Computer Science
[SOLVED] Vulnerability Memo
check the internet and the?Common Vulnerabilities and Exposures (CVE) List?for networked IoT or?IoMT?devices with publicly known problems identified in the past six months.?? Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices. For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product.
[SOLVED] Database Development Life Cycle
Write a 2 page paper on the Database development life cycle. The paper should be original.
[SOLVED] Ethics Discussion
Visit the MIT Moral Machine site and browse some scenarios. Tell the class how you felt about needing to make decisions about which characters would perish. How does going through the scenarios make you feel about riding in a self-driving car? https://www.moralmachine.net/
[SOLVED] Data Provided by Professor
Ask a question related to HR? — Asked, provide in word document. Run a test (show this in appendix) — Provide in word document. give some background of where the data is from, some descriptives etc. (in pictures/ graphs) — data provided by professor, use the app called Tableau examine the dataset. Provide in word document. Provide insights? make sure this is written as a story — Example provided. Only need 2 pages. put source in references
[SOLVED] PhD Statement Of Purpose
Few words regarding my order. I spent so much time working on this reference document which I attached to my order, After showing this work to a faculty member, I received feedback in the form of comments to the attached file in my order, there need to be lots of structural, rewriting as well as the removal of some paragraphs. I am including some links here to serve as guidance as to what and what not do when writing a Ph.D. statement of purpose, please use those links along with the comments in the file as a guiding source. Please, Please, Please, my admission highly depends on this statement. It has to be perfect and conveys my skills (writing obviously is not one of those skills :D) in a clear captivating way. If you have any questions, please do not hesitate to reach out. 1. https://nschneid.medium.com/inside-ph-d-admissions-what-readers-look-for-in-a-statement-of-purpose-3db4e6081f80 2. https://www.clsp.jhu.edu/apply-for-phd/phd-admissions-faq/ 3. https://forum.thegradcafe.com/topic/48905-some-advice-on-writing-an-sop/ Some SOP examples (for reference) 1. https://www.ipl.org/essay/Statement-Of-Purpose-For-Artificial-Intelligence-FJUHFWAY26 2. https://www.cs.cmu.edu/~jlacomis/assets/statement/personal-statement-cmu.pdf 3. https://people.csail.mit.edu/anantb/public/docs/sop/phd_admission_sop.pdf 4. https://personalstatementservices.com/entries/ai-artificial-intelligence/phd-robotics 5. https://github.com/jeanqasaur/academic-application-materials/blob/master/phd-application-2007/personal_statement.pdf I appreciate your hard work.
[SOLVED] Comparative Web Expert Review
Abstract A short summary of what took place in this project Description of the websites inspected Describe the two (2) websites that were inspected as a part of this project. Who developed the website(s), and what is the purpose of this website? What are some typical tasks that are performed on these sites? How are these sites similar and how do they differ? Please include screen shots of the website(s) being inspected. Typical Users What would be the typical users for each of these websites? Address their age, computing experience, computing environment, and education level. Cognitive Walkthrough Select a task that is performed similarly on each site and answer the following questions for each site: 1. Will the user try to achieve the right effect? 2. Will the user notice that the correct action is available? 3. Will the user associate the correct action with the effect to be achieved? 4. If the correct action is performed, will the user see that progress is being made toward solution of the task Heuristic Review Using Shneidermans 8 Golden Rules of Interface Design, inspect each website using the following questions/heuristics: Does the website: 1. Strive for consistency 2. Cater to universal usability 3. Offer informative feedback 4. Design dialogs to yield closure 5. Prevent errors 6. Permit easy reversal of actions 7. Support internal locus of control 8. Reduce short-term memory load Each answer needs to be detailed. If you include screenshots to illustrate your point, please briefly describe in text what the screenshot portrays. If you use any additional sources, you MUST reference them in your document Usability Successes Provide a list of strengths that each site exhibited and briefly explain them Usability Problems Noted What problems did you discover for each website? What suggestions do you have to improve each of these problems? You MUST include screen shots of existing problems, and you MUST include wireframe sketches of possible improvements. Note: Each website should have at least three (3) suggested improvements. NOTE: if there are absolutely no identifiable usability problems, come up with some re-design or improvement suggestions that you would make if you were the designer Priorities Organize and rank all of your suggested changes for each website by: importance and time to fix. Justify your rankings. What did you learn? Address what you learned about the process of comparative web expert review. How were the two interfaces similar or different in regard to the heuristic review and usability success or problems identified? Based on your findings, which site is better suited for the users? What was unexpected or surprising from the results of this study?
[SOLVED] Early Automatons
It is recommended you read the questions and get an idea of what to focus on before reading the material. Please provide a clear and direct answer to the weeks question based on provided material. Write in paragraphs using complete sentences (no bullet points). Students may draw on the course readings for supporting evidence in their answers wherever relevant. Question 1) no more than 250 words Can an automaton be used to explain some aspect of the world? Why or why not? Please refer to at least one specific automaton in your answer. Question 2) Prepare two questions for discussion in tutorial. These questions should relate directly to this weeks readings and/or the content of this weeks lecture. The aim of these questions is to facilitate thoughtful and informed tutorial discussion. You should avoid purely factual questions (e.g., When was the article published?) or questions which can be easily answered with one or two sentences. An ideal discussion question is one which requires you to think about the meaning and implications of the source material.
[SOLVED] Security Assessment Report
Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company’s leadership. Your upper-level management team is not interested in the technical report you generated from your Workspace exercise. Team members are more interested in the bottom line. You must help these nontechnical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your nontechnical presentation: How do you present your technical findings succinctly to a nontechnical audience? Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion. How do you describe the most serious risks factually but without sounding too dramatic? No one likes to hear that the entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today. How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand. Be clear about what action you are recommending. Upper-level managers will want to understand not only what you discovered, but also what you propose as a solution. They will want to know what decisions they need to make based on your findings. Your goal for the presentation is to convince the leadership that the company needs to adopt at least one security vulnerability assessment tool to provide an extra layer of security. The deliverables for this project are as follows: Security Assessment Report (SAR): This report should be a seven- to eight-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Nontechnical presentation: This is a set of eight to 10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.
[SOLVED] Cyber-Attacks on the Banking Institutions
This will be a dissertation paper. The following are the questions pertaining to the topic: 1) Is the 2016 cyber guidance from the Committee on Payments and Market Infrastructures and the International Organization of Securities Commissions (CPMI-IOSCO) effective in protecting U.S financial intuitions from a cyber terrorist attack from an international terrorist group? 2) Does the relationship between the financial sector and the U.S. government create important hurdles that need to be acknowledged and addressed such as the sharing of sensitive national security information when regarding cyber-attacks from other countries? 3) What specific roles and responsibilities do U.S. government agencies such as the Department of Homeland Security, Defense, and the Treasury and the financial institutions play when an attack has occurred on banking institutions? It must include what a full dissertation paper would include i.e., title, table of contents, reference page, etc. Also I must have an update once a week to check on the progress of the paper as well.
[SOLVED] Common Body of Knowledge
write paper with an explanation of what the Common Body of Knowledge (CBK) is and how it aids in the protection of computer networks. Also include any personal experience that you have had with any aspects of one or more domains. For example, within the domain of Business Continuity and Disaster Recover, does your employer have a plan in place for natural disasters such as storms or wildfires? Utilize the CBK infographic as an additional resource:
Use Promo Code: FIRST15