support@qualityessayresearch.com

+1(316)4441378

+44-141-628-6690

Archive for the ‘Computer science’ Category

Antivirus Software

Write MS-Word documents about one of the cybersecurity tools.

Pick one cybersecurity tool
List down the pros and cons of this cybersecurity tool
Explain how to use this cybersecurity tool
The document can be single-spaced or double-spaced.
No limit on min/max word count.
Your document should not exceed more than 4 pages(excluding the cover page and citation page).
Use proper citation from where your research/information is coming from.
Use any citation style (MLA, APA, Chicago, IEEE, etc.)
Submit your document file as docx, doc, or pdf file.

Cisco Systems Firm Strategy and Internal Strengths

Cisco Systems, the self-proclaimed "worldwide leader in networking for the Internet," has dominated similar firms in its industry. As Wall-Streets' beloved stock and an essential stock in any investor's portfolio, with over 35,566 employees worldwide and boasting revenues totaling 22.2 billion in the previous fiscal year the company aims to ensure that networks both public and private operate with maximum performance, security, and flexibility.

Ideation

The focus on the first part of this project is to select a new innovative technology or application concept (something new and not currently on the market) for a specific technology or application that will be developed and ultimately marketed. The new technology or application concept selected for this paper will be used as focus for the remaining written assignments. You will write a 23 page (350 words per page) paper in APA format addressing the following topics below. You should also include as part of this paper any acknowledgements and resources used (e.g., websites, textbooks, articles). Each written assignment should include three or more references.

- Describe the ideation process (e.g. generating, filtering and validating ideas) to come up with a new specific technology or application
-Alternative solutions or concepts considered through the process
- Overview of the technology or application concept selected

Discussion

Use Excel to prove your solution and share your Excel workbook.You will need to add your Excel workbook as an attachment to the discussion. Explain your choice, the steps followed to complete the solution, and any challenges you faced while working on the solution.

Scenario: You are responsible for ensuring payments for your family business are received on time. Create a workbook to show the current date and the due date and use an IF statement to determine if a payment is due.

NOTE: The payment due must be an IF statement and the current date must be a function as well.

Finishing MyPaper and creating Jupyter Notebook

Paper instructions:
Here is the Intro and work related sections COMPLETED ( see MyPaper attached). Please finish the rest of the sections so it looks like the sample( See PAPER SAMPLE attached as a reference).


In order to do this: You must create a Jupyter Notebook with detailed comments of why you did what you did with each coding block. See Coding Example attached of similar dataset with different research objectives at the links below:

https://github.com/mrinmaisharma/Online-Retail-Dataset/blob/master/script.ipynb

https://github.com/scheckley/online-retail/blob/master/analysis.ipynb

Note: I want mine to be as simple as possible. I want it just enough to fulfill the research paper objective. Hopefully shows choosing the optimal model out of couple of models.



My research topic:

Using transactions data and machine learning model to predict what a customer is going to purchase on their next visit to the store. This is done using p

Cloud Computing

A paper for the "Technical Writing" course.

TOPIC:
Select a product or a process that is trending in your discipline. This can be a relatively new (last 5 years) process your chosen industry is adopting, or a relatively new technology your industry is adopting.

I choose: CLOUD COMPUTING

Do the following:

1. Find three reliable, credible sources on that topic. [VERY IMPORTANCE for GRADE]
    You have to provide "A full-text copy of the article"

2. Write a brief paper (2 pages) that described your product or process, and then analyzes each of your sources and explains why it is a credible, reliable source based on our lecture.

3. Include in text citations in the body where necessary and create a works cited list at the end of the document, listing your sources in proper format.

***Avoid plagiarism

information technology

Please respond to the following:

Low-fidelity prototypes are mainly used to conduct research on a product and are not integrated into the final product, while high-fidelity prototypes may evolve into a final product. Compare and contrast the final product that evolves from a high-fidelity product and a product built from the ground up after studying and learning from a low-fidelity prototype. Provide one example of each type of product to support your response.

Information Technology

As it stands now, your company "Real Estate, Real Cheap" (or RERC) has 25 users and computers with some smart devices brought in by employees for work use. In the future, your boss hopes to expand the company greatly and maybe bring in up to 150 employees with computers for each and more room for more smart devices. Right now, you have a Windows 2016 domain and all the PCs that user have are clients in the domain. The boss tells you that you need to plan for everything happening within 612 months, but she wants the domain intact, just expanded for more clients and users.

What are some Active Directory (AD) issues you would consider that will make this upgrade possible?

Intro to Computers

Business Consulting

Remember Bill? He was the gentleman that you helped to start up his business in Lesson 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Bills questions and concerns are as follows:

Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:



Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for each day?
What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
Print the word Yes in any row where the total daily expenses are gr

Remote Access Policy

Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies.
MY SPECIFIC POLICY IS "REMOTE ACCESS POLICY"

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management's expectations).
After the scope has been defined, research the various components, and create an appropriate policy.
Prepare a Word document of 2-3 pages (excluding title page, abstract, and references page) that includes the network security policy for an organization that address