+1(316)4441378

+44-141-628-6690


Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in /home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line 47
Archive for the ‘Computer science’
Warning: Use of undefined constant woothemes - assumed 'woothemes' (this will throw an Error in a future version of PHP) in /home/admin/web/qualityessayresearch.com/public_html/wp-content/themes/cushy/archive.php on line 47
Category

Any topic (writer’s choice)

This is the link to the paper: https://arxiv.org/pdf/1602.04938.pdf
After you read the paper you will summarize the paper in 1000 words.
While summarizing the paper you should be answering few questions throughout your summary.
1.    What is the problem?
2.    Why is it interesting and important?
3.    Why is it hard? (E.g., why do naive approaches fail?)
4.    Why hasn't it been solved before? (Or, what's wrong with previous proposed solutions? How does this differ?)
5.    What are the key components of the approach and results? Also include any specific limitations.
6.    Can you think of counterexamples for examples given?
7.    Is the approach clearly described? Can you outline the steps or summarize the approach?
8.    Does the work address the problem stated earlier in the paper? How?
9.    Does the approach se

Ethical Hacking – Reconnaissance and Scanning Plans

Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group's systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook's systems.

As you are developing the Scanning Plan, keep these questions in mind:

How would you detect active systems?
How would you determine the best attack vector you wish to exploit?
How would you prioritize different targets of opportunity?
What tools would you be using for scanning and enumeration of systems and vulnerabilities?
Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems.

Use the Reconnaissance and Scanning plans templa

Demonstrate the ability to migrate a project from theoretical planning to practical application. Analyze the software implementation process Create a database with integrity constraints based on an ER diagram Develop and load a test data set into a databa




Discussion: Building an Operational System

You are about to begin the actual hands-on project development. Transitioning from system design to building an operational system is a big step.

To prepare for this Discussion, review the Case Study description, material from previous Units, and the Learning Resources. Think about the different elements of software development and decide which ones are likely to be the most critical for this project.

Accelerating Virtual Team Performance

Describe the term performance boosters (PB) below and how it relates to a Virtual Teams.
PB1: Provide Coaching and Support
PB2: Gain Team Members Commitment
PB3: Recognize Team Members Contributions
PB4: Hold Team Members Accountable

In terms of Virtual Team, discuss the following accountability information below and provide examples
-Past: What could I have done to prevent the problem? What, if anything, did I do that might possibly have contributed to the problem?
-Present: What can I do NOW to get on track?
-Future: What can I do to prevent this problem from happening again in the future

Technical Writing

Code of Conduct Memo: Revision
Overview
You are a manager at a call center. The company frowns upon phone calls and texting during work hours. You have looked the other way a few times, but it has started to get out of hand. You need to write a memo reminding everyone that private phone and text message use on company time is viewed as a violation of the companys code of ethics.

Rewrite your earlier Code of Conduct Memo: Draft assignment utilizing the professors feedback on organization, format, tone, and editorial issues. Review the example memo in the textbook before submission.

Instructions
Ensure the memo is clear and brief.
Choose the language to match the purpose and tone for the situation and audience.
Format the memo accurately and according to the details in the textbook.
Create an effective opening that establishes goodwill without obscuring the message.
This course requires the use of Strayer Writing Standards. For assistance and informatio

Why do you want to join Adobe Digital Academy?

Q5: How have your identity and personal life experiences affected your career trajectory

Q6: Tell us about how you plan to financially get through this intensive program (12 weeks in class, all day every day, plus job seeking once the course ends.) [Word Limit: 100 words] 
Hint: I would attend data science meetups, leverage my linkedin contacts and apply to job openings.

Q7: Where do you see yourself 6 months after the program ends? Are you interested in moving forward with the Adobe internship portion of the Adobe Digital Academy? [Word Limit: 75 words] 
Hint: I am interested in moving forward with the Adobe internship portion of the Adobe Digital Academy.

Helpful links:  
https://generalassemb.ly/how-we-work/social-impact/adobe-digital-academy
https://www.adobe.com/diversity/strategy/candidates/digital-academy.html

ar/vr Expeditions

Part 1

Download the Google Expeditions app on your phone or tablet
Google Play Store: https://play.google.com/store/apps/details?id=com.google.vr.expeditions&hl=en_US&gl=US
Apple App Store: https://apps.apple.com/us/app/expeditions/id1131711060
Choose one (1) AR expediton and one (1) VR expedition
Which expeditions did you choose and why?
How did the two expeditions differ? Was one a better experience than the other?
Can you see this as being a replacement for in person class instruction? If not, what needs to be done to make it a replacement?

Part 2

Create your own AR or VR tour!
Full instructions are here: https://support.google.com/edu/expeditions/answer/9005385?hl=en
The content can be anything you'd like.
Tours should be at least 2.5 minutes long and have at least 3 scenes.
Share a link to your tour so the class can try it out.
Did you find this tool easy or hard to use?
Do you see any value in creating AR or VR ex

How does the University of Chicago, as you know it now, satisfy your desire for a particular kind of learning, community, and future? Please address with some specificity your own wishes and how they relate to UChicago.

I am applying at U of Chicago in the computer science program. My activities have revolved around CS with multiple CD courses, summer camps, website development, coding club, hackathon and two summers of internship in Contiq, a Bay area content intelligence startup. I have interest in AI and machine learning.

Here are some additional details re my Contiq experience...

I interned with Contiq, a Silicon Valley based enterprise content intelligence startup, during the last two summers. Contiq uses artificial intelligence to discover and reuse the most impactful PowerPoint and PDF content at the micro level to boost productivity, quality, and impact.

My trepidation of being the only tenth grade intern, with whatever Java and Python skills I carried, in a high velocity startup was quickly dispelled with a warm welcome from the Contiq team. I was assigned a mentor, who patiently walked me through the intricacies of the design thinking, technology concepts such as RESTf

Ethnic

Question 1

Some computer system failures can lead to significant economic problems. For example, there have been numerous cases in which payment processing systems have been compromised and credit card information is stolen. Should the vendors of these systems be held liable for the financial losses when their systems failed? Why?



Question 2

Scenario: You work for a relatively small software development company. The company was hired by a marketing firm to develop a custom software system that will be used for mass data collection and analysis. The system has already been designed and is into the implementation stage. The former project manager left the company and you have recently been assigned to the team to take their place. The purpose of the system is to facilitate targeted marketing by collecting data about consumer's purchasing behavior and connecting it with information about their identifying information, demographics, income, hobbies, interests,

Incident Response

Begin your first half of the plan by focusing on the environmental conditions and coordination mechanisms. Include:
1.    roles and responsibilities
2.    phases of incident response
3.    scenarioprovide an incident response plan in the case of distributed data exfiltration attacks, specifically the case of loss of communications
4.    activities, authorities pertaining to roles and responsibilities
5.    triggering conditions for actions
6.    triggering conditions for closure
7.    reports and products throughout the incident response activity
8.    tools, techniques, and technologies
9.    communications paths and parties involved
10.    coordination paths and parties involved
11.    external partners and stakeholders, and their place in the coordination and communication paths
12.&nb