Presentation Computer Science

Summarize the following subjects  of Chapter 3 

  • Different types of network circuits and media
  • Digital transmission of digital data
  • Analog transmission of digital data
  • Digital transmission of analog data
  • Analog and digital modems
  • Multiplexing

Discuss & Present TWO of the following subjects:

5- space-based global Internet service
https://www.youtube.com/watch?v=hXa3bTcIGPU
https://www.blueorigin.com/news/blue-origin-to-launch-telesats-advanced-global-leo-satellite-constellation
https://www.starlink.com/
https://www.oneweb.world/
 

6- Select and present a Network topic from IEEE Spectrum
https://spectrum.ieee.org/computing/networks

Week1 Assignment-Organ Leadership

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences. Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article. Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

Journals:

  Chapter 1 Journal articles

law enforcement

Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.[500 words 

Assignment 5:

  1. Refer back to homework assignment 2, in week 3.  Homework assignment 2 asked you to find a data set and perform some manipulations using R.  For this assignment, you can use that same dataset, or select a new one of your choosing and use Tableau to create a visualization.  The assignment requirements are:

    • Go to Tableau.com and download a free trial version of Tableau
    • Use Tableau to create an appropriate visualization for the dataset you selected for homework assignment 2, or another dataset of your choosing.
    • Provide screenshots showing your steps in Tableau (at least 3)
    • Explain how your visualization meets the criteria of being Trustworthy, Accessible, and Elegant (1-3 paragraphs)
    • Explain the story that your visualization should be telling to the viewer (1-3 paragraphs)
    • Compare and contrast your experiences using R versus Tableau.  Which one is more user friendly?  Are there limitations to one versus the other?  (1-3 paragraphs) 

Term Paper on 'Rockwell Automation – Factory Talk (SCADA)'

  It is a term paper.The topic is  ‘Rockwell Automation – Factory Talk (SCADA)’ The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

    The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Must have the following categories

INTRODUCTION

System Overview and Architecture

Market Analysis and Typical Use Case(s)

Major Vulnerability Disclosures

Impact Analysis

Risk Reduction Recommendations

Conclusion

Practical Connection Assignment

course name: Cryptography (ISOL-535-B05)

 

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Cyber Security: Kali Linux Lab

I have a Lab assignment that has to do with Kali Linux. 

Youll have to watch 2 walkthrough videos:

The first video is regarding setting up Kali Linux

The second video is regarding setting up WordPress.

Once you successfully watch the two videos, you will then start the lab. The procedures of the lab are in the attachment section.