Create a new discussion topic on or before the due date in the Course Syllabus. Post your response to the main topic. Your response should be a minimum of 150 words.

Textbook: Computer Science Illuminated Nell Dale; John Lewis

Listed below are topic(s) for each of you to discuss throughout the week. Refer to the textbook, weekly materials, and/or the GMC library when researching the topics for this Discussion Forum. Put your writing into your own words, do not copy directly from the source. If you incorporate external resources (http://gmcga.libguides.com/periodicals) in your posts be sure to cite (https://gmcga.libguides.com/citationmanagement/APA7th) them properly. Lastly, review how to paraphrase and quote resources before you begin posting (http://gmcga.libguides.com/c.php?g=458&p=996448).

Chapter 6 and 7 discuss pseudocode as a way to express algorithms in a clear and unambiguous format. After an algorithm is written, it is important to work through it and test it for correctness. Discuss the importance of correctness in an algorithm as well as the difference between correctly solving the problem and solving the correct problem. What are some of the implications to businesses in using algorithms that are incorrect? In Chapter 6.6 section, Testing, it is stated that programming errors are a fact of life. Discuss some methods that you think might be the most helpful when testing programs to prevent programming errors. Keep in mind that some errors can be quite costly, so finding and correcting the errors is an important aspect of program design.

Chapter 7 begins with a discussion of George Polya’s book about how to solve mathematical problems and how that can be applied to solving all types of problems. The first step in the list of solving problems is to understand the problem. Discuss why you think it is so important to understand the problem as a first step in solving problems. Discuss some of the issues that can result from not fully understanding the problem to be solved and some steps that can be taken to better understand the problem.

Task 1: Create a new discussion topic on or before the due date in the Course Syllabus -‘ Course Schedule by clicking the ”**REPLY HERE**” post below. In your reply, you will post your response to the main topic. Your response should be a minimum of 150 words. Going over the minimum word length requirement is acceptable; however, I am not looking for 500+ words!

What are the benefits of virtualization in a cloud environment? Discuss a minimum of three benefits in detail.

Cloud Virtualization

What are the benefits of virtualization in a cloud environment? Discuss a minimum of three benefits in detail.

Why we need to use circular implementation in queues? How circular implementation works in queues? Show the queue state after each of the following operations with updating F & B as needed.

stack1

Create a Java program that adds the numbers 1 through 50 to a stack called stack1.Then perform the following:

  • Finds all the odd numbers from stack1.Then, push them into a new stack named stack 2.
  • Find and print the prime numbers from stack2.

[Note: Provide a screenshot of your code output].

 

Question two

Consider the following initial state of a queue implemented using a circular array. Where F for “front” and B for “back” are shown on the queue.

 

              101 102  
              F B  

Answer the following:

  • Why we need to use circular implementation in queues?
  • How circular implementation works in queues?
  • Show the queue state after each of the following operations with updating F & B as needed:
  • enqueue(103)
                   
                   
  • enqueue(104)
                   
                   
  • dequeue
                   
                   

 

  • enqueue(105)
                   
                   

 

Question Three

Write the pre-order, in-order and post-order traversals of the following binary search tree:

Question Two

Draw the binary search tree if the pre-order traversals of that binary search tree is given as below:

Pre-order traversal: 7, 4, 2, 3, 6, 5, 12, 9, 8, 11, 19, 15, 20

 

 

 

Follow the guidelines for preparing a summary for the research paper.

Computer Science Article Summary

The the research paper is under a software engineering subject.

Follow the guidelines for preparing a summary for the research paper:

  1. The summary should be at least 1000 words.
  2. The summary should be in your own words.
  3. The summary contains only the ideas of the original text.

 

Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.

Computer networks

Question One

Explain the structure of an ethernet frame and how encapsulation occurs.

Question Two

A host PP on an ethernet LAN network would like to connect to host RR on the same network. Demonstrate the steps PP would take during medium access including the possibility of collision.

Question Three

Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.

Question Four

A switch is referred to as more intelligent than a hub. Briefly define this statement and explain the concepts broadcast domain and collision domain in relation these two devices.

 

 

Write an essay on how to increase the protection of the VPN Process – utilizing apps or platforms with end-to-end encryption.

Virtual Private Network

1. History and development of the internet + (Intro into the purpose of the paper) – i.e touch briefly on the educational benefits.

  • 1.1 LAN
  • 1.2 PAN
  • 1.3 WAN
  • 1.4 IEEE 802.11

OVERALL PAPER INFORMATION

Research Project Proposal

1) Introduce 1~2 important news articles about your research topic. Provide a summary of the article.

    • https://www.spiceworks.com/collaboration/remote-support/guest-article/how-to-improve-your-vpn-speeds/
    • https://www.torproject.org/
    • https://cybernews.com/privacy/what-is-tor-and-how-does-it-work/

 

  • https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/
  • https://www.byos.io/blog/the-problem-with-vpns

This article touches on some of the problems with VPNs. This article addresses several methods malicious attackers can utilize to exploit VPNs and take hold of private information. For example, attackers can attack devices on a network by using a method known as pivoting, which allows them to bypass security measures such as firewalls. Although there are benefits to using a VPN service, research should be done into the service one plans to utilize.

https://www.zdnet.com/article/this-vpn-service-used-by-ransomware-gangs-was-just-taken-down-by-police/

This article showcases how underground VPNs can be a gateway for malicious attackers. These VPN providers can have access to private information from users which can often lead to detrimental consequences when fallen into the wrong hands. It’s always important to check the company’s privacy policies again before registering for the service. If the service provider doesn’t make this obvious right away, you might need to look at reviews for an answer. Sometimes a cheap VPN is preferred over a free VPN that won’t provide adequate security. Ultimately the company one ops to utilize should be reviewed.

 

2) Provide 1~2 reasons why you think this topic is important.

Although VPNs are frequently used to protect against hackers and snoopers on public networks, when used efficiently, they can also be helpful for concealing your IP address, browsing history, and other personal information on any Wi-Fi network, including at home.

VPNs can potentially expose entire networks to threats like distributed denial-of-service (DDoS), sniffing, and spoofing attacks.

3) Address 2~3 possible research goals (e.g., This research project will introduce the strengths and weaknesses of various biometric methods.)

How to strengthen the connection while connected to a VPN.

How to increase the protection of the VPN Process – utilizing apps or platforms with end-to-end encryption. (“The next step up” in terms of anonymity → “Tor” – Although it provides a means for greater anonymity, the connection is slow)

4) Provide 2~3 expected educational benefits for audiences.

Learning their ability to access resources anonymously, especially in regions where these resources can be restricted.
Provides a pathway for people to use to remotely transfer data between users. VPNs allow users to send encrypted data via private servers to prevent information from being leaked to unauthorized users.
It’s crucial to maintain reasonable expectations for your online activity even while you look for the best privacy protection options. It is important to be particular when it comes to the use of VPN services. Adequate research into the service should always be done despite advertisements.

 

Group (5) Draft Outline
Group members: Elijah Austin-Clarke, Sheena Belton – Sections 1.0-1.4, Jaden Pierre – Sections 2.0-2.3.1, Jimmy Aguilar, Marcus Arne Sections – 3.0- 3.1.3.2, Zachary Steinmetz

1. History and development of the internet + (Intro into purpose of the paper) – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1.5 TCP/IP Protocol

2. History and development of VPNs

2.1 Point-to-Point Tunneling Protocol (PPTP)

2.2 User Datagram Protocol (UDP) *UDP control vs TCP control comparison*

2.2.1 Pivoting (endpoint)

2.3.0 Sniffing (endpoint)

2.3.1 Zombie Networks (reference case involving Zombie Botnet)

3. Choosing the most reliable service (really depends on the user’s needs, emailing, gaming, web surfing, etc…)

3.1 Server Location

3.1.1 VPN Protocols (OpenVPN protocol, etc…)

3.1.2 Wired vs Wireless

3.2.1 End-to-End Encryption

4. Applications and Adoption

4.1 Filtering (Parental Control Filtering, etc..)

4.2 The Tor System (even with the Tor system utilizing a different system which gives more anonymity, it however provides a slower service)

4.3 Future of VPNs (VPN use within the workforce, etc…) + Summary

Discuss the digital divide in terms of access to computers and other digital devices as well as the Internet and telecommunication infrastructures. Discuss the purpose of the ICT Development Index (IDI) in relation to the digital divide.

Digital Divide

Listed below are topic(s) that you are to discuss throughout the week. Refer to the textbook, weekly materials, and/or the GMC library when researching the topics for this Discussion Forum. Put your writing into your own words, do not copy directly from the source. If you incorporate external resources

(http://gmcga.libguides.com/periodicals)

in your posts be sure to cite

(https://gmcga.libguides.com/citationmanagement/APA7th) them properly. Lastly, review how to paraphrase and quote resources before you begin posting (http://gmcga.libguides.com/c.php?g=458&p=996448).

Discuss the digital divide in terms of access to computers and other digital devices as well as the Internet and telecommunication infrastructures. Discuss the purpose of the ICT Development Index (IDI) in relation to the digital divide. What are some of the social concerns related to the digital divide and how are these being resolved? What are your thoughts on the digital divide in your community and how it is being resolved?

Consider that you are in the market to purchase a new computer. Research to find several computers that will meet your needs currently and into the future a few years. Discuss some of the specifications and components that will be required in the computer that you purchase. Describe the computer that you selected and the reasons for your selection as the best computer to meet your needs.

Task 1: Create a new discussion topic on or before the due date in the Course Syllabus -> Course Schedule by clicking the ‘**REPLY HERE**’ post below. In your reply, you will post your response to the main topic. Your response should be a minimum of 150 words. Going over the minimum word length requirement is acceptable; however, I am not looking for 500+ words!

Discuss the layers of a computing system to list and briefly describe each layer. What is the importance of these combined layers? Discuss how the early history of computing hardware differs from the several generations that followed in terms of the focus.

For the Week 1 Exercises, you will complete and submit the following items. Chapter 1 (Computer Science Illuminated by Dale, Nell, Lewis, John)

In Chapter 1 we look at the big picture of computing by learning about the layers of computing and how each layer will be covered in the book, which is where we start to focus in this exercise. We cover the history of computing hardware from the early history and progress through the generations to see the changes over time, we then focus on software history from machine language through the fifth generation to present. Finally, we cover computing as a discipline to determine and the skills needed by practitioners. You will show your knowledge of the topics by answering the following questions.

Discuss the layers of a computing system to list and briefly describe each layer. What is the importance of these combined layers?
Discuss how the early history of computing hardware differs from the several generations that followed in terms of the focus.
Discuss computer software history in terms of the generations and the years that encompassed the generations. Consider how writing programs progressed with each generation as compared to writing in machine code in the first-generation.
When considering computing as a discipline, determine and briefly describe the four areas in which Peter Denning states each practitioner must be skilled.
Chapter 5 (Computer Science Illuminated by Dale, Nell, Lewis, John)

In Chapter 5 we focus on computing components and the von Neumann architecture that is still used in computers today. You will show your knowledge of the topics by answering the following questions.

Describe the stored program concept and discuss the importance of this concept. List and briefly describe the five components of the von Neumann architecture.
Describe embedded systems and provide two examples of embedded systems within systems that you use.
Discuss the importance of parallel architectures and list the four general forms of parallel computing.

Provide the main points, including the client’s name/industry, the product/service used, and quick result stats. State the problem/goal, consequences, and any hesitations the customer had. Describe the results and the benefits, as well as any bonus benefits that came of it.

Case # 1 –Corporation is unprepared for what is coming – but believed they were okay.

A manufacturer/distributor must upgrade their software to satisfy their business and client needs, or they will unavoidably fail. Upon examination, we find infrastructures are inadequate, and inner resources do not allow this change. Additional, because of their cash position, they cannot fund the lowest requirements for a new enterprise solution.

What are they supposed to do?

They must retrench and reconstruct quickly in as cost-effective manner. To serve their requirements, they must substitute all servers, operating systems, upgrade the network architecture, PCs, printers, improve their internet connection, rise network bandwidth, install wireless networking, protect their data backups, email SPAM control, implement security firewall,. i.e.: upgrade it all! What was believed to be a software spend of $35-$55K derived to be an enterprise spend of $160-$260K, and excluding the software.

It is avoidable with proactive budgeted enterprise management. You cannot permit your business to fail because systems are out of reach.

Case # 2 – Corporation is prepared to spend – but don’t know enough to execute properly.

When we encounter a client that has the financial capitals but not sufficient technical resources to deply today’s enterprise systems, we are prepared to contribute in hiring, raining, and support. The trick is the cost of these resources is high, and availability is inadequate. Businesses in a sound financial situation must also know they have resource necessities to consider while taking on a up-to-date solution. It is not for the reason that systems are complex it is because infrastructure and user requirements have raised.

For example:

Today is a extremely competitive and combative environment. Let’s look at some factors disturbing these pieces. Global rivalry is all the rage. China pays its employees $0.50/hour. Without the complete best systems, technologies, implementation, integration, utilization, cost-controls, security of the enterprise, accuracy in data, dedication to continuous monitoring and decision support tools, our businesses will flop and feel like they could do nothing about it.

We have, today the absolute utmost robust and reliable tools a little generation of business has ever seen. We can perform our business from a mobile phone from the inside of the Desert. If we can do this, the remaining is a matter of application.

Note: the above mentioned case study is just an example, students are supposed to find a separate case study.

 

Noted :Choose the application Netflixs as case study.

Learning Outcome(s): CLO1: Explain the interdisciplinary concepts, theories, and trends in ES and their role in supporting business operations.

 

Question One

  1. Your first task is to select a case study (from real-world or using internet). It can be related to enterprise systems or related to an organization/store or on any relevant topic.
  2. After selecting the case study describe it in your own words using following points.

a.Clear headline: It should give the most important information.

b.Snapshot: Provide the main points, including the client’s name/industry, the product/service used, and quick result stats.

c.Client introduction: One or two sentences describing the customer and a highlight about them.

d.Problem: State the problem/goal, consequences, and any hesitations the customer had. Include quotes.

e.Solution: Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes.

f.Results: Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.

g.Conclusion: Share additional praise from the customer and words of advice they have for other people/businesses like them.

Learning Outcome(s): CLO4: Design ES architectural models for various business processes.

Question Two

Model (As-Is) process using BPMN 2.0 using any tool such as Visio. Then analyze As-Is process from atleast two perspectives. Forexample, if quality and time perspectives are taken then mention at least 1 issue related to quality and 1 issue related to time in the process.

Case # 1 –Corporation is unprepared for what is coming – but believed they were okay.

A manufacturer/distributor must upgrade their software to satisfy their business and client needs, or they will unavoidably fail. Upon examination, we find infrastructures are inadequate, and inner resources do not allow this change. Additional, because of their cash position, they cannot fund the lowest requirements for a new enterprise solution.

What are they supposed to do?

They must retrench and reconstruct quickly in as cost-effective manner. To serve their requirements, they must substitute all servers, operating systems, upgrade the network architecture, PCs, printers, improve their internet connection, rise network bandwidth, install wireless networking, protect their data backups, email SPAM control, implement security firewall,. i.e.: upgrade it all! What was believed to be a software spend of $35-$55K derived to be an enterprise spend of $160-$260K, and excluding the software.

It is avoidable with proactive budgeted enterprise management. You cannot permit your business to fail because systems are out of reach.

Case # 2 – Corporation is prepared to spend – but don’t know enough to execute properly.

When we encounter a client that has the financial capitals but not sufficient technical resources to deply today’s enterprise systems, we are prepared to contribute in hiring, raining, and support. The trick is the cost of these resources is high, and availability is inadequate. Businesses in a sound financial situation must also know they have resource necessities to consider while taking on a up-to-date solution. It is not for the reason that systems are complex it is because infrastructure and user requirements have raised.

For example:

Today is a extremely competitive and combative environment. Let’s look at some factors disturbing these pieces. Global rivalry is all the rage. China pays its employees $0.50/hour. Without the complete best systems, technologies, implementation, integration, utilization, cost-controls, security of the enterprise, accuracy in data, dedication to continuous monitoring and decision support tools, our businesses will flop and feel like they could do nothing about it.

We have, today the absolute utmost robust and reliable tools a little generation of business has ever seen. We can perform our business from a mobile phone from the inside of the Desert. If we can do this, the remaining is a matter of application.

Note: the above mentioned case study is just an example, students are supposed to find a separate case study.

 

Noted :Choose the application Netflixs as case study.

Learning Outcome(s): CLO1: Explain the interdisciplinary concepts, theories, and trends in ES and their role in supporting business operations.

Question One

1. Your first task is to select a case study (from real-world or using internet). It can be related to enterprise systems or related to an organization/store or on any relevant topic.

2. After selecting the case study describe it in your own words using following points.

a.Clear headline: It should give the most important information.

b.Snapshot: Provide the main points, including the client’s name/industry, the product/service used, and quick result stats.

c.Client introduction: One or two sentences describing the customer and a highlight about them.

d.Problem: State the problem/goal, consequences, and any hesitations the customer had. Include quotes.

e.Solution: Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes.

f.Results: Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.

g.Conclusion: Share additional praise from the customer and words of advice they have for other people/businesses like them.

Learning Outcome(s): CLO4: Design ES architectural models for various business processes.

Question Two

Model (As-Is) process using BPMN 2.0 using any tool such as Visio. Then analyze As-Is process from at least two perspectives. For example, if quality and time perspectives are taken then mention at least 1 issue related to quality and 1 issue related to time in the process.

Learning Outcome(s):

CLO3: Discuss the issues and challenges associated with implementing ES and their impacts on corporate enterprises.

Question Three

Propose at least three (3) ideas for improving the process of your selected case study from any three (3) prespectives: for example a) equipments prespective, b) employees prespective, c) IT & IS technologies prespective, etc. Lastly, propose the To-Be process model using BPMN 2.0 by utilizing any tools?

Learning Outcome(s):

CLO3: Discuss the issues and challenges associated with implementing ES and their impacts on corporate enterprises.

Question Three

Propose at least three (3) ideas for improving the process of your selected case study from any three (3) prespectives: for example a) equipments prespective, b) employees prespective, c) IT & IS technologies prespective, etc. Lastly, propose the To-Be process model using BPMN 2.0 by utilizing any tools?

 

Using Excel, you will create a NEW spreadsheet, using formulas, functions, and formatting tools, based on a budget for your home/family (you can use general items if you prefer to not list your specific items).

PROJECT 1: EXCEL

Over the past two weeks, you have studied some of the advanced features of Microsoft Excel. The exercises in this project will reinforce some of the concepts learned.

PROJECT DESCRIPTION
Using Excel, you will create a NEW spreadsheet, using formulas, functions, and formatting tools, based on a budget for your home/family (you can use general items if you prefer to not list your specific items).

PROJECT REQUIREMENTS

For your completed file, you MUST include FIVE items that you learned from the assignments readings for Weeks 1 and 2, such as (1) advanced charts, (2) advanced graphics, (3) advanced formulas, (4) advanced functions, (5) goal seek, (6) pivot tables (7) all types of advanced formatting, etc. Be creative and innovative, and include many items from Excel to visually represent your budget, both as calculations for income and expenses, and for charts and graphics.

Here are some more items you can include for expenses:
Retirement savings, 401K investments, parking, getting coffee, expenses for cars, car maintenance, yearly registrations for vehicles, gym memberships, clothes, shoes, student loans, interest on items such as mortgage (principal and interest list separately if possible), credit cards (principal and interest list separately if possible), TV/television services such as NetFlix, Hulu, and Amazon Prime; taxes on property you own; payment to accountant for doing your yearly taxes, babysitters. For income, expenses you can include the taxes you pay, as there are multiple for every paycheck.

For income, you can list all types of employers for regular income (and sick and personal days), health and wellness centers, and those that you work for as an independent contractor. Overtime and comp time can be separate items. Expense accounts, training, financial planning services, office items. Other types of income include dividends on stocks and purchase/option plans, real estate sales, insurance payments for claims, commissions, and bonuses, interest received from your bank for savings and checking accounts, rental income for rental properties you own, unemployment compensation, scholarships/fellowships/grants, social security benefits.

Excel File Requirements

The following MUST be included in the Excel Five Item File:

1. Three different types of charts.
2. Two different types of graphics (include this list of items in the Comment section when you submit your file).
3. The budget must include (for 1 month): income with deductions calculated for all items (gross and net salary/income) and all expenses/deductions, with totals for rows and columns for all items (minimum 50 items/cells filled in, font size 12 for items in cells).
4. Organized, formatted, and professionally presented Excel file, including grammar items (correct spelling, etc., format row and column titles with bold and font size 14 for row/column titles/names).
5. In the Comment section when you submit your file, also include any items that surprised you, when globally looking at your budget (income and expenses), in completing this project.

For Project 1 using Excel – Charts can be a pie chart, column chart, line chart.
Graphics (which can include charts) are also WordArt, SmartArt, Pictures, Freeform Drawings, Vectors, Grouping Shapes.