+1-316-444-1378

Ethics Case

Writing Requirements-3 pages APA Format 2-3 references You are in your second year as an auditor with Dantly and Regis, a regional CPA firm. One of the firm’s long-time clients is Mayberry-Cleaver Industries, a national company involved in the manufacturing, marketing, and sales of hydraulic devices used in specialized manufacturing Read more…

Project 2 Python

Need to turn the attached Python file into a working quiz game where the program asks how many questions you want to answer, Asks you what the capital of random states are and takes your string answer and provides feedback. Attached is a walk thru of the code i just Read more…

OLA 2

Read the attached article.  Ethics of Technology Needs More Political Philosophy; https://cacm.acm.org/magazines/2020/1/241714-ethics-of-technology-needs-more-political-philosophy/fulltext Johannes HimmelreichIncorporating considerations of reasonable pluralism, individual agency, and legitimate authority. State your opinion to the following question: Do you agree with the author’s assessments that ‘political philosophy’ should be included in making ethical decisions?

SQL design and implement

2. Design a database that will be used to store information for an IT Consulting Company that provides services for client organizations as well as purchases and resells equipment (servers, desktops, software, routers, etc.) to clients. Ensure that you diagram thetables, columns / datatypes, and table relationships.3. Create the database Read more…

C++ data structure and algorithms

Objectives    Develop C++ programming abilities using object-oriented design, dynamic memory allocation, array manipulation, iterators, and exceptions.    Understand graphs and the adjacency list representation of a graph; implement the adjacency list representation.    Understand the concepts and implemtation of dyanically-resized arrays.

Encryption Lab Paper 3 page

3-page lab report One page description of GPG what does it do and how, and the components of GPG4win. Answer the following questions: How do I know that the file I downloaded has not been tampered with? Compare and contrast Private Key (symmetric) and Public Key (asymmetric) encryption.  Why do Read more…