Category: Computer science

  • Title: Project 1 – Java Code Deliverables

    Deliverables:
    You should submit 3 Java files containing the Java code (.java).
    ***The files should be zipped in a file named exactly as specified Project1_Student1FirstNameStudent1LastName_… Student5FirstNameStudent5LastName. Example: Assignment_HanaaAljehani_SuhaBashekh_YasmeenAhmed_ReemOrfali_FadiaAlghamdi.
    Suggestions:
    Read AND fully understand this document BEFORE starting the program!
    Next, design your data structure and make your algorithm
    Once the solution is 100% clear to you, then begin making your code.
    Hope this helps.

  • “Cloud Computing Project Plan for XYZ Company: Leveraging the Benefits of IaaS, PaaS, and SaaS Models”

    Over the next 10 weeks you will use what you learn throughout the course to write a project plan for your company.
    The assignment is broken into two parts. The first part is your midterm and is due week 5 by Sunday midnight. The second portion of the paper is due week 10 by Sunday midnight and is considered your final exam.
    Paper requirements
    You paper must be written in APA format. This is not a question and answer assignment. You must write this as a formal report as if you are turning it into a company.
    You are NOT required to write an abstract
    You must include a title page and reference page which do NOT count towards the final page count
    You must cite at least 10 sources
    You cannot use Wikipedia, techopedia, or any other site that can be edited by the general public
    Acceptable sources
    Your textbook
    Any academic journal or peer reviewed paper
    Any commercial or government site (AWS, Google, Microsoft, Verizon, etc.)
    The minimum page count for the midterm is 5 pages. Remember, this does not include the title page or reference page.
    The minimum page count for the final is an additional 5 pages. The total document should be at least 10 pages.
    Part 1 (Midterm)
    Total points possible = 20
    Your paper should have the following information:
    Title Page (1 point possible)
    Company Information (4 points possible)
    The name of the company (can be real of made up). The company should remain the same for part 1 and 2.
    The size of the company
    A brief description of the work the company does
    The current network architecture and location(s) of the company
    Business Driver (3 points possible)
    Why are you proposing the business adopt cloud computing?
    What deployment model are you proposing and why? (IaaS, PaaS, SaaS, etc.). Note – you can have multiple models based on your business type.
    What is the main benefit of this business model?
    Provider, Capacity, and Cost (11 points possible)
    What cloud provider do you propose using (example: AWS, Google, Microsoft Azure, etc.)
    Identify why you selected this company.
    What is the estimated size and resource requirements needed?
    Identify how you determined this.
    What is the cost?
    Break down the costs (i.e. software, resources, accounts, etc.)
    Will the cloud be public, private, community, or hybrid?
    Describe what this means and why you selected this model.
    What is the future state of the IT infrastructure?
    Do you plan on growing the business?
    Will you need more space? Why?
    Reference page (1 point possible)
    Note as described plagiarism should be zero
    Apa format

  • Solving Project Euler Problems Using Python Problem 1: Multiples of 3 and 5 Find the sum of all the multiples of 3 or 5 below 1000. # Solution sum = 0 for i

    Choose 4 problems from the first 10 problems (numbers 1 to 10) and solve the problems. Use Python and write down a code for these 4 problems.   Choose a submission type
    Go to the following link
    https://projecteuler.net/archivesLinks to an external site.

  • Network Management Project Report and Presentation “Exploring Network Management and Security with Wireshark and Promiscuous Mode”

    You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
    It is your responsibility to check and make sure that you have uploaded both the correct files.
    Zero mark will be given if you try to bypass the SafeAssign (e.g., misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
    Email submission will not be accepted.
    You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
    You must use this template, failing which will result in zero mark.
    You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
    Late submission will result in ZERO mark.
    The work should be your own, copying from students or other resources will result in ZERO mark.
    Use Times New Roman font for all your answers.
    Name:
    Name:
    Name:
    ID:
    ID:
    ID:
    Project Instruction
    Project Objective:
    This activity is an opportunity for you to practice your knowledge, enhance your skills, and learn from experience to work on network management in terms of network tools, configurations, protocols, and troubleshooting.
    Total Marks = 14
    Project report
    Presentation
    11 marks
    3 marks
    Group Size = 2-3 Members.
    One group member (group leader/coordinator) must submit all files (project report and presentation slides) on blackboard. Marks will be given based on your submission and quality of the contents.
    Project Report
    Each Report will be evaluated according to the marking criteria mentioned in each question section.
    Presentation
    Students (group) need to present their project (either F2F or Virtual). You should have PowerPoint slides, ranging from 10 to 15.
    The presentation schedule with date and allocated time will be shared with you on Blackboard.
    2 Marks
    Learning Outcome(s):
    CLO3
    Evaluate different SNMP tools, network statistics tools, and protocol analyzer for network management.
    Question One
    SNMP (Simple Network Management Protocol) serves as a network management tool to manage and control various network components such as switches, routers, and firewalls. SNMP implementers often encounter issues and difficulties when solving problems related to SNMP network monitoring. Below are some issues SNMP implementers might face; therefore, you are asked to discus in detail how you will troubleshoot them:
    I.Error message: “SNMP Is Not Enabled”. [0.5 marks]
    II.A delay in responses to SNMP queries. Such that, a switch in the NMS does not respond to GetNext requests and generates a RESPONSE_DELAYED error message. [0.75 marks]
    III.If the response for an SNMP has a noSuchName or noSuchObject error. [0.75 marks]
    3 Marks
    Learning Outcome(s):
    CLO5
    Demonstrate broadband networking services and technologies.
    Question Two
    Build a network topology as given below using the Packet Tracer. Use the information given in the table below to configure the router and PCs. You must also do the following:
    I.Write the commands used to configure the router. [1.5 marks]
    II.Support your results with screenshots which show the connectivity between hosts from different networks. [1.5 marks]
    Machine
    Interface
    IP address
    Subnet Mask
    Gateway
    Server1
    Fast Ethernet
    172.16.2.15
    255.255.255.0
    172.16.2.1
    PC1
    Fast Ethernet
    172.16.2.30
    255.255.255.0
    172.16.2.1
    Server2
    Fast Ethernet
    172.16.3.200
    255.255.255.0
    172.16.3.1
    PC2
    Fast Ethernet
    172.16.3.50
    255.255.255.0
    172.16.3.1
    Router0
    Fa0/0
    172.16.2.1
    255.255.255.0
    Fa0/1
    172.16.3.1
    255.255.255.0
    2 Marks
    Learning Outcome(s)
    CLO 2
    Analyze security threats, vulnerabilities, and risks.
    Question Three
    Suppose you are given a task to monitor and track of network status, including routers, switches, and desktops.
    1.Discuss which tools/protocols/commands you would use. [0.5 marks]
    2.Execute the commands on any network that you can have (e.g., your home router, google servers). Support your work with screenshots, explaining the information shown in each screenshot. Note, the commands would differ based on used operating systems, routers, etc. [1.5 marks]
    3 Marks
    Learning Outcome(s):
    CLO5
    Demonstrate broadband networking services and technologies.
    Question Four
    Part of a network management involves analyzing incoming and outgoing network traffic to identify any potential security threats and performance issues. Therefore, you are requested to download the Wireshark tool on your PC and complete the following tasks:
    1.Capture your PC’s network packets. [0.75 marks]
    2.Use Wireshark’s filtering to inspect the packets. [0.75 marks]
    3.Discuss the benefits of using these tasks. You can also choose to do additional tasks if you wish! Support your work with screenshots, explaining the information shown in each screenshot. [1.5 marks]
    1 Marks
    Learning Outcome(s):
    CLO5
    Demonstrate broadband networking services and technologies.
    Question Five
    Explain why you would use a promiscuous mode in any network.
    Requirements: Question

  • “Exploring the Strengths and Weaknesses of an Opinion-Based Article: A Review of [Article Title]”

    Assignment 1-
    Assignment
    Article Review
    Size
    2 – 3 pages
    Formatting
    In accordance with the Publication Manual of the American Psychological Association, Seventh Edition (2020)
    Mandatory Components
    · Your Name
    · Title of Article
    · Author’s Name
    · URL to the location of the article
    · Summary of the Author’s Position
    · Article’s Strengths (how well does the author support his/her position)
    · Article’s Weaknesses (what is missing? How could the author have better supported his/her position? (statistics, external references, academic research, etc.)
    · What is YOUR opinion of the author’s position?
    o Why?
    · What do YOU suggest the author could’ve/should’ve done to strengthen his/her position, or more importantly, convinced YOU to agree with the stated position?
    Suggested Topics
    Relevant to our course learning objectives/subject
    Opinion based article
    Article recommends a vendor, methodology, etc. over competitors.

  • Title: The Advancement and Implementation of AI Technologies through Contemporary AI Programming Languages

    Write a 5-page report on any contemporary AI technology that utilizes any prevailing programming language and how it contributes to advancing and implementing AI technologies.
    Requirements:
    Minimum 3 research articles published after 2017.
    You can use the library database to find the article. Here is the link: https://library.na.edu/
    Reference and In-text citations should be in APA format.
    Your report needs to have the following topics: You can add additional topics too.
    Introduction
    Background
    Findings
    Limitations or Weakness
    Conclusion
    Reference
    Deadline May 5, 11:30 PM.
    Points to Note:
    If found use of chatgpt or any other AI resources, you will get 0.
    If you are getting information from the research paper, properly cite them.
    Your work will undergo a plagiarism check

  • Title: Understanding Network Communication and Protocols

    1. Explain the difference between Router and a Switch. Illustrate with example how a switching table and routing table can be used in network communication. (30 points)
    Hint: Refer Chapter 2 for Switches and Routers. Chapter 2 also has examples for routing tables (pg.90 and switching tables pg.66,67)
    2. Explain the difference between Ipv4 addressing and Ipv6 addressing. Illustrate using examples the structure of a Ipv4 address and Ipv6 address (20 points)
    Hint: Refer Chapter 6 for Ipv4 and Ipv6 addressing 
    3. Explain the TCP/IP protocol and the layered architecture of the TCP/IP protocol (20 points)
    Hint: Refer to Chapter 5 for TCP/IP protocol
    4. Explain the layers of OSI model involved when you transfer a file from a computer on one network to a computer on different network. Explain the function of each of the layers in OSI model as part of the file transmission activity. (30 points)
    Hint: Refer Chapter 7 for OSI models

  • Title: The Importance of ERP Integration for Effective Communication and Collaboration within an Organization

    I hope you can access this link for the material the assignment says is needed. If you can’t, please let me know so I can give you login info to see if that helps
    THIS ASSIGNMENT IS ONLY 2-3 PARAGRAPHS
    LINK FOR READING MATERIAL https://mbsdirect.vitalsource.com/reader/books/9781119702917/epubcfi/6/16[%3Bvnd.vst.idref%3DAc03]!/4/2/16[c03-sec-0027]/18[c03-sec-0029]/6[c03-fig-0013]/2%4051:6
    In the resources of this module, you read about the implementation of ERP systems and how that implementation enabled different departments of the organization to share data to interact more effectively with each other. For this discussion, you are going to explore the benefits of an ERP from a different perspective. You will consider how systems functioned prior to the implementation of an ERP and the issues that arose from the lack of integration.
    In your initial post, address the following:
    How were enterprise functional areas integrated before ERPs?
    What were some of the issues that arose from the lack of integration?
    Did the sales department talk to the marketing department?
    Did marketing talk to manufacturing?
    What is the impact of each department having its own system and database?