Category: Computer Science

Wireless Communication

Assignment:

– Create a presentation to deliver to the staff of a medical client about WLANs

Submission Instructions:

Your completed essay must be submitted as an MS Word attachment to this assignment no later than Sunday 11:00 PM EST.

Assignments completed in a narrative essay or composition format must follow the citation style cited in the American Psychological Association (APA). Students are encouraged to read/understand the Basics.

Assignment 1 Case Study
You are employed by The Baypoint Group (TBG), a company of 50 consultants that assists organizations and businesses with issues involving network planning, design, implementation,and problem solving. You have recently been hired by TBG to work with one of their new clients, Vincent Medical Center (VMC), a large health care facility, concerning their wireless needs.
Each day, VMC doctors and nurses throughout the facility attend to thousands of patients, update medical records, issue prescriptions, and order medical exams. VMC deployed a sophisticated suite of medical software that stores all patient records, exam results, and diagnoses. The system is also fully integrated with VMC’s pharmacy and can process purchase orders,payments,and receipts as well as inventory and shipments. However,all data entry and processing currently requires that a staff member be at a nursing station or office to access the application and central VMC database.

1. VMC is interested in learning about the possibilities of upgrading all of its infrastructure and deploying a wireless network to allow doctors, nurses, and all staff to access information from anywhere within the entire medical facility (two buildings). VMC does not want to spend money installing additional network cabling connections to every patient room. VMC has asked you to make a presentation to its administrator regarding the use of a WLAN.

Create a presentation to deliver to the staff about WLANs. Be sure to cover the following points:

Greater mobility for doctors and nurses
Ease and cost of installation
Easier network modifications
Increased network reliability
Radio signal interference
Security
Instructions:

Students will submit their assignment as a Word document. Submissions should be submitted in a font and page set-up that is readable and neat. All essays must be prepared in Microsoft Word and uploaded to the appropriate online assignment. Please include your name, course number, week number and assignment name at the top of your submissions e.g. StudentName -ISSC343 Week 1 Case Study.

Surface area and Concentration Lab

you need to do the collision theory gizmo, from gizmo.com, then you need to write a research question and include scientific knowledge. after after that you need to create a hypothesis. then you need to outline the controlled variables, and lastly write down all the information for each trial.

cloud storage

Assignment #3

No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page
1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.

2.  If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)

3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.

Format Requirements

Paper must be double spaced, 11 or 12 pt font and 1 margins all around.
All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information.  These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.
Due Date
Apr 27, 2021 11:59 PM
Hide Rubrics
Rubric Name: 321 Assignment #3 Rubric

This table lists criteria and criteria group names in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method. You can give feedback on each criterion by tabbing to the add feedback buttons in the table.
Criteria   
Exceeds Expectations
Meets Expectations
Approaching Expectations
Below Expectations
Criterion Score
Content
20 points
Student explained clearly and in detail what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed exemplary critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.

Student thoroughly and clearly presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.

Student clearly, and in detail, explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed exemplary critical thinking in this discussion and substantiated their response with more than 2 resources.

Points Available: 18-20

17.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed solid/good critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.

Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.

Student explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed solid/good critical thinking in this discussion and substantiated their response with  2 resources.

Points Available: 16-17.9

15.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud in a limited/incomplete/incorrect manner. Student displayed limited or no critical thinking as evidenced by their response to this question and lack of usage of resources to substantiate their response.

Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so in a limited/incomplete/incorrect manner.  Student’s discussion did not address each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and/or response was limited/incomplete/incorrect. Student used 1 or less resources to substantiate their response.

Student explained less than three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed limited to no critical thinking in this discussion and substantiated their response with  1 or less resources. 

Points Available: 14-15.9

13.9 points
Did not  fulfill  one or more requirements for this assignment.

Points available D: 12-13.9

Points available F: 0 -11.9

Score of Content,/ 20
Format/Grammar/Spelling/Timeliness
10 points
Student followed APA format correctly (Cover page, in text citations and reference page)

Student followed all format directions for this assignment

Student had no more than 1 grammar or spelling error

Student submitted assignment on time

Points available: 9-10

8.9 points
Student mostly used APA format correctly but does have one or more errors (Cover page, in text citations and reference page)

Student mostly followed all format directions for this assignment but has 1 or more errors.

Student submitted assignment on time

Points available: 8-8.9

7.9 points
Student did not follow APA format correctly and has more than one error (Cover page, in text citations and reference page)

Student mostly followed the format directions for this assignment but has more than 2 errors.

Student submitted assignment on time or within 2 days of the deadline passing

Points available: 7-7.9

6.9 points
Did not  fulfill format/grammar/spelling/timeliness expectations for this assignment

Assignment was 5 or more days past due.

Points available D: 6-6.9

Points available F: 0-5.9

Score of Format/Grammar/Spelling/Timeliness,/ 10

Antivirus Software

Write MS-Word documents about one of the cybersecurity tools.

Pick one cybersecurity tool
List down the pros and cons of this cybersecurity tool
Explain how to use this cybersecurity tool
The document can be single-spaced or double-spaced.
No limit on min/max word count.
Your document should not exceed more than 4 pages(excluding the cover page and citation page).
Use proper citation from where your research/information is coming from.
Use any citation style (MLA, APA, Chicago, IEEE, etc.)
Submit your document file as docx, doc, or pdf file.

Application Security

Week 5: Application Security

Testing for an unknown is a virtually impossible task. What makes it possible at all is the concept of testing for categories of previously determined errors. The different categories of errors are:

    buffer overflows (most common);
    code injections;
    privilege errors; and
    cryptographic failures.

Please evaluate the software engineering, secure-code techniques, and the most important rule that relates to defending against a denial-of-service attack. Here are two types of error categories: the failure to include desired functionality and the inclusion of undesired behavior in the code. Testing for the first type of error is relatively easy.

Other items we should understand for error opportunities in applications are related to design, coding, and testing. How do we assure that these items are addressed in our software-application development or acquisition?

Cisco Systems Internet of Things

The objective of this study is to select any strategic business unit from a publicly traded multi-national corporation and to analyze the overall competitive environment including market conditions, evaluate the current growth and new business strategies, along with implications, analyze the organization’s primary business model, evaluate the organization’s competencies and resources, evaluate the leveraging of growth strategies through partnerships and alliances and identify future opportunities for innovation based on past success and failure.

Cisco Systems Firm Strategy and Internal Strengths

Cisco Systems, the self-proclaimed “worldwide leader in networking for the Internet,” has dominated similar firms in its industry. As Wall-Streets’ beloved stock and an essential stock in any investor’s portfolio, with over 35,566 employees worldwide and boasting revenues totaling 22.2 billion in the previous fiscal year the company aims to ensure that networks both public and private operate with maximum performance, security, and flexibility.

Cisco Systems Culture

Cisco is a company that has a high rate of retention on its employees. According to Yves Lermusiaux, in his Recruiting at Cisco, the company’s highest turnover rate in the 90s was 7.3%. In 1999, it only has 6.3% of turnovers. Randall irkwood, Cisco’s Director of Employment, states the following formulas with regards to retaining employees (Lermusiaux, 2000).

Ideation

The focus on the first part of this project is to select a new innovative technology or application concept (something new and not currently on the market) for a specific technology or application that will be developed and ultimately marketed. The new technology or application concept selected for this paper will be used as focus for the remaining written assignments. You will write a 23 page (350 words per page) paper in APA format addressing the following topics below. You should also include as part of this paper any acknowledgements and resources used (e.g., websites, textbooks, articles). Each written assignment should include three or more references.

– Describe the ideation process (e.g. generating, filtering and validating ideas) to come up with a new specific technology or application
-Alternative solutions or concepts considered through the process
– Overview of the technology or application concept selected

Discussion

Use Excel to prove your solution and share your Excel workbook.You will need to add your Excel workbook as an attachment to the discussion. Explain your choice, the steps followed to complete the solution, and any challenges you faced while working on the solution.

Scenario: You are responsible for ensuring payments for your family business are received on time. Create a workbook to show the current date and the due date and use an IF statement to determine if a payment is due.

NOTE: The payment due must be an IF statement and the current date must be a function as well.