Discipline: Computer Science

NetworkingNetworking

   1. What is the difference between physical and logical network diagrams? 2. What network components would you include in a physical diagram of a Local Area Network (LAN)? 3. Bring your Own Device (BYOD) is the set of policies that allow employees to use their personal devices for work purposes. What are some of […]

htmlhtml

  Write an HTML5 element (or elements) to accomplish each of the following tasks: a) Students were asked to rate the food in the cafeteria on a scale of 1 to 10. Use a meter element with text to its left and right to indicate that the average rating was 7 out of 10. b) Create […]

ISSC266 week 2 outline paperISSC266 week 2 outline paper

  Topics: Acceptable topics unless I have already approved one: Cryptography Encryption Stream Ciphers Block Ciphers Public-Key Cryptography RSA Cryptosystem Digital Signatures Elliptic Curve Cryptosystems Hash Functions Message Authentication Codes Key Establishment  Instructions INSTRUCTIONS: All responses must be prepared in Microsoft Word format and uploaded to the appropriate online assignment. Please include your name, course […]

PortfolioPortfolio

Your midterm project was to provide a security assessment for Icanread System, Inc., an advertising agency that specialize in selling ad spaces in their parent company’s magazine.  Icanread Systems, Inc. manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Icanread Systems, Inc.’s database needs […]