Computer Science
Enterprise Architecture
Responses to Other Students: Respond to your fellow classmates about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions: What did you learn from your classmate’s posting? What additional questions do you have after reading the posting? What differences or similarities do you see between your posting and other classmates’ postings?
Stakeholder Analysis
Hide Assignment Information Turnitin® This assignment will be submitted to Turnitin®. Instructions Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux. The company is specifically interested in seeing the following information: (10.1.1: Identify the problem to be solved.) Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux? The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface). (10.1.2: Gather project requirements to meet stakeholder needs.) What steps will be required to migrate the systems from Windows to Linux? Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface. (10.1.3: Define the specifications of required technologies.) What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing). (1.1.3: Present ideas in a clear, logical order appropriate to the task.) The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation. An introductory slide A summary slide Voice narration on every slide For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required. (1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.) You must cite at least two quality sources. You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification. Use the Migration Proposal Presentation template to get started. (2.3.1: State conclusions or solutions clearly and precisely.) You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide. How Will My Work Be Evaluated? As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. The following evaluation criteria aligned to the competencies will be used to grade your assignment: 1.1.3: Present ideas in a clear, logical order appropriate to the task. 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 2.3.1: State conclusions or solutions clearly and precisely. 10.1.1: Identify the problem to be solved. 10.1.2: Gather project requirements to meet stakeholder needs. 10.1.3: Define the specifications of the required technologies. Criteria 1.1.3: Present ideas in a clear, logical order appropriate to the task. 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 2.3.1: State conclusions or solutions clearly and precisely. 10.1.1: Identify the problem to be solved. 10.1.2: Gather project requirements to meet stakeholder needs. 10.1.3: Define the specifications of required technologies.
Malware Developers
Disaster Recovery Topic: Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation. Assignment should follow all APA rules and include a min. of (3) citation/reference.
ICT Safety and Management
Journal/ proceeding (academic) article related to ICT safety and Management write a critique of the article by using the guide provided
Open System Interconnection
For your final assignment, please address the following (Do not use PowerPoint): In your research/synthesis, you will thoroughly address each topic . 1. Explain computer literacy. 2. Explain computer algorithms and its significance. 3. Explain some of the technologies that have contributed to the exponential growth of the Internet and the World Wide Web (WWW.) 4. Describe software development in respect to the Systems Development Life Cycle (SDLC) using applicable model. 5. Diagram major hardware components of a computing system. 6. Build a table of the Open System Interconnection (OSI) seven layers. 7. Summarize some security concerns of the Internet and computer use. Use APA format for citations/sources to give your source credit. This is good scholarly practice and required in the Information Technology Department. For nonperiodical Web Document, Web Page, or Report, use the following below: Author, A. A., & Author, B. B. (Date of publication). Title of document. Retrieved from http://Web address Success, A., Commitment, B., & Willing, A. (2015, June 5). Example format to following when pulling from a web page. Retrieved from http:XXXXXXXXXX REMEMBER : When there is no listed date, use (n.d.) for no date.
What Is Data Mining?
As the number of data on the internet increases, the extraction of data professionally and keeping it secure without allowing it from falling into the wrong hands, and is an increasingly important part of any organizations ability to manage and protect critical and confidential information. In this regard, you are asked to do some research, and write a report that answers the crucial questions related to Data Mining: You should tackle the following points: 1. What is Data mining? What does it imply? 2. Data mining is involved in many fields and has several applications such as in Business. Describe how data mining can be used in business and what are its impacts. 3. What is KDD? 4. How does Data mining relate to KDD (similarity), and what is the difference between them? Discuss each briefly. 5. List three Security Issues Related to Data Mining. Report Writing: You should follow the following guidelines while writing your report: ? Your report should be between 300 and 400 words in length. ? Ensure that your report has an appropriate structure and writing style. ? Your report should include at least one figure/table. ? You should include the references (at least two). 2: Turtle Graphics is a Python feature like a drawing board, which lets us command a turtle to draw all over it! We can use functions like penup(), pendown() pensize(..), forward ( ) , right( ), color( ), fill( ), etc. which can control the drawing, move the turtle around, and make the proper coloring and filling. Commonly used turtle methods are found in the posted pdf file turtle Turtle graphics Python 3.7.1rc1 documentation To make use of the turtle methods and functionalities, we need to import turtle. turtle comes packed with the standard Python package and need not be installed externally. The roadmap for executing a turtle program follows 3 steps: 1. Import the turtle module 2. Create a turtle to control. 3. Draw around using the turtle methods. Problem: In geometry, a star is a five-sided polygon. Each internal angle is 36 degrees. Based on what you have learned in this course and using the appropriate commands, you are asked to implement a python program that draws the below diagram using the turtle. You should consider the following points in your solution: 1- Each side has a length of 60 units. 2- Stars have at least 4 different border colors. 3- Stars are all filled with the shown color. 4- The border lines should be thick enough. 5- The final shape of the output should be as shown above. 6- You might place the desired colors in a list to access them by index in the drawing loop. 7- Make sure to set properly the starting position (x & y) of your drawing, to maintain the above diagram. Hint: You can use the below colors and fills colors= [‘red’, ‘pink’, ‘brown’, ‘orange, black’, ‘purple’, ‘cyan’, ‘green’] fill= [‘green’, ‘black’, ‘orange’, ‘brown’, ‘pink’, ‘cyan’, ‘purple’, ‘red’]
Incident Command System
Research the Deepwater Horizon oil spill and describe how the incident was handled regarding incident command. Did they follow the ICS system? What were some mistakes? Make some recommendations. With as much detail as possible, please answer the following questions as they apply to that event. Be sure to include a summary of the event. Describe the Command and Control Process. Describe the role of the Incident Commander. Define the term “Span of Control For this assignment, write a 2 page APA formatted paper. Times New Roman 12 font Use a minimum of two resources http://currents.plos.org/disasters/index.html%3Fp=1985.html https://sunlightfoundation.com/2010/05/28/deepwater-horizon/#:~:text=British%20Petroleum%20did%20not%20have,in%20the%20Gulf%20of%20Mexico.
Security Construction
The security construction requirements for facilities on military installations and U.S. government facilities can vary. Discuss from your experience and research, key differences between the two.
Technological Society
Final Research Paper Final Research Paper (Based on work done in the midterm prospects) Worth 300 points. Introduction: What is your research question? Why is it important for the study of human communication? Why is it important for your major/career field? Why is it important for a technological society? Section 1: Explain the issue: Tell us the story of your selected topic problem or issue Section 2: Historical Connections: These problems are not new! What similar problems and conflicts have taken place during human history? Section 3: What connections can you make to the textbook? Use specific examples from the textbook. Section 4: Call to action: Why must this be addressed? What do the experts say? Why should we care? How can we save ourselves? What can we actually do? What is your call to action? Conclusion: Summarize your paper. Papers should be typewritten in APA or MLA format. The final paper should be approximately 6-8 pages not including the bibliography. 12 point font, Times New Roman, 1-inch Margins. Potential Topic Issue Areas (Would Need Focused): The following are general umbrella issues involving communication, technology, social media, and popular culture. Please choose a specific area and then find a specific topic that has meaning and interest for you. If you have an idea for an issue area that is not represented on this list, please contact the instructor. Social Media, Popular Culture, Technology & Business Social Media, Popular Culture, Technology & Friendship Social Media, Popular Culture, Technology & Intimacy Social Media, Popular Culture, Technology & Family Life Social Media, Popular Culture, Technology & Education Social Media, Popular Culture, Technology & Journalism Social Media, Popular Culture, Technology & Advertising Social Media, Popular Culture, Technology & Entertainment (Film, TV, Music, Gaming, Radio) Social Media, Popular Culture, Technology & Criminal Justice Social Media, Popular Culture, Technology & The Digital Divide Social Media, Popular Culture, Technology & Religion Social Media, Popular Culture, Technology & Children Social Media, Popular Culture, Technology & African American Culture Social Media, Popular Culture, Technology & Freedom of Speech / Expression Any other suggestions one may have
Ethical Hacking
Youve spent time in the labs learning about scanning, ports, and the services provided from those ports. In this discussion exercise, youll look at a port scan of a Windows Server and answer some questions.There are several ports open. Select one or more ports from the following list and describe what the service does.Can you provide recommendations about whether that service should continue to be used? Why or why not?If the service is likely to cause security-related issues, can you choose a replacement service that will still meet the IT needs to the end users?Provide references and examples to back up your claim.This is not intended to be an extensive assignment. You shouldnt spend too much time on it in terms of references and examples.root@kali:~# nmap 192.168.1.10Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-04 11:52 ESTNmap scan report for 192.168.1.10Host is up (0.00069s latency).Not shown: 971 filtered portsPORT STATE SERVICE7/tcp open echo13/tcp open daytime17/tcp open qotd19/tcp open chargen21/tcp open ftp23/tcp open telnet25/tcp open smtp42/tcp open nameserver53/tcp open domain80/tcp open http88/tcp open kerberos-sec110/tcp open pop3135/tcp open msrpc139/tcp open netbios-ssn143/tcp open imap389/tcp open ldap443/tcp open https445/tcp open microsoft-ds464/tcp open kpasswd5593/tcp open http-rpc-epmap636/tcp open ldapssl3268/tcp open globalcatLDAP3269/tcp open globalcatLDAPssl3389/tcp open ms-wbt-server49154/tcp open unknown49156/tcp open unknown49157/tcp open unknown49158/tcp open unknown49165/tcp open unknownMAC Address: 00:0C:29:ED:2E:72 (VMware)Nmap done: 1 IP address (1 host up) scanned in 17.35 seconds
Use Promo Code: FIRST15