Pseudocode

   

Pseudocode is  very important for programmers. It helps to sort out your thoughts  before coding and is for humans (programmers), not machines. Eventually,  the pseudocode will need to be converted into an actual program for the  machine to read.

Write detailed pseudocode for a program that is designed to organize a  family’s property tax payments for the past 20 years. The program  should accomplish the following tasks:

  1. Prompt the user for the property tax amount and also the year.
  2. Use appropriate data structure to store the property tax amount and the year.
  3. Use a linear search algorithm to determine which year the family paid the highest property tax, and display the result.
  4. Calculate the average amount of property tax paid over the years, and display the result.

SLP Assignment Expectations

The program should:

  • Allow user input
  • Select appropriate data structure
  • Apply linear search algorithm

Write the program in pseudocode in a Word document, and once done,  submit it to the SLP 1 Dropbox. Please note that this is not an actual program but a program in pseudocode which can be converted into a working program.

Python programming

I’m looking for someone to help me with this task. It will run in Python IDLE, and all you have to do is read the file and follow the instructions. It MUST be implemented in the same way as it is in the file, and functions must run independently, as it will be marked if the functions are running or not, and it must be implemented in the correct structure.

Principles of Facility Design

1. Your organization has a safe for storing corporate laptops when they are not being used. As part of the security plan, you must ensure that the safe engages an extra lock if the safe’s temperature exceeds a certain level. This will provide protection against drilling. Which type of lock should you implement?

A. Passive relock

B. Active relock

C. Thermal relock

2. Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?

A. A proximity detector

B. A passive infrared system

C. An acoustical detection system

3. Your data center has its own lock to prevent entry. Your organization’s security plan states that the lock to the data center should be programmable. Which type of lock should you use?

A. Cipher lock

B. Mechanical lock

C. Tumbler lock

4. Which statement is true of lighting of critical areas?

A. Critical areas should use trip lighting and be illuminated ten feet in height to four foot-candles.

B. Critical areas should use standby lighting and be illuminated ten feet in height to two foot-candles.

C. Critical areas should use continuous lighting and be illuminated eight feet in height to two foot-candles.

5. Which option is NOT an administrative control for physical security?

A. Personnel control

B. Intrusion detection

C. Facility management

6. Your organization has asked that you reassess the organization’s security plan to see if it fully addresses crime and disruption prevention through deterrence. Which security mechanism covers this issue?

A. Law enforcement notification

B. Fences

C. Smoke detectors

7. Which technologies are considered remote-sensing technologies?

a. unmanned aircraft

b. manned aircraft

c. satellites

d. land-based cameras

A. option a

B. option b

C. option c

D. option d

E. options a, b and c only

F. options b, c, and d only

G. all of the options

8. You want to ensure that employees can use a code to alert the proper authorities when they are under duress. With which physical security measure can this be used?

a. cipher lock

b. security guard

c. combination lock

d. biometric system

A. option a

B. option b

C. option c

D. option d

E. options a and b only

F. options c and d only

9. What is the FIRST priority when responding to a major security incident?

A. Containment

B. Monitoring

C. Restoration

10. Although control effectiveness has recently been tested, a serious compromise occurred. What is the FIRST action that an information security manager should take?

A. Evaluate control objectives

B. Perform a root cause analysis

C. Develop more stringent controls

11. Which of the following is a key component of an incident response policy? 

A. Updated call trees

B. Escalation criteria

C. Press release templates

12. Why should an incident management team conduct a post incident review?

A. To identify the hacker

B. To identify affected areas

C. To identify lessons learned

Given the array

  

1) Given the array [4,13,10,21,20] sort every element where even numbers are on the left and odd numbers are on the right…even before odd and the function must return the number of swaps/counts or moves required to sort the array. This array [4,13,10,21,20] in particular should return 1 from number of moves required to sort the array even odd. nothing should be in the main method?

19 August 2018 08:24

input-[4,13,10,21,20] output- [even,odd] number of moves: 1 

19 August 2018 08:34

2) My second Java problem is getting the integer complement of a number denoted by n. The Java question is asking for the numbers bitwise inversion from its highest-order 1-bit through its lowest-order bit. For example the number n = 5 is represented as 0000010 in binary. The binary complement of n is 010, which is 2 in decimal notation. The question has one getIntegerComplement function with one parameter: a base-10 integer,n. This integer must return the complement of n as a base-10 integer?

19 August 2018 08:37

19 August 2018 08:46

3. Complete a function in Java that returns the first non-repeated character in a given a string. My function nonRepeated has one parameter (string s). The characters are treated as case sensitive. so ‘a’ is different Java Problem 3. from ‘A’. The example input would be “mnonmpsms” and the output would be ‘o’ as the first non-repeated character. again, should be in Java nothing in main method?

Final important note: The java source code must be significate from any online resources as that would cause any plagiarism flag to be raised.

Assignment

 

Read SP 800-37 revision 1 (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdfLinks to an external site.), also located in your Module 1 Resources folder, and compare and contrast the six (6) step risk management framework (RMF) lifecycle with the COSO ERM cube discussed by Paul Hopkin on pp. 62-64 of the course text.  For additional information on the COSO ERM cube, refer to the 2004 ERM – Integrated Framework Executive Summary (http://www.coso.org/documents/coso_erm_executivesummary.pdfLinks to an external site.), also located in your Module 1 Resources Folder. 

Your deliverable should be between 3 to 5 pages excluding your title page and reference list.  Use the course assignments template, located in your Additional Resources Folder under the Modules Tab.

https://www.coso.org/Pages/default.aspx

General Data Structures

 Discuss the differences between recursion and iteration, and the kinds of problems they can solve. Must be at least 150 words minimum and references must be provided.