Follow the attach instructions to complete this work.
Use the attached template ( A and B) to complete this work.
Part A should be done separately, make sure it aligns with it rubric.( 60 points)
Part B should be done separately, make sure it aligns with it rubric.(100 points)
Category: Computer Science homework help
Follow the attach instructions. Use these attach pool of Paper Cs to complete t
Follow the attach instructions.
Use these attach pool of Paper Cs to complete this presentation.
Very Important: Make sure it aligns with the attach Rubric.
week 2 assignment: Complete the following assignment in “one MS Word document”:
week 2 assignment: Complete the following assignment in “one MS Word document”:
Chapter 3:
exercise 12 – Go to “data.gov” — a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety.
Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site.
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
Chapter 4:
Exercise 1 – Visit “teradatauniversitynetwork.com”. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Textbook:
Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support Dursun Delen
Note: within 8hrs, with references, APA format, plagiarism check required
Cybersecurity professionals do not simply focus on securing and protecting tech
Cybersecurity professionals do not simply focus on securing and protecting technical systems. They must also protect against humans.
In your journal, write about how humans pose a threat to cybersecurity in organizations. Also, address some strategies or techniques that organizations can incorporate to help defend against the human element of cybersecurity.
Your journal entry should be at least two paragraphs long.
Submit your assignment here. For details, see the assignment guidelines and rubric.
Introduce yourself briefly. Then select an emerging technology trend such as cl
Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artificial intelligence, big data, growth of remote workforce, and so on. Discuss how the technology is trending in the workforce and a potential security implication of the technology.
In response to your peers, comment on how a human-related error could cause a security implication within their stated emerging technologies.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello Everyone,
My name is Clinton, and I am pursuing a degree in cybersecurity. I am 38 years old and have been in the manufacturing my entire professional career. I have chosen to transition into the cybersecurity field for a few reasons. One reason is my age and ability to keep working in a physically demanding career. Two would be my love for technology and computers. There is a lack of talent in the cybersecurity world and an ever-growing need to fill those positions. With high salaries and job security, This career perfectly fits my wants and needs.
My chosen up-and-coming technology is quantum computing. The advancement of computers and technology is amazing, and we keep advancing by leaps and bounds. Unfortunately, those leaps and bounds come at a cost. Quantum computer tech is still in its infancy, but the research is making big waves. The most significant draw for Quantum computers is their ability to process large amounts of data faster than a normal computer. We know that computers calculate their information in bits, representing each bit by either a 1 or a 0. This is the binary system that all computers use to compute. Since each bit can only represent one of two numbers, the computing capabilities are limited by how fast the processor can interpret the bits. Quantum computing works on the same premise but uses qubits. These qubits are capable of storing more than a single binary number. With the ability to hold both a 1 and a 0 simultaneously, the process grows exponentially the more qubits are transferred. This gives the computer a massive upgrade in computing power.
This technology is great for speeding up computational projects, but please remember the presented cost. This double-edged sword will present itself as the tech becomes cheaper to maintain and operate. Take encryption, for instance. We skimmed the surface of encryption in our reading this week. Normal computers would take years to crack a good 256-bit encryption, making attempting to crack encrypted messages and files costly and no longer worth the time. What happens when the computer’s processing speeds can crack those encryptions in minutes? The battle between the red and blue teams often involved fighting each other with the same technology. As one side advances, so does the other. This brings the need to increase our efforts in all aspects of cybersecurity. If we hope to catch up to the threat actors, we must learn and utilize every tool in our tool belt.
RESPONSE TWO
Hello everyone,
My name is Aharown Jackson, I am a Cybersecurity major, looking forward to interacting with you all.
My emerging technology that I will be discussing is Cloud Computing, or sometimes referred to as Software as a Service (SaaS).
Cloud computing has truly changed the game when it comes to how businesses today store and access software and, at times, their own data (Sabu, 2023). There are many reasons why this is true but for the sake of time I will be discussing two. The first reason is because of the flexibility in scalability. As a business grows it becomes extremely easy to scale up or scale down their computing needs via the cloud (Sabu, 2023). The second being the amount of data storage available and the availability of back ups. Their is a seemingly endless supply of data storage on the cloud computing sector and should an organization lose data for what ever reason, it gives a level of reassurance to that organization to have a third party be responsible for back ups (Sabu, 2023).
Another reason why I see the trend of cloud computing being an emerging technology are the players in the game. We are talking about huge organizations competing here. Amazon, Google, Microsoft, IBM, Oracle (Sabu, 2023); I’m talking the big boys duking it out for market share. When such high profile companies like the ones mentioned are investing the incredible amounts of resources into these technologies, one has to pay attention.
The biggest security implication that comes to mind is the reliance on a third party to maintain the cybersecurity triad. Although these huge companies must have a sound and stout security apparatus. Their cloud computing departments, specifically data storage, now becomes a huge target. A treasure trove to the most sophisticated threat actors. We’ve seen many attacks by high level threat actors involve the years and years of passive attacks through surveillance before they strike. I wonder if someone isn’t already watching…
https://www.youtube.com/watch?v=RFv53AxxQAo Designing a usable interface can be
Designing a usable interface can be challenging. One of the best ways to learn is to review interfaces and see where they deviate from convention. This week, we learn about 2 concepts: the 8 golden rules of interface design and methods of capturing the user’s attention.
For your discussion question this week, first, provide 3 examples of systems, computer interfaces, applications, or websites that violate some of those rules. For each example, explain what rules are violated and how you would fix them.
Second, provide 3 examples of interfaces that catch the user’s attention well when alerting them to an abnormal condition or time-dependent information. Explain other options that could have been used to accomplish the same result.
Need about 3 pages with peer-reviewed sources. No introduction or conclusion needed.
Discussion Points: Compare and Contrast Web Analytics methodology Compare
Discussion Points:
Compare and Contrast Web Analytics methodology
Compare and Contrast Web analytic tools (at least two) used to measure metrics
Analyze Google Analytics Products
Forum Rubric:
Rubric for Learner Posts
Points
Synthesis of concepts in a substantive manner (critical to class performance)
30
Applications of personal experience
20
Writing standards
10
Response to two or more students in a substantive manner
40
General Instructions for your Website: During Week 1 through Week 7 of this c
General Instructions for your Website:
During Week 1 through Week 7 of this course, you will be building a personal website on a topic of your choice. Choose a topic about which you are both knowledgeable and enthusiastic, so that you will be able to easily write about the topic and share your knowledge of the topic through your website. During Week 1, you will create the home page of your website. Make sure that you write the content (the paragraphs of information about your topic) yourself. Do not copy content from other web pages. Your website should contain at least 4-6 paragraphs of information, arranged in a logical manner (using headings and sub-headings appropriately). During Week 2, you will add an external style sheet to your website. During Week 3 through Week 7, you will either add additional pages to your website or you will add new functionality to your home page, as directed in the instructions for each assignment.
You must write the code files by hand for all assignments in this class. A simple text editor, such as Notepad or Notepad++ will suffice (or TextEdit on the Mac). DO NOT use GUI editors, such as FrontPage, Dreamweaver, etc. You must write the code for your web pages yourself. If you are using a PC, it is strongly recommended that you download the free Notepad++ text editor because it contains extra features which assist with debugging, such as line numbering and color coding of different elements of syntax. Mac users should use the TextEdit text editor that comes with the Mac OS. However, if you are a Mac user, make sure you set TextEdit to use Plain Text by default. You can find instructions for this here.
Make sure all of your web pages comply with the HTML 5 standards and CSS standards. DO NOT use obsolete HTML elements and attributes from previous versions of HTML. By including the HTML 5 DOCTYPE declaration in your webpages, and validating all of your HTML files here, you can be sure that your code complies with HTML 5. Starting Week 2, your external style sheet (.css file) must pass validation at the W3C CSS Validation Service. Make sure you use the “Validate by File Upload” option (and NOT the “Validate by Direct Input” option), on both of these validators since this is the way your instructor will check your pages when grading your assignments.
The home page of your website must be named “LastFirstHomePage.html” where “Last” is your last name and “First” is your first name. For example, if your name is John Smith, you would name your home page file SmithJohnHomePage.html Starting with Week 2, you will also have a CSS file linked into every HTML page on your website. Name your CSS file “LastFirstStyleSheet.css” where “Last” is your last name and “First” is your first name. Your website must only have 1 CSS file and that file should be linked into all HTML pages on your website. Additional HTML pages created for your website (During Week 3 through Week 5) should be hyperlinked together through a navigation menu that appears on all pages of your website. Naming conventions for each additional page on your website will be included in each assignment description that requires a new HTML page.
Specific Instructions for Assignment 4:
For this assignment, you will add a third page to your website named “table.html” and code a table on that page. You will also add code to your CSS file to format your table.
1) Create a new HTML file in your text editor and name the file “table.html”. Just like last week, your new file should contain all of the same basic code that is in the head section of your home page. The body section will contain your new table, which you will create by following the remaining steps of this assignment. After coding all of the basic required HTML tags in your new file, save your new file and validate it using the HTML validator. Debug and fix any errors identified by the validator until your file passes validation.
2) Make sure the external CSS style sheet you created in Assignment 2 is linked into your new “table.html” file with the tag in the head section of the file. Your website should only have 1 CSS file, and that same file should be linked into all HTML pages of your website.
3) Modify your navigation menu on your home page and your “about.html” page by adding a link to this new page. Then add your navigation menu to your new “table.html” file, so that users can navigate to your other pages from this new page.
4) In your table.html file, add the following code:
Create a table using the
, and | tags appropriately. You can see examples of the code for HTML tables here. 5) In your HTML file, give your table a caption, using the Open your CSS file in your text editor and complete the following steps: 6) In your CSS file, set the “width” property for the
|
---|