Categories
Computer Science

Describe why the information provided by this website is useful.

Students are required to participate in these weekly online classroom discussion threads. Students should post at least 1 post on 3 separate days in the active week’s discussion thread. Please make sure to read all topic questions, thread directions, and assignment rubric criteria to ensure that responses are accurate and complete. Points may be deducted, at the discretion of the instructor, for not adhering to any of the following guidelines. Discussion posts will be graded according to the assignment rubric provided below.
Contributes to discussion: Find a website that offers accurate, relevant, and useful information referencing this week’s focus application. Describe why the information provided by this website is useful. Read through your classmates’ posts and avoid using sites already provided.
10
25
Reviewed website and accurately lists URL at the bottom of the post.
e.g. http://www.techresource.com/article/microsoft…
5
Met minimum word count – 75 words – Posted word count at the bottom of post e.g. wc=75

Categories
Computer Science

You should strictly follow the following format for your submission:

Write a four-page research paper or a report about Social Engineering Attacks ( You have the option to submit your paper to receive further feedback from me throughout the semester. You must cite at least 7 reputable sources for the research paper.
You should strictly follow the following format for your submission:
– 1-inch margins.
– 12-point Times New Roman font.
– Double-spaced.
– You should aim for a maximum of four pages.
– References, tables, and figures(if any) are not included in the page limit.
– You should add a title that summarizes the main topic to your final paper.
– You are expected to cite at least 7 reputable sources in your paper. Please include the PDF file as one of the sources (
CEH v10 Certified Ethical Hacker Study Guide 1st Edition, Kindle Edition)
– You need to use APA or MLA citation style for your in-text citations and references.
– Submit your paper as a Word document.

Categories
Computer Science

For this lab, you need to to create a tutorial video of yourself showing how you map the er diagram below into a relational schema.

For this lab, you need to to create a tutorial video of yourself showing how you map the ER diagram below into a relational schema.
Use the mapping guidelines listed in Chapter 3.
Your video MUST be/have:
Screen recording (Here is an example: https://www.youtube.com/watch?v=CZTkgMoqVssLinks to an external site.)
Verbal narration (explain verbally how you map each element in the ER diagram into the relational schema as you are drawing it).
Web camera on (look up how to do it, tons of online tutorial).
Missing any of the requirements above will result in a grade of zero.
Video Notes:
You MUST build the entire relational schema during the video (i.e. when you start the recording the video, your relational schema should be empty).
You can use any software to record your screen while completing this lab. I used OBS (https://obsproject.com/Links to an external site.) before, it seems to do the job pretty well and it is free!
You MUST use http://draw.io/Links to an external site. to draw the relational schema (any other tool will not be accepted).
Practice the lab before you start recording so your video will not be long.

Categories
Computer Science

Ribe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

ribe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

Categories
Computer Science

This should address: the problems encountered when tetra shillings accounting fell victim to a ransomware attack that resulted in the loss of critical data.

Your final project will be to design a training presentation to the client’s IT staff.
If you haven’t already done it last week,:
Download the Client Presentation Template to get started.
Review the Presentation Resources which may help you get started.
The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
voice annotation for every slide (excluding the reference slide)
at least two references
The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.
The presentation should address your recommendations for the following items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
the ability to restore system files and settings without affecting the user’s personal files and data.
the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Categories
Computer Science

• with references

This assignment is to show off your presentation skills using Microsoft Office products. You can present about anything that is near and dear to your heart. The presentation should include:
• Include a 10 slide PowerPoint Presentation
• With references

Categories
Computer Science

Please write the requirements for voting rights using citations from these three sources.

source:
https://www.sciencedirect.com/science/article/abs/pii/S0920548906000754
Please write the requirements for voting rights using citations from these three sources. Thank you.

Categories
Computer Science

Give examples from the textbook and from your personal experience with computing devices.

while security is everyone’s concern when it comes to computing, data security seems to be overlooked by the end-user. Please explain what data security is and how we can all protect ourselves from potential security issues. Give examples from the textbook and from your personal experience with computing devices.
Please provide apa sources

Categories
Computer Science

Research and find a net neutrality-related article published in a professional it magazine, news magazine/website.

Research and find a Net Neutrality-related article published in a professional IT magazine, news magazine/website.
1. What is Net Neutrality and why is it important? (50 points)
Explain your answer.
(150 – 250 words)
2. Do you agree or disagree with the issues and /or arguments in the article? (15 points)
(50 – 100 words)
3. Identify 1-2 resources published in 2017-2022 that helped you answer these questions.
Properly reference your resources
(APA (Links to an external site.)/MLA (Links to an external site.)format). (10 points)
Resources to use from the class materials.


https://www.uscourts.gov/about-federal-courts/educational-resources/about-educational-outreach/activity-resources/what-does
Law panel | Truth, Trust and the First Amendment in the Digital Age (Youtube video)

Categories
Computer Science

Normalization is actually a technique for reviewing the database design and it includes a set of mathematical rules.

3) Normalization is one of the important processes while designing databases. Normalization is actually a technique for reviewing the database design and it includes a set of mathematical rules.
Answer the following questions using specific examples:
Does normalization always lead to a good design? Why or why not?
What kind of issues, problems are possible in the normalization process? Use APA Citation