The main goal of the project is to create a web application that solves the issue of appointments in a beauty salon going unfilled, due to cancellations and time constraints. The project aims to provide a service to allow clients to book/cancel/modify appointments online. A dashboard with notifications for the business owner to keep daily […]
Archive for the ‘Graduate’ Category
Banking System
As you can see based on the files I submit and the instructions on the screenshots, I completed the Lab1 (I attached since you will need in to complete lab1 and lab2). I need you to complete both the Lab2 and Lab3 by following the instructions
LAB 4
Complete a port scan. Use NMAP for this. Showcase the findings. Use wireshark and perform a TCPFlood attack. Record your findings. Use Kali tools to perform a Hping3 attack. Record your findings. Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.
LAB 3 Assignment
It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn’t able to get a hold of anyone that could discuss what needed to be done. As we are discussing footprinting and we have colleague, I have a few […]
Week 1 Discussion Board
In your own words, define employment-at-will. Why did this doctrine become viewed as harsh, immoral, or unfair, from an employees perspective? Research the Internet and find a legal case that involves a wrongful termination claim. Briefly cite/describe this case, the final ruling, and if you agree with the case outcome. Review the cases posted by […]
Accounting and Auditing
The website of The Tennessee Comptrollers Office gives the appearance of transparency. There one can find an invitation to see how the office is fulfilling its mission as well as a plethora of audits on various state organizations. http://www.comptroller.tn.gov/Listen to the video of the Tennessee Office of Open Records Counsel Public Hearing in Nashville, TN. […]
Bonus Discussion – International Conference on Cyber Conflict
Thoughts on two of the essays that were published in the review: Strategic Cyber: Responding to RussianOnline Information Warfare (Page 193) Borders in Cyberspace: Strategic InformationConflict since 9/11 (Page 245) Use the following website to access articles https://cyberdefensereview.army.mil/Portals/6/CDR-Special%20Edition-2019_r6.pdf Please provide a post – of at least 350 words – with your commentary on some of […]
Bayesian decision theorem
In this problem we will apply discriminant analysis to recognize the digits in the MNIST data set (http://yann.lecun.com/exdb/mnist/). As a bonus problem we will construct “Fisher digits”. We will train our model using the training data sets (“train-images-idx3-ubyte.gz” and “train-labels-idx1-ubyte.gz”) and test the performance using the test data set (“t10k-images-idx3-ubyte.gz” and “t10k-labels-idx1-ubyte.gz”). 1. The images […]
Correlation
Part 1: Interpreting CorrelationsA meta-analysis (Anderson & Bushman, 2001) reported that the average correlation between time spent playing video games (X) and engaging in aggressive behavior (Y) in a set of 21 well-controlled experimental studies was r+ = .19. This correlation was judged to be statistically significant. In your own words, what can you say […]
C Program
write a simple C program. (No headings or screen captures are required.) You will submit a single .c file. Here are the requirements of the program: 1. Ask the user for their age in years. 2. Ask them for their height in inches. 3. Ask them for their weight. 4. Calculate and show their age […]