Technology Conference Registration

  

Technology Conference Registration
Based on the case project shown in Figure 5-111, create a requirements document and a Use Case Definition document, and then design a Windows application. Before writing the code, create an event planning document for each event in the program.

 
 

It is important that developers update their skills by attending developers conferences. The Dynamic International Management Consorttium (DIMC) runs and manages the ADSE (Active Developers Skill Enhancement) Conference two times per year. To encourage companies to send multiple employees to the conference, the cost per attendee is determined based on the number of attending developers from a given company. The table below specifies cost per attendee.
Number of Conference
Registration per
Company Cost per Attendee
1 $695
2-4 $545
5-8 $480
8 or more $395

 
 

DIMS has requested that you develop a Windows application that can determine and display the total cost per company for developers attending the conference. DIMC has a conference policy that states if any member of a company has attended a previous DIMC conference, the company receives a 15% discount from the total cost of its employees who attend. The policy also states that no more than 16 people from a single company can attend the conference. DIMC has asked that you design the program so that the user must enter valid data.

Forensic tool Analyzing

  

Please read these two articles:

· Using forensics against a Fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

· Then go around in your residence/dwelling (home, apartment, condo, etc) and be creative.

· Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

· I expect at least one paragraph answer for each device.

· No Plagiarism 

· 5 Paragraphs

· Each paragraph Should be 100 words 

· Total 500 Words without References.

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!! 

Context Diagram

Choose a transaction that you are likely to encounter, perhaps ordering a cap and gown for graduation, and develop a high-level DFD or a context diagram. Share why you selected this transaction and share your thoughts on the data flow for the transaction with the class. 

blockchain devlopment

choose two aspects of enterprise blockchain governance presented in chapter 10 and describe how you think each one could help govern a blockchain environment (and how it differs from a traditional application environment.) Then think of three questions you’d like to ask.

choose a security threat from Chapter 11. Then describe the impact of the chosen threat if it would be realized in a blockchain environment, and what you can do to mitigate the threat. Then think of three questions you’d like to ask 

Time complexity of the Least Common Multiple (LCM) algorithm

Given two numbers a and b, the least common multiple (lcm) of a and b is the smallest number m such that both a and b are factors of m. For example, lcm(15, 21) = 105 because it is the smallest number that has both 15 and 21 as factors.

Formally, we will work with the following decision problem:

                      LCM = {a, b, m | lcm(a, b) = m}

(a) Explain why the following algorithm that decides LCM does not run in polynomial time:

                  a) Check if m is a multiple of a and b; if not reject a, b, m

                  b) For i = 1, 2, . . . , m − 1 do:

                            i. If i is a multiple of a and b, a multiple smaller than m was found.

                             Reject a, b, m.

                  c) If it reached the end of the loop without finding a multiple less than m, accept a, b, m.

(b) Prove that LCM ∈ P.

computer Networking

Topic :  Functional Programming  

 

INSTRUCTIONS:

This section requires that you review at least 3 peer-reviewed literature sources to be used in the research.

For each of the 5 articles, write a paragraph each for the following sections

o   Description of the research including who the target population was (if available)
o   Research Method used to conduct the research (describe what the researcher(s) did to gather data for the research)
a.      Was survey distributed? How many questions? How many participants
b.      Was it a focus group? Was it a case study
c.      Be explicito  Findings: Indicate the findings as reported in the article
o   Conclusion: What was the conclusion of the research

**You are required to do this for each of the 3 articles**. Citation in APA format, is critical as you report/review the articles

DO NOT add the APA reference at the beginning of each article review in Chapter 2. Be sure to add to them to the References page
DO NOT include any subheadings