the assignment about crating a website that handle (ref data) for 3 different type of users.
the first page should include links for each type of user.
each of user profile should visualize the data as required in the attached file.
the coding using d3v4 example of coding is similar to the attached zip file which include the data needed.
Solutions need to be clear and preferably typed out. (unless your handwriting is neat and I can understand and read your writing easily.)
Proving need to be done in a step by step fashion with clear headings of what you are trying to prove. Workings need to be very detailed and explicit.
I need THREE examples for qn 1 part(c) instead of an example as stated in the question.
I would like to receive an update of the first part of your solution by Monday 5pm.
I would like the expert to complete the questions in the following order: Q3, 5, 4, 2 and 1.
Please only bid for this assignment if you are able to solve all the questions. If expert show from the initial update of solutions that he is proficient, deadline can be re-negotiated. Thank you.
The main goal of the project is to create a web application that solves the issue of appointments in a beauty salon going unfilled, due to cancellations and time constraints. The project aims to provide a service to allow clients to book/cancel/modify appointments online. A dashboard with notifications for the business owner to keep daily track of appointments/activities/cancellations. With this small business expanding its clientele, it is harder for clients to access appointments when needed.
A web app that not only provides a service to the business owner but also to customers via the Web to book appointments.
Software/Technology to be used
I have setup a microsft azure SQL database and a webapp sevice deployment through azure. using Spring IO to bootstrap and tomcat. JDBC
Coding needed fo this project- using Visual studio code with java(latest version) with HTML CSS (some Javascript if possible).
The webapp will allow clients to book appointments in 30
As you can see based on the files I submit and the instructions on the screenshots, I completed the Lab1 (I attached since you will need in to complete lab1 and lab2). I need you to complete both the Lab2 and Lab3 by following the instructions
Complete a port scan. Use NMAP for this. Showcase the findings.
Use wireshark and perform a TCPFlood attack. Record your findings.
Use Kali tools to perform a Hping3 attack. Record your findings.
Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.
It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn't able to get a hold of anyone that could discuss what needed to be done. As we are discussing footprinting and we have colleague, I have a few things that I would like you all to run.
Install whois on Kali. You may have issues if this is not part of the repository list. Use the following commands.
/etc/apt/sources.list
This will let you know your repository listing. Ensure that the repository listing has the following inside.
deb http://http.kali.org/kali kali-rolling main contrib non-free
Run the following commands in terminal.
apt-get update
apt-get upgrade
apt-get dist-upgrade
that should allow you to run the WHOIS installation command.
apt-get install whois
Run queries against domains.
wh
In your own words, define employment-at-will. Why did this doctrine become viewed as harsh, immoral, or unfair, from an employees perspective? Research the Internet and find a legal case that involves a wrongful termination claim. Briefly cite/describe this case, the final ruling, and if you agree with the case outcome. Review the cases posted by your fellow classmates, respond to at least three of your classmates posts, and discuss the outcomes and the applicability of the employment-at-will doctrine.
https://www.bls.gov/opub/mlr/2001/01/art1full.pdf
Minimum 2 paragraphs to 1 full page
The website of The Tennessee Comptrollers Office gives the appearance of transparency. There one can find an invitation to see how the office is fulfilling its mission as well as a plethora of audits on various state organizations.
http://www.comptroller.tn.gov/
Listen to the video of the Tennessee Office of Open Records Counsel Public Hearing in Nashville, TN.
https://www.youtube.com/watch?v=PylAhlelbwI (1:18:35)
Consider the following questions and be prepared to discuss in class:
1.Why is the comptroller of Tennessee holding a meeting?
2.What promises is he making?
3.How are the publics questions addressed?
4.What inferences can you make about the auditing practices in the Tennessee Comptrollers Office?
Thoughts on two of the essays that were published in the review:
Strategic Cyber: Responding to Russian
Online Information Warfare (Page 193)
Borders in Cyberspace: Strategic Information
Conflict since 9/11 (Page 245)
Use the following website to access articles
https://cyberdefensereview.army.mil/Portals/6/CDR-Special%20Edition-2019_r6.pdf
Please provide a post - of at least 350 words - with your commentary on some of the assertions made in the article.
In this problem we will apply discriminant analysis to recognize the digits in the MNIST data set (http://yann.lecun.com/exdb/mnist/). As a bonus problem we will construct "Fisher digits". We will train our model using the training data sets ("train-images-idx3-ubyte.gz" and "train-labels-idx1-ubyte.gz") and test the performance using the test data set ("t10k-images-idx3-ubyte.gz" and "t10k-labels-idx1-ubyte.gz").
1. The images are 28 x 28 pixels in gray-scale. The categories are 0, 1, ... 9. We concatenate the image rows into a 28 x 28 vector and treat this as our feature, and assume the feature vectors in each category in the training data "train-images-idx3-ubyte.gz") have Gaussian distribution. Draw the mean and standard deivation of those features for the 10 categories as 28 x 28 images using the training images ("train-images-idx3-ubyte.gz"). There should be 2 images for each of the 10 digits, one for mean and one for standard deviation. We call those "mean digits" and "st