In: computer science

At, we provide students with computer science assignment help, computer science homework help, computer programming help in C, C++,HTML, java, SQL, python and MATLAB


NIT1202 – Operating Systems, UNIX Script Assignment

Tasks: You are required to write a Bourne Again Shell Script (bash) to manage a menu driven program. When executed the user should be presented with a menu with 4 (four) options: 1. Print the following user information: the home directory, path, userid , login shell together with the current date and time. 2. Ask a user a range and it displays eight random number between the range. [Range difference must be 100. Example Enter a range: 200 300 3. Print out the highest and the lowest numbers of the generated eight random numbers 4. Exit the program Requirements: Your script…


Networking theory assignment

Task QUES 1. Compare and contrast Channel reuse in WLAN with frequency reuse in Mobile Phone networks? Explain with the help of diagrams. [4 marks] QUES 2. Research the security challenges for any two examples of WMAN technologies. [4 marks] QUES 3. Read the two recent research papers on the topic of Internet of Things (IoT) as saved in the resources folder; please give your critical reflection on the topic of Energy Harvest. [4 marks] QUES 4. Telestra is a company that is licensed to provide wired telecommunication services in Australia. The company has contracted Exetel to assist it with the…


CSCI358 Security Engineering !

Presentation and Report (Worth 10%) The presentation, worth 5%. The report, worth 5%. Each topic is a question appropriate for a debate, and as such they need to be studied to look for arguments in favour and against something.  # Topic A perimeter defence is best placed close to the object being protected. Any system providing anonymity should also allow for traceability. Attacks on information systems are now more likely to be semantic than syntactic. Books such as Anderson’s should not be published, they give too much information to attackers. Bottom up is a better method of threat analysis than top…


(COST – 130AUD) COIT 20246 Assignment | 10 tasks

Note:  Each resource summary should be a maximum of 300 words. Week 1 Task The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main features and applications of two mass storage technologies namely: direct-attached storage and network-attached storage. Summary Title and Reference:   Evolution of DAS and NAS.   Anon, 2017, [online] viewed on 13-Nov-2017, <> Summary:   Week 2 Task Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint. Discuss the main benefits of real-time operating systems for the health sector. Summary Title and…


COIT 20245: Assessment item 2—JAVA Program using array of objects

Assessment details COIT 20245 Objectives This assessment item relates to the course learning outcomes as stated in the Unit Profile. Details For this assignment, you are required to develop a Menu Driven Console Java Program to demonstrate you can use Java constructs including input/output via GUI dialogs, Java primitive and built-in types, Java defined objects, arrays, selection and looping statements and various other Java commands. Your program must produce the correct results. The code for the menu and option selection is supplied: and is available on the unit website, you must write the underlying code to implement the program. The…


Assignment1: Role of OS Operating System and CLI | MN404 – T3 2017

Fundamentals of Operating Systems and Java Programming Assignment 1 Specifications ­­­­­­­­­­­­­­­­­­­­­­_________________________________________________________________________________ Section 1:  Operating Systems   An operating system consists of four essential subsystem managers such as Memory Manager, Processor Manager, Device Manager and File Manager. When a user executes a command explain with a flow chart how these managers cooperate with each other to get a job done. Research the Internet or current literature to identify an operating system that runs a cell phone or handheld computer. (These are generally known as mobile operating systems.) List the key features of the operating system and the hardware it is designed to…


ITECH1000 Programming | COST 80AUD

Assignment 1 Overview This is an individual assignment that requires you to design, develop and test a small procedural Java program. Timelines and Expectations Percentage Value of Task: 20% Due: Refer to course description Minimum time expectation: 10 hours Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: • Identify and use the correct syntax of a common programming language • Recall and use typical programming constructs to design and implement simple software solutions • Reproduce and adapt commonly used basic algorithms • Utilise pseudocode and/or algorithms as a major program design technique • Write and…


Practical Assignment 1 — Mobile Android application

Objectives This assessment item relates to the learning outcome 1, 3 and 4. More specifically, to design and implement a complex mobile application. The objective of this assignment is for students to: • Develop, test and maintain a mobile application using an integrated suite of mobile software development tools. More specifically Android Java development is undertaken using the Eclipse ADT IDE and API’s. Introduction You are assigned the task of creating an app for keeping notes on players in a poker game. The notes app has links to five players. If a player is selected a page (fragment) is shown to…


CP5633 Assignment 1- Database (Conceptual) Modelling

Rationale This assignment has been designed to assess students’ ability to model a database, by constructing an entity-relationship diagram for a particular business scenario. This assignment addresses the following learning objectives for this subject:  Develop a database model using the entity-relationship model  Apply the techniques of normalisation Requirements (Tasks) 1) You are to write a brief discussion of your solution, i.e. how you approached the modeling problem and any issues you may have encountered (maximum of ½ page) 2) You are to write all applicable business rules necessary to establish entities, relationships, optionalities, connectivities, cardinalities and constraints. If a…


wireless networking

Assignment 1 Task 1) Different technology of Wireless LAN like IEEE 802.11a, 802.11b, 802.11g, 802.11n, etc. has different merits. Research any 4 WLAN technologies in details and pay specific attention to how they are used as well their strengths and weakness. Provide an opinion regarding which WLAN 802.11 standard will become the dominant players in the future [6 marks] 2) Compare and contrast the FHSS and DSSS in the area of wireless networking? [4 marks] 3) A local engineering group ask you to present your finding on different types of antennas used in wireless technologies. Research on 4 different types of…