Write a technical report research paper on the current project ( your choice ) of computer science field.

Question Description

It should be the current project of computer science field. The length should be at least 6 page and references should be at least 5 scholar in APA format. I am letting you to choose your own topic so you can do best for me. just remember that it should be specific topic ( cannot be written too broad) about the current computer science project.

please let me know the topic before you start and say why you choose it.

here I have attached an example below.

—————————————————————————————————————————————

An example Technical Report – PDF below from Google Scholar search

https://www.researchgate.net/profile/Swapnil_Kurkute/publication/325199681_Drones_for_Smart_Agriculture_A_Technical_Report/links/5caf2eb3a6fdcc1d498c7329/Drones-for-Smart-Agriculture-A-Technical-Report.pdf

A search in Google for “drones used in agriculture” will find a lot of useful information

Technical Report Outline – minimum for this assignment

Abstract – https://writingcenter.unc.edu/tips-and-tools/abstracts/

Introduction

Literature Survey – https://writingcenter.unc.edu/tips-and-tools/literature-reviews/

Methods and Algorithms (may not be needed for your assignment)

Conclusions and Recommendations

Acknowledgement (may not be needed for your assignment)

References (cannot be more than 4 years old without permission from instructor)

Appendices (illustrations, charts, photos, etc.) (you may have none of these)

Information about citing references and the reference list at the end of the document – use APA format

https://aut.ac.nz.libguides.com/APA6th/intextcitation

https://libguides.lub.lu.se/c.php?g=297505&p=3481511

Provide a reflection of how the knowledge, skills, or theories of Operations Security have been applied in your current work environment

Question Description

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Operations Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Every paragraph written should have evidences like citations

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Two discussions in APA format. Please go through the requirements

Question Description

Discussion 1.

(a)What might an integrated supply chain look like for a financial services company such as an insurance provider or a bank? What are the components of the process? What would the customer relationship management process look like for this same firm?

(b) What, in your opinion, is the difference between a decentralized architecture and a centralized architecture? What is an example of a business decision that would be affected by the choice of architecture?

(c) From your personal experience, what is an example of software as a service? Of BYOD?

References and in-text citations must be APA compliant. The initial post is due on Saturday (6th day), while 2 responses (substantial) to colleagues’ posts are due on Sunday.

Discussion 2.

In Chapter 13, the author states “several practice-oriented agent-based simulation models have been developed that are aimed to support policy making”. Research two of these and discuss them, clarifying how they are “agent-based”, what their game entails, and how they tie into policy-making. You’ll need two references with citations for each reference to do this correctly.

A) Create a new thread. As indicated above, find two examples of agent-based games.

Two discussions. Please read the requirements

Question Description

1.) Question

(a) Consider the brief description of the elastic enterprise. What is an example of a control system that would be critical to manage for success in the elastic enterprise? Why?

(b) What current technologies do you predict will have the most impact on the way work is done?

(c) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years?

References and in-text citations must be APA compliant. The initial post is due on Saturday (6th day), while 2 responses (substantial) to colleagues’ posts are due on Sunday.

2.) Question

Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, select two tools described in chapter 7 from different categories, and describe how these tools could be used to devel

To complete this assignment, you must do the following:

Question Description

Chapter 12 presented the approach Intuit uses to measure the effectiveness of their ERM, and chapter 15 presented the process the City of Edmonton employed to develop and deploy their ERM. You are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. You must use at least 2 paragraphs (of you own words) to justify your answer.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, assume that you are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. You must use at least 2 paragraphs (of you own words) to justify your answer.

write a project about Botnet

Question Description

My topic is Botnets.

Projects:

The projects (optional) will promote independent study in the area of information security. The list of project topics is provided below. Only one student will be assigned per topic. The final allocation of project topics will be done on the ‘first-come-first-served’ basis. The project will be completed as follows:

–10-12 max page long written report submitted no later than Nov. 14 (1.5 line spacing, 11-point font size),

–15-min oral presentation on Nov 14.

The project assessment will be based on the following criteria out of 100 points:

–written report: content (coverage, depth of understanding reflected) – 50 pts

–written report: quality of writing (ease of understanding, structure, syntax, proper citations, reference section, etc.) – 25 pts

–oral presentation (clarity and general understanding) – 25 pts

List of projects: Solely extraction from Google etc. will not gain you any points. However, you must state why it is an asset and/or a vulnerability and what to do about it to improve the state of the art in ubiquitous daily computing. What are the pros and cons in terms of Risk Assessment and Risk Mitigation? Your suggestions.

Project 5 – Create a simple web page (with or without using code)

Question Description

For this project, you will create a simple web page about the San Mateo County College District, which is comprised of College of San Mateo, Cañada College, and Skyline College. You may create the web page without or without using HTML code.

 If you choose to complete the web page without using code, you may use a word processing program (e.g., Word, Pages, Google Docs, etc.) or a web page authoring program. Include the appropriate hyperlinks and bookmarks. A sample layout is provided below.

 If you are going to be using a word processing program to create the web page, you may download the sample (the one provided below is a Word document) and edit it according to the instructions.

 If you are going to use a web authoring program, see the sample mock-up below.

 If you choose to complete the web page using HTML code, you may download the sample provided below and edit it according to the instructions.

Submit the finished product as described below.

I will send the complete information later.

Disaster recovery plans of Jack in the Box food poisoning

Question Description

The 1993 Jack in the Box E. coli outbreak occurred when 732 people were infected with the Escherichia coli O157:H7 bacterium originating from contaminated beef patties.[1][2][3] The outbreak involved 73 Jack in the Box restaurants in California, Idaho, Washington, and Nevada, and has been described as “far and away the most infamous food poison outbreak in contemporary history.”[4][5][6] The majority of the victims were under 10 years old.[7][8] Four children died and 178 other victims were left with permanent injury including kidney and brain damage.

There was a food poisoning in Jack in the box in 1993. we need a paper and power point presentation about the disaster recovery methods followed by the organization and how the overcome the situation

must cover:

APA formatting

12-13 pages (does not include References and Introduction pages)

10 slide PPT

topics should cover according to research Design please find an attachment for that

there also sample copy just for reference.

Complete IT AUDITING TASK (AIU) 2 Pages

Question Description

Library Research Assignment

In conversations with PVSS, you have talked about the long-term strategic goals and plans for expansion. You also know about the rumors of the past, and during an informal conversation with the media content and design manager, the subject of the leaked CD came up. It is obvious that the manager is still upset by the allegations. The topic of fraud came up, and the manager would like to know how this could be tracked if proper controls are in place.

Using the online library, Internet, and all course materials, research fraud and auditing fraud. In a report of 2–3 pages for the manager, complete the following:

  • Describe what fraud is and how it could be conducted.
  • How would an audit attempt to detect that fraud has taken place?
  • Deliberate the previous leak, and offer your opinion about the root cause.
  • Could it be traced back to PVSS? (Note: this is pure speculation on your part.)
  • Play devil’s advocate as both an employee who could have leaked the CD and an auditor in an effort to track and catch the employee.

1. Review the key phases of disaster recovery as outlined in chapter 10 of your textbook .

Question Description

  1. Please review the attached lessons learned from Hurricane Sandy.
  2. 1. Review the key phases of disaster recovery as outlined in chapter 10 of your textbook

    2. Briefly discuss the disaster recovery phases in chapter 10 and their relation to the lessons learned from Hurricane Sandy article. I need to see information systems related planning.

    3. Discuss how you would alter sample plan based on the lessons learned from Hurricane Sandy Article. (Do not give me a copy of the altered plan, simply explain in the paper what you would alter)• Include at least Six (6) reputable sources.
    • Your final paper should be 1,250-to-1,500-words, and written in APA Style.
    ISOL.632.Final.Exam.Article.pdf
    Sample Disaster Recovery Plan.pdf

  3. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.