Computer Science

Projects
  1. Compile a list of important characteristics of processors commonly employed in today’s personal computers.
  2. Conduct research on how to write the algorithms for shortest job next (SJN) and shortest remaining time (SRT) policies. Submit your findings in a report.
Additional Resources
  1. History of operating systems:  http://www.osdata.com/kind/history.htm
  2. Dual-Core vs. Quad-Core CPUs: http://www.pcmag.com/article2/0,2817,2406293,00.asp
  3. Intel® Core™2 Quad Processors: http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-8M-Cache-2_40-GHz-1066-MHz-FSB
  4. Multi-core Enterprise Technology at Dell®: http://www1.euro.dell.com/content/topics/topic.aspx/emea/topics/products/pedge/en/multi_core?c=uk&cs=ukbsdt1&l=en&s=bsd

Wk 3 – PCI Compliance

 

Assignment Content

  1. Your father has a private retail pharmacy in a small rural town. He accepts credit cards and holds customer information on a small database server. He wants to know if he should be concerned about PCI compliance, as well as HIPAA, and has asked you for a summary so he can decide if he wants to hire an outside consultant to help him comply with government regulations.

    Write a 3- to 4-page summary in Microsoft® Word of the important aspect of PCI and HIPAA regulations to help him make his decision. In your summary:

    • Accurately describe what PCI is and why it is important to a small business.
    • Explain why a small business needs to comply with PCI. Provide at least two reasons.
    • Outline the ramifications of noncompliance to a small business. Provide two examples.
    • Concisely describe who is covered under HIPAA.
    • List the information protected under HIPAA.
    • List the administrative requirements under HIPAA.
    • Cite all sources using APA guidelines. 

      Submit your assignment.

Technology Acceptance Model in Leadership context

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 3-5 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts.

Cyber Crime Final Project

Final Project

*****

This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.

*****

The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below.  You can select one of these (first come/first serve) or submit your own.

Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.

*****

Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.

*****

The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:

– Project Description

– Project Goal/Objectives

– Details of Work Performed

– Outcomes

– Conclusion

Grading Rubric – 25 Points towards Final Grade:

– 15    points for Complexity of Project (High = 3, Medium = 2, Low = 1)

– 5    points for Report

– 5    points for Presentation

TOPIC:

(10) Image File Tampering

Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.

The project requires a brief paper and a power point document. 

Paper needs to be no more than 2 pages.

Need both assignments by 4pm Eastern. 11/17

Practical Connection Assignment Reflection

Practical Connection Assignment Reflection on INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING. 

How gained knowledge in INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING subject help you when you are working as a quality assurance analyst in the healthcare organization?

How you will apply what you learn to your current job?

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments. 

Writing a program in COBOL.

Write the following program using COBOL programming language:

Grade Report

This is a program designed to hit you where you live! This program will compute your current average in a class, the minimum average that you could earn from this point forward, and the maximum average that you can earn. In addition to this, it prints the relative weights of each assignment category.

This program assumes that grades are computed out a fixed pool of points. For example, the course in which you currently find yourself has 1000 points. Your total average is computed by the formula:

grade = (points_earned * 100) / points_possible

So at any given point in the semester, you could compute your current average by totaling the points you have earned and dividing by the possible points on your assignments so far.

The minimum grade is what you would earn if you stopped handing in work. That is, you would forfeit all remaining possible points in the semester (not a good idea, usually!)

The maximum grade is what you would earn if you earned all remaining possible points in the semester.

This program will take as its input the name of a file. The file is a flat-format file of the following form:

The total number of points for the entire semester on a line by itself.

Zero or more assignment records, with each field being a fixed width. The format of these records are as follows:

Assignment Name (20 characters)

Category (20 characters)

Possible Points (14 characters)

Earned Points (14 characters)

Consider the file generated by a student whom we will call “Bill”. Bill has recorded his first few as shown:

1000

MS 1 – Join Grps    Group Project       5             5             

Four Programs       Programming         15            9             

Quiz 1              Quizzes             10            7             

FORTRAN             Programming         25            18            

Quiz 2              Quizzes             10            9             

HW 1 – Looplang     Homework            20            15            

Note that there is no separator between these fields! If they use the full width of the field, they run right up to the next one:

HW 3 – Struct & VarsHomework            20            20            

When Bill runs the program, it generates the following output:

File: Bill

Group Project        (5%)

==================================

MS 1 – Join Grps        5/5   100%

==================================

                        5/5   100%

Homework             (23%)

==================================

HW 1 – Looplang       15/20    75%

==================================

                      15/20    75%

Programming          (47%)

==================================

Four Programs          9/15    60%

FORTRAN               18/25    72%

==================================

                      27/40    67%

Quizzes              (23%)

==================================

Quiz 1                 7/10    70%

Quiz 2                 9/10    90%

==================================

                      16/20    80%

Current Grade: 74%

Minimum Total Grade: 6%

Maximum Total Grade: 97%

Here, neatness counts! Make the output line up in nice neat tables. Also note that category weights are the weight of how much the category counts toward the current average. At the end of the course, these would match the weights in the syllabus. Also, note that while Bill is earning a C, if he buckles down he can still get that A. Perhaps you could use this program to help you in your courses!

The contents of sample data files are given below:

File bill:

1000

MS 1 – Join Grps Group Project 5 5   

Four Programs Programming 15 9   

Quiz 1 Quizzes 10 7   

FORTRAN Programming 25 18

Quiz 2 Quizzes 10 9   

HW 1 – Looplang Homework 20 15

File cs-390 assignments:

1000

MS 1 – Join Grps Group Project 5 0   

Four Programs Programming 15 0   

Quiz 1 Quizzes 10 0   

FORTRAN Programming 25 0   

Quiz 2 Quizzes 10 0   

HW 1 – Looplang Homework 20 0   

COBOL Programming 25 0   

Quiz 3 Quizzes 10 0   

Mid Mid 200 0   

HW 2 – LL Enhanced Homework 20 0   

ALGOL 68 Programming 25 0   

MS 2 – Descr. Lang. Group Project 50 0   

HW 3 – Struct & VarsHomework 20 0   

Lua Programming 25 0   

Quiz 4 Quizzes 10 0   

HW 4 – Variable Typ.Homework 20 0   

MS 3 – Example ProgsGroup Project 45 0   

JavaScript Programming 25 0   

Quiz 5 Quizzes 10 0   

HW 5 – Smalltalk Homework 20 0   

MS 4 – Interpreter Group Project 100 0   

Ms 5 – Presentation Group Project 50 0   

Scheme Programming 25 0   

Quiz 6 Quizzes 10 0   

Prolog Programming 25 0   

Final Final test 200 0