Categories
Computer Science

This next part is classified, but I need your help, and I need it fast. Bottom l

This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.

Categories
Computer Science

This next part is classified, but I need your help, and I need it fast. Bottom l

This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.

Categories
Computer Science

A nefarious act of cyberbullying in my sophomore year was the onset of my passio

A nefarious act of cyberbullying in my sophomore year was the onset of my passion and the need to get into network security to alleviate such issues in our society. There are dangerous applications with privacy issues flooding markets, and we need the know-how of individuals and quick action against them while the danger still looms. Thus, the desire to ensure safety in the applications and avoid cyberbullying has heightened my desire to join the MSCS.
Owing to my interest and projection that I would further my studies in this field, I have consciously undertaken various academic projects to groom myself for it adequately. While taking a course related to computer architecture, professor People A(University of Michigan) proposed that usable privacy is essential for users to adopt. With the inspiration of that idea, I worked with him and his graduate student. In our research, we implemented a Sequester Encryption, or SE, to ensure data security while computing data. SE keeps sensitive information under encryption and controls it by hardware enclave. The host CPU will communicate with the SE enclave, which is physically isolated from host hardware; this design ensures security while performance is not affected by a significant overhead. Our project, in the meanwhile, conducted a paper that introduced a collection of optimizations that reduce communication costs for FPGA-based latency-sensitive acceleration applications, where I contributed to general profiling of the reuse rate and memory consumption by recording and calculating the object’s lifecycle. We also evaluated a domain developed in a data-oblivious manner while only the SE enclave can see plain values. I hope these experiences will help in my graduate study, and I will keep challenging myself to toughen up further.
Not only technology platform is needed, but users’ perception of the technology is also important and might be exploited. This is what I’ve learned through my next project. I was involved in a three-day workshop on outdated cookie consent with research revealing misleading category names. The current cookie consent category names were defined ten years ago and proven to be misleading from prior research. Therefore, our study intends to ensure that the kind of privacy people are comfortable exposing to the website is consistent with their choice of cookie usage. In the study, Professor People B(Carnegie Mellon University) mentored us to perform an experiment by renaming the cookies to improve people’s perception of cookie categories. Our impressive work provided a statistically significant difference when selecting the correct cookie definition in 2 out of 4 categories. This study enforced my understanding of user-center privacy, and I considered that we could achieve privacy protection easier if people had easy access to security information and technology.
As I was pursuing my passion in this regard, the need to also prove that the computer science field is not male-only has pushed me my resolve to join the MSCS and succeed. This is borne from a research conference I attended aimed at improving the current situation of gender inequality. Inspired by the words of an old professor at the conference who experienced discrimination, I began to learn from female predecessors and the discrimination they encountered. There is a need to have allies in the field, and by going into it, I would have increased the number to offer each other support. Ultimately, with the preparation leaning towards security tenets, I am capable of completing rigorous projects at a high standard, thus pushing the scientific knowledge boundaries further through extensive research.
At UCB, I look forward to furnishing myself with knowledge in security and networks. The knowledge sought will entail network security and the interdisciplinary of AI and security. The topics will give insights into the security field, building into my future career where I would delve into researching academia. I would be involved in lab research to gain more experience as I work to be a senior academician and provide solutions to the security menace. I love to see top-notch online security ensuring people’s safety and well-being. Also, the distinguished professors at UCB are renowned academic leaders equipped with expertise and knowledge, which provides an enviable learning platform to a desirable fraternity. I am interested in Professor Sylvia Ratnasamy’s research topic (design and implement networked system) and her research center, The NetSys lab. I am curious about the lab’s past projects, such as RCS and Smarter Prefetching. Professor David Wagner and Ion Stoica also attract me to join the program. Their range of specializations includes AI and security interaction, an area I have deprivation of knowledge of, cloud computing, distributed systems, and networking. The impressive professors and a hands-on course focusing on students’ strengths and sharpening them to alleviate weaknesses make UCB a crucial place to undertake the program. I look forward to a chance at UCB, which will be a dream come true.

Categories
Computer Science

Guided Project 3-2 San Diego Sailing Club wants to create three queries. To ensu

Guided Project 3-2
San Diego Sailing Club wants to create three queries. To ensure consistency, the starting file is provided for you. Use Design view to create, edit, add aggregate functions, and add criteria to a query to find the total dollar value of the rentals for each boat in its fleet. After saving and testing the query, create a second query that uses aggregate functions and a parameter. Finally, create a query to find which boat types have been rented.
[Student Learning Outcomes 3.2, 3.3, 3.4, 3.5, 3.6, 3.8]
File Needed: SanDiegoSailing-03.accdb (Available from the Start File link.)
Completed Project File Name: [First Name.Last Name]-SanDiegoSailing-03.accdb
Skills Covered in This Project
Create a query using Design view.
Add fields to a query.
Add criteria to a query.
Execute a query.
Save and test a query.
Save a copy of a query.
Add a parameter.
Use aggregate functions.
Use the Unique Values property.
Alternate Instruction for Microsoft 365 Apps iconThis image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.
Open the SanDiegoSailing-03.accdb database start file.
The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor.
Enable content in the database.
Create a new summary query in Design view. The Sailing Club wants to find out the total dollar value of the full day rentals, by boat, from the boats that have been rented. If a boat has been rented, a record displays in the SDRentals table.
Click the Query Design button [Create tab, Queries group] to open the Add Tables task pane.
Alternate Instruction for Microsoft 365 Apps iconClick the Query Design button [Create tab, Queries group] to open the Show Table dialog box.
Office 365 Update note icon NOTE: The Show Table dialog in your version of Microsoft Access may appear different due to Office 365 updates.
Select the SailboatFleet table and click the Add Selected Tables button.
Alternate Instruction for Microsoft 365 Apps iconSelect the SailboatFleet table and click the Add button.
Select the SDRentals table and click the Add Selected Tables button.
Alternate Instruction for Microsoft 365 Apps iconSelect the SDRentals table and click the Add button.
Click the Close button in the Add Tables task pane.
Alternate Instruction for Microsoft 365 Apps iconClick the Close button in the Show Table dialog box.
Increase the size of the table objects to display all of the fields.
Click the drop-down arrow in the first Field row cell of the query design grid and select FKBoatID.
Click the second cell in the Field row, click the drop-down arrow, and select BoatType.
Click the third cell in the Field row, click the drop-down arrow, and select FullDayRentalRate.
Click the fourth cell in the Field row, click the drop-down arrow, and select FourHourRental?.
Click the Totals button [Design tab, Show/Hide group].
Alternate Instruction for Microsoft 365 Apps iconClick the Totals button [Query Tools Design tab, Show/Hide group].
Click the Run button [Design tab, Results group] to execute the query. The query should open in Datasheet view and display 16 records (Figure 3-87). This query only shows boats that have been rented. At most a Boat ID appears in two rows; one row if the Four Hour Rental? box is checked and another row if the Four Hour Rental? box is not checked.
Alternate Instruction for Microsoft 365 Apps iconClick the Run button [Query Tools Design tab, Results group] to execute the query. The query should open in Datasheet view and display 16 records (Figure 3-87). This query only shows boats that have been rented. At most a Boat ID appears in two rows; one row if the Four Hour Rental? box is checked and another row if the Four Hour Rental? box is not checked.
Sailboat query results
Figure 3-87 Sailboat query results
Edit the query to add aggregate functions. Because you are looking only for rentals that were for a full day, use the “No” value on the FourHourRental? field.
Click the View button [Home tab, Views group] and select the Design View option to switch back to Design view of the query.
Click the Total row cell for the FullDayRentalRate field.
Click the drop-down arrow and select Sum.
Click the Total row cell for the FourHourRental? field.
Click the drop-down arrow and select Where. This causes the Show row check box for the FourHourRental? field to be deselected.
Click the Criteria row cell for the FourHourRental? field and enter No. The IntelliSense feature in Access may suggest the value of “Now” while you are typing. Press the Esc key to hide the list and then tab out of the field. The query window should look similar to Figure 3-88.
Query design grid with four fields. Total row contains Sum in the FullDayRentalRate field and Where in the FourHourRental? field, which also contains No in the Criteria row.
Figure 3-88 Query design grid for the summary query with criteria
Click the Run button. The query should open in Datasheet view and display eight records (Figure 3-89). The Boat ID now displays only once since the criteria limits the results only to the full day rentals.
Results from completed SummaryOfFullDayRentalsByBoat query
Figure 3-89 Results from completed SummaryOfFullDayRentalsByBoat query
Click the Save button and save the query as FullDayRentalsByBoatSummary.
Verify that that query works correctly.
Open the SDRentals table in Datasheet view.
Click the drop-down arrow in the Boat ID field name cell and select the Sort A to Z option.
Click the drop-down arrow in the Four Hour Rental? field name cell and select the Sort Cleared to Selected You can see that Boat ID 1010 has five full day rentals. From Figure 3-87 you know that the full day rate for that boat is $179.00 and 5 × $179 = $895.00. This matches the results of your query.
Click the Remove Sort button [Home tab, Sort & Filter group].
Close the SDRentals table. If prompted, do not save the changes to the table.
Save a copy of the query.
Click the Save As button [File Tab].
Select the Save Object As button and then click the Save As button.
Replace the suggested name with FullDayRentalsByBoatSummaryWithParameter. This second query will enable the Sailing Club to enter the date range for the summary query and also will count the number of rentals.
Edit the query to add additional fields and an aggregate function and parameters.
Click the Design View icon in the Status bar.
Drag the FullDayRentalRate field from the SailboatFleet table to the fifth column in the query design grid. (Yes, this field is in the query twice!)
Click the Total row cell for this field, click the drop-down arrow, and select Count.
Drag the RentalDate field from the SDRentals table to the sixth column in the query design grid.
Click the Total row cell for this field, click the drop-down arrow, and select Where. This causes the Show row check box for the RentalDate field to be deselected.
Click the Criteria row cell of the RentalDate field.
Right-click and select Zoom.
Type Between [Enter the Start Date] And [Enter the End Date] in the Zoom box to add the two parameters.
Click OK. The query window should look similar to Figure 3-90.
Query design grid with two additional fields added. Total row contains Count in the second FullDayRentalRate field and Where in the RentalDate field, which also contains a parameter expression in the Criteria row.
Figure 3-90 Query window with aggregate functions and a parameter
Click the Save button and save the changes to the query.
Test the query.
Click the Run button.
Enter 2/1/2020 in the Enter the Start Date box of the Enter Parameter Value dialog box.
Click OK.
Enter 2/28/2020 in the Enter the End Date box of the Enter Parameter Value dialog box.
Click OK. The query should open in Datasheet view and display the records shown in Figure 3-91.
Datasheet view of query results shows four records.
Figure 3-91 Query results with Sum and Count aggregate functions and parameter
Click the Save button to save the changes made to the query.
Close the query.
Review the query.
Reopen the query in Design view. Notice that Access has reordered the position of the fields. The two fields that use the Where option on the Total row have been moved to the right side of the query design grid. This does not affect the way the query runs.
Close the query.
Create a new query in Design view. The Sailing Club wants to find out what boat types have been rented so it can decide whether to adjust pricing or marketing of its boat types. If a boat has been rented, a record of that rental exists in the SDRentals table.
Click the Query Design button [Create tab, Queries group] to open the Add Tables task pane.
Alternate Instruction for Microsoft 365 Apps iconClick the Query Design button [Create tab, Queries group] to open the Show Table dialog box.
Office 365 Update note icon NOTE: The Show Table dialog in your version of Microsoft Access may appear different due to Office 365 updates.
Select the SDRentals table, press and hold the Shift key, select the SailboatFleet table, and click the Add Selected Tables button.
Alternate Instruction for Microsoft 365 Apps icon Select the SDRentals table, press and hold the Shift key, select the SailboatFleet table, and click the Add button.
Click the Close button in the Add Tables task pane.
Alternate Instruction for Microsoft 365 Apps iconClick the Close button in the Show Table dialog box.
Click the drop-down arrow in the first Field row cell in the query design grid and select FKBoatID.
Click the Sort row, click the drop-down arrow, and select Ascending.
Click the second cell in the Field row, click the drop-down arrow, and select BoatType.
Click the Run button [Design tab, Results group] to execute the query. The query should open in Datasheet view and display 28 records (Figure 3-92). Notice that in a number of instances the same Boat ID displays multiple times, once for each time that boat was rented.
Alternate Instruction for Microsoft 365 Apps iconClick the Run button [Query Tools Design tab, Results group] to execute the query. The query should open in Datasheet view and display 28 records (Figure 3-92). Notice that in a number of instances the same Boat ID displays multiple times, once for each time that boat was rented.
BoatID query results
Figure 3-92 BoatID query results
Edit the query to display Unique Values.
Click the Design View icon in the Status bar to switch back to Design view of the query.
Click the Property Sheet button [Design tab, Show/Hide group] to open the Property Sheet.
Alternate Instruction for Microsoft 365 Apps iconClick the Property Sheet button [Query Tools Design tab, Show/Hide group] to open the Property Sheet.
Click anywhere in the Query Window so that the Selection type in the Property Sheet displays Query Properties.
Click the Unique Values property box and select Yes. The query window should look similar to Figure 3-93.
Query Design window shows both tables in the top half, the two fields added to the query in the bottom half, and the Property Sheet open to the right.
Figure 3-93 Set the Unique Values property in the Property Sheet of the query
Close the Property Sheet.
Click the Run button. The query should open in Datasheet view and display 12 records (Figure 3-94). Each Boat ID now displays only once, but the Boat Types are still repeated.
Query results with repeated BoatType values
Figure 3-94 Query results with repeated BoatType values
Edit the query so the Boat Type displays only once. The Boat Type is displaying more than once because the FKBoatID field is different for each boat.
Click the View button [Home tab, Views group] and select the Design View option to switch back to Design view.
Click the Sort row of the FKBoatID field, click the drop-down arrow, and select (not sorted).
Deselect the Show row check box for the FKBoatID field.
Click the Run button. The query should display the five boat types that have been rented at least once (Figure 3-95.)
Unique records for BoatType
Figure 3-95 Unique records for BoatType
Click the Save button and save the query as BoatTypesRented.
Close the query.
Close the database.
Upload and save your project file.
Submit project for grading.

Categories
Computer Science

For this assignment, you will be required to write a six-page paper about the ar

For this assignment, you will be required to write a six-page paper about the area of cybersecurity forensics that was approved by your instructor in Week 1. Use APA style for all your references and citations. You can refer to the the Purdue OWL website for tips on APA citation.
Six pages include a title page/citations/table of contents. (3 pages of ‘content’)

Categories
Computer Science

Assignment Content Important note: You must complete the “Select a Business Sc

Assignment Content

Important note: You must complete the “Select a Business Scenario” assignment—and get approval from your instructor for a business scenario—before you begin this assignment.

This week, you create a proposal for a project to improve a specific business process. A proposal describes the project you are pursuing and explains how the results will positively impact the business.

A proposal is reviewed by the client, whether the client is external to an organization or an internal decision maker. Project work can begin once the proposal has been accepted.

An effective project proposal includes information that enables stakeholders to make a go or no-go decision, and typically details the following about a project:
Scope of work
Problems addressed or opportunities proposed
Project requirements and deliverables
Process and timeline for completion
Labor and materials costs
Quality requirements

Review the Sample Project Proposal to see a completed project proposal.
Complete the Project Proposal Template based on the business scenario you selected (and that was approved by your instructor). Complete all parts of the template and do not delete any information from the document.

If you prefer to work in a format other than a document, you may re-create the template as Microsoft® Excel® spreadsheet or other appropriate document type.

Refer to this week’s reading and media for help creating your project proposal.

Submit your assignment.

Categories
Computer Science

Assignment Content Important note: You must complete the “Select a Business Sc

Assignment Content

Important note: You must complete the “Select a Business Scenario” assignment—and get approval from your instructor for a business scenario—before you begin this assignment.

This week, you create a proposal for a project to improve a specific business process. A proposal describes the project you are pursuing and explains how the results will positively impact the business.

A proposal is reviewed by the client, whether the client is external to an organization or an internal decision maker. Project work can begin once the proposal has been accepted.

An effective project proposal includes information that enables stakeholders to make a go or no-go decision, and typically details the following about a project:
Scope of work
Problems addressed or opportunities proposed
Project requirements and deliverables
Process and timeline for completion
Labor and materials costs
Quality requirements

Review the Sample Project Proposal to see a completed project proposal.
Complete the Project Proposal Template based on the business scenario you selected (and that was approved by your instructor). Complete all parts of the template and do not delete any information from the document.

If you prefer to work in a format other than a document, you may re-create the template as Microsoft® Excel® spreadsheet or other appropriate document type.

Refer to this week’s reading and media for help creating your project proposal.

Submit your assignment.

Categories
Computer Science

Unit 10 – Food for thought Operating systems seem to be changing and evolving al

Unit 10 – Food for thought
Operating systems seem to be changing and evolving all the time. The question to reflect upon for this unit is not that operating systems change and evolve, but rather – are these
changes really necessary?
That is, is there a true technical reason for many of the current OS upgrades, or are they merely marketing ploys to continue revenue?
As you reflect on this question, support your discussion with concrete examples showing either solid technical reasons why an OS upgrade is valid or supporting arguments showing that it’s all just cash cow exploitation.
Unit 10 Exercise
Here’s a case study for you:
You are a CIO in a medium sized company that offers web services. You have several servers offering web services, internal file and mail services, and other functionality. You
have been investigating the potential for reducing the number of physical servers by ‘going virtual’ – that is you will continue to offer your services from your own servers, but
combine several servers virtually onto fewer physical boxes. You’ve started by combining a few servers onto one box using Microsoft Server 2008 with their virtual
technology. Now you are faced with a decision: Upgrade to Server 2012 with their Hyper-V or stay with Server 2008 and use a product like VMWare for your virtual servers. You were using Server 2008 and Hyper-V for your trials.
Discuss your options and propose a solution, with solid reasons why. At the same time, you also have a few Server 2003 servers still running. These have been providing internal print and file services only to several departments. There is pressure on you to upgrade them to either Server 2008 or Server 2012. Whichever solution you choose, you will still only be providing print and file services on these boxes.
Again, discuss your options and propose a solution, with
Unit 11 – Food for thought
Reflect on your most often used / most important (either one, your choice) of application software. Some might choose an Office suite, others a graphics (drawing or photo)
package.
Discuss how it has changed and evolved since 2000. In your opinion, is the newer version better than the older versions? How? Be specific and detailed in your answer.
Related: have you kept up-to-date with this application, or did you quit updating at some point in the past decade or so? If so, why?
Unit 11 – Exercise
Your primary activity in this unit will be to research a particular open source application—specifically one from the Apache Foundation—and then write a short report on
that application.

Categories
Computer Science

Databases play a vital role in empowering AI-based applications. Imagine an AI-e

Databases play a vital role in empowering AI-based applications. Imagine an AI-enabled robot that relies on historical and raw data to make intelligent decisions. The data are stored in ten scattered heterogeneous (structured, unstructured, and graph) databases with different access times due to different performance limitations and geographical locations around the globe.
This discussion invites you to architect a support system for the robot mentioned above to find its required data among the databases and access the data scattered around the globe in the shortest possible time
Review and understand database applications, especially for caching and in-memory storage
Design a simple block diagram showing the system components and about 550 words explaining components and their connections. Also, explain the measures you propose to facilitate the data discovery and to improve access time. For data discovery, it is suggested to utilize methods such as data cataloging, indexing, and aggregation. For the robot performance improvement, consider an intermediate in-memory database for caching frequently accessed data. The cache number and locations are important architectural choices that could affect cost, complexity, and performance. If necessary, feel free to make assumptions on robot processing power, connection bandwidths, and database performances. You may wish to use www.draw.io for drawing your block diagrams.

Categories
Computer Science

Use provided documentation to complete tasks A,B, and D of Task 3 template. Task

Use provided documentation to complete tasks A,B, and D of Task 3 template. Task C- Create an audiovisual recording of your presentation, using Panopto will NOT need to be done. I have provided examples for each section of task 3, included a sample of how the powerpoint should be set. Please use Task1 and Task2 documents as source material.