What happens when you

What happens when you close a file with the Close method?

What is the difference between the WriteLine method and the Write method

The WriteLine() always appends a new line character to the end of the string. this means any subsequent output will start on a new line.

What has happened when the Peek method returns -1?

What does the Read method return?

Where must Structure statements appear?

Why should you call the Peek method before calling the “ReadLine” method?

CMIS147 Introduction to Programing

 

Write a Java program which assigns your name to one variable and some other numerical value you want to share to another variable (e.g. age, number of pets,  number of children, etc.). Then print a greeting along with the value of the name variable to the screen on one line and a message that uses the other variable with numerical value to another line.

For example, my program would be: 

Hello class, my name is: Dr. Mcfadden
I have visited 20 states

Submit your program as an attached  .java file and post a screen shot to show that you have been able to successfully run that program. Make sure you submission adheres to the SubmissionRequirements document.

Cybersecurity

 

WK 10 discussion – Analyze a Phishing email

Activity 10.2: Analyze a Phishing Email*You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.Part 1: Manually analyze an email headerOnce you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.Review the headers and identify what clues you can find.   Report on;a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,d) What would you do to identify future phishing emails based on the header information?

Part 2: Analyze the email contentNow that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email.   Report on;

  1. Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
  2. Is the link or domain a known-bad link?

Part 3: Use an automated tool      Use one or more automated email header analyzers to review the header from part 1.   Report on       if you identify additional useful data and what that data is.      (Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)ConclusionWrite a one paragraph conclusion on what you learned 

QUALITATIVE Journal Article Review

The topic is up to you as long as you choose a peer-reviewed, academic research  piece.  I suggest choosing a topic that is at least in the same family  as your expected dissertation topic so that you can start viewing what  is out there.  There are no hard word counts or page requirements as  long as you cover the basic guidelines.  You must submit original work,  however,  and a paper that returns as a large percentage of copy/paste  to other sources will not be accepted.  (Safe Assign will be used to  track/monitor your submission for plagiarism. Submissions with a Safe  Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide  context for the research article.  What led the author(s) to write the  piece? What key concepts were explored? Were there weaknesses in prior  research that led the author to the current hypothesis or research  question?
  • Methodology:  Describe  how the data was gathered and analyzed.  What research questions or  hypotheses were the researcher trying to explore? What statistical  analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate  the article in terms of significance, research methods, readability and  the implications of the results.  Does the piece lead into further  study? Are there different methods you would have chosen based on what  you read? What are the strengths and weaknesses of the article in terms  of statistical analysis and application? (This is where a large part of  the rubric is covered.) 
  • References   

Activity 4B- Project Process

Using your knowledge of Traditional, Agile, and Hybrid answer the following:Agile:

  1. Explain how iterative project processes help expose requirements?
  2. Explain how iterative project process help manage risks associated with changing requirements?
  3. Identify and categorize new projects, products, and organizational risks to which Agile projects are susceptible. 
  4. Identify and categorize new projects, products, and organizational risks to which Traditional projects are susceptible. 
  5. Describe the characteristics of leadership required in an agile project.  Which characteristics are the same and which are different when leading a waterfall project?  

Hybrid

  1. Describe a hybrid project management process?
  2. Describe the benefits to a company for creating a hybrid process? 

Traditional

  1. What are the benefits to a company for using a traditional approach in project management?  What are the negatives? 
  2. Given your experience and your research, what is the future of project management methodologies in your industry?

Text-

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

logistic regression

Write a fully executed R-Markdown program and submit a pdf/word or Html file performing classification task on the Binary response variable from the Santander Bank Case Study. Make sure to try several permutations of the model before finding the best available model. You are required to clearly display and explain the models that were run for this task.

GUI Intro

Assignment Overview

In this module, you will write a program to demonstrate your  understanding of the concepts in this module: user defined methods,  arrays, GUI, super class and subclass.  

Case Assignment

In SLP 1, you wrote a Java program to display the following information:

  1. The assessed value of a house
  2. The local real estate property rate (different based on the location)
  3. The property tax amount

In this assignment, rewrite this program using the GUI feature to accept user input. Users will press “E” to stop the program. 

  

Assignment Expectations

  1. Demonstrate your understanding of GUI.
  2. Use selection and repetition statements in this program.

After you are done, submit a screen shot of the source code (.java file) and the program result