I want project on python with this I suggested for example, to make Caesar encryption as an education application for students
How to add some pleasant features and show it as a game-based program to students
I want project on python with this I suggested for example, to make Caesar encryption as an education application for students
How to add some pleasant features and show it as a game-based program to students
1. Write an expression that returns a random value between 1 and 100. The values 1 and 100 must be included in the values that can be returned.
2. Write a Java statement to display the string “The value is 100” to a user in a plain dialog box.
3. What is the command you would use to compile the file Addition.java?
4. What is the command you would use to execute the Addition class?
5. What does a Java class contain that identifies it as a Java application?
6. Write a Java statement that declares a constant called MAX which has a value of 1000.
7. How do C++ chars differ from Java chars?
8. Given a double variable called dval, write a single Java statement to prompt the user to enter the price of an item using JOptionPanes, convert the result and store it into dval.
9. Write one Java statement to display the string “The average is xxx” to the console, where the xxx displays the value from the double variable sum divided by 3. Make sure the value is displayed with 3 digits following the decimal point.
10. Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000. Use a traditional for loop to process the array.
11. Explain the difference between an object reference in Java and an object. Use an example to illustrate your answer.
12. Explain how objects are created in Java and how the memory used by objects is recovered. Compare this to object creation and destruction in C++.
13. Explain how primitive values like doubles are passed between functions in Java. How are string objects passed between functions in Java?
14. How are static methods different from non-static methods? How do you invoke a static method? Give an example of a static method.
15. What is the Java source filename extension? What is the Java bytecode filename extension?
16. Write one Java statement that creates an array of 100 doubles.
17. Write one Java statement that creates an array of integers containing the multiples of 10 between 10 and 100, including 10 and 100.
18. Write one Java statement that would take an array A and copy its contents into array B. Assume that A and B already exist and that B is at least as large as A and that they are both of the same data type.
19. Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!
20. Write one Java statement to create a string containing “The average is xxx” where the xxx contains the formatted value from the double variable sum divided by 3. Make sure the formatted string contains only 2 digits following the decimal point. Store the formatted string into a String variable called str.
1.Discuss what is a Virtual LAN and what are the advantages of a Virtual LAN
Please list your reference/s
2. Review scholarly articles and reputable resources and discuss what are the latest technology/software for intrusion detection and prevention techniques.
Please list your references/resources.
8:33 AM (8 hours ago)to me
#1. Explain what a Pareto chart is – what the related philosophy is – and what they are commonly used for.In the light of the current virus situation, build a Pareto Chart based on the following data relative to medication issues and explain its meaning.
Wrong Patient – 52
Over Dose – 59
Wrong Drug – 76
Unauthorized drug – 1
Wrong IV – 4
Technique Error – 3
Wrong Time – 83
Dose Missed – 92
Under Dose – 7
Duplicated drug – 9
Wrong Route 27
Wrong calculation – 16
n=429
Requirements:
Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13
1. Write a method to print a (singly) linked list of integers in reverse order using a stack. (Pseudocode, assuming that a stack class is already defined for you) .
2. Assume that a queue is implemented with a circular array. Write a method in Pseudocode to calculate the sum of all elements in the queue.
3. A palindrome is a string that reads the same forward and backward. For example, “Able was I ere I saw Elba “. Write a program to determine whether a string is palindrome.
4. Write a program to add two large integers with up to 300 digits. One approach is to treat each number as a list, each of whose elements is a block of digits of that number, then add two integers (lists), element by element, carrying from one element to the next when necessary.
NETLAB 1 A: DNS Footprinting/Social Engineering With Social Engineering Toolkit
Instructions to follow
INSTRUCTIONS.
USEFUL TIPS
Directions and Grading:
APA-7-Compliant Title Page = 40 points
Provide a response to the following:
What current cyber threats must be considered? How does this impact an organization’s security structure?
Instructions: Fully utilize the materials that have been provided to you in order to support your response. Your initial post should be at least 350 words. APA format. Please be sure to reference the attached sourc and the link provided in addition to other sources.
https://www.cio.com/article/2412056/wikileaks-and-the-authorized-insider-threat.html
Need help with this Access Grader Project