Category: Computer science

  • “Combined Solutions for Tasks 1-4”

    I will attach the solutions to the 4 task and I need you to just arrange them into a single word document. The first word docume nt is the actual Questions combined.
    Task 1 solution is inside the first zip file
    Task 2 solutions is inside the second zip file
    Task 3 solution is inside the third zip file
    Task 4 solution is inside the word document.

  • “The Evolution of Artificial Intelligence: From Promise to Peril”

    You can you any public articles, books, etc. No restriction it should just be mainly on how artificial inteligence have evolved and focus on how good it is now, and then write something in counter(negatives).

  • Title: “Mitigating Node Capture Attacks in UAV Networks through Reputation-Based PBFT Algorithm”

    My paper is considering the Security of UAV Networks in Adversarial Environments. When UAV networks operate in hostile environments, they are subject to various attacks. Specifically, I would like you to focus on Node Capture Attack Resilience. Typically, researchers propose to countermeasure node capture attacks through (1) regular key rotation and credential refreshment, (2) physical security measures, or (3) decentralization and redundancy. This paper will be using the number 3 option by proposing a novel reputation-based Practical Byzantine Fault Tolerance (PBFT) algorithm that will mitigate Sybil attacks on UAV nodes. PBFT is an algorithm designed to protect distributed systems and networks from the Byzantine Generals Problem, a situation where components of a system fail and there is imperfect information on whether an element has failed. The algorithm is particularly relevant in systems where nodes must agree on a common state, which is critical in blockchain technology, distributed databases, and network consensus protocols. In the context of UAV networks, incorporating PBFT can address various security and reliability concerns, but it also introduces specific challenges and complexities. Before accepting this order, please ensure you are skilled in computer algorithms as you will have to develop an algorithm to counter these attacks, simulate, and compare your methodology with existing framworks (zero plagiarism). To make it faster, I will be working on the rest of the paper so I will want you to only focus on chapter 3 (methodology), and for us to be on the same page, we will be in constant communication, and I will be receiving a draft copy from you every Wednesday.
    I will always be willing and open to any discussion you have around this as to aid the process.

  • Hide Folder Information in PowerPoint Presentation

    Hide Folder Information
    Instructions
    For a demonstration, see https://www.youtube.com/watch?v=9rVApsGh3zU&t=3s
    Lab 5 Purpose
    To demonstrate Microsoft PowerPoint, and the use of views, themes, slide master, animation and transitions
    Lab 5 Task
    To duplicate the “Making a burger” presentation in the Microsoft Office text book
    Lab 5 Criteria
    File zipped with proper name (5%)
    Zip contains folder (5%)
    Folder has proper name (5%)
    Folder contains pptx file with proper name (5%)
    File contains title slide with correct content  (5%)
    File contains overview slide with correct content (5%)
    File contains 3 body slides with correct content (5%)
    File contains conclusion slide, with recap and correct content (5%)
    File contains a theme similar to Damask (5%)
    File show fonts were controlled from Slide Master (5%)
    File contains at least one image (5%)
    File contains at least one animation (5%)
    File contains at least one transition  (5%)
    Appropriately saved and submitted (35%)
    Create a Lab5 folder, then recreate my Burger presentation from the Microsoft Office.pdf and save it in a the  Lab5 folder as yourname-test.pptx
    See https://www.collins-tips.com/common/powerpoint.html for instructions
    You may do another fun presentation, not related to your Capstone Lab 10 for a small bonus, as long as it follows my rules… save in the lab5 folder and name yourname-show.pptx
    Note, the remaining portion of PowerPoint comes from the Group Project and Quiz
    (The grade generated from the group submission, make up the lab6 dropbox grade, plus you need to complete the PowerPoint quiz.)
    Zip the Lab5 folder that contains yourname-test.pptx, save it as yourname-lab5.zip, and upload here

  • Creating a Holiday Newsletter using Office 365™ Word Creating a Holiday Newsletter using Office 365™ Word

    For this assignment, you will complete the following hands-on activity using Office 365™ Word. You will be creating a Holiday newsletter. This will allow you to demonstrate that you have learned how to insert images and use headers/footers. Be sure you review the Resources provided this week if you are not sure how to accomplish these things.
    Attached above are 4 pictures and 3 documents to help you with the assignment.
    Follow the step-by-step instructions: NewsletterInstructions2.pdf.
    An unformatted document containing the stories that you can modify: NewsletterStories2.docx.
    A final Holiday newsletter (that you cannot modify) so you can see what your document should look like when you are done: NewsletterSolution2.pdf.
    Attached Files:
    NewsletterInstructions2.pdf NewsletterInstructions2.pdf – Alternative Formats (174.684 KB)
    NewsletterSolution2.pdf (249.779 KB)
    family2.jpg  (35.916 KB)
    house2.jpg  (126.458 KB)
    majestic dolphin.jpg  (56.964 KB)
    NewsletterStories2.docx  NewsletterStories2.docx – Alternative Formats (16.462 KB)
    ocean-reef.jpg 
    Make any additional adjustments so your newsletter fits on one page (the content and images) and the name, assignment, and class information added is on page 2 and resembles the solution. To fit everything for the newsletter on one page your images may need to be altered down in size to help everything fit.
    Use the instructor’s feedback provided with your previous assignment grades to improve your work as needed.
    Click on the title of this assignment.
    Scroll to where it says “Assignment Submission”.  
    Attach your assignment as a Word (*.docx) document by clicking “Browse Local Files” or “Browse Cloud Service” and locating the document you wish to attach. You do not need to use the Text Submission. Comments are optional.
    Scroll to the bottom of the page and click “Submit”.

  • Strategic Plan for Implementing New System Architecture and Migration Project at Intelligent Computer Services (ICS) “System Architecture Plan: Addressing Security, Business Impact, Compliance, and Data Privacy Considerations for Organizational Growth”

    WHAT TO SUBMIT
    To complete this project, you must submit the following:
    Strategic Plan
    You will develop a strategic plan for implementing the new system architecture and migration project at ICS. Your strategic plan should be 4 to 5 pages, double spaced, and submitted in a file format that your instructor can easily access (.PDF, .doc).
    Scenario
    Intelligent Computer Services (ICS) is a global technology innovator and implementer of artificial intelligence (AI) solutions, with specialization in the finance and retail industries. ICS employs more than 150,000 individuals and has offices in 120 countries around the world, with its global headquarters in Dublin, Ireland. Its U.S. headquarters are in Chicago, IL, and other U.S. office locations include New York City; Austin, TX; Minneapolis, MN; and Seattle, WA, to name a few.
    To support its global footprint, ICS has built and managed five global data centers in Dublin, Chicago, Albuquerque, Singapore, and Tokyo. These data centers support ICS business objectives, as well as data center colocation space for its clients in the developing world.
    Ten years ago, ICS initiated a global assessment of its information technology infrastructure, intending to start migrating its critical business solutions to cloud computing services. Unfortunately, as a result of a global economic recession, ICS had to put the initiative on hold to restructure its business operations to focus on growth and revenue improvements.
    Recently, with a 30% ($43 billion) revenue increase from 10 years ago, double-digit profits, and cash on hand of about $7.5 billion, ICS’s board of directors approved an executive proposal to migrate 75% of its critical technology infrastructure services to the cloud in three years.
    The proposal aims to leverage native cloud services, software as a service (SaaS) solutions, infrastructure as a service (IaaS) platforms, and security services, as well as being multi-cloud. This cloud migration journey will include large human capital, finance, and talent development initiatives to ensure continuous delivery of first-class client services. As the lead solution architect at ICS, you have been tasked with conducting a detailed assessment of the current system architecture and writing a strategic plan to migrate the organization’s on-premise Oracle PeopleSoft Human Capital Management (HCM) enterprise solution to an SaaS solution. The Cloud Journey team had proposed that ICS migrate to Oracle HCM Cloud or Workday HCM. Based on licensing benefits and other migration considerations, the CIO has approved migration to Oracle HCM Cloud.
    Directions
    Components of the strategic plan:
    Client/Server Architecture and Organizational Fit
    Your plan should determine the components of your new client-server architecture and how these options for the new system architecture will fit the organization’s strengths, capabilities, and strategic business goals. This section might include:
    An analysis of the options for new system architecture to fit organizational needs, including how the migration to the newly chosen architecture aligns with the mission, vision, and business strategy of the organization. In other words, how will this choice improve the organization’s competitive advantage and profitability?
    Using the information systems strategy triangle, found in Chapter 1 of Managing and Using Information Systems: A Strategic Approach, to highlight the necessary relationship between decisions regarding business strategy, information systems, and organizational design
    A complete inventory list of the possible components to match the organization’s needs. You could also explain why some components are not necessary.
    A consideration of best practices within the industry, and an investigation into what competitors are using and how the new system will result in a competitive advantage
    How the new system will result in a lower total cost of ownership or a higher return on investment
    How the new system is to be scaled to accommodate the growth of the organization
    Security Considerations and Needs
    The plan should consider and specify the security needs for the system architecture of an organization. This section of the plan might include:
    A recommendation of additional solutions that might be needed to ensure a stronger protection of the system
    Information about managing security deployments and streamlining policy updates
    Business Impact
    The plan should determine the impact of the new system architecture on the organizational environment, and anticipate how the organization and its operations might be affected by the migration. This section of the plan might include:
    Specific steps to analyze the impact of negative events on the business, such as the cost of security hacks
    Contingency and business continuity considerations for an adverse event
    Compliance
    The plan should determine what information technology policies, laws, regulations, and standards are applicable to the new project. This section of the plan might include:
    Comparison of common industry IT standards (e.g., NIST) for different industries and determination of which works best within the organization
    A plan to keep up with software updates and patching existing software when vulnerabilities are detected
    Data Privacy
    The plan should include an explanation as to how personally identifiable information (PII) and data breach notification laws impact operations, plans, and policies. This may include determining the implications of where and how data is stored and systems are housed and maintained.

  • “Analyzing the Impact of Social Media on Communication Patterns”

    Please just read the instructions listed in the assignments I have uploaded. Follow the instructions

  • “Creating a Successful Enterprise Architecture: A Case Study of Chubb Industries” Title: “Chubb’s Enterprise Architecture: A Case Study in Standardization and Strategic Alignment”

    I HAVE PASTED THE INFO FROM CHAPTER 6 OF THE BOOK BUT CAN PROVIDE LOGIN INFO IN NEEDED
    WHAT TO SUBMIT
    Your submission should be 2 to 3 pages, double spaced, and submitted as a Word document. Also, 2 to 3 resources are required and must be appropriately cited using APA style. These resources can include the textbooks and resources from previous modules, as well as original resources you have consulted. PLEASE WRITE OUT THE QUESTIONS IN YOUR DOCUMENT.
    Your responses should be in complete paragraphs and should contain the following:
    ANSWER ALL QUESTIONS THOROUGHLY AND COMPLETELY. Write out the questions in your document.
    Your answers should be original and in your words.
    Make direct connections between the issues identified in the case study and the concepts covered in the provided resources in Module Three.
    Support your answers with appropriate examples and facts drawn from the case study.
    Use correct grammar, sentence structure, and spelling, and demonstrate an understanding of audience and purpose.
    Questions
    What are the guiding principles of the architecture created at Chubb?
    What were some of the advantages of developing architectural standards at Chubb?
    It is important for enterprise architecture to reflect and support the business objectives of an organization. How was this accomplished at Chubb? Describe how the new architecture supports the goals and strategy of Chubb.
    How can Chubb ensure that the new architecture will meet and support future objectives?
    Did the decentralized enterprise architecture model meet Chubb’s long-term business goals? Why?
    CASE STUDY
    Case Study 6‐1 Enterprise Architecture at Chubb Industries
    Enterprise architecture (EA) at Chubb was the framework the organization used to align IT and the business. EA provided a target architecture for business leaders and IT professionals to use to collaborate and to enable the company to adapt and prosper. “Our EA is the glue that brings Business and IT together,” claimed Chubb CIO, Jim Knight.
    Chubb Industries, which now operates in 54 countries and territories, is the largest publicly traded property and casualty insurance company in the world and the largest commercial insurer in the United States. Having been founded in North America in 1792, it may well be one of the oldest underwriting companies.
    CIO Knight had put in place a decentralized (federated) EA in place to support Chubb’s seven lines of business (LOB). However, after six years he realized that tweaks to the decentralized EA were not able to deal with problems that surfaced over time. In particular, standards weren’t being followed closely enough and the business units were focusing on their own unit’s goals but suboptimizing on the organizational goals. The decentralized approach inhibited agility because it misaligned IT and the enterprise business strategy, created duplication, and impeded coordination across the LOBs. Knight decided to consolidate the LOB architects into a centralized enterprise IT organization with a broader scope.
    CIO Knight reorganized Chubb’s IT group to have a Chief Architect/Architecture Practice Lead who reported to the Chief Development Officer who, in turn, reported to Knight himself. A Manager in charge of Development also reported to the Chief Development Officer. The Manager in charge of Infrastructure reported directly to Knight. The new IT organization was designed to deliver integrated solutions to the business.
    One of the first things Knight did was create a target architecture with four major components: Architecture Principles (i.e., general rules and guidelines including “Be business oriented with a business‐driven design,” “Promote consistent architecture,” etc.); Architecture Governance (i.e., practices to manage at the enterprise‐wide level including controls, compliance obligations, processes, etc.); Conceptual Reference Architectures (i.e., target architecture support domains including business, application, information and technical architectures, policy administration, advanced analytics, i.e., content management); and, Emerging Technology (processes to promote innovation and explore emerging technologies). The target architecture used 50 architecture compliance rules derived from the TOGAF framework.
    All new projects were issued a “building permit” by the Architecture Governance Board and were assigned one or more architects from the five EA domains (i.e., Business, Application, Information, Technical, and Security) to ensure that the target architecture was being adhered to. The architects submitted artifacts and design documents for review and formal approval. Any deviations from the architecture rules must be corrected or remediated. The architects worked closely with the project leader.
    It was believed by the IT executives that the new EA model delivered value to the business, helped determine the new technologies that offered the greatest potential benefits, and provided better access to IT intellectual capital. The LOBs get the resources that are most appropriate for meeting their needs. But it wasn’t only the IT people who thought the EA added value. Dan Paccico, the Senior Vice President and Controller, said: “Chubb now has better long‐term and strategic planning reflecting an enterprise point of view.”
    RESPOND TO THESE DISCUSSION QUESTIONS
    What are the key components of the architecture Chubb has created?
    Why was it important to standardize so much of the architecture? What are the advantages and disadvantages of a standard EA for Chubb?
    Describe how the new architecture supports the goals and strategy of Chubb.
    Compare and contrast the advantages and disadvantages of the centralized and decentralized EAs at Chubb.
    What is your vision of how the target architecture might work in the future? If you were advising Jim Knight, the CIO of Chubb, what challenges would you suggest his group prepare for?
    Source: Adapted from H. A. Smith and R. T. Watson, “The Jewel in the Crown—Enterprise Architecture at Chubb,” MIS Quarterly Executive, 14, no. 4 (2015), 195–209; https://www.chubb.com/us‐en/about‐chubb/who‐we‐are.aspx (accessed March 9, 2019); and S. Kotusev, “Critical Questions in Enterprise Architecture Research,” International Journal of Enterprise Information Systems (IJEIS), 13, no. 2 (2017), 50–62.

  • “Exploring the Dynamic Role of a Database Administrator and Architect”

    I have provided the assignment information and the template that must be used. The career that you will be researching is database administrator and architect. 

  • Exploring and Applying Research Methodologies and Methods in Computer Science “The Importance of Proper Referencing: A Guide for Academic Writing”

    Exploring and Applying Research Methodologies and Methods suitable for research conducted within the Computer Science discipline
    The choice of a research methodology and related research methods reflect not only the context of the research but also include decisions related to the way the research is initially framed through the hypothesis statements or research questions.
    This discussion invites you to research and reflect on the different research methodologies and related research methods, in light of a research idea or topic that holds your interest. You may choose any research idea or topic, including one you may have discovered as part of the Week 1 Brainstorming Activity.
    To prepare for this discussion
    Review the learning resources and media for this week
    Conduct an initial review of research articles related to the research idea or topic you’ve chosen, reviewing the types of research approaches used by the researchers, their choice of methodology and methods and why these approaches were chosen. Select two to be utilised for your initial posting in Week 1
    Reflect on your own personal experiences with Computer Science projects that might have required you to investigate the feasibility of a particular technology or application of a technology within a context, from a ‘problem solving’ perspective.
    To complete this discussion
    In Week 1: Create an initial post (300-500 words) in which you present and discuss research methodologies and related methods. Making use of your initial review of potential research articles related to the research idea or topic you’ve chosen, provide a short summary of each of the two articles, describing the research methodology and research method(s) employed in the research. Critically evaluate the choices of researchers in terms of the appropriateness in supporting the aims and objectives of the research. Include an explanation on how the methodology and method(s) employed in the research might be appropriate for your own research topic. In addition to the two articles provided in your own posting, you are expected to cite several other academic and/or practitioner references to support your post.
    In Week 2: Respond to your colleagues, by commenting on, or critiquing, the analysis of research methodologies and methods that they have presented, locating similarities and differences when compared to your analysis. You may also want to provide additional supporting information pertaining to the analysis and appropriateness of the described research methodologies and methods, using academic references for support. (300-500 words)
    In Week 3: Post a final executive summary (500 words max) of the peer and instructor deliberations that have related to your own post, reflecting on lessons that have been learnt and changes or realignments that you have made following the class discussions. In the unlikely event your initial post has received no additional comments from your peers, include different points of view retrieved from the literature.
    Only the final summary post is subject to the late submission penalty (third week discussion forum deadline). Other posts submitted after their respective deadlines would not be subject to the late penalty but submitting late would have a negative impact on the final grade because of the “discussion forum engagement and responsiveness” criterium in the marking rubric. The information about the late submission policy can be found here:
    What do I do if I can’t meet a deadline or need to submit my work late? – (liverpool-online-study.com)
    The recommended word count for the full discussion forum is 1500 words. The initial post should be between 300-500 words. The response posts should be between 300-500 words. Only the final summary post will be subject to the maximum word count policy. This final post must not exceed 500 words. References and images are not included in the word count. As per the assessment length policy, penalties will be applied to assessments which exceed this length.
    Please Refer the attached files.(sample and Reference List)
    Please refer to ‘Sample 2.pdf’ for my colleague’s post.