Category: Computer science

  • Title: The Business Value of Cybersecurity Certifications: A Briefing Statement for the Regional Cybersecurity Conference

    Your company has been invited to participate in a business round table discussion at a regional Cybersecurity conference hosted by a local community college.  The Chief Operating Officer has asked your group of Cybersecurity interns to perform background research and then assist in writing a briefing statement that he will present at the round table. The topic for his presentation is: What is the business value of Cybersecurity certifications?
    For this activity you must prepare a 3 to 5 paragraph briefing statement which answers the following questions.
    What are professional certifications?
    What are the benefits of professional certifications to businesses and other organizations?
    What are the benefits of professional certifications to individuals?
    Who certifies the certifiers and why is this important? (ISO/IEC Standard 17024)
    How do certifications contribute to risk reduction in the field of cybersecurity? (Identify and discuss 3 or more risks that can be mitigated by requiring certifications of Cybersecurity staff members.)
    Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

  • Business Flyer Design Business Flyer Design Instructions: For this project, you will create a business flyer that represents you. The flyer should include a border, bullet points, a picture, and a header with the name of your business. This

    this is 2 assignments. I wil post the instructions to one of them in this box and the next assignment will be in the attached files 
    Here are the requirements for Project 1:
    You are required to create a business flyer that represents you, should consist of the following:
    1. A border
    2. Bullet points
    3. Picture
    4. A Header place the name of business there

  • Title: Exploratory Data Analysis on the “COVID-19 World Vaccination Progress” Dataset

    1). Dataset: The dataset used for analysis.
    2). Code: Submit a python file with the the codes used for analysis.
    3). Analysis Report: You are not required to submit a separate report if your analysis is
    conducted within Jupyter Notebook. If you choose to complete your analysis in a Word
    document, you must submit the report in word or pdf format.
    •Choose a dataset of interest with sufficient columns.
    •Ensure a comprehensive understanding of each column in the dataset.
    •You may find an interesting dataset on Kaggle: https://www.kaggle.com/ 

  • “Designing a Random Luck Casino Game: A Programmatic Approach” Problem Statement: The problem at hand is to design a casino game that incorporates random luck as a determining factor for winning or losing. The game should be able to generate random outcomes and

    Problem statement (10 %) – A clear and concise description of the problem. at least 4 sentences
    Analysis (20 %) – An explanation of what the problem statement tells you to do, and a description of the general method used to solve the problem. is a casino project that contains random luck based on how lucky or unlucky you are about 5 sentences
    Design (20 %) – Explanation of the algorithm designed to solve the problem. Concentrate on the general program logic that includes: you can use algorithims and/or flow chart
    Structure chart of the program.
    Description of the algorithms using pseudocode or flowchart.
    You can put all of this in microsft document. here’s my project make a short report out of it. any questions let me know.

  • “Exploring the Impact of Technology on Modern Society”

    I will provide an attatchement that will verify all that needs to be completed. Wasn’t sure how to do the order. Also, willing to tip for this order. The attathement will provide all that needs to be completed. 

  • Assignment 1: Building a Data Enterprise for Business Success Assignment 2: Multifactor Authentication and its Application in Cloud Security

    Assignment 1 Your post must be at least 200 words.
    Please include:
    For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
    You have a data enterprise that contains structured and unstructured data
    As the CDO, you built your company’s first data warehouse or a data lake
    How will your data enterprise support the business?
    List the projects that you chose to undertake
    Prioritize them
    Write a short bullet describing why this project is on your list Assignment 2
    Discussion Topics:Respond to the following scenario. Include justification as to why you selected the response you did. Then, name 4 different MFA products that can be used with the cloud. Write a brief summary of each.Paulo has configured multifactor authentication on his AWS account using a virtual MFA application on his phone. When he signs into his account on a computer in his school’s computer lab, he is prompted to enter his password, and then he’s asked for a code from his phone’s app. Which category of MFA does the code represent? Something you are
    Something you know
    Something you have
    Something you do. Length requirements: Initial post must be at least 300 words. NOTE- 1) APA format
    2) NO plagiarism
    3)NO AI generated text
    4)write reference separately like assignment 1 and 2
    5)What ever written in questions i need like same answers No extra NO missing

  • Title: Dialogue with a Prospective Student and Variable Creation Using Jupyter

    Part 1:
    Draw a flow chart of how you would tackle asking a couple of questions, getting the answers, and creating a dialogue with a prospective student. Write in Pseudo-Code in English to emulate this dialogue. Below is an example, but your flowchart and pseudo-code should be with a prospective student(possibly related to the program and academics); if you prefer, you can craft any other dialog, as long there are at least two branches of choices as illustrated below; of course, you CAN NOT use the example below.
    What day is today? 
    If the answer is a day of the week:
    Are you going to work today?
    If yes, how do you get to work?
    If the answer is a weekend day:
    What are you going to do for fun?
    If you want to write more detailed pseudocode, take a look here: https://www.geeksforgeeks.org/how-to-write-a-pseudo-code/Links to an external site. or https://en.wikipedia.org/wiki/PseudocodeLinks to an external site.
    Part 2:
    Using Jupyter, create one variable by asking the user ( for example, your colleague) why she/he enrolled in this program and a second one by asking what they want to learn from this course; print both. You can come up with any two questions you want with any audience you prefer, as long as they shape a dialogue sequence.
    Submission Instructions
    Assignment solution should have a structure: Title page (your name, course name, term, my name), Introduction, Body/Analysis, Conclusions, and References. The actual solution code would go into the Body/Analysis section.
    Figure captions should follow the APA format.
    Your submission is a Jupyter Notebook (,ipynb) with a (.PDF or .HTML) file. These would include all the text, code, results, plots, images, etc.
    Submit the following files:
    o    ALY2100_FirstnameLastname_WeekX_Term_Year.ipynb
    o    ALY2100_FirstnameLastname_WeekX_Term_Year.html or ALY2100_FirstnameLastname_WeekX_Term_Year.pdf
    If you use any existing code extracted from www, cite the source. Make sure the whole code runs without any bugs, and explain well what you did so I can be sure you understand and are learning the material. TurnItIn will pick up similarities, and depending on how you modify the code and give explanations, I can disregard the level of similarity.
    Rubric
    Biweekly Assignments
    Criteria Ratings Pts
    This criterion is linked to a Learning OutcomeComputation
    40 pts
    Almost all of the problems are computed correctly, and the logic is also correct
    32 pts
    Most of the problems are computed correctly and most of the logic makes sense
    20 pts
    Some of the problems are computed correctly and some of the logic makes sense
    10 pts
    Very few of the problems are computed correctly and the logic is poor
    40 pts
    This criterion is linked to a Learning OutcomeApplication of Tools
    40 pts
    Uses the best and/or required procedures/formulas/tools to solve almost all of the problems
    32 pts
    Uses satisfactory and/or required procedures/formulas/tools to solve most of the problems
    20 pts
    Uses only a few procedures/formulas/tools to solve the problems
    10 pts
    Does not use satisfactory or required procedures/ formulas/tools to solve the problems
    40 pts
    This criterion is linked to a Learning OutcomeExplanation of code and results
    20 pts
    Uses clear language to accurately express abstract ideas and explain concepts. No errors related to organization, or grammar.
    16 pts
    Uses clear language to express ideas, but not on all steps of the code. Minor errors related to organization, or grammar
    10 pts
    Lack of clarity in writing. And lack explanation on part of the code

  • Title: “Bert in Sentiment Analysis: Understanding the Role of Pre-Trained Language Models in Natural Language Processing” Introduction: Sentiment analysis, also known as opinion mining, is a subfield of natural language processing (NLP) that

    Read all the files.
    According to the slides process and make references to other related articles, write a paper about Bert in sentiment analysis. If you find code for it, attach the GitHub link or any url.

  • “eBay Data Breach: Lessons Learned and Recommendations for Improved Cybersecurity”

    In February 2014, the ecommerce trading platform eBay experienced a data breach, hackers managed to steal sensitive information about eBay users including passwords and other personal information. Carry out research about this hack and address the following issues; 
    Introduce the core principles of computer security in the modern age 
    Discuss the method the hackers used to breach eBay’s system 
    Discuss the intentions of the hackers
     Discuss the vulnerabilities that may have led to this breach
     Describe what countermeasures eBay took after the breach to reduce damage 
    Discuss how eBay resolved the breach and secured their systems 
    Explain the impact of the breach on users, other stakeholders and eBay itself 
    Reflect on the lessons learnt: What did eBay do right/wrong? Recommend additional measures that should have been used to prevent this breach from ever occurring
    You are required to produce a 5000 words (+/- 10%)  report of your findings adhering to the following structure: 
    1. Title 
    2. Abstract (120 words maximum) 
    3. Introduction (Provide an overview of your report) 
    4. Literature review 
    Provide context by discussing the fundamental aspects of computer security 
    Provide an overview of the case 
    5. Discussion and Analysis 
    Discuss the relevant computer security issues that are related to this particular 
    Apply understanding of computer security to the case 
    6. Conclusion and Recommendations 
    Lessons learnt 
    Personal reflection on the case 
    7. References 
    Sufficient academic resources and internet sources 
    Formatted using the Harvard referencing style