• Home
  • Archive by category "Computer Science, IT"

CIS homework

HW3 system architecture integration IT

you will be providing detail on 3 potential options for pursuing the system integration project, the evaluation method you will use to compare each, and the overall quality assurance considerations that must be met.New Content (Week 3) Enterprise System Integration AnalysisRefine and describe in detail the list of quality assurance considerations determined to be ranked highest.Thoroughly describe 3 potential options that you are considering for moving forward with the Systems Integration Project.Systems Integration Approach Evaluation and SelectionSelect and describe in detail the evaluation method that you plan to use to compare and contrast the 3 options.Design a table or matrix to perform your evaluation comparison. The evaluation criteria should include quality objectives and organizational capabilities and considerations and should use some type of weighted priority scheme for ranking.Fill in the table, and use ranking criteria to determine which is the best option for you to proceed with for the system integration project.Summarize by discussing which is the best option based on the results from the previous step.Make sure that the document is in APA format. 7-10 pages
Show more

Computer science

java programming

Write a java application that defines a Circle and a Rectangle and prints the area of each.  Make use of encapsulation to defined class attributes and methods.A circle has three attributes: center Point, radius, and area.  Use a proper constructor to initialize Circle object.  To initialize a circle, you will need a center point and a radius. Then, you can use the radius to calculate the area of a circle.  The area of a circle is calculated using the following equation (PI = 3.14):Area = PI * radius * radiusA Rectangle consists of four Points which are the upper left, upper right, lower left, and lower right corner points, length, height, and area.  To initialize a rectangle, you will need the coordinates of all four corner points from which you can calculate the length, the height, and the area of a rectangle. The area of a rectangle is calculated using the following equation (Note that length is the distance between the upper left and upper right corner points and height is the distance between the upper left and lower left corner points):Area = length * heightThe Point class defines the X and Y coordinates of a point.  The distance between two points is calculated using the following equation:Distance = sqrt((x2 – x1)^2 + (y2 – y1)^2)For each class define displayInfo( ) method that would output information about an object.  You can use the following main method to test your application.  A sample output of the application is also shown below.public class ShapeApp {    public static void main(String[] args) {         Point upperLeft = new Point(1, 5);        Point lowerLeft = new Point(1, 1);        Point upperRight = new Point(5, 5);        Point lowerRight = new Point(5, 1);        Rectangle r1 = new Rectangle(upperLeft, upperRight, lowerLeft,lowerRight);        r1.display();        Point center = new Point(10,10);        int radius = 4;        Circle c1 = new Circle(center, radius);        c1.display();    }}===================    SAMPLE OUTPUT =========================Rectangle Info:Upper Left Point (x,y) : 1,5Upper Right Point (x,y): 5,5Lower Left Point (x,y) : 1,1Lower Right Point (x,y): 5,1area                   : 16.0Circle Info:Center Point (x,y) : 10,10Radius             : 4area               : 50.24
Show more

Assignment 1: Network Consultation for DesignIT

discussion questions

Discussion 1″Ethernet Switches”  Please respond to the following:Since switches are generally used within the local network configuration, why would a network administrator configure port security on a switch? Can you think of a reason based on your study this week? Don’t just give the answer from the materials; cite specific examples from real life. Have fun with it.Discussion 2″Security Administration and Access Control”  Please respond to the following:From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability. Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.e-activityResearch a specific lapse in professional ethics by an IT professional in the last five (5) years. Be prepared to discuss.
Show more

debugging python problem

Program in C++/Java that performs a DFS?depth first search?

Write a program in C++/Java that performs a DFS onfollowinggraphandouputsedges with labels, tree edge, back edge, forward edge and cross edge.Submit yourprogram and screen shot of outputs in a singleword/pdffile.Your program should accept following file as an input. You have to write codeto process this input. You should define and use adjacency list representationof graph.The input in the file is in this format:First line is number of nodes.Rest of lines are in thisformat:node number (node degree) : adjacency listfile?110  (4) : 1 6 8 101  (3) : 0 2 32  (5) : 1 3 4 5 63  (2) : 1 24  (2) : 2 55  (2) : 2 46  (3) : 0 2 77  (1) : 68  (2) : 0 99  (1) : 810 (1) : 0
Show more

IT 206 Week 2 CheckPoint Knowing Where You Placed Your Document

Disaster Recovery Plan

Week 6 Assignment 1 SubmissionClick the link above to submit your assignment.Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. Instructors, training on how to grade is within the Instructor Center. Assignment 1: Disaster Recovery PlanDue Week 6 and worth 120 pointsYou are an administrator for the Contoso Corporation. The Contoso Corporation has two (2) large sites. The corporate office is in New York and the manufacturing site is in Cleveland, Ohio. In addition, the Contoso Corporation has five (5) smaller sites. At the Corporate site, you currently have eight (8) physical Hyper-V hosts that host approximately one hundred twenty (120) virtual machines. The virtual machines are running Windows Server 2008 R2 and Windows Server 2012. The servers are needed to host email, various databases, file services, print services, and a point-of sales-application. The virtual machines are stored on a centrally located storage area network (SAN) that has multiple power supplies, and use redundant array of independent disks (RAID).Over the last three (3) years, you have had two (2) power failures that caused the servers to go down at the corporate office. Recently, during one (1) of these incidents, files on one (1) of the servers were corrupted. It was later discovered that the backup could only partially restore the data files, but could not restore the server itself.The servers must remain available and reliable. As the administrator, you must ensure that you can recover from a failure or problem quickly with minimum loss. Write a three to five (3-5) page paper in which you:Develop a continuity plan / disaster recovery plan for Contoso Corporation in which you address the following:Suggest an approach that provides redundancy (failover) for all mission critical functions in the event of a disaster including power failure. Consider the following in your approach: Essential Infrastructure; Email; Database; File Services; Print Services; Point-of-Sale Applications; Power Redundancy Solutions.Identify the changes that should be made to the backup procedures in order to address the problem with the server backups.Outline the necessary actions that Server Administrators must verify for proper operation of servers in the event of a failover.Provide a plan for returning all services back to the primary systems once the crisis has passed.Examine the pros and cons of moving part of the data center to the Cleveland office and housing it there on a permanent basis. Provide your recommendation for the stated action. Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Demonstrate the ability to describe, manage, and configure load balancing and failover clustering.Demonstrate the ability to configure and manage backups to include role-specific and online or cloud environments.Demonstrate the ability to recover servers to include files and volumes.Use technology and information resources to research issues in advanced network infrastructure environments.Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions
Show more

I need a literature review about ( cloud system i

Despite being a fairly old technology, menu-driven interfaces are very common in user interface design, Computer Science Assignment homework Help

Assignment 2: Menu SelectionDespite being a fairly old technology, menu-driven interfaces are very common in user interface design.  Menu-driven interfaces consist of a series of screens which are navigated by choosing options from lists. Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface. Determine why menu-driven interfaces continue to be popular in the modern computing age. Suggest at least three (3) strategies for making menu-driven interfaces visually appealing in the modern computing environment.Suggest alternatives for menu-driven interface design and explain how these alternatives can be designed to eventually replace all menu-driven interfaces. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
Show more

IT 280 Week 6 Assignment Windows 7 Upgrade Tec

Usability and Accessibility Test

Perform a usability test on your website home page.Develop questions and work with a peer to answer questions on your site usability.Run an automated accessibility test on the home page of your school website.Use both the WebAim Wave (http://wave.webaim.org) and ATRC AChecker (http://www.achecker.ca/checker) automated tests.Describe the differences in the way these tools report the results of the test. Did both tests find similar errors?Write a half-page report that describes the results of the tests and includes your recommendations for improving the website.
Show more