Computer science

I did this project but I got some wrong steps.  I`m uploading the instructions and what I did too.

This is my teacher comment: Good job! Some points were deducted for formatting errors (margins were not customized, rubric does not all fit onto one page) and multiple spelling/typing errors. Otherwise, nice work! 

Prim's Algorithm

  

The problem we can solve using a priority queue is that of computing a minimum spanning tree. Given a fully connected undirected graph where each edge has a weight, we would like to find the set of edges with the least total sum of weights. Using the scenario: 

You are an engineer and you are trying to figure out the best way to arrange for internet access in your Town. There are N (3 ≤ N ≤ 25) blocks in your town connected by M (N ≤ M ≤ 25) various streets and you can walk between any two streets in the town by traversing some sequence of roads. 

However, you have got a limited budget and have determined that the cheapest way to arrange for internet access is to build some fiber-optic cables along existing roadways. You have a list of the costs of laying fiber-optic cable down along any particular street, and want to figure out how much money you will need to successfully complete the project, meaning that, at the end, every street will be connected along some sequence of fiber-optic cables. 

As a computer scientist, you heard about Prim’s algorithm in one of your programming classes. This algorithm is exactly the solution to your problem, but it requires a priority queue.

  

· Write a program to create using a priority queue to implement a solution of Prim’s algorithm.

  

Input data describing the graph will be arranged as a list of edges (streets and their fiber-optic cost) and for the program we will covert that to an adjacency list: for every node in the graph in the town, we will have a list of the nodes (streets) it’s connected to and the weight (cost of building fiber-optic cable along). 

adj[0] → (1, 1.0) (3, 3.0)

adj[1] → (0, 1.0) (2, 6.0) (3, 5.0) (4, 1.0) . . .

Research Paper : Regscanner/ Windows Registry Scan

You will submit a 2-page outline in Word that describes the forensics analysis you will conduct using Regscanner. The outline should be in narrative form, double-spaced, and in APA format.

The outline should provide the following:

1) A summary of the forensics tool Regscanner.

2) The format you will use to report on the tool’s output and how you would report the results to a supervisor or judge (in the case of persecuting a case)

week 2 group discussion

  400 words

This assignment should be in APA format and have to include at least two references.

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the

authentication system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so for authentication performance? For security? 

Security Architecture Assignment

Minimum Length 700 Words.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Assignment and Discussion

 

Week 8 – Discussion

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.

Writing Assignment – WK 8

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

 

Task 3 Do Homework

  • 8.1 What is the difference between RFC 5321 and RFC 5322?
  • 8.2 What are the SMTP and MIME standards?
  • 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 8.4 Briefly explain base64 encoding.
  • 8.5 Why is base64 conversion useful for an e-mail application?
  • 8.6 What is S/MIME?
  • 8.7 What are the four principal services provided by S/MIME?
  • 8.8 What is the utility of a detached signature?
  • 8.9 What is DKIM?

Discussion:

 In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information.  How can a network administrator prevent this type of attach from happening? 

Practical Connection Assignment

course name: Cryptography (ISOL-535-B05)

 

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Research paper: Mastering Blockchain

Deadline: 1/16 

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 4 Info tech import strat plan

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

General essay

The Year Up Washington DC site offers four career tracks: 1. Sales/Customer Service 2. IT/Helpdesk 3. Business/Project Management 4. Software Development Please answer the following questions for your essay: 1) What is your first choice for your specialty track? Why? What previous experience (if any) do you have that would make you successful in this track? Discuss any previous school or work experience, certifications you have, or self-learning you’ve done. (Write 1-2 paragraphs) 2) What positions are you interested in within this field? Why? 3) What research have you done on your own to learn more about this career field? 4.) If you don’t get your first choice for your specialty track, how would your second choice fit into your career goals. Essay must be no more than 2 pages, double spaced.

My first choice will be IT/Helpdesk, second choice is software Development.  I am currently 19 years of age I have always enjoyed the IT field because technology is intriguing.