Computer Science Homework Help

Computer Science Homework Help. Comput Graphic

 

PLEASE ACCEPT THE BID ONLY IF YOU ARE CONFIDENT YOU WILL DELIVER THE ACTIVITY ON TIME

You will complete your work in Visual Studio, being sure to work from the project file you already created in a previous milestone. This file already has the libraries set up correctly and contains the 3D object you built, which will be necessary for you to add to this week.

Specifically, you must address the following rubric criteria:

  • Create a 3D plane to situate a 3D scene. This will serve as the base for the rest of the objects in your world. Depending on your 2D image this plane may be used to represent a desk, the ground, a table, or something else entirely. It will be important to work on this first so you will understand the scope of the world your camera will be traversing. A plane is also a relatively simple shape so it will be a good place to start when managing the placement of different objects in your scene. Remember, you will need to take into account where the plane is located in relation to the 3D object you developed during a previous milestone (which used multiple 3D shapes).
  • Apply horizontal, vertical, and depth camera navigation around a 3D scene. It is recommended that you use the following keyboard controls to manipulate the basic camera movement:
    • WASD keys: These keys should be used to control the forward, backward, left, and right motion.
    • QE keys: These keys should be used to control the upward and downward movement.
  • Apply nuanced camera controls to a 3D scene. It is recommended that you use the following mouse controls to allow a user more specific input options for how they view the 3D scene:
    • Mouse cursor: This should be used to change the orientation of the camera so it can look up and down or right and left.
    • Mouse scroll: This should be used to adjust the speed of the movement, or the speed the camera travels around the scene.
  • Create perspective and orthographic displays of a 3D scene. Use the tap of a keyboard key to allow a user to change the view of the scene between orthographic (2D) and perspective (3D) views at will. (Hint: check the glViewport and the glOrtho functions.) For consistency, please use the letter “P” keyboard key. To accomplish this work, you will be switching the function call to retrieve either the perspective or orthographic projection matrix. Note that you will be keeping the camera in the same orientation that you already developed.
  • Create code that follows a logical flow without syntax errors. The code you create has to be executable and all the code that is included needs to be reached by the execution. Note that not everything should be written in a single function and your work should be well-modularized.
  • Apply coding best practices in your creations. Pay particular attention to the way you format and comment your code. Program code should be easy to read and follow industry standard code formatting practices, such as indentation and spacing. Commenting best practices should be in place to ensure the source code is briefly and clearly explained using descriptive comments.

Guidelines for Submission

Submit a completed ZIP folder with all of your code, which may include one or multiple CPP files along with Visual Studio project files. Also make sure the ZIP folder includes an EXE file, because without this your code will not be able to run. Checking for the EXE can be used as a quick reference on the functionality of your code before you submit.

Requirements: As long as needed | .doc file

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Alternate Data Streams (ADS) Lab in NTFS

 

Purpose:

In this lab, you will learn how to recognize data hidden using ADS.

Consider a PC on which individuals could hide and pass information covertly and no one would be able to readily detect their presence or an attack on a system allowing the attacker to use up all of your available disk space, without you knowing why you cannot save any additional data as the system still reports plenty of additional disk space available. Such is the threat that alternate data streams presents to both Unix and Windows systems in which data can be stored in a file’s main unnamed data stream. As Windows does not come with native tools enabling you to see which files have streams attached to them, we have to rely on 3rd party tools to routinely review our file system for the presence of these covert files. In this lab, you will create an ADS and view it using a Sysinternals tool available now from Microsoft’s website.

Lab requirements:

  • NTFS partition
  • A forensic tool to display the Stream – recommend either SFind (available from Foundstone at McAffee – under the Resources link) or Streams by SysInternals (available from http://live.sysinternals.com/Files/ (Links to an external site.)). Download the Streams.zip file from Microsoft and unzip to access the executable.

Lab Steps:

Hiding text:

    • Create a folder named ADSLAB
    • Expand the Streams.zip file into the ADSLAB folder
    • Create a folder under ADSLAB named Myfiles
    • In the Myfiles folder, create a couple of text files (by clicking on File – New – Text Document – name these files anything you want).
    • Create a new text file named test.txt
    • View the file details – note how large is the “text.txt” file and get a screen capture that shows the size.
    • From the command prompt type echo – lets hide our illegal files in this file>test.txt:stream. You have just created a stream named stream that is associated with the file named test.txt.
    • Display the file by typing DIR Note that when you view the file size it is still reported as 0. Save a screen capture of that.
    • Open the file in Notepad. Note that the file looks empty when you open it in any text editor. Save another screen capture.
    • To see your stream enter more < test.txt:stream (the type command doesn’t accept stream syntax so you have to use more).
    • Did you see the data? Keep in mind that there is not a limit to the amount of data that can be associated with the file!!

Detecting ADS:

    • At the cmd prompt, change directories to the ADSLAB directory where your streams.exe file resides. If you do not know how to change directories, Google search is your friend!
    • Type streams –s myfilesthis is executing the file streams.exe using the recursive switch against the myfiles directory to report any files containing ADS.
    • Did Streams report the correct file?
    • Delete the stream using the streams –d switch.

Lab Report:

  • What controls do you think could be implemented to protect a system from users keeping covert data on the system using ADS? Submit at least 2 or 3 specific solutions.
  • Be sure to submit all the screen shots showing how you performed the steps above.

Download/print these instructions:

3. To Submit: Click the Submit Button link above.

Grading:

This assignment is worth up to 50 points towards your final grade. Points will be deducted for any missing screen captures or steps. You will receive 40 points for including all required screen captures and following all the directions above. You will receive up to 10 points for providing specific solutions.

Were you able to perform all of the steps above? What did you learn? Please include a couple of screen shots.

What controls would you implement to protect you system from users keeping covert data on the system using ADS?

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. New England College Biometric Techniques Paper

 

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. New England College Decision Model for A Strategic Closed Loop Supply Chain Questions

 

1. Describe some interaction your company has with another entity (firms producing complementary or substitute products, upstream sup- pliers, or downstream customers), or between internal divisions within your firm that can be described as a sequential or simultaneous game. Diagram the strategies, players, and compute payoffs as best you can. Compute the Nash equilibria. What can you do to change the rules of the game to your advantage? Compute the profit consequences of your advice.

2. Why might Mattel set a much lower margin on its Barbie dolls than on the accessories for the dolls?

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. UMGC Preliminary Investigation Report Essay

 

The first step in the analysis process is to create a Preliminary Investigation Report (PIR). The PIR documents the system planning phase of the System Development Life Cycle (SDLC). During the planning phase, the opportunities presented or problem(s) to be solved with an information technology system are identified, investigation into the current situation occurs, and various feasibility aspects of implementing a system are analyzed. This results in a recommendation for further action with estimated costs and schedule, and a list of benefits. Once it is completed and approved, the PIR becomes the major source document for use to begin the systems analysis phase.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Lamar University Business Contingency Continuity Scenario Planning Paper

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. WU The Utility Theory Based on The Idea of Individual Preference Essay

 

Write a 4-5 page paper in response to using a more advanced technique, such as utility theory, to

help you choose a “good” solution, rather than the “best” solution, subject to the restraints on

your problem. Your choice of analysis technique must be governed by the goals of your

investigation, so that you can refute the hypothesis you are testing. Reflect on general techniques

for designing empirical studies and the importance of good data-gathering to support rigorous

investigation.

Computer Science Homework Help