refer to the attached document.
Computer Science HM Assignment 1
Answer Module 1 Review Questions 1 through 3 in the book
Writing Requirements
- Use the APA template located in the Student Resource Center to complete the assignment.
Network layers
In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not be able to detect the attack and therefore fail to alert the administrator. Any failure to detect an attack is called a false negative. When alarms are not going off, it’s common to assume that no malicious events are taking place. If that’s a false assumption, real attacks are occurring and security staff is unaware.
False positives may create a false sense of security for the opposite reason—too many alarms from benign occurrences. An administrator might react quickly to the first few alarms. However, after receiving additional false positives, a busy administrator might put off investigating the alarms or ignore them.
Answer the following question(s):
Assume you are a network administrator responsible for security. In your opinion, which is worse—false positives or false negatives? Why?
Evelop a deep learning system for the classification of images
In this assignment, you will develop a deep learning system for the classification of images containing decimal digits into three categories:
- A-digit 0
- B-digit 1
- C-others (e.g. any digit in 2,3,4,5,6,7,8,9)
For this purpose, you will use the MNIST dataset. (Download Here) (Links to an external site.)
You will develop your solution within a transfer learning paradigm. Rather the designing and training a deep learning system from the scratch, you can use the Internet to find solutions to start from and/or augment. (HINT: There are many models in Python that can be found online to solve this problem.)
Tasks:
- Download and arrange a subset of the MNIST data in the three categories above, performing the proper partition into training, validation and testing
- Design, train, validate and test a model
- Compare and interpret the performance of each model (accuracy, behavior of the validation versus training, etc).
Note: Ensure you explain the rational and the methodology for tasks 1 and 2.
This is meant to be fun, challenging, and a stretch assignment. Effort is what matters, not the perfect solution!!!
Alexa and Location based Apps
Assignment 1
Q1. Examine Alexa’s skill in ordering drinks from Starbucks.
Q2. Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
Each response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words, and continue to use in-text citations.
Assignment 2
Q1. What are location-based apps and why are they important?
Q2. Discuss the importance of location-aware apps.
Q3. Discuss the advantages and disadvantages of location-aware applications.
Q4. Discuss methods in which location awareness can be obtained in mobile applications.
Q5. Discuss some of the risks associated with using location-based services.
2 Pages with References. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.
The Cloud WWW Issues
Research and learn about the three topics listed below.
1. Dataveillance
2. Distributed Denial of Service Attacks
3. Internet Parental Control Software
4. Internet Anonymity
5. Cryptography
6. Biometrics
7. Big Data (Data Analytics)
8. Artificial Intelligence (AI – deep learning applications)
9. Browser fingerprinting
10. Facial Recognition
11. Virtualization
12. Blockchain
13. Machine Learning
14. Application Security
15. Cryptojacking
16. Cyber-Physical Attacks
17. Autonomous Vehicles
18. Smart Medical Devices
19. Electronic Medical Records
20. Smart Systems/Devices
Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)
Requirements:
Slide #1-Title, Your Name, INF Section, Date
Slide #2,3-Choice #1
Slide #4-5-Choice #2
Slide #6-7-Choice #3
Slide #8-Work Cited
Answer for each choice the following:
1. What it is (description)?
2. What are the security problem or issues?
3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?
Additional Presentation Requirements:
Images/diagrams/background/animation
Upload your presentation in the assignment box.
Additional Sources:
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote
MOS19 XL PROJ3 Equipment
MOS19 XL PROJ3 Equipment
MOS19_XL_PROJ3_Equipment
The programmer will write the ExpressionSolverRunner that will use the ExpressionSolver class to solve an integer expression provided by the ExpressionSolver
The programmer will write the ExpressionSolverRunner that will use the ExpressionSolver class to solve an integer expression provided by the ExpressionSolver textfile. An expression will a String and it will be comprised of number and the mathematical operators +, *, /, and -. The % operation will not be a part of this program. In order to read an expression, the user must read the expression from left to right performing the multiplication and division operators before attempting the subtraction arguments. The programmer should be careful to follow the order of operations, or they will not get the correct answer. The calculation is integer mathematics, so there will be no rounding but just truncation. The programmer should take particular care when a multiplication and a division or next to each other and make sure to do the operations from left to right. There will be no parenthesis in the expression.
Unit 5 Data Flow Diagram Creation
Unit Outcomes:
- Discover a variety of diagrams relating to systems analysis.
- Describe logical process models.
- Create Data Flow Diagrams.
Course Outcome:
IT460–3: Create logical models that describe system processes.
Assignment Instructions
Avery has opened a gym and rehabilitation center specifically designed to provide training and recovery for service members who may have been injured while on duty. New members are provided a free fitness assessment to help determine their current fitness levels and to ascertain the extent of any injury to help onboard them into the program.
Avery has designed a basic system to help onboard these new gym members. When members are seen for the first time, they complete a simple gym membership form that asks for their name, address, phone number, and brief medical history, which are stored in the gym member file. They are also asked to schedule a Fitness Assessment.
Therapists or trainers must check the assessment calendar file for an available time. Members may also call to change their assessments. Because these assessments are scheduled in advance, Avery usually sends a reminder postcard and text message to each member one week before the appointment.
Assignment Requirements
Use Visio to Construct a Level 1 DFD based on the attached use cases. Each use case corresponds to a process in the Gym System. Use Gane and Sarson symbols. All the information can be analyzed from the Use Cases. Some of the Information is provided below. You will have to determine and label all the Data Flows in the DFD.
Entity: Gym Member
Processes:
- Schedule (or change) a Fitness Assessment
- Collect Membership Information
- Send Reminder and text message
Data Files:
- Calendar File
- Gym Member File
- Data Flows:
- At least 16 are needed
IT460: Unit 5 Assignment Data Flow Diagrams
Use Case Name: Gym Member makes or changes a fitness assessment
ID: _1_
Importance Level: High
Primary Actor: Gym Member
Short Description: This describes how a new fitness assessment is made or an existing fitness assessment is changed.
Trigger: Gym Member calls to schedule new fitness assessment or change an existing fitness assessment.
Type: External/Temporal
Major Inputs:
Major Outputs:
Description
Source
Description
Destination
Gym Member name
Gym Member
Scheduled fitness assessment
Gym Member
Desired fitness assessment
Gym Member
Scheduled fitness assessment
Calendar file
Fitness assessment to change
Gym Member
Available fitness assessments
Gym Member
Available fitness assessments
Calendar file
Check Gym Member name
Gym Member file
Existing Gym Members
Gym Member file
Major Steps Performed
- Get Gym Member’s name. Check Gym Member name with Gym Member file.
- If new Gym Member, get address and phone number and enter in new Gym Member file entry.
- If this is a fitness assessment change, find current fitness assessment in fitness assessment file, and cancel it.
- Get desired fitness assessment time and match with available fitness assessments in Calendar File. When a suitable time is found, enter scheduled fitness assessment in the Calendar file and confirm with Gym Member.
Information for Steps
Gym Member name
Gym Member File
Address
Phone number
New Gym Member information
Fitness assessment to change
Existing Fitness assessments
Desired fitness assessment
Available fitness assessments
Scheduled fitness assessments
Use Case Name: Collect new Gym Member information
ID: _2_
Importance Level: High
Primary Actor: New Gym Member
Short Description: This describes how new Gym Member information is collected when a new Gym Member arrives for fitness assessment.
Trigger: New Gym Member arrives for fitness assessment.
Type: External/Temporal
Major Inputs:
Major Outputs:
Description
Source
Description
Destination
New Gym Member information
Gym Member Information
Gym Member file
(Includes name, address,
Gym Member
phone number)
Injury History
Gym Member
Major Steps Performed
- When the Gym Member arrives, determine if he/she has been seen before in this gym. If they have not, have them fill out a Gym Member information form.
- Use the information on the Gym Member information form to update and complete the Gym Member’s entry in the Gym Member file.
Information for Steps
Gym Member status
Gym Member name
Address
Phone number
Injury history
Use Case Name: Send fitness assessment reminder card and text message
ID: _3_
Importance Level: Medium
Primary Actor: System
Short Description: This describes how reminder cards and text message sent to Gym Members one week prior to fitness assessment.
Trigger: Time to send reminders and text message one week before scheduled fitness assessments.
Type: External/Temporal
Major Inputs:
Major Outputs:
Description
Source
Description
Destination
Current date
Calendar
Fitness assessment notification card
Gym Member
Scheduled fitness assessments
Calendar file
Text message
Gym Member
Gym Member Contact Info
Gym Member file
Major Steps Performed
- Each day find the fitness assessments in the Calendar file for the day week.
- Prepare fitness assessment notification card and text message to all Gym Members having fitness assessments.
Information for Steps
Current date
Scheduled fitness assessments
Name
Address
Fitness assessment
Fitness assessment notification card
Current business process in a specific industry.
-The current business process itself.