computer science

if you know about computer science and programming and python text me I need someone good can help me with my class and you should know English please 

Discussion 2 HRM

You are responsible for planning and conducting diversity training for your organization. List and explain a minimum of three topics that you would include in the training and explain your rationale.

APA format 300 words and intent citations and at-least 2 peer reviewed articles as references.

Design an algorithm

 Design an algorithm that receives the letters of your first name in an array. It then finds the duplicates characters in your first name. Do the following to design the algorithm: 

 a. Write pseudo-code of algorithm 

b. Translate the pseudo-code to flowchart 

c. Translate the pseudo-code to a program 

d. Analyze algorithm asymptoticly (Determine primitive operations) 

e. Find the running time experimentally (On program above) 

Write an essay for 500 words on topic placed below ?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Data Acquisition

Research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document.

BSWA FP

Final Project Topic Name:  Security and the Cloud

In 100 words (1)

1.  Include a short paragraph describing your project (  Security and the Cloud ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (  Security and the Cloud ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography

Please include the following:  

 What is ( Security and the Cloud ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

create a portfolio related to an Ecommerce Organization

  

Students are required to create a portfolio related to an Ecommerce Organization. You can select any type of Ecommerce based Organization. Provide organization background, architectural landscape and products or services being sold. Develop your balanced portfolio as per instructions below.  Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include references.

Operational Excellence: Information Systems for Business and Beyond Study Questions.

Chapter 12 – study questions 1-11, Exercise 1 & 2

Study Questions:

  1. What does the term information systems ethics mean?
     
  2. What is a code of ethics? What is one advantage and one
    disadvantage of a code of ethics?
     
  3. What does the term intellectual property mean? Give an
    example.
     
  4. What protections are provided by a copyright? How do you
    obtain one?
     
  5. What is fair use?
     
  6. What protections are provided by a patent? How do you obtain
    one?
     
  7. What does a trademark protect? How do you obtain one?
     
  8. What does the term personally identifiable information mean?
     
  9. What protections are provided by HIPAA, COPPA, and FERPA?
     
  10. How would you explain the concept of NORA?
     
  11. What is GDPR and what was the motivation behind this regulation?
     

Exercises :

  1. Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.
     
  2. Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important.
     

wireless communication

Topic: modern day attacks against wireless networks

Prepare a report on your  topic from Week 2 with a minimum of 2000 words, 

References (10 minimum). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted).

discussion 2

Compare  and contrast the difference of network security within an on-premise  environment and a cloud environment. Give some examples of areas that  are common and areas that are different.

 initial post should be 250-300 words. There must be at least two  APA formatted reference (and APA in-text citation) to support your  thoughts in the post. Do not use direct quotes, rather rephrase the  author’s words and continue to use in-text citations.