Computer Science Discussion – 2 Assignments – Reflection

Discussion – Cloud Computing – 300 Words

Assignment – Cloud Computing – 4 pages

Reflection –  Cloud computing – 2 pages

Assignment – Intro to Data mining – 3 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT).

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT). This written project should be worked on prior to our residency meetings. We will discuss this assignment at our f2f meetings on campus.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Agile Methodologies

Agile Methodology

Overview

In this assignment you focus on the process methodology of Section 5, Standards and Procedures of your software development plan (SDP)—choosing, diagramming, explaining and finally applying your choice of Agile development methodology to CapraTek. The choices that you make here drive the rest of the SDP, so it is an appropriate starting point.

Preparation

Use the assignment Resources to complete the following:

  • View the CapraTek scenario in the CapraTek Overview document.
  • Download the Software Development Plan Template. Save it as “CapraTek_SDP_u1” and use it to complete and submit your assignments for this course.

Directions 

Consider the CapraTek scenario and address the items below in Section 5 of the CapraTek SDP document.

  • Select an Agile methodology and briefly justify why your chosen Agile methodology is appropriate for CapraTek.
  • Create a Unified Modeling Language (UML) activity diagram that illustrates the process methodology life cycle.
  • Describe each of the phases depicted in the process methodology diagram with relation to the software development process. Keep your descriptions generic—the point is to explain the processes involved in each phase to illustrate the concept.      
    • Partial Example: Scrum initial requirements steps: “During the initial requirements steps, the product owner examines the product backlog and gets feedback from the customer and other stakeholders. The product owner then informs the development team of the items from the product backlog . . .”
  • Select two of the phases and describe how each would manifest itself in the context of CapraTek. Consider CapraTek’s requirements, resources, time constraints, et cetera. 

Save and submit your SDP.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Chapters 26,27,28,39: Mini-Cases in ERM

Chapters 26 through 29(Attached) presented four mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Starting with chapter 29, assume that you have been asked to advise the Akawini management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that organization should implement as well to monitor risks outlined in that chapter. 

Original Discussion(What’s need to be done) –  As indicated above, assume that you have been asked to advise the Akawini (chapter 29) management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that organization should implement as well to monitor risks outlined in that chapter.

NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly.

The original discussion should be a minimum of 300 words with at least 3 references in APA style.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Compliance review

 

In this assignment, students will apply what they have learned in the course about FISMA compliance, CSF framework, and the ISO/IEC 27001:2013 certification process to expand their understanding through the lens of an internal auditor for a small and medium-sized business. The student may select to address the scenario from a federal or private sector perspective, but must be sure to denote which sector is chosen and apply the appropriate logic to the steps needed to secure compliance.

Scenario

The federal and private sector organization is considering ISO/IEC 27001:2013 certification and currently holds a Level 3 strategic alignment organizational alignment maturity (established policies, procedures, and SOPs). The organization requires additional work to obtain an optimized state and you have been asked to lead the effort to get them there.

In a 750- to 1,000-word paper, describe the steps you would use to help the organization begin to prepare for this certification. Make sure to address the following:

  1. What is the organizational readiness for certification? Review the Strategic Alignment Maturity Model Levels for this portion.
  2. How many members of your internal audit team will you need to perform the risk assessment? How long will the risk assessment take?
  3. What internal technology teams and other key stakeholders will you need to engage?
  4. Provide a brief description of the ISO/IEC 27001:2013 or FISMA certification process (dependent on sector type chosen).

Make sure to reference academic or NIST official publications (most current year available via the Internet) or other relevant sources published within the last 5 years.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

research questions

  

· With the exception of research questions, all questions should be answered using the dataset that you have selected for the final, or they will not be graded. 

· Important: 

· With each one of those non-theoretical questions deliver two parts in two separate files: ((1) a document file or code report of code design and testing and (2) the code itself should be submitted). 

· If you have questions, you can always email me for clarifications.

Q1: Read the paper (Lee, J., Ardakani, H. D., Yang, S., & Bagheri, B. (2015). Industrial big data analytics and cyber-physical systems for future maintenance & service innovation. Procedia Cirp, 38, 3-7.) Going to Google Scholar, you can see that the paper is cited 155 times so far. 

Industrial big data analytics and cyber-physical systems for future maintenance & service innovation

J Lee, HD Ardakani, S Yang, B Bagheri – Procedia Cirp, 2015 – Elsevier

With the rapid advancement of Information and Communication Technologies (ICT) and the
integration of advanced analytics into manufacturing, products and services, many industries
are facing new opportunities and at the same time challenges of maintaining their …

Cited by 155 Related articles All 4 versions

Pick the original paper, and (3-5) of the papers that cited this original paper (from the 155 listed in Google scholar). Then read and summarize the papers in your own words (size 2-4 pages double line 12 fonts times new roman). Your own words mean write your own sentences for the original paper and also the cited papers. You need to summarize properly.

———————————————————–

Q2: Read the paper/patent (Amini, L., Christodorescu, M., Cohen, M. A., Parthasarathy, S., Rao, J., Sailer, R., … & Verscheure, O. (2015). U.S. Patent No. 9,032,521. Washington, DC: U.S. Patent and Trademark Office.)

Adaptive cyber-security analytics

L Amini, M Christodorescu, MA Cohen… – US Patent …, 2015 – Google Patents

Performing adaptive cyber-security analytics including a computer implemented method that
includes receiving a report on a network activity. A score responsive to the network activity
and to a scoring model is computed at a computer. The score indicates a likelihood of a …

Cited by 78 Related articles All 4 versions 

Pick the original paper/patent, and (3-5) of the papers that cited this original paper/patent (from the 78 listed in Google scholar). Then read and summarize the papers in your own words (size 2-4 pages double line 12 fonts times new roman). Your own words mean write your own sentences for the original paper and also the cited papers. You need to summarize properly.

Q3: (Apply this on your selected code, submit two files: code/report) 

Implement all Ensemble algorithms described in one of the links:

An Intro to Ensemble Learning in R

https://www.r-bloggers.com/an-intro-to-ensemble-learning-in-r/

Submit (your own code + a document to explain how you designed/tested your code)

Q4: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links:

How to build Ensemble Models in machine learning? (with code in R)

https://www.analyticsvidhya.com/blog/2017/02/introduction-to-ensembling-along-with-implementation-in-r/

Submit (your own code + a document to explain how you designed/tested your code)

Q5: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links:

How to Build an Ensemble Of Machine Learning Algorithms in R

https://machinelearningmastery.com/machine-learning-ensembles-with-r/

Submit (your own code + a document to explain how you designed/tested your code)

Q6: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links:

Code for Workshop: Introduction to Machine Learning with R

https://shirinsplayground.netlify.com/2018/06/intro_to_ml_workshop_heidelberg/

Submit (your own code + a document to explain how you designed/tested your code)

Q7: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links

Machine Learning With R: Building Text Classifiers

https://www.springboard.com/blog/machine-learning-with-r/

Submit (your own code + a document to explain how you designed/tested your code)

Q8: This is a research oriented question on the paper (The security of machine learning)

Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2010). The security of machine learning. Machine Learning, 81(2), 121-148.

Pick the original paper, and (3-5) of the papers that cited this original paper (from the 374 listed in Google scholar). Then read and summarize the papers in your own words (size 2-4 pages double line 12 fonts times new roman)

Q9: This is a research oriented question on the paper (Combining ensemble of classifiers by using genetic programming for cyber security applications)

Folino, G., & Pisani, F. S. (2015, April). Combining ensemble of classifiers by using genetic programming for cyber security applications. In European Conference on the Applications of Evolutionary Computation (pp. 54-66). Springer, Cham.

Pick the original paper, and (3-5) of the papers that cited this original paper (from the 18 listed in Google scholar). Then read and summarize the papers in your own words (size 2-4 pages double line 12 fonts times new roman)

Q10: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links

Machine Learning and NLP using R: Topic Modeling and Music Classification

https://www.datacamp.com/community/tutorials/ML-NLP-lyric-analysis

Submit (your own code + a document to explain how you designed/tested your code)

Q11: Implement all Ensemble algorithms described in one of the links

Lyric Analysis with NLP & Machine Learning with R

https://www.datacamp.com/community/tutorials/R-nlp-machine-learning

Submit (your own code + a document to explain how you designed/tested your code)

Q12: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links

Tidy Text Mining with R

https://github.com/dgrtwo/tidy-text-mining

Submit (your own code + a document to explain how you designed/tested your code)

Q13: (Apply this on your selected code, submit two files: code/report)

Implement all Ensemble algorithms described in one of the links

https://github.com/PacktPublishing/Hands-On-Ensemble-Learning-with-R 

(one chapter)

Submit (your own code + a document to explain how you designed/tested your code)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Programming Assignment

 

Description: Unit 9 – Java Arrays and Data Files

This unit is really about three different topics that are related to one another – arrays in Java, simple text files in Java, and modular programing in java (Java methods).

The unit has a programming project spread over three related programming assignments, each worth 10 points.  

In the first assignment, you will create a Java program that works with a small array of data containing five test scores.   It will get data from user input do some calculations, and then print the results. 

In the second assignment, you will modify a copy of the first assignment to load the data from a data file into an array, and then output the results to a data file.  

In the third assignment, you will decompose a copy of the second assignment into separate methods in Java.

Our goal is to have a good modular program that loads stored data from a fie into an array, works with the data, then sends results to another data file.  Doing this in three parts will allow you to focus on one aspect of the problem at a time. 

There are reading assignments in Zybooks, but the two chapters from the Java Learning Kit – Chapter 5 – and Chapter 6 are your best source for learning this material.  They cover the things you need to learn to complete this project and have good sample programs.

Your tasks are to:

  1. Read Zybooks Assginment 11 – Arrays in Java.
  2. Read the material in JLK Chapter 6 about arrays in Java.
  3. Complete the Java Arrays Programming assignment.
  4. Read the material in Chapter 6 about text files in Java.
    There is no corresponding Zybooks assignment.
  5. Complete the Java Text Files Programming assignment.
  6. Read the Zybooks Assignment 12 – Methods in Java
  7. Read the material in JLK Chapter 5 about methods in Java.
  8. Complete the Java Methods programming assignment.

It may seem like their is a lot to do here but the assignments are each simple and build on one another.

assignments:

 #1

You should complete Zybooks Assignment 11 – Arrays in Java and read lessons 6.1, 6.2, and 6.3 in JLK Chapter 6 about arrays in Java before starting this assignment.

Your task is to create a Java I-P-O program that works with a small array of data containing five test scores.

Your program should:

  1. contain a for loop to read five test score into an array from the user. The array should be a floating point array with five elements.
  2. Using second for loop, calculate the average score, highest score, and lowest score in the array. JLK lesson 6.3 is a good guide for doing this.
  3. print the results.

You should submit a zipped copy of your IntelliJ project folder.

#2

 

You should read lesson 6.5  Text File Input and Output in Java before starting this assignment. Reading Lab 6.6 will also be helpful. There is no corresponding Zybooks assignment.

Your task is to modify the program from the Java Arrays programming assignment  to use text files for input and output. I suggest you save acopy of the original before modifying the software.

Your modified program should:

  1. contain a for loop to read the five test score into the array from a text data file. 

    You will need to create and save a data file for the program to use. It should have one test score on each line of the file.  You can type and save the text file with any text editor, such as Notepad or Notepad++.  NotePad++ is a good program to have on your computer, It can be downloaded freely from: https://notepad-plus-plus.org  (Links to an external site.)
    It should be saved or copied to the same folder as your Java source code file within you Intellij project.

  2. Contain a second for loop, calculate the average score, highest score, and lowest score in the array. This part  of your program does not need to change from the previous assignment.
  3. output the results to a new text file. You can decide the name of the file. You should only use a local file name and the file will then be created in your IntelliJ project folder.

You should submit a zipped copy of your IntelliJ project folder, which should contain the two data files within the project..

PreviousNext
 

#3

 

You should complete Zybooks Assignment 12 – Methods in Java and read lessons JLK Chapter 5 – Methods and Modularity in Java before starting this assignment.

Your task is to modify the program from the Java Text files programming assignment  to contain several methods for different parts of the program.I suggest you save a copy of the original before modifying the software.

Your modified program should have the following six methods:

  • a method with a for loop to read the five test score into the array from a text data file.  The array should be declared in the main method and passed as a parameter to this method.
  • three separate methods to each calculate and return one of the following: the average score, highest score, and lowest score . Each method should contain a for loop to calculate and return one of the values to the main method. You can copy and edit he existing loop form the previous program for each of these methods.
  • a method to output the results to a new text file, as the main method did in the previous program. You basically need to move the code to do this into a new method.
  • the main method, which has the necessary variables and which calls the other methods as needed, passing values to those methods and receiving returned value from the methods as needed. 

Unlike Python functions, methods do not need to appear before they are called in a program file. In fact, it is common practice in Java to put the main() method as the first method in Java program, similar to what is done in the payMethods sample program in the chapter.

You should submit a zipped copy of your IntelliJ project folder, which should contain will contain the two data files within the project..

You should submit a zipped copy of your IntelliJ project folder.

PreviousNext
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer projects in word, excel and powerpoint

18PR) Capstone Project Instructions

Last Changed: 8/17/2018

This module includes the following four projects to be completed on your PC and Uploaded into your EagleOnline/Canvas course to be graded by your professor:

• Part 1 – PPT Project: This project includes a PPT presentation based on the topic provided to you by your instructor.

• Part 2 – WORD Project: This project is based on Word modules.

• Part 3 – EXCEL Project: This project is based on Excel modules.

• Part 4 – ACCESS Project: This project is based on Access modules.

Perform the steps in the order listed. Check your work before submitting

(Print this sheet if needed)

    NOTE: Make sure to view the (18PR) PPT Sample Solution.pdf link within this module to get some ideas on

  how to incorporate the features listed below into a PPT presentation.

      Steps

Part 1 – PPT Project Instructions

Create a new PowerPoint presentation file on your PC (or flash drive) named 18PR_ppt_LastFirst, where LastFirst is your actual Lastname and Firstname (For example, if your name is Mary Smith, you will name the file 18PR_ppt_

Points

        1.

1

 SmithMary)

       2.

TOPIC for PowerPoint ProjectCheck with your Instructor Some rules to follow in creating your presentation along with some suggestions:

a. Do not use foul language (keep it clean)

b. Do not make sexual innuendoes

c. Keep it “G-rated” (something you could have kids to read)

d. Try to “teach” or “inform”

 1

   3. Presentation should contain no less than 10 and no more than 20 slides. 1

   4.

 Use a template or a theme.

For Templates: Click on File/New, and then you can select PowerPoint presentations and slides, Sample Templates, or you can enter a module in the “Search Office.com for Templates” box to search for various templates (though that will also give you invitations, and all sorts of other things)

    

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl

 Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now