Discipline: Computer Science

Final ProjectFinal Project

  IT 600 Final Project Guidelines and Rubric Overview IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve and maintain this level of […]

8-2 Short Paper: Deadlock Avoidance8-2 Short Paper: Deadlock Avoidance

Instructions:  During the implementation of its new and improved back-office operating system, Top Secret, Inc. (TSI) finds that the TSI OS lacks mechanisms for the ordered acquisition of synchronization objects. The result is that its web servers are periodically locking up. Systems administrators are perplexed because the systems show all processes are active using the […]

cybersecuritycybersecurity

Cybersecurity principles of IT focus on a set of practices intended to keep a corporate infrastructure secure. These practices include, but are not limited to, system, data, internal, external, and physical security. The principles are designed to prevent unauthorized access or alterations of a corporate environment. By understanding how cybersecurity principles are defined, they can […]

IT policy and strategyIT policy and strategy

  Business Case: London Heathrow Airport Launches BI and Machine Learning to Improve Airfield Management, Predict Passenger Flow, and Transform Airport Security Heathrow airport in London is the second busiest international airport in the world, second only to Dubai international airport in number of airplanes landing and taking off each day and the seventh largest […]

research paperresearch paper

   Topic Human Factors in Cybersecurity: Discuss how the human factor affects Cybersecurity. What is Social Engineering? How does it relate to Psychology? What are some techniques to implement Social Engineering? What are some of the countermeasures to detect/prevent Social Engineering? Is Social Engineering the only way to influence human behavior or are there other […]

unit 3 discussionunit 3 discussion

  The Risks of Miscategorization In discussing risk management and analytics, you should recognize that there is risk inherent simply in the conducting of analytics — especially predictive analytics. What if our predictions are false? What if the data upon which the predictions are based is incomplete or inherently flawed in some way? The purpose […]

Nearest Neighbors for Categorical PredictionNearest Neighbors for Categorical Prediction

  Unit Outcomes: Integrate methods for assessing risks. Prepare a rubric for classifying risk. Report results of risk analysis. Course Outcome: IT528-3: Develop appropriate action plans that address risks. Purpose There are many methods for categorical prediction using principal components. In this Assignment, you will practice one of these — linear discriminant analysis, in R […]

Diversity, Equity, and Inclusion CampaignDiversity, Equity, and Inclusion Campaign

  Scenario You are newly appointed to the communications team for a reputable, multi-faceted philanthropic organization, Momentum for Better. The current task for your team is to create a brand-new campaign that promotes Diversity, Equity, and Inclusion. To kick off this campaign, you have been asked to develop a mood board presentation and written summary that you will present […]