Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Term Paper On The Topic ” Internet Safety For Kids”

2023 Internet Safety for Kids Paper Requirements Required topic headings for your paper should include | Assignment Collections

  ” Internet Safety for Kids”

Paper Requirements

Required topic headings for your paper should include the background surrounding the issue, a historical perspective ,current issues that are applicable ,legislation dealing with this topic ,examples, global dynamics/impact(such as issues, processes, trends, and systems),personal impact from a global perspective ,and a summary. 

Each paper should contain a reference list of at least five (5) different substantial and quality references. The references and reference citations for the term paper must be to a current eventless than 4 years old (a reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper and a reference at the end of the paper to which the reference citation applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication.

The body of the paper should be a minimum of seven typed double-spaced pages. Your cover page and reference page cannot be counted in this number. You should use the APA format for your reference citations and the reference page.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Java Programmming

2023 Modify an existing Java Web application that violates several Payment Card Industry | Assignment Collections

Modify an existing Java Web application that violates several Payment Card Industry guidelines and recommendations. Your task is to locate the issues, identify what is wrong and then fix the code. You will discuss each issue in terms of why the issue may cause a security vulnerability, and how you specifically fixed the issue.

The current code, uses Java JSP and Servlets to allow a user to login to their account and view credit card data stored in the database. The functionality is relatively simple but several PCI compliance rules have been violated that will prevent the application from being approved by a PCI software auditor.

You should first load up the application, populate the database and make sure the application is working in your environment as expected. The application uses the Java Derby relational database. The script used to populate the application is attached as well as the Java web project itself. You should be able to open the existing project using NetBeans. However; you may need to load the Derby drivers to the libraries for the project.

Once you have the database loaded, you can try the application. (This assumes you have properly installed the Java EE when you installed NetBeans).

Email:john.doe@test.edu Password: mypassword

Review the code and perform analysis as needed. You should experiment with  application as well as reviewing the code to identify possible areas of security concerns. You don’t have to be an expert in JSP/Servlets, html or css to be able to find some of the issues that you have read about in the PCI documentation. However; it is recommended you experiment with the code so you have a baseline familiarity with the model and know how the JSP and servlets communicate with each other.

Focus on the PCI compliance issues found in sections 6 through 9 (see attached jpg file) as you look for issues. There are multiple issues and you should work to fix and document as many as possible.

Submission:

Provide all of your modified Java code, your modified database script and a word document describing how you addressed each issue. You should clearly describe the code and what PCI compliance issue were violated and how you fixed it. You should provide screen captures as needed to support your findings and improvements.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Database Assignment Presentation (Group 8 – Oracle Databases (Oracle & Sun-Owned))

2023 Each group must answer the following questions in the form of an executive business | Assignment Collections

 

Each group must answer the following questions in the form of an executive business presentation. Pretend you are trying to sell the CEO of a company on why they should move their database to the assigned platform. Using these questions below as your guide, create a presentation that provides clear, concise facts. 

Use the presentation – How to presentation: How to Create a Killer Business Use Case as the basis of your presentation creation. 

QUESTIONS

Key Database- Oracle. 

  1. Introduction
  2. What are the key database products made by the vendor OR the key database platforms available under the database category (do not just use the ones listed – there are MANY MORE)? Provided by me not prof. E.g you can take Oracle is major database. But others like DB2, SQL server, Sybase, Ingress etc can add for info. 
  3. If a vendor, who are the competitors to the platform? If a database technology class, who is the clear leader and why?
  4. What industries are these database vendors tools or database technology platforms used in? Is the market increasing or decreasing for technology?
  5. What are the key features for each of these database platforms? What are differentiation compared to other database platforms in its like-kind class?
  6. Are these databases used on-premise only? Cloud-based only? Mainframe only? Explain the infrastructure use case for each of these databases that you are discussing. 
  7. Provide three (3) business uses for why a customer/client would want to use your vendors/class of database technology in their environment.
  8. What are key technical skills a data administrator or database administrator would require if they use this platform?
  9. Where do you believe this technology will be in 3-5 years?
  10. Conclusion

As you can tell, this is about a 12-15 slide presentation BUT your group still has a LOT of research to do in order to answer the questions! Your group will have a LOT OF RESEARCH. 

Focus on the facts – clear, simple facts. Do not jam EVERYTHING into the presentation. 

You MUST use APA citations (cite at the end of the presentation). 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Implementation Of A Custom-Developed Enterprise Resources Planning Solution

2023 Your organization moved forward with the implementation of a custom developed enterprise resources planning solution | Assignment Collections

 Your organization moved forward with the implementation of a custom-developed enterprise resources planning solution. After several issues, extensive time spent troubleshooting, and failed user adoption, the implementation was deemed unsuccessful and management decided to continue with the old legacy system.

Management is concerned about future implementations, as the failed one cost considerable financial and personnel resources. Management wants to understand the issues so the failure is not repeated in the future. They have asked you to explain the types of things that can cause a seemingly well-planned implementation to fail. Provide an explanation and at least one example of an implementation that failed in the real world, including lessons learned from that failure.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 An Evaluation of Information Systems’ Analysis and Design for Organisations

2023 Assignment front sheet Please quote for task 2 3 4 only Qualification Unit number and Title Pearson BTEC Level | Assignment Collections

Assignment front sheet Please quote for task 2,3,4 only Qualification Unit number and Title Pearson BTEC Level 5 HNC/HND Computing and Systems Development HNCS 130 Information Systems in Organisation Student Name Assessor Internal Verifier Date Issued Submission Deadline for Task-1 Submission Deadline for Task-2 Submission Deadline for Task-3 Submission Deadline for Task-4 Assignment title An Evaluation of Information Systems’ Analysis and Design for Organisations (130) Learning Outcome Learning Outcome Assessment Criteria In this assignment you will have the opportunity to present evidence that shows you are able to: Task no Evidence (Page no) LO1 Understand information needs within different functional areas of organisations 1.1 evaluate the information needs of the different functional areas of an organisation 1 LO2 Be able to compare information systems 2.1 describe different types of information systems 2 2.2 investigate the current trends in using information systems applications to solve business problems 2 2.3 evaluate the suitability of information systems for different functional areas of an organisation 2 LO3 Be able to use information systems to produce management information 3.1 use an information system to generate valid, accurate and useful information for a given problem 3 3.2 evaluate alternative methods of solving the problem 3 Learner declaration I certify that the work submitted for this assignment is my own and research sources are fully acknowledged. Student signature: Date: Guidelines for assignment submission The unit has 4 tasks.Please read ALL tasks carefully. Each Assignment has its own submission date. Please submit all Assignments ON TIME. Only ON TIME and EEC submission will be considered for a MERIT and DISTINCTION grade. All tasks MUST be submitted on time to be considered for a MERIT grade. The attendance percentage and participation in class…

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Data Structures Assignment

2023 hw3 set h CSc 212 Data Structures Summer 2013 set class for homework 3 implemented | Assignment Collections

// hw3_set.h // //CSc 212: Data Structures (Summer 2013) // set class for homework 3 // –> implemented using B-Trees // –> adapted from code written during lectures (7/1/03 – 7/3/03) namespace HW3 { class set { public: typedef int T; set() {entry_count=0; child_count=0;} bool insert(const T&); bool search(const T&); bool remove(const T&); void print(); private: static const int MIN = 3; static const int MAX = 2*MIN; T data[MAX+1]; int entry_count; set* subset[MAX+2]; int child_count; bool is_leaf() {return (child_count == 0);} bool loose_insert(const T&); void fix_excess(int); bool loose_erase(const T&); void remove_biggest(T&); void fix_shortage(int); }; } // end namespace HW3

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 assign 3

2023 Assignment Instructions In order to complete Assignment 3 you will need to answer the below questions Please complete | Assignment Collections

Assignment Instructions

In order to complete Assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday. 

  1. Explain why hackers think that the tern “hacker” does not refer to criminals.
 
  1.  
  1. Should corporations hire hackers to help implement and/or test security? Please be sure to justify your answer. 


Assignment Rubric ( 100 Points) 
Synthesis of Concepts 60
Writing Standards – APA format 20
Timeliness 20

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 **JAVA** For This Project, You Are Going To Write A Program To Find The Anagrams In A Given Dictionary For A Given Word. If Two Words Have The Same Letters But In Different Order, They Are Called Anagrams. For Example, “listen” And “silent” Are A Pair Of

2023 For this project you are going to write a program to find the anagrams in a given | Assignment Collections

 

For this project, you are going to write a program to find the anagrams in a given dictionary for a given word. If two words have the same letters but in different order, they are called anagrams. For example, “listen” and “silent” are a pair of anagrams.

**JAVA**

First let’s focus on “LetterInventory.java”.

Its purpose is to compute the canonical “sorted letter form” for a given word.

1. Implement the constructor, which takes the String input word. You can assume that the input word contains only valid letters (e.g. no punctuation or blanks), but it may contain letters in different cases.

2. Implement the method: public String getCanonical() It should return the canonical “sorted letter form” for the input word (given in the constructor). It should use only lower cases. For example, if the given word is “AliBaba”, then this method should return “aaabbil”.

****I have already completed all of the above tasks I am struggling with the next part****

**below is the code I have for LetterInventory.java**

import java.util.*;

public class LetterInventory {

   private String input;
 

    //stores the original word.
 

    public LetterInventory(String input) {
        this.input = input;
    }
    //uses an array of chars to hold word and sorts it into alphabetical order.
    //displays it in lower case.
    public String getCanonical() {
        input = input.toLowerCase(); // converting input to lower case
        char [] word = input.toCharArray();
        Arrays.sort(word);
        String sorted = new String (word);
        return sorted;
 

    }
}

*** this is where i am stuck ***

Once “LetterInventory.java” is working as expected, we can now focus on “AnagramFinder.java”. It will read an input “dictionary” file, which contains quite many words, to build a map. The “key” for the map is a word’s canonical form, the “value” for the map will be all the words in the given dictionary that share the same canonical form. For example, if both “listen” and “silent” are in the dictionary, one entry in the map would have key as “eilnst” and value as an ArrayList of words “listen” and “silent”.

Implement the constructor, which takes in the input dictionary file and build the map. You can assume the words in the dictionary contain only valid letters. You should take advantage of “LetterInventory”.

3. Now implement the method: public void printAnagrams(String word) It should try to search the anagrams for the given word in the map. Again, you can assume the input word contains only valid letters, and you should take advantage of “LetterInventory”.

Print out any anagrams found. For now, don’t worry about the case where the input word is the same as the word inside the dictionary, just print them out.

Here is some sample print out:

Your input is: silent. Found anagrams: listen, silent, tinsel.

Your input is: AliBaba. Sorry, didn’t find any anagrams.

A sample main method is already written for you to test various functionalities with some sample input words.

*** Below is the shell for the main method ***

import java.io.*;
import java.util.*;

public class AnagramFinder {
    public static void main(String[] args) throws FileNotFoundException {
        String[] originals = new String[] {
            “realfun”,
            “mias”,
            “EVIL”,
            “unable”,
            “Silent”,
            “AliBaba”
        };

       for(String original: originals) {
            LetterInventory inv = new LetterInventory(original);
            System.out.println(“Original: ” + original + “, Canonical: ” + inv.getCanonical());
        }

       System.out.println(“n”);

       File f = new File(“HW_sample_dict.txt”);
 

        AnagramFinder finder = new AnagramFinder(f);

       for(String original: originals) {
            finder.printAnagrams(original);
        }
    }

   public AnagramFinder(File f) throws FileNotFoundException {
       //TODO implement  
    }

   public void printAnagrams(String word) {
        //TODO implement
    }

   public void printAnagrams2(String word) {
        // Extra Credit: optional to implement
    }
}
 

** can leave out extra credit part i just need help with the first 2 methods in the main file **

** the dict.txt is 400 pages long so I did not include it (the file just contains thousands of words) **

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Research Based Postition Paper

2023 Prepare an 8 page APA style paper using the resources you have read in this course and at least | Assignment Collections

 

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

  • References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions (even initial discussion posts)
  • Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write more than the minimum requirement of the word count assigned
  • As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CIS 524 Week 8 Assignment 3, Direct Manipulation

2023 CIS 524 Computer Interaction and Design Strayer Early computer systems relied on command line interfaces to perform all | Assignment Collections

CIS 524 Computer Interaction and Design – Strayer

Early computer systems relied on command line interfaces to perform all actions. Today, the majority of systems use direct manipulation rather than a command line interface. The goal of designing a direct manipulation interface is to make use of the system intuitive to the end user. One industry that has been extremely successful designing intuitive direct manipulation inputs is the video game industry. Most game players are able to learn controls as they play a game and then apply the same controls to similar games. Rarely do they need to read a user manual.

 

Write a four to five (4-5) page paper in which you:
1.Describe the three (3) principles of direct manipulation and give examples as to how they are used in video game controls.
2.Analyze video game-type interfaces and discuss three (3) reasons why video game-type interfaces would not be effective for real-world applications.
3.Describe at least three (3) advantages of direct manipulation versus command line interfaces.
4.Evaluate direct manipulation and describe three (3) problems with it.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now