Java Fundamentals

 

After you gain familiarity with the Eclipse environment, you are  going to write a very simple Java program, and run it using Eclipse.  Following is the sample code.

Note that the name of the following Java program is HelloWorld.java.  The spelling of HelloWorld must be exactly the same as to the word next  to “public class.” Be careful about the upper and lowercase, in Java,  uppercase and lowercase does make a difference. And by tradition, the  first letter of the class should be in upper case.

public class HelloWorld

{

        public static void main(String[] args)

       {

                 System.out.println(“Hello World, this is my first Java class”);

        }

}

Case Assignment

Write a java program to display a greeting message and name it as  greetings.java. The message needs to include the following information:  your name, city you live in, your profession, and what you would like to  do in your spare time etc. Once you are done with debugging and running  the program, copy a screen shot of the output along with the java  program, paste it to a word document, and submit the word document to  dropbox.

Note: use sample program as reference to prepare for this programming assignment.

Assignment Expectations

• The program should use both System.out.print and System.out.println methods
• The program has no compiling errors.
• The program displays the greeting message required.

********PLEASE READ **********

******* Please submit (upload) your Case and SLP assignments in two files:
1.  A screenshot of the full Eclipse window, with the (numbered) source  code and the output clearly visible. The screenshot should be taken and  pasted into the Word (LibreOffice etc.) document and submitted as .DOCX  file.
 The output is typically displayed in the console below the source code or to the right of the source code.
Make sure all is included in your screenshot.  

2. You also have to upload your source code as a separate .TXT file  (written in Word, WordPad or similar, (but not in Notepad). Another  option is to include your source code as a plain text in the .DOCX  document referred to in (1).

3. You DO NOT need to submit .JAVA file.

You are required to place comments in your JAVA source code. 

INFORMATION SECURITY

 

  1. Watch the video series for Learning Cryptography and Network Security on LinkedInLearning.com. (You need to be logged in to NU Single Sign-On for the link to work).
  2. Write a 2-page paper on what you learned from the video series.
    • Describe how you would use the information to solve business requirements supporting the protection of data.
    • Identify any areas not mentioned in the video that would add value when designing an infrastructure.

IT348 week 4

CASE: PepsiCo
“Take PepsiCo, for example. As one of the leading soft drink makers and bottlers, PepsiCo turned to IoT for the most basic of reasons and found an efficient solution. Like many enterprises, the company had inefficient and ineffective IT and OT infrastructure, as well as limited IT and OT resources available inside its plants. It also suffered from server sprawl, where each server supported a very small portion of the production load. PepsiCo essentially incurred high costs to purchase and support an ever-expanding infrastructure of underutilized servers, operating systems, and networking assets. The result: highly inefficient use of capital—at a minimum. Even worse, its inefficient network hindered the collection of data that would ordinarily drive plant productivity.”

What were the paybacks to PepsiCo after implementing IoT? Elaborate.

RESPONSE DUE 5/11

 READ POST AND GIVE YOUR OPINION IF YOU AGREE AND COME UP WITH TWO QESTIONS

A cipher represents an algorithm that serves the purpose of encrypting or decrypting data and files. Typically, when looking into ciphers, you will see block ciphers and stream ciphers. A block cipher encrypts data in blocks to produce ciphertext using a cryptographic key and algorithm. The block cipher processes “fixed-size” blocks simultaneously, unlike a stream cipher, which encrypts data one bit at a time. Most modern block ciphers are designed to encrypt data in fixed-size blocks of either 64 or 128 bits. When looking into purposes of when to use a block cipher, data at rest is what comes to mind. When we have data at rest, or that is stored, block cipher seems to be the most appropriate.

Alternatively, a stream cipher works in encrypting data byte by byte from the visual plaintext into a form of code that is not readable to the human eye. It is understood as being faster as it targets a byte at a time versus a large “chunk” of data, as seen in the block cipher. Moreover, stream cipher allows for a more linear transaction as the same key both encrypts and decrypts data. Standard practices for stream cipher lends itself to that of a wireless networks or cell phone (GSM) networks of devices that have a finite number of resources.

Exp19_Word_Intro_CapAssessment_Research

Exp19_Word_Intro_CapAssessment_Research

    

Project Description:

As you near graduation from college, you plan to apply to various graduate schools. You have prepared a draft of a statement of purpose that you will include in an application packet to each university to which you apply. You modify the statement of purpose so that it is attractive and error free. In addition, you include such items as a table, picture, header, footer, and footnote, formatting text in columns where appropriate. Finally, you use mail merge to prepare personalized copies.

     

Start Word. Download and open   the file named Exp19_Word_AppCapstone_IntroAssessment_Research.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Apply the Slice document theme.   Select all text in the document, and change the font to Bookman Old Style.   Change the font size to 12. Adjust the right and left margins to 1.5″.

 

Insert a header (select Edit   Header). Type Adams in the left section of the header. Insert a right-aligned page   number, selecting Plain Number. Close the header.

 

Insert a manual page break   before the second paragraph on the second page, beginning with On behalf of the faculty and staff.

 

Select all text that displays   before the newly inserted page break and double-space the selected text.   Remove any paragraph spacing from the selected text.

 

Move to the beginning of the   document and press ENTER. Remove the First line indent from the newly   inserted blank paragraph. At the new paragraph, type Statement of   Purpose and   apply bold formatting to the title. Center the title.

 

A footnote enables you to   clarify or expound on a statement in the body of the document without   cluttering the document with more text. Unlike a footer, a footnote only   displays on the page in which it is cited.
 

  In the second paragraph on the first page, place the insertion point after   the period at the end of the sentence that ends with by the University of Arizona. Insert a footnote that reads The Three   Minute Thesis Competition is open to all academic disciplines at the   university.   (include the period).

 

Modify the Footnote style,   changing the font to Bookman Old Style and the font size to 12.

 

Change the word sophomore in the first sentence on the   first page to student.

 

Insert a footer (select Edit   Footer) and type 2022 Fall in the footer space. Change the footer font to   Bookman Old Style and change the footer font size to 12. Close the footer.

 

Newsletters are often formatted   in columns, as is the one that is included in this document. By using section   breaks, you can format each section independently of others.
 

  Select all text on pages 4 and 5 and format it in two columns. Insert a   Continuous section break before the words On   behalf of the faculty and staff at the top of the fourth page.

 

Click before the newly inserted   section break at the top of the fourth page and change the column setting to   One. Type Welcome to the College of Business and press ENTER twice. Select Welcome to the College of Business and   apply the Title style. Reduce the font size to 22. Center the newsletter   title.

 

Add a bottom border with a   weight of 1 1/2 to the text Welcome to   the College of Business.

 

Pictures and graphics are often   included in newsletters, adding interest and style. Even so, those objects   should be incorporated relatively seamlessly with surrounding text, requiring   that you wrap text appropriately and size graphics so they are attractive but   not overbearing.
 

  Place the insertion point before the words The College of Business at the beginning of the second body   paragraph on the fourth page. Insert the University.JPG picture, downloaded with this   project. Change the picture style to Reflected Rounded Rectangle. Resize the   picture height to 1″ and select Square text wrapping.

 

Place the insertion point after   the period ending the first paragraph on the second page (ending in upon graduation). Press ENTER. Remove   the First line indent. Insert a 2-column by 6-row table. Change the width of   the second column to 1″.

 

Type Course in the top left cell and press TAB. Type Grade in the next cell on the first   row. Press TAB. Complete the table as shown below:
 

  Course Grade
Int.   Microeconomics A
Int.   Macroeconomics B
Public   Finance B
Business   Calculus A
Contemporary   Economics A

 

Insert a row above the first row   in the table. Merge all cells in row 1 and type Major Courses Completed in row 1. Apply Align Center   alignment to row 1. Apply a table style of Grid Table 4 – Accent 6 (row 4,   column 7 under Grid Tables). Center the table horizontally.

 

Add a caption below the table.   The caption should read Table 1: Major Courses Completed at the University of Arizona. (Do not include the period.) Center the caption.

 

Create a custom watermark to   display at a diagonal, with the text Copy in Blue (column 8 in Standard colors). 

 

Check spelling and grammar in   the document. Correct the misspelling of analyzed   and the hyphenation of first-time.   If the check does not suggest a change for   first time, manually correct it in the second to last paragraph in the   left column on page 5, changing first   time to first-time. Ignore all   other grammatical and clarity concerns.

 

Replace the dash dividing the   words organization and Fortune 500 in the first paragraph on   the fourth page with an Em Dash symbol.

 

Select the paragraph beginning   with I hope you will accept the   challenge on the last page (including the paragraph mark). Apply shading   of Red, Accent 6, Lighter 60% to the selected paragraph.

 

Begin a mail merge, selecting   recipients from an existing list—Graduate_Schools.xlsx,   using Sheet1$. Sort the data source in ascending order by University and   filter to select only those universities with an Area equal to W.

 

Replace [University Name] in the first paragraph on the third page with   the merge field of University. Be sure to include the brackets with text to   be replaced. Ensure that a space precedes and follows the newly inserted   University placeholder. Preview the results and then finish the merge,   choosing to edit individual documents and merging all records.

 

Select the entire merged   document and copy it. Switch to Exp19_Word_AppCapstone_IntroAssessment_Research,   move the insertion point to the end of the document, and insert a manual page   break. At the top of the new page, paste the copied text. The original   document to which you pasted the merged data now contains 15 pages. Save Exp19_Word_AppCapstone_IntroAssessment_Research   and close all open documents without saving.

 

Save Exp19_Word_AppCapstone_IntroAssessment_Research. Close all other   open files without saving. Submit   Exp19_Word_AppCapstone_IntroAssessment_Research as directed.

Discussion 300 words

 Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice.