Computer Programing

In 250 words or more, answer the following.

There are multiple types of branches that we regularly use in our code.  For our discussion this week, I would like you to teach another student about branching.  What is it?  Why is it important?  What is a boolean expression?  These are the types of conversations I want to have this week.  I do NOT want you to just Google the definition of an IF ELSE statement and share it.  Let’s actually teach each other how to do it.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4 Discussions and 2 Case Study

Discussion 5.1

Why is are intellectual property laws so important?  Do you think  they are important or should be do away with these laws?  

Discussion 5.2

What are patents and how are they used?  Are all patents the same? What is the difference between a trademark and a copyright?  

Discussion 6.1

What are shrinkwrap, clickwrap, and browsewrap agreements?  Why are they used and can you provide examples of each?  

Discussion 6.2

Why would you include an information security provision in a contract? 

Discussion 7.1

List and explain several types of policies that can be used to govern information security.  

Discussion 7.2

Briefly describe the risk assessment process?  What are the steps to handling risks?  Feel free to provide your own example of how you have handled risk situations that you’ve had to deal with.  

Case Study 5.1

Write a 3 to 4 (not including title or reference page) page paper that describes some your state laws protecting data or security of personal information (the state you live in ,have lived in, or want to live in).  First, list the state you chose.  Then provide the name and a brief description of the law, to include when it was enacted, punishment if not followed, and who/what the law protects.  Make sure you follow the grading rubric and write your paper in APA format.  Cite all sources appropriately. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited

Case Study 6.1

Conduct research and write a 3 to 4 page paper giving examples of a tort law case and a criminal law case. Make sure you adhere to the grading rubric and write your paper in APA format.

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Application Portfolio Management (APM)

Application Portfolio Management (APM)

After reading the Application Portfolio Management (APM) section, page 276, Chapter 18 (Book: IT Strategy: Issues and practices, McKeen, J. D., & Smith, H. A., Pearson, 2015, Third Edition) , complete and upload one to two pages your reflection on the benefits of APM.  Due by Sunday, 7/25/2021, 11:59 p.m. EST.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 1-2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of 3 peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DATABASES QUESTIONS

QUESTION 1

 Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy if appropriate. Two-Bit Drilling Company keeps information on employees and their insurance dependents. Each employee has an employee number, name, date of hire, and title. If an employee is an inspector, then the date of certification and certification renewal date should also be recorded in the system. For all employees, the Social Security number and dependent names should be kept. All dependents must be associated with one and only one employee. Some employees will not have dependents, while others will have many dependents. 

 Make sure that the file is saved as ch5_problem1_deleon.doc

————————————————————-

QUESTION 2

 Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy if appropriate. Tiny Hospital keeps information on patients and hospital rooms. The system assigns each patient a patient ID number. In addition, the patient’s name and date of birth are recorded. Some patients are resident patients who spend at least one night in the hospital, and others are outpatients who are treated and released. Resident patients are assigned to a room. Each room is identified by a room number. The system also stores the room type (private or semiprivate) and room fee. Over time, each room will have many patients. Each resident patient will stay in only one room. Every room must have had a patient, and every resident patient must have a room. 

Make sure that the file is saved as ch5_problem2_deleon.doc

——————————————————————————————————

QUESTION 3

 Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy if appropriate. Granite Sales Company keeps information on employees and the departments in which they work. For each department, the department name, internal mail box number, and office phone extension are kept. A department can have many assigned employees, and each employee is assigned to only one department. Employees can be salaried, hourly, or work on contract. All employees are assigned an employee number, which is kept along with the employee’s name and address. For hourly employees, hourly wages and target weekly work hours are stored; for example, the company may target 40 hours/week for some employees, 32 for others, and 20 for others. Some salaried employees are salespeople who can earn a commission in addition to their base salary. For all salaried employees, the yearly salary amount is recorded in the system. For salespeople, their commission percentage on sales and commission percentage on profit are stored in the system. For example, John is a salesperson with a base salary of $50,000 per year plus a 2 percent commission on the sales price for all sales he makes, plus another 5 percent of the profit on each of those sales. For contract employees, the beginning date and end date of their contracts are stored along with the billing rate for their hours. 

Make sure that the file is saved as ch5_problem3_deleon.doc

—————————————————————————————————

QUESTION 4

Modify the design shown in Figure 4.35 to include these business rules:

  • An employee could be staff, a professor, or an administrator.
  • A professor may also be an administrator.
  • Staff employees have a work-level classification, such as Level I or Level II.
  • Only professors can chair a department. A department is chaired by only one professor.
  • Only professors can serve as the dean of a college. Each of the university’s colleges is served by one dean.
  • A professor can teach many classes.
  • Administrators have a position title.

Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes. 

SEE ATTACHED FILE : https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image044.gif

Make sure that the file is saved as ch5_problem4_deleon.doc

——————————————————————————————————-

QUESTION 5

 Tiny College wants to keep track of the history of all its administrative appointments, including dates of appointment and dates of termination. (Hint: Time- variant data is at work.) The Tiny College chancellor may want to know how many deans worked in the College of Business between January 1, 1960, and January 1, 2018, or who the dean of the College of Education was in 1990. Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes.
 

Make sure that the file is saved as ch5_problem5_deleon.doc

———————————————————————————————————–

QUESTION 6

 Some Tiny College staff employees are information technology (IT) personnel. Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both. IT personnel are not professors; they are required to take periodic training to retain their technical expertise. Tiny College tracks all IT personnel training by date, type, and results (completed versus not completed). Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes. 

Make sure that the file is saved as ch5_problem6_deleon.doc

———————————————————————————————————

QUESTION 7

The FlyRight Aircraft Maintenance (FRAM) division of the FlyRight Company (FRC) performs all maintenance for FRC’s aircraft. Produce a data model segment that reflects the following business rules:

  • All mechanics are FRC employees. Not all employees are mechanics.
  • Some mechanics are specialized in engine (EN) maintenance. Others are specialized in airframe (AF) maintenance or avionics (AV) maintenance. (Avionics are the electronic components of an aircraft that are used in communication and navigation.) All mechanics take periodic refresher courses to stay current in their areas of expertise. FRC tracks all courses taken by each mechanic—date, course type, certification (Y/N), and performance.
  • FRC keeps an employment history of all mechanics. The history includes the date hired, date promoted, and date terminated. Given those requirements, create the Crow’s Foot ERD segment.

Make sure that the file is saved as ch5_problem7_deleon.doc

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cache in Internet browser

 Speaking of Digital Forensics, in your opinion, why is it important to check cache and Internet Browser history while examining or analyzing a workstation?  Please, comment on two other classmates in order to receive full credit for this assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 3

Based on your Week Three Learning Team Collaboration discussion, write a 1- to 2-page technical document on how files and folders are protected on Wadley, Inc.’s network. This will become part of the final install, configuration, and support plan for Wadley, Inc.

Include the installation and management of printers, disk management, physical drive options, redundancy, and disk backup plan.

Explain how Group Policy will be utilized. 

Format according to APA guidelines.

Submit your assignment to the Assignment Files tab.

Materials

Learning Team Collaboration: Wadley, Inc., Windows® Installation, Configuration, and Support Plan

Complete Exercises 1, 2, and 3 within the Practice Lab this week titled, “Create Group Policy Objects”.

Complete Exercises 1, 2, and 3 within the Practice Lab this week titled, “Configure Security Policies”.

Complete Exercise 2 within the Practice Lab this week titled, “Configure Windows Firewall”.

Take screenshots of the steps that you completed to finish each of the above exercises.

Paste your screenshots into a Microsoft® Word document.

Write a 1-page summary of how you would use the information and skills learned in the Practice Labs as a Network Administrator.

Submit the assignment to the Assignment Files tab.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

For Kim Woods Only

 

Assignment 1: Cloud Computing
Due Week 3 and worth 110 points

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization.
Select two (2) organizations in which you are interested, and use the Internet and Strayer Library to research the advantages and disadvantages of cloud computing for the selected organizations. Use the Internet to research the characteristics of organizations most likely to use cloud computing.

Write a three to four (3-4) page paper in which you:

  1. Determine whether or not there are definite characteristics of organizations that are more likely to use cloud computing than other organizations. Provide a rationale for your response.
  2. Examine the major advantages and disadvantages of cloud computing for the two (2) selected organizations. Recommend whether or not each of the selected companies should use cloud computing. Provide a rationale for your response.
  3. Determine whether or not government agencies such as the National Security Agency (NSA) or Central Intelligence Agency (CIA) would be good candidates for cloud computing. Provide a rationale for your response.
  4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ASSIGNMENT INFORMATION. DUE IN 8HRS

I have attached the hw3 template. I need it soonest possible.

A prefix expression is one where each operator appears before its two operands.  For example the fully parenthesized infix expression ( ( ( a + b) / (c+d) ) * (e / f) ) becomes the prefix expression  *  /  +  a  b  +  c  d  /  e  f.  The object of this assignment is to write a program to convert a fully parenthesized infix expression to its equivalent prefix expression. Assume the input infix expressions consist only of variables a through z, operators +,  -,  *, /   and parentheses ‘(‘, ‘)’ .  Use the following algorithm:

(1) Create three stacks of characters: stk1, stk2, stk3.

(2) Read the input infix expression one character at a time and push every character read ( other than ‘)’  ) onto stk1. Do not push the character read if it is ‘)’.

(3)  As long as stk1 is not empty, do the following:

           Fetch the top character ( call it c ) of stk1 and pop stk1.

           if c is an alphabetic character (a-z),  push it onto stk3. (You can use the function islower(c) to test if character is one of a-z.)

           if c is an operator,  push it onto stk2.

           if c is ‘(‘ then fetch the top character of stk2, push it onto stk3, and pop stk2.

(4)  Print stk3 top to bottom by repeatedly fetching the top of stk3, printing it, and popping stk3, until stk3 is empty.

There is starter code in folder Hwk3 in your course folder on comsci.  Open the project file Hwk3.cbp in codeblocks and complete the program hw3.cpp in that project.

The program uses the class template stack from the standard C++ library. Check the examples on the slides for how to push, pop, and check for empty stack.

Do not submit through Blackboard!  Just leave everything in the homework folder.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network intrusion discussion

 Instructions: Research by finding an article or case study discussing the following computer crime/incident: “Network intrusions”. and use at least 500 words to summarize it. You will be graded on Content/Subject Knowledge, Critical Thinking Skills, Organization of Ideas, and Writing Conventions.

Number of Pages: 2 Pages

Deadline: 2 days

Academic Level: College

Paper Format: APA
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

There was a time that if you wanted to work in digital forensics you had to work for the FBI Crime Lab. There are many more options now. A number of private investigation firms offer digital forensics services, each with different focuses and varying qual

For this assignment;

1. Research three private investigation firms that offer digital forensics services.

2. Describe each company.

3.Describe the services each one provides.

4. Describe each firm’s clients.

5. Describe the qualifications/certifications each firm holds

putting into consideration required resources such as course textbook, Internet, in microsoft word,  Font; Arial, Size 12, Double Space, Citation; MLA style, length; 5 pages. FINALLY NO NO PLAGIARISM . i need KIM WOODS TO HANDLE THIS RESEARCH.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now