Category: Computer science

  • Title: String Puzzle Game with Exception Handlers and Control Flow Mechanism Introduction: In this assignment, we will be creating a puzzle game using the string type, exception handlers, and control flow mechanism. The game will involve manipulating strings to solve puzzles

    Module 5 Assignment
    Use one of the programs you wrote in the previous assignments, adding at least one String type, exception handlers, and control flow mechanism. Make sure to display user-friendly messages and not the raw Python error ones. 
    Alternatively, you can create a puzzle game using all you learned so far PLUS the string type, making sure to add exception handlers and a control flow mechanism.
    Submission Instructions
    Assignment solution should have a structure: Title page (your name, course name, term, my name), Introduction, Body/Analysis, Conclusions, and References. The actual solution code would go into the Body/Analysis section.
    Figure/table captions should follow the APA format.
    Your submission is a Jupyter Notebook (,ipynb) with a rendered (.PDF or .HTML) file – alternatively, you can leave the .ipynb file in /students/[your_username]/Assignments/Module_X/ folder instead of submitting it. These would include all the text, code, results, plots, images, etc.
    Submit the following files:
    o    ALY2100_FirstnameLastname_ModuleX_Term_Year.ipynb
    o    ALY2100_FirstnameLastname_ModuleX_Term_Year.html or ALY2100_FirstnameLastname_ModuleX_Term_Year.pdf

  • “Troubleshooting VirtualBox and Ubuntu Installation: Challenges and Solutions”

    I am facing issues with question 3 and 4 (and consequently 5.) I attached the project questions plus the answers that I have so far. I’ve been fighting with VirtualBox to properly install Ubuntu for a couple of days but now I’m wondering if it’s even the right approach? Thank you!

  • Title: The Complexities of Jurisdiction over the Internet and its Global Implications

    Prompt:
    After reading about the origin of the internet in the textbook (screenshots are attached below), discuss how difficult it is to determine who has jurisdiction over the internet and the global implications.

  • Reflecting on Data Protection Legislation and Compliance “Module Reflection: Limited Depth of Knowledge and Inconsistent Writing Style”

    Textbook: Fundamentals of Information Systems Security
    Chapter 4, “Organization and Adhering to Compliance Laws” section
    Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections
    Chapter 9, “Compliance and Professional Ethics” section
    Chapter 15, “Compliance is the Law” section
    As you read, consider the following questions: 
    Chapter 4, “Organization and Adhering to Compliance Laws” section: 
    How
    do you mitigate risk and achieve compliance with laws, regulations, and
    requirements? What are the primary means to ensure compliance?
    Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections:
    Why are malicious actions on the rise? What are you trying to protect?
    Chapter 9, “Compliance and Professional Ethics” section: 
    How does an organization monitor for compliance? How does compliance relate to ethics?
    Chapter 15, “Compliance is the Law” section:
    What are the primary means to ensure compliance? How is compliance related to information security?
    CIA Triad and Fundamental Security Design Principles PDF opens in new window
    This
    document contains essential terms and their definitions that we will be
    revisiting throughout this course and the rest of your program.
    As you learn about data protection and legislation, it is important to reflect on what you have read and learned in this module.
    In your journal, you will reflect on general data protection.
    Specifically, you will discuss legislation, threat actors, and data
    protection compliance.
    Your journal entry should be three or more sentences per prompt and address the following questions: 
    What are some important pieces of legislation that affect how organizations conduct information technology operations?
    Why are malicious actions from threat actors on the rise?
    What are the primary means to ensure compliance?
    How does compliance relate to ethics?
    Journal Guidelines and Rubric
    Overview
    Journals are private and between you and the instructor only.
    Approach these activities as an opportunity to reflect upon and apply
    what you learn each week based on the assigned readings, discussions,
    and activities. As a successful professional, you will need good
    reflective and writing skills. Journal activities offer you the
    opportunity to develop these skills further. The journal entries in this
    course are graded separately.
    Prompt
    First, complete the assigned readings for the week. Then read the
    journal prompt and write a reflection. Your journal entry should be two
    paragraphs long and address the prompt provided in each module.
    In your response, be certain to address the following critical elements:
    Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
    Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
    Voice: Write in a style that is appealing and
    appropriate for the intended audience and use a consistent voice that is
    evident throughout.
    What to Submit
    Submit journal assignments as Word documents with double spacing,
    12-point Times New Roman font, and one-inch margins. Responses should be
    at least two paragraphs long and address the points indicated in the
    journal prompt for each module.
    Journal Rubric
    Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
    Critical Thinking and Reflection Supports claims with relevant examples of previous and logical thought processes Supports claims with mostly relevant examples of previous and logical thought processes Supports claims with somewhat relevant examples of previous and logical thought processes Does not support claims with reflection on relevant personal examples 25
    Integration and Application Shows excellent depth of knowledge of the module content and exhibits careful consideration of the topic Shows good depth of knowledge of the module content and demonstrates that the module content has been read Shows limited depth of knowledge, indicating the module content may have been reviewed but needs to be explored further Does not address the prompt and reflects that the module content has not been read 25
    Voice  Writes in a style that is appealing and
    appropriate for the intended audience and uses a consistent voice that
    is evident throughout Writes in a style that is generally appropriate for the intended audience and makes an attempt to use a consistent voice Writes in a style that considers the audience but is not consistent in voice, and it is difficult to identify the voice Does not attempt to use a style that considers the audience and leaves no evidence of the voice 25
    Writing  Is free of errors in organization and grammar Is mostly free of errors in organization and grammar; errors are marginal and rarely interrupt the flow Contains errors in organization and grammar, but errors are limited enough so that it can be understood Contains errors in organization and grammar, making it difficult to understand 25
    Total: 100%

  • “Building a Chatbot Box for Website: Enhancing User Experience”

    every thing related to the project is in the file, the idea is to build a chatbot box for a website. 
    Everything should be written in the outline and should cover all requirements. 
    the due date is in two hours 

  • “Applying Fundamental Security Design Principles to a Real-World Scenario: A Case Study Analysis” CYB_100_2-2_Neo_Anderson.docx

    Template and pdf attached for assignment
    Overview
    In this case study assignment, we will continue to investigate the
    Fundamental Security Design Principles at work in a real-world scenario.
    Through the lens of data protection, we will analyze the following
    principles:
    Least Privilege
    Layering (Defense in Depth)
    Fail-Safe Defaults / Fail Secure
    Modularity
    Usability
    Note: You will be engaging with this scenario again in the Module Three discussion.
    Case Study Scenario
    You are a cybersecurity analyst working at a prominent regional
    hospital. On Monday morning, the organization’s technology help desk
    received a call from Dr. John Beard, a long-time resident physician. Dr.
    Beard called them to report that his company laptop was stolen from his
    car after he stopped to work out at a local gym on his way home from
    the office.
    A representative from the help desk informed you of the theft and
    also mentioned that Dr. Beard stated that his laptop case contained a
    USB thumb drive that he purchased to “back up” important patient files
    he saved onto his laptop. Dr. Beard also revealed that his daily planner
    “might have” been in the bag and that the planner had his hospital
    computer user name and password written on the back cover. Prior to
    ending the call, Dr. Beard told the representative that he would call
    her back if his daily planner turned up.
    As your conversation with the help desk representative wound down,
    she commented that Dr. Beard has many different computer “issues” that
    keep her team busy. She recalled talking to Dr. Beard about the
    hospital’s policy against accessing patient files remotely and his
    annoyance with her inability to help him “get work done” while away from
    the hospital. And just a week ago, a junior member of her team
    completed a service ticket to reconfigure Dr. Beard’s laptop to grant
    him administrative rights. The service request stuck out because it did
    not have a “reason” indicated (a company policy requirement) but was
    still approved by James Davis, the hospital’s senior system
    administrator and close personal friend of Dr. Beard.
    Prompt
    After reading the scenario above, complete the Fundamental Security
    Design Principles mapping table in the Case Study Template and answer
    the short response questions. You’ll notice that the listed Fundamental
    Security Design Principles differ from those presented in previous
    activities. In the cybersecurity trade, there are many different design
    principles and frameworks. Successful practitioners learn to work with
    many different (but conceptually similar) principles to achieve their
    security goals.
    Specifically, you must address the critical elements listed below:
    Fundamental Security Design Principles Mapping: Fill in the table in
    the Module Two Case Study Template by completing the following steps
    for each control recommendation:
    Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X.
    Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation.
    Explain your choices in one to two sentences, providing a selection-specific justification to support your decision.
    Short Response Questions:
    How might you work with someone like Dr. Beard to cultivate a security mind-set
    that is more in line with the organization’s ethical norms? Hint:
    Consider his attitude, his past behaviors, and his opinion about
    organizational policies.
    How would you help the hospital better secure its
    patient files? Make sure to incorporate at least one data state
    (data-at-rest, data-in-use, or data-in-motion) and one of the control
    recommendations from your completed table in your response.
    What to Submit
    Submit your completed Fundamental Security Design Principles map and
    short response answers in the Module Two Case Study Template. Your
    submission should be 1–2 pages in length (plus a cover page and
    references, if used) and written in APA format. Use double spacing,
    12-point Times New Roman font, and one-inch margins. Use a filename that
    includes the course code, the assignment number, and your name—for
    example, CYB_100_1- 4_Neo_Anderson.docx.
    Module Two Case Study Activity Rubric
    Criteria Proficient (100%) Needs Improvement (65%) Not Evident (0%) Value
    Mapping: Fundamental Security Design Principle Specifies which Fundamental Security Design Principle applies to at least 8 of the control recommendations Specifies which Fundamental Security Design Principle applies to fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 20
    Mapping: Security Objective Indicates which security objective (CIA) best applies to 8 or more control recommendations Indicates which security objective (CIA) best applies to fewer than 8 control recommendations Does not address critical element, or response is irrelevant 20
    Mapping: Explain Explains choices with relevant justifications for at least 8 of the control recommendations Explains choices with relevant justifications for fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 25
    Short Response: Cultivating Mindset Explains how you might work with
    someone like Dr. Beard to cultivate a security mindset that is more in
    line with the organization’s ethical norms Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10
    Short Response: Better Secure Explains how you would help the
    hospital better secure its patient files incorporating at least one data
    state (data-at-rest, data-in-use, or data-in-motion) and one of the
    control recommendations from your table Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 20
    Articulation of Response Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors
    related to citations, grammar, spelling, or organization that negatively
    impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 5
    Total: 100%

  • “Enhancing Presentations with Effective Powerpoint Editing”

    This is a Powerpoint edit.
    Instruction will be attachted please read carefully.
    Follow each task correctly.
    2 supporting files will be added

  • “Grading and Providing Feedback on a Student Assignment: Evaluating a Paper on Local Area Networks”

    Teaching technology provides instructors the opportunity to grade and assess many hands-on projects with a specific predicted outcome. However, along with the hands-on assignments, we are also tasked with grading writing assignments. A student will not automatically know what we mean when we assign a low grade without meaningful information to accompany the grade. In this assignment, you will practice evaluating student work and offering constructive feedback to learners.
    Instructions
    You will use the Learner Evaluation Assignment Grading Rubric to grade this Completed Assignment written by a student in an undergraduate program. The student wrote the Completed Assignment based on the Student Assignment Description. Submit the Learner Evaluation Assignment Grading Rubric, which allows a maximum of 9 points. In addition, provide the student with qualitative feedback about areas where the student can improve.
    Your assignment will be graded according to the following criteria:
    Evaluate the format and style of a student assignment.
    Evaluate grammar within a student assignment.
    Evaluate content and focus within a student assignment.
    Provide qualitative feedback on a student assignment that helps the student understand areas needing improvement.
    Student Assignment Description
    These are the directions that were provided for the student paper that you are going to evaluate:
    Please write a 2-page scholarly paper that describes a local area network. Use 12-point font, double-space, and write the paper in third person. Include a minimum of two references with a listed author and date of publication, cited with APA style.
    Completed Assignment
    This is the paper that the student produced.
    How would I describe a local area network? Wow, that is a tough question to answer. The network usually has locations in various cities and is connected to a mane location in a larger city.
    Telephone line are used to connect the networke from one town to another town across the country. A switch and a hub may be used in the different towns to pass data to the clinets in the towns(Cisco, 2007). If the netork goes down in one town it may go down in another town since all of the equipment is connected by the telephone lines. Thes lines are called circuits, but I prefer to call them telephone lines.
    I have seen this happen in my job where I am a nerwok administrator for a company that I will not name at this time. If you go to the website of http://www.cisco.com you will find more information about a local area network that you can read in your spare time. You can also find drawings of netwoks that are popular with some companies. I did not use the drawings for this paper since it was only two pages.
    In conclusion, this is a tough question to answer, so I guess I could say the that it is best to go to the Cisco website to look at the best designs.
    Do not rewrite the student assignment. Your task is to evaluate this assignment.
    Please use the following rubric as a basis for grading the above assignment:
    Learner Evaluation Assignment Grading Rubric
    Does Not Meet Objective
    (0-1 point) Meets Most Objectives
    (2 points) Meets Most Objectives
    (2 points)
    Format and style (includes APA usage, third person) Misuses APA, does not use font, spacing or style listed in the assignment. Generally meets the objectives, with minor problems. Meets all of the format, style and APA guidelines listed in the assignment.
    Grammar (Spelling, punctuation, word usage) Misspells words, uses incorrect punctuation, employs a poor choice of words. Minor issues with spelling, punctuation, and word choice. No errors in spelling, punctuation, and word choice.
    Content focus (on topic) The focus of the paper drifts from the topic and does a poor job of topic identification. The focus of the paper stays within the scope of the assignment, but does little to elaborate on the issue. The focus is on the scope of the assignment and elaborates on the topic to add value to the paper.

  • “Voiceover Presentation Assistance for Dissertation Defense”

    I need a female help me to present my dissertation, record it like a voiceover (no visual needed) in 10 mins

  • My Favorite Hobby: Painting Slide 1: Title Page – Title: My Favorite Hobby: Painting – Subtitle: By [Your Name] Slide 2: Introduction to Painting – Image of a painting – Brief description of painting

    For this assignment, you will create a 5-slide PowerPoint presentation about your favorite hobby or pastime. You can choose one hobby to describe in detail or describe a different hobby on each slide. Each slide should include written or bulleted content describing the hobby, why you enjoy it, etc. Proper grammar is required. Please note that all content must be written in your own words. Plagiarized information will not be accepted.  All images, tables, and text should enhance the topic. 
    In your presentation, you must include the following elements at least once:
    A title page (with the topic of the presentation and your name as the subtitle)
    An image (from your computer, a stock image, or an online image. When using images from online, be sure to include the citation.) 
    A shape (inserted from the ‘shape’ option in the ‘illustrations’ group.)
    A table (Select the size from the ‘tables’ group and include text that compliments your topic)
    A Speaker Note (A note below a slide in the note viewer)
    The following must be applied to the whole document:
    A Theme of your choice (Selected when you initially created the presentation) 
    Transitions (Visual effects between each slide- 5 total)
    Animations (Visual effects added to an object on each slide- 5 total)
    A footer- using the Header & Footer feature (with your name on each slide- 5 total)
    Slide numbers- using the Header & Footer feature (5 total)