Category: Computer Science

  • Computer Science Question

    Summary:

    For the Week 2 Assignment students must have Kali Linux installed on their laptops. This is in preparation for next week’s assignment where students will work have to use Kali Linux to research, report, and present a digital forensic tool of their choice.

    What to submit:

    Screenshot of list below. Showing that you are able to install and make it work on your device. Place 20 words in the document to allow to be turned in. All I want you to do is download and install VirtualBox and Kali Linux on to your laptops AND start exploring and learning about

    • virtualization
    • Linux operating system
    • digital forensic tools

    Submit your written assignments here. Similarity/Plagiarism Allowable threshold = 24%

  • Computer Network Protocol (0105400) Project

    QUESTION

    You have been hired as a network architect. You are tasked by the IT manager to design IP addresses for your new network, which consists of 2 different Labs; each lab will have to use a different architecture (Centralized, decentralized or distributed).You (student/network architect) need to choose a network ID which is the best to make these 2 networks. You (student/network architect) will have a minimum of 4 workstations in lab 1, 4 workstations in lab 2. Both the labs must be connected to each other and must be able to transfer data packets between the networks.

    Students should submit a report, which includes the following:

    1. The network design which shows and explains the following clearly:

    -IP addresses of each network (1 marks)

    -Broadcast address for each network (1 marks)

    2.The team must simulate the proposed networks on the Packet Tracer simulator and make sure the following points are achieved:

    a.The simulated packet tracer network reflects the proposed networks architecture. (1 mark)

    b. The team must make sure each node within the network and between the networks can access the other nodes within that network and that messages arrive correctly as follows:

    From any sender device to any receiver device in the same/different networks; (1 marks)

    A broadcast message can be generated from any host with in any lab, and the message must be delivered to each of the connected hosts in the lab. (1 mark)

    3.The team must submit a PDF file that will have images generated using the simulator for each one of the abovementioned points, along with a detailed explanation of what steps are performed to achieve the task. (1 mark)

    4.Each group with all the members must present their project report in class along with the simulation (must be in working condition) using a live packet simulator. (4 Points)

    6.Any copied solution, same project addresses, obvious similarities will not pass.

    Note: Any assessment with plagiarism higher than 19% or text written using AI tools is more than 20% will be awarded 0 marks.

    There is no single solution for this project.

  • Computer Science Question

    • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
    • It is your responsibility to check and make sure that you have uploaded both the correct files.
    • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).
    • Email submission will not be accepted.
    • You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
    • You must use this template, failing which will result in zero mark.
    • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
    • Late submission will result in ZERO mark.
    • The work should be your own, copying from students or other resources will result in ZERO mark.
  • Computer Science Question

    • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
    • It is your responsibility to check and make sure that you have uploaded both the correct files.
    • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).
    • Email submission will not be accepted.
    • You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
    • You must use this template, failing which will result in zero mark.
    • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
    • Late submission will result in ZERO mark.
    • The work should be your own, copying from students or other resources will result in ZERO mark.
  • Business Intelligence for Information Technology

    Comprehensive Learning Assessment 1: Research paper on blockchain-enabled BI frameworks

    for a selected industry (68 pages). Students must use a mix of peer-reviewed research and

    real-world cases.

  • Week 4 Discussion forum

    • How do hash functions impact the performance of hash tables? Discuss the importance of choosing a good hash function and the consequences of poor hash function choices.

    Your response should be between 250 and 300 words, demonstrating your understanding of these data structures and their practical implications in programming.

    Please include outside sources.

  • Computer Science Question

    1- In this Assignment you must follow all the instructions on the Assignment’s file.

    2- Do not use any (AI) tools.

    3- Your answer should be academic and orgnized.

    4- To much Plagiarism is unacceptable.

    5- I’ve attached both Assignment’s file and the book so you can rely on the book as a reference if you wish.

  • C++ programming

    This PDF contains important C++ concepts and practice programs designed for beginners and second semester students. It covers fundamental topics such as class and object, encapsulation, inheritance, polymorphism, pointers, and recursion.

    The document also includes commonly asked exam questions, short definitions, and basic programs like factorial, swapping, and function overloading. It is helpful for quick revision, understanding core concepts, and preparing for exams.

    This material is especially useful for students who want simple explanations and easy-to-understand examples to improve their programming skills and exam performance.

  • easy computer science work

    easy computer science work

  • 362,walaao

    I need a complete and accurate solution to all questions and requirements, following all instructions. I want a solution without the use of artificial intelligence, one that leaves no room for error. Please only accept the task if you are certain you can solve it correctly and accurately, guaranteeing a perfect score. Please pay attention