# Get Help-Assignment (AMA)

Get Help-Assignment (AMA)

Assignment (AMA)

Q3: Two opposite corners are removed from an 8-by-8 checkerboard. Prove that it is impossible to cover the remaining 65 squares with 31 dominoes, such that each domino covers two adjacent squares?

Q2:

Q3: Through A Write an algorithm to construct the indicated graph operation, using only the primary graph operations of additions and deletions of vertices and edges. Test your algorithm on the pair ( P4, W5 ) and on the pair ( K4 – K2, C4 ):

• Cartesian product of two graphs (psedocode)?

Q4: Through A,B either draw the required graph or explain why no such graph exists:

• An 8-vertex, 2-component, simple graph with exactly 10 edges and three cycles?
• An 11-vertex, simple, connected graph with exactly 14 edges that contains five edge-disjoint cycles?

Q5: Prove or disprove: If a simple graph G has no cut-edge, then every vertex pf G has even degree?

Q6: Prove that if a graph has exactly two vertices of odd degree, then there must be a path between them?

Q7: Show that any nontrivial simple graph contains at least two vertices that are not cut-vertices?

Q8: Through A Draw the specified tree(s) or explain why on such a tree(s) can exist?

• A 14-vertex binary tree of height 3.

Q9: Prove that a directed tree that has more than one vertex with in degree 0 cannot be a rooted tree?

Get Help-Assignment (AMA)

# Need Help-Computer Science

ORDER NOW your custom paper to have it completed successfully on time.

Need Help-Computer Science

Construct and execute a simulation that will provide an answer to the following:
A cereal company puts cards bearing flags in their boxes of cereal. There is one card per box. If there are six different flags, on the average, how many boxes of cereal will you have to buy before you collect all six flags ?

+ include the source code

Need Help-Computer Science

ORDER NOW your custom paper to have it completed successfully on time.

# Homework Help

Homework Help

Person 1:

Write about the company ‘YELP’10 Pages (Research Paper)

(Instructions given in the attached image ‘Instructions.jpeg’)

Write about the Wearable Computing – 10 Pages (Research Paper)

(Instructions given in the attached image ‘instruction.jpeg’)

Make Power Point Presentation About : Wearable Computing – 8 Slides (Simple and Easy Words to Explain with Speaker Notes)

Person 2:

Instructions for doing everything for person 2 in the attached image ‘Instructions_1.jpeg’ and ‘Instructions_2.jpeg’

Case #2 – 6 Pages

Ethics (Page: #18) – 4 Pages

Technoogy – Security Issues of Mobile Devices:How to protect them – 10 Pages

Presentation About : Case #18 (Simple and Easy Words to Explain with Speaker Notes)

The Case has a question for discussion at the end of the case. Please answer them too.

In the PPT, it will be similar like you did last time

In the book attached, you will find the ethics and the case

Homework Help

# Computer Science Homework

Computer Science Homework

You have all experienced how when you are typing a text message the application will provide potential words that complete what you are typing (and sometimes insist on completing them incorrectly). You will write a Python program that is capable of generating a likely set of completion words given the start of a word as input to the program.

In order to be able to make these suggestions, your program will first need to analyze a large amount of text (like a book) to get an idea of what words occur how often in regular text. Once this analysis is made, then it will be possible to do a quick lookup into a data structure described below to generate the potential words.

Step 1 – Text file analysis

Ask the user for the name of a file that contains the text to analyze. Open the file and read the lines of text. Break each line into words, stripping out all of the special symbols. For each word that you find that is longer than one character, do the following. First, add the word to a dictionary of words you have seen so far. The values in this dictionary should be a count of how many times each word has occurred in the text file. Second, add the word into a data structure that is keeping track of word information for the completion process. This data structure has 3 basic parts. The top level part is a list that will have as many elements in it as the number of characters in the longest word seen so far. Each element in this list will be a dictionary which is indexed by the 26 letters of the alphabet. The value for each entry in the dictionary will be a set of words. A word is added into this structure as follows. The word is first added to the set contained in the dictionary corresponding to slot 0 in the list, indexed by the key of the first letter in the word. Then, the second letter of the word is used to index into the dictionary corresponding to slot 1 in the list to add the word to that set. This continues for the remaining letters in the word. So this means that the word “help” would be added to the set of words that have an h as their first letter, the set having e as the second letter, the set for l as the third letter, and then p as the fourth letter.
Step 2 – Word completion

With these two structures of information constructed based on the input file, it is time to do word completion. Within a loop that can continue as long as the user wants, ask to read the starting portion of a word. You then must determine the set of all possible words you have seen that begin with this string of characters. This set of words can be computed by intersecting a group of sets extracted from the data structure. These sets are found by indexing into the dictionary corresponding to the character value of each position in the string. You can intersect all of these sets together two at a time to get your result. So if the string “he” was typed in, you would intersect the set of words that have h as their first letter with the set of words that have e as their second letter. This gives the set of words that start with “he”.

Next you must rank the possible set of words based on how often they were found in the text, assuming that words that occur often are more likely to occur again. For each word in the final set of possibilities, extract the occurrence count from the other dictionary you constructed. Then sort the words based on these values. Print out the top five candidate words (or fewer if less than five exist) with a percentage of how likely each word is the proper completion of the string given. To compute percentages, first total up all of the occurrences of the words in the set, then divide the count for each by this amount.

Submission

Submit your commented source code. Acquire a few large text files to test your program. Plain text files of books are a good suggestion, like the War & Peace file we used in class. Things like Project Gutenberg are a good source for these. Submit some sample output from your program using one of these files.

Computer Science Homework

Review the steps of the communication model in Ch. 1 of Business Communication Essentials (See Figure 1.3).

Identify one personal or business communication scenario to describe each step of the communication process.

Complete the Communications Process worksheet.

Compose a 700-word response detailing the paragraphs in the boxes provided.

Discuss how mobile technology is changing the practice of business communication.

Define ethical communication.

Explain how the widespread use of social media has increased the attention given to the issue of transparency.

Give an example of how mobile communication can be used to in a business setting.

Format your assignment consistent with APA guidelines.

# Need Help-Networking

Need Help-Networking

You have been hired as part of the networking team at UMUC. After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.

The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for UMUC, as the university must protect students’ and employees’ data, as well as any intellectual property that UMUC has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this new building to support university operations.

After speaking to your manager, you are excited about the project, but you realize you will have a busy schedule. As you write your proposal, you will also have to prepare for the Network+ Certification exam. One of the conditions of your employment at this company is that you obtain this certification within 60 days of being hired. You will have to manage your time wisely, because you will have to take a practice certification test just as you are completing your final project.

In this learning demonstration, you will use the TestOut Network Pro (LabSim) to learn about the different types of networks and how to configure them. These activities will prepare you for the CompTIA Network+ Certification exam. In order to identify your strengths and weaknesses, you will first complete the Network+ Certification Practice exam. The practice exam is designed to assess your preparedness for the CompTIA Network+ certification exam. Then, during the course of the next eight weeks, as you step through each set of activities in LabSim, you will also be drafting sections of your design proposal.

Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention to. You must complete all online labs in LabSim; these are the activities with the computer mouse icon. Some of the other areas in LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics at hand.

To get started, follow the steps below.

OVERVIEW

you will provide detailed network design proposal. Your task is to design the network for this new building with the following criteria:

• Student-accessed computers should be on separate network from the staff-accessed computers. Computers for public use should be on a separate network.
• There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
• The network should use physical cable, not wireless. But do provide wireless access in the Student Lobby area (second-floor hallway). Set the maximum simultaneous wireless users to 254.
• The network has been assigned the 10.11.12.0/23 network address for all computers and devices

Your proposal should have three major sections:

1. Physical Network Design
3. Network Services Design

To learn how you will be assessed on this assignment, please take a moment to review the rubric.  The final deliverable should adhere to the following criteria:

• Include at least five scholarly references.
• Use IEEE-style citation.
• Use correct network terminology.
• The use of diagrams is encouraged.

Use this template as a guide while creating your final deliverable.

Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1–4 above)

In this section, address each of the following.

1. Define the subnets (based on rooms, floor, department, or other criteria).
2. For each subnet, explain which devices/‌groups/‌users/‌rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

Network Services Design

In this section, address each of the following.

1. Identify network services needed.
2. List additional servers or network devices needed to implement the network.
3. List network security measures to be implemented.
4. Justify the need for the network services, security measures, and devices you’ve selected.

### 6. Building Details

The 50-year-old, two-story building has the following layout:

Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet.  Each lab will have 32 computers: 30 student computers, 1 instructor computer, and 1 server in the closet for instructional use.

In addition, there will be a Student Computer Lab that will provide computer access to students to do their homework. There will be 50 computers in this lab and a server in the closet. To allow students access to library resources, the library will also have 10 computers for students and 5 computers for library staff.

Finally, there are various offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

TEMPLATE

Network Design Proposal

Prepared for:

University of Maryland University College

Prepared by:

Student Name

1. Physical Network Design

1. Network Topology

In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If you make some assumptions, be sure to list them. This section is not about the actual infrastructure or equipment, but it should discuss the business needs of the company.

Example

ABS Enterprises believes that employees’ health, well-being, and morale have a significant impact on the productivity of the employees and thus the overall results or output of the company. They want to invest in a facility that will provide the most return on investment while still providing a facility that employees will use.

Proposed Topology

Select one or more topologies to use for this design. This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost.

Example

We are proposing the construction of a basketball court at our campus. This can be constructed behind our main building where the current overflow parking lot is located. The court will be a full regulation-size basketball court [1]. The typical measurements of a regulation-size basketball court are as follows:

 Area Measurements Court length 94 ft Court width 50 ft Rim height 10 ft Restricted arc radius 4 ft Center circle diameter 12 ft 3-point line distance from the basket 23.75 ft Key (shaded lane or restricted area) width 16 ft Free-throw line distance from point on the floor directly below the backboard 15 ft

The court will cost approximately \$20,000 and will include such features as the company logo, a state-of-the-art lighting system, and a net structure around the court.

Justification

Justify your determination that the selected topologies will meet the business needs. Use the information provided in the scenario to make the appropriate assumptions (make sure to list those assumptions). Be sure to also provide an analysis of the justification for the infrastructure or equipment.

Example

Last month, the Human Resources department conducted a survey asking all current employees which facility they would be more likely to use: basketball court, volleyball court, or tennis court. Based on the survey, 70% of our employees selected basketball, 40% selected a tennis court, and 20% percent chose volleyball court.

1. Network Media

Proposed Network Media (include network wiring diagrams)

Select one or more network media to use for this design.

Justification

Justify your determination that the selected media will meet the business needs.

1. Network Devices

Proposed Network Devices

Select network devices to use to implement the design. Include setup and location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed.

Justification

Justify your determination that the selected network devices will meet the business needs.

1. Network Security Devices

Proposed Network Security Devices

Select network security devices to use to secure the network. Include setup and location information for the devices. Provide comprehensive list of devices including the quantity of each device needed.

Justification

Justify your determination that the selected network security devices will meet the business needs.

1. Computer Systems

Proposed Computer Systems

Select computer systems (servers) to use to implement the network design. Include setup and location information for the devices. Provide comprehensive list of devices including the quantity of each system needed.

Justification

Justify your determination that the selected systems will meet the business needs.

2. Subnetting

Proposed Subnetting (include the calculations)

List the quantity of subnets needed. For each subnet, provide the IP addressing info (network address, broadcast address, range of available IP addresses) and the systems, devices, or equipment that will be on that network. Also provide the calculations on how those IP addressing information are determined.

Justification

Justify your determination that the network address design will meet the business needs(why the design needs to have x number of subnets? What are the implications if they have more or less subnets?)

III. Network Services Design

1. Network Services

Proposed Network Services

Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).

Justification

Justify your determination that the network services are needed and will meet the business needs

1. Network Security Measures

Proposed Network Security Measures

Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures.

Justification

Justify your determination that the network security measures are needed and will meet the business needs.

Bibliography

# Question 1

The Internet, TCP/IP, and DNS

Identify and discuss the two primary protocols that form the foundation of the Internet.

Define and describe the purpose of DNS. Provide an example of what DNS does.

Identify the protocol DNS relies upon for delivering data to the appropriate destination.

Discuss two or more reasons why TCP/IP and DNS are important to the way the Internet functions using information from this week’s lecture,

Your initial response should be a minimum of 300 words in length.

Question 2

Client Server and Cloud Computing

Watch the following video: Fry, S. [Databarracks] (2013, October 22). Changes to computer thinking – Stephen Fry explains cloud computing [Video file]. Retrieved from https://www.youtube.com/watch?v=J9LK6EtxzgM

In your own words, define client/server and cloud computing. Compare and contrast the two technologies, and provide examples to support your discussion. Identify which of these technologies is predominant in your organization. Your initial response should be a minimum of 300 words in length.

Question 3

Network Traffic, QoS, and SLAs

Describe the differences between elastic and inelastic traffic on a network and provide several examples of each from your own experience.

Describe quality of service (QoS) and its importance for managing network traffic.

Compare and discuss the differences between QoS and service level agreement (SLAs). Your initial response should be a minimum of 300 words in length.

Question 4

ATM and Gigabit Ethernet

Describe the differences between asynchronous transfer mode (ATM) and Gigabit Ethernet. Determine which you think is the better choice for a high-speed network. Discuss your conclusions and support your position with citations from your research. Your initial response should be a minimum of 300 words in length.

Question 5

VoIP and PoE

Voice over Internet protocol (VoIP) has become a standard way to route calls to remote locations for businesses that have nationwide locations and global operations. Power over Ethernet (PoE) is also a standard component of today’s business networks.

Discuss why these two elements are found together in business networks. Identify and discuss the advantages and disadvantages of the PoE technology. Provide examples to support your discussion. Your initial response should be a minimum of 300 words in length.

Question 6

VLANs and Mobility

VLANs are a common element in business communications and mobile connectivity. Identify and discuss the characteristics of VLANs and why they are important to business operations. Provide examples to support the characteristics you identified in your discussion. Your initial response should be a minimum of 300 words in length.

Question 7

Security Policies and Plans

Using information from the course materials and the lecture, discuss the difference between a security policy and a security plan.

Assume you are the information technology director of a small firm and that you are tasked to create a security plan for your organization. Describe the major points you would include in your plan, and discuss why they are important to your plan. Your initial response should be a minimum of 500 words in length.

Assignment 1

Data Center Consolidation

Read the Business Data Communications, 7e – Case Studies provided as part of the online resources from your text found at: http://media.pearsoncmg.com/ph/esm/ecs_stallings_bdc_7/case_studies_index.html

In at least a two page paper (excluding the title and reference pages), discuss each element listed below and how it plays a key part in a successful consolidation.

Bandwidth and high-speed communications

Cloud computing as a consolidation option

Mobile or ‘pod’ datacenters as consolidation options

Provide examples for each of these aspects to support your discussion.

You must use at least two scholarly source, in addition to the textbook and be formatted according to APA style guidelines

Assignment 2

WLANs

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees. Write a three to five page paper (excluding the title and reference pages), discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and risks of three security methods, then identify and justify the best approach for securing a WLAN.

You must include a minimum of two scholarly sources, in addition to the text book, with a minimum of one source from peer-reviewed sources from the Ashford University Library. Your paper must be formatted according to APA style guidelines

Assignment 3

Mobility, CDMA, and GSM

In a paper of at least two pages (excluding the title and reference pages), discuss a minimum of three mobile web applications that are familiar or that you use regularly. Describe the differences between CDMA and GSM. Discuss how CDMA and GSM support the mobile web applications you identified. Provide examples to support your discussion.

In your paper, you must use at least two scholarly sources, in addition to the textbook, and be formatted according to APA style guidelines

Assignment 4

A Walk in the IT Director’s Shoes

The final assignment for this course is a Final Paper. The purpose of the Final Paper is for you to culminate the learning achieved in the course.

Focus of the Final Paper

Assume you are an Information Technology Director for a small, growing firm and are tasked with developing an electronic resource security policy to deploy within your organization. The policy needs to protect the organization’s valuable electronic assets, but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It also needs to address communication and data security aspects such as remote data access, smartphone access, and internal electronic communications such as IM (instant messaging) and email.

**(Note that a policy is different from a plan. Be sure you address primarily the policy aspects of this task.).

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your own research, discuss the following elements.

Discuss the differences between ‘implementation’ and ‘policy’, and describe the importance of their separation.

Using information from the course, including the lectures and weekly reading, develop an outline of your security policy which addresses the areas identified in the prompt. Be as specific as possible.

Compare the policy differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment.

Discuss how you would implement your security policy within the organization, including how employees would be apprised of the new policies. Be sure to explain which elements are critical for a successful implementation of your policy

Include a minimum of five sources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

Writing the Final Paper

The Final Paper:

Must be a minimum of five double-spaced pages (excluding title and reference pages) in length, and formatted according to APA style as outlined in the Ashford Writing Center.

Must include a title page

Must begin with an introductory paragraph that has a succinct thesis statement.

Must address the topic of the paper with critical thought.

Must end with a conclusion that reaffirms your thesis.

Include a minimum of five sources which may include the text. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

Must document all sources in APA style, as outlined in the Ashford Writing Center.

Must include a separate reference page, formatted according to APA style

Book:

Stallings, W., & Case, T. (2013). Business data communications: Infrastructure, networking and security (7th ed.). Upper saddle river, NJ: Prentice hall

# Need help-Research Paper – SDLC Models

### Research Paper – SDLC Models

This research paper will compare and contrast Systems Development Life Cycle (SDLC Models).  The research paper must be submitted using Safe Assign.

• The paper will be five pages:  (a) Describe the 7 Step SDLC – 2 pages, (b) Describe a different SDLC Model (4 step or 12 step) – 2 pages, (c) Compare and contrast the 7 Step Model and the second model you selected (4 step or 12 step) – 1 page.  Your prior IST textbooks are an excellent source for finding SDLC models. Review chapter 17 in the text before beginning this paper.  DO NOT discuss Methods in this paper (waterfall, rad etc…).  You need to find other SDLC models, the models will be called SDLC …some may have four steps and others may have 12 steps.
• APA format; Minimum of 4 professional/peer review references.  Note: Professional references refer to books and journals.  (Typical internet resources are not considered professional resources).

# Network Design Proposal I

Simply Click ORDER NOW and your paper details. Our support team will review the assignment(s) and assign the right expert whose specialization is same to yours to complete it within your deadline. Our Editor(s) will then review the completed paper (to ensure that it is answered accordingly) before we email you a complete paper

Email Us for help in writing this paper for you at: support@customwritings-us.com

# Network Design Proposal (Parts 1-3)

### Overview

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

• Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).
• There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
• The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

• Physical Network Design
• Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

• Include at least five scholarly references.
• Use IEEE-style citations.
• Use correct network terminology.
• The use of diagrams is encouraged.

Use this template as a guide while creating your Network Design Proposal (Parts 1-3).

### Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1–4 above).

In this section, address each of the following.

1. Watch How to Subnet a Network Video provided in Content -> Project Instructions
2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 – 3
3. Complete the subnet chart provided at the end of the document.

### Network Services Design

In this section, address each of the following.

1. Identify network services needed.
2. List additional servers or network devices needed to implement the network.
3. List network security measures to be implemented.
4. Justify the need for the network services, security measures, and devices you’ve selected.

### Building Details

The 50-year-old, two-story building has the following layout:

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

 Deadline High School Undergraduate (1-2 Years) Undergraduate(3-4 Years) Masters PhD (Doctoral) Over 15 Days \$8 \$10 \$12 \$14 \$16

Continue to place your Order Now

ORDER NOW your custom paper to have it completed successfully on time.