Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Draw An Entity-Relationship Diagram Using ER-Assistant Or Equivalent Software To Capture Data Requirements For Mama Mia’s Pizzeria. The Deliverable Is A Complete ER Model, And A Relational Schema To Document The Data Model For The Following Scenario. The

2023 Case Description Mama Mia s MM pizzeria offers pizzas breadsticks and Buffalo chicken wings for carry out customers | Assignment Collections

Case Description

Mama Mia’s (MM) pizzeria offers pizzas, breadsticks, and Buffalo chicken wings for carry out customers only. Customers phone in the order and come by to pick up their order. When regular customers call MM over phone, they are asked for their phone number. New customers must provide this information before placing orders.

Once the order is taken, the tax, and order total is computed. The order is then printed and submitted to the kitchen where the order is prepared. A receipt is printed and given to the customer. Payment from the customer should be in check or cash only.

Customers may provide coupons. Coupon information (discount applicable and validity period) must be provided when placing the order and the coupon must be submitted when picking up the order.

MM has a set of suppliers who supply the ingredients for their products (pizza & breadsticks) such as flour for pizza crust, cheese, a variety of toppings, chicken wings, spices, as well as other ingredients for the pizza sauce.

MM would like to design a system that would serve the following purposes:  

  • -Facilitate order acceptance and tracking
  • -Facilitate generation of daily, weekly, and monthly sales summaries
  • -Facilitate generation of products sold on a daily, weekly, and monthly basis.
  • -Facilitate tracking promotional sales (the ones with coupons).
  • -To maintain the inventory of ingredients so that they can identify which supplier to call if they need a particular ingredient and to keep track of the amount of each they have on hand and on order.
  • -To know the customer preferences in terms of what the customer usually orders. For example when a customer calls in and gives his/her phone number and says “the usual”, MM knows exactly what to prepare! MM believes that this will save customers a lot of frustration.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Visual Studio And Visual Basic Programming In C#

2023 I am having trouble with these two programs I keep getting this error for both programs and I don t know | Assignment Collections

I am having trouble with these two programs I keep getting this error for both programs and I don’t know how to fix it

 

ERROR Cannot declare namespace in script code

 

 

1. Write a console application called DayDreaming that declares a minutes variable to represent time spent daydreaming on the job. Assign a value to that variable in your program then display the value in hours and minutes. (For example, 122 minutes would be displayed as “2 hours and 2 minutes.”)

 

 

2. Write a console application called ScoreMonger that declares five variables to hold test scores. In your program, assign values to each variable then compute an average of the scores and display the average of the test scores to one (1) decimal place.

 

 

 (1)

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

 

namespace DayDreaming

{

    class DayDreaming

    {

        //declaring variables

        private int inputMinutes;

 

        //a method to process input

        private void processInput(int minutes)

        {

            if (minutes > 60)

            {

                int hours = (minutes-minutes%60) / 60;

                int reminder = (minutes-hours* 60);

                Console.WriteLine(hours + ” hours ” + reminder + ” minutes”);

            }

        }

        //the main method

        static void Main(string[] args)

        {

            Console.WriteLine(“How many minutes were spent day dreaming? “);

            string input = Console.ReadLine();

            DayDreaming mc = new DayDreaming();

            mc.inputMinutes = Convert.ToInt32(input);

            mc.processInput(mc.inputMinutes);

            Console.ReadKey();

        }

    }

}

 

 

(2)

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

 

namespace ScoreMonger

{

    class ScoreMonger

    {

        //declare score and average variables

        private int scoreOne;

        private int scoreTwo;

        private int scoreThree;

        private int scoreFour;

        private int scoreFive;

        private double average;

 

        //a method to compute average score

        private void computeAverageScore()

        {

            double avg = (double) (this.scoreOne + this.scoreTwo + this.scoreThree + this.scoreFour + this.scoreFive) / 5;

            this.average = Math.Round(avg, 1);

        }

        //method to request for scores

        private void requestForScores()

        {

            Console.WriteLine(“Enter Score 1: “);

            this.scoreOne = Convert.ToInt32(Console.ReadLine());

            Console.WriteLine(“Enter Score 2: “);

            this.scoreTwo = Convert.ToInt32(Console.ReadLine());

            Console.WriteLine(“Enter Score 3: “);

            this.scoreThree = Convert.ToInt32(Console.ReadLine());

            Console.WriteLine(“Enter Score 4: “);

            this.scoreFour = Convert.ToInt32(Console.ReadLine());

            Console.WriteLine(“Enter Score 5: “);

            this.scoreFive = Convert.ToInt32(Console.ReadLine());

        }

        //the main method

        static void Main(string[] args)

        {

            ScoreMonger sm = new ScoreMonger();

            sm.requestForScores();

            sm.computeAverageScore();

            Console.WriteLine(“The average score is ” + sm.average);

            Console.ReadKey();

        }

 

    }

 

}

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 MILESTONE 5—WEEK 5: IMPLEMENT SITE CONTENT AND A USER FEEDBACK FORM WITH CLIENT-SIDE VALIDATION 11

2023 Include all necessary controls text box radio buttons check boxes text areas dropdown | Assignment Collections

Include all necessary controls (text box, radio buttons,  check boxes, text areas, dropdown lists, and buttons) to allow the user to  effectively evaluate your site for usability, accessibility, and navigation.  This form will be used in Week 7 to evaluate your site. Also include  client-side validation on key fields in the form. Use the form action=mailto:your_email_address attribute to collect the user feedback.

Move all site and page-level styles to an external CSS file.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Samsung versus Apple

2023 Apple versus Samsung Write a three to four 3 4 page paper in which you Compare and contrast the features | Assignment Collections

Apple versus Samsung

Write a three to four (3-4) page paper in which you:

  1. Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab.
  2. Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab.
  3. Recommend the type of user for which the iPad is best suited. Provide a rationale for your response.
  4. Recommend the type of user for which the Galaxy Tab is best suited. Provide a rationale for your response.
  5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast the types and role of distributed software architecture.
  • Discuss common input / output technologies.
  • Summarize the different types of data storage technology.
  • Use technology and information resources to research issues in enterprise architecture.
  • Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Homework

2023 Each question requires a full two page response You can double space Suggestion Generally speaking there are no wrong | Assignment Collections

Each question requires a full two page, response.  You can double space.

 

Suggestion:  Generally speaking there are no wrong answers – only weak ones. Opinion alone, no matter how passionate, is not enough to get an A on this exam. Use textbook examples or other media, to support your claims. Be sure to cite sources where appropriate.

 

 

 

 

Questions:

 

1. What are the major issues that the U.S. government is facing in protecting its borders from illegal immigration and its citizens from domestic and foreign terrorist attacks? How have those issues been addressed? 

2.  Throughout the history of emergency management in the United States, priorities set for government emergency management agencies have been driven by the most widely perceived threat or hazard. In your opinion, is DHS’s current focus on terrorism the right area to be focused on, or should more attention be paid to natural disaster management?

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 W8assg2402 – Implementing Network And Personnel Security Measures

2023 The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure | Assignment Collections

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency.  This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Write a 7 page paper in which you:

1. Create an information flow diagram, using Visio or Dia, which:
     a. Illustrates how remote users will securely connect to the government agency’s network.  
     b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to  

         server.
         Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private     information. In this list:
    a. Propose 3 vendor brands per each device and the associate costs required to procure these items.
    b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the         successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures    available within the network in which you:
    a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
    b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend 5 physical security measures that could be developed to ensure the electronic perimeter of electronic     assets.

5. Recommend 3 physical security vendors that could achieve the four (4) security measures you identified. Justify your
    recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security     from within the organization. Provide a rationale with your response.

7. Use 5 quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality     resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA.

https://owl.english.purdue.edu/owl/resource/560/18/

  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
  • Describe best practices in cybersecurity.
  • Describe system, application, network, and telecommunications security policies and response.
  • Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
  • Use technology and information resources to research issues in cybersecurity.
  • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Create Your Own Unique While-End Repetition Structure

2023 Create your own unique While End repetition structure You decide the theme You should provide both the | Assignment Collections

Create your own unique While-End repetition structure. You decide the theme. You should provide both the pseudocode and the flowchart of your example. Be sure to provide an overview of what your repetition structure is doing.Please keep the design simple for this exercise. Just a few lines of code is all that is needed for this response.
Also provide the C code and results of testing your code in an online compiler. Again, this should be a simple loop with just a few lines of code.

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Security Audit Procedure Guide

2023 Scenario Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities | Assignment Collections

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Requirement: 2 Pages + 2 resources.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Microsoft Excel

2023 To successfully complete this assignment submit the Microsoft Excel template that includes the required | Assignment Collections

To successfully complete this assignment, submit the Microsoft Excel template that includes the required information and formatting.

Steps:

  1. Review this Assignment 2 Sample to see a completed version of this assignment for reference. Note: You may not copy any information from this sample into your own assignment. Select the “Read-Only” option when the password window appears as you open this sample.
  2. Download the Assignment 2 Directions and Template workbook here.
  3. Follow the directions that are listed in the template.
  4. Save your document with the following name: CIS105_Assignment2_FirstName_Last Name_Date.xlsx
  5. Submit your assignment through the submission button.

Use the template to record and calculate the costs of the school materials you purchased for this quarter.

  • First, in the Title Page worksheet, enter the following information:
    • Type your name in cell B1.
    • Type in the course section you are in cell B2. (For example: CIS105111)
    • Type your professor’s name in cell B3.Type the title of the assignment in cell B4.
    • Type the title (“Excelling with Excel“) of the assignment in cell B4.
    • Rename the worksheet to “Overview.
    • Change the font type for this information to Century Gothic.
    • Change the font size for this information to 14 point.
  • Search for the school supplies you purchased at Amazon, Office Depot, Staples, or some other store.
  • Find ten supplies that you purchased. You can include textbooks, lab code fees, and paper supplies such as notepads, planners, pens, pencils, highlighters, etc.
  • Go to Sheet 3. This will be where you add your list of school supplies.
  • Type a title in cell A1. (For example: “School Supply Costs” or “My School Purchases.”)
    • Format cell A1, so the font type is Calibri Light (Headings), the font size is 20-point, and the font color is one of your choosing.
  • Enter the following labels in the cells specified:
    • Cell A2: School Supplies
    • Cell B2: Quantity
    • CellC2: Price
    • Cell D2: Total Cost
    • Make the font size 16 point and bold these labels.
  • Column A: School Supplies
    • In cells A3 through A12, enter the names of the ten (10) school supplies that you purchased. (If you didn’t buy 10 supplies, list what you would have purchased or will purchase next term.)
    • Auto fit the contents of column A so you can see the name of each supply item name.
    • Format cells A3 through A12 so the text is 16-point Calibri Light (Headings) and the font color is orange.
  • Column B: Quantity
    • In column B enter the Quantity for each of the supplies. For example, will you need four (4) notebooks?
    • Set the width of column B to 11.5”.
    • Format cells B3 through B12 so the text is 16-point Calibri Light (Headings) and the font color is brown.
  • Column C: Price
    • Enter the price for each school supply item. For example, a single notebook costs $5.
    • Expand column C so you can see all of your costs.
    • Format cells C3 through C12 so the font is Arial, the font size is 14-point, and the font color is dark blue.
  • Column D: Total costs
    • Use >the multiplication function to determine the total cost for each item.
    • Hint: In D3, the formula would be (=B3*C3).
    • Fill in cells D4 through D12 to calculate the total cost of the other supplies.
    • Format cells D3 through D12 so the font is Arial Bold, the font size is 14-point, and the font color is Dark Blue.
  • Now, rename Sheet 3 to “School Supplies.”
  • Create a pie chart:
    • In the School Supplies worksheet, select the range “School Supplies” and “Total Costs.
    • Insert a pie chart that displays the school supply items and the total cost for each item.
    • Select the pie chart view that shows the dollar amounts for each item.
    • Add a title to your chart so the title is above the chart (can be found in “Chart Formatting”).
    • Add data labels to the pie chart that shows the total price for each item.
    • Position the chart so it does not overlap with the data in column A, column B, and column C.
    • Review the assignment for accuracy.
  • Note: Delete the WK8_A2_Overview and WK8_A2_Instructions sheet before you submit this assignment for grading. (Left click on each sheet to delete.)

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using this rubric.

Recommended TestOut Desktop Pro Skills Labs to review prior to completing this assignment:

  • 3.2.4 Skills Lab: Create and Manage Workbooks
  • 3.3.5 Skills Lab: Organize and Enter Data
  • 3.5.6 Skills Lab: Format Cells
  • 3.6.4 Skills Lab: Enter Simple Formulas
  • 3.8.4 Skills Lab: Analyze Data in Charts

Recommended Lynda.com video to review prior to completing this assignment:Different options are listed based on the version of Microsoft Excel you are using (2016 vs. 2013, PC vs. Mac). Note: The Strayer student laptops come with Microsoft Excel 2016 PC version. Note: Review at a minimum the Introduction and Getting Started chapters of the video.

Helpful Videos on How to Create Charts in Excel:

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CIS 341 Week 4 Assignment 1 – Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

2023 CIS 341 Week 4 Assignment 1 Identifying Potential Malicious Attacks Threats | Assignment Collections

CIS 341 Week 4 Assignment 1 – Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

 

1.      2 – Firewalls

2.      1 – Web / FTP server

3.      1 – Exchange Email server

4.      1 – Network Intrusion Detection System (NIDS)

5.      2 – Windows 2008 Active Directory Domain Controllers (DC)

6.      3 – File servers

7.      1 – Wireless access point (WAP)

8.      100 – Desktop / Laptop computers

9.      VoIP telephone system

 

 The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

 Write a four to five (4-5) page paper in which you:

1.      Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2.      Explain in detail the potential impact of the three (3) selected malicious attacks.

3.      Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4.      Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.

5.      Explicate the potential impact of the three (3) selected concerns for data loss and data theft.

6.      Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7.      Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

·         Explain the concepts of information systems security as applied to an IT infrastructure.

·         Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

·         Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

·         Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

·         Use technology and information resources to research issues in information systems security.

 

·         Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now