When the proposed thesis or project involves the study of human subjects and/or animals, an outside review and approval of the proposed research are required. Once your proposal is approved, you will work closely with your professor as you develop and address your topic.
A formal proposal is due at the end of Week 2. By this time, you would have selected a topic and provided a proposal outline for your thesis or creative project of which must align with your core subject area.1. Please use the Capstone Manual.
2. The formal proposal must provide a clear and lucid description of a question, project or problem and a proposed method of answering the question, addressing the project or solving the problem.
3. Proposal drafting is considered a learning process and helps you avoid oversights and possible mistakes.
4. Again, guidance on the format of the proposal and a sample proposal are contained in the Capstone Manual provided.
5. The proposal should explain the question, project, or problem to be investigated and convince the professor that the question, project or problem merits investigation. It should show that you have read the relevant and recent literature on the subject and it should contain a list of materials consulted during the preliminary stages of your research or project. In general, the research proposal or project should include background information related to the research topic or project, purpose of the thesis or project, and investigatory procedures to be used.
6. The formal proposal should not exceed five (5) pages (proposal title page not included).
7. When the proposed thesis or project involves the study of human subjects and/or animals, an Institutional Review Board review and approval of the proposed research is required. Please visit
8.Also, review your articles/sources for writing your 25 -page literature review due week eight.
Submission Instructions:Please note: Papers will be automatically added to and checked against the standard Turnitin repositories. Originality reports will be returned to the faculty and student in roughly 15 minutes of the submission. Multiple submissions are allowed.
Hardening a system provides an additional layer of security by removing access and possible vulnerabilities from the system. Security principles such as deter, deny, delay, and detect are used to reduce attack surfaces and possible vectors.Assignment:
Write a 250-500-word lab report that includes a title page, table of contents, and overview.Examine the ClamAV antivirus program that installed and provide information on the following:• Research potential faults and vulnerabilities within the program, including the open-source nature of the program.• Describe the strengths and weaknesses associated with the open-source antivirus program you installed (ClamAV) running in an enterprise network.***Please clearly address both bullet points listed above as it relates to ClamAV antivirus***
Find your code name in the list of meeting location messages. Convert the meeting location message to Unicode. Use the submission form Download submission form to write the encoded Unicode message you are sending to the thief.Remember to start your encoded message with U+ to indicate to the thief that your message is in Unicode. Submit the completed form with the decoded message.A Unicode Table is included for your reference.https://www.joelonsoftware.com/2003/10/08/the-absolute-minimum-every-software-developer-absolutely-positively-must-know-about-unicode-and-character-sets-no-excuses/https://www.khanacademy.org/math/algebra-home/alg-intro-to-algebra/algebra-alternate-number-bases/v/number-systems-introduction
Hello,Attached are two files named “FILE 1” and “FILE 2”. Open FILE 1 documents, follow all the instructions, and the Gantt Chart is the FILE 2. Use FILE 2 (Gantt Chart) and follow all the steps. I only need the screenshot in step 8 that shows all the values including the current date, and all other values.Again, follow all the instructions and send me the screenshot of STEP 8.PLEASE: I ONLY NEED THE SCREENSHOT IN STEP 8. MAKE SURE YOU FOLLOW ALL THE INSTRUCTIONS FROM STEP 1 – 8 AND SEND ME THE SCREENSHOT OF STEP 8.
Technology now makes installing cameras in cockpits feasible in terms of cost, and there are many parts of the industry that would favour installing them for the benefit of flight safety and accident investigation. If you look back a few decades, then there was some resistance to FDM, and yet this is now generally viewed as one of the most significant contributors to flight safety. Examine the literature and present a discussion document that summarises the competing viewpoints.
In addition to the Business Intelligence Development Plan template including section headings (project outline), you should submit a Data Classification and Visualization Assessment section of 4–5 pages that includes the following for the case study organization:
Read the Globex Corp case study document before attempting this assignment.
You are an ICT Security and Risk consultant and you have been approached by Globex Corp to help them recover from a cyber attack. You have successfully isolated the machines affected by the attack and brought the company’s system back into operation.
You have now completed a risk assessment for Globex Corp, and in your discussions with the Director have indicated that they need a policy to protect their data and their Intellectual Property (IP) around their Precision Farming Technology Designs. The Director has indicated that he thinks this is “being a bit excessive” and will “cost more than it’s worth”.
The company is the in process of developing some cutting edge Precision Farming technology that has attracted considerable interest from some major industrial companies in Australia and overseas. The Sales Manager is concerned about the designs for these new devices being stolen or hacked, but the Director still thinks that the company is too small to attract that sort of attention. However, one of the government organizations that intends to purchase the new Precision Farming Machines has asked the Sales Manager to describe their level of cyber security maturity.
Globex Corp Director is still not entirely convinced that this is necessary, but wants you to develop a proposal for some security policies, just in case they win a government contract.
You have been contracted by Globex Corp to discuss and propose security policies to protect their data and resources in view of their existing risk assessment.
1. Write a proposal for Globex Corp that discusses:
a. The need for security policies at Globex Corp. The discussion should include how these policies (as outlined in Q1b.) will enhance Globex Corp security and help to raise their level of cyber security maturity,
b. Outline the following security policies:
1. A security policy that would act to preserve the Confidentiality, Integrity and Availability of their data,
2. A security policy that would act to protect their data center resources, and
3. A security policy that would act to educate Globex Corp in how they can protect the company’s data and resources.
Your second task is to write a self-reflective commentary about your website design and development, testing and deployment techniques.
Having created your website project, you should write a self-reflective commentary (max. 1000 words) critically reflecting on your project. Your commentary should critically explore the work you have done to produce your project. Your commentary should show evidence of your reading and research and use Harvard referencing.
Your reflection is a chance to look back on what you have done and to revisit key design and technical decisions you made and whether they were appropriate. You will evaluate the decisions made and their impact to determine any future enhancements/ recommendations as well as your own abilities to work as web designer.
You should justify and reflect on the decisions made regarding the choice of design, development and use of technologies. Upon reflection, you should discuss strengths and weaknesses of your design, development methods and choices as well as technologies used to develop the website.
You should also discuss and evaluate the chosen design, development methods and technologies.
References/sources to support your arguments need to be cited and use Harvard Refencing.
Usability and Accessibility You should discuss your strategy used to create a user friendly and accessible web site using usability and accessibility principles and guidelines.
Ensure to discuss how would you change anything and if so, why? As a result of your experience on the project, what do you recommend could have been done to make your solution even better for your client?
Having created your program, write a report that assesses your solution, the approach taken, and your thoughts about using Java for object-oriented programming (OOP). Give examples, code samples and screen shots to back-up your comments
Justification for the use of object-oriented programming concepts such as inheritance, abstraction, and polymorphism. What are they? Why did you choose to use or not use them, why do you think your approach is better or worse?
Looking back at the project, do you think you made the right choices regarding the object orientated concepts you used? Would you use the same ones again in a similar project and if so why/why not?
Did you meet all of the design criteria and did your approach work? With the benefit of your experience, would you have developed the application in any other way? If so how and why?
The report should focus on service/application migration using docker containers. The ability to move services and applications closer to mobile users is now a key requirement for future networks. Several migration techniques have been developed including the use of docker to migrate one service from one vendor to another.
• Introduction to docker
• Service migration using docker (supported with reference)
• Pros and cons of migrating a service using docker (supported with references)
• How will service migration using docker help get services and applications closer to the mobile user
• Comparison and conclusion of migrating a service using docker against service migration using virtual machines, LD and Unikernels
The report should be a max of 2000 words providing references supporting the above contents. It will be checked through a plagiarism checker to make sure the work is legit
In the report, in-text citations and reference list should use the Harvard style