250 words

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Intelligence: Resolution Problem

  

7.15 This question considers representing satisfiability (SAT) problems as CSPs. 

a. Draw the constraint graph corresponding to the SAT problem

(¬X1 ∨ X2) ∧ (¬X2 ∨ X3) ∧ … ∧ (¬Xn−1 ∨ Xn) 

for the particular case n = 5. 

b. How many solutions are there for this general SAT problem as a function of n? 

c. Suppose we apply BACKTRACKING-SEARCH (page 215) to find all solutions to a SAT CSP of the type given in (a). (To find all solutions to a CSP, we simply modify the basic algorithm so it continues searching after each solution is found.) Assume that variables are ordered X1,…,Xn and false is ordered before true. How much time will the algorithm take to terminate? (Write an O(·) expression as a function of n.) 

d. We know that SAT problems in Horn form can be solved in linear time by forward chaining (unit propagation). We also know that every tree-structured binary CSP with discrete, finite domains can be solved in time linear in the number of variables (Section 6.5). Are these two facts  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion of VIRUS PROTECTION SCAMS (100+Word limit)finish in 1 hour

 Everyone should worry about getting a computer virus that will corrupt or destroy files. Some suggest that software developers may be taking advantage of this fear by sending out misleading or fake virus alerts. One reported scam encourages users to download a free virus detection program. This free download begins by actually installing a virus onto the user’s computer. It then performs a bogus scan, locating the virus and then offering to remove the virus for a fee. Obviously, this is unethical, not to mention illegal. How can you and legitimate antivirus manufacturers protect themselves against viruses and unethical software developers? Read the attached document titled Discussion 2-Ethics.pdf and the suggested articles below, then respond to the following questions.

  1. Have you ever been offered a free virus alert program? If so, describe the offer and whether you accepted the offer.
  2. Almost all legitimate antivirus software manufacturers issue new virus alerts. Do you think these alerts are motivated by greed or by good consumer service? Why or why not?
  3. Is this an ethical issue for antivirus software manufacturers? If so, create some ethical guidelines for antivirus software manufacturers to follow when issuing virus alerts.
  4. What can users do to protect themselves against antivirusscams and against unethical manufacturers of antivirusprograms? Be specific and defend your suggestions.

DISCUSSION 2 SUGGESTED ARTICLE & VIDEOS (you are free to use any source you wish to help answer the questions)

  1. Articles

DISCUSSION 2 GRADING CRITERIA

  • Make your initial post of 100 words or more answering and elaborating on the questions above.
    • Must meet college level writing.
    • Make sure that your postings do not have spelling errors, incomplete sentences, and formatting.
    • Please make sure to run a spell check on it before submitting it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Hardware and Software Paper

 

Research computer hardware and software and how they work together to process user requests. 

Write a 1,050-word paper describing the role of hardware components and operating system software on a computer: 

  • Discuss what hardware components should be considered when deciding what applications to install. 
  • Sum up the key utilities in operating system software allowing users  to customize their desktop and keep their PC maintained and optimized.

Include the following in your paper: 

  • Format paper using APA Guidelines found in the link Writing and Style Guidelines (APA) for 100-299 classes on the lower right side of the Class Home page.
  • Use what you learned in Word Modules 1 & 2 to insert in-text citations and references using APA style.
  • Use the Word Bulleted feature to list basic hardware components and define their function.
  • Insert a picture or image of your PC, or one that you found on the  internet. Type the make and model of PC under the picture and apply Word  features to bold and highlight. 

Format your assignment consistent with APA guidelines for 100-299 classes.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

H.W help

 

You were recently hired by a company that is spread over several buildings along several city blocks and uses a MAN with high bandwidth capabilities to connect all buildings. Because of heavy videoconferencing use, they have installed fiber-optic cable for media to interconnect sites on this MAN. Majority of the employees are moving constantly between the buildings to complete tasks and use handheld wireless computers that communicate to an access point attached to the MAN. You are reviewing these recent upgrades to familiarize yourself and see that there are some best practices not being implemented. Namely the telco rooms are in disarray. You see sloppy cable terminations, cables tightly wrapped around rack corners and intertwined, TIA/EIA 568 recommendations have been exceeded and there are no labels on any cables, ports or jacks. You have been told that the previous network manager just didn’t have the time to address these items due to budget and overtime limitations which you have inherited.

Write an explanation detailing what steps need to be taken to improve the conditions in the telcom rooms and why you should be permitted to have staff work overtime to correct these oversights. Describe what are the TIA/EIA 568 recommendations. What issues are associated with these types of oversights.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

D2

Search the internet for best practices on testing new technologies (focus on ensuring that the technology works as it is needed). This needs to include current theories, models, and techniques in the analysis, design, implementation, and testing of secure network infrastructures across LANs and WANs (since all solutions depend on to some extent the network).

From your research, select the 3 tips that you feel are the most likely to help and your reasons why.

Make a paper in APA format

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Sc.

  

FUNCTIONAL DESIGN

[Integrate information from step 2. Prepare a functional analysis and design using SQUARE for requirements information gathering. Review software quality requirements engineering (SQUARE). Identify the SQUARE process. Provide overview of how to collect requirements for security technology and techniques being proposed.]

EVALUATION OF TECHNOLOGIES

[Integrate information from steps 3 and 4. Include different ways to secure data in the cloud. Research into Hadoop cloud environment and database models to understand what it takes to secure data in the cloud. After performing the Hadoop lab, collaborate on final results and include analysis on ways of securing data as part of SDLC. Provide summary on analysis and planning for evaluation of technologies and techniques examined for protection of client data in transit. Take time to review: server virtualization, benefits and features of cloud computing, mobile cloud computing. Compare different technologies and techniques. Include: encryption, access control and other techniques. Consider their efficiency, effectiveness and other factors that may affect the security of the data in the cloud. Include reasoning and conclusions. Include which is generally better, stronger technique and why.]

  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Web and Cloud Threats

 

Please review the article(s) and/or paper(s) with respect to “Web and  Cloud Threats” and discuss the summery of the articles/papers (500  words or more).

You must provide all the citations/references.

APA 

No plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

NEED (need within 1800-2200 words and in APA formatted, should not found in plagiarism and turnitin)

MUST FOLL ALL THE BELOW INSTRUCTIONS TO WRITE THE TOPIC.

 

The topic on which you would like to conduct an in-depth investigation: 

TOPIC: Emerging enterprise network applications

DATE: By April 13th 2018.  

 Research paper basics:

Double spaced – 12 pt. font – Times New Roman

2000 words (can range from 1800 – 2200 words) deductions for above or below word count. 

APA formatted with cover page 

Minimum six (6) sources – at least two (2) from peer reviewed journals 

In text APA references required

Include an abstract, introduction, and conclusion

Must be original work – similarity score of 30 or less to be graded

Please remember this needs to be in your words.  No cut and paste, No turning in other’s work.  No rewriting with SpinBot. Rephraser, or other tools.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

programming

Faery Magic

Create a world that has at least 5 different objects from the Furniture Gallery and a Faery from the Fantasy/Faeries Gallery. The Faery has the power to make an object disappear. Everything that the faery touches disappears from the scene.

Create an interactive game where the user can click one object at a time from the scene; then the faery faces that object and moves toward it using random motion. Write a recursive method named CheckDistance that checks whether the faery is very close to the object clicked by the user. If it is, the faery bends over to touch the object. After the faery touches the object, the object disappears (this is the base case of the recursion). If the faery is not yet close enough to the object to be able to touch it, the faery moves a small distance forward and the CheckDistance method is recursively called (this is the recursive case of the recursion).

In addition to the Alice world, submit the design of the game using a textual storyboard; include the design of the event and the design of the CheckDistance method and include comments in your code.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now