Final project

 

The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

network administration

The Audit Response Committee would like to know in what ways Windows Server 2016 can provide audit information, because no auditing is currently in use. The committee would like you to create a report that provides examples of what can be audited. Also, the IT director wants you to create a set of general instructions for how to set up auditing changes to files.

Create a set of UML and Data Flow diagrams.

Create a set of UML and Data Flow diagrams.
This is a required assignment, worth 170 points, and must be submitted by the due date.  Late assignments will not be accepted.
Details on the Project: Systems Diagrams Specifications v2.pdf
When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 
Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and past information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.
Submit your solution here.

You have been asked by

  

You have been asked by a tax return preparer to create a program which will help him calculate taxes. This preparer will at most have 100 clients. For each client, he has to keep track of the client’s first name, last name, gross income, and number of children. Use parallel arrays to store this information for him.

A taxpayer’s federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she will get a dependency exemption deduction of $4,000. A taxpayer gross income is reduced by the amount of the dependency exemption deduction to determine his taxable income.

The amount of tax due is a percentage of taxable income. If taxable income is greater than or equal to $100,000, the tax due is 30% of taxable income. If taxable income is greater than or equal to $50,000, but less than $100,000, the tax due is 20% of taxable income. If taxable income is less than $50,000, tax due is 10% of taxable income. A taxpayer cannot have a negative tax due – if his taxable income is less than 0, his tax due is 0.

Present the user with a menu of the following four choices

1. Add taxpayer info (This will allow the user to enter the info (first name, last name, gross income, number of children for ONE taxpayer )

2. View info for all taxpayers (This will allow the user to view info for all

taxpayers: first and last name, gross income, number of children, tax due.)

3. Find and display the total owed for all taxpayers

4. Exit the program (If the user choices 4, the program will exit. If the user

chooses 1, 2 or 3, the program will do what the menu item says it will do,

and then the menu will appear again.

operating system vulnerability (windows and linux)

what to do

  1. Security Assessment Report (SAR): T
  2. 8 set PowerPoint 

  1. Explain the user’s role in an OS.
  2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
  3. Describe the embedded OS.
  4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture.
  5. explain Windows vulnerabilities and Linux vulnerabilities;
  6. explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices;
  7. explain the motives and methods for intrusion of the MS and Linux operating systems;
  8. explain the types of security awareness technologies, such as intrusion detection and intrusion prevention systems;
  9. describe how and why different corporate and government systems are targets; and
  10. describe different types of intrusions such as SQL PL/SQL, XML, and other injections.

DS WK2

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use scholarly research. Google Scholar is the 2nd best option to use for research.

Your paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. And atleast 3 peer reviewed articles
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

 

Required Reading

Required ReadingPsomakelis, E., Aisopos, F., Litke, A., Tserpes, K., Kardara, M., & Campo, P. M. (2016). Big IoT and social networking data for smart cities: Algorithmic improvements on Big Data Analysis in the context of RADICAL city applications

WEB DEVELOP

first job

 Objectives
• Set up an HTML page using the basic page elements.
• Be able to use HTML5 semantic elements to structure a web page.
• Properly use images, lists, headings and semantic elements.
• Successfully use CSS to style and modify the appearance of page and the elements
contained within.
Basic Requirements
• Properly use and indent all tags.
• Set up page with , and tags.
Assignment Details
Using the skills you have gained in this course, create a homepage for yourself. This
homepage will be a space for you to talk about yourself, your education, work
experience and goals. Include:
• Name
• Degree
• Skills
• Picture
• Work experience (1 or 2 is fine)
Submit your assignment
1. Combine all work files into a zip folder (include all HTML, CSS, font, and image files).
Keep the file structure the same as it was when you were working on the
assignment.
2. Submit the zip folder via desire2learn in the appropriate Assignment folder in order
to receive credit. While you may also submit screenshots, you are required to
submit the actual code files, not just screenshots of the code. 

second job project

 Objectives
• Comprehensive review of the HTML, CSS and Javascript skills learned this semester.
Basic Requirements
• Properly use and indent all tags.
• Set up page with , and tags.
• The page should contain your name in the

.
Project Description
• Using the skills you have gained this semester, recreate 2 – 3 pages of a website of
your choice.
• All HTML and CSS should be built from the ground up. You may (and should) use
images that you find on the site for your project.
• In addition to HTML and CSS, you will be adding some basic Javascript functionality
of your choosing to the site.
Submitting your project
• There are 3 stages of this project:
1. Pick the site (and the 2 – 3 pages you will be building)
• Submit the URL along with screenshots to D2L
2. HTML and CSS
3. Javascript
• Sections 2 & 3 are both due the final week of the semester.
• Save all work to a zip folder and submit to D2L. In addition to the
completed work files, please include screenshots of the final
result ad well