Database paper Computer Science Assignment Help. Database paper Computer Science Assignment Help.
(/0x4*br />
Database Spring 2019
Term Paper (1500 words minimum)
I. Introduction
(In this section, you should give a brief overview of web-based databases.)
II. Approach
(In this section, you should explain the key components of your software.)
**** I listed the key components on the bottom. Please explain and incorporate them into the paper
III. Overview of the system developed by Aadamsoo
(In this section, you should give an overview of the paper https://www.theseus.fi/bitstream/handle/10024/16996/Aadamsoo_Anne-Mai.pdf
Use your own words. Do not copy from the paper.)
IV. Discussion
(In this section, you should discuss how you may improve your software if you are selling it as a real product.)
V. Summary
(In this section, you should conclude your paper by summarizing the key contribution of your software.)
*****KEY COMPONENTS*****
1. A user will be able to create an account. Parents must create account before their
children. Parents need to identify if they want to be moderator; students need to identify
whether they want to be mentor or mentee or both. Students will be able to update their
own accounts; parents will be able to update both their own and their children’s
accounts.
2. All users can find the information about courses and past, current and future sections.
3. A student may enroll in a section as mentor or mentee if he/she meets the grade
requirement. A section should have at most 6 mentees and 3 mentors. A student can
enroll in as many current or future sections as he/she wants, provide the sections are for
different courses and are offered at different time slots during the same time period. A
student cannot enroll in a past section.
4. A mentor will be able to see list of mentors and mentees of the section he/she is
mentoring.
5. A moderator can view the list of sections and their moderators. He/she may choose one
or more current or future sections to be a moderator. Each section should have 1
moderator.
6. By Thursday, a student needs to indicate whether he/she will participate in the session
for next week. A session with few than 3 mentees will be canceled on Friday. All
participants of the session need to be notified of the cancelation. If a session has fewer
than 2 mentors, the moderator of the section for which the session belongs to needs to
be notified. For simplicity, you can just generate notification files which contain the
names and email addresses of the users who should be notified.
7. If a session does not have 2 mentors, the moderator of the section can find a list of
potential mentors and select one or two to add to the session.
8. The moderator will post study materials to his/her session every week. A student
enrolled in the section will be able to see the current and past materials for each session
of the section.
Database paper Computer Science Assignment Help[supanova_question]
1800 words Literature review and research questions Other Assignment Help
assess your ability to critically review and synthesise previous research(my previous research is about the influence of social media on public relations practice);
demonstrate how the literature you have reviewed functions to form a conceptual framework for your own study, and state specific research questions that your study will address and justify the significance of your study;
You need to search for literature that sheds light on your understanding of the research problem and on how it can be examined in academic research;
Your literature review should be a critical synthesis of theories and previous studies, not a serial summary of the cited references( I will provide my previous study paper);
The literature review should conclude with your research questions;
You should cite at least 15 academic references from journals or books as scholarly support. In addition, you may cite from non-academic sources, where necessary;
APA referencing style is required; 1800 words.
[supanova_question]
Thermodynamics Rankin cycle project. It is due wed midnight so you are actually have one day and 23 hours. Engineering Assignment Help
It is a Rankin cycle project
that is due wed midnight(New York time). I am just putting one day because there’s no option for 1day and 23 hours.
so what I am going to do is I will extend the time but depending on your demand I guess.
my friend and I have been doing some work until #5 or #4 but we are not sure if we are doing okay
and also if it looks right to you,
I would like you to finish the rest
if it does not look right to you, you gotta start from the beginning, I will pay more thru tips
please be on time and honest.
I have experienced some fake tutors who just copied and pasted the work from Chegg which is mostly wrong.
I also found the answers from Chegg
it looks right at first but we realized the numbers from table seemed wrong because the numbers seems not to be matched.
So we just guessed the numbers to be honest which means you might have to start over with right numbers if you think the number is wrong. But if the equation is right, it should not be a big deal.
If I finish it by wed night, that’s good,
but if you cannot finish it by wed midnight, I gotta turn in by next wed with 100% deducted points.
The professor gave us this project just too late and It is almost my final weeks so I cannot actually do this by myself now because I am already having a lab final this week.
please be honest and do your best.
I WILL PROVIDE EVERYTHING YOU ASK.
LIKE IF you want the slides from lecture, I will provide it for you
and if you need anything from textbook, I will
also I usually study with the examples if you need any problems related to Rankin cycle, I will send all the questions from the textbook and if you need an answer for the example to get help for this project,
I will find whatever you ask from Chegg.
I have Chegg account. SO please DO NOT COPY and PASTE from chegg. thank you.
[supanova_question]
Negotiation Skills (2 PAGES) Business Finance Assignment Help
Negotiation Skills
Answer the following question using as many proper paragraphs as you need. Proper paragraphs have an introduction sentence, supporting sentences, and a concluding sentence. Question may require multiple paragraphs to answer. The answer should be fully explained. If you find yourself answering the question in a sentence or two you are not sufficiently answering the question. A copy of your assignment must be submitted to www.turnitin.com
Example:
Q. What is a position?
A.A position is a blah blah.It tends to be this. It can also be that. A position is etc.In conclusion, a position is such and such.
Chapter: Ten Questions People Ask
A) Identify four of the ten common questions that people ask about getting to yes that resonate with you. Identify the question and how the author suggests handling it. (Two Page)
[supanova_question]
editing my paper with the follow instruction Humanities Assignment Help
- Provide a general overview of the issue you are interested in. This can either be a general overview, a case study, or an example from a news story or article that relates to the issue you are interested in.
- Explain the moral dimensions of the issue.
- Why is this a moral issue?
- What values are involved?
- What are the relevant moral concepts for understanding the moral dilemma?
- What are the various ways that we might conceptualize the problem in moral terms?
- In what ways has society chosen to view the moral dimensions of the issue? Do you find this analysis of the moral dilemma acceptable?
- How would the two normative theories we looked at in the first half of the semester understand the issue?
- Do either of the normative theories provide a satisfactory analysis of how to solve the moral dilemma? Why or why not?
- What do you think the most important moral concept is for understanding the issue, and why?
- How does this way of thinking about the issue offer a solution, and why do you think it is the correct one?
[supanova_question]
[supanova_question]
Defense in Depth Computer Science Assignment Help
Assignment: Defense in Depth
Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:
Corporate Site (Chicago)
- All servers exist here (Web server, file server, print server, mail server, ftp server)
- Connection to the Internet (50mbps)
- 300 employees who only need access to local corporate resources and the Internet
1 Remote Site (8 miles away)
- 20 employees who need access to all resources at corporate plus the Internet
- Connection to the Internet (3mbps)
Write a paper in which you:
- Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
- All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others)
- The interconnections between network devices
- The end user (client) devices (desktops, laptops)
- The Internet cloud, generically, to represent your network’s interface to the Internet
- Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
- Use at least four(4) quality resources in this assignment. (Note: Wikipedia and similar websites do not qualify as quality resources.)
- Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
Your assignment must follow these formatting requirements:
- Use proper APA format.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page (if applicable) are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
- Identify network security tools and discuss techniques for network protection.
- Use technology and information resources to research issues in network security design.
- Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Note: The graphically depicted solution is not included in the required page length. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.
Points: 80 |
Assignment 1: Defense in Depth |
||||
Criteria |
Unacceptable |
Needs Improvement |
Fair |
Proficient |
Exemplary |
1a. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNsproxies, and/or others). |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and/or others). |
1b. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the interconnections between network devices. |
1c. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the end user (client) devices (desktops, laptops). |
1d. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Weight: 15% |
Did not submit or complete the assignment. |
Attempted to use Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Partially used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
Thoroughly used Microsoft Visioor its open source alternative, to design a network diagram, particularly with defense in depth in mind, which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. |
2. Describe the flow of data through your network and explain how your network design provides multiple layers of security. Weight: 30% |
Did not submit or complete the assignment. |
Attempted to describe the flow of data through your network. Attempted to explain how your network design provides multiple layers of security. |
Partially described the flow of data through your network. Partially explained how your network design provides multiple layers of security. |
Satisfactorily described the flow of data through your network. Satisfactorily explained how your network design provides multiple layers of security. |
Thoroughly described the flow of data through your network. Thoroughly explained how your network design provides multiple layers of security. |
3. Cite 4 references. Weight: 5% |
Did not submit or complete the assignment. |
No references provided. |
Does not meet the required number of references; some or all references are poor-quality choices. |
Meets the number of required references; all references are high-quality choices. |
Exceeds the number of required references; all references are high-quality choices. |
4. Clarity, writing mechanics, and proper APA formatting requirements. Weight: 5% |
Did not submit or complete the assignment. |
More than 6 errors present. |
5-6 errors present. |
3-4 errors present. |
0-2 errors present. |
Defense in Depth Computer Science Assignment Help[supanova_question]
Annotated bibliography and essay Humanities Assignment Help
Please avoid plagiarism
Use very simple words
Follow the instructions below:
Annotated bibliography:
The purpose of the Annotated Bibliography is to allow you to read more critically, more carefully, into the topic of your Final Research Paper. This assignment is an instrument to help you formulate a strong argument based on a critique of each of your sources. Each annotation must include the following three items: 1) Biographical Data about the author(s); 2) a summary and evaluation of the text; and 3) a reflection on the usefulness of the text to your research. Your Annotated Bibliography should include a minimum of 12 sources. Credible sources should be drawn from, but should not be limited to: peer reviewed journals, periodicals and newspaper articles. It will include resources focused on your selected Magic, Science and/or Religion topic. A few suggestions for topics include those listed on Canvas.
Essay paper:
The purpose of this paper is to develop an argument on a specific topic and provide persuasive support for your thesis using strong reasons and clear evidence. The topic should be one of interest to you, and within the broad framework of the areas covered in this course. A formal research paper will follow certain grammatical conventions not found in less formal writing styles, such as reaction papers, film reviews, etc. Suggestions for topics will be provided. Audience: an academic audience and all others interested in the topic
Purpose : develop an argument and provide persuasive support for your thesis using strong reasons and clear evidence.
Length: 12-15 typed pages, (see general instructions above)
Format : APA Style
Presentation:
Students will prepare an academic oral presentation based on their research paper topic, and will attend all other students’ presentations. See ATTENDANCE section, above. Part of your grade on this assignment is attendance at the speeches of the other students. If you are unprepared to present, or absent, on April 22, you will lose 2 points per day until you are prepared. If you are absent during oral presentations of others, 2 points per absence will be deducted from your assignment grade as well.
Requirements:
8 –10 minutes (no more, no less)
Minimum of 3 sources cited in the spoken speech and the written outline Formal outline: typed, full sentence, correct format, complete bibliography 6-8 PowerPoint slides presentation
[supanova_question]
Microbiology unknown bacterium paper Writing Assignment Help
Please see the upload file: Paper requirement detail.docx, and then step by step work on it, must be follow the Guidelines and requirement to write the paper, thanks! please be professional.
- The paper must be follow the Guidelines and requirement for report.pdf to write paper, please follow step by step. For example don’t using I we us.
- I will upload the Laboratory Unknown Bacterium Journal.docx whole lab process and also the page bottom has the daily schedule, the daily schedule you will find the page and chapter from the: lab manual works cited 2.pdf. Ex. 19-22: The identification of your unknown bacterium is a 3-week project in which a living unknown bacterium will be issued and Exercises 19-22 will direct you in performing various differential and biochemical tests in order to identify the bacterium.
- From the Descriptive chart.docx you will see the unknown’s genus and species’ morphological, cultural, physiological, and hydrolytic and degradative tests.
- The paper need total 5 pages, 4 pages for unknown’s genus and species’ talk, and 1 page for dichotomous key, I will upload the name is Example dichotomous key.docx, you can use this key, but you need change to my result.
- Work cited must be 3, I already have two work cited, name is called: works cited 1.pdf, and another work cited is my lab manual, name is called: lab manual works cited 2.pdf. you need find another one.
- Do the Unknown bacterial written report rubric, I will upload the name called: Unknown bacterial written report rubric.pdf, you only do the part on the picture, double check you are doing correct with whole paper.
- Interpreting Physiological test.pdf is also belong to lab manual works cited 2.pdf. you might be will use it.
[supanova_question]
turn information into paper Writing Assignment Help
Using the assigned books and articles, assess the state of the literature on crime, policing, and incarceration in the United States in an 10 page essay. No cover pages and page count does not inclided work cited page. What have been the most important developments/themes that the authors have emphasized in exploring this history? In your answer, you must use all of the assigned books and at least two of the articles to answer the question. Attached are notes and material that will be needed. Also attached is the two articles that must be used as well
In your introduction, must inlcued a strong thesis statement that highlights the points you want to cover. Each parargraph must have a strong topic sentence. Paper should be Times New Roman font size 12, double-spaced, with 1 inch margins on all sides. It should be a polished piece of work that you proofread before submitting. If you use direct quotes please footnote the quote using the Chicago Manual Style formatting.
info that will help
https://academic.oup.com/ahr/article/122/3/795/3862795
https://journals.sagepub.com/doi/full/10.1177/0734016818820574
https://historynewsnetwork.org/article/164204
https://muse.jhu.edu/article/697897/summary
https://courses.lumenlearning.com/atd-bmcc-justiceincommunity/chapter/book-review-from-the-war-on-poverty-to-the-war-on-crime-the-making-of-mass-incarceration-in-america-by-elizabeth-hinton/
https://harvardlawreview.org/wp-content/uploads/2018/02/1078-1123_Online.pdf
[supanova_question]
as per writer Other Assignment Help
A New Marketing Opportunity
Before beginning work on this assignment, please review the expanded grading rubric for specific instructions relating to content and formatting.
The CEO of your firm has just announced that the organization is considering two diverse strategies to increase business: marketing healthcare services to the mature healthcare consumer, or marketing healthcare services to international consumers.
Read the following two articles:
Fell, D. (2002). Taking the U.S. health services overseas. Marketing Health Services, 22(2), 21-23.
Click here to read the article.
Marsh, D. (2010). Marketing to the mature marketplace. Marketing Health Services, 30(1), 12–17.
Click here to read the article.
NOTE: You will draft two separate marketing proposals for the organization. Each proposal should be based on a marketing strategy covered in the course.
- Explain which proposal best supports the marketing opportunities outlined by the firm’s CEO. In other words, does targeting one or the other group make sense in light of either of the proposals you have just drafted?
- Decide which (if either) of the strategies should be a part of your marketing proposal. Explain why and be sure to address each of the following: The opportunities available to the organization by marketing healthcare services to the mature marketplace and the opportunities available to the organization by marketing healthcare services to the international consumer. How either or both of the opportunities compliment or conflict with the organization’s current marketing strategy. What recommendations you would make to the CEO concerning the two proposals.
To support your work, use your course and textbook readings and also use the South University Online Library. As in all assignments, cite your sources in your work and provide references for the citations in APA format.
[supanova_question]