Computer Science
[SOLVED] Interactive Dashboards
The purpose of this project is to give you experience working in Tableau to build interactive dashboards. The data provided comes from LendingClub.com. Each row represents a $25 investment (called a note) in a loan. You have a lot of information about each note and the borrower – a majority of which you will not need. A data dictionary is provided, though it appears to not cover everything in the data. If you are unsure about something, make an assumption and proceed. You can go any way you want with this data to show anything you think is worth looking at. I encourage you to be creative. You will be graded on the overall quality of your resulting dashboard and work completed. Submissions SUBMIT A .TWBX FILE, NOT A .TWB FILE! You can do this via File – Save As – and selecting Tableau Packaged Workbook (TWBX) as the file type. For more information on Interactive Dashboards read this: https://en.wikipedia.org/wiki/IBM_Cognos_Analytics
[SOLVED] Electronic Marketing
There are TWO tasks that you would need to do( they are separate): Task 1:Product Idea and Search Engines/Electronic Marketing. After reviewing the assigned reading materials, complete the following activities:1. You will develop a product service idea. A. Describe the product/service including the benefits of using the product/service B. Discuss the potential customers for this product/service2. Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.TASK 2:Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.
[SOLVED] IoT Devices
Securing IoT Devices: What are the Challenges? Security practitioners suggest that key IoT security steps include: 1) Make people aware that there is a threat to security; 2) Design a technical solution to reduce security vulnerabilities; 3) Align the legal and regulatory frameworks; and 4) Develop a workforce with the skills to handle IoT security. Final Assignment – Project Plan (Deliverables): Address each of the FOUR IoT security steps listed above in terms of IoT devices. Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. Needed 2 pages For more information on IoT read this: https://en.wikipedia.org/wiki/IOT
[SOLVED] IoT
Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 400 words
[SOLVED] Software Implementation
The purpose of project management and the SDLC is to increase successful software implementation. The article titled “IT Project Failure Rates: Facts and Reasons” makes it clear that a lot of projects still fail. Identify an IT system development failure that occurred within the last two years. Do not repeat an example from earlier in the course or one that has been posted by another student. Analyze which project management concepts were not respected by the project managers and wherein the SDLC these lapses occurred. Describe how you might have spoken up had you been on the steering committee.
[SOLVED] Digital Signatures
Analyze the advantages and disadvantages of digital signatures. APA formatting is a must with a minimum of 350 words. You must use at least two scholarly resources. APA formatting checklist. Times new roman, 12pt Set page margins to 1 inch on all sides. Double-space all text, including headings. Indent the first line of every paragraph 0.5 inches. Order the references alphabetically, each must have a hanging indent of 0.5 inches and in-text citations for the references listed. plagiarism report needed
[SOLVED] Cascading Style Sheet
Create a web page with an internal Cascading Style Sheet (CSS)
[SOLVED] Analysis Of Algorithm
Write an algorithm to sort the word E, X, A, M, P, L, E in alphabetical order.2. Given the numbers 12, 4, 33, 24, 25, 6, write an algorithm that separates the numbers into two lists: the even numbers on the left, and the odd numbers on the right, all in decreasing order.Given this program segment below with min = 2; i = 3.A[] = {9, 4, 1, 6, 8}temp = A[min];A[min] = A[i];A[i] = temp;After executing the three-line segment:a) Write the value for A[2]. _________________b) Write the value for A[3]. _________________Given the program below,for (int i=0; i<4; i++)n = 5+i;a) Write the value for n when i = 3. n =_______________b) What value must i be equal to for the loop to stop? i =_________From the instruction:printf("n The values are %d", val[i]);a) What does n represent? ___________________________________________b) What does %d represent? ___________________________________________6. Complete the instructions below by filling in the blank for parts a, b, and c, as you replace the question marks with their corresponding values to make this program segment print stop 10 timefor (int pass = ?; pass>=?; pass–){for (int i = 0; i<= ?; i++){printf( stop );a) pass = _____b) pass >= _____c) i <= _____
[SOLVED] Cyberattacks
Topic – – Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst-case scenario and (2) the best-case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst-case scenario could learn from the best-case scenario? – The summary should be 300 words with a minimum of 3 references on the topic. There should be no plagiarism, attach a plagiarism report with a 0% similarity index
[SOLVED] The LAN-To-WAN Domain
Overview Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do not count toward the overall page length. Imagine you are an information systems security officer for a medium-sized financial services firm with operations in Virginia, Florida, Arizona, and California. Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain, specifically: Protecting data privacy across the WAN. Filtering undesirable network traffic from the Internet. Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web.Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources.Having an area designed to trap attackers and monitor attacker activities.Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity.Hiding internal IP addresses.Allowing operating system and application patch management.The CIO has tasked you with proposing a series of hardware and software controls to provide security for the LAN-to-WAN domain. The CIO anticipates receiving a written report and diagrams to support your recommendations.InstructionsWrite a 35 page paper in which you:Use MS Visio or an open-source equivalent to graphically depict a solution for the provided scenario that will:Filter undesirable network traffic from the Internet.Filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web.Allow for a zone for anonymous users that aggressively controls information exchange with internal resources.Allow for an area designed to trap attackers and monitor attacker activities.Offer a means to monitor network traffic and identify and block unusual activity in real time.Hide internal IP addresses.Identify the fundamentals of public key infrastructure (PKI).Explain how your solution will protect the privacy of data transmitted across the WAN.Analyze the requirements necessary to allow for proper operating system and application patch management and propose an effective solution.Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.Reminder: The graphically depicted solution is not included in the required page length.This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:Propose security solutions for a LAN-to-WAN domain.
Use Promo Code: FIRST15