Categories
Computer Science

Change the vocabulary and add more details in pretty much all the sections.

1. Please read the paper first to get an idea
2. The crux of the project is we get financial data from Workday/Banner ERP Systems in the form of spreadsheets. As it’s a laborious task
to analyze the data and do visualizations in Excel, we are using Tableau.
3. I need your help with making that paper look professional by
1. Change the vocabulary and add more details in pretty much all the sections.
2. Add conclusion
3. Please add table of contents and make sure they are meaningful and in the right order
4. Add more details under each screen for dashboards
5. Please change the format of the references to APA

Categories
Computer Science

How has the internet altered the way in which newspapers present news?

4 Essay questions must be at least 200 words, with 1 source for each question.
1. Discuss how social media is used in Presidential Elections in terms of communicating with voters, fundraising, and campaign organizing. Discuss how databases of political information can be used to help voters make decisions on candidates and issues.
2. How has the Internet altered the way in which newspapers present news? How are print newspapers responding to the decline of subscribers and the rise of online readers?
3. How has Digital Media influenced (or changed) the field of e-commerce? Include a historical (before and after the digital media) and global perspective (include a discussion of the US and at least two additional countries).
4. How has Digital Media influenced (or changed) children of this generation? How are their lives different than ours? Include a historical (before and after the digital media) and global perspective (include a discussion of the US and at least two additional countries). Include whether the change has been positive, negative, or both.

Categories
Computer Science

Need someone who can write code in java to write five complete java programs.

Need someone who can write code in Java to write five complete Java programs. They aren’t difficult.

Categories
Computer Science

This is the topic “please describe how you have prepared for your intended major, including your readiness to succeed in your upper-division courses once you enroll at the university.”

This is the topic “Please describe how you have prepared for your intended major, including your readiness to succeed in your upper-division courses once you enroll at the university.”
I used to study civil engineering in a community college from 2014 and graduated in 2019. I stopped due to protest in Hong Kong. Now I came back to the US and applied for asylum. I chose software engineering as major and applying for undergraduate. I am taking Google certificate program-data analysis.

Categories
Computer Science

For this you might need access to cisco packet tracer, please let me know if this is unable do be done due to cisco packet tracer.

I will put an example from course hero but please do not copy it 🙁
I will label it as “EXAMPLE PAPER”
For this you might need access to cisco packet tracer, please let me know if this is unable do be done due to cisco packet tracer.
Instructions:
Admin network must be assigned static IP addresses in a new range • Newly added server must be configured for DNS/DHCP • Student network must be assigned IP addresses via DHCP rather than the current static address configuration • Network address translation (NAT) and Routing Information Protocol (RIP) must be configured to route traffic properly Your manager has provided the following files for you to complete this project: • Current Network State o Current Network Topology/Simulation file (Packet Tracer) o Current Network Configuration (Excel spreadsheet) • Reconfigured Network o New Network Configurations (Excel spreadsheet) The New Network Configurations file contains three tabs (Main Configuration, RIP and NAT, and DHCP and DNS), each with specific requirements and guidance for the new network. Your manager has asked for specific evidence for each area of the new network configuration and some brief guidelines of the steps you took in Packet Tracer to complete each area. This information will be provided to the network administrators who will complete the actual network configuration. Refer to the New Network Configurations spreadsheet and the following table to guide you in your submission.

Categories
Computer Science

Digital habits where the person needs to take a break from the habit to understand how it affects people

Digital Habits where the person needs to take a break from the habit to understand how it affects people

Categories
Computer Science

Sources:

please respng to this post.
The CIA Triad is one of those fantastic things where after you first learn about it, it will never go away and you can see how it applies to many things in everyday life. CIA is an acronym for confidentiality, integrity, and availability. It is a security model that easily explains the three main concerns with every information based system, both digital and physical. Listed are a few examples of systems that may prioritize one more than the others.
Confidentiality is having control over access to information. This is the priority in a system handling sensitive or classified information that you want only a few people to have access to. This also applies to information being removed from a location. A good example would be medical records, as most people want only themselves and their doctors to have access, and no one else.
Integrity is making sure the information stays accurate and is not modified in an adverse way. Archives and transaction information are good examples. If archives or transaction histories are modified, then it can no longer be trusted or used reliably. Like rewriting history, what do you trust if the story keeps changing?
Availability is having reliable, uninterrupted access. What is the point in having or using a system if it does not work or you do not have access to it? A good example of this is Amazon Web Services (AWS). Most of the modern world runs on AWS, so if it were to go down, most of the internet-connected systems (governments included) would not be able to function correctly. AWS is able to maintain availability using multiple systems including redundancy (multiple servers doing the same task), scalability (expanding workload capacity on demand), and more. (Reliability – AWS Well-Architected Framework, n.d.)
In a perfect world, you would be able to attain the highest requirements needed from these three categories for every system. In the real world, you usually start with one of the triads as a priority, add the second, and hope you can get the third consistently after the first two are reliable enough not to need a babysitter full time.
Sources:
Personal Experience
Reliability – AWS Well-Architected Framework. (n.d.). Retrieved September 30, 2022, from https://wa.aws.amazon.com/wat.pillar.reliability.en.html
What is the CIA Triad? Definition and Examples. (2021, November 10). SecurityScorecard. Retrieved September 30, 2022, from https://securityscorecard.com/blog/what-is-the-cia-triad

Categories
Computer Science

You have been hired as a consultant by south university to analyze their website.

Why is it important to have effective communication and engagement between the company/business and the management? Please provide examples.
You have been hired as a consultant by South University to analyze their website. You must use SWOT to identify the strengths, weaknesses, opportunities and threats in order to recommend improvements to the University.

Categories
Computer Science

Also provide some methods on removing the duplicate bounding boxes in the transfer learning slide.

Read on the three csv files and the ppt file, visualize the data (on the csv files), and draw some conclusions on the precision, recall and learning rates . Also provide some methods on removing the duplicate bounding boxes in the transfer learning slide. You don’t have to visualize everything, just visualize something connected with the conclusions.

Categories
Computer Science

All sources must be cited using apa format.

Guidelines for Submission: Your submission should be one to two pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.