Category Archives: Computer Science

How does a tax accountant use IS/IT in their job? ‌‌‌‍‍‌‍‌‌‍‍‌‍‍‌‌‌‍‍ Then explain how IS/IT may change those jobs in the future.

A ‌‌‌‍‍‌‍‌‌‍‍‌‍‍‌‌‌‍‍ s a student in this course you must be able to describe the evolving nature of IS/IT and their role in today’s organizations. Pick 2 non-technical jobs and explain the role of IS/IT in those jobs. For example, you might choose the job of tax accountant. How does a tax accountant use IS/IT in their job? ‌‌‌‍‍‌‍‌‌‍‍‌‍‍‌‌‌‍‍ Then explain how IS/IT may change those jobs in the future. For example, how might IS/IT change the role of tax accountant in 5 years? You are to write a 500-600 word essay that addresses these points. Your essay should have an appropriate introduction and conclusion and should adhere to APA style of formatti ‌‌‌‍‍‌‍‌‌‍‍‌‍‍‌‌‌‍‍ n

Develop an Entity Relationship (ER) model to characterize the information requirements of business illustrates in the case study mentioned above. The diagram of your ER model must

Task 1: Database Modelling (Total marks: 7.5%)

   

Develop an Entity Relationship (ER) model to characterize the information requirements of business illustrates in the case study mentioned above. The diagram of your ER model must: -Marks: 25% out of the total marks ( 7.5%)

 

Demonstrate all necessary entities Demonstrate all attributes The relationships between entities

 

Demonstrate unique identifiers and nature of interaction among entities

   

Discovered business rules for your ERD -Marks: 5% out of the total marks ( 7.5%) Map the Entity Relationship Diagram (ERD) into a set of relations in at least Third Normal Form (3NF). You should show that each relation satisfies the rules for 1NF, 2NF, and

-Marks: 20%  out of the total marks ( 7.5%)     For example….

Your role as on-site Team Leader for the Peterfields project

Solutions 1 Scenario Part A.docx

This document provides you with the background information on your employer, Solutions1 and your client Peterfields. It has a range of information including:

Advice from your Manager, Sandra Walker Description of your role as on-site Team Leader for the Peterfields project Email message from Peter Fields, CEO of Peterfields Department stores Record of discussions from the Solution1 team members

  You are a contractor for Solutions 1 IT Consulting Business   You have been assigned the role of team leader for the Peterfields project.   Read the email message from Peter Fields, CEO of Peterfields Department stores and the team member’s discussions paper.   Complete the following six tasks.

Task 1

You must act like a professional in ways that are ethical, how….

Bullying is not a new phenomenon, but social media and communication technologies have introduced a breadth and depth to which public shaming, targeted taunting, and bullying have manifested.

For this Discussion, consider how bullying has changed and how it has remained the same in light of modern technology. Post an explanation of one moral development theory and its connection to the act of bullying. Be sure to frame your explanation within the context of cyber and other bullying that persists in social media and communication technologies used by adolescents. Also explain how bullying has changed and how it has remained the same in light of modern technology. Please use the Learning Resources to support your answer.

Business.com is a software development company with two branches spread over the Western Sydney region. The company’s local area network (LAN) is captured in the topology

Phase 1 Business.com is a software development company with two branches spread over the Western Sydney region. The company’s local area network (LAN) is captured in the topology below: This network used IPv4 network: 203.2.XY.0/24 where XY is the last 2 digits of your student ID Head Quarter network has 100 network devices including all computers, printers and other devices. Branch A and B subsequently have 30 and 20 devices, respectively. Recently, the company has been assigned with a new space of IP addressing and the whole network has to be re-addressed. Task 1 (2 marks) No previous network documentation is available for existing network You are contracted by the company to help with the IP address documentation of existing network for records. Your task is to plan and….

You are tasked with creating a text-based program for simulating a Recycling Machine using the Python 3 programming language.

The assignment is broken up into four main components: 1.) Design and model two classes: RecyclableItem and RecyclingMachine, 2.) Create an activity chart which describes the behaviour of the Recycling Machine system, 3.) Create a computer program that allows a user to enter items that are able to be recycled into a machine. During the process the machine prompts the user for the type of item to be recycled and how many they have to enter. The machine keeps track of the number of each of the different items and keeps track of the total amount to pay the user until they indicate that they are finished. When they stop adding items, print out a receipt and given them the amount of money owing. The receipt should contain the following: a. A list showing how….

You are the IT manager for a small electronics manufacturer with several valuable technical patents and an emerging international market.

Managing data in the cloud can be a very difficult task. It is made even more difficult when attempting to ensure performance and reliability. Once data are placed in the cloud, there are questions about how is that data accessed and audited, who can access the data, and can data in the cloud be tracked back to its original owner? In this assignment, explore how cloud data are accessed by users, cloud providers, and law enforcement; examine two important components of cloud technology: data provenance and process provenance; and make an argument for the performance and reliability of one provider of cloud technology. Assignment Guidelines

You have been tasked with providing a report on the viability of moving the company’s data to the cloud. Keeping the scenario in mind, research cloud….

Determine a sequence of basic transformations that are equivalent to the x-direction shearing matrix

1. (5-53). 2. Determine a sequence of basic transformations that are equivalent to the y-direction shearing matrix (5-57) 3. Set up a shearing procedure to display italic characters, given a vector font definition That is, all character shapes in this font are defined with straight-line segments, and italic characters are formed with shearing transformations. Determine art appropriate value for the shear parameter by comparing italics and plain text in some available . Define a simple vector font for input to your routine.

Derive the following equations for transforming a coordinate point P = (x, )/

1. Derive the following equations for transforming a coordinate point P = (x, )/ in one Cartesian system to the coordinate values (x', y') in another Cartesian system that is rotated by an angle 0, as in Project point P onto each of the four axes and  the resulting right triangles. 2. Write a procedure to compute the elements of the matrix for transforming object descriptions from one Cartesian coordinate system to another. The second coordinate system is to be defined with an origin point P0 and a vector V that gives the direction for the positive y' axis of this system.