bab-discussions Computer Science Assignment Help. bab-discussions Computer Science Assignment Help.
(/0x4*br />
Task1:words:350
Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst-case scenario and (2) the best-case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst-case scenario could learn from the best-case scenario?
Task2:words:350
After reviewing the assigned reading materials, complete the following activities:
1. Develop a product service idea.
A. Describe the product/service including the benefits of using the product/service
B. Discuss the potential customers for this product/service
2. Based on the nature of the product/service, recommend at least 3 possible social media to use in marketing the product/service. Describe your recommendations and discuss the advantages and disadvantages of each.(attached reading material)
bab-discussions Computer Science Assignment Help[supanova_question]
Data Structure and Algorithm Computer Science Assignment Help
3. Prove by induction that Fi =
φ
i−φˆi
√
5
where φ =
1+√
5
2
and φˆ =
1−
√
5
2
(Note: Fibonacci numbers
(F0 = 0, F1 = 1, F2 = 1, F3 = 2, . . .) satisfy the relation Fi = Fi−1 + Fi−2). (20 pt)
4. Solve the follwoing recurrences using the master method. (20pt)
(a) T(n) = 4T(n/3) + nlgn
(b) T(n) = 4T(n/2) + n
2√
n.
(c) T(n) = 2T(n/4) + √
n.
(d) T(n) = 7T(n/2) + n
2
.
5. Recall the following partition algorithm from quicksort:
Partition (A , p , r )
x = A [ r ]
i = p – 1
for j = p to r – 1 {
if ( A [ j ] <= x ) {
i = i + 1
swap A [ i ] and A [ j ]
}
}
swap A [ i +1] and A [ r ]
return i + 1
(a) Explain the running time of the algorithm if the initial call is Partition(A, 1, n) (In other words,
the input array is A[1, . . . , n] with size n). (10 pt)
(b) Assume that all elements of the input array A has the same value, e.g., A = [1, 1, . . . , 1] with size
n. What value does the partition algorithm return? (10 pt)
6. Describe an O(nlgn)-time algorithm to solve the following problem. (20pt)
Input: a set S of integers with |S| = n, and an integer k
• Decide: if there exists two elements in S whose sum is exactly k.
[supanova_question]
School Reform Plan and Presentation Business Finance Assignment Help
Type a school reform plan and create a 24 slide presentation using popplet or prezi. Must use data from an actual school
*Identify strengths
*collect data
*review district mandates
525-700 words, APA format
Address:
How would you expect your plan to affect the culture and climate of the school you selected
What types of professional development would you implement in your plan? Why did you identify these types of professional development? how do you anticipate these types of professional development will help transform the school you selected?
In your opinion, what will be the easiest changes to incorporate? Why? Explain and provide specific examples.
In your opinion, what will be the most challenging changes to incorporate? Why? Explain and provide specific examples.
[supanova_question]
Based on the analysis attached below on Tencent Holdings Ltd. Provide Recommendation and Implementation Plan. Business Finance Assignment Help
Please based on the last part “Alternatives” of the following analysis, the best option chosen by us is Maintain the same strategy, provide recommendation and implantation plan.
RECOMMENDATION AND IMPLEMENTATION PLAN
A clear identification of the selected alternative, matched with supporting arguments and a specific implementation plan.
- a) Recommendation: Why is this alternative the most appropriate? Using strategic management concepts, defend the alternative, outline the expected results and support the argument with a summary of how it fairs against the decision criteria.
- Highlight your recommendation’s key benefits, and sell it as to why it is the best solution
- Chosen recommendation aligned with body of analysis and in particular with Problem statement
- Understanding different levels of strategies
- b) Actions Plan: Brief implementation plan provided
- Identify required resources (most probably financial), contingencies, etc.
- Who: the marketing department will execute the solution
- What: the plan is to invest on more marketing and promotion in order to reach retailor and increase local sales
- When: first online study, then social media marketing strategy before implementation
- Where: new marketing campaign should carry out mainly online; certain retailers’ locations (restaurants, bars) may be
- How: focus on twitter, Instagram, Facebook, corporate e-mail (with retailers), face-to-face-meeting.
- Identify timeline: Short term, intermediate, & Long term: based on the questions above
- Identify required resources (most probably financial), contingencies, etc.
[supanova_question]
[4 Questions] International Economic Problems Economics Assignment Help
The task is simple and does not requires extensive writing.
There is no word/page limit. Just make sure that the answeres are fully provided and graphed
Do not attached downloaded graphs from the internet. You are free to use any sources but please either redo them (you can draw them by yourself) or modify them in any drawing software.
There are 4 economic problems which need to be solved. You can find them in the attached file. I know most of the answers are online, and you are free to use those answers as long as they are correct and they are paraphrased. Please include full answer and make sure nothing is missing.
For someone who has knowledge in the international economic field this should be a very easy to do task and should not take too much time at all.
Thanks for your support. You can complete the answers directly on the provided file. No specific format is required.
[supanova_question]
[supanova_question]
Practical Connection Assignment Computer Science Assignment Help
PROJECT PART 2: NETWORK DESIGN
INTRODUCTION
As discussed so far in this course, the configuration of a network affects the options available for security and network defense. Using the network survey produced during the first part of this project, together with host vulnerability assessments and access requirements, you need to design an updated network structure.
SCENARIO
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
TASKS
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
- Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
- Identify vulnerabilities and clear-text information transfer.
- Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
- Identify any opportunities for reduced ISP costs through port redirection or address translation.
- Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
- Create a professional report detailing the information above as supportive documentation for the network security plan.
- Create a report that includes a basic network diagram and research results.
FINAL PROJECT: NETWORK SECURITY PLAN
SCENARIO
You have been working as a technology associate in the information systems department at Corporation Techs for three months now. You have conducted a network survey and developed a basic network design intended to provide security for private network resources and publically exposed Web services.
Your manager specified that all information transferred between the sales team in the field and the organizational servers must be protected against snooping. The manager also wants the secured reporting site to be available only through the organization’s private network so that an outsourced network-based intrusion detection system (NIDS) service can log all connections.
Tasks
You need to recommend a network design and identify hardening strategies intended to meet the requirements. To do so, you must:
- Access the PCAP and other scan data for this project.
- Conduct research and determine the best network design to meet the stated requirements.
- Research hardening strategies and identify recommended mitigation strategies for identified vulnerabilities.
- Identify mechanisms for secure network access by remote users, both in terms of secure Web access as well as reporting access conducted using the private network.
- Develop a network security plan including network realignment, hardening practices, and policies for remote resource access.
- Identify expectations from recommended changes and provide justification for each recommendation in simple language so that primary stakeholders are able to understand it.
- Create a professional report detailing the information above, presented as a recommendation for a network security realignment project for Corporation Techs. Include persuasive justification and measurable expectations as part of this recommendation.
Write the network design results as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word.
EVALUATION CRITERIA AND RUBRICS
Evaluation Parameters |
Percentage Weight |
Did the student demonstrate an understanding of the competencies covered to date for Part II? |
15% = 90 pts |
Did the student identify all vulnerabilities identified in the packet trace and host vulnerability scans? |
15% = 90 pts |
Did the student produce a network design that will fulfill the stated requirements, separating private network resources and protected DMZ bastion hosts? |
20% = 120 pts |
Did the student demonstrate an understanding of the competencies covered in this course? |
15% = 90 pts |
Did the student produce a network design that will fulfill the stated requirements, including VPN and SSL access? |
10% = 60 pts |
Did the student identify effective network hardening strategies for identified vulnerabilities? |
10% = 60 pts |
Did the student provide a persuasive justification and measurable expectations for the recommended changes? |
10% = 60 pts |
Did the student create a professional, well-developed report with proper grammar, spelling, and punctuation? |
5% = 30 pts |
Total |
100% = 600pts |
Practical Connection Assignment Computer Science Assignment Help[supanova_question]
You are to present a 15 minutes voice-over report (use any medium of your choice, example; voice over power point, loom etc) on a subject of your choice. You may pick an article about anything you find interesting and that is related to your major, your w Writing Assignment Help
You are to present a 15 minutes voice-over report (use any medium of your choice, example; voice over power point, loom etc) on a subject of your choice. You may pick an article about anything you find interesting and that is related to your major, your work, your hobby, your sports interest, etc. Some ideas for topics that may lead to articles containing statistics information are:This report will be a write up from Cybersecurity major student.
Cybersecurity on the Global Economy and its job Opportunities:
This list is by no means all encompassing – this is just a starting point for you to generate ideas. You certainly can find articles that do not relate to any of the above topics.
Grading Rubric
1. Appropriateness of the topic (type of study discussed)
2. Statistics involved in the topic (be clear)
3. Technical details or fine points about the topic
4. Conclusion, including your opinions about the study and why this article is important to you
[supanova_question]
Please complete two tasks Business Finance Assignment Help
Task 1
Internet Exercise 13.27 or 13.28 on Page 487. The questions are provided below (I updated the link for the second one):
13.27: Go to www.brighthubpm.com/monitoring-projects/51982-understanding-the-s-curve-theory-for-project-management-monitoring/and read the article on the multiple uses of project S-curves. What does the article suggest about the use of different S-curves and analysis methods?
13.28: Go to http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.644.7422&rep=rep1&type=pdf and access the article by Q. W. Flemingand J. M. Koppelman. From your reading, summarize the 10key steps in EVM and the advantages the authors argue earned value offers for project control and evaluation.
The assignment involves that the student read the question, go and search for a site(s) on the internet and answer the question(s) in a 2-3 page paper. Refer to the course schedule matrix for due dates for all case assignments.
Task 2
Case Study #2
Pinto – Case Study 13.3 (485-486) – “Dear Mr. President -Please Cancel our Project”
This assignment involves that the student read the case study and answer all questions at the end of the case study in a 4-5 page paper. Your answers must include substantial support from at least two (2) scholarly journal articles on project management.
[supanova_question]
The goal is to see what effect various categorical factors have on political ideology Mathematics Assignment Help
MUST BE DONE ON SAS
PLEASE READ THE TASKS MAKE SURE YOU UNDERSTAND
This is a Statistical report that should be done solely using SAS (the software). All answers should be based on SAS. A power point is attached for the specific tasks and instructions. The report should be 4 pages, the code for SAS should be in an appendix.
The first task is to test if the null hypothesis Ho: P1=.60 P2=.20 P3=.20, the alternative hypothesis is Ha: at leas one of the proportions is not equal.
Then choose two of the five hypotheses to test.
An example of another statistical report is attached called (Assignment 1). follow the example for writing guidelines,
[supanova_question]
Diversity Management: IDS 400 Final Project Part One Business Finance Assignment Help
Submit your final portfolio—an analysis of an
issue or event in diversity through the four general education lenses: history,
humanities, social sciences, and natural and applied sciences.
Note:
Be sure to incorporate instructor feedback from your final project milestones
into this final submission, particularly Milestones One,
Two, and Four (Will attach).
Scroll
all the way down to get the professor’s milestone feedback
I have attached the instructions
and rubric
I have also highlighted the
instructions in yellow though for a clear understanding, you have to read
through the entire document.
4 pages; Superior grammar; No
plagiarism
[supanova_question]
https://anyessayhelp.com/ and access the article by Q. W. Flemingand J. M. Koppelman. From your reading, summarize the 10key steps in EVM and the advantages the authors argue earned value offers for project control and evaluation.
The assignment involves that the student read the question, go and search for a site(s) on the internet and answer the question(s) in a 2-3 page paper. Refer to the course schedule matrix for due dates for all case assignments.
Task 2
Case Study #2
Pinto – Case Study 13.3 (485-486) – “Dear Mr. President -Please Cancel our Project”
This assignment involves that the student read the case study and answer all questions at the end of the case study in a 4-5 page paper. Your answers must include substantial support from at least two (2) scholarly journal articles on project management.