Computer Science
[Solved] Web Map Services
In this week’s lesson, we learned about Web Map Services (WMS). In the Lab, we added WMS to our DC Project. In this Forum we will look at finding and describing other WMS. There are thousands of WMS available. They cover the wide universe of user needs, from land cover and land use to local weather. Go to the Esri list of WMS. Find a WMS that you might use and provide an overview in the Forum. Who provides the service? What is the URL? What does it provide? Why is it a good choice? Are there any constraints as to its use? How might you use it? (link: http://www.arcgis.com/home/search.html?q=web%20map%20services&t=content
[Solved] Cloud SLA
Discuss in 500 words or more the top 5 details that should be included in your cloud SLA. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph. Stand-alone quotes will not count toward the 3 required quotes. Write in essay format, not in bulleted, numbered or another list format. Do not use attachments as a submission. For more information on Cloud SLA read this: https://en.wikipedia.org/wiki/Google_Cloud_Platform
[Solved] Chomp
The code in project2 is for a program that plays a simple game called Chomp. The programmers of this project have opted to package some of their code in a module called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated. The steps necessary to produce this program are: Run the command csplit chomp.adt “/Split Here/” and copy the resulting file xx00 to cookie.h. Run the command csplit chomp.adt “/Split Here/” and copy the resulting file xx01 to cookie.cpp. Compile cookie.cpp to produce cookie.o. Compile mainProg.cpp to produce mainProg.o. Link the the .o files to produce an executable program named playChomp Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch. _________________________________________________ I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile: all: cookie.h cookie.cpp playChomp cookie.o mainProg.o cookie.h: chomp.adt csplit chomp.adt “/Split Here/” cp xx00 cookie.h cp xx01 cookie.cpp playChomp: cookie.o mainProg.o g++ -o playChomp cookie.o mainProg.o cookie.o: cookie.cpp g++ -c cookie.cpp mainProg.o: mainProg.cpp g++ -c mainProg.cpp However, I am receiving this error code: Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed: csplit chomp.adt “/Split Here/” 1372 8632 cp xx00 cookie.h cp xx01 cookie.cpp g++ -c cookie.cpp g++ -o playChomp cookie.o mainProg.o is there anything that I can do to fix my makefile? For more information on Chomp read this: https://en.wikipedia.org/wiki/Chomp
[Solved] White Papers
White papers present a single idea with policy recommendations. For example, a white paper on privacy and the Internet of Things might present a set of recommendations for advancing privacy in the design of apps, but WOULD NOT simply review the research. White papers present a POV (Point of View) on a topic, along with relevant research. They are useable documents with purpose, not simple research pieces. White papers should be 5-7 pages, 1.5 spaced, in Arial format with 1 margins all around. All citations should be presented in APA style. Endnotes will not count toward page length. The white paper project will be worth 100 points in total. My White Paper topic is based on “How much of our data is really private? I feel as though the average social media user is very unaware of how much of their data is really private? For more information on White Papers read this: https://en.wikipedia.org/wiki/White_paper
[Solved] Data Mining Technologies
For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header. Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization. Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges. Solution: Describe the organizations Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short? Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. For more information on Data Mining Technologies read this: https://en.wikipedia.org/wiki/Technology_mining
[Solved] Security Controls
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics. Describe operating system hardening Define it Why is it done? What steps are usually done in a Windows environment? Describe system restoration methods and procedures Define it Why is it needed? What tools and approaches are recommended? Describe network security controls Define it Why is it needed? What steps, tools, and policies are used to secure networks? Describe incident response teams and the role of evidence What are incident response teams and why do they exist? How does evidence collection relate to incident response teams? Discuss evidence Describe why evidence is collected, How it should be collected What can happen if it is collected or handled in an inappropriate way For all writing assignments ensure that you do the following: Write 1000 to 1500 words in APA format. Utilize at least five scholarly references. Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer-reviewed sources. Utilize Google Scholar and/or the university library. Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source. Review the rubric to see how you will be graded. Plagiarism will result in a zero for the assignment. The second instance of plagiarism will result in your failure of this class. If you use a source, cite it. If you do not, it is plagiarism. For more information on Security Controls read this: https://en.wikipedia.org/wiki/Security_controls
[Solved] Thematic
I would like you to fix my thematic paper. Also, I want my paper to have full 3 pages ( not include title and citation paper). Must be APA 7 edition, time new roman, 12 front, and double space. For more information on Thematic read this: https://en.wikipedia.org/wiki/Theme
[Solved] Python Programming
Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from the scheduling portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different levels: Semester and Department. Your program will be a menu-based application. Assume that your project file is myproject.py. Once you run, it will show the last 5 semester (fall, spring, summer-only, (not winter, may mini)) > python myproject.py Choose a semester: 1) Sprint 2021 2)Fall 2020 3)Summer II 4)Summer I 5)Spring 2020 Selection: 2 Here, your program will parse the data from website and show only last (most recent) 5 semesters. The user will make a selection, then, you will show departments for the selected semester (Fall 2020). Note that the selected semester is visible before a “>” sign. Fall 2020> Select a department: 1) Undeclared 2) Accounting and Finance 3) Art 4) Ag Science & Natural Resources … … 30) Social Work 31) Theatre Q)Go back Selection: 3 Fall 2020> Art > Select an option: 1) List courses by instruction name 2) List courses by capacity 3) List courses by enrollment size 4) List courses by course prefix 5) Save courses in a CSV file 6) Search course by instruction name 7) Search courses by course prefix Q)Go back Selection: ?? Here, your program will parse the data from the website and show all available departments than a list of tasks. Q (go back) option will take the user to the previous level. Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by the prefix ” should show PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532 as first 5 rows. You will follow the above headers and order (prefix (col. width 6), ID (5), Sec (5) , Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left-justified. A course name should not have a word more than 5 chars. For instance, Algorithms should be abbreviated as “Algor”. The length of the course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as a .csv format. The user will be able to provide a filename for CSV file. For this program, you need to develop at least one class (chapter 10) with (possible) many methods. For more information on Python Programming read this: https://en.wikipedia.org/wiki/Python_Programming
[Solved] Network Access Control
High-level Overview Presentation Scenario Look back at the three previous assignments, Network Access Control, the Cost of Inadequate Controls, and Access Control Strategy Approach. Reflect on the work that you and your IT Security team did for LOTR. In these first three assignments, upper management and the Board of Directors for LOTR asked you to review and repair various access control issues. They have now asked that you create a presentation that will review all the changes that you have implemented to improve access control security. For this final presentation, they have asked for a high-level overview of the procedures you implemented to improve Network Access Control and the newly mapped access controls. They also want you to create a security checklist that can be used to conduct annual access control audits. Finally, they have asked you to make recommendations for three websites that include security RSS feeds to keep the company abreast of possible future security issues and exploits. Instructions To complete this assignment, you have two options. You may either create a PowerPoint presentation or a video presentation that includes a high-level overview according to the following criteria: Summarize the access controls implemented at LOTR. Please provide a brief rationale for each of the recommended and implemented controls. Create a security checklist that can be used to conduct annual access control audits. Recommend three security websites with the ability to set up a corporate RSS feed. Explain why you selected these three sites. Note: Please use three quality resources for this last step. Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: For PowerPoint submissions, do the following Your PowerPoint presentation must be submitted as a functional, valid .PPT file through the Blackboard course shell. Include a title slide containing the title of the assignment, your name, the professor’s name, the course title, and the date. For video submissions, do the following: Please submit a valid link to your video in the Blackboard course shell. Your professor must be able to see and hear you clearly in the video. In addition to your video link, you must also submit a written summary of the points you cover in the video. Think of your written summary as the “hand-out” you would submit to upper management if you were giving your video presentation in person. Include a title page containing the title of the assignment, your name, the professor’s name, the course title, and the date. Please contact your professor if you have any questions about the assignment requirements. For more information on Network Access Control read this: https://en.wikipedia.org/wiki/Network_Access_Control
[Solved] Automatic Coding
There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers not learning necessary programming fundamentals if programming is no longer required. For instance, without understanding how looping and variable initializations work, how easily would an individual be able to find a logic error in a looping process? Do you think programmers of the future should still learn programming fundamentals, even if coding is no longer required? Why or why not? For more information on Automatic Coding read this: https://en.wikipedia.org/wiki/Coding_theory?wprov=srpw1_1
Use Promo Code: FIRST15