Python DFS BFS

  1. Your program should be written in Python
  2. Write all your own code. Do not use “off the shelf” code from any source.
  3. Your program (by default) will read the input from a textfile specified by the user.
  4. Your program should compile and run on Linux
  5. Assignment shown in attached screenshot below as well as what the .txt file would contain

2 D.B and 1 Assignment

 I have one Assignment ( Data Mining ) + one Discussion Board (Professional Issue)

–  ( I already have answers for these but I need from you to change some sentences and method and way of answers to be ZERO plagiarism , The answers with me ( Common Answers with all Students ), Please I need full mark .. ( High Quality ) .. not change the answer because the answer is correct .. just change the way for writing … by add some sentence and change some sentences.. 

Also, I have also   Discussion Board ( Network Management ) ,, But I need from you to answer it. 

computing

 
File submission: Laboratory spreadsheet     Objective of the activity  Through the lab activity, students will practice basic spreadsheet skills, such as:  Create spreadsheets with predefined Microsoft Excel functions. Create, enter, store and organize alphanumeric data. Use types of formulas to automate processes. Use graphical representations of data in spreadsheets. Instructions  Access the document.  Laboratory spreadsheet.docxPreview the document 

 
Deliverable  The activity is individual. The work must be delivered on time, without spelling or grammatical errors. Each student must submit one (1) only workbook. The book will, in turn, have three spreadsheets.  To develop the three (3) exercises follow the instructions.  After completing the lab, you should save the file as Excel Lab. 

 
Basic review resources  Hoisington, C .; Freund, S .; Vermaat, M .; Pratt, P. J.; Last, M. Z .; Schmieder, E .; Sebok, S. L. & Starks, J. (2016). Shelly Cashman series Microsoft Office 365 & Office 2016: Introductory. Cengage. Hernández, C. L. (2018). Create Charts. Retrieved from https://vimeo.com/275970556 (Links to an external site.) GCFGlobal LearnFree.org. Retrieved from https://edu.gcfglobal.org/en/excel2016 (Links to an external site.) GCFGlobal LearnFree.org. Retrieved from https://edu.gcfglobal.org/es/excel-2016 (Links to an external site.) Supplemental Review Resource  Usero Vilchez, J. (2012). Create a simple spreadsheet. Recovered from Office automation Excel 01 Create a simple spreadsheet Computer Science Academy Usero (Links to an external site.) Office Automation Excel 01 Create a simple spreadsheet Informatics Academia Usero 

IAM cybersecurity

Describe something revolving around the topic of Identity and Access Management and given an example in real life (Top trends in IAM).

IAM And single sigh-on systems (SSO)

IAM and the internet of things (IOT)

Blockchain in IAM 

Use of Biometric 

2 pages 

paper

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Q1

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please follow the Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. 

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

Information Security Framework

 

  • the contents of the security framework, which should include at least 12 control identifiers (ID) with family notation of your choice and should include whether the control identifier is of low risk, moderate risk, or high risk impact;
  • a gap analysis including a minimum of three controls for ID
  •  Your security framework must be at least one page in length 

4 pages Critical review except

Find one peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article. The review should be at least 4 pages (1000 words) long from introduction through conclusion. Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Writing Requirements for all Written Work:

References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with ALL submissions (even initial discussion posts)

Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write MORE than the minimum requirement of the word count assigned

As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

help3

if you are not an expert on the topic don’t bid.

further guidelines will be provided on chat.

see file attached.