Computer Science Project Documentation

 Document a banking Application is a software majorly for controlling and managing financial transaction and a group activities ?

 It will focus on the major operation of the group that is; adding members, updating the group information, facilitate borrowing and returning of loans. 

python code

    

2. Consider the following Python code: 

def next_int1(): cnt = 0 

        cnt += 1
        return cnt

 

global_count = 0 

def next_int2(): global_count += 1 return global_count 

    def main():
        for i = range(0, 5):

print(next_int1(), next_int2()) main() 

  1. (a)  What does the program print?
     
  2. (b)  Whichofthefunctionsnext_int1andnext_int2isthebestfunctionfortheintendedpurpose? Why?
     
  3. (c)  What is a better name for the function named next_int1?
     
  4. (d)  The next_int2 function works in this context, but why is it not a good implementation of
     

 

function that always returns the next largest integer? 

  1. When is the global statement required?
     

Prepare an 8 page APA style paper using the at-least 3 additional peer reviewed resources

Prepare an 8 page APA style paper using the resources at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with all submissions (even initial discussion posts)

Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write more than the minimum requirement of the word count assigned

As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Project: Network Security – Case Assignment.

 

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.  As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

  1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.
  2. Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.
  3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.
  4. The primary data center will be located at the Atlanta location.
  5. There will be a failover data center at the Cincinnati location.
  6. Each location should be protected from intrusions that are not limited to state change attacks.
  7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well. 
  8. There will be database servers located at the Cincinnati site.
  9. The servers must have redundancy.
  10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

  1. You should submit a network drawing listing the network’s topology including any necessary hardware.
  2. You should list any recommended cable.
  3. You can recommend wiring closets wherever you need them.
  4. You should recommend ways to assure that you are not getting attacked.
  5. You should build traps to stop attackers.
  6. You should recommend any WAN or wireless technologies.
  7. You should recommend any technology needed in the data center for high availability.
  8. Justify your recommendations.

CC week9 DB

 

Hello,

i need this paper by 07/08 afternoon.

Strictly No plagiarism please use your own words.

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism 

Octave and Matlab

1) Exercises for Octave / Matlab:

(a) If A is a matrix created by command A=rand(10,10);, what is a command to get the sub-matrix of elements whose both coordinates are odd?

(b) Write an expression for the sum of the integers from 1 to 100.

(c) Write an expression for the sum of the powers of 0.5 to the numbers from 1 to 10.

2) Download and decompress (stock prices: date, open, high, low, close, volume) (18MB)  stckPrcs.tar.bz2

(a) in Octave, ‘load’ BDXA (in B/BDXA.us.txt and Octave needs to be in directory where BDXA.us.txt is): 

BDXA=load(‘BDXA.us.txt’);

(b) at which data the BDXA had the highest price (need to use functions below for date as solution):

m = max(BDXA(:,2))

i = find(BDXA(:,2) == m)

date = BDXA(i, 1)

For the submission

1) send in the plain text the commands you used in part 1) (a,b,c) : there should be 3 lines.

2) send in the plain text the ‘date’ variable you found in part 2) b) : there should be one number.

Tasks attached

Please find the attached.

Task 1 : –  In 150 words comment on attached two presentations  reflecting on your own experience, challenging assumptions, pointing out something new you learned, and offering suggestions. 

Task2 : –   Write an essay of at least 450 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Research Paper

You have been hired as a CYBER security analyst to assess the vulnerabilities of the electronic voting machines for the city of Metropolis. Some of the voting machines are connected directly to the Internet, while the majority of them are not. However, some may have WI-FI and/or BLUETOOTH capability. All have some form of removable data devices.

An electronic voting machine is simply just another Internet-of-Things endpoint that requires the same diligence in securing it as would any other network endpoint node.

Discuss the vulnerabilities along the chain-of-custody of person’s vote, from button press, to off site data storage.

Submit your first full draft of your research paper on election security by this week’s due date. Incorporate any suggested edits and resubmit up and until the Week #7 deadline. Remember to submit your draft to the plagiarism checker tool before submitting your draft here.

Tracking movement of a car with vuejs

 logistics company is trying to improve it’s tracking page to ensure it’s

effective to their clients while monitoring their deliveries .

1. Assuming you receive the following locations from the partner app after 5

seconds .

-1.298982, 36.776811

-1.297459, 36.776747

-1.296193, 36.776726

-1.296097, 36.779236

-1.296151, 36.777637

-1.296215, 36.776693

-1.294252, 36.776586

-1.294048, 36.776790

-1.293973, 36.779118

-1.292622, 36.779075

-1.291844, 36.779049

Animate the ​ driver A​ movement from the first to last location on the Tracking Page

2. Add an info window above the rider image to show ​ driver’s A name and current

locations (use coordinate values).

3. Consider a scenario where ​ driver A whose at coordinate (-1.300355, 36.773850)

initially confirms a delivery and as from the tracking page the driver icon is seen

based on his current position . ​ Driver A later cancels the order 15 seconds later

after confirmation since the client was unreachable , the icon then disappears (as

from the Tracking Page) . The order is then dispatched and confirmed by ​ driver B

whose coordinate (-1.291879, 36.778389) 10 seconds later after it was cancelled .

Driver’s B​ icon based on the current position now appears on the Tracking Page.

Show this transition on the tracking page .

Consider the following :

The application should be web based .

Driver Image ​ https://images.sendyit.com/web_platform/vendor_type/top/2.svg

Tools :

Use the Vue.js Framework (highly recommended) or any Javascript based Frameworks