Computer Science 2023 Suppose That The Text File On The Web Http://cs.armstrong.edu/liang/data/Scores.txt Contains An Unspecified Number Of Scores. Write A Program That Reads…

2023 Suppose that the text file on the Web http cs armstrong edu liang data Scores txt contains an unspecified number of scores Write a program | Assignment Collections

  1. Suppose that the text file on the Web http://cs.armstrong.edu/liang/data/Scores.txt contains an unspecified number of scores. Write a program that reads the scores from the file and displays their total and average. Scores are separated by blanks.
     

  2. In a triangle, the sum of any two sides is greater than the other side. Create an  IllegalTriangleException class. Write a Triangle Class with the constructor of the Triangle class designed to throw an IllegalTriangleException object if a triangle is created with sides that violate the rule, as follows:

    /** Construct a triangle with the specified sides */
    public Triangle(double side1, double side2, double side3) {
       throws IllegalTriangleException 
           // Implement it
    }
     

  3. (Plot functions using abstract methods) Write an abstract class that draws the diagram for a function. The class is defined as follows:

        abstract class AbstractDrawFunction extends JPanel {

/** Polygon to hold the points */

private Polygon p = new Polygon();

final int TO_X_AXIS = 125;

final int TO_Y_AXIS = 125;

final int END_OF_X_AXIS = 275;

final int END_OF_Y_AXIS = 200;

 

protected AbstractDrawFunction () {

drawFunction();

setBackground(Color.white);

}

 

/** Return the y-coordinate */

abstract double f(double x);

 

/** Obtain points for x-coordinates 100, 101, . . ., 300 */

public void drawFunction() {

for (int x = -100; x <= 100; x++) {

p.addPoint(x + TO_Y_AXIS, TO_X_AXIS – (int)f(x));

}

}

 

@Override /** Draw axes, labels, and connect points */

protected void paintComponent(Graphics g) {

   super.paintComponent(g);

 

   // Draw x axis

   g.drawLine(10, TO_X_AXIS, END_OF_X_AXIS, TO_X_AXIS);

 

   // Draw y axis

   g.drawLine(TO_Y_AXIS, 30, TO_Y_AXIS, END_OF_Y_AXIS);

 

   // Draw arrows on x axis

   g.drawLine(END_OF_X_AXIS, TO_X_AXIS, END_OF_X_AXIS – 20, TO_X_AXIS – 10);

   g.drawLine(END_OF_X_AXIS, TO_X_AXIS, END_OF_X_AXIS – 20, TO_X_AXIS + 10);

 

   // Draw arrows on y axis

   g.drawLine(TO_Y_AXIS, 30, TO_Y_AXIS – 10, 50);

   g.drawLine(TO_Y_AXIS, 30, TO_Y_AXIS + 10, 50);

 

   // Draw x, y

   g.drawString(“X”, END_OF_X_AXIS – 20, TO_X_AXIS – 30);

   g.drawString(“Y”, TO_Y_AXIS + 20, 40);

 

   // Draw a polygon line by connecting the points in the polygon

   g.drawPolyline(p.xpoints, p.ypoints, p.npoints);

 

}

}

 

public class draw_graph extends JFrame {

    public static void main(String[] arg) {

        draw_graph dg = new draw_graph();

        dg.setSize(400,400);

        dg.setTitle(“Graph”);

        dg.setLocationRelativeTo(null);

        dg.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

        dg.setVisible(true);

        

    }

    

    draw_graph () {

        setLayout(new GridLayout(1, 3, 1, 1));

        // Create your derived class object here

        

    }

 

}

 

Test the class with the following functions defined in concrete classes:

a. f(x) = x*x;

b. f(x) = sin(x);

c. f(x) = cos(x);

d. f(x) = tan(x);

e. f(x) = cos(x) + 5*sin(x);

f. f(x) = 5*cos(x) + sin(x);o

g. f(x) = log(x) + x*x;

 

For each function, create a class that extends the AbstractDrawFunction

class and implements the f method.

 

Your output should consist of screen shots of plots for these functions with the label of the plot as your name_idnumber.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Data Analytics Assignment Help

2023 Review the following article and websites found in the resources for this assignment 6 | Assignment Collections

  1. Review the following article and websites found in the resources for this assignment:
    1. 6 dos and don’ts for next-level slides, from a TED presentation expert
    2. https://www.slideshare.net/satyajeet_02/how-to-make-effective-presentation
    3. engr.psu.edu/speaking/STRUCTURE.html
    4. https://www.engr.psu.edu/speaking/SPEECH.html
    5. https://www.engr.psu.edu/speaking/DELIVERY.html
    6. https://www.assertion-evidence.com/

Refer these above url’s as ane example to complete the assignment 

  1. For this assignment, go to the Census Bureau Quick Facts link (https://www.census.gov/quickfacts/fact/table/US/PST045219). In the top left corner, enter the zip code, town, city, or county name of the area where you live to get a table of quick facts about your community. In the more option on the menu board at the top of the screen, you will find CSV. Select this option to download an Excel spreadsheet with the quick table information. Select one other community in your state or region that is approximately the same size and download the quick facts for that community.
  2. Prepare a set of graphs that compare the two communities in at least five different areas. Each graph must be different in format from the rest (bar chart, pie chart, doughnut chart, etc). Using these graphs, prepare a Voice Narration PowerPoint that discusses the differences and similarities noted between the two communities. The PowerPoint should be 8 to 10 minutes in length.
  3. The presentation should follow a logical and coherent sequence with a strong introduction, clear progression of ideas and thoughts, and an effective conclusion.
  4. Be sure to strategically use creative and attractive sound, volume, inflection, graphics, fonts, and formats that add value to the presentation.
  5. Follow the steps involved in planning and preparing for a speech:
    1. Your presentation should include an introduction and conclusion slides with 5 – 6 body slides.
    2. Each slide should have approximately 40 to 60 seconds of narration. 
    3. Use proper spelling, grammar, and APA formatting for your citations. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion Global Economy

2023 According to authors Gilbert and Troitzsch 2005 in the chapters Foundations of Simulation | Assignment Collections

 

According to authors, Gilbert and Troitzsch (2005) in the chapters, Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and it’s input and possible output processes. 

Q2: In reference to the above author’s knowledge, and any assumptions presented by these authors in the case study, in your own words, briefly explain:

  • what simulation modeling relies upon?
  • using APA 6E guide, provide a short and clear narrative to support your response,
  • provide substantive feedback to three other colleague’s response to the DF questions,
  • DON’T COPY and PASTE responses into the DF from textbooks and any other digital Internet sources – it’s Verbatim!
  • 1.25 points will be earned for correct responses

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Research Paper: Develop A Computer/Internet Security Policy

2023 Research Paper Develop a Computer Internet Security Policy You have been hired as the CSO Chief | Assignment Collections

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

• Be approximately four pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Week 2 For COMPUTERSCIENCE_EXPERT

2023 The CIO of the organization you chose read your letter and would like to meet with you to discuss | Assignment Collections

 

The CIO of the organization you chose read your letter and would like to meet with you to discuss the legal, ethical, and privacy issues governing the cyber domain and directly impacting the organization. 

Research the legal, ethical, and privacy issues as they relate to your chosen organization and the broader cyber domain.

Using Microsoft® PowerPoint®, prepare a 12- to 14-slide, media-rich presentation for the CIO that includes the following:

  • Title slide
  • At least 2 fundamental U.S. laws that impact the organization and the cyber domain
  • At least 3 compliance laws and regulations governing the cyber domain and impacting the organization
  • At least 4 organizational security issues
  • At least 3 security technologies used to comply with laws and that support ethics in information security for the organization

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Database Security – Admin Controls 1 – Users And Roles

2023 Required Videos https www youtube com watch v IDxXUBNBxPA https www youtube com watch v eOSVTdw7Qbg https www youtube com watch v DL2l L nBe0 https www youtube com watch v DL2l L nBe0 Required Readings Read Chapter 1 in the text Controlling Data | Assignment Collections

Required Videos

https://www.youtube.com/watch?v=IDxXUBNBxPA

https://www.youtube.com/watch?v=eOSVTdw7Qbg

https://www.youtube.com/watch?v=DL2l_L_nBe0

https://www.youtube.com/watch?v=DL2l_L_nBe0

Required Readings

Read Chapter 1 in the text: Controlling Data Access and Restricting Privileged Users

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Lab Assignment 7: Form Page Due Week 7 And Worth 40 Points Deliverables: One (1) Web Page And One (1) Cascading Style Sheet (.css) Complete The Weekly Lab Based On The Following: Write The Code For Each Lab Assignment. The Code Is To Be Submitted In A Sin

2023 Lab Assignment 7 Form Page Due Week 7 and worth 40 points Deliverables One 1 Web page and | Assignment Collections

Lab Assignment 7: Form Page

Due Week 7 and worth 40 points

Deliverables: One (1) Web page and one (1) Cascading Style Sheet (.css)

 

Complete the weekly lab based on the following:

  • Write the code for each lab assignment.
  • The code is to be submitted in a single compressed folder (zip file) to the online course shell. The file must contain all .htm files, along with any other files that may be necessary for your project to run (ex: text files, images, etc.).
  • When saving the file, it should be saved as Lab_#_Last name_First initial.htm. For example, if your name is Mary Smith the file for Lab 1 should be saved as Lab_1_Smith_M.htm
  • Any and all written answers must be entered into the online course shell with the submission of the attached lab assignment.

Follow the directions below to complete Lab Assignment 7:

 

Note: The CGI bin script does not work for us because we do not have a server to run it on.

Therefore, we will use the code listed here instead of the .js files.

 

In order to have the Submit and Cancel buttons clear the fields, put this line in your code:

After your <head> tag:

<meta />

And this line after your <body> tag:

<form >

 

The above code will help the fields clear without taking you away from the page.

 

  1. Re-create the Web page with a form, and create a heading that states your name and the purpose of the page. Example: “Mary Smith’s Sample Form Page” states the purpose of the page.
  2. Create an entry field for:Create the formstxt.css sheet and apply it to the page.
    1. “Name”.
    2. “Street Address”.
    3. “City”.
    4. “State (abbr.)”.
  3. Enter your city and state as the default values for the fields.
  4. Use local tags on the page to override the .ccs and set the size of the font for “Student Information” to 16 pt.
  5. Create the “Submit” and “Cancel” buttons.
  6. Validate that the buttons clear the name and street address when selected.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer

2023 Your employers will want you to produce completed well edited documents in a timely fashion and they | Assignment Collections

Your employers will want you to produce completed, well edited documents in a timely fashion, and they will judge you by the quality of your work. 

Your word processor contains a number of templates for such applications as letters, memos, faxes, résumés, and other business documents. Evaluate one of these templates. Is it clear and professional looking? Does it present a design that will be effective for all users or only for some? What changes would you make to the template to improve it? Present your findings, and attach a copy of the template.

Do the same for both Excel and PowerPoint.

Please include all of the assignment items in a single document. Let me know if you need technical assistance in doing so.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CIS 333 Week 6 Case Study 2: Public Key Infrastructure

2023 You are the Information Security Officer at a small software company The organization currently utilizes a Microsoft | Assignment Collections

You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.

Write a two to three (2-3) page paper in which you:
1.    Identify and analyze the fundamentals of PKI.
2.    Analyze positive and negative characteristics of a Public and In-house CA.
3.    Provide a sound recommendation for either a Public CA or an In-house CA.

Your assignment must follow these formatting requirements:
•    Be typed, double spaced, using Times New Roman font (size 12), with one-inch
margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional
instructions.
•    Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover page and
the reference page are not included in the required assignment page
length.

The specific course learning outcomes associated with this assignment are:
•    Explain how businesses apply cryptography in maintaining information
security.
•    Use technology and information resources to research issues in information
systems security.
•    Write clearly and concisely about network security topics using proper
writing mechanics and technical style conventions.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Patching, Securing Systems, And Configuring Anti-Virus (Part B)

2023 Submit a word document containing an analysis and a summary of the completed lab part A The word document should | Assignment Collections

 

Submit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:

  • Summary of the lab
  • Analysis of the activities performed in the lab and their importance to the course topics
  • How the lab relates to the course and current module topics
  • Related concepts from the module readings and lectures
  • At least one external reference
  • 1-3 pages in length
  • Proper APA formatting and citations
  • Minimum of 1-3 references are required
  • Screens shots are encouraged but should be included as an appendix and not part of the total page count.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now