Website development

  

1)Briefly explain what are the steps involved to develop a Website for a Software consulting company. List down the roles and responsibilities as a developer you would perform in a daily basis, Also clearly explain your goals that you plan to achieve and contribute as a team member.

Note:Please include Flowcharts and no Plagiarism

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

88

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal.

You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

Technology of the past

In 80 words or more answer the following. Looking back at the technologies of the past 5 years, discuss the technologies that most impress you. Elaborate some examples to show the benefits to you or your organizations. 

Cyber Security

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

Flow Chart/Pseudocode

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Term Paper

Finish the term paper using the following outline. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote. 

Title: Penalties and adjudication for various information and technology offenses.

Thesis: Penalties and adjudication for various information and technology offenses are not playing the crucial role of securing the abolition of breaching the law, which has been set, to safely guide the key players in the platform. The law is not even ensuring that those people who temple with the originality of a given person work.

i. Introduction 

a. Thesis 

b. The role of the thesis. 

ii. Expounding on the law and some of the changes needs to make it better.

a. Background of the law

b. Some of the recommendation that has been pointed out concerning the law by different stakeholders.

c. The effects of the law on today’s information and technology industry.

iii. The main objectives of the law.

a. The success and the future of IT in the country

b. The goals of addressing the topic 

c. The significance of the law and the setbacks  

d. The significance of implement the law to the grass root.

iv. The benefit of law to the industry 

a. The key traits of  for success  

b. The goal of the law 

c. Efforts to introduce new laws and ensuring they have been followed.

i. Significance of changing some articles  in the law

ii. Incorporating of organs to ensure that the effectiveness of the law

d. Making sure that the law meets the national and international standards 

v. Recommendation from the writer’s view.

a. Some of the things that can make a difference in the information and technology sector.

vi. Conclusion 

a. Summarizing the arguments and efforts made 

Reference

Bottoms, A. (2001). Compliance and community penalties. Community penalties: Change and challenges, 87-116.

Roth, M. P. (2010). Crime and punishment: A history of the criminal justice system. Nelson Education.