short answer

 

  • Object-oriented programming is used in all types of development projects, such as mobile development, windows development, and cloud-based service development. Explain three benefits of object-oriented programming that you have identified as essential for creating web applications. What evidence can you present that discourages the use of object-oriented programming?
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Research Essay

 Description 

Your final research essay will present a comparison of Sara Teasdale’s poem, “There Will Come Soft Rains” and Ray Bradbury’s short story “There Will Come Soft Rains.” Your will address one of the following questions: 

1) What is the role of humanity in each of the two texts? Expand by illustrating the relationship between nature and humanity as represented in the poem and between humanity and technology as represented in the short story. 

the link for the poem: https://poets.org/poem/there-will-come-soft-rains

the link for the short story: https://urcourses.uregina.ca/pluginfile.php/2300543/mod_resource/content/1/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf

you need to compare  both the poem and short story and write a research essay based on the question.

Week 10 Discussion – Cyber Law

Discussion on Social media:

Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.

Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 450 words. Please add references in APA format.

Network

Identify a network that you are familiar with at home or at work. List at least 3 hardware components. What do they each do? You do not need to cite and reference but you do need to explain how they are used.  

500 words.

Computer science

I did this project but I got some wrong steps.  I`m uploading the instructions and what I did too.

This is my teacher comment: Good job! Some points were deducted for formatting errors (margins were not customized, rubric does not all fit onto one page) and multiple spelling/typing errors. Otherwise, nice work! 

Prim's Algorithm

  

The problem we can solve using a priority queue is that of computing a minimum spanning tree. Given a fully connected undirected graph where each edge has a weight, we would like to find the set of edges with the least total sum of weights. Using the scenario: 

You are an engineer and you are trying to figure out the best way to arrange for internet access in your Town. There are N (3 ≤ N ≤ 25) blocks in your town connected by M (N ≤ M ≤ 25) various streets and you can walk between any two streets in the town by traversing some sequence of roads. 

However, you have got a limited budget and have determined that the cheapest way to arrange for internet access is to build some fiber-optic cables along existing roadways. You have a list of the costs of laying fiber-optic cable down along any particular street, and want to figure out how much money you will need to successfully complete the project, meaning that, at the end, every street will be connected along some sequence of fiber-optic cables. 

As a computer scientist, you heard about Prim’s algorithm in one of your programming classes. This algorithm is exactly the solution to your problem, but it requires a priority queue.

  

· Write a program to create using a priority queue to implement a solution of Prim’s algorithm.

  

Input data describing the graph will be arranged as a list of edges (streets and their fiber-optic cost) and for the program we will covert that to an adjacency list: for every node in the graph in the town, we will have a list of the nodes (streets) it’s connected to and the weight (cost of building fiber-optic cable along). 

adj[0] → (1, 1.0) (3, 3.0)

adj[1] → (0, 1.0) (2, 6.0) (3, 5.0) (4, 1.0) . . .

Research Paper : Regscanner/ Windows Registry Scan

You will submit a 2-page outline in Word that describes the forensics analysis you will conduct using Regscanner. The outline should be in narrative form, double-spaced, and in APA format.

The outline should provide the following:

1) A summary of the forensics tool Regscanner.

2) The format you will use to report on the tool’s output and how you would report the results to a supervisor or judge (in the case of persecuting a case)

week 2 group discussion

  400 words

This assignment should be in APA format and have to include at least two references.

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the

authentication system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so for authentication performance? For security? 

Security Architecture Assignment

Minimum Length 700 Words.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?