Why choose us?

We understand the dilemma that you are currently in of whether or not to place your trust on us. Allow us to show you how we can offer you the best and cheap essay writing service and essay review service.

Computer Science Questions

Computer Science Questions

BRIEFLY RESPOND TO ALL FOLLOWING QUESTIONS. Make sure to explain and backup your
response with facts & examples.

THIS ASSIGNMENT SHOULD BE IN APA format and have to include at least two references.

MInimum of 600 words.

1) List 2 methods to build visual models of your system.
2) What is the best definition of a trust boundry?
3) What are the 3 most essential questions to ask in threat modelling?
4) In the star wars mnomonic, what threat does luke skywalker embody?


Visual Models
Image detection computer systems identify objects based on variations in identifiable
characteristics of the objects. One of the characteristics that the image detection computer
systems use is the edge detection. An example of image detection computer system used in edge
detection is the Canny edge detection. The edge detection system finds edges and uses the
template to identify the edges of an image. In edge detection, the system identifies any
overlapping images, the size of the edge, measured regarding pixels and the distance to the
nearest edge from a specific viewing direction. Object tracking is another method for visual
image system. Object tracking relies on the tangible user interface that integrates real-time
objects with computer images. The real world image is converted is projected with digitalized
information from the computer. However, the object tracking system cannot track movements
and thus changes in positions of the real object. To track the changes in the positions of the
objects, the users provide feedback so as to update the system on the position of the object.
Additionally, color differentiation is another technique used in object detection. The color of the
object and the background color should be distinctive in order to differentiate the shape and the
size of the object (Fuggetta, & Di Nitto, 2014).
Trust Boundary

Trust boundary is a situation where subsystems of a computer can be accessed by another larger
system freely without separation. In other words, the execution program can access the day
managing programs without discrimination. For instance, a system that can access data in
computer storage and manipulate and manage it through data analysis applications is an example
of trust boundary (Gonzales, Kaplan, Saltzman, Winkelman, & Woods, 2017).
Threat Modeling
Threat modeling is the process of determining the specific characteristics of a threat through the
identification of the threat in order to enable enumeration and the prioritization of the threats.
The most essential questions to ask while performing computer threat modeling is; “Where are
the high-value assets?” The question helps the defenders against systems attackers in locating the
most valuable data within their systems such that while the defensive computer application is
designed to protect data in a specific location within the computer. The location of the valuable
assets in terms of data and information could be located in several stores within a device.
Additionally, the assets could be located in different devices that are either independent or
interconnected through a network. Secondly; “Where am I most vulnerable to attack?” The
defender should determine the data that the attackers could easily access them. The details
concerning the data and the information could include the variety of the information, the
usefulness and the value of the information and the availability of sources where the similar
information could be retrieved. “What are the most relevant threats?” The defender should
identify the type of the threats that are likely to attack the systems. The defender identifies the
computer application that can likely be involved in the attack. The description of the attack
enables the defender to prepare and install a program to counter an attack from the specified
application (Erickson, 2017).

Luke Skywalker
Luke Skywalker is symbolic of a threat to the Galactic kingdom. Luke Skywalker does not
support the kingdom and trains his daughter to oppose the dynasties of the kingdom. The
character also faces a threat from the smugglers that he has knowledge that exists within the
kingdom (Galipeau, 2015).



Erickson, M. E. (2017). Modeling and role modeling. Nursing Theorists and Their Work-E-Book,
Gonzales, D., Kaplan, J. M., Saltzman, E., Winkelman, Z., & Woods, D. (2017). Cloud-trust—A
security assessment model for infrastructure as a service (IaaS) clouds. IEEE
Transactions on Cloud Computing, 5(3), 523-536.
Galipeau, S. A. (2015). The journey of Luke Skywalker: An analysis of modern myth and symbol.
Open Court.
Fuggetta, A., & Di Nitto, E. (2014, May). Software process. In Proceedings of the on Future of
Software Engineering (pp. 1-12). ACM.

All Rights Reserved, scholarpapers.com
Disclaimer: You will use the product (paper) for legal purposes only and you are not authorized to plagiarize. In addition, neither our website nor any of its affiliates and/or partners shall be liable for any unethical, inappropriate, illegal, or otherwise wrongful use of the Products and/or other written material received from the Website. This includes plagiarism, lawsuits, poor grading, expulsion, academic probation, loss of scholarships / awards / grants/ prizes / titles / positions, failure, suspension, or any other disciplinary or legal actions. Purchasers of Products from the Website are solely responsible for any and all disciplinary actions arising from the improper, unethical, and/or illegal use of such Products.