You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is […]
Discipline: Computer Science
In this project, we will design and implement a database for an online university bookshop.In this project, we will design and implement a database for an online university bookshop.
Each book has a book id, a title, an author, a price, and an amount (amount of books in stock). • For every student, we must capture her/hisstudent id, name, gender, major, and discount level. • When an order is successfully placed by a student, an order record should be added to the database. Each […]
Greatest threats to your online privacy/security and the moral/ethical ramifications of those threats.Greatest threats to your online privacy/security and the moral/ethical ramifications of those threats.
write a paper or create a presentation detailing your research and explaining your opinions on the greatest threats to your online privacy/security and the moral/ethical ramifications of those threats. Discussion should include ways to minimize these threats. Multiple citations must be referenced, from a variety of information sources. Minimum of 5. Create an outline in […]
computer science- everything explained instructions-it should be about 175 wordscomputer science- everything explained instructions-it should be about 175 words
As a computer and networking consultant to small businesses, you are frequently asked to find solutions to increasing demands for network and Internet access at a business. One business rents offices in a historical building that has strict rules for wiring. They have come to you asking for a solution for providing Wi-Fi access to […]
Need a working and full functional code for the project- “Hand writing recognition of English alphabets”Need a working and full functional code for the project- “Hand writing recognition of English alphabets”
The main objective of this project is to recognize handwritten characters of English alphabets from A to Z using this dataset from the website- https://www.kaggle.com/datasets/sachinpatel21/az-handwritten-alphabets-in-csv-format/code Skill sets required- Python, Datascience, and Machine Learning. I only need the working code and the output with the following details 1) I will be giving either single or multiple […]
a research essay on an approved computer security or privacy topic topic (see page 3 for a list of approved topics)a research essay on an approved computer security or privacy topic topic (see page 3 for a list of approved topics)
Security Paper Instructions and Grading Rubric You are to write a research essay on an approved computer security or privacy topic (see page 3 for a list of approved topics). Your essay must include a work cited page for any information that you find from at least three sources (your book can count for one […]
Capstone research paper and Power Point Presentation for the Project: Handwriting Recognition. Python Language basics needed.Capstone research paper and Power Point Presentation for the Project: Handwriting Recognition. Python Language basics needed.
Project: Handwriting Recognition. Total 20 Pages Cover page Reference list page (Total 10 References) Literature review page (10 Pages) Eight pages about the project. (This can include the screen print, figures/tables, code, etc.) Total cover page + Literature review + project details + Reference list (1 + 10 + 8 + 1): Total 20 Pages […]
Case study, Computer consultancy, regarding developing a chat program for a company,Case study, Computer consultancy, regarding developing a chat program for a company,
Case assignment This summer, the consultancy company “Aviory” will start a new project called “Aviory Live Chat”. Aviory will deliver the chat solution for the company Elkjøp. The main reason why Elkjøp chooses to buy a customized live chat from Aviory is to get it exactly as they want. The purpose of Elkjøp’s live chat […]
Differentiating the three types of transparency discuss in Week 10 is supposed be useful for addressing problem surrounding the statu of opaque systems with respect to justice in civil society. Critically examine this claim by arguing by Week 11lecture.Differentiating the three types of transparency discuss in Week 10 is supposed be useful for addressing problem surrounding the statu of opaque systems with respect to justice in civil society. Critically examine this claim by arguing by Week 11lecture.
Instructions In 750 words or fewer, write a complete introductory section to an argumentative essay that is responsive to one of the following prompts. Differentiating the three types of transparency discussed in Week 10 is supposed to be useful for addressing questions surrounding the status of opaque systems with respect to justice in civil society. […]
Write a program that prompts the user for the number of miles driven and the gallons of gas used. Your code should then calculate the car’s MPG and display the result.Write a program that prompts the user for the number of miles driven and the gallons of gas used. Your code should then calculate the car’s MPG and display the result.
In class this week we started Python programming. Please review the slides entitled Phyton Basics then rewrite the code for the Calculator App in www.repl.it. Based on your understanding of the Calculator App you will complete the Miles Per Gallon Assignment. Once completed, you will copy your code, paste into notepad, word or google doc […]