• Q : Should be able to accept an integer from keyboard....
    Basic Computer Science :

    The program should be able to accept an integer from keyboard. This integer serves as the level of the pyramid. For instance, the level of the pyramid above is 4.

  • Q : Incorporate some sort of user interface....
    Basic Computer Science :

    Pick any topic of interest to you. If you are having trouble thinking of a topic, ask on the forums or drop me an email. Let me know what you're thinking of working on, and I'll help you get in the ri

  • Q : Software manufacturers have enjoyed strong legal....
    Software Engineering :

    Software manufacturers have enjoyed strong legal protection from lawsuits associated with software failures.Are any organizations or politicians working to create a laws that would force software manu

  • Q : The two subclasses, grad and undergrad....
    Basic Computer Science :

    The two subclasses, Grad and Undergrad, will inherit all data members of the Student class and override the method isPassed. For the UnderGrad class, if the grade is above 70.0, then isPassed returns

  • Q : Design and draw a logical topology....
    Computer Network Security :

    Design and draw a logical topology that will support ElectroMyCycle's needs. In addition to meeting the specified needs, be sure to consider security.

  • Q : Circle the scenario and industry vertical....
    Basic Computer Science :

    Circle the scenario and industry vertical your Instructor assigned to your group: a. Healthcare provider under HIPPA compliance law. b. Regional bank under GLBA compliance law. c. Nationwide retailer

  • Q : Honda king is an automotive repair....
    Basic Computer Science :

    Honda King is an automotive repair shop where customers take their cars for service maintenance. A database designer was hired to create relations for a database to keep track of their service records

  • Q : Client browsers attempting to access a web site....
    Basic Computer Science :

    Client browsers attempting to access a Web site receive an error message when the following conditions are in place

  • Q : Arithmetic expressions represented as lists....
    Basic Computer Science :

    Write a Prolog program to evaluate prefix arithmetic expressions represented as lists. Assume four operators may be used in expressions and they are +, -, *, and /. All these operators are binary, i.e

  • Q : Using the web, search for software firewalls....
    Basic Computer Science :

    Using the Web, search for "software firewalls" Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according t

  • Q : Identify the major vulnerable points to security threats....
    Basic Computer Science :

    Identify the major vulnerable points to security threats in the network structure and discuss how firewalls can counteract these threats.How secure is SNMP? Are firewalls the total solution to deny ac

  • Q : What are the major applications and technologies....
    Basic Computer Science :

    What are the major applications and technologies?What sort of "ball-park" budget will be required to use the technologiesWhat lead times will be required?

  • Q : Rewrite the merge procedure so that it does not use infinity....
    Basic Computer Science :

    Rewrite the MERGE procedure so that it does not use infinity at end of each array , instead stopping once either array L or R has had all its elements copied back to A and then copying the&n

  • Q : Lecture on simulation, and on self-similarity....
    Theory of Computation :

    Queuing, and the lecture on simulation, and on self-similarity and traffic patterns with equal weight. traffic models, develop network models, and analyze results for evaluating the performance of que

  • Q : Physical security simulation....
    Theory of Computation :

    Compose a report on the experience of performing the Physical Security survey. Students will write a report consisting of 250-500 words (double-spaced) on experiences in the Physical Security Simulati

  • Q : Increase the cpu speed by 50% and balance....
    Operating System :

    Increase the CPU speed by 50% and balance the disk load across the two fast disks.For each of these four modifications, compute and graph the effects on the original system. Explain in words the effec

  • Q : Assuming that the new disk and new cpu....
    Operating System :

    Assuming that the new disk and new CPU are equally prices, which should Marty buy to increase throughput?Assuming that he chooses to buy the new disk (CPU), how should he optimally split requests betw

  • Q : Analyze personal privacy....
    Computer Network Security :

    Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios.Select three organizations within the same industry for analysis 

  • Q : Who are the organization''s main competitors....
    Theory of Computation :

    Who are the organization's main competitors? How does this organization differentiate their e-commerce web site / offerings from their competitors?

  • Q : At public tv station, qqtv, the membership department....
    Computer Networking :

    At public TV station, QQTV, the Membership Department currently keeps donation information on database which runs on their local area network. QQTV would like to pursue more direct marketing and World

  • Q : Web pages are part of a business....
    Basic Computer Science :

    Web pages are part of a business' web site. Just as there are design considerations for web pages, there are design considerations for web sites that encourage usability by visitors. This discussion f

  • Q : It consulting and managing firm....
    Basic Computer Science :

    You are a star consultant from "Databases R US" IT consulting and managing firm. Just graduated from APUS and this is your first critical job. You just got hired by "Home Solutions Inc" a construction

  • Q : Moral dilemma or ethically questionable situation relating....
    Basic Computer Science :

    Identify a recent (within the last six (6) months) moral dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example

  • Q : Given a (very) tiny computer that has a word size of 6 bits....
    Basic Computer Science :

    Given a (very) tiny computer that has a word size of 6 bits, what are the smallest negative numbers and the largest positive numbers that this computer can represent in each of the following represent

  • Q : Compare the tasks of copying,moving....
    Basic Computer Science :

    Compare the tasks of copying,moving,renaming, and deleting files and directories from the command-line and from a GUI, using windows and linux. why do we have both utilities available in each OS? does

©TutorsGlobe All rights reserved 2022-2023.