[SOLUTION] Functions Program

In this assignment you will write functions for two programs (Program 1 and Program 2) that will include your functions. Each program will be well documented (commented) and submitted in a separate document. Program 1 First write functions for the following: A function “circleArea (radius)” that returns the area of a circle having the given radius. (The formula is A = ?r^2 .) A function “circlePerimeter(radius)” that returns the perimeter of a circle having the given radius. (The formula is P = 2?r .) Then write a main program that uses these functions to compute the area and perimeter of a circle given the radius. The program should prompt the user for the radius and then print out the area and perimeter. A sample run for the program is as follows: Enter the radius of the circle: 5 Area of the circle is 78.5 Perimeter of the circle is 31.4 Program 2 Write a function to compute the nth number of the following series: Given a value x, multiply all the non-zero digits of x together and then add that value to x to get the next number in the series. The function should be named: some_series. 1, 2, 4, 8, 16, 22, 26, 38, 62, 74, 102, 104, 108, 116, 122, 126, 138, 162, 174, 202, 206, 218, 234, 258, 338, 410, 414, 430, 442, 474, 586, 826, 922, 958, 1318, 1342, 1366, … Write a main program that prompts the user to enter “n” and prints out the nth number of the series. A sample run for the program is as follows. Enter a positive integer: 6 The 6th number of the series would be 22

Read more

[SOLUTION] Use of Data Management by Trello

Research and critically analyse the use of data management by Trello. Analysis needs to include examination of both successful and any unsuccessful strategies. (textbook link provided).   A succinct report must specify:  Objective(s) and strategies of data management by the platform, [Context]  Technical provision of data management capabilities, [Infrastructure]  Assessment of the function of the platform’s data management systems [Application]  Critical assessment of the impact of the platform’s data management strategies. [Application]                                                                      Format: Introduction: * Define your understanding/ definition of Data, information & Social Media  * What (aspect of) data management are you targeting?  * What are the concepts you’re about to expand?  * Role of Data in your chosen platform * Purpose of data flow (what are the business objectives? ostensible Goal: connected user + what?, entertainment economic growth, disrupt markets?). (What is the underlying goal, make money + what? )  * Form of new data flow (new data created? existing data converted to information) Section 1: * Role of data in your chosen platform * Purpose of data flow (what are the business objectives? ) (Ostensible Goal: connected user + what?, entertainment economic growth, disrupt markets?). (What is the underlying goal, make money + what? )  * Form of new data flow (new data created? existing data converted to information) Section 2:  * Suport data information flow throughout the platform  * Data related functions (how is the knowledge management value chain supported?) (Hunt: track the devices)  * How does the platform fulfil its strategies  Section 3: * Start with the ‘four dimensions’ of knowledge in an organisation * How is the knowledge management value cycle supported within the business?  * Knowledge management systems (enterprise- wide) KMS, KWS, intelligent techniques * Decision making supported? (users, managers/ employees)  * Business intelligence and business analytics  Section 4:  * What is the broader impact on the platforms strategies?  * Ecosystem impact: Competitors, new market entrants  Must include: Demonstration of a sound knowledge of storing, managing, and processing data to yield relevant information in an information system, with focus on both business process and information technology  Demonstration of an understanding of the role business intelligence (BI) and business analytics (BA) play in adding value to a business.4944503 minutes agoCLOUD COMPUTING, COMPUTER SCIENCE  EXPERIENCE PREFERRED and PAID MORE FOR

Read more

[SOLUTION] Growth of Biometrics Authentication

Your research proposal will be based on Growth of biometrics authentication and its effectiveness in information security post 9/11 Terrorist Attack. The essential criteria include the seven undergraduate security management program learning outcome objectives: CO-1: Identify organizational security risk exposure; identify cost-effective mitigation strategies; and prepare for recovery strategies. CO-2: Employ the use of risk analysis and vulnerability assessment processes. CO-3: Critically examine the variety and extent of losses from criminal acts, natural disasters, and security breaches facing society. CO-4: Analyze or compare and contrast concepts of information security, personnel security, and physical security and determine the planning approaches to prevent business losses. CO-5: Analyze the trends affecting security and loss prevention and determine the approaches to reduce losses facing businesses and institutions. CO-6: Evaluate, from a multi-disciplinary approach, non-traditional approaches to crime prevention. CO-7: Distinguish between traditional criminal justice roles, function, theories, and concepts as a reactive institution to the security roles a preventive societal institution. Conduct a review of previous studies: Begin your research with the tools and capable librarian/archivists available to you in the APUS Online Research Center.  Technical Requirements Your paper must be at a minimum of 6 pages (the Title and Reference pages do not count towards the minimum limit). You must use the template provided. Scholarly and credible references should be used. At least five sources are required for this assignment. Type in Times New Roman, 12 point and double space. Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.  Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc. All submissions will be graded using the assignment rubric.

Read more

[SOLUTION] Robotics and Automation

Choose only one topic: Robotics and Automation Robotics and Artificial Intelligence (AI) Cloud Computing (AWS, Google Cloud, MS Azure)   Paper Format: General Guidelines:    * Type your paper on a computer and print it out on standard, white 8.5 x 11-inch paper,    * Double-space the text of your paper, and use a legible font like Times Roman/Arial.       The font size should be 12 pt.    * Set the margins of your document to 1 inch on all sides. Indent the first line of a paragraph one half-inch (five spaces or press tab once) from the left margin.   Term Paper must include Cover Page, Table of Contents, Introduction, Conclusion and  Bibliography   in   addition to the actual essay/body.   (Introduction and conclusion must be in your own words) Nothing from the Web is allowed. You cannot use the Textbook. Use online books from ASA Library. EBSCO-ebooks and  ProQuest ebrary books   You must cite all your sources (No Exceptions!) Total length of essay/body must be within 10-12 pages Draft copy will be submitted through assignment section due 01/05/2021

Read more

[SOLUTION] Attention Cognition Process

Attention is one of the six cognition processes. When attention is applied to a design, the goal is to make it easier for the end user to quickly locate where he or she should type information on the computer or mobile device screen. Compare and contrast how the Google search engine and the Microsoft Bing search engine employ the attention cognition process. Provide your opinion as to which search engine better employs the attention cognition process and explain why.

Read more

[SOLUTION] Remote Healthcare

I need  as much information as possible about “Telemedicine/Remote Healthcare” such as definition, advantages, mechanism, how does Artificial intelligent help the Remote Healthcare?, cases and examples specially during the covid-19 pandemic.

Read more

[SOLUTION] IT Networking

1)Research and define a complex and realistic network setup, including specific devices that would make part of the network. 2) Research 2 vectors, that hackers could use to gain access to the network (or parts of it), as well as mitigation solutions to protect against such attacks. 3) Write a report to document the research carried out. REPORT STRUCTURE: A 5-page IEEE double column format report including all figures, tables and references. 1. Executive Summary • Brief description of the scope and objectives. • Brief description of the network and justification why you chose this network type. • Summary of key findings and recommendations. 2. Network Setup • Describe the process you followed to define the network setup (e.g., researched network types, researched specific devices, etc.). • Discuss the aspects that make this a realistic and complex network setup. Page 1 of 3   • Draw and include a diagram of your network setup. Note that if you choose a large network you should only draw its main components and devices (e.g., do not draw tens or hundreds of clients but draw a client device from different categories such as HR, IT, lecturer, student, etc.). • Describe the network characteristics, its type (e.g., LAN, WAN, etc.), its purpose (e.g., home network, SME network with only company devices or both company and BYOD devices, campus network, hospital network, etc.). • Include a summary table of the main devices making up the network (e.g., client devices, servers, routers, switches, appliance firewalls, IoT devices, etc.). For each specific device or device class include the main hardware (e.g., manufacturer, model), and software details (e.g., OS, main service application like Apache/IIS web server, main client application, etc.). Do not include too many details, but include details that are important for the attack vector (e.g., mention your network card chip and firmware if you will discuss some vulnerability with them, mention the vulnerable client application that can be exploited such as MS Word, Chrome, or Zoom, etc.). • Assumptions that you make related to your network setup (e.g., if client devices run older OS version like Windows 7 or Android 8, provide some market share statistics or estimates to show the percentage of devices using this version globally or in specific context, e.g., hospitals). Your main assumption is that the network and devices are quite secure, so focus on recent vulnerabilities and attacks (e.g., from the past 2-3 years). • The idea is not to just have a generic diagram but a personalised network. For example, if you choose to focus on a home network, personalise it with specific devices you personally have (e.g., smartphones, laptop/desktop PCs, gateway/router, TVs, game console, IP camera or other IoT devices, etc.), and if your network would be too basic expand it by adding some more specific devices that you would like to have. If you choose to focus on a company network, connect to your work experience (if you have any) and/or do some research and exemplify with specific routers/switches/firewalls that a company may use (e.g., by Cisco, Juniper, etc.), servers and/or client desktops/laptops that a company may use (e.g., by Dell, Apple, etc.), client devices that BYOD employees would potentially use (e.g., Windows / Mac OS / Linux laptops, iPhones, Android Smartphones, etc.). Note that you may also consider that many companies use cloud services, rather than buying and maintaining their own HW servers. • Make sure to cite all relevant sources you consult while defining your network setup. 3. Attack Vectors • Start the section with a paragraph summarising how the attack vectors are different (e.g., in terms of techniques, targeted technologies / devices, vulnerabilities, exploits, etc.). • It would also be good to include a table summarising the main characteristics of the attack vectors (e.g., type, techniques, vulnerability CVE and name, exploit, etc.). • Have a separate subsection with meaningful heading for each of the attack vectors. • In each subsection include a detailed description of the attack vector, interpretation and critical analysis of the findings. The details can include but may not be limited to: o Motives(e.g.,eavesdrop,monitoractivity,stealinformation,ransom,etc.). o Techniques(e.g.,physicalaccess,socialengineering,firewallbypassing,passwordattacks,DDoS, implanting malware, exploiting software vulnerabilities, etc.). o Targetdevices/technologies–whichspecificdevicesand/ortechnologiesfromyournetworkare being targeted (e.g., wireless technologies WiFi / 4G / Bluetooth, network devices like routers / switches / appliance firewalls, servers, client devices, IoT devices, etc.). o Vulnerabilities (e.g., in hardware, software, protocols). Include CVE numbers and details about specific vulnerabilities that could be exploited as part of the attack (e.g., you can search databases such as https://cve.mitre.org/ or https://nvd.nist.gov/). o Exploits – detail any known exploits for the vulnerabilities (e.g., you can search Google and/or exploit databases such as https://www.exploit-db.com/). o Impactoftheattackifsuccessful. o Reference and briefly describe real world security incidents that used this attack vector on individuals or companies to support your answers.    Page 2 of 3 4. Mitigation Solutions • Research and discuss mitigation solutions and provide recommendations on how individuals / organisations can protect themselves against these attacks (e.g., best practices, firewalls, IDS, anti-virus, network segregation, VLANs, etc.). • Reference and discuss specific patches/update numbers, new guidelines (e.g., NIST SP 800-63 B (2020) for password guidance), or legislation (e.g., California bans default passwords), new standards (e.g., WPA3), and discuss what would be the consequences for the users (e.g., using stronger passwords may be cheaper than buying WPA3 access points). 5. Conclusions • Include an overall discussion of the main findings, limitations and implications. • Detail next steps (i.e., what else would you do if you had more time).

Read more

[SOLUTION] US Postal Office Website

A website review is a description, critical analysis, and an evaluation on the quality, presentation, design, and content of a website. The review should focus on the website’s purpose, content, authority, service provision, and goal attainment. In order to prepare your report and a 15-minute presentation, you should do the following: Select one government website, evaluate it, and include a statement of what the website developers tried to achieve, evaluate how well the developers have succeeded (from your point of view as a reviewer) and present evidence to support this evaluation (from the literature). 2. You are asked to look at the overall goals of the website from an e-government service perspective and assess the extent to which the website achieves those goals: how it succeeds; why it might fall short; how it could be improved. 3. The following are some suggestions for writing the review: a. Write essential information about the website: title, URL, Ministry/Authority, when designed/last modified, general content/service area, special features (maps, interactive services, datasets, etc.). b. State the website’s purpose. Why does the website exist? c. Identify key services offered on the website – data, online forms, interactive services/features, etc. d. Assess the implementation, design, content: i. Is the material useful? ii. What barriers or challenges did you encounter in trying to use the website? iii. How might the general public use the website? iv. How might this website be useful or challenging to the public? v. Is the website usable? Can you find things easily? is the design “clean” and navigable? vi. Canyouimprovethewebsite?How? vii. Does the website follow any criteria for the website design? viii. Other observations. e. State your general conclusions. 4. Submit a report (1200 – 1500 words) in which you review a website. A bibliography (at least 6 resources) should be provided at the end of the report following the APA style. Remember to include a title page. I already have the report – attached, create 15 slide PowerPoint presentation, It should include some attractive items such as picture/graphics/statistics

Read more

[ORDER SOLUTION] Discussing resistance to change as a consequence of a poor org culture

Create a PowerPoint to illustrate the link between organizational culture and the implementation of organizational change. Use an example of an organization you are familiar with.Discuss resistance to change as a consequence of a poor org culture. What steps should a manager take to reduce resistance to change, foster a healthier org culture, in order to move the company forward?  What might be some positive outcomes of addressing org culture issues? – you should develop 10-15 slides 

Read more

[ORDER SOLUTION] Comparing and contrasting predictive analytics with prescriptive and descriptive analytics.

Discussion -1 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.I am looking for active engagement in the discussion.  Please engage early and often.Your response should be 250-300 words.  Discussion 2 (Chapter 2): Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.Your response should be 250-300 wordsChapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)I have attached a textbook for the reference of Chapter 1 & chapter 2 and for the exercises as well. 

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information