Computer Science Homework Help

Embry Riddle Aeronautical University Effective Cybersecurity Programs Discussion

 

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks. Your approach here should be to seek out scholarly source data relating to examples of the various cybersecurity measures that top management and IT departments might provide for employees and contractors, including data access enforcement, network intrusion detection and prevention systems, and real-time responses to incidents and attacks. You could focus your research on any one of the various types of defenses such as anti-malware applications, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), biometric access, rogue app monitoring, mobile kill switch, or remote wipe capability technologies.Use the APA Style template as a guide for completing this assignment. Delete the notes and fill in the template with your data.

Computer Science Homework Help

NTNU Multimedia Networking Real Time Protocol Explanations to Questions

 

Hello, I need explanations to the answers of this exercise. I have both the original questions and the solution attached. I will paste the questions below as well:

—-

In
this application, the sender uses normal RTP and transmits
G.722-encoded voice at 48 Kbps. The application collects encoded data
in 16 millisecond chunks.

Question
1.
What
is the rate at which data is generated at the sender (in bytes)?

Question
2.
What
is the size of the IP datagrams sent? You must clearly show the steps
in how you calculated your answer and what elements the datagram
consists of.

Question
3.

Explain how an arbitrary RTP packet in the application will look
like. Use actual values from the application when possible. Include
the size of the fields and elements of the packet.

Loss
recovery schemes can be used to preserve acceptable audio quality in
the presence of packet loss. We will focus on three types of loss
anticipation schemes: forward error correction (FEC) with redundant
encoded chunks, FEC with redundant lower-resolution audio stream, and
interleaving.

Question
4.
For
each of the three schemes listed in the previous paragraph, show how
much additional bandwidth each of them require of our application.
For the first type of FEC, suppose a redundant chunk is generated for
every five original chunks. For the other type, suppose GSM is used
for the low-bit rate encoded stream. For each scheme, include both
the new transmission rate and the percentage increase.

Question
5.
For
each of the three schemes, explain what happens if the first packet
is lost in every group of five packets. Which scheme will have the
better audio quality?

Question
6.
Make
an illustration of the scenario in question 5 for FEC with redundant
encoded chunks. Use the same n value as before. The figure should be
made such that it’s clear that you understand how the scheme works.

Question
7.
For
each of the three schemes, explain what happens if the first packet
is lost in every group of two packets. Which scheme will have the
better audio quality?

Question
8.
Make
an illustration of the scenario in question 7 for FEC with redundant
lower-resolution audio stream.
The
figure should be made such that it’s clear that the student
understands how the scheme works.

Question
9.
For
each of the FEC schemes, how much playback delay does each scheme
add? What can be said about the delay of the interleaving scheme?

Computer Science Homework Help

MIS 6211 UA WK 2 Database Architectures & Zachman Framework Ess Ay

 

WK 2, MIS6211

PART I

TASKS

Study the Zachman framework for enterprise data architecture and describe in specific terms how you would apply that framework to your case study. Since each of you has defined an individual case study topic, you may want to provide a brief overview of your application with your analysis.

Note: To support your work, use your course and text readings and also use the South University Online Library. As in all assignments, cite your sources in your work and provide references for the citations in APA format.

  • PART II

  • Analysis

    This week, as you continue with the data modeling and data governance analysis for your case study, you will perform the following tasks:

    • Start with your EER model from Week 1 and now map your model to a logical database design. Ensure that your logical database is normalized per the forms 1NF, 2NF, 3NF, and BCNF.
    • Research the data types used in DBMS products, such as Oracle, Microsoft SQL Server, IBM DB2, MySQL, or Microsoft Access, and specify data types for all the attributes in your database. Discuss physical design decisions you might consider to arrive at a practical physical database for your case study. For extra credit, you may want to implement your database in Microsoft Access and include screenshots to demonstrate that you implemented this part.
    • Produce a technical plan that addresses the data architecture management function for data governance of your case study.

    Submission Details:

    • Save your work in approximately 5-7 pages in a Microsoft Word document.

Computer Science Homework Help

UC Essential User Access Policies in Healthcare Report

 

You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII). Your organization needs to create user access policies and provide them to its employees.

Sean, your manager, asks you to write a report detailing relevant user access policies. He needs you to research a generic template and use that as a starting point from which to move forward.

For this assignment:

  1. Research existing policy templates and examples from organizations of a similar type.
  2. Write a report detailing at least three relevant user access policies based on your research.
    • Create a table for the policies.
    • Include a short summary explaining why you chose the policies.

Computer Science Homework Help

Challenges of Internet as A Tool for Teenagers Annotated Bibliography

 

I’m working on a computer science project and need support to help me study.

I have attached my 1st draft project paper, requires to continue on the same topic.

This is Part 2 of 4 towards the Final Paper. Using APA format, find at least 10 or more peer-reviewed sources (from industry articles, journals, academic and professional textbooks, and case studies) which will support your selected and pre-approved Research Paper Topic. Include them as references in APA format, write a summary of each article considered. At the end of your summary indicate the usefulness of the article in support of your Final Project Paper. Remember, that within this Final Project Paper you will need to cite from each and every source in your references. You may not use Wikipedia or Webopedia as a reference. The Final Project must be a research paper using statistical techniques that has been approved by the instructor, using knowledge gained in the course. Note: An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief (usually about 150 words) descriptive and evaluative paragraph, the annotation. The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited Steps to Creating an Annotated Bibliography 1. Find sources related to your topic (check with your instructor to confirm which types of sources are acceptable for the assignment) 2. Critically read and evaluate sources. 3. Create the proper APA citation. 4. Below the citation write your annotation

References for format of the Annotated Bibliography.

https://owl.purdue.edu/owl/general_writing/common_…

Computer Science Homework Help

Data Security Solutions Critical Thinking Questions

 

I’m working on a cyber security writing question and need support to help me study.

the requirements of the CT is as following:

Identify an organization who have had ethical issues that affected their operations and stakeholders.

Briefly describe both organizations and then answer these questions for each:

What were the ethical issues?

Who was responsible for the issues?

How were the issues addressed?

What stakeholders were impacted?

What was the impact on the organization and its stakeholders?

How did the organization address the issues?

Computer Science Homework Help

Georgia Institute of Technology Mod 4 Operating Systems Software Discussion

 

IoT developers often use Linux more than any other operating system to run their Internet of Things devices. In a 2018 survey, IoT developers say they use Linux more than any other operating system to run their Internet of Things devices. What are the next two or three popular choices? Why are developers choosing one over another? Search the Internet to research your response and explain to the class.

Computer Science Homework Help

Cyber Security Synopsis that Summarizes the Current Event Research Paper

 

https://thehackernews.com/2021/05/ransomware-cyber…

Students will research cybersecurity related news and identify a current event (from the past 6 months) that is related to a cybersecurity topic covered in this course. After identifying a current event, students will write up a detailed synopsis of the current event and provide their opinion on the important business implications (or the “So what? Who cares?”). The audience of your current event is Sr. Level Management (e.g. Vice President of company, CEO, etc) and should be tailored as such.

Submission Details:

  • The Assignment will have two clearly labeled parts:
    • Part 1: Students must provide a detailed synopsis that summarizes the current event, including identifying key issues or concerns. Page length: At least ONE (1) full page.
    • Part 2: Students must provide a comprehensive opinion on the business implications of this current event. For example, what should a company start doing? Stop doing? What is the “so what, who cares?” response to the current event? Page length: Approximately three (2) pages.
  • Assignments must be in a professional format with the students name clearly designated on the document.
  • Font size should be NO LARGER THAN 12 point.
  • All margins one (1) Inch.
  • Double Spaced.
  • References must be properly cited using APA style.