Computer Architecture(CSCI-450)

Technical report on:

Security microarchitectures and related vulnerabilities.

The paper should include:

Expectations

2.

Read relevant paper(s) on 

the topic

3.

Write a technical report demonstrating your understanding of the paper(s)

4.

Submit the report by the deadline Requirements

To help prepare you for writing technical documents in the future, you will write your project 

paper in a simplified ACM format with one column, fully justified text. The simplified ACM template is 

provided on myleoonline in the project module. Your reportshould be approximately 5-6 pages

mimicking a research paper. Your report will basically contain the following sections (which can be 

adjusted depending on what you are reporting on)

*

Abstract or executive summary

: 100-200 words describing what has been  done and results.

Introduction

: This section includes a longer summary of what has been done, main observations 

and results. The report introduction should briefly discuss how the used techniques are different 

from previous work on the topic.

Background/Related work

: This section includes summaries of previous related work including 

references to the papers and other resources you needed to explore to fully understand the 

topic you are reporting on. Include references to these resources in the references se

ction. In this section, you should aim to describe how the work you are reporting on is different and how 

it improves and/or extends previous methods. 

Methodology:

 Describe your understanding of the main contributions  of the topic you are  reporting on: what was done, how it was done, how it works, etc. Provide architectural diagrams, charts, and figures where necessary with proper citation.

Experiment Results/Observations

: Depending on the topic you are reporting on, you mayneedto include a description of the experimental setup (if included in the original paper you are reviewing). Aim to be concise and utilize graphs to show any improvements. Include a summary of results analysis: what the results mean and the trends  that are revealed

.

Conclusions and Future Work:

 Include here a summary of the work and results. Include any future work that is expected or could be done.

References

Investigating and Prosecuting Cybercrime: 8-10 Pages Term Paper

  Paper outline

Title: Investigating and Prosecuting Cybercrime

1- Introduction

a. What is Cybercrime?

b. The different types of cybercrime we will focus on

2- Cybercrime Concerns

3- Laws/Penalties on Cybercrime

4- Law Enforcement: How to investigate and prosecute cybercrime

5- Constraints, Legal Guidance and Best practices

6- Conclusion

Instructions:

 

2. Term Paper:

You will write and submit a 8-10 page term paper (excluding title 

page, tables, figures, references, etc.) based on the feedback you received on the 

outline of your paper. Your final project will include the following sections: introduction, 

literature review, findings, discussion, policy implications, and conclusion. 

The paper will be evaluated on the usual criteria for assessing scholarly or scientific 

papers, such as quality of content, writing style and organization, demonstration of 

knowledge and mastery of the paper’s topic, use of literature sources, how well the 

paper relates or adds to the extant body of knowledge on the topic, adequacy of the 

approach taken in the paper, and the soundness of logic, theoretical reasoning, and 

conclusions.  

An abstract page and complete list of at least seven (7) references are also required, 

but do not count towards the page requirement. 

The paper must use the Times New Roman or Arial font size 12 and be double-spaced 

with one-inch margin on all sides.

Your project must conform to the APA style of writing. Other than the format of tables 

and figures, the three particular areas of the APA style you should pay attention are the 

use of levels of headings and sub-headings, the text citations, and the format of the 

references.

ITSD322U2IP

 

Assignment Details

In this assignment you will use a loop and a custom method (or “function”), as well as built-in Java classes. Create a Java program that meets the following requirements:

  1. Ask the user to input a number between 5 and 45. Tell the user to enter 1 if they wish to exit the program.
  2. Store the user’s input in a variable with the integer data type.
  3. Use a while loop to repeat the program, checking the user’s entry in case they entered a 1 to exit the program.
  4. Create a separate method (in the same Java file) called “checkEntry”. This method must use a single parameter of the integer data type. When the user enters a number, pass that number to checkEntry for evaluation (described below).
  5. (In the checkEntry method.) If the user enters a value of less than 35, the checkEntry method must multiply that value by 5 and return the result to main(). If the user enters a value greater than or equal to 35, the program must add 10 to that value and return the result to main().
  6. Display the result of checkEntry’s evaluation on the screen.
  7. Document your code using appropriate in-line comments. This includes variable declarations, input and output methods, and logic. Your comments must explain how the program works to a programmer who is familiar with Java and NetBeans but has not seen this program before.

Your deliverable for this assignment is the NetBeans project you created using the steps above (ZIP the whole folder that contains the project). (No screenshot.)

Note: It is fine if the program evaluates 1 (multiplying it by 5) and displays the success message before terminating. This is the expected behavior for the simplest solution to the program.

Note: This program does not check to see if the user failed to enter a number in the required range. That topic will be examined later in this course.

Tip: As with Unit 1, remember to import the Scanner class by adding the line “import java.util.Scanner” below the “package” declaration.

Please submit your assignment.

Security

  • What advantages and disadvantages should be discussed before an organization commits to implement Hadoop?
  • How can a database be enhanced to make it user-friendly to managers as well as programmers?
  • What are some of the current trends in telecommunications and networks?
  • Why would you choose a mesh topology over other types of network topologies?

2)

  • What functionalities or services make an e-commerce Web site effective?
  • What enhancements might encourage more people to embrace e-commerce and/or m-commerce?

Discussion 8- Monitoring Project

  • Offer some insights, from researching the Internet, around the importance of client acceptance throughout the project.
  • If you were leading a project, and the project declines the final acceptance, what do you believe the team may have failed at?
  • Provide a few highlights that the course has offered you (you can pull from your practical connection assignment).

Text

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

week-12 assignment

 

 Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Project Management…6

 Compare the following digital camera in terms of evaluation criteria. Also consider mentioning their

 brands, models and digital. 

Types of Cameras

  • Compact Camera
  • Waterproof Camera
  • Bridge Camera

Evaluation criteria

. Features

. Price

.specifications

.Durability

. Size

. picture quality

. weight

Use the following link to help you

https://www.which.co.uk/reviews/digital-cameras/article/which-type-of-digital-camera-should-you-choose-a6X9r1o3K8Nr

Problem 3- Initiating Project

Please check the attached file for instructions.

Using your Week 2 Business Case complete the following Stakeholder Register Exercise (Exhibit 6.4 on page 183 of the Kloppenborg text) and Project Communications Matrix (Exhibit 6.9 on page 192). Complete instructions and templates based on these exhibits have been provided (see attached document).

IntelliJ task

Hello, I have a project I need to make for school with IntelliJ. (mySQL, kotlin, ..). It should be simple data and code that gets shown only in terminal. Its about being able to track how many cars are parked etc.. pushing things in arrays and getting them out basically. Could someone help me out with this asap? Would be great, thanks!