The goal of this project is to test your knowledge of the basics of programming structures. More specifically, you will design your own algorithm using both pseudocode and a flowchart. Think of some daily activities that you perform. You are going to prepare a plan and design an algorithm that can be translated into a […]
Archive for the ‘Computer Science’ Category
Network Analogy


In this project, you will write up your own network analogy. The analogy in the lesson used snail mail so you will make your own using some other concept. For example, you could go big as a country or go smaller and use a school, office, your home, or something else. The more creative the […]
Internship Report


Read the word doc answer the question below 1. Introduction to company (what company does) and where you fit who you report to, which department, etc. 2. Business learning objectives to meet or problem that the company was facing description, scope, seriousness, and potential impact of solution. List your Learning Objectives 3. What did you […]
Project with Microsoft word Microsoft Excel and Microsoft PowerPoint


The goal of this project is to demonstrate your ability to use common applications to communicate and store information. Reflect on your projects from Module 1 and 2. Now that you have learned how to use email, web browsers, and productivity software, you can start to apply those skills. First, you will use Microsoft Word […]
Jupyter Notebook (python) assignments


Task 1: using file attached: clothing_store.csv You are given a dataset from a customer – a clothing store chain in New England. Your task is to develop a model that will maximize profits for direct-mail marketing (id est. a model that would identify customers who will respond to a direct-mail marketing promotion, based on information […]
Jupyter Notebook (python) assignments


All must be delievered in Jupyter Notebook format using python (3 Jupyter Notebooks in total): Task 1: using file attached: clothing_store.csv You are given a dataset from a customer – a clothing store chain in New England. Your task is to develop a model that will maximize profits for direct-mail marketing (id est. a model […]
incident response


Background: Incident response and product security are vital for a proper security posture. In the nuclear industry in particular, having a proper incident response could mean the difference between literally life and death, and/or severe economic damage. The same could be said for product security, which one could think of the adage an ounce of […]
Social, Ethical, and Legal Implications of Computing


This is a PRESENTATION/SPEECH paper Research: Discover multiple viewpoints on a topic in ethics, society, or law as it relates to computing or technology. Quality research sources might appear in an academic journal, a reputable newspaper or online publishing platform (NY Times, Wall Street Journal, The Register, Medium.com, TechRadar.com, Youtube.com, etc…), or perhaps blog posts […]
SDN and IBN


Software-defined networking (SDN) and intent-based networking (IBN) offer an ability to revolutionize the modern network architecture. Both concepts are relatively new, and your chief technology officer (CTO) has only heard them in passing. In fact, she pawned them off as the new marketing fad dressed up as a new concept. Since you have researched both […]
Comprehensive Security Plan


Develop a security plan outline for a future final paper for a current organization (cybersecurity/infosec plan) in APA format. Understand your Organizations Strategic plan. Identify and Prioritize assets and risks. Mitigate and Track the impact of prioritized risks. Create a business case for a new investment.