covers, such as malware infections, data breaches, or denial-of-service attacks.
    c. The steps you would take to detect and analyze an incident, including monitoring and logging tools you would use.
    d. The steps you would take to contain and eradicate the incident, such as isolating infected systems, shutting down compromised services, or removing malicious code.
    e. The steps you would take to recover from the incident, such as restoring data from backups or rebuilding systems.
    f. A plan for post-incident review and improvement.
    5. Use clear and concise language to describe each step in your plan, and provide examples and resources where necessary.

    Click here to get a or you can search for online templates

    Submit your incident response plan in a written report format

  • Computer Science Question

    Summary:Assignment Instructions :

    1. Choose one incident response framework that was discussed (e.g. NIST, SANS, etc).
    2. Research and review the key steps involved in the framework you have chosen.
    3. Develop a personal incident response plan that outlines the steps you would take if you were the victim of a cyber attack or security breach.
    4. Your plan should include the following components:
    a. An overview of your incident response team, including their roles and responsibilities.
    b. A description of the types of incidents that your plan covers, such as malware infections, data breaches, or denial-of-service attacks.
    c. The steps you would take to detect and analyze an incident, including monitoring and logging tools you would use.
    d. The steps you would take to contain and eradicate the incident, such as isolating infected systems, shutting down compromised services, or removing malicious code.
    e. The steps you would take to recover from the incident, such as restoring data from backups or rebuilding systems.
    f. A plan for post-incident review and improvement.
    5. Use clear and concise language to describe each step in your plan, and provide examples and resources where necessary.

    Click here to get a or you can search for online templates

    Submit your incident response plan in a written report format

  • IT532 | Computer Forensics |Mid-Term – Mid-Term

    Summary:In this mid-term, we will be applying various techniques and tools to analyze digital data and extract hidden information. You will be using an exif extraction tool to extract metadata from an image, using steganography to hide a message in an image, using Wireshark or tcpdump to analyze network data, and finally performing a forensic analysis using a forensic image or a systems analysis using your own system.

    Exif Data Extraction

    1. Download and install an Exif extraction tool (such as or .

    2. Take any image taken by your phone, then run an Exif extraction tool on it to extract the metadata.

    Think critically about the data that was extracted and write a report. What kind of data has your phone been sharing every time you upload a picture to social media, send a picture through a wireless provider’s network? Who put it there and why? What purpose does it serve? Were you unaware or unconcerned? What implications does this have on privacy and security?


    Steganography

    As steganography is often used to conceal information, learning about it can be valuable for digital forensics professionals who need to detect and extract hidden information from digital media. Using an online tool or software such as and , hide a message within a picture and share it on your site. Create a situation where steganography could be of use and share it on your blog/site. Provide your own personal opinion on the offer of underrated skill.

    Network Analysis

    Download and install or tcpd.

    Use Wireshark or TCPDump to capture network traffic on your computer from your own network.
    Analyze the network traffic and write a brief report on what you were able to learn, including:
    The number and types of packets captured (know the types: TCP, UDP, IP, ICMP, & SNMP!)
    Information on the source and destination of the packets
    The type of network protocol used (Know what protocols are, it’s a crucial component in networking).
    Any relevant information or trends you noticed in the network traffic

    Choice of either A or B

    A: Forensic Analysis

    Obtain a forensic image (such as a .img or .dd file).
    Download and install a forensic analysis tool (such as Autopsy or Sleuth Kit).
    Use the forensic analysis tool to analyze the forensic image and write a brief report 1-page report on what you were able to learn, including:

    1. The file system used on the image
    2. A list of the files and directories on the image
    3. Any deleted files or artifacts you were able to recover
    4. Any other relevant information or trends you noticed during your analysis
    5. The learning process
    6. Insights gained. B: Systems Analysis (Alternative)
    Estimated Length 1+ pages

    Objective: To learn how to use the command line to obtain information about your MacOS/Windows PC system and identify potential areas for optimization.

    Instructions:

    1. Open the Terminal/Command application on your MacOS/Windows PC system.
    • On macOS This can be found in the Utilities folder within the Applications folder.
    • On Windows: This can be done by pressing the Windows key + X and selecting “Command Prompt” or by typing “cmd” in the Start menu search bar and selecting the Command Prompt application.

    2. Run the following command to generate a text file that contains information about your system:
    macOS:

    system_profiler > ~/Desktop/system_report.txt

    Windows PC:

    systeminfo > C:UsersYourUsernameDesktopsystem_report.tx

    3 . This will create a text file on your desktop named “system_report.txt”. Open the file and carefully review its contents to identify any areas where your system might be wasting resources, such as:

    • Large files that you no longer need
    • Unused applications that are taking up space on your hard drive
    • Outdated backups or system files that can be safely deleted

    Use the command line to delete any files or applications that you have identified as waste. For example, to delete a file named “large_file.txt”, you would run the following command:

    macOS
    rm ~/large_file.txt

    WindowsPC

    rm ~/large_file.txt

    5. Repeat this process until you have identified and eliminated all waste on your system.

    6. Write a report that summarizes your findings and the steps you took to optimize your MacOS system. The report should include:

    • A description of the steps you took to generate the system report
    • A summary of the results of your analysis, including the total amount of space saved by deleting waste from -your system
    • how it has impacted your understanding of using the command line

    Note: Before deleting any files or applications, make sure you have a backup of your important data, and only delete files or applications that you are certain you no longer need. This assignment is intended to be completed on a personal MacOS system, not on a system that is used for critical or sensitive purposes.

    7. Submit your report as a blog article by submitting it URL.

    Write 5-6 APA format paper with at least 3 peer reviewed resources for all the parts required above with any additional findings, learnings or screenshots if applicable.

  • Computer Science Question

    Summary:

    Requirements:

    1. Research free, open-source, digital forensics tools. Examples of some of these tools are discussed in this


    2. Create an online article blog that discusses and demonstrates the digital forensics tool. Your blog article should:

    1. Introduce the digital forensic tool;
    2. Provide a step-by-step, “Quick Start Guide” of you [or your team] demonstrating how to use the tool.
    3. In this section of the blog article, be sure to include:
      1. System requirements
      2. Text with hyperlinks to resources such as:
        • the tool’s downloads page
        • resources that you’ve used (similar to how online articles and Wikipedia hyperlink to other resources)
        • downloadable sample files (i.e. you can use Google Drive to link to the image file you used in your demonstration.
      3. Screenshots and images to go along with the step-by-step demonstration.
    4. Conclude the article with an appropriate conclusion.

    3. Present/demonstrate your digital forensic tool to the class at the next class meeting if in person otherwise record and include the video upload (YouTube to the paper submission).

    Examples

    Below are some examples of what I expect assignments to look like:

    1. Examples of solo student work:

    2. Examples of two-student teamwork:


    3. Examples of three-student teamwork:

    Submit the URL to your blog. If working in a team, each person submits the same URL on their own with some description of the work and overall insights about how the work on such a project improved your skills using Digital Forensic Tools