Modern challenges for commercial private banks. In particular, those private banks that primarily provide financial services to individuals (debit cards, loans, deposits, mobile banking, etc). Specifically, in the context of such a rapidly developing process of digitalization and competition with fintech companies, which also strive to give financial services completely remotely.
Category: Computer science
-
“Exploring the Findings and Methodology of a Published Paper: A PowerPoint Presentation”
I want to give a PowerPoint presentation on a published paper. The presentation will discuss the paper’s findings and methodology. One-page poster. 5 minutes presentation poster 16:9 ratio
-
Title: Mobile App Design for Healthy Harvest: Use Case Diagram and Prototype
For information systems developers, there are many options for building a mobile app. As part of the analysis and design process for your project with Healthy Harvest, you need to determine how to approach the build by creating a use case diagram and a prototype. This diagram should list system requirements and use proper design principles.
Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app.
Create a prototype, using the method of your choice, to show the overall proposed look of the app.
Write a 1-page summary that explains both your use case diagram and prototype. Include all system requirements, features, and design elements for the mobile app. -
“Driving Business Strategy for ITCertificates.com: Empowering IT Professionals for Success”
The ITCertificates.com
corporation recognizes there is a huge market for people who need to get
trained in IT jobs (this is a fictitious organization).
You are the CIO at ITCertificates.com. You have been asked to
drive a business strategy and approach that will enable the organization to
compete more effectively and drive improved operations across the organization.
You are also expected to
participate in business decisions at the highest levels of the company and your
budget currently is unlimited.
ITCertificates.com readies IT
professionals for jobs which include:
1.
Providing maintenance /
configuration for existing server, storage, and network hardware
2.
New server, storage, and network
hardware installation
3.
Designing and creating enterprise
system architectures
4.
Building software
5.
Hosting and maintaining Cloud-based
products (i.e., SaaS/PaaS/IaaS)
Courses vary but they all last
at least six months, are full-time, and they frequently involve multiple
subjects. ITCertificates.com’s business includes
advertising, tuition finance counseling, hands-on training sites, distance
education, internships, and placement.
You are free to add
assumptions and details concerning ITCertificates.com if they are
consistent with the description above and if you specify what these are. -
Title: Exploitation and Privilege Escalation Techniques on Windows XP and Ubuntu
Answer All questions by typing commands in the answer sheet, then provide print screens to show the implementation.
1) Exploit windows XP by using:
A) a scraper Meterpreter script, then provide registry information, password hashes, and network information that you have gained from this exploitation.
B) checkvm, getcountermeasure, getgui, hostsedit, Killav, and winenum Meterpreter scripts. Show the exploitation detail for each script attack.
2) Exploit Ubuntu, then use the following Linux Post Modules to get useful information. Explain information you have gained from each Module:
i) Checkvm
ii) enum_configs
iii) enum_network
iv) enum_protections
v) enum_system
3) How the Meterpreter session can get the system privileges? Provide example
4) Provide example for Udev Privilege Escalation on Linux
5) What is a Pass the Hash technique? Provide an example for Linux and example for Windows.
6) Provide example for Exploiting Open phpMyAdmin
7) What is the Attacking XAMPP? Provide example for supporting your answer -
“Designing Turing Machines: Solving Complex Problems”
The assignment consists of 3 questions that needs designing and drawing the turing machines provieded.
-
“Assessing the Diabetic Population: Statistical Analysis of T2D Excel File”
The T2D excel file Download T2D excel filecontains all patients that you identified with an ICD diagnosis of diabetes that visited a clinic or hospital within the past year. In this data set, you pulled all procedures and observations (OBS), race (RACE), and gender (GENDER) for each patient. You also provided each patient with a study ID (STUDYID) to avoid having personal identifiable information in the registry. For this assignment, you may use any statistical software (including excel). You must provide descriptions of your methods and code (if applicable) used to calculate your responses in addition to the numeric answers for each question. You will be graded heavily on your description of your methods or “the how you got your answer.” Assess the overall population How many unique patients are there in the file? Which races do the patients represent? How many patients (# and proportion %) in each race? What is the average age of the population? Range? Median? Identify patients with Hemoglobin A1C testing on record What is the name of the OBS value that codes for A1C test/observation in the data set? How many patients (# and %) had ≥1 test on record? How many total tests were conducted during this time period for the entire population? What is the Average, Median, and Range of tests among those who were tested? How many patients are managing their diabetes (defined as ≥2 A1C tests)? How many patients in each race have their diabetes managed/unmanaged? What is the average age of the managed diabetes population? Range? Median? Helpful features and commands for those using Excel: Data tab -> Data Tools -> Remove Duplicates Data tab -> Sort & Filter -> Advanced Filter -> Filter Data tab -> Sort & Filter -> Advanced Filter -> Unique records only =AVERAGE() =AVERAGEIF() =COUNTIF() =COUNTIFS() =IF() =MAX() =MEDIAN() =MIN()
-
Designing a Mobile App for Healthy Harvest: Use Case Diagram and Prototype Use Case Diagram: The use case diagram for the mobile app for Healthy Harvest outlines the main features and workflow of the app. It includes the system requirements and design principles that
For information systems developers, there are many options for building a mobile app. As part of the analysis and design process for your project with Healthy Harvest, you need to determine how to approach the build by creating a use case diagram and a prototype. This diagram should list system requirements and use proper design principles. Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app. Create a prototype, using the method of your choice, to show the overall proposed look of the app. Write a 1-page summary that explains both your use case diagram and prototype. Include all system requirements, features, and design elements for the mobile app.
-
“Unlocking Academic Success: The Importance of Laptops for University Students”
The essay type is persuasive. Here is the outliner of the essay:
Introduction
– Introduce the topic of university students should have owned a
laptop.
– Provide background information on the importance of
technology in education.
Body Paragraph 1
– Discuss how laptops can enhance learning in the
classroom.
– Mention advantages such as access to online
resources, easy to access, and increase a hardskill.
Body Paragraph 2
– Address the convenience of owning a laptop for
university students.
– Talk about how having a laptop can make completing
assignments and studying more efficient.
Body Paragraph 3
– Explore the practicality of owning a laptop for
university students.
– Discuss how laptops are versatile tools that can be
used for various tasks beyond academics, such as job searching and networking.
Counterargument Paragraph
– Acknowledge potential counterarguments against
university students owning laptops, such as cost or distractions.
– Refute these arguments by discussing ways to
mitigate these challenges, such as budget-friendly options or implementing time
management strategies.Conclusion- Summarize key points made in the essay about
why university students should own a laptop.- Reiterate the benefits of owning
a laptop for academic success and overall student experience. -
Title: Cybercrime and Emerging Technologies: A Dual Threat to Security
In this unit, you examined various security threats and ways to mitigate those threats. You also explored various emerging
technologies, such as AI, drones, virtual
and augmented reality,
and IoT.
In this journal assignment, you will explore cybercrime and emerging technologies. This activity will have two parts:
Part 1: Cybercrime
Research a recent cybercrime incident (within the last 5 years) that attracted media attention. Summarize the details of the incident, making sure to discuss:
1. Who the target was.
2.
What the attack was.
3.
When the attack occurred.
4.
The damage caused by the attack and what could have been done to mitigate or prevent the attack.
Part 2: Emerging Technology
Research an emerging technology that interests you. Summarize the emerging technology, making sure to discuss:
1. What the emerging technology is.
2.
Why the emerging technology interests you.
3.
Who or what is impacted by the emerging technology.
4.
The challenges, ethical concerns or risks associated with the emerging technology you chose.
Your journal must be at least one page in length, not counting the title and reference pages. It should be organized well and contain an introduction. No references
or citations are necessary.