Computer Science Final Presentation. Ciss 302.

This assignment will be submitted to Turnitin®.Instructions

Pick any Network you may find in your home, work or on the internet as an example for your case study.

Prepare a presentation and paper report around 10 pages that shows:

  • Introduction – that includes background and history
  • Network model presentation
  • What types of standard protocols and technologies has been used
  • Provide an example for 3 different protocols that are applied in different 3 network layers
  • Show your work citations

No grade if No presentation.

Preview the document

discussion q for swarm

1. Find out what Swarm (Links to an external site.) is.

2. Choose several case studies included in the Resources -> Prediction Highlights (Links to an external site.) and Resources -> Case Studies (Links to an external site.).

Pay attention to the question and possible answers described in the case studies.

3. Propose a question that you think Swarm can help you finding the answer.

Submission instructions:

Click on the Discussions -> “Q for Swarm” and create a new thread. You need to include the following information in your post:

  • What is question you want to ask and what are the possible answers (10 points);
  • What category does this question belong to. Category can be one of the following: politics, business, healthcare, and education (2 points);
  • Why do you think it is an important question to ask (3 points);
  • Why do you think collective intelligence can help finding the answer to your question (5 points).

QNO.2. Read the attached Ethics-IV.pdfPreview the document which continues the discussion on how software engineers can actually live up to ethical standards and what is the end goal of an ethical life in software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 6.1 and 6.2
  • Question 7.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_4_FL where FL is your first and last name initial and Submit.

5s week 9 assignment PL

 in 350 words

Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include references. Do not copy paste strictly

Python Coding

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

InfoTech in a Global Economy 1

 Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

 

  • Explain, define, or analyze the topic in detail

Microsoft Access Data Queries

  

Part 2

Software skills: Database design and querying

Business skills: Inventory management

In this exercise, you will use database software to design a database for managing inventory for a small business. Kamen Rider, located in New York, sells road, mountain, hybrid, leisure, and children’s bicycles. Currently, Kamen Rider’s purchases bikes from three suppliers but plans to add new suppliers in the near future. Using the information found in the tables given in the small desktop database, help manage information about Kamen Rider’s suppliers and products. Perform the following.

1. Execute a query that identifies the five most expensive bicycles (for customers). The query should list the bicycles in descending order from most expensive to least expensive (by Selling Price), the quantity on hand for each, and the markup percentage for each. Save this query as Q1_Five_Most_Expensive_Bicycles. Hint: Profit Mark Up = (Selling Price – Cost Price)/Cost Price. (2.5 points)

2. Execute a query that lists each supplier, its products, the quantities on hand, and associated reorder levels. For each supplier, the products should be sorted alphabetically. Include a criterion for bicycles that have Quantity_on_Hand that is more than 5. Hint: This requires hierarchical sorting and a numerical filter. Save this query as Q2_Supplier_Product (2.5 points)

3. Execute a query listing only the bicycles with names starting with “E” as well as those that end with “er”, and their corresponding suppliers. In your query, include the Product Name, Purchase Cost, and the supplier’s Company_Name. This needs a little bit of thinking. Save this query as Q3_BR_bicycles (2.5 points).

4. To enhance the database, we need a table of supplier information. Create a table called Supplier_Info that has supplier telephone numbers. For full credit here, include an appropriate input mask. Populate the table with the appropriate fields. Populate the table with the suppliers to demonstrate our ability to enter data to a database and to check that it works. Be sure to enter all suppliers (there should be 5). Make up the telephone numbers. This requires some thinking on what field(s) to include other than telephone numbers in the new table. Recall that databases should be normalized, and we should join apples to apples, oranges to oranges; and we want to avoid redundancies. For purposes of this assignment, create the table accordingly. There’s no need to join other tables. Save this table as Supplier_Info (2.5 points).

Your work will be evaluated on the accuracy of the results, quality of your answers, and ability to apply the concepts. Submit your work on Canvas. There should be 2 documents: (1) a single word document (or pdf) for part 1, and (2) the database file (Access file) for part 2 by the due date. Late submissions will result in a 5% penalty for each day late.

graded assignment

Using a web search tool,identify cases in which private information was disclosed when computer equipment was discarded.Recent examples have included smartphones (like blackberry) that were sold without proper data cleasing and hard drives that were sold without data cleansing after the computers that were originally used in were upgraded.