Category: Computer science

  • Title: The Environmental Benefits of Computers: A Compelling Argument Thesis: Computers have a significant positive impact on the natural environment through their ability to reduce paper consumption, increase energy efficiency, and aid in environmental research and conservation efforts. References:

    Research the subject to find articles or other online references that support your position. (You may choose to focus on a specific aspect of the topic or address the topic in a more general way.)
    The position is HOW COMPUTERS BENEFIT THE NATURAL ENVIRONMENT. 
    Write a 300-word argument in support of your position, titled “How Computers Benefit the Natural Environment”. Your argument should cite facts and expert opinion for which you provide references.
    Please provide a thesis and references in APA 7. 

  • “Exploring the Capabilities and Limitations of AI Chatbots in Collaborative Problem-Solving and Creative Thinking”

    This assignment aims to explore the capabilities and limitations of AI chatbots in collaborative problem-solving and creative thinking. By interacting with an AI chatbot such as ChatGPT, Bard, or any other platform of your choosing, you will investigate its potential as a partner in generating ideas, responding to challenges, and exploring complex concepts.
    Procedure:
    1. Select your AI collaborator: Choose an AI chatbot available (ChatGPT, Bard, etc.) and familiarize yourself with its capabilities and limitations.
    2. Develop a scenario: Define a specific problem, challenge, or creative project related to our course content. This could include brainstorming ideas for a research paper, developing a solution to a case study, or generating a fictional story with specific constraints.
    3. Interact and collaborate: Engage in a dialogue with your chosen AI chatbot and present your scenario and its key parameters. Guide the conversation by asking questions, seeking feedback, and building on the AI’s responses. Document your interactions, including your prompts, the AI’s responses, and your reflections on the collaborative process.
    4. Analyze and reflect: Upon completing your interaction, consider the following questions:
    – How effectively did the AI contribute to your thinking and exploration?
    – Were there instances where the AI surprised you or challenged your assumptions?
    – What were the limitations of the AI, and how did you work around them?
    – Did the experience change your perspective on the problem or project?
    – What does this experiment tell us about the potential and challenges of using AI as a collaborative tool?
    Deliverables:
    – A concise report (2-3 pages) documenting your chosen scenario, the interaction with the AI chatbot, your observations and reflections, and any conclusions you draw about the experience.
    – You may also include excerpts from the actual chat log with the AI for illustrative purposes.
    Grading:
    Creativity and originality of the chosen scenario (20%)
    Depth and quality of interaction with the AI chatbot (30%)
    Critical analysis and reflection on the experience (30%)
    Organization and clarity of the report (20%)
    Additional Notes:
    This assignment encourages your active engagement with AI technology thoughtfully and responsibly.
    Be aware of the limitations of AI chatbots and avoid plagiarizing their responses.
    Focus on using the AI as a tool to facilitate your thinking and creativity, not as a replacement for your intellectual effort.

  • “The Impact of E-Commerce on Online Contracts and the Significance of Digital Signatures in Cyberspace”

    Prompt: In this module, we have explored the surge of e-commerce and the escalation of online contracts. How has the evolution of the internet piloted the growth of e-contracts? With the implementation of legislation, the Electronic Signatures in Global and National Commerce Act (E-SIGN Act) and the Uniform Electronic Transactions Act (UETA), what is the impact and significance of digital signatures in cyberspace?

  • “Exploring Additional Resources: Complements, Conflicts, and Unique Discoveries” Response: After viewing the provided URL/DOI, I came across an interesting article titled “The Impact of Social Media on Mental Health: A Systematic Review.”

    Respond by using the URL/DOI they provided to view the resource. Each response must be between 200-350 words on something else you found that complements, conflicts with, or is something unique you discovered.

  • Using Scapy for Packet Manipulation and Analysis: A Detailed Lab Report

    please follow instructions
    For the task 2, you need to use the scapy.
    You need to submit a detailed lab report, with screenshots, to describe what you have done and what you
    have observed. You also need to provide explanation to the observations that are interesting or surprising.
    Please also list the important code snippets followed by explanation. Simply attaching code without any
    explanation will not receive credits.

  • Narrated PowerPoint Presentation on Social, Cultural, and Ethical Issues in Healthcare Title: “Navigating the Complexities of Ethical Dilemmas in Healthcare: A Social and Cultural Perspective”

    Narrated PowerPoint Presentation
    Social, Cultural, and Ethical Issues
    For your Final Project, you will create a PowerPoint presentation based on a topic from your current field of study. Since this is a fully online course and we do not meet in person in a traditional classroom setting, you will need to narrate this presentation so it can be viewed electronically.
    To assist in the completion of your Final Project, some of the required pieces are included in this course as Milestones. These Milestones are completed throughout the course by the student and the instructor will provide feedback for each Milestone, in order to help the student better the overall quality of their project. See below where the milestones align with the Final Project requirements.
    Topic:
    Choose a social, cultural, or ethical issue related to your current major or field of study. Chose ONE area to focus on. For example, you cannot talk about ethics in healthcare, public safety, or IT in general. You would need to pick a single ethical issue to discuss and not just ethics in general. (Discussion 2)
    Research:
    Conduct a search using both internet and library database resources. You must use at least 3 sources, one of which must be from the library database. Keep track of these sources! You will need to include a reference slide at the end of your presentation. (Milestone 4)
    Content:
    Create a NARRATED PowerPoint presentation that contains between 12 to 18 slides. You must add your voice using the narration feature in PPT. Include the following:
    Title Slide (1 slide) – includes your name and the presentation title.
    Introduction Slide (1 slide) – should be something catchy and explain why this issue is important.
    Body/Content Slides (8-14 slides) – must be interesting, well organized, and presented clearly. Slides should not contain full sentences/paragraphs.
    Summary Slide (1 slide) – may also include a way for others to get involved, help, or get more information.
    Reference Slide (1 slide) – must be in APA style and be a minimum of 3 resources. When including hyperlinks in the reference list, they must be hyperlinked. (Milestone 4)
    PowerPoint Elements:
    Include the following PowerPoint elements:
    Apply a single theme or design template.
    Apply a transition to each slide.
    Do NOT use animation.
    Provide at least one hyperlink to a video or useful online article, this does not include hyperlinks in citation/reference slide.
    Use at least 5 open or royalty free images, cite the image on the bottom of the slide where the image exists (Milestone 6)
    Use smart art at least one time.
    Include an original graph, copied and pasted from Excel (do not include it as a picture, be sure to copy and paste from Excel). (Milestone 5)
    Include a footer on each slide with the slide number and your last name.
    Narration:
    To earn full points, your presentation must be narrated. Do NOT read word for word from your slides. Slides should only contain bulleted information, but full sentences should be spoken. The narration audio should start automatically when you start the slideshow and should continue through the entire presentation.
    Submission:
    Please upload your completed PowerPoint project.

  • Title: Comparing and Contrasting Digital Evidence and Non-Digital Evidence: Exploring the Use of Search Warrants, the Plain View Doctrine, and Exigent Circumstances in Obtaining Digital Evidence

    Compare and contrast digital evidence and non-digital evidence.
    Provide three examples of how they are similar and three examples of how they are different. You must use the provided course materials for at least one of the examples. Provide a scenario in which additional investigation and non-digital evidence can be used to corroborate or refute digital evidence findings. Describe search warrants and how they can be used to obtain digital evidence by specifically answering each of the following questions: 
    List each of the requirements of a search warrant articulated in United States Constitution’s bill of rights and how in practice, the police investigator can/does comply with those requirements to obtain a search warrant.
    Discuss how a search warrant can be used to obtain digital evidence
    Explain how the Plain View Doctrine and Exigent Circumstances may apply to digital evidence.
    Be sure to address what the Plain View Doctrine is and the three requirements an officer must fulfill if they are to successfully claim they were operating under the Plain View Doctrine
    Describe a scenario in which an officer may claim the plain view applies to digital evidence—what might be an applicable counter argument be in court?
    Explain what the exigent circumstances doctrine is and the category of circumstances that qualify as exigent circumstances under the doctrine.  Describe a scenario in which an officer may claim that the exigent circumstances doctrine applies to digital evidence—what might be an applicable counter argument be in court? Format Requirements:
    Assignment must be double spaced, 11 or 12 pt font and 1” margins all around.
    All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to the APA information found in Content -> Course Overview -> Course Resources.
    You must have resources to support your thoughts/opinions/information.  These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased. Course Outcome:
    distinguish between digital forensics and forensic science to effectively analyze digital evidence and operate within the constitutional and case law parameters of the criminal justice system

  • Developing a Disaster Recovery Plan for Business Continuity Developing a Disaster Recovery Plan for Business Continuity Introduction In today’s digital age, data is the lifeblood of any organization. Losing access to critical data can result in significant financial and reput

    As an IT specialist, one of your responsibilities it to develop a disaster recovery plan (DRP) for the organization in case of an emergency. Last year, there was a devastating fire at your place of business that took out the local server room and required the organization to move to a different building. Fortunately, due to good business continuity planning, the backup database was at another location; however, the team struggled with backup tools, processes, and policies when it came to supporting newfound remote employees. Now, your IT manager has asked you to prepare a DRP so everyone can be ready in case of a future emergency. Your manager has asked you to write a 1,050- to 1,400-word disaster recovery plan in a Word document. Include the following in your plan:
    Identify 2 tools used for backup purposes that would support business continuity to ensure that the data can be accessed during the disaster.
    Explain who is responsible for the backup. How often should data be backed up?
    How will the data be protected while at rest? What security requirements will be necessary?
    With respect to disaster recovery, explain how quickly the primary database should be restored. Why?
    Explain how employees would access the backup database during business continuity efforts. Since the former office space is inaccessible, explain where the employees would work. What communication methods would be used? Outline the major components of a backup storage policy to include data at rest. Consider the steps you took in the week’s labs to support your outline. Cite at least 2 resources to support your assignment. Format your citations according to APA guidelines.

  • Title: Automated IT Security Policy Compliance Systems for DoD Suppliers: Mitigating and Remediating Security Compliance Incidents

    Instructions
    Learning Objectives and Outcomes
    Research and describe a selected automated IT security policy compliance system.
    Assignment Requirements
    Assume you are a security professional for a supplier of military products to the U.S. Department of Defense (DoD). Your organization has approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors.
    A recent security breach exposed flaws in your company’s Internet use policy and physical access policy.
    Your manager has asked you to research automated IT security policy compliance systems. She wants a description of a typical system with a bulleted list of benefits. She also wants to know specifically how it could mitigate or remediate the recent security compliance incidents.
    For this assignment:
    Research automated IT security policy compliance systems.
    In a summary report to management:
    Describe a typical system
    Include a bulleted list of benefits
    Describe how the system could mitigate or remediate the security compliance incidents
    Cite 2 sources
    Submission Requirements
    Format: Microsoft Word (or compatible)
    Font: Arial, size 12, double-space
    Citation Style: Follow your school’s preferred style guide
    Length: 2–4 pages
    Self-Assessment Checklist
    I researched automated IT security policy compliance systems.
    I wrote a summary report that included a description of a typical system with a bulleted list of benefits, and a description of how the system can mitigate or remediate security compliance incidents.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.

  • Data Structures and Algorithms Assignment Title: “Maximizing Success: Using Binary Trees and Graphs to Climb the Ladder of Career” (a) Algorithm: 1. Create a binary tree with the root node representing the starting point of the ladder. 2. For

    Question 1 : 25 points
    A valid Red-Black tree should possess the following properties:
    1. Every node is either red or black.
    2. The root is black.
    3. Every leaf is NULL and black.
    4. If a node is red, then both its children are black.
    5. All paths from a node x to any leaf have same number of black nodes in between (i.e.,
    their Black-Height(x) is the same)
    After insertion of a new key x to the tree, properties 3 and 5 may be violated causing the
    tree to be become unbalanced. These violations can be overcome by rotating the tree around
    certain nodes and updating their colors, as described in the slides.
    (a) [10 points] Consider the Red-Black Tree given above. Insert the key 36 into it. Which
    cases from the slides are you going to encounter? What rotations would you need to over-
    come these problematic cases? What will the final tree look like? Explain your answer.
    (Note: You must show the final state in picture and also explain which violation caused
    you to use which rotation on which node as your progressed through the rebalancing of the
    tree)
    (b) [10 points] Asymptotic cost of inserting a new key to a red-black tree is O(log n). Why?
    Explain your answer by showing the math.
    (c) [5 points] Where would you use red-black trees? Why?
    Question 2 : 25 points
    Answer the following questions about graphs.
    (a) [7 points] What is the maximum number of edges that can exist in an undirected graph?
    What is the maximum number of edges that can exist in a digraph (a.k.a., directed graph)?
    Explain how you came up with the answer in both cases.
    (b) [8 points] Given a digraph G, its inverse GT is defined as digraph where all the edges of
    the original graph are inverted. That is, ∀ (u, v) ∈ G.E, ∃ (v, u) ∈ GT .E. Describe a
    non-empty digraph G such that G = GT .
    (c) [10 points] A strongly connected component (SCC) of a digraph G is a maximal set
    of vertices C ⊆ V such that for each pair of vertices, we have both u ↝ v and v ↝ u; that
    is, vertices u and v are mutually reachable from one another.
    One algorithm to calculate SCCs in a graph uses DFS as a subroutine twice; once on G and
    once on GT . This is known as Kosaraju’s Two-Pass algorithm. Explain the intuition be-
    hind how the DFS subroutine is able to help the algorithm discover the SCCs of a digraph.
    (Hint: Don’t overthink it. This question can be answered in 3-4 sentences. Try to be
    precise)
    Question 3 : 20 points
    The Computer Science program at Drexel University has a very complex course structure. As
    you already know, certain courses are prerequisites for others. For example, you cannot take
    CS260 before you take CS265 as the latter is a prerequisite for the former. For some reason, the
    department has called upon you to help them figure out certain intricacies about the structure
    of the program they themselves designed.
    (a) [10 points] Is there any sequence of course that is not possible to take due to its, possibly,
    unreasonable prerequisite requirements? Specify a graph algorithm, in plain English bullet
    points, to answer this question by considering the following questions.
    ˆ What will be the input to your algorithm? What will be the nodes and edges of your
    graph?
    ˆ How do you determine whether such an forbidden sequence exists?
    ˆ What is the time complexity of your algorithm?
    (b) [10 points] Assuming that a forbidden sequence of the form mentioned in part (a) doesn’t
    exist, specify an algorithm, in plain English bullet points, that will output a permissible sequence of courses for a student to follow. Also, analyse your algorithm’s time complexity.
    Question 4 : 30 points
    Consider your path to success, which is pretty much like climbing a ladder. Very frequently in
    life, as it is strictly the case for this problem, there are two choices in front of you: you either
    step to the next step of the ladder, or skip the middle one and step on the second step. And
    each step comes with a certain level of success (or failure), which is quantified by an integer
    for this problem.
    More formally, you are given an array of integers that represents the ladder and the values
    stored in the array represents the contribution of landing on this step to your success.
    Considering the costs of each step of the ladder, you are expected to suggest a strategy (i.e.,
    an algorithm) that will provide the optimal steps to be taken to maximize the success by the
    time you reach the pinnacle of your career.
    (Disclaimer: once they reach the pinnacle, human beings either die and conclude their success
    story in dust, or fall from there before they die and still end their story in dust!!! Moral of the
    story: Success in career shouldn’t be the end goal…)
    (a) [15 points] Suggest an algorithm for this problem (in bullet points) that utilizes binary
    trees as part of its solution. Explain the runtime of your algorithm.
    (b) [15 points] Suggest a more efficient algorithm that uses graphs instead of binary trees.
    explain the runtime of your algorithm.