Category: Computer Science

  • BGP Hijacking

    In this project, you will explore network security by simulating the vulnerability of the Border Gateway Protocol (BGP) to cyberattacks. In a Mininet emulation, real-world events are reproduced in code, where a victim Internet provider is induced to route traffic bound for a specified network destination to a malicious entity instead. Through this project, you will also gain experience with router configuration and network configuration.

  • Software Engineering Group Project: “EcoCharge Fleet Dashboa…

    Assignment due Monday, March 30, 2026 by 11:59pm

    Software Engineering Group Project: “EcoCharge Fleet Dashboard

    Course: ICS 432 – Software Engineering Context: Electric Vehicle (EV) Technology & Industry Team Size: 3-4 students

    1. Project Vision & Context

    Your team are software engineers at “EcoCharge Innovations.” Your task is to build a prototype for a web-based dashboard that allows managers to monitor a small fleet of electric vehicles.

    The goal is to demonstrate core functionality and prove the concept, focusing on clean code, collaboration, and ethical foresight, rather than building a fully-featured product.

    1. Simplified Project Scope & Core Features

    Develop a simple web application with the following two core features:

    • Feature A: Static Fleet Overview
      • A single web page that displays a list of 5-10 pre-defined electric vehicles.
      • For each vehicle, display: Vehicle ID, Model, Current Battery Percentage (a static value between 0-100%), and Status (e.g., “Available”, “Charging”, “On Trip).
    • Feature B: Basic Charging Cost Calculator
      • A simple form where a user can select a vehicle and input a “charging duration” in hours.
      • The application calculates and displays the estimated cost using a fixed formula: Cost = (Charging Duration * 7.5 kW * $0.15 per kWh). (Use these fixed values for simplicity).
    1. Learning Objectives & Deliverables

    Deliverable 1: Project Setup & Collaboration

    • Task: Set up a GitLab repository and demonstrate a collaborative workflow.
    • Artifacts to Submit:
    1. URL to your GitLab repository.2. Evidence of Collaboration: Create at least two feature branches (e.g., feature/fleet-overview, feature/cost-calculator) and merge them via Merge Requests.3. Meaningful Commits: Use clear commit messages (e.g., feat: add basic HTML structure for dashboard, fix: correct calculation formula in calculator).

    Deliverable 2: Agile Sprint Execution

    Task: Use a simplified Scrum process to manage your 2-week sprint.”

    Artifacts to Submit:

    1.** A Product Backlog:** A simple list of user stories in a text file or spreadsheet. – Example: “As a manager, I want to see a list of all EVs and their battery levels so I can know which ones are ready to use.”

    1. A Sprint Plan: A list of tasks for the two features, assigned to team members.
    2. **A Sprint Retrospective: **A short document (150 words) submitted at the end. What went well? What would you do differently next time?

    Deliverable 3: Testing & Code Quality

    Task: Write tests for the most critical logic in your application.

    Artifacts to Submit:

    1. Unit Tests: Write tests only for the cost calculation function.
      • Test with positive hours.
      • Test that it fails gracefully with negative hours or non-numeric input.
    2. Code Review: Include a comment in your code (e.g., in ) where you describe one potential bug you identified and prevented through code or testing.

    Deliverable 4: Security Risk Assessment

    Task: Conduct a basic security analysis of your web application.

    Artifacts to Submit:

    1. A Security Memo (200 words): Identify two potential security vulnerabilities relevant to your application. For each, provide:
      • The Vulnerability: Name and briefly describe it (e.g., “Cross-Site Scripting (XSS)” or “Insecure Data Handling”).
      • Potential Impact: What could an attacker do? (e.g., “Steal user session data,” “Deface the website”).
      • Mitigation Strategy: One practical step you would take to fix it (e.g., “Sanitize all user inputs before displaying them,” “Use HTTPS to serve the application).
    • Example Vulnerability: “If we connected a real database, storing passwords in plaintext would be a vulnerability. An attacker could steal them. We would mitigate this by always hashing passwords using a strong algorithm like bcrypt.

    Deliverable 5: Ethical Considerations

    Task: Think proactively about the ethical implications of this technology.

    Artifacts to Submit:

    1. A Short Memo (200 words): Using the ACM Code of Ethics, answer one of the following:
      • Privacy: The final product would use real vehicle location data. What is one key privacy concern, and what is one mitigation you would propose?
      • Bias: If the “Status” of a vehicle was used to determine driver performance bonuses, how could this simple system be unfair?

    **Deliverable 6: **Final Submission & Demo

    Artifacts to Submit:

    1. Source Code in your GitLab main branch.
    2. A file with instructions on how to run your application.
    3. A 5-minute screen recording demonstrating the two working features and a brief walkthrough of your GitLab repository showing your merge requests.

    Technical Stack Suggestions

    -** Frontend** (Recommended): Use simple HTML, CSS, and JavaScript. No complex frameworks are required. This keeps the focus on logic and collaboration, not on learning a new framework.

    • Alternative (If confident): A very basic Python Flask or Node.js/Express app to serve the HTML and handle the calculation logic.
    • Data: Use a hardcoded JavaScript array or a simple JSON file to store the static fleet data.

    Grading Rubric (Summary)

    Category | Weight | Simplified Criteria

    Collaborative Workflow | 20% | Functional GitLab repo with feature branches and merge requests. Clear commit history.

    Agile Process | 15% | Evidence of planning (backlog, task assignments) and reflection (retrospective).

    Functionality & Testing | 25% | Both features work correctly. Basic unit tests for the calculator exist and pass.

    Security Assessment | 15% | Memo identifies two relevant security risks with clear impacts and plausible mitigations.

    Ethical Analysis | 10% | Memo identifies a relevant ethical concern and proposes a plausible mitigation.

    Final Demo & Docs 15% | Application runs, demo video is clear, and README provides setup instructions.

  • Computer Science Question

    follow the instructions below

  • Computer Science Question

    please follow the instructions below

  • Operating System Environments

    As the field of computing has evolved, various types of computing solutions have emerged. Each computing environment is defined by the way its computer systems interface with other systems and the services that its operating systems provide to its users and programs.

    To complete this assignment, compare the operating system requirements for different computing environments. Choose three of the following computing environments to describe:

    • Traditional computing
    • Mobile computing
    • Distributed systems
    • Client-server computing
    • Peer-to-peer computing
    • Virtualization
    • Cloud computing
    • Real-time embedded systems

    In a written paper, address the following operating system requirements for each chosen computing environment:

    • Describe the unique resource allocation needs of each environment.
    • Describe the challenges of designing for each environment.
    • Give examples of usage scenarios where each environment would be most advantageous.

    You will need to reference your textbook and research a minimum of three additional credible resources to support your statements.

    The Operating Systems Environment paper

    • Must be a minimum of 600 words in length (not including title page, references page, or tables/diagrams) and formatted according to APA style as outlined in the .
    • Must include a separate title page with the following:
      • Title of paper
      • Students name
      • Course name and number
      • Instructors name
      • Date submitted
    • Must use at least three additional credible sources in addition to the course text.
    • Must document all sources in APA style as outlined in the .
    • Must include a separate references page that is formatted according to APA style as outlined in the .

    Carefully review the grading rubric below and follow the .

    Rubric

    CPT304 W1A1 01.26

    CPT304 W1A1 01.26

    Criteria Ratings Pts

    This criterion is linked to a Learning OutcomeDescribes the Unique Resource Allocation Needs of Each Environment, Including a Plan to Solve a Problem, the Consequences of the Solution, and Rationale for Choosing the Solution

    3 ptsDistinguishedThoroughly describes the unique resource allocation needs of each environment including a logical, consistent plan to solve a problem, the consequences of the solution, and comprehensive rationale for choosing the solution.2.64 ptsProficientDescribes the unique resource allocation needs of each environment including a mostly logical, consistent plan to solve a problem, the consequences of the solution, and rationale for choosing the solution. Minor details are missing.

    2.28 ptsBasicPartially describes the unique resource allocation needs of each environment including a somewhat logical, consistent plan to solve a problem, the consequences of the solution, and limited rationale for choosing the solution. Relevant details are missing.1.92 ptsBelow ExpectationsAttempts to describe the unique resource allocation needs of each environment; however, does not include a logical, consistent plan to solve a problem, the consequences of the solution, and/or rationale for choosing the solution, and significant details are missing.0 ptsNon-PerformanceThe description of the unique resource allocation needs of each environment, including a plan to solve a problem, the consequences of the solution, and rationale for choosing the solution is either nonexistent or lacks the components described in the assignment instructions

    3 pts

    This criterion is linked to a Learning OutcomeDescribes the Challenges of Designing for Each Environment

    2 ptsDistinguishedComprehensively describes the challenges of designing for each environment.1.76 ptsProficientDescribes the challenges of designing for each environment. Minor details are missing.

    1.52 ptsBasicPartially describes the challenges of designing for each environment. Relevant details are missing.1.28 ptsBelow ExpectationsAttempts to describe the challenges of designing for each environment; however, significant details are missing.0 ptsNon-PerformanceThe description of the challenges of designing for each environment is either nonexistent or lacks the components described in the assignment instructions.

    2 pts

    This criterion is linked to a Learning OutcomeProvides Examples of Usage Scenarios Where Each Environment Would be Most Advantageous

    2 ptsDistinguishedProvides clear, comprehensive examples of usage scenarios where each environment would be most advantageous.1.76 ptsProficientProvides examples of usage scenarios where each environment would be most advantageous. Minor details are missing or slightly unclear.

    1.52 ptsBasicProvides limited examples of usage scenarios where each environment would be most advantageous. Relevant details are missing and/or unclear.1.28 ptsBelow ExpectationsAttempts to provide examples of usage scenarios where each environment would be most advantageous; however, significant details are missing and unclear.0 ptsNon-PerformanceThe examples of usage scenarios where each environment would be most advantageous are either nonexistent or lack the components described in the assignment instructions.

    2 pts

    This criterion is linked to a Learning OutcomeWritten Communication: Control of Syntax and Mechanics

    0.75 ptsDistinguishedDisplays meticulous comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains no errors and is very easy to understand.0.66 ptsProficientDisplays comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains only a few minor errors and is mostly easy to understand.

    0.57 ptsBasicDisplays basic comprehension of syntax and mechanics, such as spelling and grammar. Written work contains a few errors which may slightly distract the reader.0.48 ptsBelow ExpectationsFails to display basic comprehension of syntax or mechanics, such as spelling and grammar. Written work contains major errors which distract the reader.0 ptsNon-PerformanceThe assignment is either nonexistent or lacks the components described in the instructions.

    0.75 pts

    This criterion is linked to a Learning OutcomeWritten Communication: Page Requirement

    0.75 ptsDistinguishedThe length of the paper is equivalent to the required number of correctly formatted pages.0.66 ptsProficientThe length of the paper is nearly equivalent to the required number of correctly formatted pages.

    0.57 ptsBasicThe length of the paper is equivalent to at least three quarters of the required number of correctly formatted pages.0.48 ptsBelow ExpectationsThe length of the paper is equivalent to at least one half of the required number of correctly formatted pages.0 ptsNon-PerformanceThe assignment is either nonexistent or lacks the components described in the instructions.

    0.75 pts

    This criterion is linked to a Learning OutcomeWritten Communication: Resource Requirement

    0.75 ptsDistinguishedUses more than the required number of scholarly sources, providing compelling evidence to support ideas. All sources on the reference page are used and cited correctly within the body of the assignment.0.66 ptsProficientUses the required number of scholarly sources to support ideas. All sources on the reference page are used and cited correctly within the body of the assignment.

    0.57 ptsBasicUses less than the required number of sources to support ideas. Some sources may not be scholarly. Most sources on the reference page are used within the body of the assignment. Citations may not be formatted correctly.0.48 ptsBelow ExpectationsUses an inadequate number of sources that provide little or no support for ideas. Sources used may not be scholarly. Most sources on the reference page are not used within the body of the assignment. Citations are not formatted correctly.0 ptsNon-PerformanceThe assignment is either nonexistent or lacks the components described in the instructions.

    0.75 pts

    This criterion is linked to a Learning OutcomeWritten Communication: APA Formatting

    0.75 ptsDistinguishedAccurately uses APA formatting consistently throughout the paper, title page, and reference page.0.5625 ptsProficientExhibits APA formatting throughout the paper. However, layout contains a few minor errors.

    0.375 ptsBasicExhibits limited knowledge of APA formatting throughout the paper. However, layout does not meet all APA requirements.0.1875 ptsBelow ExepctationsFails to exhibit basic knowledge of APA formatting. There are frequent errors, making the layout difficult to distinguish as APA.0 ptsNon-PerformanceThe assignment is either nonexistent or lacks the components described in the instructions.

    0.75 pts

  • Computer Science Question

    Hello, This research paper is on cloud gaming. I have attached a brief intro as well as an outline for the research paper. My specific topic within this cloud gaming topic is how the major three gaming cloud systems (Xbox Cloud, PlayStation Plus, and NVIDIA GeForce Now) protect their data. This research will compare the security protections used by the three major cloud gaming platforms: NVIDIA GeForce Now, Xbox Cloud Gaming, and PlayStation Plus. The study will analyze how each service secures user authentication, encrypts data, protects servers, and prevents unauthorized access.

    Research Paper: Cloud Gaming -> Accepted Topic.

    Paper Requirements: APA format, 5-7 pages, Min: 5 peer -reviewed sources within the past 3 years (this is a Cloud based subject, time is critical)

    There may be more sources utilized that may be older (e.g. definitions, background, etc); however, at least 5 of the sources for the discussion (body) of the research paper must be no older than 2021.

    Double-spaced

    Research Proposal has good info!

  • Computer Science Question

    For this assignment you will write an R program to complete the tasks given below. You will hand in two files for this assignment.

    • A File with your R program. This file should contain only the code (no output) and must have the typical r extension. No other file extensions will be accepted. The reason is that the assignment be graded based on your R code and not the output file. The output file will be used to verify the code commands. Also, please make sure that all comments, discussion, and conclusions regarding results are also annotated as part of your code.
    • A PDF/DOC file with your output code. We are giving you more flexibility regarding how you want to present your output (tables, plots, etc.). You can either use RMD files that combine code, narrative txt, and plots or you can use word document with copy and paste from the R platform you are using. However, please remember that all output (tables, plots, comments, conclusions, etc.) shown in this file has to be generated by the same R code that you submit. This is important! Output shown that is generated using a separate code or output shown that is not supported by the submitted code will not be graded. Screenshots will not be accepted.

    Use the following file

  • R Data Set: HMEQ_Loss.csv (in the zip file attached).
  • The Data Dictionary in the zip file.
  • Grouping Variable: TARGET_BAD_FLAG
  • Step 1: Read in the Data

    • Read the data into R
    • List the structure of the data (str)
    • Execute a summary of the data
    • Print the first six records

    Step 2: Box-Whisker Plots

    Plot a box plot of all the numeric variables split by the grouping variable. The plot needs the following:

    • The MAIN TITLE of the box plot should be set to your name
    • Add color to the boxes
    • Comment on whether or not there are any observable differences in the box plots between the two groups.

    Step 3: Histograms

    Plot a histogram of at least one of the numeric variables

    • Manually set the number of breaks to a value that makes sense
    • Superimpose a density line to the graph

    Step 4: Impute “Fix” all the numeric variables that have missing values

    • For the missing Target variables, simply set the missing values to zero
    • For the remaining numeric variables with missing values, create two new variables. One variable will have a name beginning with IMP_ and it will contained the imputed value. The second value will have a name beginning with M_ and it will contain a 1 if the record was imputed and a zero if it was not.
    • You may impute with any method that makes sense. The median or mean value will be useful in most cases.
    • Push yourself! Try one complex imputation like the one described in the lectures.
    • Delete the original variable after it has been imputed.
    • Run a summary to prove that all the variables have been imputed
    • Compute a sum for all the M_ variables to prove that the number of flags is equal to the number of missing values.

    Step 5: One Hot Encoding

  • For the character / category variables, perform one hot encoding. For this create a Flag for each categories.
  • Delete the original class variable
  • Run a summary to show that the category variables have been replaced by Flag variables.
  • Essential Activities:

    1. Watch all the training videos
    2. Execute the example code while watching the training videos.

    Notes:

    1. This assignment is due Sunday at 11:59 PM EST

  • Business Intelligence for Information Technology

    A. (50 mins)

    Explore how to import, transform, and append data from different sources using Power BI Desktop, and prepare it for reporting.

    B. (1hr 32 mins)

    In this module, you build a Power BI data model for the first time, and then use your first data model to explore data, create relationships, add data visualizations, group and bin data, and create a date table.

    Once complete:

    • Be sure you are logged in using your university credentials, click your initials and take a screenshot of the popup box.
    • Expand the overview, take a screenshot of the list showing all green checks capturing your initials in the right corner and accumulated points with each screenshot.
  • Understanding Computer Science Concepts, Programming, Algori…

    Understanding Computer Science Concepts, Programming, Algorithms, Artificial Intelligence, Cybersecurity, Networking, and Modern Technology Applications Today

    What is Computer Science?

    Computer Science is the study of computers and computational systems. It involves understanding how computers work, how software is developed, and how data is processed and stored. It is a broad field that combines theory, engineering, and practical applications.

    History of Computer Science

    Computer Science began with early mechanical calculating machines and evolved through the development of electronic computers in the 20th century. Key milestones include the invention of the first programmable computers, the development of programming languages, and the rise of the internet.

    Main Areas of Computer Science

    1. Programming

    Programming is the process of writing instructions that a computer can execute. Popular programming languages include Python, Java, C++, and JavaScript.

    2. Algorithms and Data Structures

    Algorithms are step-by-step procedures for solving problems, while data structures organize and store data efficiently.

    3. Software Engineering

    Software engineering focuses on designing, developing, testing, and maintaining software systems.

    4. Artificial Intelligence (AI)

    AI involves creating systems that can perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making.

    5. Cybersecurity

    Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.

    6. Networking

    Networking deals with connecting computers and devices so they can communicate with each other, including the internet.

    Importance of Computer Science

    Computer Science plays a vital role in modern society. It powers industries such as healthcare, education, business, and entertainment. It also enables innovations like smartphones, social media, and cloud computing.

    Careers in Computer Science

    There are many career opportunities in this field, including:

    Software Developer

    Web Developer

    Data Scientist

    Network Engineer

    Cybersecurity Analyst

    Conclusion

    Computer Science is an essential field that continues to grow and evolve. It impacts nearly every aspect of our daily lives and offers many opportunities for innovation and career growth.

  • Computer application

    Would you like to provide the full details now, or shall we break down the information you need?