Archive for the ‘Computer science’ Category


Search the Web for security education and training programs in your area. Keep a list and categorize the types of training offered. Determine the costs associated with each. Is the training general or for a specific security certification? Assess the cost effectiveness of the training both in terms of both time and money.

Assignment Expectations

Describe your results. Put them in a table describing the training program and cost.  You will assess the programs in terms of time, money, and effectiveness.  Summarize with a discussion of the key characteristics for Web security and training programs.

Social Media

1.   What is social media?
2.     What constitutes social media?
3.   Needs of social media in the workplace ?
4.  Explain how Facebook, Twitter, Instagram, pinterest, LinkedIn and YouTube are helpful in the workplace.

5. How to select social media for business?
6.  How does businesses use social media?
Risks associated with employees use social media?

7.  Why are there social media policies?

8. What are the best practices for policy implementation?

The Mobile-Cloud Ecosystem

Go to .

Select any three websites and run the test on all three.

Prepare a 2-3 pages lab report detailing the results of the tests. Your paper should include an introduction and a conclusion. Give specific and in-depth details about the differences between the 4 devices listed. Describe how these devices can work together to create a mobile-cloud ecosystem.

Final Paper


Hello, Class -

You will select an enterprise-level risks that impact an organization of your choice please address the following items:

    Heres the approach you can take for this paper:

  • Title page
  • Introduction provide a background of the selected organization.
  • Risk #1
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #2 
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #3
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Conclusion
  • References (minimum of 8 reputable sources)
  • Appendix (if any)

The paper will range from 15-to-20-pages includes title page, content, and references.

Please write in APA Style.

Comparative Analysis Of Tools And Technologies For Policy-Making

 Each student will write a short research paper for a peer-reviewed research paper that pertains to the "Comparative analysis of Tools and Technologies for policy-making" which must have an abstract(in a separate page), body and conclusion in at least 2pages. This will be a detailed summary of the research paper and what you gained from the research.

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

*All outside sources must be referenced and cited in your paper.  All papers will be reviewed with plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!

Complete Comparative Analysis Between The Internet Of Things (IoT) OS And Robotic Operating System


Write a scholarly research report on a topic related to Software Engineering (see ). Please see and for detailed specifications. 

Appropriate Topics:

The Research Report: 

Select two of the following research areas providing a complete comparative analysis between the two chosen:

i) Cloud Computing (Intranet, Extranet, and Internet)

ii) Robotic Operating System

iii) Internet of Things (IoT) OS

iv) Apple iOS

v) Android

vi) Linux

vii) zOS

viii) BSD

ix) NOS


Important Student Notes:

Each student submission should be checked for plagiarism. Students should be warned that Turnitin has a very good historical memory and is capable of accessing reports from both internal and external resources (i.e. Universities, Governments, etc.) including those originally written in non-English written languag

1 Discussion And Weekly Summary And ASSIGNMENT 7.2 Shr

Assignment 7.2

Review the following and the example outline

Create a comprehensive outline of your final project; it must be an APA formatted style outline. 



Discussion 8.1

In your opinion, when should preemptive measures be taken against terrorists?

Weekly Summary 8.1

Review and summarize the following articles; the summary will be a two-page APA formatted paper.

Writing Requirements

  • Use the APA template located in the  to complete the assignment.

Case Study S Final


  • Select a court case from the "Court Case" section at the end of the text book (Pages 501 -506)   Write a 3 to 4 page paper (not including title and reference page) where you describe the case in detail.  Discuss why the case was important and what precedence it set for future cases.  Why was this case important?  What affect does it have on digital crimes? 
  • Put together a PowerPoint presentation containing 10 to 15 slides that describe the case and highlight the importance of the case. 

Writing Requirements

  • PowerPoint Presentation 10-15 slides
  • 5-7 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least 3 peer-reviewed sources found in the Potomac Library properly cited and referenced and your course textbook.
  • APA format, Use the located in the  to complete the assignment.

CSS Website


For  this assignment, youre going to begin to work on your site.

  • Navigation links that are consistent on all pages
  • At least two folders in your file structure
  • Information about the sites purpose on the home page (named index.html)
  • Images on at least two pages
  • A link to a specific location on one page from a different page
  • Two different lists


  • Add any other pages to your site and adjust the navigational scheme
  • Use of CSS including: 
    • An element selector
    • A class selector
    • An ID selector
    • A pseudo-class selector (try this on your hyperlinks!)
    • Use of float and clear around an image
    • Text-align
  • A form that includes a minimum of: 
    • Five text fields
    • One text area field
    • The use of checkboxes

Ig – 7 Correct One

 textbook - Information Governance: Concepts, Strategies, and Best Practices - Robert F. Smallwood. 



Chapter 14 From the week's chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, its evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. 

Q1: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?