Questions

         

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Analysis of Algorithms

 1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).

 b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course). 

2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for

 a. lists represented as arrays.

 b. lists represented as linked lists.

 3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop

 b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue 

DATABASE security

  

Do a bit of research into File Inclusion Vulnerability.

What is it? Why is dangerous? What is the difference between low and remote inclusion?

What methods can be employed to prevent a security breach?

What programming languages are vulnerable to this type of attack?

Post between 150-300. Use your own words. Do not copy the work of another student.

Cybersecurity

Research the fundamentals associated with cybersecurity, choose one and explain why this fundamental is essential. consider where cybersecurity has come and where it could be going in the future

2 page papers 

Computer Science

 

Before you begin writing your research question, it is first important to craft a purpose statement. What can be a purpose of your study?

Examples of a purpose for a quantitative study include:

  • Examining a relationship between students who take computing classes in high school and those who pursue computer science as a major in college,
  • Evaluating the effectiveness of an outreach activity among underrepresented students, or
  • Measuring engagement or interest in computing among middle school students.

Examples for a qualitative study include:

  • Exploring parent stories about helping their students with computing homework or
  • Developing a theory of effective management techniques in a computer lab.

Once you define the purpose of your study, you can then create a clear purpose statement. Purpose statements help you define your research in a straightforward manner. Here is an example of a well-defined purpose statement.

The purpose of this study is to examine the relationship between the completion of an 9-week computational thinking unit among 7th and 8th grade students in a rural middle school and student achievement on mathematics exams.

This purpose statement explicitly answers these questions:

  • What is the intent of the study?
  • What population group is targeted in the study (i.e., age, location, etc.)?
  • What was the intervention (activity or curriculum), including its duration?

After you have decided on the purpose of your study and have written your purpose statement, you can then craft your research question.

Writing a Well-crafted Research Question

Research questions provide an overarching direction for your study to follow. It guides the type of study you will choose, the type of data you will collect, and the type of analysis on the data that you will perform.

Writing good research questions, then, is an important step in framing your study. What makes a good research question? Research questions should be clear, concise, specific, neutral, and focused. They should also be complex enough that the question requires more than just a “yes” or “no” answer. An example of a thorough research question for a quantitative study follows:

Does guardian understanding of computational thinking affect student performance on computational thinking tasks among primary school students in an urban school district?

For a qualitative study, a thorough research question may look like this:

What are the major challenges teachers face when teaching computational thinking to Kindergarten, 1st grade and 2nd grade students in the United States?

security architecture 14 .1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier

Industry 4.0

Looking at the big picture, researchers

proposed a digitalization of businesses and many calls it the 4th Industrial Revolution. You will

find many references to Industry 4.0 from researchers, consulting firms, and practitioners alike.

That is the theme of this final paper. Select an industry that closely interests you (e.g.,

Agriculture, Banking, Retail, Health Care, Hospitality), and research and discuss how Industry

4.0 will drastically change it. The general structure of the report is as follows:

1. An introductory section about Industry 4.0, providing context for your report.

2. A description and discussion of how Industry 4.0 will affect the industry you selected as

a theme. This should be the bulk of your report.

3. The opportunities and challenges ahead for business implementing Industry 4.0

principles and technologies.

4. A conclusion section (with your takeaway from the discussion).

To write this report you will need to cover at least the following:

1. Your report must adhere to APA formatting;

2. You must research at least 5 recent (i.e., less than 5 years) peer-reviewed articles.

Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,

Accenture, Deloitte, Capgemini) will be accepted;

3. Other than APA formatting, the structure for the paper is not fixed, as long as there is

a logical flow of ideas. The length of the paper is 5-6 pages

Week 7

 

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem (You may use a different application if PowerPoint is not available).

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart (You may use a different application if PowerPoint is not available)..

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)