w4110

 

Read the article “POV: Artificial Intelligence Is Changing Writing at the University: Let’s Embrace It.” and then decide how you want to respond to it. Choose one of the following ways.

  • Skeptic, challenging the author
  • Reflector, thinking about how the reading applies to you and others
  • Validator, supporting the author
  • Extender, applying the author’s principles to future situations

Descriptions of these roles are found below. Once you’ve decided, label your role in your initial post  (Skeptic, Reflector, Validator, or Extender). 

Skeptic – Challenge some items in the reading. Be specific about what you disagree with and provide substantive evidence (logic, examples, or even research). Here’s a way to start your post: “I disagree with many points in the editorial because…”

Reflector – Think about the concepts set forth in the reading as they relate to your own experiences or those of others. Be specific about your observations, explaining how you have reached your conclusions. Here’s a way to start your post: “Reading this article makes me think of a class I took a month ago…”

Validator – Support some items in the reading. Be specific about which points you agree with, explaining why you do. Provide evidence. Here’s a way to start your post: “I agree with many of the author’s points, such as…”

Extender – Show how the concepts might be applied in future situations. You may focus on both positive and negative ramifications. Be specific as you extend the conversation. Here’s a way to start your post: “This editorial made me wonder how the concepts might be applied to…”

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Assignment 3

 

Instructions

You must use the template I provided for this assignment since it will make it a lot easier for you. Failure to do so will result in a return of your paper for you to redo, a reduction in points, or both.

The final assignment has four parts. 

The first part involves picking something you found interesting from weeks one and two that you did not already write about in a forum or the first paper, exploring it beyond the readings, and expanding on it in a paper. This section of your paper must be at least three total pages long.

The second part involves picking one of the critical infrastructures you learned about in weeks three or four and writing about it using the six guidelines below.  You cannot write about the critical infrastructure you wrote about in either your first two papers or a forum.

The third part involves picking one of the critical infrastructures you learned about in weeks four or five and writing about it using the six guidelines below. You cannot write about the critical infrastructure you wrote about in the first two papers or a forum.

The final part of your paper involves picking something you found interesting from weeks six, seven, or eight that you did not already write about in a forum, exploring it beyond the readings, and expanding on it in a paper. This section of your paper must be at least three total pages long.

It is up to you to decide what will be the most interesting for you! 

You need to use the following outline for each of the two critical infrastructures:

  • Provide a Hypothetical Threat (cyber, natural disaster, or physical)
  • Brief background on the Critical Infrastructure as it relates to National Security
  • Elaborate on the known Risks/Threats/Hazards/Vulnerabilities from the Hypothetical Threat
  • Explain how damage from the Hypothetical Threat could impact the Dependencies/Interdependencies between critical infrastructure sectors
  • Existing Resiliency related to the Continuity of Operations
  • Consider how to Minimize Disruption that improves First Responder Safety. 

Technical Requirements

  • Write at least ten pages, per the guidance above, and include the title page, an abstract, and a reference page (these last three items are not part of the total page count).
  • Scholarly and credible references should be used. A good rule of thumb is at least two sources per content page.
  • Type in Times New Roman, 12 point, and double-spaced.
  • Students will follow the current APA Style (7th Edition) as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer security discussion

> Identify a recent online security breach. Provide a synopsis of what happened, including at least: what type of breach occurred, who was affected, and what information was involved.

> Use this case to help you then describe the consequences of Personally Identifiable Information (PII) being compromised and how an online security breach of Protected Health Information (PHI) might impact both employees and a company.

Need 2-3 pages with peer-reviewed citations. No introduction or conclusion needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux Forensics

Learning Objectives and Outcomes

Research information about Linux forensic investigations and appropriate tools.

Identify and describe three websites that provide highly relevant information to Linux forensic investigations.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.

Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.

For this assignment:

Research websites that provide information or tools for Linux forensic investigations.

Write a report that describes three of the most promising websites in detail and discusses why these resources might be helpful in a forensic examination.

Required Resources

Course textbook

Internet access

Submission Requirements

Format: Microsoft Word

Font: Arial, size 12, double-space

Citation Style: Follow your school’s preferred style guide

Length: 1–2 pages

Self-Assessment Checklist

I researched websites that provide information or tools for Linux forensic investigations.

I wrote a report that describes three of the most promising websites in detail and discusses why these resources might be helpful in a forensic examination.

I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyberwar

Write a 250- to 500-word reflection discussing how the internet is being used to wage a cyberwar that affects corporate privacy.

Make sure to support your reflection with at least 2 scholarly resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

lc3

Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a

starting address (in hex) and an ending address (in hex). Your program will then output the contents of

memory (in hex) between the provided ranges (inclusive).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ARTICLE REVIEW PAPER

  

you are to locate a peer reviewed journal related to the topic of your interest. The journal article should have been published recently (within the past 2-3 years) and should feature material that is directly related to the course material. Read the journal article thoroughly so you can discuss it. If you wish to use something other than a peer reviewed journal, please consult with your instructor before starting the Article Review.

Instructions

You will then prepare an article review related to the topic that you researched in the Learn material from the assigned module. The Article Review. that you create must be at least 750 words and be formatted according to APA style. 

Use the following section order to guide you in building your Article Review. but do not use the numbers in your section headers, only the names. Also, this is example is not in APA style, make sure your review follows APA styles, this is a guide NOT a template.

1. Bibliographical Reference:

a. Create a single bibliographical entry in APA style in the first section of your Article Review paper. This should include:

i. Detail the author(s) of the article

ii. Name of the Journal (including volume, issue, year, page numbers, etc.)

iii. Name of the article you are reviewing.

b. Note – You may also choose to identify the article you are reviewing (i.e. – The focus of this review will be “Article Name” published in “Journal Name” in “Year/Month”) and then simply cite it in a bibliographical entry at the end (see section 7).

 

2. Objectives:

a. After reviewing the article, use a bulleted list to identity the 3 to 5 primary points you feel the article addresses.

b. Simply put the bulleted list of those points in your Objectives section with something to the effect of “After reviewing “Article Name” the three main points addressed by the author(s) were: 

· Bullet one

· Bullet two

· Bullet three

 

3. Summary:

a. Summarize the article you reviewed in approximately 2 or 3 full paragraphs. 

b. Do not use direct quotes at all. If you need to quote it, paraphrase what you read. 

c. Use the bullets above (section 2b) to structure what you wish to discuss in this summary (i.e. – In the first paragraph, summarize the article section which addresses the first bullet in 2b and so on).
 

4. Results:

a. Now that you have read this article and summarized it, what do you feel that a reader can learn about the topic from the article?

b. Using bullet points, highlight the things you feel like you learned more about after reading this article. It’s best to keep this list to a maximum of 5 bullets. 

c. Note – these bullets should not be identical to the bullets in the Objective Section (2b).

 

5. Critique:

a. Use this section to provide an academic critique of the article. 

i. How well (or poorly) was this article written? 

ii. Did it accomplish the objectives it set out to do (think back to the Objectives section)?

iii. Why or why not?

b. Explain your opinion and offer some additional sources (no more than one or two) to support that opinion. 

c. When possible, address the subject matter from a biblical perspective (e.g. – the Bible teaches us to… and this article addresses that by…)

 

6. Questions:

a. List a minimum of 3 (no more than 5) questions that arose from the reading of this article in a numbered list

b. Consider any thing you feel like you should have learned from the article but did not. 

c. Note – These questions may spark your desire to review other matter on the topic and may even be used as a starting point for one of your two research papers (though this is not required).

 

7. Bibliography:

a. You need to use one other source to support or deny your opinion and if you chose to only identify the article in section 1, you will want to make a bibliography.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Q1

  1. Question Formulation (10 points): You need to devise a question that can be  answered through data analysis. This question should be of your own creation,  and it should reflect your curiosity and interest. 

2. Data collection (15 points): You are responsible for finding the appropriate  dataset that aligns with your chosen question. Ensure that the data is clean and  organized for analysis. If you don’t know where to find the data set, you can use  Kaggle.com It can give you more inspiration about the question formulation and  data collection. You need to state where you get your data from in order to  receive credits.

 3. Exploratory Data Analysis (30 points): Conduct an EDA to understand the  characteristics of your dataset. This step will help you gain insights and identify  patterns in the data. (Similar to Assignment 2.) Here are some key components of  EDA I am expecting from your paper: (6 points for each following component (if  your EDA does not have any categorical variable), or 5 points each (if your EDA  has the analysis of categorical variables.) 

1) summary statistics: compute basic statistics for the dataset, such as mean,  median, standard deviation, minimum, maximum, and quartiles. It provides an  overview of the data’s central tendencies and spread.

 2) Data Visualization: Create various plots and charts to visualize the data’s  distribution and relationships. Common visualization tools include histograms, box  plots, scatter plots, bar graphs, and line graphs.

 3) Data Distribution: Examine the distribution of individual variables. This helps in  identifying whether the data is normally distributed, skewed, or exhibits other  patterns. Understanding the distribution can influence the choice of statistical  tests and modeling techniques.

 4) Correlation Analysis: Determine the relationships between variables using  correlation coefficients or scatter plots. It can reveal potential associations and  dependencies between variables. 

5) Categorical Variables (If your data involves this type of variable and you think it  is important to answer your question. If the categorical variables are not that  important to answer your questions, don’t worry about it.): Explore the  distribution of categorical variables using frequency tables, bar charts, or pie  charts.

 6) Hypothesis Generation: Eventually your exploratory data analysis can lead to  the formulation of hypotheses about relationships or patterns in the data to  answer your question or guide further analysis.

 4. Machine Learning (15 points): Apply a machine learning algorithm to address  your question. You are only required to choose one type of algorithm for this  mini-project but you may have to run it multiple times with different variables,  and you will decide what it is best for your result. You have the flexibility to  choose from the algorithms we’ve learned in class, but make sure the selected  algorithm is appropriate for your data. Alternatively, if you find a specific  algorithm outside of your class materials that suits your needs, you are welcome  to use it. 

5. Project Structure (20 points): While this is a mini-project, your report should  follow a structure similar to a combination of Assignment 2 and Assignment 3.  This means it should include sections for introduction, Data collection and  Preprocessing, EDA, Machine Learning, Results and Discussion, and Conclusion. 

6. Data Attribution and References (10 points): In the conclusion section of your  report, make sure to include a subsection titled “Data Attribution and  References.” In this subsection, provide a detailed list of the sources where you  obtained your data, including the dataset name, the organization or website from  which it was sourced, and any relevant publication or citation information. Additionally, if you consulted external research papers, articles, or resources  during your project, please list these references in the same section.

 General Requirements 

1) You will need to write up your questions, findings, interpretations, and results for  this assignment. It will be a great idea to screenshot your codes, results, and graphs  so that you can explain your findings along with them. (It is also easier for me to  follow you when I read your paper). A pdf file is required. There is no page limit but  try to be straightforward with your answers.  

2) The py file that you have used to finish your assignment. (It may be a duplicate or  somewhat duplicate of the screenshots that you have inserted in your paper but  that is okay. I would like to look over your codes.) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

smart system research project

Please refer to the attached documents for the assignment.

Assignment Details: 

Part I – Using the attached Requirements template, create a list of requirements for a Smart Highway with at least five (5) integrated Smart systems identified in your research with at least 40 requirements (total) for these five (5) Smart systems. PMI (2021) indicates “the term requirement generally refers to a customer need while specification refers to a detailed, usually technical description of how that need will be met” (para. 1). A Requirement states what a product must/will/can do or a quality it possesses. A Specification is a collection of requirements that are used in the design of that product. Do not include specifications (such as products that you discover) – just requirements. 

Part II – Write at least a 5 page Word document, double-spaced, detailing your proposed trip on a Smart Highway. The paper must include all five (5) of the integrated Smart systems identified in your research and two (2) requirements for each of the five (5) integrated Smart systems.  Your paper must include at least seven (7) references along with their in-text citations. Research must include scholarly references but can also include YouTube videos, websites, blogs, etc. on the Smart system(s). Also view YouTube videos on Augmented Reality and Virtual Reality to extend your research on how Smart systems may evolve over time. 

Submit your paper and your Requirements list, using the template provided.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

firewall

1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating controls and provide a solution for the scenario:

You head up a small team of IT and cyber professionals tasked with ensuring network security. A recent malware has come to light that involves exploiting several ports and protocols, specifically port 22, port 25, port 53 TCP, port 80, and port 8080. Identify each of the ports and protocols associated. What compensating controls could be utilized to ensure security?

2. Investigate the advantages and disadvantages of hardware, software, and cloud firewalls. If you were asked to make a firewall recommendation for a business, what information would you need to know about the business to provide the best solution?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now