Category: Computer science

  • Assignment 1: Building a Data Enterprise for Business Success Assignment 2: Multifactor Authentication and its Application in Cloud Security

    Assignment 1 Your post must be at least 200 words.
    Please include:
    For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
    You have a data enterprise that contains structured and unstructured data
    As the CDO, you built your company’s first data warehouse or a data lake
    How will your data enterprise support the business?
    List the projects that you chose to undertake
    Prioritize them
    Write a short bullet describing why this project is on your list Assignment 2
    Discussion Topics:Respond to the following scenario. Include justification as to why you selected the response you did. Then, name 4 different MFA products that can be used with the cloud. Write a brief summary of each.Paulo has configured multifactor authentication on his AWS account using a virtual MFA application on his phone. When he signs into his account on a computer in his school’s computer lab, he is prompted to enter his password, and then he’s asked for a code from his phone’s app. Which category of MFA does the code represent? Something you are
    Something you know
    Something you have
    Something you do. Length requirements: Initial post must be at least 300 words. NOTE- 1) APA format
    2) NO plagiarism
    3)NO AI generated text
    4)write reference separately like assignment 1 and 2
    5)What ever written in questions i need like same answers No extra NO missing

  • Title: Dialogue with a Prospective Student and Variable Creation Using Jupyter

    Part 1:
    Draw a flow chart of how you would tackle asking a couple of questions, getting the answers, and creating a dialogue with a prospective student. Write in Pseudo-Code in English to emulate this dialogue. Below is an example, but your flowchart and pseudo-code should be with a prospective student(possibly related to the program and academics); if you prefer, you can craft any other dialog, as long there are at least two branches of choices as illustrated below; of course, you CAN NOT use the example below.
    What day is today? 
    If the answer is a day of the week:
    Are you going to work today?
    If yes, how do you get to work?
    If the answer is a weekend day:
    What are you going to do for fun?
    If you want to write more detailed pseudocode, take a look here: https://www.geeksforgeeks.org/how-to-write-a-pseudo-code/Links to an external site. or https://en.wikipedia.org/wiki/PseudocodeLinks to an external site.
    Part 2:
    Using Jupyter, create one variable by asking the user ( for example, your colleague) why she/he enrolled in this program and a second one by asking what they want to learn from this course; print both. You can come up with any two questions you want with any audience you prefer, as long as they shape a dialogue sequence.
    Submission Instructions
    Assignment solution should have a structure: Title page (your name, course name, term, my name), Introduction, Body/Analysis, Conclusions, and References. The actual solution code would go into the Body/Analysis section.
    Figure captions should follow the APA format.
    Your submission is a Jupyter Notebook (,ipynb) with a (.PDF or .HTML) file. These would include all the text, code, results, plots, images, etc.
    Submit the following files:
    o    ALY2100_FirstnameLastname_WeekX_Term_Year.ipynb
    o    ALY2100_FirstnameLastname_WeekX_Term_Year.html or ALY2100_FirstnameLastname_WeekX_Term_Year.pdf
    If you use any existing code extracted from www, cite the source. Make sure the whole code runs without any bugs, and explain well what you did so I can be sure you understand and are learning the material. TurnItIn will pick up similarities, and depending on how you modify the code and give explanations, I can disregard the level of similarity.
    Rubric
    Biweekly Assignments
    Criteria Ratings Pts
    This criterion is linked to a Learning OutcomeComputation
    40 pts
    Almost all of the problems are computed correctly, and the logic is also correct
    32 pts
    Most of the problems are computed correctly and most of the logic makes sense
    20 pts
    Some of the problems are computed correctly and some of the logic makes sense
    10 pts
    Very few of the problems are computed correctly and the logic is poor
    40 pts
    This criterion is linked to a Learning OutcomeApplication of Tools
    40 pts
    Uses the best and/or required procedures/formulas/tools to solve almost all of the problems
    32 pts
    Uses satisfactory and/or required procedures/formulas/tools to solve most of the problems
    20 pts
    Uses only a few procedures/formulas/tools to solve the problems
    10 pts
    Does not use satisfactory or required procedures/ formulas/tools to solve the problems
    40 pts
    This criterion is linked to a Learning OutcomeExplanation of code and results
    20 pts
    Uses clear language to accurately express abstract ideas and explain concepts. No errors related to organization, or grammar.
    16 pts
    Uses clear language to express ideas, but not on all steps of the code. Minor errors related to organization, or grammar
    10 pts
    Lack of clarity in writing. And lack explanation on part of the code

  • Title: “Bert in Sentiment Analysis: Understanding the Role of Pre-Trained Language Models in Natural Language Processing” Introduction: Sentiment analysis, also known as opinion mining, is a subfield of natural language processing (NLP) that

    Read all the files.
    According to the slides process and make references to other related articles, write a paper about Bert in sentiment analysis. If you find code for it, attach the GitHub link or any url.

  • “eBay Data Breach: Lessons Learned and Recommendations for Improved Cybersecurity”

    In February 2014, the ecommerce trading platform eBay experienced a data breach, hackers managed to steal sensitive information about eBay users including passwords and other personal information. Carry out research about this hack and address the following issues; 
    Introduce the core principles of computer security in the modern age 
    Discuss the method the hackers used to breach eBay’s system 
    Discuss the intentions of the hackers
     Discuss the vulnerabilities that may have led to this breach
     Describe what countermeasures eBay took after the breach to reduce damage 
    Discuss how eBay resolved the breach and secured their systems 
    Explain the impact of the breach on users, other stakeholders and eBay itself 
    Reflect on the lessons learnt: What did eBay do right/wrong? Recommend additional measures that should have been used to prevent this breach from ever occurring
    You are required to produce a 5000 words (+/- 10%)  report of your findings adhering to the following structure: 
    1. Title 
    2. Abstract (120 words maximum) 
    3. Introduction (Provide an overview of your report) 
    4. Literature review 
    Provide context by discussing the fundamental aspects of computer security 
    Provide an overview of the case 
    5. Discussion and Analysis 
    Discuss the relevant computer security issues that are related to this particular 
    Apply understanding of computer security to the case 
    6. Conclusion and Recommendations 
    Lessons learnt 
    Personal reflection on the case 
    7. References 
    Sufficient academic resources and internet sources 
    Formatted using the Harvard referencing style 

  • “Exploring the Impact of Technology on Education: A Comprehensive Analysis”

    Below attached is the final capstone project. You need to rewrite it without AI and no similarity to the previous paper. Follow the APA7 format. I require the “Phase I” done in next 4 days and then I can increase the deadline for the rest of paper if you need. Please maintain the format of the tables as done in the paper
    AI and Plagiarism Report that is less than 10% is must. Otherwise, answer couldn’t be accepted.

  • Title: “Exploring the Use of Documented Artifacts in Agile Requirement Management: A Case Study Investigation”

    Its a case study /interview base survey. Follwoing are the research questions.  
    RQ-ID Research Question
    RQ-1 How are documented artifacts, such as requirement documents, user stories, and process documentation,
    utilized in the capture and management of requirements in practical agile settings?
    RQ-2 What specific challenges do practitioners face in documenting and managing requirements through
    these artifacts in an agile environment?
    RQ-3 What strategies do practitioners employ to overcome challenges associated with documenting and
    managing requirements in agile settings?

  • “Research Paper: A Comprehensive Guide to Organization, Coordination, and Analysis” Slide 1: Title Slide – Introduce the topic and title of the presentation Slide 2: Purpose of the Presentation – Explain the purpose of

    Create a presentation for the WRIT1 – Research Paper, using principles and tools available.
     The time available for the presentation is 10-15 minutes and 5 minutes for questions.
     The results of the events and the evaluation should be presented with well-designed
    Powerpoint slides.
    The structure of the presentation should contain at least the following:
    1. Purpose of the Presentation
    a. What is the purpose of the Research Paper?
    b. Who is it targeted to?
    2. Organization, Coordination and Time Scheduling of the Team
    a. Describe the context of implementing the action
    b. What was the time scheduling?
    c. What tools were used for the organization and implementation?
    3. Collection of the relevant material
    a. Which sources were used?
    b. How was the material used?
    4. Analysis of the Topic selected

  • Title: Managing Employee Performance: A Comprehensive Approach for Organizations

    Below attached is the final capstone project. You need to rewrite it without AI and no similarity to the previous paper. Follow the APA7 format. I require the Phase I done in next 4 days and then I can increase the deadline for the rest of paper if you need. Please maintain the format of the tables as done in the paper
    AI and Plagiarism Report that is less than 10% is must. Otherwise, answer couldn’t be accepted.

  • “Optimizing Student Learning: The Role of Generative AI and Prompt Engineering in Personalized Tutoring Systems”

    The thesis includes an auxiliary tool intended mainly for students. Its purpose is to help them identify their weaknesses according to the subject of their specialty and direct them to become better based on them. More specifically, each student will start by filling out a questionnaire (school, year, title, course subject, etc.) a call will be made back to an api which in turn will communicate with the gpt chat api and produce a test base of the user’s layer and object. The user will answer the questionnaire and gpt will be called again which in turn will build a profile of the student with his weaknesses. Also, the student will be able to ask gpt to offer him various exercises or screens and articles for practice. Essentially, our program will optimize the search process of a student aiming for his academic improvement, as the GPT program requires complex commands that the average internet user is unable to provide. We will have ready commands (prompts) in a backend which will accept variables which will essentially be the fields that the users will fill in. Once the prompt is completed it will be sent to gpt to produce the result.
    Below I am attaching a link suggested by the professor with details on prompting and generative ai.
    https://canvas.sydney.edu.au/courses/51655
    Finally, I cite some sources for researching the thesis suggested by the supervising professor.
    • What is an intelligent tutoring system (ITS)?
    • What was the state of ITS before 2022? Types, specific system, what they do, main drawbacks etc.
    • Why is personalization in tutoring important?
    • What is LLM and Generative AI? Types of GenAI and tools.
    • What changed in user interaction with the introduction of GenAI after 2023?
    • How has GenAI affected education (e.g. ease of use, academic integrity, etc.)?
    • Can GenAI be used for learning?
    • What would be the difference between previous ITS and personalized tutoring based on GenAI?

    • What is prompt engineering and why is it important in user/learner interaction with GenAI?
    • What is the project about and how will it contribute to a step forward in ITS development?
    The work must be in English 30,000 to 50,000 thousand words. The app does not need any specific programming language.