Category: Computer Science homework help

  • “Examining the Latest Wireless Attacks and Their Impact on Systems”

     
    Case Study: Latest Wireless Attacks
    What are some of the most recent attacks that have been launched against wireless systems? What vulnerabilities did they exploit? How much damage was caused? What was the estimated dollar amount of the loss? How could they have been better protected?

  • Navigating Challenging User Issues for IT Professionals “Going Above and Beyond: Ensuring Client Satisfaction in IT Support”

    As an IT professional, you may find that particular user issues are beyond your ability to resolve. When those moments arise, a user’s level of satisfaction could be in jeopardy. You must be able to navigate the situation and strive to maintain user satisfaction, even if your involvement with their presented issue comes to an end.
    For this week’s discussion, imagine that you’re working on a site. While you are at the user’s desk or site, you discover that the request you are trying to solve is beyond your ability to resolve it. When the user submitted the ticket for IT assistance, they expressed that they need the computing issue resolved in order to do their work. The computing issue is preventing the user from using the systems that they need on a daily basis. The user has been very receptive to your troubleshooting efforts, but as you realize that you are unable to resolve the issue, they are beginning to check their watch frequently and have become less engaged in answering your questions. Reflect on what you would or would not do to ensure customer satisfaction and to improve the user experience with IT services.
    For your initial post, address the following:
    What additional steps would you take to ensure that the user/customer is satisfied?
    How would you communicate this to the user?
    In response to two of your peers, address the following:
    State whether you agree or disagree with the steps in the initial post and provide a rationale.
    Explain why user satisfaction is an important part of the troubleshooting process.
    RESPONSE 1
    Hey Everyone,
    Whenever you are faced with a client who is becoming agitated or uncooperative, handling the situation delicately is crucial to maintaining their trust and satisfaction. Here is how I would approach it: 
    Firstly, I acknowledge the client’s patience and explain the progress made so far, being honest about the limits of my current knowledge. It is important to set realistic expectations. An example of something I would say is, “Thank you for your patience, Sabrina. I’ve been working hard on this, but it appears this issue is more complex than I initially anticipated.” Next, I make it clear that I am escalating the issue to our senior technical team or someone with more expertise. This transparency reassures the client that their problem is being taken seriously and handled by capable hands. To empathize with the client’s frustration and minimize disruption to their work, I explore temporary solutions. For instance, I might say something like, “I understand how frustrating this must be, especially with it affecting your work. In the meantime, do you have another PC you could use? If not, I will see if we can arrange a temporary solution for you.”  
    Throughout the process, I ensure regular updates on progress, keeping the client informed of any developments, whether positive or challenging. This ongoing communication is crucial to prevent them from feeling ignored or left in the dark. Once the issue is resolved, I stay with the client while they test the solution to ensure everything is functioning correctly. This hands-on approach helps confirm that their problem has been effectively addressed. Lastly, I follow up a week later with a brief email to check if they are encountering any further issues. This proactive step shows continued support and reinforces our commitment to their satisfaction. 
    RESPONSE 2
    Q-What additional steps would you take to ensure that the user/customer is satisfied & how would you communicate this to the user?
    A- I have had quite a bit of experience in dealing with upset and even irate clients from when I filed federal taxes at Jackson Hewitt. The first thing I would always recommend when dealing with any dissatisfied client in any capacity is to sincerely apologize for not being able to properly assist them and thank them for their patience and understanding with the process/procedure. Then I would inform the client that although I am unable to personally assist them any further that I will do everything in my power to ensure they get the proper assistance with the resolution they are seeking. This includes personally reaching out on their behalf or with them on hold to be able to fully explain the issue and the theoretical roadblock reached rather than sending the client a detailed email of the issue with contact information for the next step to take. Making the client realize that solving their problem and coming up with a solution for all potential client problems is mine & hopefully the company’s biggest priority and that they are more than just an invoice number to be worked on and pushed down the line. Showing true compassion and empathy for their plight usually goes a long way.
    Clear and concise communication throughout the entire process is imperative. No matter how miniscule the details may seem it’s the right of the client to know everything dealing with their information or machine. I have had to at times call above my role to a CPA or even contact the IRS directly and place the call on speaker so that I could be the mediary between the average client with little to no knowledge of federal tax laws and the “tax expert”. I am sure the same could be done via three-way call to keep the client in the loop while discussions are being done during an IT escalation. Regardless be sure to make sure before ending the contact that the client is satisfied with the services rendered and that they have no further questions that you could answer.

  • Business Identity Kit Design for a New Venture

     For this task, you are required to create a Business Identity Kit for a new business venture, including a Business Card, Letterhead, and Mailing Envelope, using a recent version of InDesign or “approved” alternate electronic publishing software (Scribus) from “scratch” WITHOUT the use of any templates. 
     
    Your design should embody a unified design, such as demonstrated in the Business Identity Kit displayed in the image above (pictured in this example is a business card, envelope, and letterhead).
    Submission Requirements
    Please submit the following:
    1. Submit a PDF (Portable Document Format) version of your project to your Assignments Folder.
    2. Submit the original file of your completed work (.INDD document if using InDesign).
    3. Submit ALL images, graphics, photos, clipart, or text files used in creating your work.
    PROJECT PACKAGING
    InDesign’s Package feature places all the resources, including photos, images, clipart, and fonts, used in a document into one centralized folder. The Package feature does not create a PDF version of your project, so you will have to create a PDF separately. 
    4. Project Reflection
    Post an answer the following questions when you submit your assignments files.
    a. What type of business did you select for your Business Kit?
    b. Why is your design appropriate (colors, fonts, style)?
    c. What issues or challenges did you face creating this project?
    d. What software programs did you use to create your redesign?
    e. Where did you find the images you used in your project (include URLs if possible)?
    You can submit your reflection as a Microsoft Word document or just copy and paste your answers in your Assignments Folder’s text box when you submit your assignment along with the rest of the required project files.  
    NOTE 1: Assignments created in MS Word, MS Publisher, or MS Works (or similar word processing software applications) will not be accepted.
    NOTE 2: You can not use a template or other pre-formatted design to complete your project, in whole, or in part. You must create your design from “scratch”, starting from an empty page.
    Your project must include all of the required elements listed below:
    REQUIRED ELEMENTS
    #BUSINESS CARD01Page Size: Set at 0.05 inches (or equivalent picas, points, etc.) margin on the top, bottom, left, and right.02Page Orientation: Portrait or Landscape (you decide)03Paper Size: US Business Card (3.5 inches x 2 inches)04Number of Pages: 1 (deselect Facing Pages)05
    Business Card Elements: Name, Job Title, Address, Phone Number, Fax Number, Web Address, E-mail address, Company Name, and Company Logo
    #LETTERHEAD01Page Margins: Set at .25 or 0.5 inches (or equivalent picas, points, etc.) on the top, bottom, left, and right. However, feel free to use bleeding if appropriate.02Page Orientation: Portrait (Tall)03Paper Size: Letter – 11 inches (height) x 8.5 inches (width)04Pages: One page05Letterhead Elements: Company Name, E-mail Address, Business Address, Phone Number, Fax Number, Company Logo, Web Address (URL)
    #MAILING ENVELOPE01Page Margins: Set at .25 or 0.5 inches (or equivalent picas, points, etc.) on the top, bottom, left, and right. However, feel free to use bleeding if appropriate.02Page Orientation: Landscape (Wide)03Document Size: Letter – Standard #10: 4 1/8 inches (height) by 9 1/2 (wide)04Pages: One page05Mailing Elements: Company Name, Business Address (Return Address), and Company Logo
    NOTE 3: All design elements must fit the purpose and theme of your project.
    NOTE 4: All design elements must utilize proper Visual Hierarchy and Foreground-Background Segregation!
    Please following directions thoroughly!

  • Analyzing ECM/EDM Frameworks for Addressing Data Problems in Organizations Title: Exploring ECM/EDM Frameworks for Managing Data Problems in Organizations In today’s digital age, organizations are faced with the challenge of managing and utilizing vast

    Please read the 4 bold/ underlined articles below to generate a response. 
    Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
    Read the Tyrvainen et al. (2006) article (see the Figure 1 framework) and Grahlmann et al. (2012) article (see the Figure 2 framework).
    Produce your company data (2-3 data types: e.g. Xrays, customer contact information) and analyze why it is becoming a problem.
    Read the Kunstova (2010) and Munkvold (2006) articles (specifically 3.2.5 and 2.2 respectively).
    Determine the differences and similarities between the ECM/EDM frameworks (like a car chassis, engine, breaking, etc.) presented by each paper. Illustrate which paper’s elements/framework best matches your organization and how the framework you selected addresses the key findings of EDM benefits for your data problem. 

  • Title: Risk Exposure and Impact on Information Protection in Retail Stores and Hospitals

    Organizations:
    Retail store
    Hospital
     
    Identify the risk exposure for each of these two organizations. Compare and contrast these risks.
    List the risks (of the information being lost, corrupted, stolen, etc.) by different methods.
    Identify the impact of not adequately protecting this information (consequences and costs).
    Assignment Requirements:
    2 pages double spaced
    at least one reference

  • “Implementing Enterprise Content Management and Data Governance for HealthcareX and ServiceY: A Scientific Approach” Enterprise Content Management and Data Governance Guidebook for HealthcareX: A Comprehensive Solution for Data Challenges in the Healthcare Industry

    Only use the attached Peer-reviewed Research 
    Case Study: Find the Problem
    This course is based on peer-reviewed research only and all PDF articles are provided as a foundation (under Books & Resources – Unit 1 Assigned Reading), less the student wants to find additional peer-reviewed articles from the library.
    There are two companies to choose between: HealthcareX and ServiceY.
    HealthcareX has experienced rapid growth in both the size of patients as they transition from a paper-based organization into a digital organization (see US EMR/HIPAA mandate). Unfortunately, the growth in data management policies, procedures, and systems has not kept pace with the growth, and the company finds itself in a position where content management is insufficient to ensure the accuracy and availability of the data (leading to sensitive data not being adequately protected). To resolve this problem, the company executives need to understand content management or data management. The company’s chief executive officer (CEO) and chief information officer (CIO) understand the importance, but don’t know anything about EDM, so you need to evaluate the company’s current major content requirements in the following order: EDM Foundations; EDM Infrastructure Integrations: EDM Infrastructure Updates; EDM Governance Review; and EDM Governance Updates. You must provide scientific evidence to the CEO/CIO for a Board presentation that will result in a $500 Million project – you will be responsible for the delivery of this content to clarify EDM to the CEO/CIO, help convince the Board EDM is a good idea, and provide guidance to the company on EDM structure and compliance.
    ServiceY has experienced rapid growth in both the size of patients as they transition from a paper-based organization into a digital organization (see US Sarbanes Oxley mandate). Unfortunately, the growth in data management policies, procedures, and systems has not kept pace with the growth, and the company finds itself in a position where content management is insufficient to ensure the accuracy and availability of the data (leading to sensitive data not being adequately protected). To resolve this problem, the company executives need to understand content management or data management. The company’s chief executive officer (CEO) and chief information officer (CIO) understand the importance, but don’t know anything about EDM, so you need to evaluate the company’s current major content requirements in the following order: EDM Foundations; EDM Infrastructure Integrations: EDM Infrastructure Updates; EDM Governance Review; and EDM Governance Updates. You must provide scientific evidence to the CEO/CIO for a Board presentation that will result in a $500 Million project – you will be responsible for the delivery of this content to clarify EDM to the CEO/CIO, help convince the Board EDM is a good idea, and provide guidance to the company on EDM structure and compliance.
    Key Assignment Overview
    Throughout this course, you will work on several aspects of enterprise content management that will result in a complete ECM and Data Governance Guidebook for either HeathcareX or ServiceY. You will not actually be performing the implementation of the system, but you will work extensively with the concepts of good enterprise content management practices through peer-reviewed work to provide a comprehensive foundation of the topic. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week.
    Enterprise Content Management and Data Governance Policies and Procedures Manual
    This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of an Enterprise Content Management and Data Governance Guidebook. You will select either organization HealthcareX or ServiceY and apply your research to the development of an ECM through the Data Governance Guidebook that would be appropriate for understanding what an implementation would look like within the organization. The goal of this course project is to develop an understanding of EDM implications / impacts to an organization with data challenges across the enterprise at the graduate level.
    Organization and Project Selection
    For the assignments in this course, you will be developing an Enterprise Content Management and Data Governance Guidebook that defines the policies and procedures for management and governance of data and content within the organization. 
    Week 1 Tasks:
    Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery (this is the Key Assignment). Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.
    New Content (Week 1)
    Provide a brief description of the selected organization with a specific focus on the data (content) that will be used as the basis for the projects in the course. Keep it simple so only select 1 or 2 data elements.
    Include relevant company information including: primary data source, primary data problem, importance of the data, how the problem relates to industry (do others have this problem), the potential cost (generalized) from the data problem (from industry research source), and a few key elements about uncontrolled data (from scientific research source).
    Design an EDM comparison between two frameworks that compare them as solutions. Subdivide the EDM elements/structure/components, importance in their use, and real outcomes from a successful implementation (Internet sources are good). PICK ONE. Contrast how this EDM framework matches the company problem and the outcomes expected from a successful implementation.
    Describe which governance frameworks (like HIPAA/HITECH/SOX) have an impact on the company (industry research) and how EDM relates to governance (scientific research).
    The following are the project deliverables with suggested section headings:
    Select one of the companies to use as a foundation.
    Enterprise Content Management and Data Governance Policies and Procedures Manual document shell
    Use Microsoft Word
    Title Page
    Course number and name
    Project name
    Student name
    Date
    Table of Contents
    Use an autogenerated TOC.
    It should be on a separate page.
    It should be a maximum of 3 levels deep.
    Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
    Suggested Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
    Outline and Requirements (Week 1)
    Company Overview (Data Challenge) (Week 1)
    EDM Overview (Week 1)
    Implementation Lifecycle (Week 1)
    Infrastructure Evaluation (Week 2)
    Content Requirements (Week 2)
    Content Design and Use (Week 2)
    Tools and IT (Week 2)
    Infrastructure Improvements (Week 3)
    Analysis Outcome (Week 3)
    Data Governance Evaluation (Week 4)
    Foundations/Review (Week 4)
    Interaction/Integration with EDM(Week 4)
    Policies and Procedures (Week 4)
    Data Governance Improvements (Week 5)
    Analysis Outcome (Week 5)
    Name the document “yourname_IT621_IP1.doc.”

  • “The Mobile Web Ecosystem: A Comparison to Natural Ecosystems and the Role of Cloud Technology”

     research paper that includes the following: 
    Explain the ecosystem that makes up the mobile web. 
    How does a mobile ecosystem compare to a natural ecosystem? 
    How do mobile-device users leverage the cloud? 
     Research Paper Requirements:
    The paper should be four pages long, not including the title and reference pages. 
    Use Times New Roman, size 12 font throughout the paper. 
    Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.
    A minimum of two scholarly journal articles (besides your textbook) are required.
    Writing should demonstrate a thorough understanding of the materials and address all required elements. 
    Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free. 
    Note: plagiarism check required, APA7 format, include References, within 8hrs  

  • Title: Understanding Zero-Day Attacks and Emergency Patching in Cybersecurity

    What is a zero-day attack in relation to cybersecurity? What processes are in place to facilitate zero-day patching on Windows systems? What issues can arise from emergency patching of enterprise systems? What advantages are there?

  • “Exploring Cyber Security: A Comprehensive Analysis of Current Threats and Solutions”

     Instructions
    You will be required to write one term paper this semester. The specifications are as follows: 
    You must write a 4-6 page term paper on a topic of your choice related to Cyber Security (ALL TOPICS MUST BE APPROVED).   Please write the term paper in a Word document and then upload it for grading.
    Your term paper outline is due at the end of Week 2.
    Your term paper is due at the end of Week 8.
    In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
    Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
    Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
    Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
    Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
    Papers will automatically be submitted to www.turnitin.com for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A SIGNIFICANT POINT REDUCTION.
    PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.