Week 1: Discussion – Key File and File System Attributes During this first discussion, I would like you to think like a forensic examiner. What key attributes would you like to know about a file you need to examine? When examining files and file systems key attributes are collected. For example: File LocationFile SizeFile Timestamps […]
Archive for the ‘Computer Science’ Category
topic in Covid 19/ pandemic


Below is a list of topic areas. Select ONE of the topics and use the concept mapping technique from the lecture notes and the videos to develop a more narrow topic in a thesis statement or research question format. Please see the sample concept map in your lecture notes and click on the link for […]
summary of what i posted now


Title: Analyzing web searches can help experts predict, respond to COVID-19 hot spots.Author: The study was conducted in collaboration with the Mayo Clinic Robert D. and Patricia E. Kern Center for the Science of Health Care DeliverySource: https://medicalxpress.com/news/2020-10-web-experts-covid-hot.html Web-based analytics have demonstrated their value in predicting the spread of infectious disease according to the new […]
Information Technology


Attention is one of the six cognition processes. When attention is applied to a design, the goal is to make it easier for the end user to quickly locate where he or she should type information on the computer or mobile device screen. Compare and contrast how the Google search engine and the Microsoft Bing […]
Unified Modeling Language Diagrams


You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain records of the professional development of its employees. The company has over 30,000 employees who are located in four sites: Florida, Colorado, Illinois, […]
Virtual Team Management & Success


You will write a term paper on Virtual Team Management & Success that covers all the sections covered in the class. Your paper must be in-depth and address the main areas of class outcomes that include: -Building High performance Virtual teamsProfiles of Virtual team successDifferentiators of great teams (RAMP model)Virtual team launch kit-Leading virtual teamsHow […]
Answering Questions


Before you start this assignment, give some thought to the following questions: 1. How do you utilize the Internet?2. How does the Internet impact your daily life?3. How is the Internet used professionally?4. How will the Internet apply to your future career as a Health Information Technician? In a 1-2-page Microsoft Word document, summarize your […]
Respond to the following questions (separate each response with the text of each question): What do you believe is the U.S. federal government’s weakest and strongest cybersecurity domain/sector/program or concept? How would you reduce weaknesses? How


Respond to the following questions (separate each response with the text of each question): 1) What do you believe is the U.S. federal government’s weakest and strongest cybersecurity domain/sector/program or concept? 2) How would you reduce weaknesses? 3) How would you design the federal government’s cybersecurity management integration across agencies?
Software Engineering


Design and implement software for a DJ which allows searching a large number of songs by artist name and adding songs to a play-list. All tasks need to be completed. Needs to be written in Java code on Emacs. Software needs to operate and run on Linux Lab Setup – (Fedora) Virtual Box.
insurance activity


Complete the worksheet, questions based on Mary’s scenario. The point of this activity is to help us understand the decisions young people make about health insurance. You can find the slides for the activity here and the worksheet in the slides in the in-class activities folder. slides: https://docs.google.com/presentation/d/1aeoqI_wnk4lw7-syzwD9dbKIFEOFvMOwqD6VMIf1S-Y/edit?usp=sharing Discussion Questions: 1. How much money does […]