It is designed around an educational

  

Summary:
It is designed around an educational institute called LearnerCare that offers two types of courses every semester, regular and optional. While regular courses are compulsory, students may select one optional course every semester. Some courses may be dropped from the previous curriculum year and new courses may be offered. The optional courses may be offered in both semesters for the same grade. Generally, the courses offered are repeated every year for the students of the same grade, but these may be changed.
Students enrolling for a specific year need to enroll for the regular courses offered for the semester for that grade and an optional course per semester. Each optional course has limited number of seats.
 

A student can specify his choice for the optional course if the course is being offered in the semester for the grade of the student. A student can specify three priorities for the optional courses. A course is allotted to the student after the enrolment period is over on first come first serve basis based upon the availability of seats in the course.
 

The database also stores the skill set of faculty in the institute. Based upon the skill set, faculty is assigned to courses when the courses are announced. However, a faculty may be replaced in a different semester or grade.
Courses are assigned specific classrooms subject to the availability of the room while ensuring that no teacher or student attends two courses simultaneously. Classes are conducted for eight one-hour sessions per day, five days a week. Each course is conducted six times a week with four periods per week for extra curricular activities of students.
A weekly timetable can be generated to inform the students and faculty about the classroom for specific courses.
 

Part 1 of Project:
 

1.Convert entities and attributes to tables and fields, respectively.
2.Specify data types and the size of fields in the tables.
3.Identify primary and foreign keys.
4.Identify various constraints for the fields.
5.Normalize data, if required
 

submit an MS Word document

Network penetration testing techniques

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

Please write between 200 and 300 words

Week 5 – Research Paper Bitcoin Economics

 This week’s reading centered around Bitcoin Economics. For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency. Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).
Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

12:28Reading Assignments
Reading Assignments
WALDO, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. https://doi.org/10.1145/3303868
PAVLUS, J. (2018). The World Bitcoin Created. Scientific American, 318(1), 32–37. 

Find a peer-reviewed scholarly journal article discussing blockchain technology.

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Computer

   When you check the spelling in a document, one of the options is to add unrecognized words to the dictionary. If you were working for a large company, what types of words do you think you would add to your dictionary 

Artificial Intelligence Writing Assignment

What are heuristic functions and informed search strategies.Provide examples and present your written findings

Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words) 

computer science network security

The Vigenère cipher was thought to be completely unbreakable for hundreds of years, and indeed, if very long keys are used the Vigenère cipher can be unbreakable. But if short keys are used, or if we have a lot of ciphertext compared to the key length, the vigenere cipher is quite solvable. 

In this  you need to study how a cryptanalyst thinks and breaks the code. Applying the Cipher Text Only attack, your job is to break the Vigenère cipher using cryptanalytic techniques and find the key used for the encryption. For this exercise, assume the key length is less than five characters long and only English upper case letters from A-Z are used. You may also assume the plaintext contains only the upper case English letters from A-Z, ignore the space characters. 

bswa week13 pa

Hello,

i need this paper by 4/21 afternoon 12am.

Strictly No plagiarism please use your own words.

Week 13. Submit – Topic:PHISHING CYBERCRIME.

what i initially gave description to professor :

PHISHING

Phishing is a cyber-crime conducted by fraudsters to obtain sensitive information such as

bank account numbers, passwords or PIN. Their intentions to get such information is for the sole

purpose of scamming the victim. As the criminal masquerades as legit organizations an individual

is affiliated to, they can trick a person into releasing sensitive information. My research is based on

how to detect and distinguish attacks instigated on the email platform. The study aims to identify

the different techniques employed by scammers to obtain personal information from victims. The

formulated hypothesis statement is ‘an email that prompts an individual to verify account

information by inputting both account number and pin combination is phishing’

please write 700 word explaining about above requested topic, double spaced, written in APA format, showing sources and a bibliography.

And

12 slides power point presentation on PHISHING CYBERCRIME.

reference :

 https://www.youtube.com/watch?v=-JcgRyJUfZM

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism