Description
i have basic website created
i have made a register and login page
i need php coding for user and admin login separatley.
i need a section of the site for where a admin can write posts
i need a section where a user can write posts and other users can comment on this.
the coding work does not have to be of the best quality as long as it works, do not have to worry about things like security, you can even copy and paste the code if you need from other jobs.
there are a couple of other small things that i will discuss with the worker
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of The Cumberlands Data Science and Big Data Analytics Discussion
During this semester, we reviewed a number of areas in blockchain, business intelligence, data mining, electronic currency ...
University of The Cumberlands Data Science and Big Data Analytics Discussion
During this semester, we reviewed a number of areas in blockchain, business intelligence, data mining, electronic currency, etc.
Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at
some topics to consider, and by the end of the week, we could have several ideas for dissertation topics
Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.
Visit the University of Cumberland's library, go to the Dissertation Database, and locate an interesting topic on one of the concepts we discussed this semester.
Here are some pointers that will help critically@valuate and share some viable topics.
Is the topic attainable for a first-time dissertation student?
Is the problem rooted in the literature?
Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
Is there a theoretical model or framework discussed?
Discuss the topic, the problem the model has been used in the research, and any present findings.
Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.
University Link Dissertation Database:https://ucumberlands.libguides.com/az.php
or you can choose any dissertation
From ieee or other platforms
ISOL 536 UOTC Week 10 Security Architecture and Design Questions
Question 1 Write at least 600 words in APA format along with 2 referencesOne of the big challenges with cloud-based reputa ...
ISOL 536 UOTC Week 10 Security Architecture and Design Questions
Question 1 Write at least 600 words in APA format along with 2 referencesOne of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?" Question 2write at least 400 words in APA format along with 2 referencesThe protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Disaster Recovery dealing with sites and Incident response plan.
For this assignment, you will create a PowerPoint presentation discussing site strategies. A site refers to the organizati ...
Disaster Recovery dealing with sites and Incident response plan.
For this assignment, you will create a PowerPoint presentation discussing site strategies. A site refers to the organization using a separate physical location to set up operations in the event the original location is compromised (e.g., the main headquarters lost power due to a storm). Sites are considered exclusive or shared. Exclusive means that the organization controls the site which can be configured as hot, warm, cold, or mobile. Shared means that the organization is sharing the site for a moment in time, purchasing a service, or has an agreement with another organization to share resources. Your presentation will be 10–15 slides with 1 slide for the title and 1 slide for references, leaving 7–13 slides in which you will discuss exclusive and shared sites and the purpose for which they are used. Each slide will have, at a minimum, a 100-word narrative in the Notes section of the slide.Create an incident response plan that provides how an organization will react to a threat or hazard. It is important to note that incident response can take other names, such as emergency response. This section would contain the personnel identified to support the appropriate response to a given incident and what they are supposed to do. Obviously, this can be very detailed in scope because you must address a response for different types of incidents. For example, a response for a cyber threat would be different from a response to a tornado. This being said, for this assignment, you will address incident response from an information technology (IT) perspective.
Similar Content
Ashford University Lessons Drawn from Boeing Crashes Essay
Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. ...
windows and Linux Systems Discussion
At this point, you have worked with both Windows and Linux systems. You have gone over data recovery and forensics tools f...
Cumberland University Application of Data mining to a Business Discussion
Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a succe...
Dallas College Software Engineering Worksheet
1.4 Download the programs for this chapter, and add at least one
more test case for each method of the StringSorter class...
Info Systems Stategic Planning Q/A
Question and Answer
1. What kinds of portable IT help employees work more
efficiently and effectively? What may inte...
SU Sex Crimes Victimization and Obscenity on the World Wide Web Discussion
Overview
You work as an information security specialist for a large financial company and your Chief Information Security ...
Replies For 4
Application portfolio has been a critical discipline in business over time. Businesses have increasingly been relying on t...
26337946
Multiparty negotiation occurs when there is a negotiation between two or more parties come The article by Caputo talks abo...
Compiler And Computer Architecture
...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of The Cumberlands Data Science and Big Data Analytics Discussion
During this semester, we reviewed a number of areas in blockchain, business intelligence, data mining, electronic currency ...
University of The Cumberlands Data Science and Big Data Analytics Discussion
During this semester, we reviewed a number of areas in blockchain, business intelligence, data mining, electronic currency, etc.
Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at
some topics to consider, and by the end of the week, we could have several ideas for dissertation topics
Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.
Visit the University of Cumberland's library, go to the Dissertation Database, and locate an interesting topic on one of the concepts we discussed this semester.
Here are some pointers that will help critically@valuate and share some viable topics.
Is the topic attainable for a first-time dissertation student?
Is the problem rooted in the literature?
Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
Is there a theoretical model or framework discussed?
Discuss the topic, the problem the model has been used in the research, and any present findings.
Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.
University Link Dissertation Database:https://ucumberlands.libguides.com/az.php
or you can choose any dissertation
From ieee or other platforms
ISOL 536 UOTC Week 10 Security Architecture and Design Questions
Question 1 Write at least 600 words in APA format along with 2 referencesOne of the big challenges with cloud-based reputa ...
ISOL 536 UOTC Week 10 Security Architecture and Design Questions
Question 1 Write at least 600 words in APA format along with 2 referencesOne of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?" Question 2write at least 400 words in APA format along with 2 referencesThe protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Disaster Recovery dealing with sites and Incident response plan.
For this assignment, you will create a PowerPoint presentation discussing site strategies. A site refers to the organizati ...
Disaster Recovery dealing with sites and Incident response plan.
For this assignment, you will create a PowerPoint presentation discussing site strategies. A site refers to the organization using a separate physical location to set up operations in the event the original location is compromised (e.g., the main headquarters lost power due to a storm). Sites are considered exclusive or shared. Exclusive means that the organization controls the site which can be configured as hot, warm, cold, or mobile. Shared means that the organization is sharing the site for a moment in time, purchasing a service, or has an agreement with another organization to share resources. Your presentation will be 10–15 slides with 1 slide for the title and 1 slide for references, leaving 7–13 slides in which you will discuss exclusive and shared sites and the purpose for which they are used. Each slide will have, at a minimum, a 100-word narrative in the Notes section of the slide.Create an incident response plan that provides how an organization will react to a threat or hazard. It is important to note that incident response can take other names, such as emergency response. This section would contain the personnel identified to support the appropriate response to a given incident and what they are supposed to do. Obviously, this can be very detailed in scope because you must address a response for different types of incidents. For example, a response for a cyber threat would be different from a response to a tornado. This being said, for this assignment, you will address incident response from an information technology (IT) perspective.
Earn money selling
your Study Documents