Category: Computer Science

  • someone that is good at word

    follow the instructions of what to do in the other word file.

    Requirements: word project

  • Artificial Intelligence Paper

    *** WARNING: I will be submitting your papers to safeassign to make sure that no one is PLAGIARISING. If the software detects that you have been, your paper will be given a grade of “0”.

    Complete a 2 page research paper- should be at least 600 words long double spaced, no longer than 750 (THIS DOES NOT INCLUDE WORKS CITED PAGE!) describing Artificial Intelligence. You must discuss how to use A.I. ethically and responsibly. You must research two tools that would be helpful in your future careers.

    Requirements:

    • Microsoft Word 2019/2021 format
    • Site your sources or references (YOU MUST HAVE AT LEAST TWO NOT INCLUDING YOUR BOOK) No use of wiki-anything, must be a credible source
    • Must include a Works Cited page
    • Brief Summary OR conclusion at the end
    • USE MLA Specifications similar to formatting used in Chapter 2 of Word Modules

    Attached Files (PDF/DOCX): Rubric for INNOVATIVE TECHNOLOGY PAPER.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Writing an article according to the which should be backdate…

    Title : Quantum-Enabled Drones for Battlefield Information Dominance: Integrating Sensing, Computing, and Secure Communications

    you will be writing an article according to the template for above topic which is backdated that means please use the references before 2024.. As I am publishing this article as back dated Dont use any references after 2023 or 2024.

    all the references should be before 2023 only if u have any questions please let me know.

    also dont need more than 7-8 pages max including analysis diagrams etc all

    Requirements: 1000000

  • INSS 788 – Information Practicum 2

    Please create a Gantt Chart for this project. The Gantt chart must be agile method.

    Requirements: until complete

  • IT532 | Computer Forensics | Week 5 Reflections on Week: 3 F…

    Discussion Assignment:

    Write a brief overview of the digital forensics tool you selected for this assignment, then discuss any issues you encountered while installing or using the tool. Explain how you overcame these issues, if applicable.
    Reflect on the insights you gained from this learning process.Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources,
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum 2 thoughtful and valuable replies to others (50 words each)

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each

  • Project 1: Design and Implement a LAN

    Project 1 Instructions:

    Please carefully review the Project 1 instructions (see attached files below) before you begin working on this project. The instructions are scenario-based and give you the step-by-step goals required to complete this project. You will complete this project using the Cisco Packet Tracer Activity (PKA) file and design and configure the network described in the instructions. If you are familiar with Cisco Packet Tracer, that’s great; however, if not, you are strongly advised to complete at least the first two modules Getting Started with Cisco Packet Tracer and Exploring Networking with Cisco Packet Tracer of Introduction to Cisco Packet Tracer modules available for free in Cisco Networking Academy.

    In addition, go ahead and download the Cisco Packet Tracer 8.x for free from Cisco Networking Academy or from the Introduction to Cisco Packet Tracer section of the Week 1 Reading.

    Objective 1 (90%):

    The Packet Tracer Activity (PKA) file needs to be opened in the Cisco Packet Tracer application. As you complete the design and configuration in the Packet Tracer activity the percentage of completion will show your progress. When you complete the design and configuration to 100% in the PKA, you have scored 90% of your total Project 1 score. The rest of the 10% will come from the documentation you provide using the template file as described below.

    Objective 2 (10%):

    Then, when you’re ready, use the Project 1 Template to document your project progress and record screenshots and descriptive answers in the given space in the document. 10% of your total score for the Project 1 is part of this documentation.

    Deliverables:

    This project is due at the end of Week 4. Please upload the following as the deliverables:

    • (10%) – Completed Project 1 Template after you rename it to `CMIT 351 – Project 1 – [LastName]`. For example: `CMIT 351 – Project 1- Adams.docx`.
    • (90%) – Completed Cisco PKA file following the same naming convention as shown above (do not forget to save the PKA file when complete to 100% and then upload).

    Project instructions attached

    Attached Files (PDF/DOCX): CMIT 351 Project 1 Template (1).docx, CMIT 351 Project 1 Template.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Computer Science Question

    The professor said to use python and not java for this project 01. I try to install the cyton sdk package in wsl (Ubuntu 24) but it always gives me errors.

    Requirements: The most detailed and well-explained possible

  • Discussion Post ( Student Reply Tech for Success – Module 4…

    Respond to students’ responses on the attached document

    Attached Files (PDF/DOCX): NEW 2026.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • 6 assignmnt

    Overview

    In your previous readings about object and process modeling, you learned about the importance of different diagrams in system design. You also learned about the importance of the Unified Modeling Language (UML), which is used to communicate to different types of stakeholders, including clients, businesspeople, and developers. Different types of UML diagrams represent different views of a system.

    In this assignment, you will focus more specifically on two types of UML diagrams: a UML activity diagram and a UML sequence diagram. You will be asked to interpret the diagrams, which will help reinforce an understanding of how these diagrams are used to communicate a systems design. You will also be asked to make improvements to one of the diagrams, which will help support your work in creating your own UML activity and sequence diagrams for Project Two.

    Prompt

    In this assignment, you will analyze one use case of an ATM. You will be asked to interpret the UML activity and sequence diagrams for this use case. Then you will make improvements to one of the UML diagrams using a CASE tool.

    1. Review the following UML activity and sequence diagrams. Remember, both diagrams describe the same use case, just from different viewpoints. A version with alternative text is also available: .
    2. Write a short, paragraph-length response interpreting the diagrams. Be sure to address the following questions:
    • What use case is being described by these diagrams?
    • What interactions are involved in this use case? What information is being passed back and forth?
    1. These diagrams describe one basic design for this use case. Analyze the design by identifying at least two deficiencies in the logic or functionality of the current design. Think about ways that you could address these deficiencies to improve the logic or functionality of the design.
    2. Choose one of the deficiencies that you identified. Then reconstruct a UML activity or sequence diagram to improve functionality. Use the CASE tool Lucidchart to reconstruct the diagram. Be sure to use proper UML notation and diagram flow.

    What to Submit

    Submit your assignment as a Word document. Be sure to include all parts of your assignment in the Word document: diagram interpretation (one paragraph), design analysis (at least two improvements), and your reconstructed UML activity or sequence diagram.

  • 6 d

    In previous modules, you learned about the importance of process modeling and how UML use case diagrams can be used to represent the different actors and “use cases” for a particular system. Your readings for this module have focused on how to create UML diagrams using CASE tools. In this discussion, you will bring these concepts together by creating a UML use case diagram for the DriverPass project.

    To prepare for your initial discussion post, review the and the business requirements document that you created for Project One (attached). As you review these documents, consider the following questions:

    • Who are the different “actors” in your system design? Consider the different users of the system as well as any outside systems.
    • What are the different “use cases” for your system? Consider the different functionality your system should provide. What do the different users need to be able to do?

    After you have reviewed these documents, begin creating your UML use case diagram using the CASE tool Lucidchart. Download your diagram as a PDF. Be sure to check the “Accessible PDF” box before downloading. Use the Module Six resources to help you with this task.

    In your initial post, be sure to address each of the following:

    • Attach the PDF copy of your completed UML use case diagram for the DriverPass system. Be sure that you used proper UML notation.
    • Describe your UML use case diagram in a few sentences. What use cases did you capture? Who are the different actors? Did you capture all required functionality for the DriverPass system?
    • What challenges, if any, did you experience in using Lucidchart? How did you overcome these challenges?
    • Thinking about the DriverPass system as a whole, what are two technical requirements of your system design?

    Attached Files (PDF/DOCX): resources.pdf, CS 255 Thinking Through Technical Requirements.pdf, CS 255 Business Requirements Document Template.docx, CS 255 DriverPass Interview Transcript.docx

    Note: Content extraction from these files is restricted, please review them manually.