firewall

1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating controls and provide a solution for the scenario: You head up a small team of IT and cyber professionals tasked with ensuring network security. A recent malware has come to light that involves exploiting several […]

IT innovation

 culture of innovation in IT operations and integrate IT innovation  

week5 case study

file attached Read “Case 10.3: Amazon” and write an essay that answers the following questions: 1. What is the importance of logistics in Amazon’s business model? 2. How has Amazon used AI and machine learning to improve its supply chain management and customer experience? 3. What are the benefits of Amazon’s drone delivery system, and […]

221

 Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network troubleshooting. Instructions: Responses should include direct questions.  

242

  Instructions: Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to secure the network. Describe the importance of having privileged and non-privileged states within an organization. List any observations, tips or questions about this lab that would prove helpful to fellow students prior to […]

IT Strategy plan

The case study and the instruction to the assignment is attached.  Winter, 2021 IFSM301 Case Study: GG Freightways (GGFRT) GGFRT is a regional transportation and distribution company in operation for over 30 years. The company serves major cities in the southwestern region of the United States. Their headquarters (1), terminals/warehouses (8) and maintenance facilities (2) […]

lc3

Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting address (in hex) and an ending address (in hex). Your program will then output the contents of memory (in hex) between the provided ranges (inclusive).

PPT March 27

Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

project 1

3/25/24, 9:24 PM Assignment Information 1/4 IT 200 Project One Technology Hardware and Software Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competency: Describe the technologies, hardware, and software used within the information technology �eld Scenario You are working as a contracted information technology specialist. You have been […]

R proramming

Check the attachments Please read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 5 Here”. Guidelines: · Use only R for this assignment · Submit both R […]

R programming

check the attachements Please read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 4 Here” Guidelines: · Use only R for this assignment · Submit both R […]

R programming

Check the attachments  Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 3 Here”. Guidelines: · Use R only for the part 2 in this […]

Crisis Audit March 26

· A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information provided. Then read 5 crucial elements in conducting a crisis audit reading in this link: After summarizing the company’s situation, using the 5 elements provided, explain how In Case of Crisis […]

Question T

Networking Project Feedback I recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on the MAC sublayer that needs elaborate research to pull up the infographic and the video. These are not just pictures but gateways to learning. Be creative and use less IA!

Case Study March 24

Assignment Content 1. Top of Form In this final case sudy, our focus will be in development of an effective crisis plan. Again, you can use the hyperlink provided in the reading to prepare your response on how well KFC responded to (or handled) this crisis. KFC and the shortage of chicken What Happened In […]

week4 case study

  Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland: Springer International Publishing. 

help needed in C programming for data structure and algorithm

Dynamic Programming for partation and  backtracing  CSE 3318 Lab Assignment 3 Due March 27 Goal: 1. Understanding of dynamic programming. 2. Understanding of subset sums. Requirements: 1. Design, code, and test a C program that uses dynamic programming to partition (if possible) a sequence of n positive integers into three subsequences such that the sum […]

Data science

Note: Read the resources posted in week 12 folder and the chapter 7 of the ebook in the week 12 folder (Python for Data Analysis). Solve the following problems 1 to 3, work with the Nutrition_subset data set. The data set contains the weight in grams along with the amount of saturated fat and the […]

Data science

CS628 – Data Science Week 12 Assignment Monroe College Note: Read the resources posted in week 12 folder and the chapter 7 of the ebook in the week 12 folder (Python for Data Analysis). Solve the following problems 1 to 3, work with the Nutrition_subset data set. The data set contains the weight in grams […]

deep learning

Given a Convolution Layer with 8 filters, a filter size of 6, a stride of 2, and a padding of 1. For an input feature map of 32 x 32 x 32, what is the output dimensionality after applying the Convolution Layer to the input?

display devices 221

  Describe the different display types available.  Describe how to adjust display settings and comment on the various video standards, resolutions, and concepts. You need to describe how to build custom configurations.  In particular describe the differences between a standard thick client, virtualization workstation and thin clients. Instructions: Responses should include direct questions.

malware4

  Discuss tools and techniques to remove Malware from infected machines; using a popular product to make your point. Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit. List any observations, tips or questions about this lab that would prove helpful to fellow students prior to […]

Case Study-IS Security & Risk Management

Assessment Brief: BIS3004 IS Security and Risk Management Trimester-1 2024 Assessment Overview Assessment Task Type Weighting Due Length ULO Assessment 1: Case Study Write a report to discuss recent types of information security attacks, protection mechanisms and risk management. Individual 30% Week 6 2500 words ULO-2 ULO-3 ULO-4 equiv. – equivalent word count based on […]

P1 CT421 TMVA

Project Scenario for Project 1: Previously, the CEO told you about the breach at a rival company and his concerns for security at Mercury USA. In light of these developments, Mercury USA has decided to conduct vulnerability assessments. An outside firm has conducted penetration tests on Mercury’s systems and provided the reports. Now, it is up […]

Program

CSCI 351 Assignment 60 points Instruction: · Show your own work (at least 50% penalty otherwise) · Submit (1) a single word document containing the source code (copied from the source program file) of your program and screenshot of the program run including the number of words tested. · Submit source program files (e.g.,checker.py) and […]

IT

3/20/24, 4:17 PM Assignment Information 1/3 IT 200 Network Configuration Model Guidelines and Rubric Overview Understanding basic network terminology and the rationale for speci�c network con�gurations is a key skill for succeeding in the information technology �eld. In this activity, you will demonstrate your understanding of both network terminology and systems mapping to create a […]

hw4

We are working on 1, 2, 3, 4, 8, 9, 12, 14, 22, 23, 24, 27 33, 38, 42, 46 and 50.

Week 3

Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security. 

Encryption Question

  Discuss the role of encryption in ensuring confidentiality; use a popular encryption to make your point if needed.

Question

We are working on 1, 2, 3, 4, 8, 9, 12, 14, 22, 23, 24, 27 33, 38, 42, 46 and 50.

LABON1

Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 N/A G0/1 N/A Lo0 N/A Lo1 N/A S1 VLAN 1 N/A N/A N/A PC-A NIC PC-B NIC Objectives Part 1: Design a […]

W3 case study

attached file Read “Case 6.2: Massively Chatbots” and write an essay that answers the following questions: 1. How can businesses benefit from using AI in customer service? 2. What are the advantages of using Massively’s conversational marketing platform over other customer service platforms? 3. How does Massively’s business model work? 4. How can AI help […]

Discussion

Assignment #11.1 Executive Dashboards This is a required assignment, worth 20 points, and must be submitted by the due date. Review the Grading Rubric before completing this assignment. Research a scholarly paper or professional video on  “Executive Dashboards”  and reflect on only one (1) of the following: · “Components”: What are the components of an executive […]

hw1

this project will enhance learning and understanding of key networking and identification technologies, specifically Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP)/TCP comparison, and Radio Frequency Identification (RFID) and Bluetooth technology. You can pull it out.  RFID, and Bluetooth Technologies Objectives To deliver an accessible and thorough introduction to TCP/IP, UDP/TCP, RFID, and Bluetooth […]

Networking 1

Interactive Infographics: . Develop visually appealing infographics illustrating key concepts of computer networks, such as layers and how they interact with each other and maintain security. . Research and Planning . Introduction Layer ·    Visual: Network diagram with nodes. ·    Interaction: “Start Transmission” button to animate data movement. ·    Outcome: Introduction to […]

Case: Equifax and the Data Breach

This week we look at another example of a real-life challenge in the world of crisis management. You can click in the hyerlinks in the reading for more details to assist you with preparing your response. Equifax and the Data Breach What Happened On July 29 2017 Equifax discovered a massive data breach which affected […]

221

  Describe various input and output peripheral devices and their uses as well as different types of adapter cards, cables, and interfaces commonly found in PCs. Compare and contrast various PC connection interfaces, their characteristics and purpose. Instructions: Responses should include direct questions.

Computer Science mySQL Homework help

COMP 283 Homework 3 On blackboard, provide brief responses to the following questions. Homework due Thursday, March 14th . Late assignments accepted until 3/17 11:59 PM for a 25% Penalty. Use the database shown in Figure P7.9 to answer Problems 1-5 This is the Data Structure of the SaleCo database. 1. Using the output shown […]

Case Study

file attached 2 case study Read “Case 4.1: AI Initiatives in Microsoft” and write an essay that answers the following questions: 1. How did Microsoft use machine learning and neural networks to improve their direct mail campaigns? What were the results of implementing BrainMaker? 2. What are the potential benefits and concerns associated with personalized […]

Slither io Game

 A Platform for Stress Relief and Relaxation: slither io provides a welcome escape from the pressures of daily life, offering a platform for stress relief and relaxation. The game’s immersive world and captivating gameplay allow players to unwind, de-stress, and clear their minds.

Geometry Dash

  Demystifying the Essence: What is the Full Geometry Dash? To embark on a journey, one must understand the destination. What, then, is the full Geometry Dash ? It is a multidimensional experience — a fusion of precision, rhythm, and visual artistry. The full version transcends its lite counterpart, offering an expansive canvas of levels, […]

Infographics

Computer Networks Educational Toolkit The Computer Networks Educational Toolkit provides a comprehensive resource for users to learn about computer networks and their fundamental concepts. This project offers a variety of educational materials and interactive resources to facilitate learning and understanding of computer networks. Key Components: Interactive Infographics: ·  Research and Planning Develop visually appealing infographics […]

computer networking

Computer Networks Educational Toolkit The Computer Networks Educational Toolkit provides a comprehensive resource for users to learn about computer networks and their fundamental concepts. This project offers a variety of educational materials and interactive resources to facilitate learning and understanding of computer networks. Key Components: Interactive Infographics: · . Develop visually appealing infographics illustrating key […]

coding

Instructions: Q1. Design a program that asks the user to enter a series of 20 numbers. The program should store the numbers in a list and then display the following data: The lowest number on the list The highest number on the list The total of the numbers in the list The average of the […]

best practices

You have been promoted as the manager of the e-commerce site for the company you working for. You are concerned about a recent SQL attack that happened. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the website and database […]

Case Study

CBinsights Read “Case 1.1: CBinsights” and write an essay that answers the following questions: 1. How is CBinsights using AI and big data to revolutionize the business sector? 2. What are the services that CBinsights provides and how do they help businesses make strategic decisions? 3. What are the different AI technologies that CBinsights uses […]

Firewalls

Question #1: Research two software firewalls and explain the advantages and disadvantages of each one of them. Which one would you recommend and why? Question #2: What are the challenges in securing networks (internet, LANs, wireless)? Which network is most difficult to secure and why?