Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 PHP Date And Time

2023 Using the sources provided you are to add functionality to search for all blogs written before a specific | Assignment Collections

Using the sources provided you are to add functionality to search for all blogs written before a specific date. The framework for the assignment is set for you

      user.html                       Contains the HTML to prompt for a date

      blog_user.php               PHP code to parse the html form and call the function to search by date

     blog_db_interface.php  PHP code to perform the search

You will need to

      blog_user.php     

               Convert the date to a unix time stamp using strtotime()                         10 points

               Verify the strtotime return value. On error throw an exception              10 points

               Convert the unix time stamp to a date and time string using date()       10 points

               Verify the date functionality. On error throw an exception                      10points

               If all is OK then call the function to peform the search

     blog_db_interface.php

               Implement the SQL query to perform the search and display the results    

               Process errors from calling  “prepare”,  “execute” and “bind_results”

                            All errors should result in an exception thrown                                 10 points

               Search result should display “Blogger’s name”  “Blog Summary”                  10 points

What to turn in (as a single ZIP)

        Submit your modified source files: blog_user.php and  blog_db_interface.php       

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Python Programming

2023 Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins from | Assignment Collections

Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

Document your program – to include your name, course, date written, and the formulas used in the conversions.

Instruct the user on how to enter the data requested.

You must use the IF, ELSE, ELIF statements or a combination of these statements.

Required output – temperature entered, converted temperature, and the exact phrase “This program was written by <place_your_name_here>.”

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 current affairs report

2023 Here is the current affairs assignment I for this term Please write an analysis report | Assignment Collections

Here is the current affairs assignment I for this term:

Please write an analysis report about the recent hacktivist group “Anonymous” attack on Department of Justice In the report, please answer the following questions:

1- What type of attack was launched on DOJ?
2- What was compromised or breached?
2- How was the attack accomplished if known?
4- Your own analysis and feedback about the attack?

 

Submission Instructions:

The report must be at least 5 pages not including the cover and reference pages and must follow the APA style. You must include at least 3 references.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Network Security : IP Security & Malicious Software

2023 Do the following review questions 9 1 Give examples of applications of IPsec 9 2 What services are provided by IPsec | Assignment Collections

 

Do the following review questions:

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Submit a Microsoft Word document 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CMGT 582 Week 6 Comments and Post

2023 Hi Tutors I want only Computer Science tutors if you are please do not send | Assignment Collections

Hi Tutors….

 

I want only Computer Science tutors…. if you are please do not send handshake please.  I am in need a great tutor to make comments and post to other classmates.  I need a total of 12 comments apart of the discussion on various topics.  Not set amount within the comments but substantial comments on various topics.  Credentials will be provide once selected.  I need them to posted today as quickly as possible.  If you quote than provide references.  I can answer any questions.

 

thanks in advance.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Benchmark – Framework Compliance Assessment Report

2023 Using all of the previous assignment information students will create a Cybersecurity | Assignment Collections

 

Using all of the previous assignment information, students will create a Cybersecurity Risk Report that helps their proposed business manage cybersecurity risks.

Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.

2.3: Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic initiatives.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 iLab 6 130935

2023 In the Group Project lecture for this week we looked at how to use an Oracle form that works within | Assignment Collections

In the Group Project lecture for this week, we looked at how to use an Oracle form that works within the Citrix environment. If you have not downloaded the form (SAI430_Form.ZIP) and read through the form description under the Group Project tab for this week, please complete that before you proceed with this lab.

Each of the C# projects you will be building in this week’s iLab should be on the Q: drive in your directory SAI430_### where ### is your number that was assigned to you at the beginning of the course

In this lab, you will execute the form and generate the output files. The customer information form will generate a single XML file, customerlab6.xml, containing as many customer records as you wish to enter. The customer order portion of the form will generate two sequential files based on the data that is entered. The first file,Lab6TestOE.txt, is the order file and the second file, Lab6TestOL.txt, is the order line file containing the actual items ordered. It is possible to enter multiple orders while the form is open.

Deliverables

You will be generating a set of three files during this lab. The first file will be an XML file containing at least two customer records, customerlab6.xml. The second and third files, Lab6TestOL.txt and Lab6TestOE.txt will be sequential files that contain the order information for one of the customer records contained in the XML file. All three files will need to be submitted for a grade in this lab. Place all three files in a single ZIP file and submit that file to the Dropbox for this lab.

iLAB STEPS

STEP 1: Setting up the User Input form

Back to Top

The files from the user interface must be written to the directory that you have access to on the Q: drive. It will be necessary for you to change three file paths that currently exit in the code for the form. Each file path will need to point to Q:sai430_###filename where ### is your number that was assigned to you at the beginning of the course. All three of these files will be accessed by Oracle procedures so it is imperative that the files be in this directory. The following is a sample in Form.cs of the code that will need to be changed:

namespace SAI430_FORM
{
 /// <summary>
 /// Summary description for Form1.
 /// </summary>
 public class Form1 : System.Windows.Forms.Form
 {
        string path = @"Q:sai430_###customerlab6.xml";

In Form.cs you also need to search for the strings:

"Q:SAI430_###Lab6TestOE.txt"

and

"Q:SAI430_###Lab6TestOL.txt"

and change them to reflect the correct directory.

Once you have made these changes then you will need to compile the form and make sure that it will execute. IMPORTANT: As with previous C# applications for this course, you will need to make sure that it is built with the proper settings for the project (must be 32-bit and trusted). You can refer back to Lab 1 if you need to for how to set this up.

STEP 2: Testing the Form and Verifying the Files

Back to Top

You will want to create at least one customer and related order for the lab. When complete, you should have one XML file for the customer (named customerLab6.XML) record and two text files (named Lab6TestOE.txt and Lab6TestOL.txt) for the Order and Order Line data. You can tab through the form and you can refer back to the lecture material for this week that will explain more of the functionality of the form.

Once finished, open the files on the Q: drive and verify that the data is there (I would suggest right clicking on the XML file and select to open it with Notepad). Once you have verified that the data is there and correct then place all three files in a ZIP file to be submitted for a grade.

STEP 3: Setting up the Remaining Applications

Back to Top

There are two C#.NET applications that you have not set up yet that need to be added to your list of applications at this time. You do not need to do any coding for either of these applications, but you will need to change some directory paths in both so that they will write files to the correct place. You will also need to make a minor change to the login path for one of the applications and test the connection to make sure you can access the Oracle database.

The TRANS_APP C#.NET application – This application will pull the order data from the Oracle database and generate the order file that will be read and processed by the Transaction Processing application (MainTrans) that you will modify next. To set up this application you will need to change a file path and reset the connection user ID for the Oracle database.

  1. Download the trans_app.ZIP file from Doc Sharing. Copy the file to your directory structure on the Q: drive of the Citrix server and extract the file to your SAI430_### directory structure. It will automatically set up the additional folders for the application.
  2. Open the project up in Visual Studio. The first thing that you need to do is change the user id for the Oracle login and then set up the connection. To do this, you need to first change the ID in the connection string that can be found in the code section. Find the code “string conString” and change the userid and password to what you use to log into Oracle. You will also need to change the Data Source listing to ORACLE.
  3. Next, you need to change the path that will be used to write out the order file (named trans_file.txt). Change the path to show your directory structure on the Q: drive that you have been assigned.
  4. Now, build the application and you are finished with this application for now.

IMPORTANT: Like the applications in Labs 1 and 3 this application must be built as a 32-bit application. Refer back to Lab 1 if you need to for instructions on how to do this. DO NOT build it with the security settings as a trusted application as you did in Labs 1 and 3.

The mainTrans C#.NET application – This is the main processor for the system and will only require that you change a few directory paths to make sure that it writes files to the correct place. To set up this application and make the directory changes you will need to follow these steps.

  1. Download the MainTrans.ZIP file from Doc Sharing. Copy the file to your directory structure on the Q: drive of the Citrix server and extract the file. It will automatically set up the additional folders for the application.
  2. Open the project up in Visual Studio. In the Solutions Explorer, you will want to expand the IO folder in the solutions list.
  3. Double click on the CompletedOrdersFile.cs icon to place the code contents in the editor window. Change the path for the file to point to the Q:SAI430_###. Make note of the file name, as you will need to know this later. Repeat this process for NonCompletedOrderFile.cs. These files must end up on the Q drive because they will be read by an Oracle procedure.
  4. Now, double click on the InventoryInputFile.cs and change the file path in this class to indicate your directory path on the Q: drive. Repeat this process for InventoryUpdateFile.cs and OrderFile.cs. Again, make sure you are keeping note of the actual file names each time.
  5. Now, you will need to build the MainTrans application. IMPORTANT: Like the applications in Labs 1 and 3 this application must be built as a 32-bit application with the security settings for a trusted application. Refer back to Lab 1 if you need to for instructions on how to do this

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Digital Forensics

2023 1 Define several forms of metadata that can be useful to an investigation How are | Assignment Collections

1. Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? (250 words)

2. Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search? (250 words)

3. Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. (Chapter11) (250 words)

Use your own words. Attach your WORD document here.

Expecting by tomorrow 2/8/2021

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Question 17

2023 Projects that conform to the Agile methodology often use something called a | Assignment Collections

  

Projects that conform to the Agile methodology often use something called a scrum board. You can think of a scrum board as a digital whiteboard containing yellow “stickies,” each listing a task, posted beneath categories such as “to do,” “in process,” in testing,” etc. Using a scrum board in this way allows all project members to see where important tasks are in the overall project process quickly and easily.  

For this Learning Team assignment, you will collaborate with your team members to create an Agile scrum board based on the Global Treps project from the Wk 2 Team assignment (see below).

Note that in an industry situation, you would most likely use a specialized software tool to manage your scrum board such as Jira, Rally, Asana, or Basecamp. However, in this course, you will be using a tool that you may already be familiar with—Microsoft Excel—to create your scrum board and other deliverables. It is the organization and assignment of tasks that is important about a scrum board, not the specific software tool you use to create and manage it. 

To complete this Learning Team assignment: 

Reread the Global Treps Scenario that you read in the Wk 2 Team – Apply assignment.

Review the Learning Team Scrum Board Example spreadsheet. (Note: Click the Board tab that appears at the bottom of the spreadsheet to see the scrum board example.) 

Create a scrum board in Microsoft Excel format, similar to the linked example, to align with the project scoping document your team created in Wk 2. Ensure that your finished scrum board incorporates a project budget.  

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Data Stewardship

2023 As more and more data are collected stored processed and disseminated by organizations new and | Assignment Collections

As more and more data are collected, stored, processed, and disseminated by organizations, new and innovative ways to manage them must be developed.

·         Discuss how the data resource management methods of today will need to evolve as more types of data emerge.

·         Why is the role of a data steward considered innovative? Explain.

Discussion Continued: When it comes to telecommunication network installation and management, as a business manager, you have to make a crucial decision to choose between hiring an expert to do the work or do it yourself.·         Which choice is better, and why? What criteria should be considered in making that decision?

 

Only looking for around 300 words

M

 

 

 

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now