Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 UoP Learning Team: Sparkle Diamonds Project

2023 Start working on your Learning Team Database and Presentation outlined above with delivery in Week Four Begin by | Assignment Collections

Start working on your Learning Team Database and Presentation outlined above with delivery in Week Four. Begin by analyzing the requirements provided. Identify the tables, fields, field attributes, and table relationships required.

Build a 1-page Entity Relationship Diagram that models the required tables and relationships using Microsoft® Visio®, Lucidchart, or another software tool of your choice. The table design and relationships must support the following functionality:

  • Customers – Each customer is assigned a unique customer number but may have multiple locations to ship to. The sales team needs to be able to select the customer and the location for preparing sales orders.
  • Inventory Table – The sales team will want to query the inventory to find diamonds that meet the following specifications of their customers:
    • Cost – what SD has paid for the stone
    • Price – what SD will sell the stone for
    • Carat – weight
    • Clarity – clarity scale for diamonds offered are IF, VVS1, VVS2, VS1, VS2*
    • Cut – cut scale for diamonds offered are Excellent, Very Good, Good
    • Color  – color scale for diamond offered are D, E, F, G, H, I, J*
    • Order Table – The sales team will want to prepare a sales order for existing customers and sell only diamonds that are in inventory. The DBMS must be designed such that customers can purchase multiple stones on one sales order.

*Diamond Scale Reference*

  • Clarity:
    • IF- Internally Flawless
    • VVS1 – Very, very slightly included (pavilion)
    • VVS2 – Very, very slightly included (crown)
    • VS1 – Very slightly included (under 10X magnification)
    • VS2 – Very slightly included (to the naked eye)
    • Color:
      • D, E, F – Colorless – color between D, E, and F diamonds can be detected only by a gemologist in side by side comparisons, and rarely by the untrained eye
      • G, H, I, J, K – Near Colorless – diamonds color rated by a gemologist

Write a 175- to 350-word Status Update for your Learning Team using Microsoft® Word describing the work you have completed this week. The Status Update is a simple Microsoft® Word document that lets the instructor know what the team has accomplished during the week.

Submit the ERD and Status Update to the Assignment Files tab.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Programming Quiz Two

2023 1 What happens right after the identification of classes in the object oriented design process Determining the class | Assignment Collections

1. What happens right after the identification of classes in the object-oriented design process?

 

Determining the class responsibilities

Determining class interaction

Creating UML diagram

Developing SOW

 

 

 

Question 2.2. In object-oriented programming, inheritance is transitive; that means a child class _____.

 

inherits only from its parent class

inherits only selected methods and fields

inherits all the methods and fields of all its ancestors

does not inherit any methods or fields

 

 

 

Question 3.3. Which of the following are benefits of using inheritance?

 

Smaller chance of errors

Code is more manageable

Prevents the need to duplicate code, and therefore creates efficiency in the programming process

All of the above

None of the above

 

 

Question 4.4. Which of the following statements are true?

Interfaces contain one and only one implemented method, a constructor.

Interfaces are defined inside an abstract class.

All methods defined in an interface must be implemented when used by another class.

A true object-oriented design must contain as least one interface.

 

 

Question 5.5. Which of the following statements is/are false?

Abstract methods may or may not contain a method body

Abstract methods may be defined in an abstract class, a regular class or an interface

Abstract methods do not specify a return type

None of the above

All of the above

 

 

Question 6.6. When developing an object-oriented application, developers are required to comply with specific _____ or rules defined in a framework.

programming styles

object hierarchies

instantiated classes

contracts

None of the above

 

 

 

Question 7.7. Data/information hiding and encapsulation improves construction and maintenance because:

 

Programs become more self-documenting.

Procedural programming practices are supported.

Adding additional details is isolated to a single class.

All of the above

None of the above

Question 8.8. What are some of the characteristics of a “good” comment?

 

Detailed comments should address all aspects of the code and structure

Code markers should be used to show what the developer still needs to do

 

Comments showing the intent of the code

All of the above

None of the above

 

 

Question 9.9. Which of the following allow a programmer to reduce the complexity of an object-oriented program?

 

Create each class in a separate file

Using packages as a container for logically related items

Using packages to create global types

All of the above

None of the above

 

 

 

Question 10.10. Which of the following declares an abstract method in an abstract Java class?

public abstract void displayResult();

public void abstract displayResult();

public void displayResult{};

public abstract void displayResult() {}

 

 

Question 11.11. Given the following class definition, which of the methods defined in ClassB would not be inherited by a derived class?

 

public class ClassB {

 

void greatMethod(){

System.out.println(“ClassB greatMethod”);

}

private void greatPrivateMethod(){

System.out.println(“ClassB greatPrivateMethod”);

}

public void greatPublicMethod(){

System.out.println(“ClassB greatPublicMethod”);

}

}

greatMethod

greatPrivateMethod

greatPublicMethod

All three methods are inherited

None of the methods will be inherited

 

 

Question 12.12. Which of the following is a proper declaration of an abstract class?

public abstract class Animal {}

public abstract class Animal ()

public class Animal {}

public class abstract Animal {}

All of the above

None of the aboveBottom of Form

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Threat Modeling

2023 Threat Modeling A new medium sized health care facility just opened and you are hired as the | Assignment Collections

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

 Course Textbook: Chapter 8

Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. http://10.1109/WCNCW.2018.8369033

Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.

  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Future Models For Workplace Structure In Technology-Intensive Organizations

2023 This paper includes material found in Chapters 15 16 17 and 18 of the | Assignment Collections

This paper includes material found in Chapters 15, 16, 17, and 18 of the course textbook. Based on your reading of the textbook material, outside readings, and literature research, write an original research paper with the title: Future Models for Workplace Structure in Technology-Intensive Organizations  Your paper is to have a title page, introduction, body with a well-developed conclusion and reference page. The paper must be from 2,000 to 2,250 words including the title page, body, and reference page.  Your paper is to have a minimum of 5 (five) cited references obtained from articles found in refereed journals, articles from edited magazines published by professional organizations or societies, articles from refereed proceedings of professional conferences and/or published books.  NOTE: NO ARTICLE PUBLISHED ON THE INTERNET THAT IS NOT DIRECTLY CONNECTED TO AN ESTABLISHED PEER-REVIEWED PROFESSIONAL CONFERENCE, JOURNAL OR MAGAZINE IS ACCEPTABLE AS A CITED REFERENCE SOURCE. Published books are acceptable. The course textbook may be used as one reference source.  Always keep in mind the intended reader(s) of your research paper when developing and writing your paper. The reader must receive value from your research and what you write. Utilize graphs, charts, tables or figures if it enhances the point(s) you are making. DO NOT CUT AND PASTE THESE ITEMS IN YOUR PAPER!!  Your research paper must be written at the graduate level and should demonstrate a high degree of understanding on your part about the topic of this assignment.    it should be in apa format 5 referenes 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 disscussion reply to the question asked from students minimum words count 50 each

2023 1 Determine when a sequential file is more useful than a database 2 Differentiate between a | Assignment Collections

 

 


1: Determine when a sequential file is more useful than a database.?

 

 

2:     Differentiate between a flat file and a relational database?

 

 

3:  I definitely agree with the minimalist approach when it comes to development. If you remember the employee tax assignment there were a couple of approaches students could have taken to arrive at the same answer. Many students in the past took a modular approach for each salary range to compute the taxes. However, you can isolate one equation to compute the tax and excess by setting the variables conditionally based on the salary range thus eliminating excess code. If your equation happened to have an error you would only have to fix it once versus fixing it in each salary range. Recognizing that what you did today may not be right tomorrow can open you up for optimizing your code like in this example. Any thoughts?

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Need Help For The Below Assignment In APA Format

2023 Min 400 Words Briefly respond to all the following questions Make sure to explain and backup your responses with facts | Assignment Collections

 Min 400 Words 

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words.

The Open Web Application Security Project (OWASP) provides a distillation of several of the most well known sets of computer security principles; such as “Fail securely”

What “Fail securely” means and what architect a solutions can support that ?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Unit VIII Article Critique

2023 Unit VIII Article Critique In today s culture things are constantly changing and the ideas around social media are at a | Assignment Collections

Unit VIII Article Critique

 

 In today’s culture, things are constantly changing, and the ideas around social media are at a peak. While technology is a

driving force in nearly everything, we need to discuss the idea of professionalism.

After learning about hashtags in this unit, it is time to take this information and apply it. In a minimum of one page, discuss

the advantages and disadvantages of using hashtags as a promotional tool. You must also conclude by explaining as to

whether you would use hashtags to promote your website, or not, and why.

You must use the CSU Online Library to find at least one of the two articles regarding using hashtags as a promotional

tool. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have

accompanying citations that are listed on a separate bibliography page.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Power Point

2023 BUSI 300 PowerPoint Instructions For this assignment you will create a professional looking PowerPoint presentation on a topic of | Assignment Collections

  

BUSI 300 PowerPoint Instructions

 

For this assignment, you will create a professional looking PowerPoint presentation on a topic of professional communication. To help put this in perspective, the scenario is that your supervisor has assigned you the task of presenting a 45 to 60-minute training session on some aspect of professional communication. You need to research your topic and prepare an engaging PowerPoint that would be used as a visual aid in for your presentation. 

Topic Ideas

The course textbook will be a great resource when looking for a topic that relates to some aspect of professional communication. Some examples of topics include (but are not limited to): 

  • How to      be an Effective Verbal and Nonverbal Communicator 
  • How to      Give an Effective Presentation
  • Effective      Communication Within Teams
  • Overcoming      Communication Barriers 

It is recommended that you pick a topic of interest and then do some research to make sure you can find five credible sources – more about credible sources below. Once you are certain you can locate five credible sources, begin creating your PowerPoint presentation.

PowerPoint Requirements: 

I. Title Slide

  • This      will be the first slide of your PowerPoint (and is NOT considered a content slide).
  • This      slide will include the following: title of your presentation, your full      name, class name & section number, and your institution (Liberty      University).

II. Content Slides

  • A minimum of 15 content slides must be included.
  • All content slides must contain speaker notes

o Speaker notes are a presenter’s “cheat sheet”, if you will. In other words, speaker notes are hidden from your audience, but you are able to view them while presenting.

o Speaker notes are NOT a copy of the information on your slide. Instead, speaker notes expand upon and/or offer further clarification regarding points on each slide. 

o To add speaker notes, go to the Notes pane under the slide where you will see, “Click to add notes”. For more help, view the information at: https://support.office.com/en-us/article/add-speaker-notes-to-your-slides-26985155-35f5-45ba-812b-e1bd3c48928e

  • A minimum of four relevant, professional images/graphics must be      included in your PPT. 

o All images/graphics used must be relevant, professional looking, and used with the main purpose of helping an audience better grasp a complex concept and/or remember information presented. 

o Do not include blurry images.

o Re-read section 12-3 in your course textbook, as there are some important guidelines regarding the use of images/graphics in a presentation.

III. Reference Slide

  • This slide      will be the last slide(s) of your PowerPoint (and is NOT considered      a content slide).
  • This      slide (or slides) will contain all sources used in your PowerPoint      presentation.
  • Sources      must be formatted according to current APA formatting guidelines.
  • In      addition to current APA formatting guidelines, the inclusion of the complete      URL (sometimes called a permalink) is required for all full-text, peer-reviewed/scholarly articles retrieved from      Liberty’s online library journal database. Note that this is not the same      as the doi #. The URL must take your reader directly to the full text article within Liberty’s online library journal database. If you’re      unsure about the specific URL/link, you can copy the entire web      address from the top of the browser’s address bar once you are      viewing the full text article within Liberty’s      online library journal database.

IV. Sources

  • A      minimum of five credible sources      must be used within your presentation. Required, credible sources include:

o four full-text, peer-reviewed/scholarly articles retrieved from Liberty’s online library journal database.

o two of the above four full-text, peer-reviewed/scholarly articles must be within the last 7 years.

o the course textbook (as listed on the course syllabus).

  • You      are able to include additional sources, other than the five credible      sources listed above; however, they must be full-text articles      retrieved from Liberty’s online library journal database. 
  • Sources      NOT acceptable for this assignment: 

o No textbooks (including e-books), other than the course textbook/ebook (as listed on the course syllabus)

o No general Internet searching is acceptable. Therefore, no blogs, education sites, commercial sites, Wikipedia, About.com, editorials, abstracts, online books, book reviews, etc. 

V. Avoiding Plagiarism 

  • Create      an original PowerPoint presentation; previously submitted work from this      or another course is considered self-plagiarism and is prohibited. 
  • Provide      citations for the following:
    • All statements,       ideas, & thoughts (whether paraphrased or directly quoted) used from       an outside source; 
    • tables,       data, images, etc. used from an outside source. 
  • All citations      should be formatted according to the most current APA formatting      guidelines and should directly follow the information used from an outside      source. 
  • All sources      used must be formatted on your reference slide(s), according to current      APA formatting guidelines.

VI. Other Requirements and Reminders:

  • Must be created in Microsoft PowerPoint and uploaded through      the assignment link as a .ppt or .pptx file.
  • Individual      slides and the overall design of your presentation must be professional      and engaging.
  • A      running header or page #s are not      required.
  • An      abstract is not required.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer Data Breach Paper 800 Words

2023 Two industry standard reports that come out each year are the Ponemon | Assignment Collections

 

Two  industry standard reports that come out each year are the Ponemon  Institute’s “Data Breach Study” and Verizon’s “Data Breach Investigation  Report (DBIR).”

Find  and read the most recent editions of each of these reports. Write a  paper describing how data breaches can affect the socio­economic  viability of the United States. Is the potential impact associated with  data breaches as serious as the news makes it out to be? Defend your  answer.

Your paper should be a minimum of 800 words and use two scholarly references.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Design And Implement A Class Called Date That Has Data Members To Store Month

2023 Design and Implement a class called Date that has data members to store | Assignment Collections

Design and Implement a class called Date that has data members to store month (as a number), day, year, and name of the month. The class should have a three-parameter constructor that allows the data to be set at the time of new Data object instances are created. Default constructor that does not take any parameters should set the default values of 1 (month), 1 (day), 2001 (year). The class should have following three member functions to display date following formats
showDate1() should display the date in 1/1/2001 format
showDate2() should display the date in January 1, 2001 format
showDate3() should display the date in 1 January 2001 format
Also the class should have method to set the date (setDate()). This method should take month, day, and year as parameters and set the object instance data member values. Then your Date class should work with the Assignment5.cpp given below and produces the following output.

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now