COMPUTER SCIENCE

 

This week you will visit a Best Buy store or a similar computer supply store to compare and price check three different types of routers that would best fit the needs of the each of the following:

  • A home network of a family of 5 with 10 computers/devices that will be connected to the network.
  • A small coffee shop that seats up to 20 customers at a time. The network will need to have capabilities of having two registers, the main office computer and up to 50 guest computers/devices connected all at one time.
  • Use the article, “Getting Faster Wi-Fi” to help you.

Need it by Friday 4pm eastern time

Assignment

2-3 pages

Please read chapters  4,  5 and 6 of your textbook and answer the following questions:

1) ) What are the seven steps of a computer security defense plan. review chapter 4. (50 points)

2) What are the Three Categories of Security Policies. List and briefly discuss each category. Review Chapter 5. (30  points)  

3) What are the Responsibilities of Security Director? Review chapter 6. (20 points)

M

if you good at this please message me with your bid. due in 30 hours

Presentation slides

Hi, I need help with my Data Analytics assessment. Need to create 16 PowerPoint slides to describe and explain what has been asked in the assessment manual. I need the assessment by 7th June. It needs to be 100% authentic, can’t be plagiarized. Assessment manual must be followed thoroughly. 

Assessment manual, class lectures are attached.

Networking (Research paper)

Literature Review

Eight Page Total without cover and reference page 

Provide a minimum of eight (8) scholarly, peer-reviewed sources in reference format.

The sources should be listed using APA format. 

CS701 Module2 Assignment

CS701 Module2 Assignment  

General Rules for Homework Assignments 

• You are strongly encouraged to add comments throughout the program. Doing

so will help your facilitator to understand your programming logic and grade you

more accurately. 

• You must work on your assignments individually. You are not allowed to copy the

answers from the others. However, you are encouraged to discuss approaches

to the homework assignment with your facilitator. 

• Each assignment has a strict deadline. However, you are still allowed to submit

your assignment within 2 days after the deadline with a penalty. 15% of the credit

will be deducted unless you made previous arrangements with your facilitator

and professor. Assignments submitted 2 days after the deadline will not be

graded. 

• When the term lastName is referenced in an assignment, please replace it with 

your last name. 

You are strongly encouraged to add comments into your program!  

Create a new folder named HW2_lastName. Write the following programs in this folder. 

Scenario: 

You decided to release the dove residing in your birdcage. But, you are keen in tracking

the flight of the bird. So, you tied a sensor tag to the poor bird and decided to write a

HTML5 application to monitor its path. Since you neither have the bird nor the sensor,

you decided to simulate the path.  

 

Part 1 – Geolocation (30 Points) 

Using the HTML5 Geolocation API, write the LocationTracker.html and the associated

Javascript file LocationTracker.js. You are free to use the html5.css from the samples. 

The initial rendering of the HTML page is shown below with placeholders for the location

details and the Google map. 

 

 

When the Start button is clicked, get the current position using the Geolocaiton API and

display the initial location in the map as shown below. After the initial location is

displayed, use the setInterval method to invoke your method updateMyLocation every 5

seconds. The Start button is disabled from now on.  

The updateMyLocation method simulates the changes in the latitude and longitude as

follows. Generate two random numbers using Math.random() and divide each by 100.

These two numbers represent the changes in the latitude and longitude. Modify the

current location by adding the latitude value and subtracting the longitude value. This will

make the bird only fly in the NorthWest direction. If you are on the Northern border or the

Western border, feel free to keep the bird over the United States (or your country) by the

appropriate changes to the current location. Update the current location in the HTML and

also draw the path in the Google Map as shown in the following screencast: 

https://mymedia.bu.edu/media/CS701_HW2_Clip1/1_y4orrxvm 

 

 

Part2 – HTML5 Drag and Drop and Local Storage (40 points) 

Democrat and Republican senators voting by their party lines through Drag and

Drop. 

The application presents a list of senators and two areas representing Democrats and

Republicans. The senators are dragged and dropped into their respective areas.  

The initial list is loaded through AJAX from the partyList.xml file (provided in the

samples). Each senator is converted to a JSON object keeping track of the properties

name,  party, and voted (true or false). The list of senators is then stored in local storage.

Whenever a senator is dragged and dropped into their respective area, the JSON object is 

updated as voted and the list of senators is updated in the local storage. When the 

application is loaded, the local storage is first checked. If the data is there, the list of

senators is loaded from the local storage, otherwise the AJAX call is made. 

When the data exists in the local storage and the application is loaded, the senators

already dragged into their respective areas should also be populated. Make sure you test

this case. 

Write the partyWise.html and partyWise.js for the application’s functionality. 

The structure of partyList.xml is shown below. 

The initial screen when the application is loaded is shown below. AJAX call is made to

load the senator list. 

If the application is refreshed, the data should be loaded from the local storage: 

After a few drag and drops, the application looks like this: 

Note that the democrats can only be dropped into the Democrats area. Similarly for the

Republicans. You cannot drag and drop the member already voted. 

If the application is quit and then reloaded, the application should resume from the last

snapshot.

 

Part3 – Web Workers and Local Storage (30 Points) 

Your web application starts 5 web workers (computeWorker.js) and sends the messages

to them to compute the sum of all the integers from the specified start value to the

specified end value. The two values are send as a JSON object having start and end

properties. The web worker computes the sum of all the integers from the specified start

value to the specified end value and sends back the result. The result is sent as a JSON

object having start, end, and result properties. The main web application stores all the

results it receives in local storage. 

a) Show the JavaScript code for computeWorker.js.

b) Show the code for the main web application starting the workers and sending

them the messages. The values send for the five web workers can be (1, 1000),

(1001, 2000), (2001, 3000), (3001, 4000), and (4001, 5000), respectively.

c) Show how you will use local storage to record the results as they are being

received. Use a single key in the local storage and store the results received into

an array. Update the user interface as the results arrive from the workers. 

 

Submission: Export your HW2_lastName folder as a zip file, with the

appropriate index.html for the above files, and upload the zip file to the

Assignment section. 

 

Excel Chapter 3 Hands-On Exercise Assessment – Medical

Excel Chapter 3 Hands-On Exercise Assessment – Medical 

Exp19_Excel_Ch03_HOEAssessment_Medical

Exp19 Excel Ch03 HOEAssessment Medical

Project Description:

You are an analyst in the medical profession. The job market for most medical professions that require some post-secondary education is surging. You researched the job outlook that indicated the number of jobs in 2016 and the estimated number of jobs in 2026. You will prepare several charts to help you identify trends.

     

Start Excel. Download and open the file named Exp19_Excel_Ch03_HOEAssessment_Medical.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

 

You want to start by   creating a clustered column chart. You will focus on the top four job titles   that employee the most people.
 

  In the Top 4 sheet, use the Insert tab to create a clustered column chart for   the range A6:D10. Cut the chart and paste it in cell A16. Set 3.5″   height and 5.7″ width for the chart.

 

Next, you want to   create a recommended chart to depict the number of people for each job and   the estimated number of new people by 2026. Because the top two jobs have   significantly more people than the other jobs, you will focus on the other   six jobs.
 

  Display the Medical Jobs sheet. Use the Recommended Charts feature to create   a recommended clustered bar chart for the ranges A6:B13 and D6:D13. Change it   to a stacked bar chart and move it to a chart sheet named Bar   Chart.   

 

All but medical   transcripts will see growth before 2026. You want to see what percentage each   job contributes to the total job pool for this group of medical   professionals.
 

  Display the New Jobs sheet. Select the range A1:B9 and use Quick Analysis to   create a pie chart. Move the pie chart to a new sheet called Pie   Chart.   Note, Mac users use the ribbon to create the pie chart.

 

The last chart you   want to create will depict the number of new jobs and the related percentage   increase.
 

  With the New Jobs sheet active, select the range A1:C9, and create a combo   chart with Clustered Column – Line on Secondary Axis. Move the combo chart to   a new sheet called Combo Chart

 

It is important to   replace the default chart titles with actual descriptive chart titles.
 

  With the combo chart selected, type New Medical Jobs by 2026 for the chart title.   Apply Black, Text 1 font color to the chart title.
  Select the pie chart, type New Medical Jobs by 2026 for the chart title.   Apply Black, Text 1 font color and 18 pt font size to the chart title.
  Select the bar chart, type Projected Number of Medical Jobs by 2026 as the chart title.   Format the chart title in Black, Text 1 font color and 18-point size.
  Select the column chart, type Top 4 Medical Jobs 2016 and 2026 for the chart title.   Format the chart title in Black, Text 1 font color.

 

You want to add a   value axis title to clarify the column chart.
 

  With the column chart selected, add a primary value axis title and type   Number of Jobs as the axis title.

 

Adjusting the value   axis settings will make the axis labels easier to read on the bar chart.
 

  Select the bar chart, change the maximum bound for the value axis to 400000 and display the   units in Thousands. Apply Black, Text 1 font color and 10 pt font size to the   value axis and the category axis.

 

Showing percentages   for pie slices is important to knowing which job contributes what percentage   of the overall new medical jobs by 2026.
 

  On the Pie Chart sheet, add category and percentage data labels using Best   Fit position. Remove the value data labels and the legend. Apply Black, Text   1 font color and 12 pt font size to the data labels.

 

You want to focus on   the job category that will contribute the most growth by 2026.
 

  Explode the Medical Assistant pie slice by 5%.

 

You want to apply a   chart color to the combo chart and apply a darker font color to the various   chart elements so that they are easier to read.
 

  Select the combo chart, select Blue, Accent 1, Lighter 80% solid fill color   for the chart area. Apply Black, Text 1 font color and 9 pt font size to the   primary value axis, secondary value axis, category axis, and legend.

 

 

It is a best practice   to add Alt Text for each chart for accessibility compliance.
 

  With the combo chart selected, add Alt Text: Number of new medical jobs and   percentage increase in new jobs by 2026
 

  Select the pie chart, add Alt Text: Percentage of new medical jobs   by job title
 

  Select the bar chart, add Alt Text: 2016 plus the estimated number   of new jobs by 2026
 

  Select the column chart, add Alt Text: Compares number of medical   jobs in 2016 and 2026

 

With the column chart   selected, apply Style 6 chart style and Colorful Palette 2.

 

You decide to include   only the 2016 and 2026 data in the column chart.
 

  Change data source by excluding the # of New Jobs data series. Then switch   the data series and categories so that the years are on the category axis.

 

You want to   illustrate the 2016 and 2026 number of jobs with sparklines in the Medical   Jobs sheet.
 

  Select the range B7:C15 and insert column sparklines in the range G7:G15.   Show the low point.

 

Each sparkline has   its own start and stop value. To depict the data more accurately, you will   adjust the minimum and maximum values on the axes.
 

  Customize sparklines by setting the vertical axis minimum value to be the   same for all sparklines and setting the vertical axis maximum value to the be   same for all sparklines. 

 

To make the   sparklines easier to read, you will increase the row height.
 

  With the sparklines selected, adjust the row height to 20.

 

Insert a footer with Exploring   Series   on the left, the sheet name code in the center, and the file name code on the   right on all the sheets except Medical Jobs and New jobs. Change to Normal   view.

 

Save and close Exp19_Excel_Ch03_HOEAssessment_Medical.xlsx.   Exit Excel. Submit the file as directed.

Need help with ERD diagram

 The goal of the projects throughout this semester is to implement a “prototype” database system application for a eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.The project will require your teams (same group as residency weekend) to complete the assignment. Below you will find the ERD deliverable requirements. Each assignment has a specific grading rubric (scheme) associated with the assignment. BUSINESS REQUIREMENTS ACROSS ALL ASSIGNMENTS. You will work with book/music/media information, user information, ratings of books, and users’ social network

  • Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description
  • There are 3 categories of book: fiction, non-fiction, and specialty
  • There are 2 categories of music: digital and media-based
  • An author can write one or more books.
  • A musician can be a solo artist, part of a group, or both
  • An author can also be associated with one or more publishers.
  • A musician/group/act can be associated with one or more music houses
  • An author’s book can have one or more editions.
  • A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)
  • A publisher can have many authors and many books.
  • A record company can have many artists associated and many albums associated with it. 
  • A record company can also be the publishing company (i.e. self-publishing)
  • Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).
  • An author can write many books.
  • An artist can write many songs, albums etc.
  • UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’).
  • A particular user rates a particular item at a given time.
  • A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately.
  • Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.
  • There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).

Ensuring OS Security

 Please read below and respond with 150 words or more in your own opinion.

Malicious software is also known as malware is software created  to gain access/damage a CPU without the knowledge of the owner. Types  of malware include spyware, worms, keyloggers, and true viruses or any  type of malicious code that infiltrates a computer (Ronen et al., 2018).

Malware was created for pranks and activism but, has evolved  into vandalism and theft. Much of today’s malware can be found in the  form of adware which allows profiting through forced advertising.  Spyware allows systems to be compromised allowing sensitive information  to be stolen and ransomware which is generally used for extortion. A  prime example of a ransomware attack is the Colonial Pipeline attack  which highlighted the US vulnerabilities of the country’s critical  infrastructure. Hackers were able to obtain data from a fuel company,  scramble that information, and held it until the ransom is paid.

Numerous factors can leave a system vulnerable to attacks. OS  defects in design and allowing users to have advanced permissions are  causes of system vulnerabilities to attacks. Ensure your system security  by using a firewall in an OS. Firewalls try to protect systems from  outsiders gaining control/access to the system. Make sure the system  automatically updates software. This will allow patches for OS defects.  It is the feature provided in an operating system that assists users  with keeping programs updated according to time, including software,  drivers, etc gets pushed without manual interaction (Vinayakumar et al.,  2019). Finally, the use of antivirus software along with spyware and  malware detection software.

Peer response

Peer response 100  minimum , you have to respond yo peer based on this post to keep the discussion going. I have never heard of Microsoft Access or have even seen in on Microsoft Office as an option, so I did alot of ready and extra research to really understand. I also went to Microsoft Access on my computer to see for myself! I find it very interesting. Microsoft Access is a Database Management System (DBMS) from Microsoft that combines a graphical user interface with the relational Microsoft Jet Database Engine. It can be found in the professional and higher editions of the Microsoft Office software suite. 

I would use Microsoft Access if I work for a large company. It is said that many big companies use Access and only really the technical IT community uses Access. I would use it for in-depth analysis and reportings. At this point of my life though I don’t find Access useful just yet. 

Excel and Microsoft Access are quite similar but also very different. Some key areas where the two of them diverge is when they deal with text, numbers, files, and various types of data in AccessExcel. Typically, Microsoft Excel works with numerical data. One time and one location are used to store all the data.
There are several worksheets or documents that contain the same, repetitive material.

The following are the advantages of utilizing the MS Access application:

  • In just a few minutes, Access provides a relational database management system with complete functionality. 
  • Access makes it simple to import data from several sources. 
  • Access can be readily modified to suit individual and corporate requirements. 
  • Numerous Windows OS development languages and Access function well together. 
  • It can handle any difficult office or industrial database jobs and is strong and adaptable.