applied computer science

Besides computers constructed from electronic components what are the three other technologies that have been considered as future ways to fabricate computers

IT473 final

Modify the rotating cube program from your assignment to build a logo. Use the program wherein the mouse moved the cube in different directions – the mouse-controlled cube. The logo can be the first letter of your first name or last name [logo could be original if desired].   

Example:

Write a document explaining your project, do not include source code. Turn in (upload) your document and FULLY functioning program to the appropriate assignment in Canvas. Demonstrate the project in class. 

INSTRUCTIONS:

1. Follow the APA Publications Manual sixth edition.Projects/Papers are to be typed.2. Limit your project/paper to fifteen pages, exclusive of title page, bibliography, double-spaced on standard-sized paper (8.5″ x 11″) with 1″ margins on all sides.3. Write clearly. Check your grammar and spelling.4. Write in your own words. The class is conducted in English; your project/paper must be in English. Start early.5. Upload your paper to the FINAL PAPER assignment in Canvas by 11:59 p.m. on the last day of the quarter.6. DO NOT SEND YOUR PROJECT/PAPER VIA E-MAIL.

If prices were steady—no inflation and no deflation—would net income be different depending on whether a company used FIFO or LIFO? explain, If you were the owner of a company, and thus responsible for the payment of income taxes, which inventory method w

 

  1. If prices were steady—no inflation and no deflation—would net income be different depending on whether a company used FIFO or LIFO? explain,
  2. If you were the owner of a company, and thus responsible for the payment of income taxes, which inventory method would you prefer if you were operating in an inflationary environment? Explain, using an example.
  3. If you were the manager of a division of a company, operating in an inflationary environment, and your bonus depended on net income, which inventory method would you prefer? In answering this question, assume that you are concerned only about receiving a high bonus; you are not concerned about the well-being of the company. Explain, using an example.
  4. The use of LIFO has been described as sacrificing the balance sheet in order to achieve an income statement in which gross profit is determined by matching the current costs of replacing inventory against the current selling prices of the inventory. What is meant by that description?
  5. How can you find out what inventory cost flow method is being used by a company?

risk register

Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

Complete the following tasks:

  1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
  2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
  3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.

Submit your risk register with the response strategy and explanation.

Dissertation Outline

Welcome to Applied Learning Practicum! 

Executive format programs have an applied learning component (internship/practicum) that is an integral (essential) part of the established curriculum. These programs require the student take part in an internship (that is offered by the sponsoring employer through a cooperative agreement with the school), job shadow experience, or job reflection experience.

The INTR course serves as one way to help students reflect and connect their coursework to their practical work experience. This course is one of several integrated components that connect the practical experience to the curriculum. In this course, students can choose to participate in an alternative work-study, internship, cooperative education, or Curricular Practical Training (CPT) in an area directly related to the student’s course of study.

Due to the embedded practical experience component in the curriculum, students must identify their work-study, internship, cooperative education experience by the start of the term.

Please answer the following questions to identify what you have done to prepare for success in your INTR course this semester.

Question 1 – Briefly explain any steps you are taking, or plan to take, to gain hands-on experience in your program of study. (100 – 150 words)

Question 2 – State two goals you hope to achieve through applying your coursework this term to your workplace experience. (100 – 150 words)

Module 1: Dissertation Outline dissertation topic ( Data Analytics & Machine Learning / Artificial Intelligence )

1. In 250-300 words outline your dissertation topic ( Data Analytics & Machine Learning / Artificial Intelligence ) and goals for this semester as they relate to your dissertation course.

2.  In 150 words If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with. 

Final project

 

Research Project

Your Research Project on the surveillance state consists of two parts:

1 A Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. 

Explain what happens when

  

1. Explain what happens when the following statements are executed x = 0; if ( x == fork()) printf(“CSC 389n”);

2. Semaphores are used to control access to resources. 

a. Explain what happens when the following pseudo code is executed.

3. Explain in detail what happens when each of the following statements are executed. You may assume all variables have been properly declared and this code.

computer forensics

 

  1. What is Computer Forensics and what are the different areas of Computer (or Digital as it is sometimes called) Forensics?
  2. What is your experience with Computer Forensics?
  3. What is Web Browser Forensics and why is it so important?
  4. What are the different types of web browsers based on use and popularity? Compare and contrast the top 5-10 web browsers.
  5. Which web browser do you use and why?
  6. What is the ranking of web browser in the top 5, in terms of security and why (compare and contrast) ?
  7. Does it matter the operating system when it comes to web browser?
  8. What are the different web browser artifacts and where can they be found?
  9. How do the top web browsers differ and how are they alike?
  10. What are the top paid and unpaid tools used for web browser forensics?

The Search for the Universal Programming Language

The students in the class will again become the instructor’s employees and, given the following unfair requirements, must recommend the programming language for a new core team at CIS Inc.

Our company, CIS Inc., needs to standardize on a single programming language because senior management thinks the increased synergy will be amazing for productivity. As the lead of our different hardware and programming teams, your job is to recommend the correct programming language. Here is some information about our company:

We are a startup focused on developing applications designed to run on RISC-V (64 bit), ARM64, POWER9 (LE, 64 bit), and AMD64 processor architectures. The machines will have 128MB– 28GB of RAM available and will primarily run Linux, but the ARM64 and AMD64 architectures will also run Windows 10.

Our applications are managed through web interfaces via client computers with Edge, Chrome, Safari, and Firefox as the target browsers.

Our applications must be optimized to run at peak performance on the selected hardware, so please make sure the selected programming language can be compiled to machine language or a similar performing microcode. (C, C++, Objective C, C#, Visual Basic#, J#, Java, Python, Dotnet, Perl, and other languages are capable, too; these are not recommendations or limitations.)

With this information, research different programming languages and submit a two-to-three-page, 12-point font, double-spaced recommendation of which programming language our company should standardize on.

Parameters:

  • 12-point font
  • Double-spaced
  • 2 to 3 pages