Category: Computer science

  • “Big Data Case Study Analysis: Identifying Key Components for Success and Potential Benefits for Similar Organizations”

    Assignment Details:
    Choose a use case from the following two articles:
    Big Data Case Study Collection
    8 Case Studies and Real Work Examples of How Big Data has Helped Keep on Top of Competition
    Complete the following for this assignment:
    Introduce and examine the content of the case study.
    What were the key problems that needed to be resolved?
    Identify key components that led to the company’s success.
    Do you believe that this is a solution that would be beneficial to other similar organizations? Be substantive and clear, and use scholarly examples to reinforce your ideas.
    Please submit your assignment.
    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.
    Individual Project Rubric
    The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. It’s the roadmap that can help you in the development of your IP.
    Expectation Points Possible Points Earned Comments
    Assignment-Specific: Introduces and examines the content of the case study
    30
    Assignment-Specific: Discusses the key problems that needed to be resolved
    30
    Assignment-Specific: Identifies key components that led to the company’s success
    30
    Assignment-Specific: Justifies whether this is a solution that would be beneficial to other similar organizations
    25
    Professional Language: Contains accurate grammar, spelling, and punctuation with few or no errors (APA formatting or the style specified in the assignment is required.)
    10
    Total Points
    125

  • “Copyright Infringement and the Impact of Sharing on Social Media: A Case Study of Peter and LinguaXL Chat Group”

    Background: 
    Peter attends a concert of his favorite musician Mike Rock, who performs the self-composed song
    “Sunshine” on stage. Peter films this performance with his smartphone to have a personal memory of the concert.
    The audio-video file is saved directly to the hard drive of his smartphone.
    Peter is also a member of a chat group on the messenger service LinguaXL. In this chat group, his extended circle
    of friends and acquaintances exchange information about “this and that”. Since several members have
    administration rights and thus the authority to add new friends, the group is constantly growing. Now there are
    already 45 people, not all of whom Peter knows personally, but who have been added to the group as “friends of
    his friends” over the past few months.
    After the concert, Peter is still so enthusiastic about his experience, that he joyfully posts his video of the song
    “Sunshine” to the group chat. By sharing in the group, on the one hand, the file is stored on the hard disks of all
    group members’ end devices; on the other hand, the file is also permanently available in the group chat, so
    members can view and re-download the video again at any time, even if they deleted it from their hard drive. 
    Task: 
    Are there copyright infringements on Peter’s part? Under which conditions is a work protected by copyright
    created by another? Who owns copyright and how does copyright benefit creators, copyrights holder(s),
    consumers, society, economy and culture as a whole?
    Structure:
    − Introduction (case context and explanation) 
    − Main part (presentation, editing and solution of the case)
    − Conclusion (discussion and further transfers)
    Components of the Case Study:
    − Title page 
    − Table of contents 
    − List of figures and/or tables (if necessary) 
    − List of abbreviations (if necessary) 
    − Text part with introduction, main part, conclusion 
    − Bibliography
    − List of appendices (if necessary) 
    − Appendices and materials (if necessary)
    Important: 
    -In-Text Citations !!!
    -Critically discussing and analyzing the issues(This involves evaluating different viewpoints, examining the implications, and presenting a well-rounded argument. Consider the strengths and weaknesses of various perspectives and provide a nuanced discussion)!!!
    -A maximum of three levels (1. Main heading, 1.1 Section, 1.1.1 Subheading)

  • Title: Exploring the BIOS User Interface and Configuring Basic Settings

    Instructions:
    Turn off your computer. Then turn on your computer, and quickly press a special key (computer manufacturer and model specific) to stop at the BIOS user interface.
    For Windows 10 computers, press the F12 key. For earlier Windows computers it could be the F8 key.
    For Mac computers, press and hold CMD, OPT, “O” and “F” (OF stands for ‘open firmware’). The CMD key has an apple on it and the OPT key is in the same position as the ALT key on a PC keyboard. Enter commands when the prompt “0 >” loads on the screen.
    Many newer machines use the Unified Extensible Firmware Interface (UEFI) which has replaced the BIOS interface. It still performs essentially the same functions.
    Exercises:
    Submit your responses to Q2 through Q5 as an MS Word document or as a PDF file. The photos taken for Q1 can be embedded in that document, or they can be submitted as individual files.
    Q1: Use your phone to take several photos of the various screens. You should include all visible menu options. The purpose is to help you understand what you can do using the BIOS user interface.
    Q2: If you want to boot from a CD instead of a hard disk or an SSD, how would you change your BIOS configuration?
    Q3: If you want to disable the CD and the USB drives, how would you change your BIOS configuration?
    Q4: If you want to prevent anyone from changing your BIOS settings and setting a password, what BIOS configuration would you change?
    Q5: How would you boot into Safe Mode? If your system does not allow this, what would be the reason?

  • Technical Brief: Proactive Adversarial Detection Plan for Healthcare Firm Introduction As a security analyst in a healthcare firm, it is crucial to ensure that the system is fully patched and up to date to prevent any potential vulnerabilities. In order to remed Title: Cybersecurity Threats and Countermeasures for Small Businesses

    The project milestone is attached below as well as the original scenario utilized. This should help complete this assignment.
    Scenario One
    As a new security analyst in a healthcare firm, you have been tasked
    with getting the system fully patched and up to date. To remediate a
    vulnerability with third-party software, the vendor requires a clone of
    the system (a complete copy of the application, including all its data)
    be sent to their facilities so they can do their own testing on it.
    Overview
    One of the three focus projects for this course is creating a technical brief
    based on the research you’ve conducted. The audience for this brief is
    the security or IT director for the fictional organization for which you
    work. This technical brief will serve as the basis for a proactive
    adversarial detection plan that your director will be creating. The
    final product represents an authentic demonstration of competency
    because, as a security analyst, you must develop skills that use a
    variety of methods and tools to detect, characterize, and counter cyber
    threat actors. Your work will contribute to larger team projects across
    your organization. This project will also help you develop an important
    mindset: thinking responsibly and proactively about what threat actors
    would do to attack organizational assets.
    The project incorporates one milestone, which will be submitted in Module Five. The project will be submitted in Module Seven.
    In this assignment, you will demonstrate your mastery of the following course competency:
    Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors
    Scenario
    In a course announcement, your instructor will provide some scenarios
    for you to choose from. In your chosen scenario, you are a security
    analyst, creating a technical brief for the security or IT director
    explaining how the situation informs the larger proactive adversarial
    detection plan they are writing for the organization. The specific
    technical information, results, or determinations you need are supplied
    within the scenario. Your brief should address each critical element in
    the Project Three prompt, discussing your best-practice tactics or
    methods recommendations based on your research from the decision aid you
    completed as the milestone for this project. The Conclusion section of
    this activity requires you to expand on all the research you did for the
    decision aid.
    Prompt
    In your technical brief, you must address the critical elements listed below.
    Introduction
    Identify your threat actors and characterize their
    motivations or desired outcomes. Use research from the Project Three
    resource guide or decision aid to support your response. For example, is
    the threat actor gathering information for financial gain?
    Analysis
    Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or decision aid to support your response.
    Describe ethical and legal factors that should be
    considered and their significance in terms of the company for which you
    are employed in the scenario. Use research from the Project Three
    resource guide or decision aid to support your response.
    Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three resource guide or decision aid to support your response.
    Describe at least one tactic or method that would be employed to reduce the likelihood
    of the same situation happening again. Use research from the Project
    Three resource guide or decision aid to support your response.
    Conclusion
    Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to support your response.
    What to Submit
    Your submission should be approximately 2 pages in length (plus a
    cover page and references) and should be written in APA format. Use
    double spacing, 12-point Times New Roman font, and one-inch margins.
    Include at least three references, which should be cited according to
    APA style. Use a file name that includes the course code, the assignment
    title, and your name—for example,
    CYB_200_Project_Three_Neo_Anderson.docx.

  • “Enhancing Diplomas: A Graphical Analysis”

    In the files I am attaching I have included a job description file. It concerns additions to an already prepared diploma (no bibliography will be needed). It is necessary to write code (which does not need to be delivered) to create graphical elements, and analyze the results. No more than 8 pages (including graphics).

  • “Creating a Social Environment for Tennis Enthusiasts: A Web Application Approach”

    My project  and problem statement is about “how does the use of a web application provide a social environment for people to communicate about tennis”.We are basically creating a web application around a user that can provide a social environment for people to communicate about tennis.You could also include graphs or other statistics about who is the top player / team, predictions even if you want to dabble in a little machine learning? You can look at the social aspect, for example, for people that normally don’t socialise for various reasons. Talk about the calibration and mental health. Also talk about how people can become friends and discuss bets. Talk about what the websites gonna look like and what it’s gonna do. As in discuss other pages that are gonna be on the website so for example homepage and they are able to click on any tennis players to see their stats and other stuff that are normally on a tennis website etc. Also Talk about how am I going to achieve this as I’m how am I gonna achieve the problem statement. People can bet on a game and get a badge. Also how become friends and scheduling a meet up and chat to one another and get a badge
    It should be a problem statement  “How does the use of a web application provide a social environment for people to communicate about football / tennis”. The hypothesis is that “A social collaboration web application for people to watch tennis provides an opportunity for like-minded people to make friends / connections with each other”.  The proposal is basically 1000 words and  a template is attached. Please find scientific journals related to my topic. Please answer the questions in the document called project proposal. It’s a 1000 words. Please user literature reviews as well as scientific journals. The initial meet-up presentation PowerPoint attached file is basically give you the structure of how to do the proposal and what to include . Please include 30 references and they have to be Harvard referencing  and they have to either scientific journals and lterative reviews

  • Exploring the Use of Python Libraries for Big Data Tasks

    Description
    Primary Response is due by Thursday.
    Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
    As of 2023, Python has around 137K libraries making it the most widely adopted platform for data manipulation and data science. After reading this article (Top 5 Pyton Libraries for Big Data), choose one of these libraries and recommend on how it may be useful for big data tasks.
    Responses to Other Students:
    Respond to at least 2 of your fellow classmates with at least a 200-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
    How would you justify a different perspective from your classmate’s on the topic?
    How, additionally, would you defend your classmate’s position?
    What critique do you offer your classmate in regard to clarity and thoroughness of their post?
    Please address all prompts. When offering counterargument or justification, consider practice, theory, and examples from your own experience, reading, or current events in presenting your position.
    For assistance with your assignment, please use your textbook, all course resources, and any external research and resources you have gathered.
    Discussion Board Rubric
    Expectation Points Possible Points Earned Comments
    Application of Learning Material Content: Initial post demonstrates understanding of Learning Material content.
    25
    Application of Course Knowledge: Initial post contributes unique perspectives or insights gleaned from text/learning resources, or specified by assignment.
    25
    DB Responses: Responds substantively to two posts. Responses encourage interaction in the Discussion Board and classroom community.
    10
    Academic Writing: Initial post presents information logically and is clearly relevant to discussion topic. Posts contain accurate grammar, spelling, and/or punctuation with few or no errors. All resources should be cited in current APA format.
    15
    Total Points
    75

  • “Preparing Managers for International Success: A Cultural Guide for Expanding to [Country]”

    Your company, a medium-sized mechanical engineering business from Southern Germany, is in the process of
    expanding internationally and setting up a plant in Brazil (or in a country of your choice: South Africa, China,
    Russia), which will then serve that respective foreign market. You work in the HR (human resources) department
    and your task is to prepare the managers who will be going to the plant in Brazil (or to the selected country). Your
    company has an ethnocentric approach to filling management positions abroad. Your task is to develop a
    guideline to culturally prepare the managers to be sent abroad.
    Task definition:
    The guide should contain the following parts:
    1. A cultural comparison of Germany and the country you have chosen. For this, you could use Hofstede’s cultural
    dimensions. A corresponding comparison tool is freely available online. (Link: https://www.hofstede-
    insights.com/product/compare-countries/)
    2. Use Hofstede, Hall, and Rotter’s three concepts to illustrate the differences, giving one example each, so that
    readers (i.e., the managers about to leave) can understand the importance of the cultural differences. The
    examples should be connected to the work context as much as possible.
    Note: When comparing the individual dimensions of Hofstede, Hall, and Rotter, special attention should be paid
    to those dimensions for which there are significant differences between countries. For example, you should
    illustrate that power distance can affect how one relates with superiors. Constructive criticism of one’s boss might
    be possible in a more egalitarian country, but it is difficult or even impossible in a country with stricter hierarchies.

  • Submit Beta Version for Review Title: “Beta Version Submission: Complete Functionality and Operational Design for Application Review”

    You should be making good progress on your application and now it is time to submit the Beta version for review. The beta version of an application should have all functionality in place, although there may be some functional problems still left to address.
    SLP Assignment Expectations
    The Beta version should address the following requirements:
    The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
    All functionality should be operational, although some problems may be present
    Connections to outside components should be functioning at the complete level required to support program functionality.
    The visual interface should be complete.
    There should complete functionality with the required database for the project.
    All code should be well-documented with comments.
    The program should run without significant errors.
    Include a document called operation.docx that describes how to operate the application.
    This document should provide sufficient information to allow the instructor to set up and operate the application.
    Identify any external system requirements
    Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.
    Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment.

  • “Exploring the Impact of Social Media on Mental Health: A Comprehensive Analysis”

    all instructions are provided in the brief. 15+ references are adequate. any questions please ask me