Discipline: Computer Science

SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE

Business case:  Bule Sky Airport  ( third improvement)  As an IT Manager, you were tasked to improve the performance of the local Airport’s (Bule Sky Airport ) Passenger Processing system.  This is to make the Airport more efficient and more secure.  There are three databases in the Bule Sky Airport Passenger Processing IT system : 1-Passenger database will […]

2-3-4 tree code with insertion and deletion in JAVA2-3-4 tree code with insertion and deletion in JAVA

1. Task Trace the operation of a 2-3-4 Tree (The instructor’s correct way) given the following operations: insert(47) insert(43) insert(23) insert(90) insert(95) insert(27) insert(67) insert(80) insert(88) insert(29) insert(59) insert(24) insert(69) insert(44) insert(71) insert(61) insert(99) insert(42) insert(38) Next, Delete the following items sequentially. delete(27) delete(38) delete(44) delete(95) delete(88) delete(59) Starting with an empty tree, perform the […]

CIS 222 8 FinalCIS 222 8 Final

 The security program has been a huge success. Several of the PCS government clients have expressed their appreciation and increased confidence in the company’s ability to protect their program data and assets. Your company is now in the continuous monitoring phase and your information security analysts are performing routine assessments on the servers and workstations.Based […]

CIS 222 8.2 DBCIS 222 8.2 DB

 1 page  After having the opportunity to complete the course, what would you change and why? What topic particularly caught your interest and what do you want to know more about?  Last, but not least, if you could share with the next class one piece of advice about this class, what would it be? Please […]

Unit 8.1 DB: OS HardeningUnit 8.1 DB: OS Hardening

 1 page  You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is […]

CIS 213 Final DiscussionCIS 213 Final Discussion

 1 page  After having the opportunity to complete the course, what would you change and why? What topic particularly caught your interest and what do you want to know more about?  Last, but not least, if you could share with the next class one piece of advice about this class, what would it be? Please […]

DB 8 Project RiskDB 8 Project Risk

 In two to three paragraphs, how is project risk analyzed and why does it need to be managed? Use examples from personal experience, the readings, or your own research to justify your answers. Cite all sources. Please make sure to respond to one student after you make your initial post by the due date. 

what have researchers learned about the impact of misinformation about COVID 19 on social mediawhat have researchers learned about the impact of misinformation about COVID 19 on social media

Objective summary  choose 4 research articles for this topic  In Class: You learned about the W(5) H(1) and completed Phase 2 on p. 13a of your Final ‘Mission’ Packet (Found in W. 4’s HW). This will be IMPORTANT for Week 6 so you MUST complete this before our next meeting. These notes will also help you with […]

network security layersnetwork security layers

 there are alternatives to passwords. Passwords are considered by many to be insecure and easy to break. So what are the alternative and how are they better? For this discussion you will research alternative to traditional password that are created by users. Choose an article and summarize your chosen alternative method of authentication. Do you […]