It is a project work about creating a note reminder app , a pact analysis is required coding to be written in c++ , sample solution is attached below. will require a summarisation of everything cause Im supposed to do a presentation with it
Reflective Paper (Cloud Computing)
Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course. Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.
Requirements: Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper. The paper should include a title page, body pages, and reference page. An abstract and introduction is not required for this assignment. Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.
Business Intellegence
Discussion:
Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
Discussion Questions:
1.Compare the IoT with regular Internet.
2. Discuss the potential impact of autonomous vehicles on our lives.
3. Why must a truly smart home have a bot?
4. Why is the IoT considered a disruptive technology?
Exercises:
1. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.
2. It is said that the IoT will enable new customer service and B2B interactions. Explain how.
3.Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.
Data structure (Python)
Please following the requirement which is in the PDF file(cs261 assignment instruction), and give the same output as the PDF file shows.
Database (2) database design
Assignment 2
Answering questions
Operational Excellence
APA format with headings
Strictly plagiarism free.
Assignments 1,2,3 each should have 2 references
total – 5 pages
Assignment 1 (discussion – 1 page)
Discussion: This week we focus on some additional terms for IT users. This week lets discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?
Assignment 2 (Exercise – 1 page)
Chapter 13- Exercise 1 (2, 4) (Information Systems for Business and Beyond)
Assignment 3 (Essay – 1 page)
Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)
Assignment 4 (Practical assignment – 2 pages)
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
NOTE: Do not submit a paper you wrote for another class. This paper must be written specifically for this class.
NOTE: Do not include a job description from your current or previous job. This paper must be written to describe how this course would apply to your job.
Emerging threats_6.1
Research Paper:
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- The answer should be a minimum of 4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Sorting – Java Coding Assigment
*** To do this assignment you are not to use any of the Collections API, or any
pre-implemented sort routines in Java. ***
In this assignment you are required to make use of the sorting routines in chapter 8 of you text book. You must ask the user to select which sorting routine he/she wants to use out of those routines implemented in the book (Insertion Sort, Shell Sort, MergeSort, or QuickSort). Based on the user input, you need to call the corresponding routine.
You are required to write one main program that will read in any number of integers and store it in an array of ints (not an ArrayList). What you need to do first is to ask the user what sorting routine he/she would like to use. Then you need to ask the user how many integers to be entered as input, and then ask the user to input that these integers.
Your program will store these integers into an array of integers first. Then your program is supposed to remove the duplicates out of this array by first sorting the array (using the user-specified sorting routine), and then removing any duplicates. Your program must not copy these elements into another array to remove the duplicates, the duplicates should be removed in place which means in the same array. Also, you must sort the array first before you start duplicate removal.
Once your array (the same array you started with) has only unique numbers, your program should print out the array followed by a list of all the numbers that were duplicated.
The numbers that were duplicated can be stored into another array.
--------
The following would be a sample scenario of running your program:
Make your choice of a sorting routine first. Then continue as follows:
Enter the number of integers: 10
Enter the 10 integers: 7 9 8 1 9 24 23 24 9 8
The resulting array is: 1 7 8 9 23 24
The numbers 8, 9, 24 were duplicated in the input.
--------
The only file that is to be submitted is a Main.java (or Assg6.java) and no other file.
Best of Luck
Discussion
The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.