Categories
Computer science

Proper management of identity ensures that users have access to resources they need to perform their job functions and accounts are properly secured.

Objective
In Project 2 deliverable, you implemented a strategy for user identity. Managing user identity is equally important as implementing it. Proper management of identity ensures that users have access to resources they need to perform their job functions and accounts are properly secured. In this deliverable, you will demonstrate the creation of user groups, manage Role-Based Access Control (RBAC) roles, view user login activity, the configuration of Azure AD self-service password reset policy, and create a customed banned password.

Categories
Computer science

Survey paper topic – a survey on methodologies for decision making based upon the data in software development lifecycle

Survey paper Topic – A Survey on methodologies for decision making based upon the data in Software Development Lifecycle
I need survey paper on above topic which will include all the source papers comparision.
Here is the templete for format of research paper https://www.overleaf.com/latex/templates/springer-nature-latex-template/gsvvftmrppwq

Categories
Computer science

Describe one or more accomplishments you are particularly proud of that suggest that you will succeed in your chosen area of research.

Please explain why you are a good candidate for graduate school. You should describe why you
wish to attend graduate school, what you would like to study, and any research experience you
have. Describe one or more accomplishments you are particularly proud of that suggest that you
will succeed in your chosen area of research.

Categories
Computer science

How does computer forensics tie into your topic

more instructions in power point below
A Project report with detailed information about your project topic and should have the following sections: (At least 5 Pages)
Description
Major suppliers/vendors/service providers
Feature matrix
Pricing of Product/Service (If available)
How does Computer Forensics tie into your topic
Comparison with other similar Product/Service
Summary/Conclusion
Format
12 point Arial 1.5 line spacing. Default margins
Page count does not include Title Page, Reference Page, or Appendices.
Please credit graphics you download
At least 3 independent, credible references are required. Use MLA or APA format

Categories
Computer science

When a person moves their pointer over a picture card, then the card gets a shadow of rgba(0, 0, 0, .3) with a 0px horizontal offset, 2px vertical offset, and a blur radius of 4px.

Form specification: Your page needs to have a form that…
… has a method attribute with the value of “post” and an action attribute with the value of “/pets”
… has an single-line text input with and id of “name”, a name of “pet_name”, and with an associated label that reads “Name”.
… has a drop-down with an id of “type”, a name of “pet_type”, an associated label that reads “Type”, with only the options “Cat”, “Dog”, “Hamster”, “Other”, “Zebra”.
… has a multi-line text input with and id of “bio”, a name of “pet_bio”, and an associated label that reads “Biography”
… has an email input with id of “owner-email”, a name of “pet_owner_email”, and with an associated label that reads “Owner’s Email”
… has a button that reads “Create new pet” with type “submit” and id “new-pet-submit-button”
… has a button reads “Reset” with type “reset”
… is 600px wide when the screen is greater than or equal to 600px wide
… uses grid layout to layout labels and form elements when the screen is greater than or equal to 600px wide
… is the width of the screen when the screen is less than 600px wide
… lays out the labels and form elements as full width when the screen is less than 600px wide
Picture card: Create a picture card that looks SIMILAR to this. There are images available in the “images” directory to assist you in making this card. They are not the same images, but there is an image of a desert and a person.
Picture card
In this screenshot, the title is “Title goes here”, the secondary text is “Secondary text”, and the body text is “Greyhound divisively hello coldly wonderfully marginally far upon excluding.”
The card’s root element is a
with a class of “card”.
The card is 344px wide.
The desert picture is 194px tall.
The padding between the body text and everything else is 16px.
The color of the title text is #000.
The color of the secondary and body texts is #232F34.
The size of the person picture is 40px in diameter.
The size of the body text is 11px.
The size of the title is 22px.
For the padding or margin around any other elements, use your best judgment to make it look like the screenshot.
Transitions
When a person moves their pointer over a picture card, then the card gets a shadow of rgba(0, 0, 0, .3) with a 0px horizontal offset, 2px vertical offset, and a blur radius of 4px.

Categories
Computer science

Consider an example of an input screen – either at work or at school. analyze th

Consider an example of an input screen – either at work or at school. Analyze the design and appearance of each screen and try to identify at least 2-3 possible improvements.
This is a video assignment. Use screencastomatic.com or another screencast software to record a walkthrough of this input screen and improvements. Also, discuss the data collected on the backend of this input screen and how that data should be stored or reported for ease of analysis as well.
No more than 4-5 minutes recorded; informal.

Categories
Computer science

Where you can learn how to create them ( google or go to a vm page)

virtual machines
• How are they created?

Where you can learn how to create them ( Google or go to a VM page)
• How does it work?
• What does it need to run?

Categories
Computer science

Write a visual basic app that allows the user to enter a seven-digit number in a textbox, and displays

I HAVE INCLUDED MORE DETAILED INSTRUCTIONS ON WHAT TO DO WITH THE ASSIGNMENT IN THE PDF FILE BELOW. MUST USE VISUAL STUDIO
Write a Visual Basic app that allows the user to enter a seven-digit number in a TextBox, and displays
every possible seven-letter word combination corresponding to that number in a multiple-line
scrollable TextBox when the user clicks the Generate Words button. It also will allow the user to store
the TextBox information in a file and location specified by the user when the user clicks the Store
Results in a File button. There are 2,187 (37) such combinations. Avoid phone numbers with the digits
0 and 1.
WHEN DONE WITH THE ASSIGNMENT PLEASE SAVE AND PROVIDE ALL THE FILES INCLUDING WAV, .VB ETC

Categories
Computer science

We are continuing on with the soldier lab to complete logic for the decision made of fight or flight, combat, and healing.

We are continuing on with the soldier lab to complete logic for the decision made of fight or flight, combat, and healing.
Lab will be posted as word document in files and it is a C++ code, the base .cpp file will also be in the files as word

Categories
Computer science

Describe the processes of risk management, incident response, and mitigation of an incident.

Describe the processes of risk management, incident response, and mitigation of an incident.
Compare the difference in elements in the risk process versus the risk management process.
Compare the elements of the risk management process to risk management planning.
Outline the different types of attackers and their motivations to hack into a system.
Review several types of possible attacks and their methodology.
Describe the risk profile of a project, including type of risk, amount of risk, distribution of risk, and tolerance for risk.