Computer Science Question

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Don’t forget that the grade also includes the quality of writing.

Computer Network and Security

Short questions, do not need to references.
1. Consider a simple network consisting of three devices in a topology: PC – Router – Server. The physical network is constructed using Ethernet, over which an email is being sent, where the email client is located on the PC device and the email server is located on the Server device.
a. Identify the protocol stack used, i.e., identify the protocols at each layer of the TCP/IP model.
b. Consider the operation of the Ethernet and IP protocols at the router. Explain what functionality these protocols provide (if any) and how addressing is used (if relevant). If the protocols do not provide functionality or addressing not relevant, explain why.
c. Consider the use of TCP or UDP for this scenario. If TCP was used, explain why and discuss whether UDP could have been used instead. If UDP was used, explain why and discuss whether TCP could have been used instead.
2. Consider a scenario where a person is using a web browser to access a remote web site where various applications (programs) are stored and retrieved from. There is only a web application firewall installed between the two parties (on the server side).
a. Explain the sequence of messages exchanged between the three different entities when the person issues the initial request to their web browser to upload or download a file, until the final response is received.
b. If malware were to be successfully stored on the server, explain where the malware could be detected if a user were to attempt to download it (what software on what device/s).

c. Briefly discuss whether the use of the web application firewall provides any additional security in this scenario.

Computer Science Question

Assignment:
1. Select a brand that will be the focus of your assignment. Provide a short description of the
brand you selected (no more than 1 slide).
2. Identify attributes that are relevant to your brand you selected. Ensure that all attributes
are categorized appropriately (i.e. functional, experiential, emotional).
3. Provide a rationale for why you selected each attribute/variable and identify if any
variables can be grouped into concepts.
4. Rank all the attributes in terms of what you think is most important.
5. Identify 2 competitive brands and identify attributes that are relevant to those brands. Are
there attributes that are unique to the competitors? If there are no similar attributes,
please explain why that might be the case. If all the attributes are similar, please explain
why that might be the case.
Hint:
1. Select a brand you are very familiar with but is more than just a commodity brand (i.e.
food, personal care products, etc.)
2. The words “concepts” and “attributes” can be used interchangeably
3. Brand attributes are similar to brand personality – thinking of brands as if they were a
person may help you identify relevant attributes. Also remember that no two humans are
alike, even if they are from the same family.
4. Make sure you distinguish between attributes related to the main brand you selected vs
the competition
5. When conducting your competitive analysis, be sure your discussion is related to
competitive attributes. Remember that just because BMW and Mercedes Benz are luxury
vehicles doesn’t mean their attributes are the same.
6. When ranking the importance of attributes, ensure that there be only 1 attribute per
ranked position…meaning that there can only be 1 attribute can be in first place, not two.
7. Nothing in this assignment requires you to conduct online research. When reviewing your
assignment ask yourself, “does my assignment sound like me?” and “would I have written
like this if I hadn’t found the online resource?”.Important Note:
1. Plagiarism will NOT be tolerated
2. All online material must be in your own words. Do not use language found online.
3. All sources must be properly cited (as per APA)
Submission Format
1. The title slide must contain:
a. The Course Title
b. Professor Name
c. Full name (as registered in school) student ID
d. Date
2. The only acceptable format is Microsoft PowerPoint
3. The Marketing Plan must not exceed 20 slides (Excluding title page, table of contents and
appendices).

Computer networks and security

Short answer, do not need to reference.
Consider a simple network consisting of three devices in a topology: PC – Router – Server. The physical network is constructed using Ethernet, over which an email is being sent, where the email client is located on the PC device and the email server is located on the Server device.
a. Identify the protocol stack used, i.e., identify the protocols at each layer of the TCP/IP model.
b. Consider the operation of the Ethernet and IP protocols at the router. Explain what functionality these protocols provide (if any) and how addressing is used (if relevant). If the protocols do not provide functionality or addressing not relevant, explain why.
c. Consider the use of TCP or UDP for this scenario. If TCP was used, explain why and discuss whether UDP could have been used instead. If UDP was used, explain why and discuss whether TCP could have been used instead.

Information technology

Topic : Information Technology uses
and benefits to corporate America
Digital communications provide fast, convenient, and secure way to engage with people inside and outside business with a lots of benefits including but not limited to below. Increase in Flexibility by working round the clock and working from remote locations. A very big amount of costs can be saved on resources and infrastructure by having digital communications available leading to increased profits and revenue with reduced infrastructure costs. The ability to hire proper talents at distinct locations which is much cheaper. Enhances productivity, by more collaborative environment, reduces inactive time.Better customer satisfaction
Based on the topic provided above Complete the below two sections
Indicate the need for future research. (70-words)
State your conclusion. (85-Words)

Need to work cryptography task

Task
A stream cipher uses a LFSR with three units. An attacker captures a ciphertext “0101001010011”. The attacker knows that the first 6 bits of the message are “110001.” Using this information, the attacker defeats this encryption, i.e., he is able to determine the initial seed values (S1, S2 and S3) and Keys (K1, K2 and K3). What are those values? (Points 25)
Calculation Hints:
Remember:
S 1 through S 6 can be computed by XORing 6 bit message with the first 6 bits of ciphertext.Then formulate the following equations for S 4 through S 6 :
S m 1= S m × K m S m-1 × K m-1 …… S 2 × K 2 S 1 × K 1 mod 2
S m 2= S m 1 × K m S m × K m-1 …… S 3 × K 2 S 2 × K 1 mod 2
S m 3= S m 2 × K m S m 1 × K m-1 …… S 4 × K 2 S 3 × K 1 mod 2
Number of units in the shift register determines the value of m.
Many of you may not feel comfortable solving systems of equation. You can apply the following brute force method:
Check, all possible sets of values of K 1, K 2 and K 3 listed in the following table to find out which set satisfies all the above equations (i.e., makes both sides of the equations equal) :
K1
K2
K3
0
0
0
0
0
1
0
1
0
0
1
1
1
0
0
1
0
1
1
1
0
1
1
1
An organization uses same stream cipher key multiple times. An attacker who knows that, captures two ciphertexts C1 and C2 and finds that,
C1⊕C2= 0000101000011101000000110001001100010000000101000000011000000011000010100000100100011011
The attacker also knows that the plaintexts are composed of only English capital letters without any punctuations or space, and that part of the plaintexts contains the word: “PRESIDENT”. He was able to recover both the plaintexts. Show, how. (Points 25)
Please see the attached screenshot

System analysis and design

Research a scholarly paper or professional video on “Agile Modeling and Prototyping” and reflect on only one of the following topics:
“Agile vs Structured”: How is Agile Modeling better or worse than Structurred Methods?
“Agile Types”: What types of Agile Modeling exists and which seems better?
“Prototyping”: How important is Prototyping and when would it be used?

cyperscurity qoustion

Refer to the seven domains of a typical IT infrastructure for this question.
Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
Where does the application or countermeasure belong in the seven domains of a typical IT infrastructure? An application or countermeasure may span two or more domains.
What confidentiality, integrity, and availability (CIA) function(s) does the countermeasure provide?

Computer Science Question

Assignment:Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of the course (System Analysis and Design) have been applied, or could be applied, in a practical manner to your current work environment as a “SOFTWARE DEVELOPER” If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. NO REFERENCE REQUIRED

Computer Science Question

Assignment:Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of the course (System Analysis and Design) have been applied, or could be applied, in a practical manner to your current work environment as a “SOFTWARE DEVELOPER” If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. NO REFERENCE REQUIRED