Category: Computer science

  • “Analyzing Business Models and Competitive Strategies of a Publicly Traded Corporation: A Case Study of [Company Name]”

    This
    week, you are exploring business models and competitive strategies as a prelude
    to studying the role and functioning of IT. Choose a publicly traded, for-profit
    business, with at least 500 employees that you know reasonably well or
    one where you can obtain reasonably detailed information. Choose in such a way
    that you will be able answer the questions posed below very effectively.  

  • “Designing a Secure Network Infrastructure for J&L Coffee” Milestones: Milestone 1: Network Documentation 1. Create a network diagram using Visio or a similar program to document the current network at J&L Coffee. This

    Purpose: To
    give you experience designing a secure network infrastructure. 
    Directions: You have been selected as
    a consultant to design a secure network for J&L Coffee. To complete this
    project, read the scenario below and submit the required milestones when they
    are due. You may use any resources, including books, the Internet, and other
    appropriate sources to complete this project. Remember to cite your sources.
    The project is complete when you have submitted all 4 milestones.
    Please note that this scenario
    is based on a fictitious company, and any similarity to a real company or real
    people, present or past, is coincidental and unintentional.
    Scenario: See the J&L Coffee Case
    Study in the course project folder. The written description of the case is also
    attached to the assignments in the class. Please refer to it for details on the
    case.
    The
    requirement:
    Your job as a consultant is to
    document the existing network, identify current vulnerabilities, and propose a
    redesign that addresses the vulnerabilities and provides for security best
    practices to minimize future problems. Your deliverables are listed below.  
    **Please submit final diagram in Visio format (.vsdx)**

  • Title: Building a Data Enterprise and Implementing Multifactor Authentication for a Fictional Company

    Part 1
    Watch this video:
    Your post must be at least 200 words. Please include: For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
    You have a data enterprise that contains structured and unstructured data
    As the CDO, you built your company’s first data warehouse or a data lake
    How will your data enterprise support the business?
    List the projects that you chose to undertake
    Prioritize them
    Write a short bullet describing why this project is on your list
    Part 2
    Respond to the following scenario. Include justification as to why you selected the response you did. Then, name 4 different MFA products that can be used with the cloud. Write a brief summary of each.
    Paulo has configured multifactor authentication on his AWS account using a virtual MFA application on his phone. When he signs into his account on a computer in his school’s computer lab, he is prompted to enter his password, and then he’s asked for a code from his phone’s app. Which category of MFA does the code represent?
    Something you are
    Something you know
    Something you have
    Something you do
    Note:- APA format with 700 to 800 words.
    Plegarism and AI should be zero
    And i want two seprate files with refrences

  • Title: “Information Systems in Business: A Comparative Analysis of Two NYSE Companies”

    In this course, you learned about the importance of information systems in business operations. To apply what you have learned in the course, each student will select two NYSE publicly traded, competing companies to research each company’s usage of information systems. 
    Research and discuss each company’s history of existence, the information systems utilized by each company, and the advantages and disadvantages of employing information systems to manage people, organizations, and technology. Also, include a comparison of the information system types in the analysis and the business purpose(s) of the system. This written research paper should be a minimum of 1,000 words in length and include responses to address the associated questions.
    What is the corporation’s history of existence and what products and/or services does the company offer?
    What types of information systems does each company employ? Examples could include management information systems, HR systems, transaction processing systems, etc.
    Are there similarities in the business information systems employed by the companies being analyzed?
    How can information systems be used for companies to establish a competitive advantage?
    How does the company use information systems to manage data collection and manipulate data?

  • Title: “Bridging the Gap: A Data-Driven Analysis of Skills Needs in the UK and Recommendations for the IBM Skills Build Program”

    UK Government Data Skills Survey of 2022
    Some links to help you get started:
    https://www.ibm.com/uk-en
    https://skillsbuild.org/about
    https://digital-skills-jobs.europa.eu/en/inspiration/resources/ibm-skillsbuild-empowering-digital-skills-all
    IBM Skills Build overview:
    https://bit.ly/PathWaytoLearning
    UK Government Data Skills Survey (2022):
    https://explore-education-statistics.service.gov.uk/find-statistics/employer-skills-survey/2022
    Further research (as required) is to be carried out by the student.
    4. Analyze the data contained in the UK Government Skills Employment Survey of 2022.
    Select a dataset that will support your analysis, cleanse the data as required.
    5. Analyze the skills needs currently addressed by the IBM Skills Build program.
    Prepare a quality dataset that will support your analysis, by using the sources given.
    6. Import the data into a data analytics platform of your choice. It is recommended to use SAS Enterprise Miner, which was introduced as part of the university short course.
    7. Transform the raw data by carrying out your own analysis using the software tools and produce compelling, meaningful, and relevant visualizations. Discuss your analysis in the report.
    The analysis must include (but not limited to):
    – An as-is breakdown of skills supported by the IBM Skills Build program
    – A to-be recommendation of skills content for IBM Skills Build, to support today’s skills shortfalls
    – A sector-wise analysis
    8. Frame the data set based on the requirement, apply linear regression model and interpret the results using the features of the software tool, to predict the trend of future increased skills needs. Discuss your findings in report.
    The analysis must include (but not limited to):
    – Projected skills shortfalls
    – Sector-wise analysis
    PLEASE USE SAS MINER ENTERPRISE in the latest version of the window
    Take a screen shot of each step
    show a proof
    analyse
    and send all the excel sheet + CSV + CODES

  • “Training a Dynamic Graph Neural Network for Predicting Social Events from Social Media Trends”

    Purpose: The purpose of the work is to train a Dynamic Graph Neural Network machine learning model that, utilizing sequential representations of the social network in the form of graphs from information extracted from social media (Social Media: i.e. X), in order to be able to distinguish the model when a Social Media trend leads to a social event, such as a march, a protest, a mass aggressive behavior. Obviously, for this to be possible, the model will be fed with the information about which successive social graph representations actually led to some event and which ones did not. So the result will be that by giving the model time-sequenced social graph representations concerning a specific trend in social media, it will be able to recognize the possibility of leading to a social event such as a march in the streets. Finally, from one successive representation to the next, in addition to the links between the nodes that will change, the information for each node can be updated in the form of node embeddings and information such as the location of the user-node and possibly also the possible movement (traffic) around its location. Note 1: I’ve personally progressed quite a bit with the work in question, I’ve formed the workflow, found some involved datasets, and written the body of both the code and the model. I have formed the procedure for the preprocessing of the data, however the main data, for example from X, I have not yet collected and I have not tested the model. Still, the main trunk is well defined and it is understood that I listen to suggestions that improve the result without, however, being distracted from the work by the dementia of the scriptures, the social network and possibly most of the general philosophy behind Dynamic Graph Neural Networks. Personally, due to extraordinary circumstances in my life, I do not know if I will be able to devote all the required time needed to finish the subject I started, although my interest in it remains unshaken and the primary foundation of the work in question has already been built. I have more material to make available, and you have been clarified to provide additional information, as soon as the right person is found to take over and move forward with this project.

  • Title: “Exploring Virtual Interviews: A Case Study Analysis Using Atlas ti Web Tool”

    There are 6 virtual interviews ready.
    The attached work is 70% complete (1. Introduction,2. Literature Review,3. Research Methodology + the 6 virtual interviews) and I would like to write the last two chapters (4. Results, 5. Discussion) using the Atlas ti web tool mentioned in chapter 3.
    I attach with you the pdf with the instructions from the university as well as the interviews I prepared on which the analysis should be made.
    The work, as you will see, is a case study, mainly with interviews.
    I’m waiting for the teacher to do the final OK so I can move on to chapters 4 and 5, so I may have to make a few more corrections when he responds. The first draft should be ready by 13/7 so that I can see it myself and send it for correction where they will logically reply to me at the end of August.

  • Title: Algorithm Analysis and Design Exercises

    Homework 5
    First, read chapters 4-7 from the Algorithms textbook, then complete the
    following exercises:
    1. Exercise 4.1-1
    2. Exercise 4.1-2
    3. Exercise 4.1-4
    4. Exercise 4.2-1

  • Title: Applying Triad Components in Business Scenarios Example 1: Role Differentiation In a business setting, role differentiation refers to the division of tasks and responsibilities among employees based on their skills and expertise. For example, in a marketing

    After reviewing the video for this week’s reading, provide a brief example for each of the three triad components as they relate to business. Engage with others in the discussion regarding their examples and reasoning for business application.

  • “Exploring Virtualization: A Comparison of Hypervisors”

    TMA 02 file contains all the instructions for both tasks
    resources needed:
    – Block 2 Part 6
    these 3 needed for exploring the topic further
    – Hypervisor 1
    – Hypervisor 2
    – Hypervisor 3