Other Programming & Computer Science Answers

Questions: 1 727

Answers by our Experts: 1 357

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Many web sites make vigorous (over) use of many of the events in the dynamic HTML event model for marketing purposes. In some cases, one URL call may open 10 or more other Windows. Discuss the use of this as a marketing tool, its validity, ethics, etc… and discuss some of the methods you have seen, or might use yourself in such a position, to stop Web users from automatically closing such windows.
assignment must be in the Serbian
Regards,
Can you do assignment in Unifed Modeling Language
and for what price. Thanks in advance.
It is necessary to model the chosen system using UML and Windows (Web) applications using an object-oriented programming language. Model systems:
Draw a Use-case diagram (s) with a minimum of 5 cases of use of the system and provide a text description of each.
Draw diagrams of activities designed for use cases.
Complete UML system documentation - add class diagrams and other diagrams (interaction, diagrams, charts and diagrams of deployment packages) due to the need of better understanding of the system, so that each species has to be at least one diagram.
Make an application to the OO language (C #, Java) that would have shown some possibilities of the system described documents.
Documentation is provided in the form of a Word document that contains a verbal description of the problem to be solved, the diagram and descriptions, description of the application from the user's hand
QUESTION 2
Write a memorandum to the MD in answer to a question raised at the board meeting:
'Please will you come back to us and tell us whether programmes can be made a
part of the contracts we enter into with our clients?'
The board are enquiring whether programmes that are prepared as the basis for tenders
can be made an integral part of the resulting contracts. They will require a discussion
of the pros and cons of turning tender programmes into contract programmes.
SCENARIO
You arc working as a commercial assistant in a long-established medium-size
contracting organisation that undertakes building projects across both private and
public sectors, and which describes itself as offering 'general contracting1.
In the last three years, the turnover of the business has gone down and the profit level
has decreased. The board of directors is concerned for the future success of the
business.
QUESTION 1
The managing director (MD) tells you that there needs to be improvements in the
profit made from each contract. You are asked to prepare a report that the MD can
present to the board, so that decisions can be made about how projects can be made
more profitable.
The organisation has always used simple bar chart programmes, and the MD wants
you to consider how other forms of programming might deliver benefits to the
outcomes of projects.
Write a report that discusses programming in the context of the scenario.
Assignment Requirements
Introduction:
As discussed in this Unit, after IT professionals identify threat/vulnerability pairs and estimate the likelihood of their occurrence, IT management must decide which risk management techniques are appropriate to manage these risks. IT managers then present this information to senior management. The role of the senior management is to allocate resources, specifically money and employees, to prepare for and respond to identified threats and vulnerabilities appropriately.
This assignment allows you to fulfill the role of an IT manager in a small business tasked with determining appropriate risk management techniques for identified threats and vulnerabilities and to make related recommendations to senior management.
Read the scenario given below and then complete the assignment tasks:
Scenario:
YieldMore is a small agricultural company that produces and sells fertilizer products. The company operates through its headquarters in a small town in Indiana. Outside its headquarters, there are two large production facilities—one in Nebraska and one in Oklahoma. Furthermore, YieldMore employs sales force personnel in every state in the U.S. to serve its customers locally.
The company has three servers located at its headquarters—Active Directory Server, a Linux application server, and an Oracle database server. The application server hosts YieldMore’s primary software application, which is a proprietary program managing inventory, sales, supply-chain, and customer information. The database server manages all data stored locally with direct attached storage.
All three major sites use Ethernet cabled local area networks (LANs) to connect the users’ Windows Vista workstations via industry standard, managed switches.
The remote production facilities connect to headquarters via routers T-1 (1.54 mbps telecomm circuit) LAN connections provided by an external Internet service providers (ISP) and share an Internet connection through a firewall at headquarters.
Individual sales personnel throughout the country connect to YieldMore’s network via virtual private network (VPN) software through their individual Internet connections, typically in a home office.
Tasks:
Assume the role of an IT manager assigned by YieldMore’s senior management to conduct the following risk management tasks.
1. Identify, analyze, and explain several (at least five) likely threat/vulnerability pairs and their likelihood of occurrence in this scenario.
2. For each of the threat/vulnerabilities you identify, determine which of the six risk management techniques is appropriate for each risk explained in Task 1.
3. Justify your reasoning for each chosen management technique.
4. Prepare a brief report or presentation of your findings for senior management to review.
Submission Requirements
Use the following guidelines to submit this assignment:
Format: Use a standard word processor or presentation format compatible with Microsoft Word or PowerPoint.
Font: Arial 10 point size
Line Spacing: Double
There is a application I wish to create which will be compatible on Windows, Mac and linux based operating systems. The application is related to the finance sector. IS there a way from which i can i get current news, rumours, stock prices in my application?
You will build a portfolio of at least 10 imaginary investments using information on the Web.
The investment types should be balanced between capital growth, which has moderate to high risk, and capital preservation, which has low risk.
The amount invested can be anything over $1,000, and since this is all imaginary, the amount invested can be set very high.
The final submission will be the workbook that includes charts and utilizes the Excel What-If Analysis tools.
You are to implement a code cracking system. The system will deploy four processes (p1,p2,p3 & p4) to try to guess the password of an encrypted code.
For encryption, we consider that the formula is: C = P XOR K, where
• C = encrypted code
• P = plain text
• K = key
For decryption the formula is: P = C XOR K. So, your program will try to find K using this formula. The XOR operator is ^.
Given an encrypted code C and plain code P your program should deploy three processes to try and find the key used to encrypt the plain code. These three processes will be under the control of process P1.
All processes will send their results to process P1 and process P1 will terminate the three processes and display the encryption key and decrypted text once any of the three processes finds the key.
For simplicity we will consider that we have the original number P stored in a file called plain.txt and the encrypted code is stored in a file called cipher.txt. Consider that only numbers are stored in these files.......
Create your own Dentitions of a system. Based on the “system”
Definitions.
a. Identify your viewpoint of shortcomings in the definitions.
b. Provide rationale as to why you believe that your definition overcomes those shortcomings.
c. From an historical perspective, identify three precedented systems that were
replaced by unprecedented systems
Explain the concept of system transition strategy
LATEST TUTORIALS
APPROVED BY CLIENTS