Computer Science homework help

 
Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier
  • Other reputable sources are OK.

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page.
  • Each source should be cited in the body of the paper to give credit where due.
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 4 pages in length.
  • The Title and Reference pages do not count towards the page count requirements.

Computer Science homework help

Final Paper Assignment:
Write a 3-4 page APA formatted paper comparing your organization’s disaster recovery and business continuity plans with the best practices outlined in your course text.  Content should include, but not be limited to:  selecting the DR. team, assessing risks and impacts, prioritizing systems and functions for recovery, data storage and recovery sites, developing plans and procedures, procedures for special circumstances, and testing the disaster recovery plan.
Your paper should include an abstract and a conclusion and a reference page with 3-5 references:

Computer Science homework help

In your initial post, answer the following questions about IT Project Management. In addition to your course textbook (chapter 11 attached), utilize the UC library for information and examples.
What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.
Please make your initial post substantive. A substantive post will do of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations, intext citations and references in your post.
 
ch111

Computer Science homework help

This is an open book exam. However, each student is expected to work on it alone. Students whose solutions are the same or similar will get a grade of zero!!!
Exam time is 7:30pm to 10:50pm. Read instruction in “CPSC8720FinalExam.pdf”. Submit entire solution in zip file on blackboard before 10:50pm! Exam link will close and you wont be able to submit after that. Wrap up, zip, submit at least 5 minutes before 10:50pm! Submission passed due time will not be accepted! No Exception!

Computer Science homework help

Multi-factor Authentication
Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).
Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users’ claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.
A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.
Two other examples are to supplement a user-controlled password with a one-time password (OTP) or code generated or received by an authenticator (e.g. a security token or smartphone) that only the user possesses.
Readings/Reference Materials:
https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA
https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks
https://www.nist.gov/itl/applied-cybersecurity/tig/back-basics-multi-factor-authentication
Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use authentication methods. Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
Videos:
https://youtu.be/JMmskcQlPPk
https://www.youtube.com/watch?v=07mRDyydCNY
https://www.youtube.com/watch?v=7GPNWhO6XiA
Assignment Questions:

  • What is multifactor authentication and what are some examples?
  • Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim. Explain how multifactor authentication works.
  • List 5 reasons to turn on multifactor authentication?
  • Provide at least two additional links to articles related to multifactor authentication.

 
 
Multifactor-Authentication-assignment-updated2

Computer Science homework help

Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in 6 months for under $200,000.
Use the Cost Estimate template and Cost Baseline template to assist with this assignment.
Tasks

  • Prepare and upload a 1-page cost model for this project      using spreadsheet software. Use the following work breakdown structure      (WBS), and document your assumptions in preparing the cost model. Assume a      labor rate of $100 per hour for the project manager and $60 per hour for      other project team members. Assume that none of the work is outsourced,      labor costs for users are not included, and there are no additional      hardware costs. The total estimate should be $200,000.
  1. Project management
  2. Requirements definition
  3. Website design

a. Registration for recreational programs
b. Registration for classes and programs
c. Tracking system
d. Incentive system

  1. Website development

a. Registration for recreational programs
b. Registration for classes and programs
c. Tracking system
d. Incentive system

  1. Testing
  2. Training, rollout, and support
  • Using the cost model you created in the first task,      prepare a cost baseline by allocating the costs by WBS for each month of      the project.
  • Assume that you have completed 3 months of the project.      The BAC was $200,000 for this 6-month project. You can also make the      following assumptions:
  • PV=$120,000
  • EV=$100,000
  • AC=$90,000

a. What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?
b. Use the CPI to calculate the estimate at completion      (EAC) for this project. Is the project performing better or worse than      planned?
c. Use the SPI to estimate how long it will take to finish      this project.
After completing your charts, write a 150-word follow-up in which you complete the following:

  • Explain how the project is doing based on the CPI and      SPI. Is it ahead of schedule or behind? Is it under budget or over?
  • Describe the strategies or steps that should be taken      for human resource management to avoid additional costs.
  • Describe the strategies or steps that should be taken      for resource activity management to avoid additional costs.
  • Recommend 2 tools to support these strategies and      explain why these tools would be beneficial.

APA format! 
 
cmgt410_v20_cost_estimatewk3 cmgt410_v20_cost_baselinewk3

Computer Science homework help

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references.
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
  • Utilize Google Scholar and/or the university library.
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source.
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment.
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

computer Science homework help

4-5 pages Paper: Telemetry (software – mobile phones, desktop/laptop

Computer Science homework help

PROJECT INSTRUCTIONS
THE PROCESS
1. SELECT a domain area of research (COVID-19 related)
2. FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.
3. FRAME the question(s) according to your domain
a. Understand A Business
b. Understand A Stakeholders
4. OBTAIN data for your project
a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types,
the number of instances, your target variable.
5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes
6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook
7. SUMMARIZE your findings
THE DELIVERABLES
● A project report document (APA formatted) between 5-8 pages in length, not including title page,
content page, or images/graphics/reference. The report should have the below sections:
○ Introduction: this is where you provide a brief description of your personal motivation for the
project and the framing question. Tell the reader why they care about the results you are about to
present and why is the question you will be answering is important. A description of your dataset
including what type of data it contains, how many attributes, how many instances. Any
additional challenges such as messy or missing values.
○ Data Analysis: this is where you describe your data (summary statistics, EDA), explain the
methods you used to analyze the data. Discuss how the method works, why it was well suited for
your data, and how you applied it.
○ Results: this is where you describe and explain your findings. Why do you think you found the
results you did and what do you think they mean?
○ Conclusion: this should provide a concise answer to the analytical question posed in the
introduction along with a brief description of why the analysis answered the way it did, which
should be consistent with your results section. Additionally, you may wish to posit questions
raised by your analysis for future analysis.
○ Reflection: Conduct a self-reflection for each of the phases in The Process Section above to
uncover key learnings that you can apply towards future projects or which you can share with
your colleagues. Document at least 4 key learnings from your reflection. Describe observations,
challenges, lucky breaks, emotions that you experienced, etc. you may have experienced during a
specific phase.
● Do not just provide diagrams and statistics, each table & figure included must have a caption (e.g.,
Figure number and textual description) that is referenced from the text (e.g., “Figure 2 shows a
frequency diagram for …”).
● You should also provide your source code of a well-documented and formatted Jupyter Notebook and
dataset files.
DATA
You could look for data from the following sites.
Data.gov (Links to an external site.)
kaggle.com (Links to an external site.)
google data set search (Links to an external site.)
GRADING
This assignment is worth 100 points, which is 10% of your final grade. Your assignment will be evaluated
based on a successful compilation and adherence to the project requirements. Grading criteria:
● 50 pts for project report
● 50 pts for Python implementation (Use Jupyter Notebook)
SUBMISSION
You should submit a well-documented Jupyter Notebook and dataset files. Submit both .ipynb and .docx file,
name your files First_Lastname_FinalProject.xxx.