Computer Science 2023 Final Defend Choice – Vulnerable Storage Media?

2023 Defend your choice of topic in 500 words or more Include at | Assignment Collections

 Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Write A C++ Program That Is Menu-driven That Allows For The Following Menu Choices

2023 Draft Write a C program that is menu driven that allows for the following menu choices 1 Load an exam | Assignment Collections

Draft Write a C++ program that is menu-driven that allows for the following menu choices: 1.Load an exam: Loading an exam should prompt the user for an exam file. If no file exists, it should allow the
user to specify a different file. Upon a successful load of an exam, the user should be presented with the menu again. 2.Display exam: The program should simply display each question, its point value, and the answer to the screen. (The functionality of actually taking the exam will be created in Week 5). Upon displaying the exam to the screen, the user should be presented with the menu again. 3.Quit: Quit the program gracefully by displaying a “thank you” message to the user, and ensure that all files have been closed along with any other housekeeping that should be done as your program shuts down. Consider creating a class exam that will hold the actual exam and provide behavior such as loadExam and also displayExam

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Disaster Recovery

2023 Real world exercise 5 Question using the list of possible probable and definite indicators of an incident draft | Assignment Collections

Real world exercise 5

Question:

using the list of possible, probable, and definite indicators of an incident, draft a recommendation to assist a typical end user in identifying these indicators. Alternatively, using a graphics packages such as PowerPoint, create a poster to make the user aware of the key indicators.

No plagiarism allowed please.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Cloud9 Programing

2023 Using For loop Write a program to fetch the name salary and the state of 5 employees Calculate the | Assignment Collections

Using For.. loop, Write a program to fetch the name, salary and the state of 5 employees. Calculate the federal tax, state tax and the net salary for each employee. Use the following criteria: 

To calculate the federal tax, use the following criteria:

If the salary is greater than 100,000 then calculate the federal tax at 20 percent.
Otherwise calculate the federal tax at 15%.

To calculate the state Tax, use the following criteria:

If the employee is from California, Nevada, Arizona, or Washington calculate the state tax at 10%

If the employee is from Texas, NewMexico, Or Alabama, then calculate the state tax at 9%

If the employee is from Newyork, Illinois, Wisconsin Or Delaware then calculate the state tax at 8%

Otherwise calculate the state tax at 12%

Calculate and display the netsalary.

As mentioned above, the loop should repeat 5 times, once for each employee. 

Hint: Each time the computer goes through the loop, it calculates the salary of one employee.
All results must be displayed

Mimir Requirements:
The name of the file must be Module4Homework1.py
Please note that mimir will test your program for multiple test scenarios and your program should pass all of them to get 100%

Here is the sample input/output( Please note that you must display a  line of “*” after each employee )

Please enter employee Name: ‘John’
Please enter employee salary: 30000
Please enter employee state: ‘California’
John federal tax is: 4500
John state tax is: 3000
John net salary is: 22500
*****
Please enter employee Name: ‘Susan’
Please enter employee salary: 50000
Please enter employee state: ‘Alabama’
Susan federal tax is: 7500
Susan state tax is: 4500
Susan net salary is: 38000
*****
Please enter employee Name: ‘Adam’
Please enter employee salary: 120000
Please enter employee state: ‘NewYork’
Adam federal tax is: 24000
Adam state tax is: 14400
Adam net salary is: 81600
*****
Please enter employee Name: ‘Jose’
Please enter employee salary: 95000
Please enter employee state: ‘Texas’
Jose federal tax is: 14250
Jose state tax is: 8550
Jose net salary is: 72200
*****
Please enter employee Name: ‘Maria’
Please enter employee salary: 78000
Please enter employee state: ‘Ohio’
Maria federal tax is: 11700
Maria state tax is: 9360
Maria net salary is: 56940
*****

Here is the list of  state names that mimir will check for (Please pay attention to the spelling and case  of state names)

California
Nevada
Arizona
Washington
 

Texas
NewMexico
Alabama
 

Newyork
Illinois
Wisconsin
Delaware

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Enterprise Architecture questions

2023 Instructions Use short replies a few well considered sentences a moderately long paragraph at most You work at a | Assignment Collections

 

Instructions:.  Use short replies – a few well-considered sentences, a moderately long paragraph at most

 

 

You work at a large federal agency.  A colleague proposes that the agency EA is no longer required because the agency has gone to Agile development? Provide (a) a reason why the EA is still needed despite the agency using Agile but (b) an example of something where the agency might actually modify, even reduce, its use of a traditional EA because of using Agile. 

 

 

Now that you have finished this course and had an overview of various EA frameworks, what is a legitimate reason for the EA community to still have different frameworks in use and not to have consolidated on just one?

 

 

Why are the hierarchical levels of an EA framework, or views of an EA at different levels of detail, helpful in documenting an enterprise?  

 

 

 

You have been recently hired by a Fortune 500 company to assist in refining the company’s Enterprise Architecture.  One of your first tasks is to prepare a short presentation to explain the business benefits for maintaining an EA.  What are a few (3-4) of the points that you might end up including in this presentation?  

 

 

 

Pick one of the following topics – use of cloud computing, increased use of mobile apps or concerns about privacy.  Pick only one.  Describe how addressing one of these topics might be seen in developing an Enterprise Architecture. 

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 SWOT

2023 Determining when to develop a system in house or to purchase a COTS system is not | Assignment Collections

Determining when to develop a system in-house or to purchase a COTS system is not always clear. A SWOT (strengths, weaknesses, opportunities, and threats) analysis brings the strengths and opportunities to a focus point and highlights the threats and weaknesses so an informed decision can be made. This analysis is often completed by the stakeholders, including the business analyst.

Perform a SWOT analysis of buy versus build for your chosen system using the knowledge gained from the Week 5 discussion, Purchasing Software Applications. You may use any Microsoft® program to create the SWOT analysis similar to the one featured in Ch. 12 of Information Technology for Management.

Use your SWOT analysis to create a guide for managers at Phoenix Fine Electronics to help determine if the business should build or buy a system. Incorporate feedback from the sourcing plan you created last week. Support your guide with at least 2 references. As a guideline, this type of guide should be 4 to 5 pages in length with written descriptions, charts, and outlines.

Include the following in your guide:

Various steps needed to purchase or develop a system in-house

Budget considerations

Staffing considerations

Time considerations

Risks

Maintenance plan

References

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Final Project Kaplan University

2023 Final Project Outcomes addressed in this Final Project Course outcomes IT258 1 Implement basic object oriented programming | Assignment Collections

 
Final Project
Outcomes addressed in this Final Project:

Course outcomes:
• IT258-1: Implement basic object-oriented programming design techniques.
• IT258-2: Apply the debugging process to Java development.

Instructions
A local company offers a variety of copying services. Develop a Java™ program to be used by customers to see a listing of possible services, including:
• Soft cover binding, small, $2.50
• Soft cover binding, large, $5.00
• Hard cover binding, small, $6.00
• Hard cover binding, large, $9.00
• Black and white copy, $0.10
• Color copy, $0.25

In order to complete this exercise, you will be required to create a class called Service with the following:
• Service name (String)
• Service price (double)
• A 2-parameter constructor used to initialize the class fields
• Getter and setter methods for each variable
• A toString method used to return a String representation of the service

After completing the Service class, develop a second class to be used as the application driver. This class should contain at least the following:

− A method called main, used to create a set of Service objects to be stored in an array. This method should then allow the user to choose between seeing the services arranged by name or seeing them arranged by price.

− A method called arrangeByName, containing code to sort the services in alphabetical order by service name. Once sorted, the method should display the services to the console.

− A method called arrangeByPrice, containing code to sort the services in order by increasing price. Once sorted, the method should display the services to the console.
Format your output in any way you feel is appropriate. Consider the output from the following sample program:

Welcome to the Kaplan University Copy Center.
Would you like to see our services by name or price (name / price)? name $0.10 Black and white copy
Copyright Kaplan University
Assignment Grading Rubric
Course: IT258 Unit: 9 Points: 120
$0.25
Color copy
$9.00
Hard cover binding, large
$6.00
Hard cover binding, small
$5.00
Soft cover binding, large
$2.50
Soft cover binding, small

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 computer science homework

2023 Design and write a Java procedure named printMoney that prints a floating point number as a currency value | Assignment Collections

 Design and write a Java procedure named printMoney that prints a floating-point number as a currency value (with a $ sign and exactly two decimal digits):

 

/*

    printMoney ( double )

 

    procedure outputs an amount in currenct format

 

    ex1: printMoney( 1234.5678 ) outputs “$1,234.56”

    ex2: printMoney( 0 ) outputs “$0.00”

    ex3: printMoney( -1234.5678 ) outputs “-$1,234.56”

 

*/

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 LAB #8 – ASP.NET Security

2023 LAB 8 ASP NET Security Student Due Date Apr | Assignment Collections

LAB #8 – ASP.NET Security

 

Student: ______________________

 

Due Date:        Apr. 9th, 2014

 

Purpose:          The purpose of this Lab assignment is to:

·         Practice the use of Forms-Based authentication

References:   

·         Textbook.

·         Lecture notes

 

This assignment may be completed individually by all the students. Submit the solution in a zip file using assignment link on blackboard. The file must be named according to the following rule:

 

yourlastname_CEIL865Labnumber. Your project should also use the same name.

Example: smith_CEIL865Lab8

If there are two exercises, add to the file name: _Ex1 or _Ex2.

Example: smith_CEIL865Lab8_Ex1

 

Exercise #1

 

 

In this exercise, you’ll implement a simple Forms-based authentication.

 

Create a new ASP.NET application.

 

Configuring the application for forms authentication

 

If the application has a Web.config file in the application root, open it.

 

If the application does not already have a Web.config file in the application root folder, create one.

 

Add the following elements to it within <system.web> area:

 

<authenticationmode=Forms>

      <formsloginUrl=Logon.aspxname=.ASPXFORMSAUTH>

       

        <credentialspasswordFormat=Clear>

          <username=[email protected]password=ceil865/>

        </credentials>

      </forms>

     

       

</authentication>

       

<authorization>

      <denyusers=?/>

</authorization>

 

Save the Web.config file and close it.

 

Creating the Logon Page

 

When users request any page from the Web site and if they have not previously been authenticated, they are redirected to a page named Logon.aspx. You specified this file name earlier in the Web.config file.

 

The Logon.aspx page collects user credentials (e-mail address and password) and authenticates them. If the user is successfully authenticated, the logon page redirects the user to the page they originally requested. In the example, the valid credentials are hard-coded into the page code.

 

Create an ASP.NET page named Logon.aspx in your project.

Add the following web controls as shown in the picture:

Four label controls, two text box controls, one check box control, two requiredfieldvalidator controls, two button controls.

 

Set the text property of the label controls as shown in the picture. Name the text boxes UserMail and UserPass. Set the ControlToValidate property for validator controls respectively to UserMail and UserPass. Name the check box control Persist.

 

Name button controls respectively BtnLogon, BtnLogonWebConfig. Name the fourth label Message.

 

Here is the code behind for Logon.aspx page:

 

 

public partial class Logon : System.Web.UI.Page

{

    protected void Page_Load(object sender, EventArgs e)

    {

 

    }

    protected void BtnLogon_Click(object sender, EventArgs e)

    {

        if ((UserEmail.Text == [email protected]) && (UserPass.Text == “ceil865”))

            FormsAuthentication.RedirectFromLoginPage(UserEmail.Text, Persist.Checked);

        else

            Msg.Text = “Invalid credentials. Please try again.”;

     

 

    }

    protected void BtnLogonWebConfig_Click(object sender, EventArgs e)

    {

        //Authenticating against values in Web.config

        if( FormsAuthentication.Authenticate(UserEmail.Text, UserPass.Text) )

            FormsAuthentication.RedirectFromLoginPage(UserEmail.Text, Persist.Checked);

        else

            Msg.Text = “Invalid credentials. Please try again.”;

       

 

 

    }

}

 

The page contains ASP.NET server controls that collect user information and a check box that users can click to make their login credentials persistent. The Log On button’s Click handler contains code that checks the user’s e-mail address and password against hard-coded values. (The password is a strong password that contains various non-alphabetic characters and is at least eight characters long.) If the user’s credentials are correct, the code calls the FormsAuthentication class’s RedirectFromLoginPage method, passing the user’s name and a Boolean value (derived from the check box) indicating whether to persist an authentication ticket as a cookie. The method redirects the user to the page originally requested. If the user’s credentials do not match, an error message is displayed. Note that the page imports the System.Web.Security namespace, which contains the FormsAuthentication class.

 

Creating the Default Page

 

Because you specified in the configuration file that all unauthenticated users are denied access to the application’s ASP.NET resources (which includes .aspx files, but not static files such as HTML files or multi-media files including images, music, and so on), when a user requests the page, forms authentication will check the user’s credentials and redirect the user to the logon page if necessary. The page you create will also allow users to log out, which clears their persisted authentication ticket (cookie).

 

If you don’t have a default page, add a new web form and name it Default.aspx. Add a label control and a button control to the form as shown in the picture below:

 

 

Name the label Welcome and the button Sign_Out.

 

Here is the code behind the page:

 

 

public partial class _Default : System.Web.UI.Page

{

    protected void Page_Load(object sender, EventArgs e)

    {

        Welcome.Text = “Hello, “ + Context.User.Identity.Name;

    }

    protected void Sign_Out_Click(object sender, EventArgs e)

    {

        //removes the forms authentication cookie

        FormsAuthentication.SignOut();

 

        //Redirects the browser to the login URL. Clears the cookie

        FormsAuthentication.RedirectToLoginPage();

    }

}

 

The page displays the user’s authenticated identity, which was set by the FormsAuthentication class and is available in an ASP.NET page as the Context.User.Identity.Name property. The Sign Out button’s Click handler contains code that calls the SignOut method to clear the user identity and remove the authentication ticket (cookie). It then redirects the user to the logon page:

 

 

References:

 

 

MSDN documentation

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 programming in C Language

2023 1 Write the output of the following segment of code Do it using pencil and paper typedef | Assignment Collections

1)      Write the output of the following segment of code. Do it using pencil and paper

 

typedef char* string;

 

            char msg1[]= {“There will be no quiz next week. Hooray!”};

            char msg2[]= {“Thank you. I don’t have to study CSCI610”};

            string str1,str2,str3,str4,str5,str6;

 

            str1 = strrchr(msg1,’n’);

            str2 = strchr(str1,’H’);

            *(str2-1)=’’;

 

            str3= strchr(msg1,’T’);

            str4= strchr(str3,’q’);

            *(str4-4)=*(str4+4)=’’;

 

            printf( “%s a %s %sn”,str3, str4, str1);

                       

            str5 = strchr(msg2,’I’);

            str6 = strrchr(msg2,’h’);

            *(str5+1) = ‘’;

            strcpy(msg1, str6);

 

 

            printf( “%c %s!n”, *str5, msg1);

 

All I want just the output of this and what does the follwing mean : 

*(str4-4)=*(str4+4)=’’;

 

 *(str5+1) = ‘’;

 

*(str2-1)=’’;

 

 

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now