Category: Computer science

  • Narrated PowerPoint Presentation on Social, Cultural, and Ethical Issues in Healthcare Title: “Navigating the Complexities of Ethical Dilemmas in Healthcare: A Social and Cultural Perspective”

    Narrated PowerPoint Presentation
    Social, Cultural, and Ethical Issues
    For your Final Project, you will create a PowerPoint presentation based on a topic from your current field of study. Since this is a fully online course and we do not meet in person in a traditional classroom setting, you will need to narrate this presentation so it can be viewed electronically.
    To assist in the completion of your Final Project, some of the required pieces are included in this course as Milestones. These Milestones are completed throughout the course by the student and the instructor will provide feedback for each Milestone, in order to help the student better the overall quality of their project. See below where the milestones align with the Final Project requirements.
    Topic:
    Choose a social, cultural, or ethical issue related to your current major or field of study. Chose ONE area to focus on. For example, you cannot talk about ethics in healthcare, public safety, or IT in general. You would need to pick a single ethical issue to discuss and not just ethics in general. (Discussion 2)
    Research:
    Conduct a search using both internet and library database resources. You must use at least 3 sources, one of which must be from the library database. Keep track of these sources! You will need to include a reference slide at the end of your presentation. (Milestone 4)
    Content:
    Create a NARRATED PowerPoint presentation that contains between 12 to 18 slides. You must add your voice using the narration feature in PPT. Include the following:
    Title Slide (1 slide) – includes your name and the presentation title.
    Introduction Slide (1 slide) – should be something catchy and explain why this issue is important.
    Body/Content Slides (8-14 slides) – must be interesting, well organized, and presented clearly. Slides should not contain full sentences/paragraphs.
    Summary Slide (1 slide) – may also include a way for others to get involved, help, or get more information.
    Reference Slide (1 slide) – must be in APA style and be a minimum of 3 resources. When including hyperlinks in the reference list, they must be hyperlinked. (Milestone 4)
    PowerPoint Elements:
    Include the following PowerPoint elements:
    Apply a single theme or design template.
    Apply a transition to each slide.
    Do NOT use animation.
    Provide at least one hyperlink to a video or useful online article, this does not include hyperlinks in citation/reference slide.
    Use at least 5 open or royalty free images, cite the image on the bottom of the slide where the image exists (Milestone 6)
    Use smart art at least one time.
    Include an original graph, copied and pasted from Excel (do not include it as a picture, be sure to copy and paste from Excel). (Milestone 5)
    Include a footer on each slide with the slide number and your last name.
    Narration:
    To earn full points, your presentation must be narrated. Do NOT read word for word from your slides. Slides should only contain bulleted information, but full sentences should be spoken. The narration audio should start automatically when you start the slideshow and should continue through the entire presentation.
    Submission:
    Please upload your completed PowerPoint project.

  • Title: Comparing and Contrasting Digital Evidence and Non-Digital Evidence: Exploring the Use of Search Warrants, the Plain View Doctrine, and Exigent Circumstances in Obtaining Digital Evidence

    Compare and contrast digital evidence and non-digital evidence.
    Provide three examples of how they are similar and three examples of how they are different. You must use the provided course materials for at least one of the examples. Provide a scenario in which additional investigation and non-digital evidence can be used to corroborate or refute digital evidence findings. Describe search warrants and how they can be used to obtain digital evidence by specifically answering each of the following questions: 
    List each of the requirements of a search warrant articulated in United States Constitution’s bill of rights and how in practice, the police investigator can/does comply with those requirements to obtain a search warrant.
    Discuss how a search warrant can be used to obtain digital evidence
    Explain how the Plain View Doctrine and Exigent Circumstances may apply to digital evidence.
    Be sure to address what the Plain View Doctrine is and the three requirements an officer must fulfill if they are to successfully claim they were operating under the Plain View Doctrine
    Describe a scenario in which an officer may claim the plain view applies to digital evidence—what might be an applicable counter argument be in court?
    Explain what the exigent circumstances doctrine is and the category of circumstances that qualify as exigent circumstances under the doctrine.  Describe a scenario in which an officer may claim that the exigent circumstances doctrine applies to digital evidence—what might be an applicable counter argument be in court? Format Requirements:
    Assignment must be double spaced, 11 or 12 pt font and 1” margins all around.
    All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to the APA information found in Content -> Course Overview -> Course Resources.
    You must have resources to support your thoughts/opinions/information.  These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased. Course Outcome:
    distinguish between digital forensics and forensic science to effectively analyze digital evidence and operate within the constitutional and case law parameters of the criminal justice system

  • Developing a Disaster Recovery Plan for Business Continuity Developing a Disaster Recovery Plan for Business Continuity Introduction In today’s digital age, data is the lifeblood of any organization. Losing access to critical data can result in significant financial and reput

    As an IT specialist, one of your responsibilities it to develop a disaster recovery plan (DRP) for the organization in case of an emergency. Last year, there was a devastating fire at your place of business that took out the local server room and required the organization to move to a different building. Fortunately, due to good business continuity planning, the backup database was at another location; however, the team struggled with backup tools, processes, and policies when it came to supporting newfound remote employees. Now, your IT manager has asked you to prepare a DRP so everyone can be ready in case of a future emergency. Your manager has asked you to write a 1,050- to 1,400-word disaster recovery plan in a Word document. Include the following in your plan:
    Identify 2 tools used for backup purposes that would support business continuity to ensure that the data can be accessed during the disaster.
    Explain who is responsible for the backup. How often should data be backed up?
    How will the data be protected while at rest? What security requirements will be necessary?
    With respect to disaster recovery, explain how quickly the primary database should be restored. Why?
    Explain how employees would access the backup database during business continuity efforts. Since the former office space is inaccessible, explain where the employees would work. What communication methods would be used? Outline the major components of a backup storage policy to include data at rest. Consider the steps you took in the week’s labs to support your outline. Cite at least 2 resources to support your assignment. Format your citations according to APA guidelines.

  • Title: Automated IT Security Policy Compliance Systems for DoD Suppliers: Mitigating and Remediating Security Compliance Incidents

    Instructions
    Learning Objectives and Outcomes
    Research and describe a selected automated IT security policy compliance system.
    Assignment Requirements
    Assume you are a security professional for a supplier of military products to the U.S. Department of Defense (DoD). Your organization has approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors.
    A recent security breach exposed flaws in your company’s Internet use policy and physical access policy.
    Your manager has asked you to research automated IT security policy compliance systems. She wants a description of a typical system with a bulleted list of benefits. She also wants to know specifically how it could mitigate or remediate the recent security compliance incidents.
    For this assignment:
    Research automated IT security policy compliance systems.
    In a summary report to management:
    Describe a typical system
    Include a bulleted list of benefits
    Describe how the system could mitigate or remediate the security compliance incidents
    Cite 2 sources
    Submission Requirements
    Format: Microsoft Word (or compatible)
    Font: Arial, size 12, double-space
    Citation Style: Follow your school’s preferred style guide
    Length: 2–4 pages
    Self-Assessment Checklist
    I researched automated IT security policy compliance systems.
    I wrote a summary report that included a description of a typical system with a bulleted list of benefits, and a description of how the system can mitigate or remediate security compliance incidents.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.

  • Data Structures and Algorithms Assignment Title: “Maximizing Success: Using Binary Trees and Graphs to Climb the Ladder of Career” (a) Algorithm: 1. Create a binary tree with the root node representing the starting point of the ladder. 2. For

    Question 1 : 25 points
    A valid Red-Black tree should possess the following properties:
    1. Every node is either red or black.
    2. The root is black.
    3. Every leaf is NULL and black.
    4. If a node is red, then both its children are black.
    5. All paths from a node x to any leaf have same number of black nodes in between (i.e.,
    their Black-Height(x) is the same)
    After insertion of a new key x to the tree, properties 3 and 5 may be violated causing the
    tree to be become unbalanced. These violations can be overcome by rotating the tree around
    certain nodes and updating their colors, as described in the slides.
    (a) [10 points] Consider the Red-Black Tree given above. Insert the key 36 into it. Which
    cases from the slides are you going to encounter? What rotations would you need to over-
    come these problematic cases? What will the final tree look like? Explain your answer.
    (Note: You must show the final state in picture and also explain which violation caused
    you to use which rotation on which node as your progressed through the rebalancing of the
    tree)
    (b) [10 points] Asymptotic cost of inserting a new key to a red-black tree is O(log n). Why?
    Explain your answer by showing the math.
    (c) [5 points] Where would you use red-black trees? Why?
    Question 2 : 25 points
    Answer the following questions about graphs.
    (a) [7 points] What is the maximum number of edges that can exist in an undirected graph?
    What is the maximum number of edges that can exist in a digraph (a.k.a., directed graph)?
    Explain how you came up with the answer in both cases.
    (b) [8 points] Given a digraph G, its inverse GT is defined as digraph where all the edges of
    the original graph are inverted. That is, ∀ (u, v) ∈ G.E, ∃ (v, u) ∈ GT .E. Describe a
    non-empty digraph G such that G = GT .
    (c) [10 points] A strongly connected component (SCC) of a digraph G is a maximal set
    of vertices C ⊆ V such that for each pair of vertices, we have both u ↝ v and v ↝ u; that
    is, vertices u and v are mutually reachable from one another.
    One algorithm to calculate SCCs in a graph uses DFS as a subroutine twice; once on G and
    once on GT . This is known as Kosaraju’s Two-Pass algorithm. Explain the intuition be-
    hind how the DFS subroutine is able to help the algorithm discover the SCCs of a digraph.
    (Hint: Don’t overthink it. This question can be answered in 3-4 sentences. Try to be
    precise)
    Question 3 : 20 points
    The Computer Science program at Drexel University has a very complex course structure. As
    you already know, certain courses are prerequisites for others. For example, you cannot take
    CS260 before you take CS265 as the latter is a prerequisite for the former. For some reason, the
    department has called upon you to help them figure out certain intricacies about the structure
    of the program they themselves designed.
    (a) [10 points] Is there any sequence of course that is not possible to take due to its, possibly,
    unreasonable prerequisite requirements? Specify a graph algorithm, in plain English bullet
    points, to answer this question by considering the following questions.
    ˆ What will be the input to your algorithm? What will be the nodes and edges of your
    graph?
    ˆ How do you determine whether such an forbidden sequence exists?
    ˆ What is the time complexity of your algorithm?
    (b) [10 points] Assuming that a forbidden sequence of the form mentioned in part (a) doesn’t
    exist, specify an algorithm, in plain English bullet points, that will output a permissible sequence of courses for a student to follow. Also, analyse your algorithm’s time complexity.
    Question 4 : 30 points
    Consider your path to success, which is pretty much like climbing a ladder. Very frequently in
    life, as it is strictly the case for this problem, there are two choices in front of you: you either
    step to the next step of the ladder, or skip the middle one and step on the second step. And
    each step comes with a certain level of success (or failure), which is quantified by an integer
    for this problem.
    More formally, you are given an array of integers that represents the ladder and the values
    stored in the array represents the contribution of landing on this step to your success.
    Considering the costs of each step of the ladder, you are expected to suggest a strategy (i.e.,
    an algorithm) that will provide the optimal steps to be taken to maximize the success by the
    time you reach the pinnacle of your career.
    (Disclaimer: once they reach the pinnacle, human beings either die and conclude their success
    story in dust, or fall from there before they die and still end their story in dust!!! Moral of the
    story: Success in career shouldn’t be the end goal…)
    (a) [15 points] Suggest an algorithm for this problem (in bullet points) that utilizes binary
    trees as part of its solution. Explain the runtime of your algorithm.
    (b) [15 points] Suggest a more efficient algorithm that uses graphs instead of binary trees.
    explain the runtime of your algorithm.

  • “Submission for Assignment Prompt”

    Submission
    You should submit precisely 3 files individually (do NOT zip them):
    1. Two page report (only references may appear on a third page) in pdf format using either the latexDownload latex or word Download word template provided.
    2. Code (a version that will run – either an .ipynb notebook (preferred) or a .py script; do NOT submit any data).
    3. Class predictions for the test data. This must be in exactly the same format as the provided example file sample_valid_predictions.csv and must be named predictions.csv.

  • “Setting Up a Home Network: Diagramming and Configuring Devices for Optimal Connectivity and File-Sharing”

    Instructions
    Scenario:
    Your sister just moved into a new home and needs you to
    help her get all of her computer devices connected to the network and the
    Internet.
    Your sister and her family have the following devices:
    2 laptops: one for work,
    one for gaming and video streaming
    2 mobile devices: one
    Apple-iPad, one Samsung Android tablet
    2 mobile phones: one
    iPhone, one Android phone
    3 wireless security cameras
    1 Amazon Alexa
    2 wireless printers
    2 smart TVs that can be
    used as projectors
    Instructions:
    For this assignment, you must diagram a network depicting
    the physical device configuration of your sister’s home network using cloud
    services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network
    diagram.)
    You must then create a second diagram of the floor layout
    with all appliances and computer device distributions.
    Embed both diagrams into a paper and indicate how the
    router and each device should be configured so they have access to the Internet
    and file-sharing capability.
    Length: 3-5 page pager with an embedded original network
    diagram
    The completed assignment should address all of the
    assignment requirements, exhibit evidence of concept knowledge, and demonstrate
    thoughtful consideration of the content presented in the course. The writing
    should integrate scholarly resources, reflect academic expectations and current
    APA standards, and adhere to Northcentral University’s Academic Integrity
    Policy.

  • “Navigating the Ethical and Legal Implications of Big Data Analytics in Healthcare” Introduction: The use of big data analytics has revolutionized the healthcare industry, providing valuable insights and improving patient care. However, the collection and analysis of large amounts

    Description
    U4DB
    Primary Response is due by Thursday (11:59:59pm Central), Peer Responses are due by Saturday (11:59:59pm Central).
    Primary Task Response: Within the Discussion Board area, write 400-500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
    Although the use of big data offers many advantages in the health care field, it also poses many concerns with regard to privacy and compliance with the Health Insurance Portability and Accountability Act (HIPAA).
    Discuss concerns about big data analytics with regard to privacy and HIPAA compliance based on this week’s readings and other scholarly articles. Recommend best practices in using big data within the health care field.

  • “Step-by-Step Guide: Running an Application on Android Studio”

    I have a project ready, but I want you to make a video on how to run the application using (Android Studio). And send me a video

  • “Design and Implementation of a Web-Based Attendance Management System Using Microcontrollers and Biometric Technology”

    A web based attendance management system using microconllers.
    Component are R503 capactive fingerprint, arduino nano, ESP8266 Wifi module.
    APA citation, Reference must support diagram, I use MangoDB for database