Computer Science Need help with assignment

Topic  

  1. Environmental impact of E-Waste in developed and developing countries. How is disposal handled differently?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

HW5

Introduction

Now that you have a grasp of SQL, let’s start to get familiar with a database! Make sure you review the overviews of a variety of database platforms. For this course, we will work with Microsoft SQL Server. In the real world, remember, it’s all about the right tool for the right job. Microsoft SQL was chosen for this class because it is well-known in the field, and provides a good foundational understanding of databases with a management tool that is GUI based. (Read more about the Top 10 Databases to Use in 2021Links to an external site.Links to an external site.). 

Directions

  1. Download Microsoft Access
  2. Use your tables to build your relationships. Refer to the Lecture Video (Panopto) for help. 
  3. Once your relationship is built, review the ERD Diagram inside Access. 
  4. If it is different than your original diagram, write a no more than 1-page summary of what has changed and why. 
  5. Think about what data is missing from your database, and add one additional source to your design if needed. 

Submission

  • A copy of your ERD saved from Microsoft Access (Showing the relationships) with your new data source from number 5 above (If needed). 
  • Reflect on what has changed during the creation of your datasets (Minimum of 1 – page). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC266 final

 

Instructions

Details of Project Paper (10%): You must include at least ten references.

Prepare a 10-15 page paper in Microsoft Word (counts as 10% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page). The paper should be between 2500 to 5300 words excluding the title page content and the references page content. At a minimum include the following:

  • Detailed description of the area researched
  • Technology involved in the area
  • Future trends in the area
  • Example companies involved in the area
  • Regulatory issues surrounding the area
  • Global implications for the area
  • References (minimum of 10)

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The paper must be at least 10 pages double-spaced, 1″ margin all around, black 12 point font (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc… are extra – allowed but extra for the minimum page count). The title page and references are also required but don’t count in the minimum page count. A minimum of 10 references are required.

The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).

Papers will be automatically added to and checked against the standard Turnitin repositories. Originality reports will be returned to the faculty and student in roughly 15 minutes of the submission. Multiple submissions are allowed.

Save the file using the following file naming convention: ISSC366_Project_First_Last.doc(x) (where first and last are your first and last names resp.) and submit the file in this assignment area.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC451 Term final

 

Instructions

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 5-8 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 8.
  4. In addition to the 5-8 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  10. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Remote work

The remote workplace has become common throughout all industries, and as such, presents new challenges for cybersecurity professionals and new opportunities for bad actors. Moving a workforce to a remote work scenario requires that current security policies be adjusted to consider remote work-specific attack vectors and associated vulnerabilities.

Create a 10- to 12-slide digital presentation for upper-level management exploring cybersecurity issues related to remote work, including data loss prevention (DLP), secure network connectivity, confidentiality, insecure local environments, etc. Additional considerations are expected to be presented beyond the few suggested. Also research remote work security design failures that leave companies with remote workers vulnerable to attack. Address the following:

  • Describe four security design failures specifically related to remote work and not working in general. Identify the specific design principles that have been violated for each security design failure.
  • Relate the security failures to the principles of cybersecurity (CIA triad).
  • Identify the design principles involved or needed for remote workers.
  • Include a title slide, reference slide, and detailed slide notes, with citations and references explaining what is being presented on each slide.

Additionally, include graphics that are relevant to the content, visually appealing, and use space appropriately. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT project

 

INSS 662 Project : You are required to use Weka or other open source data mining software, not Watson. 

1. Find an open dataset on the Internet, see below 

2. Conduct appropriate data mining activities and report the processes and outcomesYou need to use at least three competitive algorithms from the same or different classes of Data mining or Machine Learning techniques. See the lecture slides for Chapter 5 for algorithms and techniques under course materials. 

3. Present your results.

Possible data sets to choose from:

Data from Hackathon such as  the Lord of the Machines – Data Science HackathonDataHack Premier LeagueMckinsey Analytics Online Hackathon,  etc.   (Be brave  to take challenging  problem …)

Possible sources are: 

a. https://archive.ics.uci.edu/ml/index.php  

b. https://www.kaggle.com/datasets  

c. https://www.kdnuggets.com/datasets/index.html (Datasets for Data Mining and Data Science)

d.  open government dataset @ https://catalog.data.gov/dataset?groups=local

e. Dataset from URL: https://www.ibm.com/communities/analytics/watson-analytics-blog/guide-to-sample-datasets/

OR

f. Other datasets after getting approval from the instructors.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hefty Hardware Case Study

subject name: Organization Leadership & Decision Making

  • Hefty Hardware Case Study: Read the Hefty Hardware Case Study on pages 76-79 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. The grading rubric is in Rubrics in the Content folder.  Please be sure you view the grading rubric before starting the assignment.
  • Weekly case studies will be assigned to supplement the required readings. Case studies will be prepare APA form and style with supporting citations and references and application of course concepts.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3 Case Studies

Case Study 2.1

Case Study:

You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least two peer reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 3.1

Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan to use in your lab. Be sure to cite references, such as the ISO standard or NIST, to support your procedure. Make sure you use APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 2.1

Address the six questions associated with the chapter two Case study, “From Steve Jobs to Tim Cook – Apple” on page 23 in a three to five page paper (excluding title, abstract, and reference pages). Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment must be in 7th edition APA compliance.

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week-1 Case Study

 

Case Analysis 1 – Tesla Motors (40 pts)

Please answer the following questions:

1. Is the Tesla Model S a radical innovation or an incremental innovation?  Competence enhancing or destroying, and from whose perspective? Is it a component or an architectural innovation?

2. What factors do you think influence the rate at which consumers have adopted (or will adopt) the Tesla Model S?

3. Where do you think electric vehicle battery technology is on the technology s curve?

4. Do you think Tesla Motors will be profitable? Why or why not?

5. Importantly, apply as many of the COs (Course Objectives) as you can to the case. These are given for reference below.

Your Case should be at least 3 pages (at least 800 words), double spaced, have at least four (4) references using APA format (you may use one or two references cited from the case but you should have at least two additional unique reference from your own research) , and typed in an easy-to-read font (Times New Roman 12 font recommended) in MS Word (no pdfs or rtfs or non standard formats). Please include a cover sheet with your full name, the case name, our course number (NETW583), and the date you submit.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

6 Computer Class Discussions

  6 discussions 200 words each minimum

1

“IT Infrastructure and Architecture” Please respond to the following:

  • Think      about a company you know well. What would be an example of IT architecture      at that company? An example of the IT infrastructure? 
  • What,      in your opinion, is the difference between a decentralized architecture      and a centralized architecture? What is an example of a business decision      that would be affected by the choice of the architecture?

2

” Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)” Please respond to the following:

  • With      the proliferation of smart phones and intelligent computing tablets such      as the iPad, enterprises are increasingly faced with employees who want to      bring their own devices and connect to enterprise systems. Determine      whether or not employers should allow this type of connectivity to      enterprise systems. Support your reasoning with three examples.

3

” Case Study Part 1: Sony Pictures” Please respond to the following:

  • Setting      aside the political issues between North Korea and the United States, is      there a reasonable way to respond to an anonymous threat found on the      Internet somewhere? What elements would you require before canceling the      film if you were CEO of Sony? If you were CEO of a chain of theaters?
  • What      access and data protection controls would you recommend Sony use to      provide better security for unreleased digital films and e-mails?

4

” Case Study Part 2: Sony Pictures” Please respond to the following:

  • If you      were a hacker, what approach would you have used to break into Sony’s      system?
  • What      do you think the most important SETA elements would be to prevent future      hacker attacks against Sony or other media firms?

5

“Total Cost of Ownership (TCO)” Please respond to the following:

  • TCO is      one way to account for costs associated with a specific infrastructure.      This method does not include additional costs such as disposal costs — the      costs to dispose of the system when it is no longer of use. What other      additional costs might be of importance in making total cost calculations?

6

“Information System Investments” Please respond to the following:

  • Describe      the conditions under which ROI, payback period, NPV, and EVA are most      appropriately applied to information systems investments.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now