Computer Science ISSC451 Week 5 assignment

 

Instructions

In order to complete Assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Explain the intent and fundamental concepts of search and seizure law as it applies to digital crime.

2. Identify and explain situations where search and seizure is possible without a warrant. Please describe the limitations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project management

 

Part 1. 

Read “Appendix A: MS Project 2016”.

Part 2.

Research 3 other project management software tools (include at least 1 smartphone or tablet app).  You should find information about the pricing, features, and usage of each.

Part 3.

Answer the following questions in a short paper:

What functions and capabilities does project management software provide that you cannot do easily using other tools such as spreadsheets or databases? 
Do a comparative analysis of MS Project and the three other software tools you researched.  This can be in the form of an MS Word table, showing a comparison of each in terms of specific features, pricing, etc.  Or you can write a brief synopsis of each. 
How can organizations justify investing in enterprise or portfolio project management software?

 Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper on DNA computing

the research should include speculation on where the state-of-the-art will be in the near future for one of the following technologies. the paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client. Although there is room for personal opinion in your paper, you must justify your conclusions. you should narrow your research to some specific technical aspects related to the subject. 

Details on the Individual Research Paper:

1. Length and Style: The body of an analytic research paper should be at least 10 pages in length (but not more than 12 pages) and typed using the APA Guide. Student projects distill fundamental issues, discuss the various available solutions, discuss the benefits and limitations of the available solutions, and provide a new solution and justification. Student papers must state a thesis, and based on the research, attempt to prove or disprove that thesis. An adequate literature search will include a few books and journal articles (or other relevant documents). A search of Internet documentation is required. Students should develop a conclusion which synthesizes the literature in such a way as to demonstrate new knowledge.

Guidelines for the format of the paper are as follows:

  • The paper should be 10-12 pages of text in length. (This minimum and maximum length should not include the title page, separate figures and tables, or the list of references);
  • The paper should include a one-paragraph abstract, an introduction, and a conclusion – think as if you were writing for a professional journal;
  • The paper should use the APA (7th Edition) format.

2. Due Date: The finalized Individual Research Paper is due for submission at the end of Week 12.

3. Evaluation Criteria and Feedback: The litmus test of a good research project is: “Does my research project provide the professor with new insight on my topic?” Feedback for the paper will be provided along with the final grade.

The grade for your paper will be determined using the Individual Research Paper rubric. (See Content > Rubrics)

4. Standards for Papers: Effective managers and leaders are also effective communicators. Written communication is an important element of the total communication process. The Graduate School recognizes and expects exemplary writing to be the norm for course work. All individual and group papers must demonstrate graduate-level writing ability and comply with the format requirements of the Publications Manual of the American Psychological Association 7th edition. Careful attention should be given to source citations, a proper listing of references, and the presentation of tables and graphs. Format and graphics, however, are not always transmitted well over the Internet: there are dozens of ways in which hardware, software, and networks may be incompatible. A student may mail an additional copy of his/ her research paper to the professor by Postal Service when graphics present a problem.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Term Project Deliverable 2

Building on the ERD developed in deliverable 1. The group will continue to work on the project and turn in the following files (with new requirements highlighted in bold text):

a) A MS Word document that contains the same five sections of the group proposal (no individual proposal needed). Include my feedback for deliverable 1 and highlight any changes made in response to the feedbackIn Particular, section 5 should be expanded to include a list of 10 specific functionalities that you plan to implement using queries in Access (to be done in deliverable 3). Build your queries with the following specific requirements (Note that you may have the one query that satisfies multiple requirements below):

1) The 10 functionalities should cover all entities in your ERD (with the exception that only one of the subtypes needs to be covered). In other words, there should be no entities that are not involved in any proposed functionality.

2) At least 5 functionalities should involve more than one entity (Example: show the total number of the products supplied by customer X) – this functionality involves at least the Product and Customer entities).

3) At least 2 functionalities should involve more than two entities (Example: Show the most profitable product purchased by customers from Florida – this functionality involves at least the Orderline, Order, and Customer entities).

4) At least 5 functionalities should involve the use of mathematical functions such as Sum, AVG, Min, Max.  

5) At least 2 functionalities should involve the “Group By” feature (Example: Display the average prices of the products supplied by each vendor).

6) At least 1 functionality should involve the use of the Count feature (Example: Count the number of vendors who have supplied more than one product).

7) At least 1 functionality should involve the entity that exhibits the unary relationship (i.e. a self-join is needed). 

8) At least 1 functionality should involve both the supertype and one of the subtypes. 

After you list the 10 functionalities, indicate which of the above requirements each functionalitiy satisfies, e.g.: Find out the average number of products purchased by customers from Florida (#2, #4, #5). .

2)  An Access file that contains all the tables outlined in the ERD with both entity integrity (through PK) and referential entity (through FK) properly enforced in the relationship diagram. Each table should have at least 1 test record. When you insert these test records, make sure they are consistent with the business rules and constraints you specified in the proposal. For example, if you specified the “Price” attribute to be numeric and not null, then the column should not contain either a string value or a null value. Similarly, if you specified that “Each vendor must supply at least one product”, then you need to make sure that every vendor that appears in the Vendor table must show up at least once in the Product table. 

3) The Visio file that contains the updated ERD (include the Visio file even if no changes are made).

Final submission for this assignment will include a Word Doc (.docx), a Access file (.aacdb), and a Visio diagram (.vsdx).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Paper review

 

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project background

 

Tasks to complete

Goal: This project will be used to integrate concepts developed from all the assignments in the second half of this class, specifically. You will identify a data driven business problem that requires preparation of the data. This preparation involves Extracting data (from 3 or more sources), Transforming (or cleaning) the data before Loading it into a database for analysis. In other words, you will experience, first-hand, the ETL process of Data management.

Options: You can take this project in one of two directions: (1) Identify a large file, clean the data and normalize it into three or more tables OR (2) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis. In both cases, you will need to identify what you plan to learn from the cleaned and loaded data.

Resource: This articleLinks to an external site.

In preparation for your project this term, I need you to do some digging to identify sources and ideas for a decent project.

There are a couple of decisions that have to be made. And so, I am making part of the project a “deliverable” so you can begin mulling over it. Most ETL tasks involve cleaning and integration. For integration, it is vital that you have an attribute that is common across all three data sets

Cleaning

Cleaning is one of the most important steps as it ensures the quality of the data in the data warehouse. Cleaning should perform basic data unification rules, such as:

  • Making identifiers unique (sex categories Male/Female/Unknown, M/F/null, Man/Woman/Not Available are translated to standard Male/Female/Unknown)
  • Convert null values into standardized Not Available/Not Provided value
  • Convert phone numbers, ZIP codes to a standardized form
  • Validate address fields, convert them into proper naming, e.g. Street/St/St./Str./Str
  • Validate address fields against each other (State/Country, City/State, City/ZIP code, City/Street).

Transform

The transform step applies a set of rules to transform the data from the source to the target. This includes

  • converting any measured data to the same dimension (i.e. conformed dimension) using the same units so that they can later be joined.
  • generating surrogate keys or FKs so that you can join data from several sources,
  • generating aggregates
  • deriving new calculated values,
  • Adding columns to create PKs and/or FKs

Data Integration

It is at this stage that you get the most value for the project. This typically means you are adding some attribute from a related set that adds ‘Color’ to the data. Perhaps Census data to labor data or other demographic data. The challenge is to locate data that are relatable.

Project direction: You will need to complete a datamart with significant pre-processing (ETL) activities. 

Requirements:

  1. Problem being solved:  What do you propose to learn from this data? List several of these business questions and show how your project solution (data set) could answer them.
  2. Tools: You must complete the entire project using Visual Studio. OR you can do this with some other tool of your choice (ETL) like Power BI or tableauLinks to an external site..
  3. Volume: Total result data set must add up to at least 5k records, but not more than 100k.
  4. Destination: SQL server table(s). Depending on the direction you are taking, you can move all the data to a single CSV file and dump it into SQL server at the end or direct the final destination tables to SQL server.
  5. Transformation – it must include TWO new columns (for each final destination) that is populated by (a) the current date and time so you know when that data was brought into the final dataset and (b) a second one to know where the data came from (source file name). This may be done through SSIS or in SQL server.
    Note: Filename capturing works only when the source is a flat file.  So, if your source is NOT a flat file,  you may want to make a CSV file an intermediate destination and then use this file as the source (Hint: Use derived column transformation to add a column)
    In addition it must include at least 3 of the following transformations: data conversion, derived column, data split, lookup, merge, merge join, multicast, union all, fuzzy lookup or any of the transforms not covered in class. 

Data sources: You are welcome to use datasets from work that has been sufficiently “anonymizedLinks to an external site.“. In fact this itself is a valuable transformation task that you can then use to protect your data and make it available for additional analysis/exploration. There are many public data sets that can be used (see “data sources” tab)

Submit: Use the text area to submit a project “proposal” that addresses the following points; I am not looking for an elaborate write up, but use these 4 prompts to develop 4 well-written paragraphs free from language/grammar errors. Please do not write it in Q&A format!

  1. Be sure to give a meaningful title. 
  2. Motivation for the project: what insights do you anticipate getting from this ETL project? 
  3. what problems do you anticipate during the ETL process?  Cleaning? Transforming? 
  4. What data will you be using? where will you be getting these? How many rows would you be processing in all? What are the keys (Pk/fk)

    And finally, include

  5. What type of decision support do you expect this project to provide? Would this have been possible with Excel? Why is this approach an improvement?
  6. An ERD showing how the data sets are related to each other (either source or destination tables – see “options” above)
  7. A subset of data from EACH file (5-10 rows and 5-10 columns) that shows the kind of data you are dealing with. For each file, be sure to identify what you would consider as a primary key. These can be included as a screenshot with column headers.
  8. The datasets, properly named. Its best that you create a folder called {myGateID}_Project and save your datafiles there. ZIP this FOLDER and attach it

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Creating C++ program that simulates an airport

You must do this project in fedora linux using C++ and use the command terminal as well. I will provide you the instructions here and as a file. This project is due 11/9/23 at 11:59p.m. You must provide me with instructions on how to compile this program and if you can make a Makefile that would be easier for me. I would greatly appreciate it if you could send me a video of you running the program so we dont have complications. The project is half finished beacuse it came with code that simulates the aircrafts I would suggest running what I provide you with first so you get an idea of what you have so far. I will also provide a video of what the program should look like once completed. I will provide this video once someone accepts this assignment.

You will be simulating an airport where 8 planes go out on tours repeatedly. Each tour will be
for exactly 12 passengers and last approximately 30 seconds. In performing the simulation,
you must make sure that no plane tries to leave a gate with less (or more) than 12 passengers
and that no plane lands or takes off at the same time as another plane is landing or taking off.
The first thing your program should do is read the following from the command line (in the
order specified):
• the total number of passengers that are in the airport.
• the sum total number of tours that all of the planes are to do. (NOT the number of tours
that each plane is to do, the total number of tours that all planes will do when their
number of completed tours is added together.)
You should then create 8 new threads, each one representing a (uniquely numbered) plane; the
main function should wait for all of the threads to complete and then exit. Each thread
represents an airplane, and should repeatedly follow these steps:
1. board. Waits for 12 passengers to get on the plane. Between each available passenger
boarding a random delay of between 0 and 2 seconds should be enforced. This can be
accomplished by calling sleep(rand()%3) after each passenger boards.
2. The associated plane should then be shown taxi-ing to the runway. See the provided
AirportAnimator class !
3. The associate plane should then use the runway to take off, animating such (see the
provided AirportAnimator class!) Of course, the plane should wait for exclusive access
to the runway.
4. The plane should then go on tour. This basically just sleeps for between 15 and 45
seconds, and can be accomplished by calling sleep(15+rand()%31).
5. The plane should then request to land. Once exclusive access to the runway is granted
to land, the plane landing should be animated (See the provided AirportAnimator class!)
6. The plane should then taxi back to its gate. See the provided AirportAnimator class!
7. Each passenger should then deplane and thus be returned to the “pool” of available
passengers. There should be a 1 second delay between each passenger deplaning.

After completing the above steps, you should update the number of completed tours (keeping
in mind that two planes could conceivably attempt to do so at the same time) and go back to
step 1 only if the number of tours required was not yet completed! Otherwise, the thread
should return. Don’t forget to use the provided AirportAnimator class!
You should appropriately update the status of the individual planes as each step is being
processed.
Problem Details
• This problem once again requires that you use a Linux machine to complete !
• You are being provided with code to display the requested animations. Do not wast time
trying to re-invent the wheel!
• Should you have to stop your program (via either ctrl-C or ctrl-Z), you may find the resulting
terminal in an unusable state. Typing reset (which may not be visible as you type it) should
fix the underlying problem.
Submission
You should post to Canvas both your C++ source code file(s) and a plain text file (not an
MS Word file) called read.me in a zip or tgz file. Make sure the “root” of your submission
is a folder (not just a collection of files.)
The read.me file should contain:
• your name and any other identifying information.
• any special details on how to compile your project
• any special details on how to run your project – note that you cannot circumvent the project
specifications here!
• any known bugs your project has, and possible fixes to those bugs (partial credit abounds
here).
• an overview of how you solved the project.
• You may put any other information you like in this file, although you are not required to do
so – one common additional set of entries is a “software engineering log” that indicates what
you have done every time you sat down and worked on the project. Many programmers find
that such actually helps you to finish projects faster!
The read.me file MUST also contain the answers to the following questions:
1. Try running your program with only 11 passengers. What happens? Why?
2. Try running your program with 12 passengers. What happens? Why?
3. Try running your program with 50 passengers and 100 tours. What happens? why?
4. Try running your program with 100 passengers and 20 tours. What happens? Why?
5. What is the minimum number of passengers that will guarantee avoidance of
deadlock? Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC451 assignment 5

 Instructions

In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Identify and explain the factors that have limited local law enforcement efforts against digital crime.

2. Explain and describe the best practices for collection, preservation, transportation, and storage of electronic evidence.

3. What is the importance of chain of custody as it relates to computer crime?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC266 week 6 assignment

 Instructions

1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protocols establish handshakes to exchange parameters which will be used to set up VPN connections. In this paper you will first describe the TLS/SSL VPN handshake followed by a the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

research and critical analysis nov 6

 Topics 

1. Succession Planning and Development of Leadership

2.  E-Waste Management in the Tech Industry

3. Air Pollution and its Impact on Heart Disease

Please upload the “writing the discussion section” packet with the first two forms filled out (you will save the actual recommendation (paragraph 3) for next week).

Forms of paragraph 1 and 2 of the discussion section

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now