Computer Science

Management Information Systems

Paper, Order, or Assignment Requirements     Final Project Due December 11th, 11:55 PM, late submission accepted till December 12th for reduced credit (-20%) Task 1 (50%): Create an Excel spreadsheet for a small business or organization. In the spreadsheet, demonstrate the various functions and techniques covered in the 3 ICAs. For example, the spreadsheet […]

Read full post

Date: February 3rd, 2015

TCP/IP Weaknesses

Paper, Order, or Assignment Requirements   Written report around 10000 words investigating the weaknesses of TCP/IP suite of protocols. Three machines should be set up to perform various experiments. Kali linux, Security onion and Ubuntu.

Read full post

Date: February 3rd, 2015

TCP/IP Weaknesses

Paper, Order, or Assignment Requirements   Written report around 10000 words investigating the weaknesses of TCP/IP suite of protocols. Three machines should be set up to perform various experiments. Kali linux, Security onion and Ubuntu.

Read full post

Date: February 3rd, 2015

TCP/IP Weaknesses

Paper, Order, or Assignment Requirements   Written report around 10000 words investigating the weaknesses of TCP/IP suite of protocols. Three machines should be set up to perform various experiments. Kali linux, Security onion and Ubuntu.

Read full post

Date: February 2nd, 2015

Analyse the most important cryptographic electronic voting approaches currently being developed or in use.

Paper, Order, or Assignment Requirements   Objectives * To address issues related to eVoting. Especially to investigate cryptographic issues linked to the existing approaches. Further, analyse, discuss and evaluate the different approaches. This will be worth 70% of the module mark. * Research to be conducted utilising traditional sources (books, journals, articles etc.) as well […]

Read full post

Date: February 2nd, 2015

Create a submission file named as “ITM205-SLP3-Exercises-YourFirstNameLastName “ which contains source code and running results marked with exercise number.

  Kindy, M. (2008). Chapter 15: Programmer-defines Functions. Python 2: For Beginners Only. Edition1.0. Retrieved from https://cs118.kindy.net/p2fbo_20131230.pdf Kindy, M. (2008). Chapter 16: Fruitful functions. Python 2: For Beginners Only. Edition1.0. Retrieved from https://cs118.kindy.net/p2fbo_20131230.pdf Kindy, M. (2008). Chapter 17: Files. Python 2: For Beginners Only. Edition1.0. Retrieved from https://cs118.kindy.net/p2fbo_20131230.pdf our SLP 3 assignment is about using […]

Read full post

Date: February 2nd, 2015

Write a Report as to how you would modify your code if the player was moving, this should be detailed enough that potentially it could be coded, though we are not asking you to write code, just explain how.

Paper, Order, or Assignment Requirements   1 page report Write a Report as to how you would modify your code if the player was moving, this should be detailed enough that potentially it could be coded, though we are not asking you to write code, just explain how. The following is the code; This Code […]

Read full post

Date: January 31st, 2015

Write a Report as to how you would modify your code if the player was moving, this should be detailed enough that potentially it could be coded, though we are not asking you to write code, just explain how.

Paper, Order, or Assignment Requirements     1 page report Write a Report as to how you would modify your code if the player was moving, this should be detailed enough that potentially it could be coded, though we are not asking you to write code, just explain how. The following is the code; This […]

Read full post

Date: January 31st, 2015

Live Chat+1-631-333-0101EmailWhatsApp