Categories
Computer Science homework help

The Importance of Having a Contact Form on Your Website The Importance of Having a Contact Form on Your Website After reading the article “11 Reasons Why You Need a Contact Form on Your Website,” I was surprised to learn about the potential for increased website

Read the brief article 11 Reasons Why You Need a Contact Form on Your WebsiteLinks to an external site..
After reading the article, share one of the listed reasons you were unaware of before reading the article, or if you were already aware, share the one you feel is most significant. Can you think of any other reasons not in the article?
200-250 words

Categories
Computer Science homework help

Forecasting Demand for Super Sonic II Wheelchairs and Occupancy Rates at Big City Hospital

1.  A medical device dealer in the local area wants to make an accurate forecast of demand for Super Sonic II Wheelchairs during the next month.  Because the manufacturer is in Japan, it is difficult to send wheelchairs back or reorder if the proper number is not ordered a month in advance.  From past sales records, the dealer has accumulated the following data on the Super Sonic II Wheelchairs over the past year:
MonthWheelchair SalesJanuary9February7March10April8May7June12July10August11September12October10November14December16
Compute a 3-month moving average forecast of demand for April through January (of the next year).
Compute a 5-month moving average forecast of demand for June through January.
Compare the two forecasts of the 3-month and 5-month using MAD.  Which forecast method should the dealer use?
2.  The Big City Hospital has experienced the following occupancy rates during the past 9 months:
MonthOccupancy Rate (%)183278375481586685789890986
Compute the exponential smoothing forecast with alpha=.2
Compute the exponential smoothing forecast with alpha=.2 and beta=.3 (you can use the results of first part and just add beta calculation)
Computer linear trend line forecast
Compare three forecasts using MAD and indicate which appears more accurate

Categories
Computer Science homework help

Access Controls and Security Mechanisms for XYZ Consulting Firm

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the last 5 years.  
Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed). 
Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Description
Create the following section for Week 3: 
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.
Complete the following section for Week 3:
Week 3: Access Controls and Security Mechanisms
For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control.
Describe SSO and VPN technology, and discuss whether they can be used in the company.
Name the document “CS651_FirstnameLastname_IP3.doc.”
The template document should follow this format:
Security Management Document shell
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
Section headings (create each heading on a new page with “TBD” as content, except for Week 1)
Week 1: Introduction to Information Security
This section will describe the organization and establish the security model that it will use.
Week 2: Security Assessment
This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
Week 3: Access Controls and Security Mechanisms
This section examines how to control access and implement sound security controls to ensure restricted access to data.
Week 4: Security Policies, Procedures, and Regulatory Compliance
This section will focus on the protection of data and regulatory requirements that the company needs to implement.
Week 5: Network Security
This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

Categories
Computer Science homework help

“Pros and Cons of Windows Virtual Desktop for Businesses” Title: Pros and Cons of Windows Virtual Desktop for Businesses The Windows Virtual Desktop (WVD) is a cloud-based service that allows users to access their computer-based resources from any device with an

 
The Windows Virtual Desktop provides a way to access your computer-based resources on multiple computers without having to have them stored on the computer you are sitting at.
Explain why this method could be a good choice for some businesses or may not be ideal for others.
Consider things like availability, troubleshooting, licensing costs, et cetera.
200-250 words

Categories
Computer Science homework help

Maximizing Resources and Flexibility: The Value of Virtualization in Operating Systems

In this module, you learned about how an OS can exist on a virtual machine. For example, you might use a MacBook and have macOS Catalina as the operating system installed on it. Then you might use Windows 10 as a virtual desktop on a virtual machine. This capability allows you to utilize both OSes on one computer. As you complete this module’s discussion, you and your peers will reflect on the value of virtualization, specifically in relation to operating systems.
In your initial post, address the following:
Provide an example of when an organization or an IT professional might choose to implement an operating system via virtualization, and explain how that example meets organizational needs.
In response to two of your peers, address the following:
If you agree, build upon the original poster’s claims and further the discussion. If you disagree, state your own argument in a constructive way.
Then answer the following questions:
Why is virtualization important, especially in relation to OSes? What makes virtualization important?
How is virtualization being used in the workplace today?
FOR OTHER FRIENDS REPLIES
1. There are many instances, within organizations, that call for using virtualization. One example would be two organizations collaborating, however, one organization (we’ll call them organization B) still uses legacy software that is specific to their older OS. Organization A could revert all their systems back to that version but the expense and practicality of it would be a nightmare to execute. Instead, organization A can simply use a virtualization machine that is based in a main computer or server and has instances set up across the organization where it is needed. The reason for having a VM set up on main server or computer is so that you only need one firewall to regulate all the packets to and from the VM. Then you set up a internal VM network on all company computers and run those instances through the firewall VM which is external (allows for internet connection). 
This solution will allow organization A to use organization B’s legacy software without great expense or technical headaches. Ultimately leading to a successful, and ideally profitable, collaboration. 
2. Imagine a situation where a company needs to run multiple operating systems on the same physical server for different purposes. By using virtualization, they can create multiple virtual machines (VMs) on a single physical server, each running its operating system.
This fulfills organizational needs in several ways:
1. **Resource Efficiency**: Virtualization allows better use of hardware resources by consolidating resources and reducing hardware costs and energy consumption.
2. **Isolation**: Each VM operates independently, enhancing system reliability and stability.
3. **Flexibility**: Virtualization offers the flexibility to quickly deploy and scale environments as needed.
4. **Security**: Virtualization can enhance security by isolating sensitive applications or environments.
Overall, implementing operating systems via virtualization allows organizations to optimize resource usage, increase flexibility, improve security, and streamline IT management processes, effectively meeting various organizational needs.

Categories
Computer Science homework help

Title: “Enhancing Perimeter Defense: Evaluating and Implementing Effective Assessment Techniques”

Perimeter defense techniques
Evaluate the types of assessments, select one that you might use, and explain why it is important.
Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.
Active Assessment
Passive Assessment
External Assessment
Internal Assessment
Host-based assessment
Application
Wireless network assessment
Vulnerability Assessment

Categories
Computer Science homework help

“Agile vs. Waterfall: Choosing the Right Process for our Semester Project” Agile vs. Waterfall: Choosing the Right Process for our Semester Project Introduction The process of software development is a crucial aspect of any project, and choosing

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

Categories
Computer Science homework help

“Exploring Risk Factors and Diagnosis in Medical Data”

 
Attached two files , one for the data you will work on in excel file and file discription for the data in PDF
As a data scientist please study the data and answer the following questions 
1- what is the primerly diagnosis ?
2- What potential risk factors were there?
3- Make a statistical description of the data ( primely diagnosis, risk factors, gender, age ,…etc.)
4- is there a statistal relationship between the primely diagnosis and its risk factors?
please show your work in excel file and pdf file Including  tables and graphs with explanation

Categories
Computer Science homework help

Title: “Securing the ACME Yearbook Company’s Internet-Based Product: A Cryptographic Implementation”

 
IT543-4: Design an implementation of cryptographic methods for an organization.
Assignment Instructions:
This assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:
The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and design the school’s yearbook, including the ability to import additional photographs and lay out each yearbook page. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each yearbook page.
Note: Their previous product used CD ROMSs, and there was no Internet access for development, viewing, or purchase.
The company uses this data set to produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record-keeping or for direct sale to students to accompany their hard copies.
The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.
The Internet-based product should include the following additional features:
Allow all yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
Allow the desktop product to be used to edit the yearbook and any new Internet version of the product.
Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
Allow people to purchase copies of the completed yearbook using a credit card.
Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also, make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.
Security concerns include:
Licensing of the application client on school PCs.
Security for the output designs on the cloud and on CDs.
Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
Online purchasing of electronic copies of yearbooks.
Communications security.
You must do the following:
Identify and list RISKS to be addressed.
Design a solution or a solution set.
You do not have to address all of the items below, but here are some possible topics to consider:
Email
Remote access (VPN)
Whole disk encryption
Encrypted flash sticks
E-commerce transactions
Database encryption
Use of hashes (e.g., for checksums, passwords, perhaps even credit card information)
Cloud access security
Digital certificates (at various levels)
DRM for electronic copies of yearbooks
Acceptable use policies regarding the use of company computers, personal computers, and perhaps even use of personal encryption
Identify potential vulnerabilities with your proposed solution. (Note: Not all vulnerabilities can be solved with encryption.)
Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.
Your design should take into consideration the data storage, data processing, and data communication needs of the system.
It is anticipated that the length of the paper will be 10–12 pages.

Categories
Computer Science homework help

Implementing and Analyzing Merge Sort /* Title: Implementing and Analyzing Merge Sort // Implementation of Merge Sort Algorithm // Runtime: O(nlogn) // Destructive: No // In-Place: No

 
Your job is to:
1) implement the one algorithm in these files that is not already implemented (merge sort),
2) Tell me in a comment in your code three things:
what the runtime of this algorithm is
whether it is “destructive”
whether it is “in-place”
3) submit timing data along with your code to show that your code actually has the runtime you claim it does.
Your submission will be:
– A zipped copy of all the files I’m providing, with the unimplemented algorithm implemented and the comments attached to taht algorithm indicating its properties (see above).
– And, in your zip file, you should include some kind of graph showing the growth of the runtime of your implementation of the algorithm, as determined by running it under different conditions and timing it, along with the raw timing data you used to make the graph.You can make the graph however you like (hand-drawn is fine).