Are there potential network security benefits when using Virtual Local Area Networks (VLANs)? How does the implementation of VLANs influence broadcast traffic on a LAN? How does the use of VLANs influence network routing?

Discussion Board

After reviewing the information in the Module 6: Week 6’s Learn section, discuss all of the following:

  • Are there potential network security benefits when using Virtual Local Area Networks (VLANs)?
  • How does the implementation of VLANs influence broadcast traffic on a LAN?
  • How does the use of VLANs influence network routing?

Review the Discussion Assignment Instructions prior to posting. You may also click the three dots in the upper corner to Show Rubric.
Post-First: This course utilizes the Post-First feature in all Discussions. This means you will only be able to read and Iteract with your classmates’ threads after you have ubmitted your thread in response to the provided prompt.

Reflect on the steps to install Ubuntu in powershell as well as the configuration of a server. Explain the steps of how to share files from powershell to a windows server.

Reflection File sharing

In this paper you will Reflected on the steps to install Ubuntu in powershell as well as the configuration of a server. Then explain the steps of how to share files from powershell to a windows server. in your Cybrscore shell and configure the server as a file server on installation. You are to reflect on the steps of how to do these things, the challenges and solutions. You can search google for inspiration to writing this paper.

To your opinion, which topics from bachelor courses are offering the best preparation for the COME program and why?

COME: Computational Mechanics

‘To your opinion, which topics from bachelor courses are offering the best preparation for the COME program and why?’

Master of Science (M.Sc.)

The Master of Science Program in Computational Mechanics combines theoretical and applied mechanics as well as computer science, software engineering and applied mathematics. New solutions for the numerical simulation of mechanical problems in engineering science are developed.

Computational mechanics is a constantly growing field with impact on both science and industry in all areas of engineering. It is concerned with solving mechanical problems on the basis of numerical approximation methods, involving discretization of the underlying equations in both space and time. Nowadays, related skills are indispensable in civil and mechanical engineering, for the design of automobiles and spacecrafts, for developments in biomechanics and micro-electro-mechanical systems. Virtually, all technical disciplines make use of the fast progress in this area.

Computational mechanics brings together highly sophisticated methods of theoretical, applied and structural mechanics as well as computer science, software engineering and applied mathematics. The curriculum of the course encompasses, among others,

– continuum mechanics, structural mechanics and theory of stability
– structural and fluid dynamics
– applied mathematics and functional analysis
– computer science, programming and software engineering
– linear and non-linear finite element methods
– structural and multidisciplinary optimization
– modelling and simulation
– networking, distributed and parallel computing

Explain in a paragraph what is a No SQL database specifically Mongo DB and Neo4J using Table 14.3 in the textbook. Explain the difference between Hadoop and Spark and provide examples of each one. How do these tools assist in the Big Data concept?

Complete the following 8 steps:

Step 1
Explain in a paragraph what is a No SQL database specifically Mongo DB and Neo4J using Table 14.3 in the textbook.

Step 2
Explain the difference between Hadoop and Spark and provide examples of each one. How do these tools assist in the Big Data concept? You may refer to the Figure14.6 below from the textbook and Dashboards.

Step 3
Click on RoboMongo software icon in Azure Labs and Import Documents in Mongo DB using the file: C14_Fact.json from the website: www.cengagebrain.com (Links to an external site.). See the attached files.
Refer to note on pg. 682-683 in the textbook.

Step 4
Use MongoDB Query using find (). Please refer to Figure 14.2. to complete this step. Please click on the video below for a Tutorial.
https://blog.sqlauthority.com/free-learning-videos/ (Links to an external site.)
a. Import Documents in MongoDB
b. Use MongoDB to Query using find ()
c. Analyze the Data from the Query in MongoDB
Free Learning Videos – SQL Authority with Pinal Daveblog.sqlauthority.com

Step 5
Click on Neural Tools 7.6 software icon in Azure Labs and use Neo4J (Graphical Database) for completing the following tasks:
Preload the file:Ch14_FCC.txt file (Food Critics Database) from www.cengagebrain.com (Links to an external site.). Please refer to the Figure 14.13 below from the textbook.  See the attached files and refer to page 686-687 in the textbook.
a. Creating Nodes
b. Retrieving Node Data
c. Retrieving Relationship Data
Click on the link below for tutorial for NeuralTools:

Step 6
Use Table to complete a Comparative Analysis for MongoDB and Neo4J and discuss the Differences and Similarities of Both Databases

Step 7
Would you recommend using MongoDB or Neo4J to the CEO? Justify your recommendation. Write at least 2 paragraphs to summarize the information that you have learned.

Step 8
Present the Final Report including Charts and Findings to CEO.

Analyze the usage of NLP techniques using machine learning models for classifying text into different textual topics and associated sentiment classes.

Modeling and sentiment analysis using Machine Learning

Analyze the usage of NLP techniques using machine learning models for classifying text into different textual topics and associated sentiment classes.

Choose an issue of importance to you—it could be personal, school-related, local, political or international in scope—and write an essay in which you explain the significance of that issue to yourself, your family, your community or your generation.

Major applying – Software Engineering

Choose an issue of importance to you—it could be personal, school-related, local, political or international in scope—and write an essay in which you explain the significance of that issue to yourself, your family, your community or your generation.

Brief analysis of the dataset. Design and build your neural network, how you train and test it. Provide any observation you may have in your project.

Neural Network System for Stock Advisory

Assignment 4 —

Neural Network System for Stock Advisory You are a Machine Learning expert in a consultancy company, providing ML service to various industries and clients. A financial institution commissioned your company a project to analyze their confidential data on the performance of all the stocks they have been watching or are in their portfolios. In order to kept their data confidential, the key 10 features which reflects the “environment” of the stock market (they are valuable properties of the company) are anonymized and named as “Fl”, “F2″…”F10”. From their past data and experience, they provide you with 3 classes of outcomes – “BUY”, “HOLD” or “SELL”. Your assignment is to use neural network to build a system which can be used by the financial institute to assist their investment experts.

Two datasets in separate files consist of 9,000 instances for training and 1,000 instances for testing. The following is the data dictionary:
Fl, F2 …. F10 Feature sets provided by the customer class 0 = “SELL”; 1 = “HOLD”; 2 = “BUY”

You should include the following in your report:
1. Brief analysis of the dataset.

2. Design and build your neural network, how you train and test it.

3. Any observation you may have in your project.

Your report should be a brief write up and your Colab notebook with executable codes as appendix. You may choose to include your report within the Colab notebook as collection of text cells, although that may be more difficult to format.

What would the United States Air Force have to do to achieve cyberspace supremacy? How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors? What are some common sense rules and regulations that should be implemented in cyberspace?

The United States Air Force Path to Cyberspace Superiority: The Impact of Governance and Cyber Threat Actors on Cyber Readiness

Problem Statement
There is a clear problem with the United States Air Force’s intention to achieve cyberspace superiority. Most academic research conducted on the cyberspace domain has revealed it to be an ungovernable virtual environment. Cyberspace is riddled with cyber threat actors in the forms of hackers, organized crime group, cyberterrorism, and nation state (Hollis & Ohlin, 2018). The Air Force, private and nonprofit organizations and typical internet users are not exempt from cyber threat actors. This problem not only threatens the Air Force workforce ability to operate in cyberspace but also hinders management of information and communications infrastructure networks (NATO HQ, 2021). Most professionals and stakeholders consider cyber security measures and strict governance for combating cybercrime. This study will investigate the Air Force strategy for cyberspace superiority, current cyberspace rules and regulations, and cyber threat actors using both qualitative and quantitative research methods to query plausible solutions.

Participants, Data, and Access
In addressing the Air Force cyberspace strategy, this research will identify the Airmen and civilians tasked with maintaining the Information and Communications Technology (ICT) systems. These individuals vary by ranks, pay grade, duty positions, and experience but they serve in both network defensive and offensive, and base help desk roles. Normally, defensive operators safeguard DOD and non-DOD systems and networks from inside and outside intrusion (Panwala, 2021). It warrants manpower and expertise to maintain network and mission operations, and develop techniques to counter the threats. The Air Force network operators and administrators receive industry-level trainings and certifications prior to getting access to both unclassified and classified networks (Nishimura, Kanoshima, & Kono, 2019). They are informed about the Air Force’s cyberspace strategy and cyber security measures. They would be the ideal target population to participate in this research study. As a Communications Operations Officer (17D) in the Air Force, I am exposed to everything information and communications related. In addition to having access and proficiency in the Air Force cyberspace mission, I also lead some key cyber security functions for my installation. I possess firsthand experience with the Air Force’s cyber security protocols. I have also served in several positions of authority and worked alongside civilian leaders in military ranks. Locally, I can contact all 156 personnel workforce tasked with managing the installation ICT network. In addition, as a member of 17D Facebook Group, I have access to another pool of 3,000 participants. Eliminating bias from the research is foundational. The research design, data collection, and analysis process were selected to drastically reduce systemic errors and bias. My involvement as 2 researcher is restricted to collecting and analyzing the data collected. Participants will sign waivers to only provide valid and reliable data. Participants selected will be asked general cyberspace domain questions concerning the Air Force ICT networks, cyber security approach, and cyberspace governance. The participants should be able to provide insights on the Air Force’s strategy to secure cyberspace superiority and maintaining a robust cyber security posture. At my location, I will conduct interviews with participants and rely on questionnaire to capture data from non-local participants. Data collected from interviews and questionnaire will be used to fulfill the quantitative aspect of the study. The research methodology calls for both qualitative and quantitative methods. Interviews, field observations, and surveys will help with hypothesis development and supplement the mixed methodology approach. All primary and secondary data collected will be saved on my password protected computer. Clearance and permission to vet and interview the base cyber workforce will be submitted to the current base Commander for approval. Similarly, a formal request will be sent to 17D Facebook Group Administrators prior to surveying its members. Participants’ responses will be scrutinized for misinformation and bias, and ultimately omitted from the research. Over a period of 30 days, I will conduct personal interviews with the base participants and store the data on a Voice Recorder for analysis. The Facebook respondents will take a questionnaire. Each question on the questionnaire should contribute to testing one or more hypothesis or research question established in the research design (Brown, 2006). Prior to formal release, the questionnaire will undergo 3 a pilot testing to test for clarity, bias, and design conflict. Participants for the pilot trial will be randomly selected from the study population.

Design Choice
The primary design choice for this research is grounded theory. Since the methodology will involve both qualitative and quantitative elements, the research also calls for the integration of survey-based research designs. While the grounded theory is time-consuming and labor-intensive, it limits bias and produces more diverse set of answers to research questions (Brown, 2006). Grounded theory also supports changes in research while discarding assumptions. The researcher is granted flexibility to be creative and methodical to data analysis (Creswell, 2016). There is not much information readily available about cyberspace governance. Normally, the grounded theory research approach is used to fill in the gap in research and/or propose new theories. Data collected through interviews and survey will help in forecasting the needed rules and regulations in cyberspace. The investigation into the Air Force cyberspace strategy and cyber security posture as compared to industry standards will also instigate an understanding for cyber literacy and safety.

Purpose Statement
In most developed countries, people spend as much time in the physical world as they do in cyberspace. Cyberspace represents the ideal environment for information sharing and social connection. The United States Air Force ruminates cyberspace as a domain for war, in addition to land, sea, air, and space. However, achieving cyberspace superiority entails overcoming the security threats found in cyberspace and lack of governance. The purpose of this systematic review is to uncover and analyze the Air Force’s strategy for cyberspace superiority and defensive measured to counter cyber threat actors. Enquiry of the rules and regulations in cyberspace should provide needed explanation for lack of governance. This study will follow a mixed-methodology approach for data collection. Cyber professionals located at my current Air Force base will be interviewed to capture personal experiences and daily job functions. Quantitative data collected through questionnaire via specialized Cyber Facebook page will complement the research premise. All primary and secondary data collected will be stored in Alfresco, which is a document and content management software.

Research Questions
This study will address the following research questions:
Research Question 1: What would the United States Air Force have to do to achieve cyberspace supremacy?
Research Question 2: How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors?
Research Question 3: What are some common sense rules and regulations that should be implemented in cyberspace?
Research Question 4: What is the importance of cyberspace and why is it so critical to the Air Force and national security?
Research Question 5: Do the current applicable rules and regulations in cyberspace are enough to deter cybercrime?
Research Question 6: What are the limitations with prosecuting international cyber threat actors?
Research Question 7: Are certain hardware and software classified as hacking tools? If yes, should the authorities account for the individuals who buy them?
Research Question 8: Is it an achievable goal for the Air Force to attain cyberspace supremacy?
Research Question 9: How can cyberspace users and/or organizations protect their ICT systems from cyber threat actors?

What is an algorithm according to Victoria Nash in the video above? Why is the list of instructions used in computation according to the response given in the video? According to the video what is the difference between coding and an algorithm?

Section 1:
Link 1 https://www.youtube.com/watch?time_continue=1&v=ZnBF2GeAKbo&feature=emb_logo
(Links to an external site.)

1. What is an algorithm according to Victoria Nash in the video above?

2. Why is the list of instructions used in computation according to the response given in the video?

3. According to the video what is the difference between coding and an algorithm?

4 What are some of the big benefits of having an algorithm vs a human according to this video?

5. Will algorithms take our jobs and what is another drawing of depending too much on algorithms?

6. How else are algorithms utilized in the real-world according to the narrator of the video above?

Link 2 https://www.youtube.com/watch?v=6hfOvs8pY1k

7. What is pseudo-code according to this video (link 2)?

8 . What problem would you solve with an algorithm? Give one example (Note: You don’t have to write the code just a sentence or two)

Section 2:
Every Programmer needs a good Integrated Development Environment to develop their code. There are plenty of options for developers writing code in C++. What is your favorite IDE and why? What other IDE would you recommend? Post a URL (web address) where one can review information about this IDE and explain why you prefer this Integrated programming Environment.

Section 3:
In your discussion, you looked into the role of the Integrated development environment. Research six more IDE and write a short paragraph about each. Cite your sources and include the website address that you used for your research.

Define the term using between 50 and 100 words. Cite the reference you use for your definition. Share an actual application for the function.

HIM 200 – Makeup Work

For each of the functions identified below, perform the following:
1. Define the term using between 50 and 100 words. Cite the reference you use for your definition (web site, blog, etc.) by using URL or page.
2. Share an actual application for the function. You can copy and paste something you find online (provide the reference) or create your own example using Excel or Access.

Excel Chapter 2
Exercise 1
• Relative cell reference
• Absolute cell reference
• Mixed cell reference
Exercise 2
• Sum function
• Average function
• Median function
• Min, max, count function
• Today function
Exercise 3
• VLookup function
• PMT function
• IF function

Excel Chapter 3
Exercise 1
• Clustered column chart
• Bar chart
• Pie chart
• Combo chart
Exercise 2
• Format chart titles
• Add and format axis titles and format axes
• Add and format data labels
• Format chart area
Exercise 3
• Apply chart style
• Apply chart filter
• Insert and customize sparklines

Excel Chapter 4
Exercise 1
• Freeze rows and columns
• Display and change page breaks
• Set and clear a print area
• Print titles
Exercise 2
• Create a table
• Rename the table
• Add and delete fields in table
• Add records in table
• Remove duplicate rows in table
• Apply table style
Exercise 3
• Create a structured reference in a formula in a table
• Sort one field in a table
• Sort multiple fields in a table
• Create a custom sort in a table
• Apply text filters in a table
• Apply a number filter in a table
• Apply a date filter in a table
Exercise 4
• Add a total row in a table
• Apply highlight cell rules in a table
• Specify top/bottom rules in a table
• Display data bars in a table

Access Chapter 1
Exercise 1
• Open, save, and enable content in a database
• Recognize database object types
• Modify data in table datasheet view
• Add records to a table
• Delete records from a table
• Use database utilities
Exercise 2
• Use a selection filter to find exact matches
• Use a selection filter to find records containing a value
• Use filter by form
• Sort table data
• View relationships
Exercise 3
• Create a database using a template
• Add records to a download desktop database
• Explore the database objects in a downloaded desktop database template

Access Chapter 2
Exercise 1
• Create a table in datasheet view
• Delete a field and set a table’s primary key
• Work with field properties
• Create a new field in design view
• Modify the table in datasheet view
Exercise 2
• Import Excel data
• Import data from an Access database
• Modify an imported table’s design
• Add data to an imported table
• Establish table relationships
• Enforce referential integrity
Exercise 3
• Use the query wizard
• Specify query criteria and sort order
• Change query data and run, copy, and modify a query
Exercise 4
• Add additional tables to a query
• Create a multitable query
• Modify a multitable query
• Summarize data using a multitable query