Module 5: Assignment Instructions
Download the Word document under Module 5 Dropbox. Answer all questions and complete all tasks in the Word document and follow the instructions to submit it by the due date/time.
Assignment Submission Instructions
Save and name your file
Save your assignment in the appropriate file format.
Include your name inside the document.
Name the file: Module#_LastName. For example, Module3_Smith.
How to Submit the File
From the Assessments dropdown menu, choose Dropbox.
Select the dropbox for this module.
Submit your assignment. Double-check your submission to be certain you submitted the correct file.
Category: Computer science
-
Module 5 Assignment Submission – [Your Name]
-
“Building a Simple Shell: Exploring Operating Systems with C/C++”
COSC4302 Operating Systems
Group Project
Due: 10:00am, July 29, 2024 (Monday)
This is a group project. Please check the posted group information and use the BlackBoard
message to contact your group members.
The project must be implemented on Linux platforms using C or C++ language.
Every student in the same group needs to contribute to the project and understand how the
project is designed and implemented.
Project Description:
Textbook: p. 76 -> Lab 2.1. A simple shell… -
“Analyzing a Recent Retail Chain Breach: Causes and Resolution Strategies for Online Fraud Prevention”
IT 659 Online Fraud Guidelines and Rubric
The majority of online fraud occurs through electronic communication. We receive emails daily that identify some type of phishing scheme or web spoofing, which can be deleted with a simple click of the delete button. But what happens when your personal information has been stolen through a third-party vendor’s technical error while you made a purchase from your local retail store, who stores your credit card and personal information within a remote database? The purpose of this assignment is to analyze a recent breach and determine the causes and steps that can be taken to resolve the issue.
Prompt
Research a recent news headline of a retail chain that has been breached recently and analyze the scenario. What caused the issue? What steps can be taken moving forward to resolve the issue? Use research and specific examples to support your resolution recommendations.
Specifically the following critical elements must be addressed:
Analyze a recent news headline of a retail chain that has been breached recently.
Assess the cause of the retail chain breach.
Determine steps that can be taken moving forward to resolve the breach.
What to Submit
Your paper must be submitted as a two- to three-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least two sources cited in APA format.
Online Fraud Rubric
CriteriaExemplary (100%)Proficient (90%)Needs Improvement (70%)Not Evident (0%)Value
Breach AnalysisMeets “Proficient” criteria substantiated with explicit details to describe recent breachAnalyze a recent news headline of a retail chain that has been breached recentlyAnalysis of a recent news headline of a retail chain that has been breached recently is minimalAnalysis of a recent news headline of a retail chain that has been breached recently is not evident30
CauseMeets “Proficient” criteria supported with specific evidence to support the cause of the breachAssess the cause of the retail chain breachAssessment of the cause of the retail chain breach is lacking is detailAssessment of the cause of the retail chain breach is lacking30
ResolutionMeets “Proficient” criteria substantiated with research-based strategies that can be implemented to ensure a successful resolutionDetermine steps that can be taken moving forward to resolve the breachInsufficiently determines steps that can be taken moving forward to resolve the breachDoes not determine steps that can be taken moving forward to resolve the breach30
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, syntax, or organizationSubmission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas10
Total: 100% -
“Transitioning to Scrum-Agile: Lessons Learned from the SNHU Travel Project” Title: Comparing Waterfall and Agile Approaches in Software Development
You work for ChadaTech, a company that specializes in custom software design and development for both domestic and international clients. For many years, the company has been developing its software using a waterfall development model. ChadaTech is considering transitioning all of its development teams to an Agile methodology using the Scrum framework. This move is expected to improve its products and build a more cohesive corporate culture. However, ChadaTech has decided to pilot this process with your team before the entire organization makes the shift.
Your team has been tasked to develop an application for SNHU Travel, a travel agency seeking to use innovative tools to expand its client base. Your team will adopt a Scrum-Agile approach to developing the application. ChadaTech has also asked you to lead a final Sprint Review and Retrospective of the development with your team. This will help your team think through the work that they completed and how the new Scrum-Agile approach has helped in the development process. Finally, you have been asked to present the lessons learned to the broader company to help them decide about shifting all development teams to a Scrum-Agile approach.
Important Note: You will not be working with an actual team for this project. Instead, during each week of the course, you will take on a different role on the team and produce artifacts related to those roles as you progress through the phases of the software development life cycle (SDLC). You will reflect on the work you did throughout the course during your Sprint Review and Retrospective.
Directions
Sprint Review and Retrospective
At the end of a sprint or incremental release, the Scrum Master arranges a Sprint Review and Retrospective. For this deliverable, you will take on the role of the Scrum Master and create a Sprint Review and Retrospective to summarize, analyze, and draw conclusions on the work you completed during the development. In your paper, address each of the following:
Applying Roles: Demonstrate how the various roles on your Scrum-Agile Team specifically contributed to the success of a project. Use specific examples from your experiences.
Completing User Stories: Describe how a Scrum-Agile approach to the software development life cycle (SDLC) helped user stories come to completion. Use specific examples from your experiences.
Handling Interruptions: Describe how a Scrum-Agile approach supported project completion when the project was interrupted and changed direction. Use specific examples from your experiences.
Communication: Demonstrate your ability to communicate effectively with your team by providing samples of your communication. Explain why your examples were effective in their context and how they encouraged collaboration among team members.
Organizational Tools: Evaluate the organizational tools and Scrum-Agile principles that helped your team be successful. Reference the Scrum events in relation to the effectiveness of the tools.
Evaluating Agile Process: Assess the effectiveness of the Scrum-Agile approach for a specific project. Address each of the following:
Describe the pros and cons that the Scrum-Agile approach presented during the SNHU Travel project.
Determine whether or not a Scrum-Agile approach was the best approach for the SNHU Travel development project.
Agile Presentation
Finally, you have been asked to put together a PowerPoint presentation for the leadership at your company. You will start by explaining the key facets of the Scrum-Agile approach. You will also contrast the waterfall and Agile development approaches to help your leadership make an informed decision. You must use properly cited sources to support your points. In your presentation, Address each of the following points:
Explaining Agile Roles: Explain the various roles on a Scrum-Agile Team by identifying each role and describing its importance.
Explaining Agile Phases: Explain how the various phases of the SDLC work in an Agile approach. Identify each phase and describe its importance.
Describing Waterfall Model: Describe how the process would have been different in a waterfall development approach rather than the Agile approach you used. For instance, you might discuss how a particular problem in development would have proceeded differently.
Waterfall or Agile Approach: Explain the factors to consider when choosing a waterfall or Agile approach, using your course experience to back up your explanation.
What to Submit
To complete this project, you must submit the following:
Sprint Review and Retrospective
Your retrospective should be a 3- to 4-page Microsoft Word document with double spacing, 12-point Times New Roman font, and APA formatting. Address all prompts. You are not required to use sources for the retrospective; however, any sources that you do use must be cited according to APA style.
Agile Presentation
Your Agile presentation should be a PowerPoint of at least 5 slides in length, including a references slide. Address all prompts. Support your work with a minimum of four academic or professional sources published within the last five years (peer-reviewed journals, books, technical reports, government publications, expert industry sites, and so on). All sources used should be cited according to APA style. -
The Role of Computer Crimes in the Development of Computer Security and the Protection of Individual Rights to Privacy
PROMPT Finally, in responding to your peers’ posts, discuss an individual’s right to privacy when using an online communication format, such as email. What role might this play in the increased rate of identity theft? In your response, reference relevant, recent news articles.
PEER POST # 1
I remember my first computer crime! I was twelve years old and ran a fork bomb on the Linux server in my schools computer lab. This was back in the good old days, where a little black hat hacking was seen as a prank by a precocious child and not a federal crime as I’m sure it would be today. Actually I helped us out, as its quite obvious that each instance of the bash terminal ought to be running locally and NOT Directly consuming server resources — a sandbox solution was implemented and they made me promise not to do it again. This anecdote actually applies to this question pretty well and I would imagine is quite reminiscent of how most advances in computer security come about. On a larger scale then my chicanery, consider men like my hero, Kevin Mitnick. A world renowned hacker who wrote several entertaining books on the subject of hacking and eluded the FBI for many years with his use of black hat methods. Check out “the Art of invisibility,” not only for entertainment, but for many cool social engineering and telecom hacks you can use to mess with your friends. Applying the castle doctrine to computers is kind of a new thing. Before, it could really be said that such things didn’t apply to the constitution. Our founders had no concept of internet protocols or computers yet. Thanks to this 2018 ruling that can basically be summarized as “yes, the 4th amendment applies to whats on your cell phone.”(LawfareMedia, 2022) PEER POST # 2
In society, rules and order primarily arise as a response to crime, and this is similarly true for the field of information technology, where the development of computer security has been driven by computer crimes. As society embraced emerging telecommunications technologies, the earliest modern hackers emerged, exploiting the system to make unauthorized phone calls, as reported by SC Magazine. In response, companies began to develop methods to safeguard their systems, trade secrets, and business operations. From a broader perspective, it seems that nearly everything is safeguarded by some form of security, whether it’s intellectual property laws or physical locks. Computer crimes have evolved from simple open communications to employing advanced mathematical encryptions, biometrics, and passwords.
The Fourth Amendment, which protects against unreasonable searches and seizures, is applicable to computer crimes in the same manner. Tracing an IP address back to an individual does not conclusively prove that they are guilty of a crime. The responsibility to prove guilt remains with the prosecutor, and without concrete evidence of the crime being committed, merely identifying an IP address is insufficient. -
“Exploring the Perceptions and Effectiveness of ChatGPT for Textbook Recommendations: A Literature Review in the Education Field”
The first chapter, the introduction, is written already. I have also written all that is meant to be there for the second chapter.
I have also shared all the papers that are to be used in this thesis’s literature reviewI don’t think that my literature review section is up to standard as I would want it I would like for it to be modified and to be more in detail and have a better conclusion and intoruciton and overall more depth and correlation to be seen between the papers to demonstrate what my thesis will be adding on.and all of this is meant to be in IEEE reference style please
These are the research questions of the thesis
·
What are the perceptions of
educators, professors, and librarians regarding the use of ChatGPT for textbook
recommendations?
·
What factors influence the
acceptance and utilization of AI-based tools in the selection of educational
materials?
·
How effective is ChatGPT in
analyzing the content of different textbooks for a specific discipline? -
“Recognizing Emotions from Facial Microexpressions: A Comprehensive Study and Implementation”
This is a thesis. Includes research part and code implementation. It is about recognizing emotions from facial microexpressions. Microexpressions are expressions that occur for fractions of a second, they are difficult to observe with the naked eye while it is assumed that they are manifested by everyone the same, regardless of nationality, age and background. For the research part some work has been done which you will find in project_current_work.docx. There, an introduction has been written, some summary presentations of informal papers and a description of some datasets has been written. Useful papers and review_original contain papers related to ME (microexpressions) and various other review papers respectively. However, other papers can be added to the research after searching the internet. The research part aims to explain the psychological phenomenon, to present a related work with a general description and to explain the most state of the art implementations. Then, according to these to propose an implementation that could solve things that have not been solved or contain methods that have not been thoroughly researched. After my own study I concluded that I could develop a method with segmentation of the face, using handcrafted features such as optical flow with a combination of deep learning techniques. I have proceeded to implement code in python, having done a pre-processing (face detection, alignment) and segmentation of the face (according to the AUs you will see in the file). I also own all the datasets. I can share those after we talk. I would like you to help me with the completion and presentation of the research part and finally with the final implementation in code, suggesting me methods and helping with writing it as well as helping to solve technical problems such as not finding Python libraries. I await your reply and hope you can help me
-
“Exploring NAT Protocol Behavior through Wireshark Analysis”
In this lab, we’ll investigate the behavior of the NAT protocol. This lab will be different
from our other Wireshark labs, where we’ve captured a trace file at a single Wireshark
measurement point. Because we’re interested in capturing packets at both the input and
output sides of the NAT device, we’ll need to capture packets at two locations. Also,
because many students don’t have easy access to a NAT device or to two computers on
which to take Wireshark measurements, this isn’t a lab that is easily done “live” by a
student. Therefore in this lab, you will use Wireshark trace files that we’ve captured for
you.
Download the zip file http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the files need for this lab.and extracneed for this lab. -
Title: Understanding Cyber Operations: Processes, Laws, and Issues
Write a report that explains the processes, laws, and issues associated with conducting cyber operations.
Assume the role of an adversary and defender in a cyber operations attack scenario to identify and prevent cyber intrusion activities safely, ethically, and within the scope of applicable laws. -
“Real-Time Parameter Tuning for Optimizing Heterogeneous Computing Systems-on-Chip: A Comprehensive Survey”
Abstract—Heterogeneous computing Systems-on-Chip (SoCs)
have emerged as powerful platforms integrating diverse process-
ing units such as CPUs, GPUs, and FPGAs to enhance com-
putational capabilities and efficiency. However, the complexity
of managing these resources necessitates advanced optimiza-
tion techniques, particularly with runtime parameter adaptation
to handle dynamic workloads and resource availability. This
survey comprehensively reviews the state-of-the-art methods in
optimizing heterogeneous computational resources through real-
time parameter tuning. This survey is structured to cover key
themes including power management, energy efficiency, system-
level optimization, and performance improvement. Each section
discusses various methodologies, highlighting their strengths and
weaknesses. Our critical analysis identifies current gaps in the
literature and suggests potential research directions. We empha-
size the integration of evolutionary algorithms with reinforcement
learning (ERL) as a promising approach to dynamically adapt
system parameters, thereby achieving optimal resource utilization
and performance. Key contributions of this survey include: A
comprehensive review of dynamic power management techniques
and AI-based solutions for heterogeneous SoCs. In-depth analysis
of energy efficiency strategies and their impact on system
performance. Detailed examination of system-level optimization
methods, including collaborative scheduling and edge computing
frameworks. Evaluation of performance improvement techniques
and their implications on computational efficiency. Identification
of open challenges and future research directions in the field of
computational resource optimization. This survey aims to provide
researchers and practitioners with a holistic understanding of
the current landscape and future prospects in optimizing hetero-
geneous computational resources through real-time parameter
tuning.
Index Terms—Heterogeneous Computing, Systems-on-Chips,
Optimization, CPU, GPU, FPGA