Posts

c , i need the code and the screenshot of the results

Package-delivery services, such as FedEx®, DHL® and UPS®, offer a number of different shipping options, each with specific costs associated. Create an inheritance hierarchy to represent various types of packages. Use Package as the base class of the hierarchy, then include classes TwoDayPackage and OvernightPackage that derive from Package. Base class Package should include data members representing the name, address, city, state and ZIP code for both the sender and the recipient of the package, in addition to data members that store the weight (in ounces) and cost per ounce to ship the package. Package’s constructor should initialize these data members. Ensure that the weight and cost per ounce contain positive values. Package should provide a public member function calculateCost that returns a double indicating the cost associated with shipping the package. Package’s calculateCost function should determine the cost by multiplying the weight by the cost per ounce. Derived class TwoDayPackage should inherit the functionality of base class Package, but also include a data member that represents a flat fee that the shipping company charges for two-day-delivery service. TwoDayPackage’s constructor should receive a value to initialize this data member. TwoDayPackage should redefine member function calculate-Cost so that it computes the shipping cost by adding the flat fee to the weight-based cost calculated by base class Package’s calculateCost function. Class OvernightPackage should inherit directly from class Package and contain an additional data member representing an additional fee per ounce charged for overnight-delivery service. OvernightPackage should redefine member function calculateCost so that it adds the additional fee per ounce to the standard cost per ounce before calculating the shipping cost. Write a test program that creates objects of each type of Package and tests member function calculateCost.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

Consultant’s Analysis Report on Enterprise Systems title page with a new date and project name. Update the previously completed sections based on your instructor’s feedback. Include the following new content:

Final Analysis Summarize the resource requirements for the system required for implementation. These resources should include development costs if the system is internally developed or acquisition costs if it is an externally developed system. Assign costs to all resources. Identify short- and long-term benefits to the organization in financial terms. Compare and contrast the costs and benefits. Provide conclusions and recommendations to the client. Consultant’s Analysis Report on Enterprise Systems final draft: Review the entire document for any changes and improvements that you would like to make. Ensure this final version of the document is sufficiently detailed to meet the requirements of the assignment.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

For this assignment, prepare a paper that addressed each of the following: 1. Choose a

For this assignment, prepare a paper that addressed each of the following: 1. Choose a risk management model (i.e. MSRAM, MRM, CCPM, CMMI, etc.). 2. Choose one government agency and one private OR public sector entity. Implement your risk management model for both entities. 3. Identify the risks for both entities. 4. Analyze the risks for both entities. 5. Evaluate the risks for both entities. 6. Provide a recommendation and solution for both entities to mitigate risk, threats, and vulnerabilities within the organizations. 7. Discuss how security representatives and leadership between both entities should monitor and review your risk management assessment and model plans. 8. Compare both organizations and discuss how the risk management model chosen influenced your assessment. Was it successful? What are the limiting factors? What would you do differently? Technical Requirements Your paper must be at a minimum of 8-10 pages (the Title and Reference pages do not count towards the minimum limit). Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content. Scholarly sources include peer reviewed articles, government publications, and academic texts. Type in Times New Roman, 12 point and double space. Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc. All submissions will be graded using the assignment rubric.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

Answer the following questions: 1. What would be effective results of a security investment for

Answer the following questions: 1. What would be effective results of a security investment for a small business and how does it compare to larger corporations? Should it include important concepts from governmental and public/private sectors? 2. Should external stakeholders been involved in the decision-making process of risk management plans? Explain how various decision makers have different responsibilities and necessities for the inputs and outputs within an organization? 3. What are some of the key roles and responsibilities of government, industry, academia, and other non-governmental organizations with respect to critical infrastructure risk? Technical Requirements • Your paper must be at a minimum of 5 pages, with each question being at least 1-2 pages (the Title and Reference pages do not count towards the minimum limit). • Use headings to differentiate each answer. • Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content. Scholarly sources include peer reviewed articles, government publications, and academic texts. • Type in Times New Roman, 12 point and double space. • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc. • All submissions will be graded using the assignment rubric.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

a lab project where i have to to make the servers through virtual machines, I really need help on doing this.

Step 1: Installation and configuration of the 3 Windows Server 2016 systems All servers must be members of the group AUTOMOBILEFIRMSOFTWARE. Step 2: Installation an configuration of DHCP services The DHCP service must be configured on the JAP server; it will supply the IP addresses to FRA. JAP must be configured with a static IP address and FRA must always receive the same IP address upon startup . Step 3: Configuration of the static IP routing Each server must communicate with the others. Since some servers or are different subnets you must configure static IP routing to facilitate communications. The JAP server can be used for IP routing (dynamic routing protocols must not be used). Note: Static routes can be configured using the command line utility ROUTE.EXE or the Routing and Remote Access Service (RRAS) console. It is much easier to create static routes using a GUI utility than with the command line utility. Step 4: Installation and configuration of DNS services The DNS services must be installed and configured on CAN; and they must service all the other servers. The DNS domain name «AUTOMOBILEFIRMSoftware.com » must be created. The host name resolution functions from an IP address and host name are required. Step 5: Installation and configuration of VPNs In order to ensure that the connections between the 3 sites are secure, you must implement site-to-site VPNs for the two connections: CAN to JAP and JAP to FRA. Step 6: Implementing DFS Shared folders must be created and configured on all 3 servers. These folders will contain sales specification files and data for all sites. The users must be authenticated before accessing the folders. They must not have modification rights in the folder. To enhance the availability of this information, reduce the amount of traffic on the site- to-site connections and provide redundancy, the shares must be linked together with the Distributed Files System (DFS)

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

role of the NOS in security

The network operating system (NOS), which is at the heart of any LAN, and in some cases – WAN, plays a key role in carrying out an organization’s security policies. Of course, the NOS can’t enforce or even apply all of the security rules and safeguards defined in a security policy, but it does have a major role or influence over much of the action defined in the policy. What do you see as the security areas or actions that a NOS provides, assists with, or otherwise deals with in a medium to a large network? If you use information from a copyrighted source, please include a citation.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

Arguably, we are our own worst enemies when it comes to the privacy and protection Essay

Arguably, we are our own worst enemies when it comes to the privacy and protection of our personal information. It’s said that the primary basis for most personal security approaches is something like, “Oh, that will never happen!” or “That only happens to others!” Either of these cases, and those very similar, are like the proverbial opened barn door that we should have closed before the horse got out. Research to learn five very important actions, rules, or conditions that should absolutely be included in a personal information security plan.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

Networks, especially computer networks, are virtually everywhere in our daily lives. In what is called Essay

Networks, especially computer networks, are virtually everywhere in our daily lives. In what is called “the developed” countries of the world, society has become accustomed to networks providing a variety of services, information, and access. What would daily life be like if all of a sudden the capability to network computers was not available, meaning computers could not be networked in any form? Describe what you envision the impact of this development on your daily life.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

a project i need to finish ASAP and im stuck on how to do it I really need help with it if someone could help it would be great

Step 1: Installation and configuration of the 3 Windows Server 2016 systems All servers must be members of the group AUTOMOBILEFIRMSOFTWARE. Step 2: Installation an configuration of DHCP services The DHCP service must be configured on the JAP server; it will supply the IP addresses to FRA. JAP must be configured with a static IP address and FRA must always receive the same IP address upon startup . Step 3: Configuration of the static IP routing Each server must communicate with the others. Since some servers or are different subnets you must configure static IP routing to facilitate communications. The JAP server can be used for IP routing (dynamic routing protocols must not be used). Note: Static routes can be configured using the command line utility ROUTE.EXE or the Routing and Remote Access Service (RRAS) console. It is much easier to create static routes using a GUI utility than with the command line utility. Step 4: Installation and configuration of DNS services The DNS services must be installed and configured on CAN; and they must service all the other servers. The DNS domain name «AUTOMOBILEFIRMSoftware.com » must be created. The host name resolution functions from an IP address and host name are required. Step 5: Installation and configuration of VPNs In order to ensure that the connections between the 3 sites are secure, you must implement site-to-site VPNs for the two connections: CAN to JAP and JAP to FRA. Step 6: Implementing DFS Shared folders must be created and configured on all 3 servers. These folders will contain sales specification files and data for all sites. The users must be authenticated before accessing the folders. They must not have modification rights in the folder. To enhance the availability of this information, reduce the amount of traffic on the site- to-site connections and provide redundancy, the shares must be linked together with the Distributed Files System (DFS)

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15

on the overall architecture of the application and identify the major components of the application. Create a use case diagram to illustrate the major functionality of the application and provide details for at least 3-4 use cases. Design a visual design for the main screen of the application. Finally address any data management requirements in your design. Use visual illustration when applicable.

Add the following sections to your project document: Design: Describe the overall architecture of your application. Identify each of the major components of the application and describe how they will work together. A component diagram can be used to illustrate the architecture. Create a use case diagram to illustrate the major functionality of the application. Provide details for 3-4 use cases Prepare a visual design for the main screen of your application. Address any data management requirements in your design.

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15