Computer Science Week 8 Assignment Home Office Renovation – Project Proposal: WBS and Project Schedule (Use my Week 5 assignment)

Overview

In the assignment due in Week 5, you defined key portions of your Home Office Renovation project. Now, it is time to develop a work breakdown structure (WBS) and project schedule for your project.

Note: Please use your project from the Week 5 assignment to complete this assignment.

For this assignment, you will create Work Breakdown Structure (WBS). To create your WBS, you may use MS Word, MS Excel, Visio, or any other visual format that allows for graphical elements to be included. (See Figure 4.4 from Chapter 4 of your Project Management: The Managerial Process textbook). Alternatively, you may use a coded format using MS Word. (See Exhibit 4.1 – Coding the WBS from Chapter 4 of your Project Management: The Managerial Process textbook as an example. The example is in MS Project format, but the same could be done in MS Excel).

Instructions

Each of the following should be included in your WBS submission:

  1. Create a WBS which contains graphical elements of the project scope including the project, major deliverables, and supporting deliverables. WBS should be easy to read and contain consistent formatting throughout.
  2. Create a depiction of the project within the WBS.
    • One Level 1 is provided describing the complete project.
    • Three Level 2s are provided describing major deliverables.
    • Three Level 3s are provided describing supporting deliverables.
    • Two Level 4s are provided with the lowest manageable responsibility level.
  3. For each of the identified deliverables (identified in the four levels from item #2), create a project schedule containing all activities from levels 1-4. Each activity should contain a start and end date and a list of resources required to complete the project.
  4. Provide a minimum of three pieces of information that need to be communicated to stakeholders. For each of the three pieces – which creates an example of a project network – you should address who will be targeted; when they will receive the communication; what will be communicated; and how it will be communicated.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Develop a project plan including the critical elements of project scope, priorities, work breakdown structure (WBS), communication plan, and a project network to ensure effective implementation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Assignment – Phish-a-Prof

 

In this assignment, you are taking on the role of a person who is responsible for raising awareness of the threats and posted by phishing messages.  The target audience is the faculty members and administrators at Adelphi.  You want to create an example of a phishing message that can be used to demonstrate effective techniques used by such messages and help train faculty and administration to avoid falling for such scams.

For this part, your team will design an effective phishing message.  Your design must include a subject line and a message body.  In the message body, you can use the following placeholders to make the phish more realistic:

  • [FIRST]        First name of recipient
  • [LAST]         Last name of recipient
  • [EMAIL]       Email address included in the message
  • [URL]           URL of a phishing landing page (you can specify the text that would be displayed for the link)

Be creative as you want, as long as you keep the tone and content “business appropriate.”  Remember the target audience and tailor your messages for the target audience.  

If you want to incorporate graphics feel free to do so.  You can submit either an email text (with appropriate placeholders) or a PDF of a formatted message. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC266 week 7 assignment

 

Instructions

1. Quantum Cryptography is the future of cryptography. Quantum Cryptography is still being developed and as with every new technology, the Internet is booming with information about Quantum Cryptography. In this paper, you are going to synthesize what you think Quantum cryptography is and explain its applicability is next generation cryptographic algorithms and information privacy.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Diversity, Equity, and Inclusion Campaign

 

Scenario

You are newly appointed to the communications team for a reputable, multi-faceted philanthropic organization, Momentum for Better. The current task for your team is to create a brand-new campaign that promotes Diversity, Equity, and Inclusion. To kick off this campaign, you have been asked to develop a mood board presentation and written summary that you will present to leadership at the upcoming annual meeting.

You are reminded that a mood board is a deliverable—a collage of images, colors, patterns/textures, and text—that visually describes the intended look & feel of the campaign.

You DON’T need to be an artist or designer to create a mood board, but you DO need to have a keen understanding of what various visuals communicate and how they make people feel. Keep in mind the various ways that you analyzed and evaluated visuals throughout this course.

Instructions

Mood Board Presentation

  1. First, create a Microsoft PowerPoint presentation. Your presentation will need to have the slides listed below clearly labeled.
  2. Visually compelling title slide
  3. Colors and Patterns
  4. Logos, Ethos, Pathos
  5. Graphics
  6. Delivery Methods
  7. Memes
  8. Second, think about the overall look & feel that you want the campaign to have. Then, search the web for examples of the kinds of images, graphics, colors, and patterns/textures that you have in mind.
  9. Third, copy and paste those images, graphics, etc., into the appropriate slides of your Microsoft PowerPoint presentation. You must have at least four (4) images per slide, except for the Memes slide, which just needs two (2). The images should fill up as much of the slide as possible but DON’T stretch or squish the images. Here is more detail about the types of images you need to include in the slides.
  10. Visually compelling title slide
  11. Include one main image and a title for your presentation.
  12. Include the organization’s name, Momentum for Better.
  13. Colors and Patterns
  14. Your color scheme must feature two colors.
  15. Images of color swatches or things that are your chosen colors (e.g., fire engine red, canary yellow, etc.).
  16. Patterns or textures that feature strong use of lines (e.g., stripes, swirls, borders, plaid, etc.).
  17. Logos, Ethos, Pathos (choose one main rhetorical approach)
  18. Photos of people that signify your chosen rhetorical approach.
  19. Photos must include people of various genders, ethnicities, and ages.
  20. Graphics
  21. Logo and/or symbol graphics that convey diversity, equity, and inclusion.
  22. Delivery Methods
  23. Images of two (2) chosen delivery methods for spreading awareness about the campaign. For example, if you want social media to be one of the options, then include photos of a person using social media.
  24. Memes
  25. Create two (2) positive, inspiring memes that fit the overall message of Diversity, Equity, and Inclusion. Don’t make the memes funny, satirical, or divisive.
  26. You can only use public domain or Creative Commons licensed images. You CAN’T use images from movies, shows, comics, books, video games, etc.
  27. You may use PowerPoint, Canva, Adobe Express, Microsoft Paint, or any other app to create the memes. Save them as a JPG or PNG file, then insert them into your PowerPoint presentation.
  28. Fourth, as you develop the visually compelling title slide and all the other slides, you need to demonstrate your understanding of visual presentation. In other words, your slides need to be aesthetically pleasing with good visual connectivity.

Written Summary

Once you’ve finished creating your mood board presentation, you need to write a detailed summary explaining why you chose the visuals that you did. Your summary should include the following:

  1. In a Microsoft Word document, use APA formatting. The title on your title page must match the title slide of your mood board presentation.
  2. Your introductory paragraph must explain your overall intended look & feel for the campaign and how it will communicate Diversity, Equity, and Inclusion. For example, will it be serene, energetic, serious, or something else?
  3. Include section headings in your summary, and these must match the slide labels from your mood board presentation.

Each section must contain 2–3 full paragraphs explaining your chosen images in detail. Keep in mind how you’ve analyzed and evaluated visuals throughout this course. Connect them to the overarching message of Diversity, Equity, and Inclusion. You’ll be graded on your ability to defend your choices and clearly articulate your analysis.

Submit a PowerPoint presentation (PPTX) and Microsoft Word document (DOCX).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Nearest Neighbors for Categorical Prediction

 

Unit Outcomes:

  • Integrate methods for assessing risks.
  • Prepare a rubric for classifying risk.
  • Report results of risk analysis.

Course Outcome:

IT528-3: Develop appropriate action plans that address risks.

Purpose

There are many methods for categorical prediction using principal components. In this Assignment, you will practice one of these — linear discriminant analysis, in R Studio. You will classify risk through the rubric of a risk matrix and then build a model to assess the risk. Once you have built a model, you will report and explain the results.

Assignment Instructions

Much has been made of the deteriorating public infrastructure in the United States. Roads, bridges, sidewalks, etc. need repair all over the country. This Assignment will focus on bridges. Engineers with responsibility for bridges categorize them into one of four categories with respect to risk: Monitor, Schedule Assessment, Schedule Repair/Replacement, or Immediate Repair/Replacement. Monitor means that the bridge is in good condition and is not in danger of failing. Schedule Assessment means that the bridge is showing signs of risk and should be evaluated. Schedule Repair/Replacement means that the bridge has deterioration that presents risk to users. Immediate Repair/Replacement means that the bridge has deterioration that presents risk of failure. In a Word document, create a four-quadrant risk matrix rubric and label the quadrants High Risk/High Impact; High Risk/Low Impact; Low Risk/High Impact; Low Risk/Low Impact. Place each of the four bridge conditions into the quadrant that you believe is appropriate for that condition. You need not have something in each of the four quadrants – your task is to appropriately assess and classify risk based on bridge condition. For each of the four bridge conditions, within the quadrant you selected in the risk matrix, give an example of an issue that may arise if the risk condition is not addressed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Scripting Assignment

 

Create a PowerPoint presentation with following (Save as w8_firstname_lastname.PPTX).

We did not cover PowerShell in this course; you are tasked to use PowerShell as your scripting language.

Create at least 9 Slides to cover the following:-

1) The role of scripting in system administration

2) How to apply security measures in scripting

3) What is PowerShell

4) Can PowerShell run in other platforms

5) How to Assign variables

6) How to use if-then

7) How to use loops

8) How do I apply security on PowerShell scripts

9) How do I use PowerShell Scripting in everyday tasks?

Note: Please explain the above 9 requirements in your own words. Go into detail on each slide so it is clear that the concepts you are stating are explained and understood by you. For example, a list of security protocols will not be sufficient for full credit without an explanation of each protocol.

Requirements

Points

Comment block. (Slide 1)

10

Presentation

70

conclusion slide

30

TOTAL POINTS

100

Keep the presentation clean and simple, select soft colors and font size. Remember it is a presentation, you are presenting this to others with different skills.

Submit your week 8 work in w8_firstname_lastname.PPTX

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

evolution of computer science

write a scientific report on evolution of computer science 

the require is already attached 

word 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cybersecurity

Cybersecurity principles of IT focus on a set of practices intended to keep a corporate infrastructure secure. These practices include, but are not limited to, system, data, internal, external, and physical security. The principles are designed to prevent unauthorized access or alterations of a corporate environment. By understanding how cybersecurity principles are defined, they can then be used to develop a comprehensive, corporate-specific security policy.

Using the format of your choice, create a chart that defines the principles of cybersecurity listed below:

  • Separation (of domains/duties)
  • Isolation
  • Encapsulation
  • Modularity
  • Simplicity of Design (economy of mechanism)
  • Minimization of implementation (least common mechanism)
  • Open Design
  • Complete Mediation
  • Layering (defense in depth)
  • Least Privilege
  • Fail-Safe Defaults (open/secure)
  • Least Astonishment (psychological acceptability)
  • Minimize Trust Surface (reluctance to trust)
  • Usability
  • Trust Relationships

For each of the principles listed, include the following:

  • Definition of the cybersecurity principle (1-2 sentences written in your own words).
  • Description for why each principle is important to security and how it enables the development of security mechanisms to implement desired security policies.
  • Include an in-text citation for each principle listed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Project

 

IT 600 Final Project Guidelines and Rubric

Overview

IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.

For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global enterprise that provides premium technical support to other enterprise businesses.

Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management, maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review.

SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operating system if you have the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evaluation incrementally.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.

Prompt

Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the I/O subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review.

Specifically, the following critical elements must be addressed:

  1. Organizational Needs and Requirements
    1. Develop an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads anticipated for the operating system.
    2. What are the organizational, security, and performance and reliability requirements related to operating system function,
      management, and maintenance?
  2. Computer Architecture
    1. What hardware is required to host the operating system? This should include an identification of the minimal hardware required and an assessment of what would be needed to support organizational needs and requirements.
    2. Analyze the architecture in terms of support and functionality of process management, memory management, I/O, and mass storage.
    3. Analyze the architectural support for multiprocessor systems and assess the organization, connection, and control aspects. What are some architectural issues that might arise regarding technologies used in multiprocessor systems and how would you recommend utilizing multiprocessor systems in light of these issues?
  3. Process Management
    1. Assess the operating system process management in terms of its responsiveness to organizational requirements. Use process monitoring tools to gather data for your assessment.
    2. Assess software tools for thread analysis and deadlock detection that are available for the operating system. What strategies does the operating system provide for handling deadlocks?
    3. What support does the operating system provide for multiprocessing? Assess the applicability and ability of the operating system to allocate tasks between multiple processors.
  4. Memory Management
    1. Describe how the types of memory supported by the operating system are used. What memory abstraction does the system use? Use an analysis tool to investigate the mapping to physical memory.
    2. Describe the system support for virtual memory, memory paging, and segmentation. Use a monitoring tool to assess their activity under heavily loaded conditions.
    3. Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity.
  5. I/O and Mass Storage
    1. Describe the hardware-software interface for I/O management used by the operating system. Various techniques are used for enabling the operating system to communicate with devices. What techniques are supported and what are their advantages and disadvantages?
    2. Analyze the file systems supported by the operating system. Use file system performance tests to assess the available file systems.
    3. What is the relationship between scheduled process context switching and I/O interrupt handling? Analyze the use of device interrupts in the operating system and compare them to other possible approaches to input/output.
  6. Security
    1. What formal security model does the system support? Analyze the system to determine what support it provides for implementing security models and assess the relevant tools and services made available to administrators.
    2. Recommend techniques and best practices to further support security of the operating system.
  7. Overall Evaluation: Using the defined requirements, analyses, and assessments, develop a comprehensive detailed technology
    recommendation. Include an integrated assessment of the operating system’s capability to support organizational needs and technical requirements.

Milestones

Milestone One: Situation Analysis
In Module Two, you will conduct a situational analysis. You will write a short paper that describes the business-related challenges faced by the organization. This milestone will be graded with the Milestone One Rubric.

Milestone Two: Analytical Organizational Profile
In Module Three, you will conduct an analytical organizational profile. Your work will be completed in the Milestone Two Template document. This milestone will be graded with the Milestone Two Rubric.

Milestone Three: Full Organizational Profile
In Module Seven, you will complete a full organizational profile. Your work will be completed in the Milestone Three Template document. This milestone will be graded with the Milestone Three Rubric.

Final Submission: Technical Evaluation of an Operating System
In Module Nine, you will consider the questions below and make revisions to the document you submitted for Milestone Three. With your Milestone Three document in front of you, consider the following and make revisions as necessary:

  1. Have you incorporated all of the feedback and suggestions you received from your instructor?
  2. Does your submission address all of the critical elements outlined above?
  3. Does the operating system you selected match the specific requirements your organization identified?
  4. Do you have title and references pages?
  5. Is your submission at least 15 pages of content not including title and reference pages?
  6. Have you supported each of your positions with a credible source?
  7. Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos?
  8. Does your submission make a clearly stated recommendation for an operating system?

Your final submission should be a polished artifact containing all of the critical elements of the final project. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric (below).

What to Submit

Your report should be 15 pages double-spaced paper or the completed template provided in Milestone Three, professionally written, with necessary citations in APA format and any accompanying visuals or additional artifacts submitted as part of an appendix section.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Governance Portfolio Project

Required 8 Pages.

    

Deliverable

You will conduct   a literature review (scholarly sources only) on Information Governance. You   will determine how researchers have attempted to examine that issue by   collecting data (you are not collecting data; just reporting on prior   research).

As you read   the literature, it will become apparent that there are multiple issues.   Select one issue that stands out in the literature and address it. You must   end up with at least five scholarly sources on which you will base your   paper. 

Format 

Your   paper will include the following sections. Do not use any format other than   an attached Microsoft Word file. Use a standard font style and size. A page   in the body of your paper (other than the Cover, TOC, and References) is   equivalent to approximately 250 words. In total, the body of your paper can   range from a minimum of eight pages (2,000 words). The match percentage cannot exceed 20% (highly suggested to   paraphrase sources).

Cover (1   page): 

Include your   name, course, and date.

Table of   Contents (1-2 pages): 

Use a   Microsoft Enabled Table of Contents feature.

Background   of the Problem (1-2 pages): 

Describe   the problem and elaborate on any previous attempts to examine that issue.

Research   Questions (1-2 pages):

For the   identified problem, discuss the research questions that were posed.

Methodology(-ies)   and Design(s) (2-3 pages):

Discuss   the methodology(-ies) (e.g., quantitative, qualitative) and design(s) (e.g.,   case study, survey) the researchers used. Describe some of the chosen populations.

Data   Analysis (2-3 pages):

Discuss   some of the findings.

Conclusions   (1-2 pages):

Discuss   some of the conclusions.

Professional   Application (1-2 pages):

Discuss   the relevance of the research to your own profession and/or career.

References   (1-2 pages):

Include   at least five scholarly references in APA format (all these must also be   cited throughout your paper).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now