Studybay uses cookies to ensure that we give you the best experience on our website. By continuing to use Studybay you accept our use of cookies view more on our Cookie Policy

Coursework on Computer Science examples

Sort by:
Generate a Microsoft Excel spreadsheet showing your monthly financial budget
You will generate a Microsoft Excel spreadsheet showing your monthly financial budget. This assignment will be out of 1000 possible points. Each item is worth 100 points. Your assignment should be saved as a Microsoft Excel document (.xls or .xlsx). OpenOffice Calc or LibreOffice Calc (.ods) are acceptable free alternatives. These directions will assume..
Leadership Styles of CEO's Tim Cook and Steve Jobs
Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more collaborative leadership style. Do research to compare and contrast the leadership styles of the two CEOs. (You may wish to view the 2013 movie JOBS, which portrays the story..
Security and Privacy Issues in Healthcare Big Data
Request to submit one of 10-14 page powerpoint, a total of 1000-1500 words of explanation. In addition, submit one of report, about 3,500 words for the final report. Table of Content: 1.Title Name -Background of the topic, definition etc Importance -> why you propose this topic? (Significance) Essay structure 2.Review Issues Ethical reviews -> Opposing views..
Developing a Strategy to Build a New Mobile Ordering System
Write a 350- to 700-word memo, individually, based on your Week Five Learning Team Collaborative discussion, with your recommendations to the IT Steering Committee. Include the following content in your paper: Summarize the responses to the questions from your team discussion. Choose the solution that you personally feel is the right solution. Explain..
Firewall Security Concerns and Mitigation Strategies
3-pages double space on Firewall Security Concerns and Mitigation Strategies. you can use the e-textbook as a reference as well any other materials from the online library and Internet sources. When looking for supporting materials on the Internet, please ensure that these sources are credible and reliable. IT vendors, gov., and edu., sources are good. Please..
Comparison report on (out-of-date facilities/hardware supporting the private cloud environment
You are the Cloud Architect for the Irish branch of an International Pharmaceutical company who are considering outsourcing their DataCenter (out-of-date facilities/hardware supporting the private cloud environment). In terms of base hardware, this amounts to 5 X Dell R610s; each server runs a base hypervisor of ESXi with 10 Microsoft Windows 2016 Server..
Using Mobile Technologies to Enhance Learning and Collaboration
Using Mobile Technologies to Enhance Learning and Collaboration: Investigate how mobile technologies can be used in education to increase student engagement and motivation to learn. Recommendations on how mobile technologies can be incorporated into teaching and assessment, as well as producing an outline design for a mobile learning system. Havard..
Implement MyHashedSet and MyHashedMap as define in Java Collection Framework and Java Map.
Counting the Occurrences of Words in a Text Write a program that counts the occurrences of words in a text and displays the words and their occurrences in ascending order of the words. Must use your implementation of MyHashedSet and MyHashedMap. The program uses a hash map to store a pair consisting of a word and its count. For each word, check whether it is already..
Social, Professional and Ethical Issues and related to Information Systems Computer game in
1. Title and Topic Relevance of title and topic to module concepts and ideas. 2. Presentation Essay structure and presentation (including spelling, grammar, length, and organisation). 3. Content Identification of ethical, social and legal issues within chosen topic. 4. Different perspectives given and references made to different arguments by different..
Answer 4 questions from the reading material i provide.
There are 4 questions to be answered, 250 words each. I will provide the reading material out of those you would have to answer the four questions. Ask me for questions and reading material to get started. Just making sure its a real person and not a bot.
Securities issues with non relational and structured DBMS
The NoSQL movement continues to grow to meet the Big Data storage needs of companies such as Amazon, and Google. What are the unique security issues associated with these non-relational, structured storage DBMSs? Using our online Library system, summarize the finding of a reputable article’s information regarding the unique security issues with NoSQL databases...
Computer Networking and Information Technology 123 Projects 6; 7; 8; 9 and 10
*****THIS ASSIGNMENT REQUIRES A SPECIAL WRITER WHO HAS A COMPUTER SCIENCE OR INFORMATION TECHNOLOGY DEGREE***** 1) Create a "New User Profile" name "James Smith" with Administrator Rights onto your computer. 2) Complete all of the instruction guidelines and save all "Lab Reports Relative Information" to a "Separate Subfolder" for each project "Under this..
Microsoft 360 ( use attached data file to complete each task)
Assignment 2 Excel Chapter 2: Formulas and Functions Capstone Exercise Page 503 13 marks Excel Chapter 3: Charts Capstone Exercise Page 554 15 marks Word Chapter 3: Document Productivity Capstone Exercise Pages 311–312 10 marks Notes: At the end of Step c under Merge Therapists Information into a Welcome Letter, save and then close w03c1Welcome. In Step e under..
Comparing a Steganography File with the Original File
Hello, I'm comparing a Steganography file with the Original file. I need help writing a one page report on the number of mismatches and deviations in each mismatch between the two files. And stating your observations of the differences in the two files, such as hexidecimal values and their patterns. Comparing Mission.bmp and Mission-steg.bmp. Compare error..
Individual: Visual Logic®: - Input, Calculations, Output
This assignment requires you to complete a Visual Logic flowchart that accepts four inputs as follows: Two test scores A final score A student's name Average the two test scores together. This average is worth 50% of the student's grade. The final test is worth 50% of the student's grade. Create a single output command that displays the student's name, the average..
Network Security Proposal part 1 Analysis and Planning
Define the vulnerability assessment requirement, propose a solution, and justify the solution. Students should review the text and example provided but do not include it with their submission. Delete the text and include you own. Define the security policy requirement, propose a solution, and justify the solution. Students should be specific when defining..
InfoSec policy, regulation, personnel security requirement development and analysis
There are parts, and I have arranged all the information from the sources. There are 3 things to be done. 1 ) Rewrite the paras highlighted in yellow, 2) Write details for the areas highlighted in pink. 3) Follow Harvard Style and add references and a Table of contents.
Decision making framework to an IT-related ethical issue
• Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace...
Developing a Strategy to Build a New Mobile Ordering System
Write a 350-700 word memo based on your Week Five Learning Team Collaborative discussion, with your recommendations to the IT Steering Committee. Include the following content in your paper: Summarize the responses to the questions from your team discussion. Choose the solution that you personally feel is the right solution. Explain the reason you made your..
Social Engineering Attacks
Please answer the following in your own words. Please cite any sources that you may use. 1. Choose one type of social engineering attack. 2. Describe how that type of attack works.
Technical Writing Instructional guide
This project consists of a 1-2 Page outline, 5-7 page instructional guide and 12 powerpoint slides. Instructions and example attached.
Security Best Practices
Please answer the following questions in your in your own words. Please cite any sources that you may use. 1. Describe an acceptable use policy. 2. What are the main components that are required to ensure that it meets security best practices?
WEP, WPA, and WPA2
Please answer the following questions in your own words. Please cite any sources that you may use. 1. What are the shortcomings of WEP security? 2. Why was there a need for WPA/WPA2? 3. What are the main threats to wireless security? 4. What are the best practices for ensuring security on a wireless network?..
Strategic Information Technology Plan
ONLY SEND OFFERS IF YOU CAN FINISH THIS ASSIGNMENT BY MIDNIGHT TONIGHT!!! • 2 pages per audit exercise (4-5 pages total) • paper MUST be about IBM • APA format Audit exercises are attached as well as the book as a PDF for citations!
Network Security for a Small Accounting Firm
You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer’s data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification..
Operating System- short answers
find the answers from any source and paraphrase the answers and include the sources please!!
Computer Networks Fiber Optics vs. Twisted Pair
Please answer following questions in your own words. Please cite any sources you may use 1.What advantages do fiber optic cables offer over twisted pair or other media choices? 2.What are the disadvantages to implementing fiber optic cables? 3.What is the impact of EMI on fiber optic cables?
Subnetting
Please answer questions in your own words. Please cite any sources you may use. 1.Describe the various classes of subnets and what they are used for. 2.What is the process for determining CIDR notation in a specific subnet?
FBI vs Tor Short Essay
I would like to take the stand with Tor and I am against the fbi
Fashion
Description Install a topic of your choice on Tumblr. Identify your blog's title/name. Compose your first post, which will be in question-and-answer format. For your header/title of the post, pose a question that is the most pressing or most interesting/trending question right now in your industry. For example, if your blog's subject is "art," and your topic..
User experience
Scenario You are progressing well as a junior designer for a leading software development firm called ExSoft Ltd. An opportunity has arisen for you to work for a client company known as Click Retail. Click Retail is an online retail store which operates in the United Kingdom and has grown massively over the last few years. The store offers an inclusive range of..
User Experience Design
Scenario You are progressing well as a junior designer for a leading software development firm called ExSoft Ltd. An opportunity has arisen for you to work for a client company known as Click Retail. Click Retail is an online retail store which operates in the United Kingdom and has grown massively over the last few years. The store offers an inclusive range of..
Operating system
In this part of the assignment you are to do research on the Internet to describe key features of some of the different versions of Microsoft Windows. Answer each of the questions below in your words, and make sure to include references to the sources that you use. This is not to be considered group work...
Operating System
In this part of the assignment you are to do research on the Internet to describe key features of some of the different versions of Microsoft Windows. Answer each of the questions below in your words, and make sure to include references to the sources that you use. This is not to be considered group work...
CREATE A BUSINESS COMMUNITY PLAN
PART A: For this assignment you will start the process of developing the BCP. To start the process, you will need to determine additional information about your organization. Outline the organizational personnel including management, supervisors, personnel for the required departments. Don’t forget to include your technology and support personnel...
Computer assignments
two pages for research Projects three pages for midterm assignments, answer 3 problems
Msc Computing and Cyber Security Module Name: The module name is: Big Data and Cloud Security
Section: - 1.1 Security Assurance Framework for Evaluation (SAFE) – Explain what the SAFE Framework is - No need to go into too much detail or in depth. - Use the document provided titled "Security Assurance Framework for Evaluation (SAFE) by: James Kavanagh, Microsoft 20% 1.2 Security Assurance Framework for Evaluation (SAFE) and Case Study Discuss how the..
Check the price
for your project
we accept
Money back
guarantee
100% quality
Plagiarism free writing service