Work Computer Science

1 – How does prescriptive analytics relate to descriptive

and predictive analytics?

2- Explain the differences between static and dynamic

models. How can one evolve into the other?

3 — What is the difference between an optimistic approach 

and a pessimistic approach to decision making under 

assumed uncertainty?

4 — Explain why solving problems under uncertainty sometimes

involves assuming that the problem is to be solved

under conditions of risk.

5 — Investigate via a Web search how models and their

solutions are used by the U.S. Department of Homeland

Security in the “war against terrorism.” Also investigate

how other governments or government agencies are

using models in their missions.

Week 2 assignment

 This assignment will be submitted to Turnitin™.Instructions

Assignment Instructions:

  • Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc.
  • Office Schematic, (select 

(Picture of office will be in uploaded files)

  * ) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′.

  • Each office should contain two network ports minimum, one for Voice and one for Data. Room B will serve as your network closet.
  • You will need to provide the following items in your submission:
    • Estimated Purchases list (some examples below)
      • Switches
      • Cable
      • Port plates
      • Punch Boards
      • UPS and Power
      • Etc.
    • A timeline of installation (*estimated)
    • Chosen Typology (*estimated)
    • Basic Network configuration (*estimated)
    • Remember to justify your choices
    • Your proposal should answer the questions above. If you have experience in networking, there are additional things you would “want”, but hold on those till later assignments, as the assignments build upon one another. *NOTE* This means you may reuse information from this assignment in future assignments as well, and I am granting you a waiver of not citing yourself in those assignments.
  • Assignment must be in a Word document. The numbers are going to be rough estimates, that is understood. Pricing for purchases and labor can be based off of pricing from online resources.
  • Required Format
  • A timeline of installation (*estimated) ANSWER
  • Chosen Typology (*estimated) ANSWER
  • Basic Network configuration (*estimated) ANSWER
  • Remember to justify your choices

power

please give me a good script and i will do the voice over. Thank you 

Cisco Lab 2

 

This Lab explores the Cisco IOS and its hierarchal design by configuring Gateway interfaces that face the LAN.

Assignment

Do the PT Lab

Answer the questions in the Lab 2v7 Directions and Submisson. doc and submit with a screenshot of the ‘Activity Results’ > ‘Assessment Items‘ page from the PT lab

MAJOR PROJECT PROPOSAL relating to IT networking security

This proposal does not have an indicated topic, but the topic itself must have some relationship with the networking security area. You can think of any topic as long as it is suitable. 

Basically, the project proposal consists the following components:

1. Project Description:  give a description of the major project 

2. Problem statement & Backgroud:  provide extensive background to the problem.  An extended background of the problem, the nature and complexity of the problem to be solved should be included.  

3. Complexity:  highlight the complexity of the problem to be solved 

4. Scope & Depth:  define the scope and the depth of the major project

5. Test Plan:   A detailed test plan may include the procedures, methodology, tools used, verification, pass/fail criteria, or examples of test cases 

6. Methodology:  describe the methodology, approach, and technologies to be used 

7. System/software Architecture diagram:  include a system/software architecture diagram.

8. Innovation(Most important part):  highlight the innovative components, as the major project should contain some elements, which are deemed to be innovative, experimental or exploratory in nature.

 it is strongly recommended that new leading edge technologies, even experimental, be considered. Even if these technologies are not required by the industry sponsor or client, or practically feasible, research on these areas should be included as part of the proposal. 

9. Technical Challenges(Most important part):  highlight expected technical challenges, which could include information regarding what will be learned above and beyond what is taught in the classroom while researching for the project 

10. Milestones:  provide details about estimated milestones in terms of time and effort.

I will also provide you with 3 sample proposals. These 3 samples are good examples of finished projects, you can take a look at it and start coming up some ideas of your own. The time limit is about a month.

Discussion: Digital Divide

According to many, the digital world is being divided into ‘haves’ and ‘have nots’ – between those that have access and can use a computer and the Internet, and those that do not have such access. Some believe that this creates serious ethical implications and that there is a moral obligation to do something about the disparity; the ‘have nots’ may well feel discriminated against or feel ‘socially excluded’ and are missing out on many life opportunities. Do you feel that everyone everywhere should have access to computers and the Internet, regardless of location, need, competency, or ability to pay? If yes, who should provide the services and education and who should pick up the tab? If no, explain why not everyone needs access to the Internet.

dq

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  1. Besides cost, why should mobile app developers target the Android platform?
  2. Why is Android competition to itself?
  3. Describe key ingredients needed to create mobile applications on the iOS platform. 

computer Networking

Topic :  Functional Programming  

 

INSTRUCTIONS:

This section requires that you review at least 3 peer-reviewed literature sources to be used in the research.

For each of the 5 articles, write a paragraph each for the following sections

o   Description of the research including who the target population was (if available)
o   Research Method used to conduct the research (describe what the researcher(s) did to gather data for the research)
a.      Was survey distributed? How many questions? How many participants
b.      Was it a focus group? Was it a case study
c.      Be explicito  Findings: Indicate the findings as reported in the article
o   Conclusion: What was the conclusion of the research

**You are required to do this for each of the 3 articles**. Citation in APA format, is critical as you report/review the articles

DO NOT add the APA reference at the beginning of each article review in Chapter 2. Be sure to add to them to the References page
DO NOT include any subheadings
 

Miranda Rule

 Prior to the Miranda v Arizona ruling in 1966, law enforcement could question possible suspects without their having legal counsel present. They could bully potential suspects, trick them, and do whatever else they thought was necessary to determine potential suspects’ involvement in a crime. The Miranda ruling protects people by allowing them to have legal counsel present when questioned by law enforcement regarding a crime in which they may or may not have been involved. This is a two-part assignment. Be sure to complete both parts.

Instructions

Part 1

In Part 1 of this assignment you are required to write a one- to two-page narrative in which you: 

  • Summarize the Miranda Rule, including examples. 
  • Explain exceptions to the Miranda Rule, including examples.   
  • Develop a checklist with a series of questions to ask when assessing whether or not the Miranda Rule applies (for example, is your question a general one, such as name and date of birth? Or is it one that could make them vulnerable to prosecution?). 
Part 2

In Part 2 of this assignment, you are required to examine the scenarios contained in the Miranda Rule or Exception Template [DOCX].

  • Note: The first scenario is completed for you as an example to guide your work on the remaining nine scenarios.  

For each scenario:

  1. Determine for each scenario whether the Miranda Rule applies or an exception to it is in order. 
  2. Justify your determinations. 
  3. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.

cryptography

After reading chapter 3, analyze the history of the Caesar Cypher and its impact on cryptography.