Computer Science

Total Assignments: 2101

Data mining evolves in the era of new data science

Role of Data MiningSearch for a relevant and/or timely article involving data mining. Describe the role of "data mining" in the story using your own words. Try to identify the type of data analysis method used (association, classification, cluster, outlier, etc.). (100 word minimum). Include the link to the article. cite sources and write in APA format thi...

Ethical issues IT professionals face

Task: Describe in 350-700 the ethical issues IT professionals face.Scenario: Your role is to support the Human Resource Department. The Head of Talent Acquisition wants you to search the Internet including social media sites, to determine if job applicants are demonstrating any online behavior that would jeopardize the company. The company does not ha...

Database management system comparison

Wikis provide students with an effective collaboration tool. This easy-to-use tool facilitates collaboration, information dissemination, and application of learning,providing meaningful connections with the content and relating new knowledge with personal experience.For an excellent illustration of the utility and function of wikis, view Wikis in Plain English by Common Craft. For more information about Blackboard wikis,review these tutorials....

Ethical issues IT professionals face

Task: Describe in 350-700 the ethical issues IT professionals face.Scenario: Your role is to support the Human Resource Department. The Head of Talent Acquisition wants you to search the Internet including social media sites, to determine if job applicants are demonstrating any online behavior that would jeopardize the company. The company does not ha...

The Internet or Strayer Online database

Use the Internet or Strayer online database to research the current health care delivery structures—both private and public—within your state.Write a 6-8 page paper in which you:Analyze the current health care delivery structure in your state. Compare and contrast the major determinants of healthcare market p...

Conflict Viewpoints on Social Networking

Assignment 1.2: Conflicting Viewpoints Essay – Part IISynthesizing and WritingDue Week 4 and worth 100 pointsWhen looking for information about a particular issue, how often do you try to resist biases toward your own point of view? This assignment asks you to engage in this aspect of critical thinking.For Part I of the assignment (due Week 2), you read a book excerpt about critical thinking processes, re...

What is the difference between verification and validation testing

1. What does the statement "you cannot test quality in, you must build it in" mean?  How, can you apply this to your project?2. What is the difference between verification and validation testing?...

Outreach Development Program

regarding the development of an outreach program by your facility, provided by your facility, share how you see yourself in the overall contribution to this program....

HashMap Test Output assignment

Hash Map ProjectOverviewThis hash map project is intended to provide students with an understanding of how map-based and hash-baseddata structures function. This project involves the implementation of a templated hash-table-based map withmethods that allow for its use as an associative array.StructureA hash map, a type of associative array, is a data structure that associates a val...

Digital & Mobile Technology

Essay topic: Technology – Is the world better off now with digital and mobile technology than it was before?...

DATA WAREHOUSING AND DATABASE DESIGN

Section 1: Design DocumentWrite a four to six (4-6) page design document in which you:Support the need for data warehousing within your company and elaborate on the best practices that the company will adhere to....

Facility Design assignment

Each week, you will work on one aspect that will help you prepare for the course and reflect. Consider this Journal as study notes. This Journal will provide an opportunity to capture new ideas from knowledge gained and record your thoughts throughout the course. This will also give you an opportunity to record questions you may wish to research further in preparation for other assigned work. ...

The four key issues in dynamic routing protocols

Please answer the following questions on a word document. Please provide any references/sources1. What are the 127.0.0.1 IP address and the most static route used in a host computer?2. What is the router comman...

Computer science assignment

include<stdio.h> #define PAY_RATE_1 8.75f#define PAY_RATE_2 9.33f#define PAY_RATE_3 10.00f#define PAY_RATE_4 11.20f#define TAX_RATE_FIRST_300 0.15f#define TAX_RATE_NEXT_150 0.20f#define TAX_RATE_REST 0.25f#define OVERTIME_RATE 1.5f int main(){ int choice; int hoursWorked; float payRate; float grossPay; float taxes; float netPay; float overtimePay = 0; ...

Mobile Applications assignment

Prepare a short "talking points" paper in which you discuss the growing risks associated with the adoption of mobile applications to deliver digital government services. Your "talking points" should be 3 to 5 paragraphs long.Your audience is a group of federal agency managers who are participating in a conference on "Best Practices" for adopting and deploy...

Web Site Security Plan assignment

The CIO of the Peapod online grocery store has asked you to create a website security plan that will keep the information that they are entrusted with safe, secure and out of the news. For this assignment, please include the following:An executive summary.An introduction to the plan.A web s...

Network Security assignment

Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization, Adventure Swimming School (ASS). (Note: All work must be complete and be original, work will be ran through a plagiarism checker). Thank youThe sections of the report need to include all of the following:...

Database Administrator assignment

You were recently hired as a database administrator for an organization who cannot afford to have any downtime. You have been asked to develop a plan for monitoring SQL Server databases.Address these aspects of the project in your discussion post:...

What are the various types of malware

What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? ( 160 word minimum, give example of atleast one worm and virus and differences)...