Category: Computer Science

  • Homework 1

    Instructions

    Goal

    Design and build a small, realistic database for a real organization, then prove you can create, populate, query, and modify it using MySQL Workbench + SQL.

    Real-World Scenario (choose ONE)

    Pick a scenario you could put in a portfolio as a mini system such as:

    • Clinic Appointment System
    • Food Delivery / Restaurant Ordering
    • University Advising & Enrollment
    • Gym Membership Management
    • Small Business Inventory & Sales
    • Banking Lite (customers + accounts + transactions)

    Give your database a professional name (example: clinic_portfolio_db).

    Part A – Data Model (4 tables minimum)

    Create at least 4 tables that make sense for your scenario.

    Requirements (must include):

    • Primary key in every table
    • At least 2 foreign keys total across the schema
    • At least 3 constraints total, chosen from:
    • NOT NULL
    • UNIQUE
    • sensible DEFAULT
    • appropriate data types (INT, VARCHAR, DATE, DECIMAL, etc.)

    Example (Clinic scenario):

    Patient, Doctor, Appointment, Prescription

    (or Visit / Billing / Insurance depending on your idea)

    Part B – Build It in MySQL Workbench

    1. In MySQL Workbench, create your tables in a model.
    2. Confirm relationships are properly connected (FK lines in the diagram).

    Submission proof (screenshots)

    Create a Word/PDF document containing:

    • A screenshot of your EER diagram
    • A screenshot of each table showing:
    • columns
    • data types
    • PK/FK
    • constraints (as visible in Workbench)

    Also upload your .mwb model file.

    Part C- Forward Engineer + SQL Script

    Use Database Forward Engineer to generate and create the schema.

    Run the generated script:

    CREATE DATABASE …;

    USE your_database;

    Save everything you run into one SQL script file named:

    HW1_LastName_FirstName.sql

    Part D – Populate + Query (make it look real)

    Insert data

    Insert realistic sample data:

    • At least 5 rows per table (20 rows total minimum if you have exactly 4 tables)

    Queries (include results)

    Write SQL that demonstrates skill:

    1. SELECT * from each table (basic check)
    2. At least 1 aggregate query using COUNT, SUM, or AVG
    3. At least 1 filtering query using WHERE + ORDER BY

    Drop one table safely:

    • Either drop a child table first (FK dependent)
    • Or demonstrate you understand FK constraints (explain briefly in comments)

    Include the DROP TABLE …; in your SQL script.

    Part E – Export Evidence:

    Export one result set from Workbench (CSV preferred):

    • Choose one of your meaningful JOIN queries
    • Export the results as:
    • HW1_LastName_FirstName_Result.csv

    Upload:

    • the SQL script (.sql)
    • the result export (.csv)

    Part F –

    1) Design Rationale (short reflection)

    In your Word/PDF submission, add a section titled Design Rationale answering in your own words:

    Why did you choose this scenario?

    Why did you pick these 4 tables?

    • Name 2 constraints you used and explain why they matter.
    • Describe 1 relationship (FK) and what it represents in real life. (610 sentences total is enough.)

    2) SQL Comment Signature

    At the very top of your SQL file, include:

    — HW1 CIS 344

    — Name: __________

    — Scenario: __________

    — I confirm this work reflects my own understanding and was not generated by AI tools.

    Deliverables Checklist

    Upload these items:

    • Word/PDF with screenshots + Design Rationale
    • .mwb MySQL Workbench model file
    • .sql script file
    • .csv exported result set file

    Late Submission Policy

    Anything submitted after the posted deadline date/time in Brightspace is considered late and receives a flat 10-point deduction (for a 100-point homework), regardless of the score earned.

    Grading Rubric (100 pts total 25 pts each file)

    1) Word/PDF (screenshots + rationale) (25 pts)

    • EER diagram + readable screenshots of all tables (columns/types/keys shown)
    • Scenario is clear + short Design Rationale included

    2) .mwb model file (25 pts)

    • 4+ tables created correctly in Workbench
    • PKs on all tables + relationships/FKs defined + appropriate constraints/data types

    3) .sql script (25 pts)

    • Database + tables created (Forward Engineer output OK)
    • Inserts (5 rows per table)
    • Queries: SELECT * for each table + at least 3 meaningful WHERE queries
    • Includes DROP TABLE (with brief comment if needed)

    4) Export (.csv) (25 pts)

    • Correct CSV export of one query result (opens properly, matches your database)
  • Project 1

    see instruction on attached file project 1 instructions.pdf

    Attached Files (PDF/DOCX): Project 1 Instructions.pdf, Project1.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Project 1

    Check Attached file Project 1 instructions.pdf for instruction what to do.

    Attached Files (PDF/DOCX): Project1.pdf, Project 1 Instructions.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Low and high type

    I am tutor of 9 and 10 class with teaching of matmath science English and social

    Requirements:

  • 390-2

    Purpose

    Interpreting the signatures of normal and abnormal network traffic can help prevent network intrusions. In this assessment, you will examine the characteristics of a network intrusion.

    Assessment Instructions

    Part 1: Concepts From Module Reading

    Answer and provide a brief explanation (3050 words) and include at minimum of 1 scholarly source cited in APA format for each of the following five questions.

    1. A ____________________ is a generic type of scan in which an attacker attempts to locate ports opened by a Trojan by scanning ports 065,535.
    2. True or False: An attacker might choose to limit the speed at which they attack a network in order to avoid detection.
    3. __________, which are TCP packets with no flags set, can be sent by an attacker to attempt to crash a server.
    4. The ____________________ is used to set the largest sized packet that can be transmitted on a network. Larger packets than this number will be fragmented.
    5. IP address
    6. Maximum Transmission Unit (MTU)
    7. IP protocol number
    8. What type of attack might the Nemesis tool be used for?
    9. Packet injection
    10. Path obfuscation
    11. CGI script exploitation

    Part 2: Signatures and Actions

    1. Signatures fall into one of the following two categories: Atomic signatures and stateful signatures. Describe each and include at minimum of 1 scholarly source cited in APA format. (100200 words each)
    2. There are three types of signature triggers. Describe each and include at minimum of 1 scholarly source cited in APA format. (100200 words each)

    Part 3: Network Traffic Signatures

    1. Distinguish normal traffic signatures from abnormal traffic signatures. Include at minimum of 1 scholarly source cited in APA format (Minimum 300 words total)

    Part 4: Detection and Prevention Capabilities

    1. You want to deploy a wireless intrusion detection system. What tool would you use and why? (Minimum 300 words total) Include at minimum of 1 scholarly source cited in APA format
    2. Most intrusion detection and prevention systems support multiple detection capabilities. Distinguish each of the following: Thresholds, blacklists, whitelists, and alert settings. (Minimum 300 words total) Include at minimum of 1 scholarly source cited in APA format
  • Artificial Intelligence

    I need literature reviews with PRISMA method. for AI thesis master. I have already done the proposal and the code and all the refs. just need some one write literature reviews section 20 pages 9000 words. with 100 refs.
  • Cengage

    Cengage work. Im looking for someone who can complete Computer Science work on the website Cengage. I will give you the login and you complete the work on the website. After you complete the work you share the link and work with me. Very specific directions for this as well. The price will obviously change I just wanted to put this message out for the writers to see. Price is negotiable as well. Need someone familiar with Cengage.

  • Homework

    This assignment covers Chapter 5 (Adversarial Search), Chapter 7 (Logical Agents), and 12 (Quantifying Uncertainty) from Russell and Norvig.

    1. Games

    [10 points]

    (a) Consider the following zero-sum game tree. The choices for the maximizing player are shown with triangles that point up, and the choices for the minimizing player are shown with triangles that point down. The bottom nodes represent the terminal utilities.

    Figure Description 1: A game tree to calculate minimax. As usual max nodes are triangles, min nodes inverted triangles. Costs are illustrated on the leaves.

    (a) [6 points] Give the minimax value of each node, assuming both players act optimally. How the game should be played

    (b) [4 points] Show the pruning of nodes from the game tree above through alpha-beta pruning? Explain the reason if no nodes can be pruned. Assume the search goes from left to right; when choosing which child to visit first, choose the left-most unvisited child.

    1. Consider the below expectimax tree, where circle nodes are chance nodes, the top node is a min node, and the bottom nodes represent the terminal utilities. [10 points]

    Figure Description 2: A game tree to calculate expect minimax. As usual max nodes are triangles, min nodes inverted triangles, and probability nodes are circles. Costs are illustrated on the leaves.

    (a) [Calculate the expectimax value of each chance node.

    (b) What is the value of the min node? Which action should the min player take (e.g., first, second, or third action represented by a chance node)?

    (c) Which nodes can be pruned from the game tree above through alpha-beta pruning? Explain the reason if no nodes can be pruned.

    1. [10 points] Broadly describe state description, move generators, terminal tests, utility functions, and evaluation functions for one the game of Monopoly. Cite all the sources that you use for your homework.
    2. [20 points] Solve the following exercises from Rusell and Norvig, 4th edition on
    3. 4 (2,4,6,7,9) [5 points], 6 (2) [2 points]
    4. 12 (3,5,7) [3 points]
    5. [10 points] In this exercise, we will deal with the game of poker. In particular, consider the set of all possible five-card hands dealt fairly from a standard deck (52 cards).

    (a) How many five-card hands are there?. That is, how many atomic events are there in the joint probability distribution? Explain your answer.

    (b) What is the probability of each atomic event?

    (c) What is the probability of being dealt a Four-of-a-kind? Two Pairs? a Full House? Cite all your sources

    1. [10 points] Using the joint probability table for the random variables A,B,C shown below.

    Joint Probability TableA

    B

    C

    P(A, B, C)

    FalseFalseFalse0.15FalseFalseTrue0.10FalseTrueFalse0.03FalseTrueTrue0.10TrueFalseFalse0.20TrueFalseTrue0.05TrueTrueFalse0.02TrueTrueTrue0.35

    (a) Compute the probability P (A = false)?

    (b) Compute the probability P (A = true, B = true)

    (c) Compute the probability P (A = false | C = true)

    (d) Compute the probability P (A = true, B = false | C = true)

    (e) Compute the probability that P (A = true | B = true)

    instructions with no picture, please see attached photo for illustrations for each question

  • Assignment 2: System Components and Infrastructure Network D…

    Module 2: Internet and network security

    Assignment 2: System Components and Infrastructure Network Devices

    Objective: Understand and differentiate between various network components and devices, including their roles and functionalities. Submit 3-4 pages of report briefly.

    Instructions:

    • Describe the following network devices and their functions with a Diagram :
    • Gateway
    • Router
    • Switch
    • Explain the differences between a firewall, web server, application server, and database server. Include a diagram showing how these components interact in a typical network setup.
    • Research and write a short report on the use of Forward Proxy and Reverse Proxy servers, including their benefits and typical use cases. Provide real-world examples of each.
    • Draw a network diagram including a Demilitarized Zone (DMZ). Explain the purpose of a DMZ and how it enhances network security.

    Attached Files (PDF/DOCX): Module 2_ Internet and network security.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Intelligence student engagement and attendance monitoring sy…

    This project presents a smart classroom system designed to improve the way student presence and participation are monitored. The system provides a more modern and efficient approach compared to traditional methods, supporting better awareness of student activity within the classroom environment.