Computer Science homework help

You will complete a 7- to 10-slide PowerPoint® presentation that explains what are considered professional and unprofessional attire and behaviors for your chosen career. The presentation will also include information regarding best practices for other factors related to physical appearance and behaviors (hairstyles, tattoos, accessories, jewelry, piercings, communication, attitude, etc.). The presentation will demonstrate the importance of managing your professional image for career success. It will cover specific practices regarded as essential for professionals in your career. Computer Science homework help


The PowerPoint presentation must include:

  • A title slide that includes the chosen career, your name, and class/section number
  • 5-8 content slides that include:
    • Explanations of 50–100 words in the speaker notes section for all slides
    • In-text citations, in the current APA format, located in the speaker notes for all slides
    • Two examples (including two images) of unprofessional attire and reasoning as to why they are unprofessional in your chosen career
    • Two examples (including two images) of professional attire and reasoning as to the importance of maintaining professional attire in your chosen career
    • Two examples (including two images) of unprofessional behaviors and reasoning as to why they are unprofessional in your chosen career
    • Two examples (including two images) of professional behaviors and reasoning as to the importance of maintaining professional behaviors in your chosen career
    • Two examples (including two images) of best practices for other factors related to appearance and behaviors (such as hairstyles, tattoos, accessories, jewelry, piercings, communication, attitude, etc.) and reasoning as to why they should be best practices in your chosen career
  • A reference slide with 2–3 references (not including images) in APA format. Computer Science homework help

Communication Security Protocols Computer Science homework help

Communication Security Protocols Computer Science homework help

For this week’s discussion, consider the following prompts:

A cipher can be created by using a keyword. For example, if we choose “statistic” as our keyword, our cipher would be determined as follows:

Method I. Write the word “statistic” without the repeated letters. Then complete the cipher with the unused alphabet characters.


Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z

In this case, the message HELLO becomes ECJJM. Comparing the standard sequence to the cipher sequence, you find that the letters U through Z are the same in both sequences. The number of letters that remain the same will depend upon the choice of the keyword. This can be avoided by using Method II. Communication Security Protocols Computer Science homework help

Method II. Using the same keyword “statistic,” another cipher can be created by writing it without its repeated letters and then writing the remaining alphabetical characters beneath the letters: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z.

The cipher will be created by reading the table vertically and matching the letters to the standard sequence.

Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S B H N U Z T D J O V A E K P W I F L Q X C G M R Y

Our message HELLO becomes DUAAP. A comparison of the standard sequence with the cipher sequence reveals that none of the characters are the same. Using Method II does not guarantee that there will be no matches; however, it does provide a better scrambled cipher than Method I.

Method III. The use of the first two methods results in one cipher for each keyword that is chosen. This type of code becomes relatively easy to break once the keyword is discovered. The use of a keyword and a setting word will generate multiple ciphers depending upon the number of characters in the setting word. For example, keeping our keyword as “statistic” and using “mode” as our setting word, the ciphers can be created as follows:

Using Method I, create the cipher:

Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z

Using the letters of the setting word as the first character of the ciphers, four additional ciphers can be created.

Cipher 1: M N O P Q R U V W X Y Z S T A I C B D E F G H J K L
Cipher 2: O P Q R U V W X Y Z S T A I C B D E F G H J K L M N
Cipher 3: D E F G H J K L M N O P Q R U V W X Y Z S T A I C B
Cipher 4: E F G H J K L M N O P Q R U V W X Y Z S T A I C B D

Message: HELLO
Cipher 1: VQZZA
Cipher 2: XUTTC
Cipher 3: LHPPU
Cipher 4: MJQQV

Therefore, a message could be encoded using any one of the ciphers or a combination of the ciphers to make decoding by anyone but the intended receiver more difficult. Communication Security Protocols Computer Science homework help

Based on working through each of these methods, discuss why the need for communication security protocols is significant. First, decode each of the ciphers. Second, discuss how communication security measures are built upon these principles. Third, discuss which existing communication security protocol you believe bears the greatest significance with regard to the level of protection that is offered. Finally, in responding to your peers’ posts, discuss whether or not you believe there are any communication security protocols that were not mentioned but are of a greater significance.  Communication Security Protocols Computer Science homework help

Information Technology Essay Paper

Information Technology Essay Paper

The capability statement should contain the following sections:

Technical Skills
Non-Technical Skills


Work Ethic/Motivation
Social Media
Schedule/Availability Information Technology Essay Paper

Computer Science homework help


By the end of this week, you should be able to:

  • Articulate the difference between quality dimensions and usability evaluation through your research papers.
  • Discuss inspection methods and how they impact usability studies.


  • Hartson, R. (2003). Cognitive, physical, sensory, and functional affordances in interaction design. Behaviour & information technology, 22(5), 315-338. (Download)
  • Fallman, D. (2008). The interaction design research triangle of design practice, design studies, and design exploration. Design Issues, 24(3), 4-18. (Download)
  • Norman, D. (2019). Norman’s Three Levels of Design | Interaction Design, from Computer Science homework help



Research Paper

A usability evaluation examines the way users interact with products and services in order to achieve a goal. Often times, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:

Service Quality (Group 5, 6)

Remember, usability is not one-dimensional. It is a complex system of properties. Usability integrates many factors. It is subjective from user to user. And in this assignment, you will unravel each of the quality dimensions or how satisfaction ties back to a usability evaluation.

For this assignment, as a team, you are asked to explore the topic assigned to your group. You are to conduct an analytical research review of the assigned usability category/dimension above. Within each quality dimension or satisfaction measure, there are sub-measures! Explore them and better understand how they are important to usability evaluation. Computer Science homework help


Each group will write a paper that covers the following:


Title Page


Literature Review of Concept

Make Recommendations of Additional Ideas For Future Literature Review Consideration


The paper should be a minimum of 8 pages content. This does not include the cover page, abstract, citations, and references. You must use APA format throughout the entire paper.


Grade Rubric

Technical Merit – 160 (53.33333%)

You explained the topic thoroughly by providing greater than 5 examples across 10 or more scholarly sources.


Business Merit – 50 (16.66666%)

You provide a minimum of five practical exemplars from literature to validate your topic in the form of research studies conducted using this topic. You present the results and explain the outcomes clearly and succinctly.


Grammar/Spelling – 40 (13.33333%)

Your paper does not contain any grammar or spelling errors.


APA – 30 (10.00%)

You provide a minimum of 10 quality academic peer reviewed journal sources (not blogs, wikis, or online websites) as evidence to support your topic. Your presentation of the content in APA is also accurate with less than 3 errors. Computer Science homework help


Organization – 20 (6.66666%)

Your organization fully meets the organizational structure as outlined in the assignment and is consistent with an academic literature review.



Visual Analytics Assignment

Visual Analytics Assignment

Visual Analytics

First phase the assignment idea:

The first task is to find a dataset and identify a business problem or a series of interesting questions. You must analyze and visualize real-world data. In order for you to have the greatest chance of success with the final outcome, it is important that you choose a manageable dataset.

  1. The data should be readily accessible and large enough that multiple relationships can be explored. As such, your dataset must have at least 8 Measures and 8 dimensions. (exceptions can be made but you must discuss with me first).
  2. To assist you in choosing a feasible problem and dataset, check with me by email about your idea for approval by 04/12/2022.
  3. Informal discussions with the professor can help to refine the assignment.
  4. Here are some links you can check to get data (but not limited to, so you can still do your search and find a dataset):

Popular open data repositories:

UC Irvine Machine Learning Repository:

Kaggle datasets:

Amazon’s AWS datasets:

Data Portals: Visual Analytics Assignment

Open Data Monitor:


Assignment Requirements:

You need to use and apply the Visual Analytics concepts that we discussed in the class.

  1. Data Discovery: Show how to use Tableau as a tool to explore the dataset to understand what data you have visually. For example, you can generate at least four graphs to discover some relationship between fields.
  2. Questions: Your visualization must be able to answer the proposed questions. A good question may involve in two or more attributes (variables) and related to time or spatial information. You may need to revise your questions several times to tell a good story. You must have five questions.
  3. Calculations: You must use Table calculations along with another type of calculations (like Row-Level, Aggregate calculations or LoD expressions). Explain why you used this type of calculation. You need to use at least 4 calculations.
  4. Visualization: At least 8 or more different visualizations must be used. Use different types of visualizations. Make sure to follow the guidelines to create informative and effective charts.
  5. Dashboard : must be included. The dashboard must be interactive. You need to have at least one parameter. You need to design the dashboard by following the dashboard format guidelines.


Assignment Report (Word Document):

A narrative description of the business problem should be addressed.

  1. Introduction: Start with a draft of the introduction section of your assignment. This introduction should introduce your business problem and the potential solution. Visual Analytics Assignment
  2. Explore the Data: Describe what Tableau Techniques you used to discover and understand the data. List all the charts that you created with enough description about each.
  3. Questions: Clearly state all the five business questions.
  4. Calculations: Describe all the calculations that have been made to the data. Include the functions, charts and the results.
  5. Visualization: Include screenshots for all the generated charts along with the Dashboard. Under each graph, discuss how this chart answered the business question and the find the insights.
  6. Conclusion: Write down your final results and conclusion about the findings. Suggest solutions/actions that the business needs to take in order to solve the problems.
  7. Format: APA


Submission Checklist:

  1. Dataset file: original file and the modified one in case if you did any modifications.
  2. Tableau workbook (.twbx).
  3. Report document (.doc). Visual Analytics Assignment

Computer Science homework help

Part A

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • How does design & utility make a difference between good vs great websites? Explain
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.
  • Why are push notifications the preferred method of communication over instant messaging among young people?




The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.Computer Science homework help

Answer the following question(s):

  1. What is an advantage of organizing IT security policies by domain?
  2. What is a disadvantage of organizing IT security policies by domain?
  3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

Advanced Operating Systems Project

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :



Class Sdisk
public :
Sdisk(string diskname, int numberofblocks, int blocksize);
int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function
private :
string diskname;        // file name of software-disk
int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocksblocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
    Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program. Advanced Operating Systems Project

Computer Science homework help

Please use all 600 words to summarize the following topics (be specific and use terminology from the class):
Explain Darwin’s theory of evolution. What is natural selection? What makes an organism naturally fit?
Why do we study non-human primates? What are some distinctive features of primate evolution?
Human Origins


Define Punctuated equilibrium and Phyletic gradualism. What are advantages of being bipedal?
Why is Homo Erectus being a big game hunter a debated fact? Why is it important? Computer Science homework help
The document MUST be 600 or more words, and typed in Times New Roman 12-point font, being either single or double-spaced. In the header please include your name, date, and class (ANTH 37). Failure to do this will result in an immediate 5-point deduction. DO NOT USE ONLINE RESOURCES. Use information provided to you through the textbook and powerpoints.

Cpsc 1050 Networking Data Packets

Cpsc 1050 Networking Data Packets

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.


  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2. Cpsc 1050 Networking Data Packets
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario. Cpsc 1050 Networking Data Packets

Discussion Board, Fundamentals Of Database Systems

Discussion Board, Fundamentals Of Database Systems

Your management team has had a chance to review the entity relationship diagram (ERD) that you are proposing, and they like the progress shown so far. However, they are concerned about duplicate data and how the current system can ensure that data are kept in sync. After all, they previously had two different applications and you have convinced them that having one is best—but how can this single application prevent people from needing to make changes to data twice?


For this Discussion Board, you will describe normalization and how it can be used to solve insert, update, and delete anomalies.

Your post should answer the following questions:

  • Why is normalization important in the design of databases?
  • How can third normal form reduce insert, update, and delete anomalies?