Recursion with the Sierpinski Gasket

This week’s discussion has introduced working with graphics programming, particularly with respect to primitives and attributes. One of these applications is the Sierpinski gasket. Discuss the Sierpinski gasket.

In your answer, specifically think of and give a real-life scenario where:

  • The Gasket can be utilized.
  • Recursion can/cannot be applied.

IT 204 assignment 1

IT 204 Week 1 Assignment

These are instructions for completing the Week one assignment. You are creating a basic business letter.

The section immediately below is the header. Below the horizontal line is the body of your letter.

Use one-inch margins  all around. (This is usually the default in MS Word)

Your Name (use 14 point Verdana font, bold, centered)

Your mailing address (12 point Verdana font, not bold, centered)

Your email address (12 point Verdana font, not bold, centered)

Your telephone number ((12 point Verdana font, not bold, centered)

Add a line below the title as shown below. Use 12 point Verdana for the rest of the letter.

(1 blank line)

Today’s date in long date format, January 5, 2021

(1 blank line)

(indent paragraphs) Write two or three short double-spaced paragraphs, describing what you plan to do when you graduate. For example, describe your ideal job?

(2 blank lines)

Sincerely,

(3 blank lines)

(For a formal business letter, you will hand sign with blue ink)

Your name (typed)

Computer Science CCIS 301

Discussion topics

Projects 1

 Two page paper for each question  

  1. Submit a report that discusses the differences between the next-fit and worst-fit algorithms.

2. List the steps involved in program relocation, including loop sequences, decision sequences, branching sequences, and data references. 

Additional Resources
  1. Beginner’s      Guide to Memory Management:

http://www.memorymanagement.org/mmref/begin.html

  1. Windows      Memory Management: https://msdn.microsoft.com/en-us/library/aa366779(VS.85).aspx
  2. IBM:      Inside Memory Management:

http://www.ibm.com/developerworks/linux/library/l-memory/

5. Ravenbrook – The Memory Management Reference:

http://www.memorymanagement.org/

discussion 2

Compare  and contrast the difference of network security within an on-premise  environment and a cloud environment. Give some examples of areas that  are common and areas that are different.

 initial post should be 250-300 words. There must be at least two  APA formatted reference (and APA in-text citation) to support your  thoughts in the post. Do not use direct quotes, rather rephrase the  author’s words and continue to use in-text citations.

Response to Peers – Week 5 – Info tech

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Wireless

 What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread. 

Cloud Computing Discussion 3

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Wireless Netwok

First Section 

In a 350- to 500-word essay, address the 4 questions. 

  

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget

MeetMe vs Facebook

-Visit MeetMe website and compare it to Facebook. In what ways is it similar to Facebook, and in what ways is it different? Which do you prefer, and why?

-MeetMe- another social network aimed at meeting new people

-2pages worth APA style

-Reference page