242

  Instructions: Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to secure the network. Describe the importance of having privileged and non-privileged states within an organization. List any observations, tips or questions about this lab that would prove helpful to fellow students prior to […]

IT Strategy plan

The case study and the instruction to the assignment is attached.  Winter, 2021 IFSM301 Case Study: GG Freightways (GGFRT) GGFRT is a regional transportation and distribution company in operation for over 30 years. The company serves major cities in the southwestern region of the United States. Their headquarters (1), terminals/warehouses (8) and maintenance facilities (2) […]

lc3

Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting address (in hex) and an ending address (in hex). Your program will then output the contents of memory (in hex) between the provided ranges (inclusive).

PPT March 27

Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

project 1

3/25/24, 9:24 PM Assignment Information 1/4 IT 200 Project One Technology Hardware and Software Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competency: Describe the technologies, hardware, and software used within the information technology �eld Scenario You are working as a contracted information technology specialist. You have been […]

R proramming

Check the attachments Please read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 5 Here”. Guidelines: · Use only R for this assignment · Submit both R […]

R programming

check the attachements Please read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 4 Here” Guidelines: · Use only R for this assignment · Submit both R […]

R programming

Check the attachments  Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 3 Here”. Guidelines: · Use R only for the part 2 in this […]

Crisis Audit March 26

· A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information provided. Then read 5 crucial elements in conducting a crisis audit reading in this link: After summarizing the company’s situation, using the 5 elements provided, explain how In Case of Crisis […]

Question T

Networking Project Feedback I recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on the MAC sublayer that needs elaborate research to pull up the infographic and the video. These are not just pictures but gateways to learning. Be creative and use less IA!

Case Study March 24

Assignment Content 1. Top of Form In this final case sudy, our focus will be in development of an effective crisis plan. Again, you can use the hyperlink provided in the reading to prepare your response on how well KFC responded to (or handled) this crisis. KFC and the shortage of chicken What Happened In […]

week4 case study

  Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland: Springer International Publishing. 

help needed in C programming for data structure and algorithm

Dynamic Programming for partation and  backtracing  CSE 3318 Lab Assignment 3 Due March 27 Goal: 1. Understanding of dynamic programming. 2. Understanding of subset sums. Requirements: 1. Design, code, and test a C program that uses dynamic programming to partition (if possible) a sequence of n positive integers into three subsequences such that the sum […]

Data science

Note: Read the resources posted in week 12 folder and the chapter 7 of the ebook in the week 12 folder (Python for Data Analysis). Solve the following problems 1 to 3, work with the Nutrition_subset data set. The data set contains the weight in grams along with the amount of saturated fat and the […]

Data science

CS628 – Data Science Week 12 Assignment Monroe College Note: Read the resources posted in week 12 folder and the chapter 7 of the ebook in the week 12 folder (Python for Data Analysis). Solve the following problems 1 to 3, work with the Nutrition_subset data set. The data set contains the weight in grams […]

deep learning

Given a Convolution Layer with 8 filters, a filter size of 6, a stride of 2, and a padding of 1. For an input feature map of 32 x 32 x 32, what is the output dimensionality after applying the Convolution Layer to the input?

display devices 221

  Describe the different display types available.  Describe how to adjust display settings and comment on the various video standards, resolutions, and concepts. You need to describe how to build custom configurations.  In particular describe the differences between a standard thick client, virtualization workstation and thin clients. Instructions: Responses should include direct questions.

malware4

  Discuss tools and techniques to remove Malware from infected machines; using a popular product to make your point. Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit. List any observations, tips or questions about this lab that would prove helpful to fellow students prior to […]

Case Study-IS Security & Risk Management

Assessment Brief: BIS3004 IS Security and Risk Management Trimester-1 2024 Assessment Overview Assessment Task Type Weighting Due Length ULO Assessment 1: Case Study Write a report to discuss recent types of information security attacks, protection mechanisms and risk management. Individual 30% Week 6 2500 words ULO-2 ULO-3 ULO-4 equiv. – equivalent word count based on […]

P1 CT421 TMVA

Project Scenario for Project 1: Previously, the CEO told you about the breach at a rival company and his concerns for security at Mercury USA. In light of these developments, Mercury USA has decided to conduct vulnerability assessments. An outside firm has conducted penetration tests on Mercury’s systems and provided the reports. Now, it is up […]

Program

CSCI 351 Assignment 60 points Instruction: · Show your own work (at least 50% penalty otherwise) · Submit (1) a single word document containing the source code (copied from the source program file) of your program and screenshot of the program run including the number of words tested. · Submit source program files (e.g.,checker.py) and […]

IT

3/20/24, 4:17 PM Assignment Information 1/3 IT 200 Network Configuration Model Guidelines and Rubric Overview Understanding basic network terminology and the rationale for speci�c network con�gurations is a key skill for succeeding in the information technology �eld. In this activity, you will demonstrate your understanding of both network terminology and systems mapping to create a […]

hw4

We are working on 1, 2, 3, 4, 8, 9, 12, 14, 22, 23, 24, 27 33, 38, 42, 46 and 50.

Week 3

Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security. 

Encryption Question

  Discuss the role of encryption in ensuring confidentiality; use a popular encryption to make your point if needed.

Question

We are working on 1, 2, 3, 4, 8, 9, 12, 14, 22, 23, 24, 27 33, 38, 42, 46 and 50.

LABON1

Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 N/A G0/1 N/A Lo0 N/A Lo1 N/A S1 VLAN 1 N/A N/A N/A PC-A NIC PC-B NIC Objectives Part 1: Design a […]

W3 case study

attached file Read “Case 6.2: Massively Chatbots” and write an essay that answers the following questions: 1. How can businesses benefit from using AI in customer service? 2. What are the advantages of using Massively’s conversational marketing platform over other customer service platforms? 3. How does Massively’s business model work? 4. How can AI help […]

Discussion

Assignment #11.1 Executive Dashboards This is a required assignment, worth 20 points, and must be submitted by the due date. Review the Grading Rubric before completing this assignment. Research a scholarly paper or professional video on  “Executive Dashboards”  and reflect on only one (1) of the following: · “Components”: What are the components of an executive […]

hw1

this project will enhance learning and understanding of key networking and identification technologies, specifically Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP)/TCP comparison, and Radio Frequency Identification (RFID) and Bluetooth technology. You can pull it out.  RFID, and Bluetooth Technologies Objectives To deliver an accessible and thorough introduction to TCP/IP, UDP/TCP, RFID, and Bluetooth […]

Networking 1

Interactive Infographics: . Develop visually appealing infographics illustrating key concepts of computer networks, such as layers and how they interact with each other and maintain security. . Research and Planning . Introduction Layer ·    Visual: Network diagram with nodes. ·    Interaction: “Start Transmission” button to animate data movement. ·    Outcome: Introduction to […]

Case: Equifax and the Data Breach

This week we look at another example of a real-life challenge in the world of crisis management. You can click in the hyerlinks in the reading for more details to assist you with preparing your response. Equifax and the Data Breach What Happened On July 29 2017 Equifax discovered a massive data breach which affected […]

221

  Describe various input and output peripheral devices and their uses as well as different types of adapter cards, cables, and interfaces commonly found in PCs. Compare and contrast various PC connection interfaces, their characteristics and purpose. Instructions: Responses should include direct questions.

Computer Science Assignment

Assignment 10.1 – Unified Modeling Language (UML) Research a scholarly paper or professional video on “Unified Modeling Language (UML)”  and reflect on only one (1) of the following topics: · “Benefit”: What UML diagrams are most beneficial for displaying business systems?  · “Most”: What type of organizations or industries use UML diagrams the most? · “Effort”: Is […]

LabFinlll

Note: The answers to the questions and the screen captures that justify your answers will both be assigned some points.    1. Use the “date” command to display the time you are doing this assignment. 2. Use a command-line tool to find find the IP address associated with the Ethernet or Wi-Fi port of your […]

Need Tutoring

Presentation Requirements 1.  SLIDE  SETUP AND ORGANIZATION Your presentation must include the following slides and sections: Item 1:  Title Slide Your Title Slide should contain the following: · Project Name · Your Name · Instructor’s Name · Course name and section number Item 2: Organization or Company Information (Section 1) Item 3: Description of the Digital Media […]

1ssc227

  What are the different kinds of storage devices available?  How does one determine which to use? Identify the purposes and characteristics of power supplies

Project small network infrastructure1

Project Requirements, Tasks, and Deliverables Use Packet-Tracer 8.2.1 for this project. You need to submit the final project Word document and Packet-Tracer file via Canvas. Note: Project files submitted late will not be graded! Requirements Summary Design, configure, test and implement a network infrastructure for a small Computer Training Business named Alpha-Tech which plans to […]

march 8

Assignment Content 1. Top of Form There are numerous examples of fascinating real-life challenges in the world of crisis management. Let’s take a look at one highly visible crisis management case study from 2018, looking in particular at what we can learn from it. You can click in the hyerlinks in the reading for more […]

R language

Please read the instructions and questions carefully in ” Assignment_2_2024.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 2 Here”. Guidelines: ➢ Use R and R Studio for this assignment (do not use Excel or […]

3 paragraphs discussion for 10 topics

1. Top of Form THIS IS PART OF YOUR FINAL EXAM! · YOU MUST CHECK YOUR SIMILARITY prior to submission. Any academic dishonesty will result in a zero.  USE YOUR NOTES CREATED IN CLASS SESSIONS TO HELP YOU WRITE THIS.  Please pull up the sample discussion section in this week’s folder – (I have also attached it […]

Lab555

Understanding Operating Systems (Zero-cost course material) Unit 5 Lab Assignment 5: Networking and Security (40 points) In this assignment, you will learn to check network configurations and services and to configure an IP address on a computer. For each of the two questions, do the following: 1. Create a document (use Microsoft word or any equivalent […]

code

  Solve the following two questions and upload 1). Screenshot of the Output 2. Python files for both questions Q1. Write a program that displays a table of the Celsius temperatures 0 through 20 and their Fahrenheit equivalents. The formula for converting a temperature from Celsius to Fahrenheit is                                              F = (( 9/5 ) […]

Week 1

Vulnerability Assessment Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Computer Question

  Explain the importance of motherboard components, their purpose, and properties.  Compare and contrast various RAM types and their features. Instructions: Responses should include direct questions. 

Computer Science Assignment

Research – System Analysis and design Assignment 9.1 – Business Processes and Process Management Research a scholarly paper or professional video on  “Business Processes, and Process Specifications”  and reflect on only one (1) of the following topics: · “Processes”: What type of business system’s Processes exist? · “Specifications”: How important is it to define the […]

Discussion Board

Please see attachment for details Please write a response to the discussion board question and two responses for the peer posts. DAD220 For your initial post, address the following: Consider your role as a professional. Use what you have you’ve learned in this course and this week’s supplemental resources to support your answer and guide you […]