Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Ethics, Law And Cybersecurity

2023 Pay attention to what you are being asked to do see Grading | Assignment Collections

 Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question.  Be sure to include your name on your quiz.  Only the first two (2) questions with an answer will be graded.   Include your name in the document filename (see rubric below for example). Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

  1. Consumer surveys have suggested that many Internet users are concerned about losing bits of their privacy when they are engaged in online activities.  In fact, many Internet users identify privacy as their number one concern, ahead of concerns about ease of use, security, cost, spam, and so forth. (a) Do only individuals who elect to use the Internet have reason to be concerned about losing their privacy? (b) Should those who have never even used a computer also worry? (c) Lastly, are issues of privacy a major concern in Canada (you must provide an appropriate reference that supports your answer to this question, i.e., url, news article, etc.)? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)
  2. In the days and weeks immediately following the tragic events of September 11, 2001, some political leaders claimed that “extraordinary times call for extraordinary measures”; in times of war, basic civil liberties and freedoms, such as privacy, need to be severely restricted for the sake of national security and safety. Perhaps, as a nation, the value that we have traditionally attached to privacy has diminished significantly since then. Consider that the majority of American citizens strongly supported the USA (United and Strengthening America) PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act, which passed by an overwhelming margin in both houses of Congress and was enacted into law on October 21, 2001. Privacy advocates have since expressed their concerns about this act, noting that it might have gone too far in eroding basic civil liberties. Some critics also fear that certain provisions included in the act could easily be abused; for example, those in power could use those provisions to achieve controversial political ends under the convenient guise of national defense. Examine some of the details of USA PATRIOT Act (go to http://www.epic.org/privacy/terrorism/hr3162.html). (a) Determine whether its measures are as extreme as its critics suggest. (b) Are those measures consistent with the value of privacy, which Americans claim to embrace? (c) Do privacy interests need to be reassessed, and possibly recalibrated, in light of recent attacks by and ongoing threats from terrorists? (d) What similar acts or laws exist in the United Kingdom? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. Through the use of currently available online tools and search facilities, ordinary users can easily acquire personal information about others. In fact, anyone who has Internet access can, via a search engine such as Google, find information about us that we ourselves might have had no idea is publicly available there.  (a) Is it true that individual privacy is threatened by the use of search engines? (b) Give some examples how that might occur.  (c)  Do individuals/hackers from anywhere on the globe access personal information of citizens of other countries?  (d)  Give some examples illustrating that has occurred.  (be specific and provide support for your answer)  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Cis Homework

2023 You must follow the instructions closely to get this formula right Otherwise | Assignment Collections

You must follow the instructions closely to get this formula right. Otherwise, it will not give you the correct result. You must preced it by the code I included. Here is the body of the function I have. You need to add the header to it, and this should work fine. Test it.

 

if (year < 0)

return 0;

else

{

    

    if (month < 3)

    {

        month += 12;

        year  -= 1;

    }

    weekDay = (day + 2*month + 3*(month+1)/5 + year +

               year/4 – year/100 + year/400 + 1) % 7;

    

    if (month > 12)

    {

        month -= 12;

        year  += 1 ;

    

    

    

}

return weekDay;

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 External Environment

2023 Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework Select | Assignment Collections

 Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework.Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model.For this assignment:

  • Prepare a brief PESTEL Analysis for your selected case from Part 2 of our Thompson (2022) text.  You must address all six elements.
  • Prepare a brief Five Force Analysis as presented in our Thompson (2022) text for your selected case. Address all five forces.

NOTE this Requirement:  The Standard & Poor NetAdvantage Database provided in the NEC Online Library is a required source (and will be extremely helpful). The Standard & Poor Database is located under the general Library database listing. Once you have accessed the Standard & Poor site, the tabs at the top allow you to click on companies or industries. If you choose industries, it then provides a box and drop-down menu showing the various industrial reports which are available. Access the relevant report, and then review the details in the report to support this assignment. The information is incredible relevant and provides a detailed analysis of the entire industry including a listing of the key companies in the industry.  See Course Content tab for a 2020 document noting how to find this database.Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course scholarly/peer reviewed source in your paper.
  • Create Leve1, 2 and Level 3 APA headings for each portion of the analysis.  
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.

References:

Professor feedback:

 

This should not be formatted as a question and answer document.

Submission Details: 

  • Your analysis should be 500 words or less.
  • Incorporate a minimum of at least our course Thompson 2022 Text and one non-course scholarly/peer-reviewed sources in your paper to support your analysis.
  • All written assignments must be formatted ini APA, and  include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 TaskLocate a practicing IT project manager who works for a business

2023 TaskLocate a practicing IT project manager who works for a business 1 Conduct an interview with this project manager in order | Assignment Collections

TaskLocate a practicing IT project manager who works for a business.1) Conduct an interview with this project manager in order to understand how a practising IT project manager applies IT project management techniques, project management skills, methods and software tools in the IT industry. Questions you ask should include:

  • What are his/her overall responsibilities as an IT project manager?
  • What day to day tasks does an IT project manager carry out?
  • What project management tools has he/she used in the past week?
  • What framework (methodology) does he/she generally use and why?
  • Does choice of framework (methodology) have an impact on project success?
  • What is the difference between a good (successful) IT project manager and an average IT project manager?

2) Critically analyse the results of your interview and evaluate how your findings align to what you have learned so far in this subject about project management and the role of project managers and via the research that you need to do to gather information about role of project managers and the project management skills, methods and software tools used in the IT industry.3) Create a 3 to 5 minute verbal presentation communicating your findings. You can use any presentation method you like. Options include Powerpoint, Prezi, emaze and the like. This is to be presented in class to your teacher in the designated time during the due week of the assessment.Tasks 1 and 2 must be documented in a word document and submitted via Turnitin.

PresentationThe assessment document submitted should be professionally presented with two headings for task 1 and 2 separately. Task 1 summarising the answers to interview questions and task 2 analysing the findings and reporting them.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CIS 500 Week 10 Term Paper Information Technology Strategic Plan

2023 Imagine that a company has recently hired you as a senior business consultant | Assignment Collections

 

Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, social media, and cloud technology. The management of the company feels that yearly revenues could top $20 million per year with the infusion of current technology. Currently the company has revenue of $5 million per year.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Write an eight to ten (8-10) page paper in which you:

  1. Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company. 
  2. Specify the current situation of the company with regard to its technology and security aspects.
  3. Determine at least five (5) information technology personnel / roles that would be in place in order to start the business venture of gaining better traction of customer satisfaction and loyalty. Justify your response.
  4. Conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis for the business venture in question for the company. Justify your response.
  5. Develop at least five (5) major goals for the information technology strategic plan. Justify your response.
  6. Speculate on three (3) positive organizational impacts of implementing the strategic plan. Justify your response.
  7. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of the information technology professional.
  • Develop an information technology strategic plan to address and solve a proposed business problem.
  • Describe and identify the uses of business process management and systems development.
  • Use technology and information resources to research issues in information systems and technology. 
  • Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Application Security – Security Awareness

2023 Assume you are a security awareness trainer Part of your job is to convince end users that paying | Assignment Collections

Assume you are a security awareness trainer. Part of your job is to convince end users that paying attention to security procedures makes the entire organization more successful.Answer the following question(s):

  • When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?

Fully address the question(s) in this discussion; I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and add these to the end of your thread.

500 words with APA format and references needed.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Write the program using C++

2023 1 Assignment 3 Problem to solve Assume you have to write software to be used by a university library There | Assignment Collections

 

1 Assignment 3 Problem to solve: Assume you have to write software to be used by a university library. There are three types of item that can be borrowed from the library – DVDs, books and journals. These are all a type of Media. You will need to create a simple hierarchy for items that the library lends out. Create a Media base class with DVD, Book and Journal as derived classes as shown in the UML diagram. Media id (int) title (string) year (int) changeID(newID:int) : void print() : void DVD director (string) print() : void Book author (string) numPages (int) print() : void Journal volume (int) number (int) print() : void Requirements: The member variables (id, title, year) in the Media class should be private. Each class should have appropriate constructor(s). Display all Names and student ID of team members when the program first started like in the example. You may create a displayInfo() for that, void displayInfo() { cout << “—————————————-” << endl; cout << ” Mouse, Mickey, 12345678″ << endl; cout << ” Duck, Donald, 98765432″ << endl; cout << ” Assignment3 << endl; cout << “—————————————-” << endl; cout << endl; } 2 The following program: int main() { displayInfo(); Media *ptr[10]; ptr[0] = new DVD(352, “Remember The Alamo”, 1945, “George Smith”); ptr[1] = new DVD(831, “High School Blues”, 1984); ptr[2] = new DVD(194, “Going For The Touchdown”, 1984, “Frank Madden”); ptr[3] = new DVD(576, “Martian Hairdresser”, 1992, “Debbie Gold”); ptr[4] = new Book(608,”How to Make Money”, 1987, “Phil Barton”, 324); ptr[5] = new Book(442,”Garden Projects At Home”, 1998, “Mary Freeman”, 164); ptr[6] = new Book(185,”The Haunted House Mystery”, 1996, “Bert Morgan”, 53); ptr[7] = new Journal(294, “ACM”, 2009, 6, 8); ptr[8] = new Journal(521, “J of Logic”, 2008, 23, 14); ptr[9] = new Journal(630, “J of AI”, 2009, 35, 11); cout << “Printing 10 items…” << endl << endl; for (int i = 0; i < 10; ++i) { ptr[i]->print(); }…

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CpE 207 Data Structure

2023 CpE 207 Data Structure You are expected to Implement a map using two different | Assignment Collections

CpE 207 Data Structure

You are expected to Implement a map using two different techniques, namely:

Implement a map using Hashing techniques with N=100013, and separate chaining for collision handling.

Implement a map using AVL trees.

 

For Key/Value Pair you may assume the following

The key is an integer, which can be generated as a random integer from 0 -> 99999

Value is a random name generated by concatenating two names selected randomly from an array of names (you should create an array of 50 names)

 

Your first Task is an array of  m transaction with the following conditions

m is the number of transactions in a Test suite, you will test for m = 1000, 10000, 100000, 1000000

Transaction will have two fields

Transaction type which can be

0 indicating a put call, 70% of all transactions

1 indicating a get call, 20% of all transactions.

2 indicating a remove call, 10% of all transactions.

The second field is a key value pair generated randomly as explained above.

 

Your Solution should have a minimum of  the following classes

Pair

attributes

key : int,

Value: String

Transaction

Attributes

opType : int (0, 1, 2),

pair: Pair

Static final String names[]: a list of 50-100 names

Methods

Transaction generateTestCase(): This methods creates a random transactions with a probability of 70% to be a put, 20% a get, or 10% remove, and the pair with a random key from 0 -> 99999 and a random name

Transaction [] generateTestSuite(int m): this method generates m random transactions a  returns them as an array of size m.

 

 TestDrive

 Methods

TestRun(int m): this method first generate a TestSuite of size m then runs it against a map implemented using an arraylist, a hashmap, an AVL maps, you should measure the run time for each run and print it.

Position: an Interface

Node: a binary tree node

BinaryTree: a BinaryTree Interface

AVLtree : implements a BinaryTree

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 HW JAVE

2023 The attached program reads information name address age for several people from | Assignment Collections

The attached program reads information (name, address, age) for several people from a file. The code to read is finished, but the method that prints the information to the screen needs to be completed. It is okay if you printed to either a file or the screen.

Submissions:

  1. Copy of source code in a Microsoft Word document.
  2. Copy of output in a separate Microsoft Word document.
  3. Copy of updated netbeans project.

Complete the method, and be sure your output is in a columnar format. Use the printf to right-align the data for each row.

 

Name                    Age               Street Address                     City     State              Zip Code 
————————————————————————————————————-
Mary Madalinski        12     3434 Whiteford Road         Ottawa Lake      Michigan            45267 
Virginia Rodriguez       8             456 Main Street                Dayton            Ohio            45404 
Darla Busbee              9           3824 Corey Road                Toledo            Ohio            43613 
Gary King                 10   343 Carriage Hill Drive                 Toledo            Ohio            43613

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Hacking IoT: Case Study On Baby Monitor Exposures And Vulnerabilities – Rapid7

2023 Hacking IoT Case Study on Baby Monitor Exposures and Vulnerabilities Rapid7 GUIDELINES FOR WRITING A CASE STUDY | Assignment Collections

 

  • Hacking IoT: Case Study on Baby Monitor Exposures and Vulnerabilities – Rapid7

GUIDELINES FOR WRITING A CASE STUDY

A case study analysis requires you to investigate a problem, examine the alternative solutions, and propose the most effective solution using supporting evidence.  Your submission should be no more than 2 pages and needs to adhere to APA formatting for spacing and citations.  Include a title page, your case study (1-2 pages), and reference page.  For guidance on APA formatting check out this resource:  https://owl.english.purdue.edu/owl/section/2/10/

Preparing the Case

Before you begin writing, follow these guidelines to help you prepare and understand the case study:

  1. Read and examine the case thoroughly
    • Take notes, highlight relevant facts, underline key problems.
  2. Focus your analysis
    • Identify two to three key problems
    • Why do they exist?
    • How do they impact the information security field?
    • Who is responsible for them?
  3. Uncover possible solutions
    • Review course readings, discussions, outside research, and your experience.
  4. Select the best solution
    • Consider strong supporting evidence, pros, and cons: is this solution realistic?

Drafting the Case

Once you have gathered the necessary information, a draft of your analysis should include these sections:

  1. Introduction
    • Identify the key problems and issues in the case study.
    • Formulate and include a thesis statement, summarizing the outcome of your analysis in 1–2 sentences.
  2. Background
    • Set the scene: background information, relevant facts, and the most important issues.
  3. Alternatives
    • Outline possible alternatives (not necessarily all of them)
    • Why are alternatives not possible at this time (if not possible)?
  4. Proposed Solution
    • Provide one specific and realistic solution
    • Explain why this solution was chosen
    • Support this solution with solid evidence
  5. Recommendations
    • Determine and discuss specific strategies for accomplishing the proposed solution.
    • If applicable, recommend further action to resolve some of the issues
    • What should be done and who should do it?

Finalizing the Case

After you have composed the first draft of your case study analysis, read through it to check for any gaps or inconsistencies in content or structure: Is your thesis statement clear and direct? Have you provided solid evidence? Is any component from the analysis missing?

When you make the necessary revisions, proofread and edit your analysis before submitting the final draft.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now