Categories
Computer science

The order was placed through a short procedure (customer skipped some order details).

Assignment details in the files.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Categories
Computer science

Also, assignment is to be done in the programing language python specifically spyder

Instructions will be uploaded later.
Also, assignment is to be done in the programing language python specifically Spyder

Categories
Computer science

Number of sources and formatting style

Instructions will be uploaded later.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Categories
Computer science

If you need help, you should ask for help before submitting your work.

Create HW4-YourLastName folder and save your homework website files in this folder
1. Unzip HW 4- Due Sept 22, 2022 – Data files and Instructions.zip file
and follow the instructions in HW4 -Due Sept 22, 2022.doc file:
to complete “citifarmer04.html” file
and complete ″ farmerstyles04.css″ file,

When you create ″farmerstyles04.css″ write the suggested styles in this file one by one.
To understand how styles control your “citifarmer04.html” file you must:
After each step, save “citifarmer04.html” and ″ farmerstyles04.css″ files and then refresh “citifarmer04.html” in the browser to make sure that each style is applied successfully.

2. Use ″HW 4-solution screenshot.jpg″ to test your work
3. Check the HW4-YourLastName folder. It must have the files

File citifarmer04.html
Folder images (with two picture files: cityfarmer.jpg and tomatoes.jpg)
Folder styles (with farmerstyles04.css file)
4. Compress (zip) ″HW4-YourLastName folder to create ″HW4-YourLastName.zip″ file.
5. You can submit your work only once. You must check your homework before submitting it. If you need help, you should ask for help before submitting your work.
6. Send ″ HW4-YourLastName.zip ″ file to the Blackboard.

Categories
Computer science

Produce user interface and user interface sketches.

Need to perform highlighted tasks in the document. Produce user interface and user interface sketches.

Categories
Computer science

Note: your instructor may require that this project be completed in groups.

This project is divided into several parts, each with a deliverable. The first three parts are research publishs, which should include organized lists and notes gathered during research, sources, and in some cases policy publishs. These documents should be organized and readable, but are not polished reports.
Item Deliverables
Project Part 1 U.S. Compliance Laws Research
Submit a publish of your research of DOD-specific requirements for an organization’s IT infrastructure and U.S. compliance laws that may affect the firm.
Project Part 2 Infrastructure Research A
Submit a publish of (1) which policy framework(s) will be followed for the project and (2) DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains.
Project Part 3 Infrastructure Research B
Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.
Project Part 4 Final Report
Submit the final report of your class project.
Note: Your instructor may require that this project be completed in groups. If so, select a team leader and hold weekly team meetings as a group to be sure the work is proceeding on schedule.
Scenario
You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.
Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.
As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.
To do this, you must develop DoD-approved policies, standards, and control desсrіptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.
Blue Stripe Tech′s computing environment includes the following:
 12 servers running the latest edition of Microsoft Server, providing the following:
o Active Directory (AD)
o Domain Name System (DNS)
o Dynamic Host Configuration Protocol (DHCP)
o Enterprise resource planning (ERP) application (Oracle)
o A research and development (R&D) engineering network segment for testing, separate from the production environment
o Microsoft Exchange Server for email
o Email filter
o Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
 Two Linux servers running Apache Server to host your website
 400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools
Tasks
 Develop a list of compliance laws required for DoD contracts.
 Determine which policy framework(s) will be used for this project.
 List controls placed on domains in the IT infrastructure.
 List required standards for common devices, categorized by IT domain.
 Develop DoD-compliant policies for the organization’s IT infrastructure.
 Describe the policies, standards, and controls that would make the organization DoD compliant.
 Develop a high-level deployment plan for implementation of these polices, standards, and controls.
 Write a professional report that includes all of the above content-related items and citations for all sources.
Submission Requirements
 Format: Microsoft Word (or compatible)
 Font: Arial, size 12, double-space
 Citation style: Your school’s preferred style guide
 Length of publish research documents: 2–4 pages
 Length of final report: 14–18 pages
Self-Assessment Checklist for Final Report
 I developed a list of compliance laws required for DoD contracts.
 I listed controls placed on domains in typical IT infrastructure.
 I listed required standards for common devices, categorized by IT domain.
 I developed DoD-compliant policies and standards for my organization’s IT infrastructure
 I described the policies, standards, and controls that would make my organization DoD compliant.
 I listed all applicable DoD frameworks in the final report.
 I developed a high-level deployment plan for implementation of these polices, standards, and controls.
 I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
 I included citations for all sources used in the report.

Categories
Computer science

1. Describe what makes a good computer repair technician. Give at least three g

1. Describe what makes a good computer repair technician. Give at least three good qualities that technicians should possess and why those qualities are important.
2. Why is it important to understand the different parts of the computer’s motherboard? How does understanding the motherboard help you troubleshoot computer issues? Give at least three examples of issues you might encounter that would indicate a motherboard issue. Then provide some suggestions as to how these issues might be addressed.
Please include APA sources for all the answers.

Categories
Computer science

Natural language processing project Reference link : https://www.youtube.com/wat

Natural language processing project
Reference link : https://www.youtube.com/watch?v=tLsg01D6k6g
In the reference video he is trying to make the emotion detector using online libraries only. But here I need the actual processing without use of online libraries I want to make a similar project with the .ipynb file(jupyter notebook file) for the solution. Must use of Naive Bayes logistic Logistic regression and other natural language processing topic if possible in the solution.
Please refer to the site if needed.
https://paperswithcode.com/task/emotion-recognition
I have attached one of my assignments here where you can refer to the files if needed. In that assignment there is data set notebook file and there is a folder called gtnlplib where my professor did all the file separately for calculations of Naive Bays and etc. I need similar in my project like I have to present all the files in the presentation to explain in depth.
Please do include text tokenization in the solution.
Project is on Emotion detection in text with text classification.
I have attached My project.zip in which you can find the file of that YouTube video. I was not sure how to make changes in that. If you want to modify My project.zip like to make things working I’m fine with it too but I need modifications as indicated above like not to use online libraries only and etc..
Please do comment in every file in every line of code so that I can understand solution better.
If you need more clarifications let me know.
Email: j.plakhani1131@gmail.com
Mobile: +1(639) 560 4641
Comments from Customer
Please be sure to write paper as well for the project please include following steps in the paper.
title
abstract
introduction
Method
results
future work (if we can any)
conclusion

Categories
Computer science

Online exam, short answer and coding question Comments from Customer – Start dat

Online exam, short answer and coding question
Comments from Customer
– Start date: August 18th, est time zone, from 3 pm -5:30 pm.
– Duration: 150 minutes.
– Format: pattern of questions mcq plus short answer and coding questions dsa graph, bst all data structures.
Sample question Delete a node with one left child. Function takes a pointer to the node to delete. Replace with max value in its left sub-tree. It ensures that the node has a none empty left child.

Categories
Computer science

Everything to use for this project is attached. Every file needed to Compile is

Everything to use for this project is attached. Every file needed to Compile is attached. However, you may need to put pack in their respective folders. I have images to see where they go in Folder Paths.dox.
LET ME KNOW IF THERE IS A WAY, I CAN GIVE YOU THE FOLDER WITH THE FILES IN THEM ORGANIZED. RATHER THAN EVERY FILE UPLOADED SEPARATELY.
Instructions for the project are in the Final_Project.pdf. Please follow these instructions strictly!
This is a project I am in the middle of, and I need help on Sprint #4. And just part of Sprint #3.
For Sprint 3, I just need Delete, Outline Selected Shapes, Undo/ Redo Paste and Delete. Copy and Paste works.
For Sprint 4, I need everything: Group, Ungroup, Undo/Redo Group and Ungroup.
All code needs to be your original code please.
Please try and use Flyweight Design pattern for Sprint #4 features:
https://www.tutorialspoint.com/design_pattern/flyweight_pattern.htm.
Please make note of the Non-functional requirements, Suggestions and Hints, and Source Control Guidelines sections of the instructions document.
Do not worry about the four commits needed for GitHub or the GitHub repo. Do not worry about the UML diagrams.
Let me know what questions, concerns you have along the way; I will be monitoring my email carefully to answer questions ASAP.