Category: Computer science

  • “Exploring the Titanic Dataset: A Data Analysis Project using Pandas and Matplotlib”

    titanic.pdf is a “titanic.csv” file
    , and pandas_and_data_analysis_2024.pdf is an “ipynb” file
    this is an individual project. So you have to create 2-3 graphs.
    Read the description carefully, and no error, please, and no copy from anywhere. 

  • Signature Assignment: Project Plan Approval Signature Assignment: Project Plan Approval Title: The Theoretical Foundation and Ethical Considerations for a Proposed Study: A Literature Review

    Instructions
    Consult the Virtual ResidencyLinks to an external site. on Campus for your program’s Project Plan Guide to find specific expectations for the following sections. Be sure to update the reference list as you add resources to support your project development. As you integrate feedback from your instructor, refine your topic and problem statement, using a compelling argument for the proposed study. Develop questions that align with the identified topic and problem by completing the following in your Project Plan Template:
    Describe the significance of the topic to a program or field and program specialization.
    Explain the proposed gap or problem supported by existing literature.
    Describe the specific topic, including the target population name and phenomena.
    Identify the theoretical foundation or practice orientation for the proposed study supported by literature.
    Articulate the problem to be addressed and the questions aligned with the identified problem.
    Additional Requirements
    Written communication: Written communication is free of errors that detract from the overall message.
    Continue to use your Project Plan Template to structure your paper. Refer to the Virtual ResidencyLinks to an external site. Campus page for your PhD or Professional Doctorate program’s Project Plan Guide.
    Resources: Cite 25–35 scholarly references, including seminal works, and add them to Reference section at the end of your assignment.
    APA guidelines: Double-spaced paragraph formatting in the body of the paper. When appropriate, use APA-formatted headings. Resources and citations are formatted according to current APA style and format. Refer to Evidence and APALinks to an external site. as needed.
    Font and font size: Times New Roman, 12 points.
    Microsoft Editor: Use Microsoft EditorLinks to an external site. to help correct errors with grammar, usage, and writing mechanics.
    Turnitin: Use the Turnitin results to revise your work before submitting your assignment for grading.
    Synchronous Session Confirmation: When submitting your assignment, include this comment in the comments section “I attended and participated in the required synchronous session.”
    Review the Signature Assignment: Project Plan Approval scoring guide before submitting to ensure that you have met the expectations of this assignment. Note: Feedback from the program representative is incorporated in the scoring guide feedback. Learners must receive approval from the program and instructor to successfully complete this assignment.
    Portfolio Prompt: You should consider adding this assignment to your personal ePortfolio. This assignment demonstrates your ability to apply new literature to your topic and problem statements. You will want to organize your course assignments to easily support future work on your dissertation or doctoral project and to showcase your knowledge with employers after graduation. For more information on ePortfolio, visit the Campus ePortfolioLinks to an external site. page.
    Competencies Measured
    By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
    Competency 1: Apply advanced critical thinking skills to develop a researchable topic.
    Describe the significance of the topic to a program or field and program specialization.
    Competency 2: Synthesize ideas and concepts from literature and in practice to develop a researchable topic.
    Describe the specific topic, including the target population name and phenomena.
    Competency 3: Integrate credible scholarly literature to support ideas and concepts with evidence in proposing research methods and design.
    Explain the proposed gap or problem, supported by existing literature.
    Competency 4: Develop research questions that align with an identified problem.
    Articulate the problem to be addressed and the questions aligned with the identified problem.
    Competency 5: Articulate a theoretical framework for the proposed study.
    Identify the theoretical foundation or practice orientation for the proposed study, supported by literature.
    Competency 7: Integrate ethics and academic integrity into the selection of a topic.
    Achieve a Proficient or greater rating on all grading criteria for this assignment.
    Competency 8: Write in accordance with the academic and professional requirements of the discipline during the research process ensuring appropriate structure, grammar, usage, and style.
    Convey purpose in a well-organized text, incorporating appropriate evidence and tone in grammatically sound sentences
    Apply APA style and formatting to scholarly writing.
    View Rubric

  • “Wireshark Analysis of Network Traffic on Apollo Node”

    Network Traffic Analysisusing Wireshark
    To complete this part of the quiz you need to download the following packet capture file available via goo
    gle drive. Please note that you must be logged in with your Monash email
    account on the browser you are using for this quiz to access the google drive. Make sure you are logged out of all your personal google accounts if you encounter a request access page.
    Link to Apollo Node PCAP file

  • Project Management for Information Systems: Understanding the Basics

    1. Answer all the nine questions.
    2.All chapters referenced relate to the text Project Management for Information Systems (5th Ed)
    You must answer the questions relate the Text book. (Chapter 8 9 10  are attached in the file ‘3-Text book’)
    3.The Module 2 resource are attached, please read them carefully before you start work.
    4.No using Ai.

  • “Computer Skills Quizlet: Word, Excel, Access, and PowerPoint”

    Hello, this is a computer skilled quizlet.
    Word
    Excel
    Access
    Powerpoint
    May all be enclunded.
    Please read each question carefully before submitting.
    Log my be provided for skills quiz.

  • Title: The Incident-Handling Process and Ownership of the Internet

    QUESTION : 1 Your discussion question response should be at least 200 Words, with another 50 words per reply. An incident is an event that results in an actual or threatened violation of security policy. When an incident occurs, an organization needs to respond. The incident-handling process consists of the following steps: Preparation, Identification, Notification, Response, Recovery and follow-up, and Documentation. If you were tasked with handling an incident, which step would need the most help with, and where would you get the help to do it right? Explain how you came up with your answer. Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. Discussion_Grading_Rubric_Final.docx Download Discussion_Grading_Rubric_Final.docx
    Supplemental Material:
    -Security Incident Management. https://digitalguardian.com/blog/what-security-incident-management-cybersecurity-incident-management-processLinks to an external site. -ISO/IEC27035-1:2016 https://www.iso.org/standard/60803.htmlLinks to an external site. -Incident Security Policy Example. https://isoconsultantkuwait.com/2020/02/01/example-of-information-security-incident-management-policy-and-procedures/Links to an external site. -Educational Institution Example. https://www.csusm.edu/iits/services/security/program/incident.htmlLinks to an external site. –
    QUESTION : 2 Who owns the Internet? What things make up the Internet anyway? Who manages the Internet? Who makes the Internet rules? Is this a good arrangement?
    NOTE : I NEED MY ASSIGNMENT IN APA FORMAT. I NEED MY ASSIGNMENT ON TIME.I NEED 900 TO 1200 WORDS PER QUESTION. PLEASE DO NOT COPY FROM THE INTERNET. I NEED MY ASSIGNMENT WITHOUT AI AND PLAGDRISM SHOULD BE LESS THAN 15 %. PLEASE MAKE SURE ABOUT AI. PLEASE MAKE IT IN YOUR OWN WORDS.I NEED MY ASSIGNMENT IN APA FORMAT. DO NOT USE ANY WEBSITE FOR GRAMMER.

  • Title: “Exploring the Use of Machine Learning in Predicting Stock Market Trends”

    Create a Computer Science research project dissertation with chapters including a contextual, technical and literature review; research design and methods; practical implementation and experimentation; artefact project evaluation, academic reflection, discussion and conclusions, disseminated with a short digital presentation.
    The submission should represent both the practical and research elements of your project and it must be clear how your project relates to your programme of study.
    Detailed instructions for completing the dissertation and presentation are provided in the “PROM06 Dissertation and Presentation Guidelines” document provided.
    Dissertation
    The guideline word count for the dissertation is 10000 words. This is not a fixed limit so there isn’t a direct penalty for not hitting the exact number of words, with +/- 10% considered acceptable (i.e. 9000-11000 words). The abstract is included in the word count but reference list, figures, screenshots, diagrams, charts, tables, and appendices. are outside of the word count. A copy of your project proposal and any additional supporting documentation should be provided in appendices and referred to, where relevant, in the main body of the dissertation.
    Dissertations are required to be written in a standard format and a template is provided that should be used and modified appropriately to match  project. Dissertation should be submitted in PDF format.

  • Implementing UML Class Diagrams in Java: Cat and Dog Classes Title: Commented Code Assignment

    Overview
    Unified Modeling Language (UML) class diagrams are useful tools for mapping out different classes for an object-oriented program (OOP). Classes are the individual files that contain the code you write for your application. The UML class diagram displays each class’s attributes and methods and shows relationships between classes. Attributes are the data items a class file contains, and the methods are portions of code designed to accomplish a specific task. In this activity, you will analyze a UML class diagram and implement either the Cat or the Dog class. This activity aims to give you practice interpreting a UML class diagram and implementing a class based on that diagram. Implementing classes based on a UML diagram is a valuable skill to help you work as a part of a development team. This assignment will also help prepare you to implement the Pet class as part of your Project One submission. For this assignment, you do not need to implement or account for the relationships between Cat or Dog and the Pet class.
    Directions
    For this assignment, you will select either the Cat or the Dog Java class from the UML diagram. Open the Virtual Lab (Apporto) by clicking the link in the Virtual Lab Access module. Then open your Eclipse IDE and create a new class. View the Eclipse IDE Tutorial video in the Supporting Materials section if you need help creating a class in Eclipse.
    Before you begin, review the following UML class diagram. Pay attention to each class’s attributes and behaviors. As a reminder, though the diagram illustrates an inheritance relationship between the classes, the class you choose to implement does not have to inherit from the Pet class for this assignment. You will learn more about implementing inheritance in later modules.
    Next, you will implement either the Cat or Dog Java class. Your class must meet all the specifications from the UML class diagram. Include the following items in your Cat or Dog class:
    All attributes (variables) with appropriate data types Note that the types are not specified in this UML class diagram. You must consider the most appropriate data type for each attribute.
    At least one constructor method that initializes values for all attributes
    The constructor method is a special method that is run anytime an object is created from a class. The constructor method shares the name of the class it is found in.
    Accessors and mutators for all attributes Each attribute should have a corresponding accessor (“getter”) and mutator (“setter”) method. These methods are indicated in the class diagram.
    In-line comments and appropriate white space, according to the style guidelines you have learned so far in the course
    Commenting code is crucial for several reasons. Commenting code provides human-readable explanations of the code’s functionality. The comments make it easier for other developers or even the original coder to understand and maintain the code after some time. Clear and concise comments act as documentation. Comments offer insights into the logic, purpose, and usage of different sections of the code. Comments become especially valuable in collaborative projects or when handing over code to other developers. Comments can also help identify potential issues, edge cases, or important considerations that help communicate between developers. Well-documented code accelerates the development process and contributes to overall maintainability, which reduces the likelihood of errors and makes code more adaptable to changes and improvements.
    What to Submit
    Submit your Cat or Dog class as a Java class file. Use the Downloading Files From Eclipse Tutorial in the Supporting Materials section to help you download the file for your submission. The file that you will submit will end with the .java file extension. This file differs from the .class file. The .java file is human-readable code, and the .class file is what the Java compiler creates, which contains machine-readable code. You must also include your commented code.
    Supporting Materials
    The following resources support your work on this assignment:
    Resource: Downloading Files from Eclipse
    This tutorial will guide you through the steps to download files from Eclipse and submit them to your instructor via Brightspace.
    Video: Eclipse IDE Tutorial: Configuration and First Steps With Eclipse Hello World Program
    This video will help you become familiar with Eclipse IDE and create a class in Eclipse.
    Resource: Commented Code
    This document provides a code sample with code comments.

  • Title: “Future Directions and Adoption Criteria for Three Different Softwares”

    i have three reports about three diffrent softwars i need you to write the future dirction and conclusion about them discusses each software future directions. What can organization expect about each software’s future directions.
    Make conclusions on the criteria for adoption of each reviewed software. Under what conditions is one software suitable for implementation and not the other software. Discuss these conditions.

  • Achieving Basic Security Objectives with Information Security Controls

    Nist document is located here: 
    https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
    In this activity, you will demonstrate how different types of
    information security controls can be used to achieve the basic security
    objectives of confidentiality, integrity, and availability (CIA triad).
    Prompt
    Complete the steps listed below.
    View page 8 of the NIST document linked in the Module One Reading
    and Resources section of your course. You should specifically refer to
    the table labeled “Table 1: Security and Privacy Controls Families.”
    Create a simple table that identifies at least 3 of the controls listed in Table 1 in the document. 
    In your table, ensure that you: 
    Identify one control that addresses each tenet of the CIA triad. 
    Justify your control choice. 
    Provide citations for sources you used for support. You must research at least one source per tenet. 
    Use the table below as a model for how your finished table should look. Do not reuse the examples below in your submission.
    Control Category Justification Source
    In this column, include at least 3 of the controls from Table 1 in the document. In this column, identify which CIA triad category the control falls into (confidentiality, integrity, or availability). In this column, justify your categorization using resources that support your categorization. In this column, identify the resource you used for support. (Use either an APA-style reference or a direct link to the source.)
    Example: CA – Assessment, Authorization, and Monitoring Example: Confidentiality Example: If the system is not protected from unauthorized users, the data contained within the system can be exposed. Example: Adams, J., & Almahmoud, H. (2023). The Meaning of Privacy in the Digital Era. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1–15. http://doi.org/10.4018/IJSPPC.318675
    Note: In order for you to receive credit for this assignment, your finished table must contain at least 3 of the controls from Table 1.
    What to Submit
    Submit your table in a Word document with 12-point Times New Roman font and one-inch margins.
    Module One Activity Rubric
    Criteria Requirement Met (100%) Requirement Not Met (0%) Value
    Topics Includes at least 3 of the controls from Table 1 in the document Does not include at least 3 of the controls from Table 1 in the document 25
    Categories Identifies which CIA triad category the control falls into for at least 3 of the controls Does not identify which CIA triad category the control falls into for at least 3 of the controls 25
    Justification Justifies
    categorization using information from the document and any other
    resources that support categorization for at least 3 of the controls Does
    not justify categorization using information from the document and any
    other resources that support categorization for at least 3 of the
    controls 25
    Source Identifies the resource used for at least 3 of the controls Does not identify the resource used for at least 3 of the controls 25
    Total: 100%