5G Support for autonomous vehicles

  

The term paper it should be of professional quality and be in the format of an IEEE transaction style. Figures must be clear and drawn by you. Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:

1. Title page.

2. Abstract (summary of the paper).

3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).

4. (i) Description of existing algorithms/protocols for survey papers; (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.

5. (i) Comparison among existing algorithms/protocols and discussion on possible

improvements/enhancements; (ii) project results (derivation, proof, justification, or detailed

design/simulation) in one or more numbered sections for research-oriented papers.

6. Conclusions (evaluation of results, suggestions for improvements, or future work).

7. References must follow IEEE Transactions format (at least 10 references). Proper citation of

references must be embedded in the term paper.

Note: Please follow the above-mentioned guidelines and prepare my term paper accordingly. Also, I’m attaching my mid-term report.

Cybersecurity

 

WK 10 discussion – Analyze a Phishing email

Activity 10.2: Analyze a Phishing Email*You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.Part 1: Manually analyze an email headerOnce you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.Review the headers and identify what clues you can find.   Report on;a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,d) What would you do to identify future phishing emails based on the header information?

Part 2: Analyze the email contentNow that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email.   Report on;

  1. Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
  2. Is the link or domain a known-bad link?

Part 3: Use an automated tool      Use one or more automated email header analyzers to review the header from part 1.   Report on       if you identify additional useful data and what that data is.      (Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)ConclusionWrite a one paragraph conclusion on what you learned 

MOS19_XL_PROJ5 – Charts 1.3

 

MOS19_XL_PROJ5 – Charts 1.3

 

In this project, you will manage charts to meet objectives 5.1 through 5.3 of the Excel MOS Associate exam. To complete the project, you will create charts 5.1, modify charts 5.2, and format charts 5.3. Note: This project was created for PC users since the MOS Exam is completed in the PC user environment.

Steps to Perform:

Step

Instructions

Points Possible

1

Start Excel. Download and open the file named Student_MOS19_XL_PROJ5_Charts.xlsx. Save   the file as Last_First_MOS19_XL_PROJ5_Charts.

0

2

Edit the chart to include the 4th Quarter data series.

8

3

Change the Rows/Columns so that the Departments are the Legend   entries.

8

4

Resize the chart to the range   B14:G30, ensuring that the chart is just inside the cells’ borders.

6

5

Insert a title for the chart and enter Government   Expenses.

6

6

Add Alt Text to the chart and   enter the description, Chart shows a comparison of government expenses for   the first through fourth quarters.

10

7

Insert a 3-D Pie Chart comparing the Department Totals   using Departments as the legend. The chart title will display as Department Total.

8

8

Move the Department Total chart   to a new sheet and rename the sheet Pie Chart.

6

9

Apply Chart Style 3, and then apply Colorful Palette 3.

8

10

On the Expenses worksheet use   Quick Analysis to apply Data Bars to the range F4:F11. Note, Mac users, apply   Solid Blue Data Bars to the range.

8

11

Ensure that the chart is not selected. Insert a Right   Block Arrow shape pointing to the Capital Projects data for the 4th Quarter   of the Government Expenses chart. Position the shape in row 18 and resize the   shape so that the Height is 0.20 and the Width is 1.07.
 

  Hint:

8

12

On the Pie Chart sheet, insert a   Text Box in the Department Total chart. Position the text box in the pie   shape to the right of the 29% data   label. In the text box, type Largest percent, apply Bold to the text, and   then resize the Text Box to Height 0.30 and Width 1.2.
 

12

13

Change the Chart Layout to 1. Use the snipping tool to   take a rectangular snip of the Pie Chart Area including the title. Copy and   then paste the snip in cell I2 of the Expenses worksheet. Resize the snip so   that the upper left corner sits just inside the cell borders of I2, Height 5.91   and Width 6.67.

12

Wk 3 – Apply: Case Study: Appliance Warehouse – Application Design

  

Assignment Content

  1.     Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

    For this week’s assignment, be sure to refer to Appliance Warehouse Resources: Survey results, Pre-packaged software features, as well as, chapter 7 Development Strategies, and chapter 8 User Interface Design.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 8-10 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create an 8- to 10-slide presentation with speaker notes (to submit in Blackboard) for senior management with the following:
    • Service Department Software Design: To build a logical model for the new information system, a system analyst must decide on whether to use a SaaS or use an in-house customized software. For this section, ensure you:
    • Research service-based business applications that allow for appointment setting and service provider scheduling.
    • Prepare a list of 4 pros and 4 cons for each of the following:
    • SaaS
    • An in-house customized software
    • Recommend SaaS or in-house software and state your reasoning.
    • Software Requirements: Identify 7-10 requirements the software must do to support the Services Department.
    • Develop a Communication Plan: Explain how stakeholders and managers will be kept informed regarding project process. Your plan should include the form of communication (status reports,meetings, etc.), frequency, and specific project milestones that will aid in determining where the implementation stands.

Business Intelligence Port Folio Assignment

Portfolio Project: This week discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work

topic: Challenges in utilizing Artificial Intelligence in Business Entities

Assignment Content

  1. At this point, you have found a research article exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class .

    For this assignment:  You will use your research article from Week 4’s HW to write your first objective summary. 
    Requirements:

    • 15 pts, Cover/Title Page 
    • 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS 
    • 15 pts, References Page (you will only have one reference listed — the research article you are using.) 
    • Resources to help you:
    • Re-watch the class recording
    • See pp. 17-22 to read about objective summaries
    • See pp. 23-28 to read more about avoiding plagiarism

ITCO425U4DB

  

Assignment Details

In Unit 4, as we enter the systems integration selection phase, we must select the technical integration framework, and describe and illustrate our systems integration architecture.

For this Discussion Board assignment, share how you think integration frameworks typical to the systems integration selection phase are best used to represent an integration of your system components.

Responses to Peers:

Compare the integration frameworks identified by other students in the discussion, and share how it can be used to supplement integration patterns in your solution.

In your own words, please post a response to the Discussion Board and comment at least 75 words on other people post. You will be graded on the quality of your postings

CYB/ 130

It’s important to program your code efficiently. Efficient code manages errors and exceptions and cleans up memory after it ends. The try-except statements are helpful in handling errors that are detected during execution.

Respond to the following in a minimum of 175 words:

  • What are the 2 categories of errors when debugging code? How can the try-except statements handle errors in Python? Provide a code example that supports your comments.

Evidence collection policy

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

  • Description of information required for items of evidence
  • Documentation required in addition to item details (personnel, description of circumstances, and so on)
  • Description of measures required to preserve initial evidence integrity
  • Description of measures required to preserve ongoing evidence integrity
  • Controls necessary to maintain evidence integrity in storage
  • Documentation required to demonstrate evidence integrity