css210

Technical Report-

Your report should consist of the following sections.

  1. Cover Page: Include the course title, project title, submission date, and name.
  2. Introduction: State the objective of the case studies, and provide some background information.
  3. Network Design: Summarize the background for Case Study I. Provide a diagram of your network and the class diagram. Describe in detail the research/changes/suggestions.
  4. Security Implementation: Summarize the background for Case Study II.  Discuss the strategies you proposed for securing your network as well as any added to the class network.
  5. Hacking: Summarize the background for Case Study III. Discuss the methods you suggested to test the security strength of your network  (i.e., attempt to hack into your network) as well as any added to the class network.
  6. Results and Discussion: Discuss overall results of the final network and any additional insights and information related to your findings.

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

IT 203 8

 Describe an ethical dilemma related to information technology and business management. Look at it from multiple points of view and tell about your ethical solution. Examples of topics: security and liability, privacy, misuse of personal information, HIPAA law, etc. Submit one and a half to two pages in APA format with references. 

must be on c code

 

A Command-Line Interpreter, or Shell

Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.

  1. Batch Mode

In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.

  1. Interactive Mode

No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.

You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ‘, “, , etc. You may assume that the command-line a user types is no longer than 512 bytes (including the ‘n’), but you should not assume that there is any restriction on the number of arguments to a given command.

main discussion

 Discuss the strengths and weaknesses of using K-Means clustering algorithm to cluster multi class data sets. How do you compare it with a hierarchical clustering technique. 

Course book exercises

  • Chapter 7 – study questions 1-10, Exercise 2
  • Chapter 8- study questions 1-10, Exercise 2

Precise answers to all questions and exercises in different words from text book. If copying from text book, add reference in APA format.

Textbook link – Information Systems for Business and Beyond 

https://bus206.pressbooks.com/

Research Assignment

Throughout the course, you will be studying a variety of technology topics that are relevant in enterprise settings. Some of you are students exclusively while others of you work in corporate America. Regardless of your situation, the advances of modern technologies are disrupting the way people work, live, and learn. The goal of this research assignment is to conduct a deep dive analysis on one of the following topic areas. When conducting your research, you need to identify how digital transformation in business is a disruptor to the specific topic area selected. Topic areas to consider include:

  • Cloud Computing
  • Mobile Computing
  • Internet of Things
  • Wearable Computing
  • Artificial Intelligence/Cognitive Systems/Machine Learning
  • Security & Privacy
  • Social / Collaborative Platforms
  • 3-D Printing
  • Online Learning & Andragogy

The final paper includes an exhaustive research study using the outline below to substantially support your findings. Using the following paper structure format:

  • You are to write a 10-12 page page research paper.
  • The paper should be, double-spaced following APA format using a Times New Roman 12-point font.
  • Page counts do NOT include cover pages, references, or abstract.

Treat this as if you had an opportunity to publish in a peer-reviewed business or technology journal. 

The paper structure should be as follows:

  • Abstract
  • Introduction
  • Problem Statement
  • Research Analysis
  • General Findings
  • Strength Identification relative to disruption
  • Weakness Identification relative to disruption
  • Why is this an opportunity?
  • Why is it a threat?
  • How does this disruption solve problem X?
  • Further areas of research to consider
  • Conclusion
  • References

The grading rubric evaluates the content based on five areas:

  • Content, Technical Depth, Business Analysis, Grammar/Spelling, and Citations. 

short answer

 

When the World Wide Web was new, and HTML was in its earliest stages, developing a Website was relatively straightforward. Some of the biggest concerns were the sizes of desktop monitors (15” vs. 17”) and the quality of the graphics card (part of why Web Safe Colors were so important back then.) Ever since Apple released the iPhone in 2007, the way we access the Web has changed. In today’s world we must wonder if our sites will be viewed on a desktop, a tablet, or a Smartphone. It is now a much trickier job to create sites that are scalable and responsive to any device.

Thinking about your own project, discuss the following ways you could approach developing your site for multiple devices:

  • Fixed or fluid layout
  • How you would test for various devices
  • Would your site benefit from two different sites? (one for desktop and another for mobile access)

Share your .css rules for your site to support your responses.

digital forensics tools and techniques

 NO PLAGARISM

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Writing assignment

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Do not double space.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.