Category: Computer science

  • Title: Applying the Principles of Good Design in Solving a Real Estate Dilemma Problem: I need to purchase a house and want to know what my options are given a budget of $500,000 and three different locations: Los Angeles

    Review The Power of Good Design and select three of the ten principles noted for good design.
    Next in R, utilize these three principles in a problem that you will solve.
    First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem. Ensure the problem is simple enough to complete within a two-page document.
    For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. Ensure there is data visualization in the homework and note how it relates to the three principles selected.
    Part 2 Kirk (2019) notes the importance of formulating your brief. What does he mean by this? Please expand this thought by noting how you would create a vision for your work. Note any real-world examples to expand upon this thought.

  • Assignment 1: Building a Data Enterprise for Business Success Assignment 2: Exploring Multifactor Authentication and Cloud Products

    Assignment 1
    Your post must be at least 200 words.
    Please include:
    For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
    You have a data enterprise that contains structured and unstructured data
    As the CDO, you built your company’s first data warehouse or a data lake
    How will your data enterprise support the business?
    List the projects that you chose to undertake
    Prioritize them
    Write a short bullet describing why this project is on your list Assignment 2 Discussion Topics:Respond to the following scenario. Include justification as to why you selected the response you did. Then, name 4 different MFA products that can be used with the cloud. Write a brief summary of each.Paulo has configured multifactor authentication on his AWS account using a virtual MFA application on his phone. When he signs into his account on a computer in his school’s computer lab, he is prompted to enter his password, and then he’s asked for a code from his phone’s app. Which category of MFA does the code represent?Something you are
    Something you know
    Something you have
    Something you do. Length requirements: Initial post must be at least 300 words. Note-1) APA format
    2) NO plagiarism
    3)NO AI generated text
    4)write reference separately like assignment 1 and 2
    5)What ever written in questions i need like same answers No extra NO missing

  • Title: Basic Programming Concepts – Printing Personal Information

    Demonstrate understanding of basic programming concepts by:
    Developing pseudocode that prints the following information for a fictional person:
    First name
    Last name
    Street address
    City
    Zip code
    Creating a simple java application that will print the items listed above on individual lines.
    Compile and submit your pseudocode, source code, and screenshots of the application executing the application, the results and GIT repository in a single document.

  • “The Impact of Big Data on Personal Genomics in the Health Care Industry” “The Impact of Big Data on Personal Genomics in the Health Care Industry” Big data has revolutionized many industries, and the health care industry is no exception. With

    Primary Task Response: Within the Discussion Board area, write 300-500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
    Big data has influenced many industries. One area that has been greatly influenced is the health care industry.
    Describe how big data is influencing personal genomics in the health care industry.
    Evaluate how analyzing an individual’s genomes can aid in the foundation of predictive and preventive medicine.
    Note: Focus this discussion on sequencing of big data genomics.

  • Title: “The Evolution and Impact of the NIST Cybersecurity Framework” The National Institute of Standards and Technology (NIST) Cybersecurity Framework was created in 2014 as a voluntary framework to help organizations manage and mitigate cybersecurity risks.

    300 word essay minimum of two citations use APA, citation style summarize, and ensure proper Gammer spelling and formatting. Use the following website among others to conduct research.
    https://www.nist.gov/cyberframework/history-and-creation-framework

  • “Building a Chatbot Box for a Website: A Comprehensive Guide”

    every thing related to the project is in the file, the idea is to build a chatbot box for a website. 
    Everything should be written in the outline and should cover all requirements. 
    the due date is in two hours 

  • “Building a Windows 10 Virtual Machine and Documenting the Installation Process”

    Instructions
    If you didn’t last week:
    Download VMware Player, Virtual Box, or use Hyper-V to build a Windows 10 virtual machine. These free applications can be placed on your personal computer:
    Oracle Virtual Box (free)
    VMware Player (free)
    Hyper-V (available on Windows 8.1 and 10)
    You can also get an evaluation copy of Windows 10.
    Download the Windows Upgrade Proof of Concept Template and follow the instructions in the document.
    In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine (VM) from this project for the Project 3 presentation, so do not delete the VM.
    Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

  • “Exploring the Importance of IT Organizational Structure and Mobile App Development in Business Strategy”

    Instructions
    1&2 questions highleted must use different docs with APA format
    1)Questions in screenshot
    Information Systems for Business and Beyond Questions
    Chapter 2 – study questions 1-10, Exercise 2
    Information Technology and Organizational Learning Questions
    Chapter 2 – Note why the IT organizational structure is an important concept to understand. Also, note the role of IT in the overall business strategy.
    The above assignments should be submitted in one-word document. Please use a cover page with all assignments.
    The information technology and organizational learning assignment shoudl be in essay form and should be at least two pages in length. Ensure to adhere to APA formatting and standards.
    **Remember the APA cover page and the references (if required) do not count towards the page length**
    Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.
    2)
    Think about the last time you utilized a mobile application or attempted to build your mobile website. What planning process did you go through before you began your project? You may have considered the steps or tasks you needed to perform. You may also have considered the resources and platforms needed for your outcome. For example, which model fits your business domain needs? Do you have time constraints that will make completing the web application/site complex within a reasonable period? You may also have considered the myths surrounding developing mobile apps and the difficulties generally associated with mobile app development. Please answer the following questions. Write a 2-to-3-page response.
    Illustrate how design & utility makes a difference between good vs. great websites. Explain
    Distinguish how deciding between a mobile application vs. a mobile website is an essential consideration for developers. Explain.
    Examine how NoSQL databases be used in APP development.
    Interpret how push notifications are the preferred method of communication over instant messaging amongst young people.
    Your assignment must follow these formatting requirements:
    Use at least three-five (3 – 5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
    Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
    Include a cover page containing the assignment title, the student’s name, the professor’s name, the course title, and the date. The cover and reference pages do not count toward the page count.
    Requirements: follow instructions and USE APA References must | .doc file

  • “Find the Flag: A Wireshark Packet Analysis Project” Find the Flag: A Wireshark Packet Analysis Project By John Smith Introduction: In this project, we will be using the packet analysis tool Wireshark to find hidden flags

    I am offering a Find the Flag project that you can do on your own time using a packet analysis tool (Wireshark). I am providing you two packet capture files and you have to find the flags in them. Unzip the folder Haxx0rthon Download Haxx0rthonOpen this document with ReadSpeaker docReaderwhere you will find the pcap files. It is due at – May 10th.
    1. helpfulwine.pcap
    2. numberlesslove.pcap
    DO NOT GIVE UP. THE FEELING OF VICTORY IS POWERFUL 🙂
    Turn in a .txt file with your first initial and last name. (For instance, mine would be spaul.txt)

  • Title: Protecting Privacy: A Comparison of GDPR and U.S. Privacy Regulations

    Some countries have implemented measures to protect the privacy of their citizens. In this assignment, you will examine the General Data Protection Regulation (GDPR) implemented in the European Union to enforce privacy laws. You will then compare these regulations to their U.S. counterparts.
    Specifically, in a 3 page paper, you will:
    Define the GDPR.
    Justify the need for the GDPR.
    Review the GDPR’s key principles.
    Research an organization that violated the GDPR.
    Describe the specifics of the violation, including the violator, the GDPR principles that were violated, the impact on consumers, and the remedy that was applied.
    Compare and contrast an existing U.S. initiative that protects citizens’ privacy with the GDPR.
    Go to Basic Search: Strayer University Online Library https://library.strayer.edu/home to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.
    Wikipedia and similar websites do not qualify as quality resources.