looking for python project

 

I want project on python with this I suggested for example, to make Caesar encryption as an education application for students

How to add some pleasant features and show it as a game-based program to students

Write an expression

 1. Write an expression that returns a random value between 1 and 100. The values 1 and 100 must be included in the values that can be returned.

2. Write a Java statement to display the string “The value is 100” to a user in a plain dialog box.

 

3. What is the command you would use to compile the file Addition.java?

 

4. What is the command you would use to execute the Addition class?

5. What does a Java class contain that identifies it as a Java application?

 

6. Write a Java statement that declares a constant called MAX which has a value of 1000.

 

7. How do C++ chars differ from Java chars?

 

8. Given a double variable called dval, write a single Java statement to prompt the user to enter the price of an item using JOptionPanes, convert the result and store it into dval.

 

9. Write one Java statement to display the string “The average is xxx” to the console, where the xxx displays the value from the double variable sum divided by 3. Make sure the value is displayed with 3 digits following the decimal point.

 

10. Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000. Use a traditional for loop to process the array.

11. Explain the difference between an object reference in Java and an object. Use an example to illustrate your answer.

 

12. Explain how objects are created in Java and how the memory used by objects is recovered. Compare this to object creation and destruction in C++.

13. Explain how primitive values like doubles are passed between functions in Java. How are string objects passed between functions in Java? 

14. How are static methods different from non-static methods? How do you invoke a static method? Give an example of a static method.

15. What is the Java source filename extension? What is the Java bytecode filename extension?

 

16. Write one Java statement that creates an array of 100 doubles.

 

17. Write one Java statement that creates an array of integers containing the multiples of 10 between 10 and 100, including 10 and 100.

 

18. Write one Java statement that would take an array A and copy its contents into array B. Assume that A and B already exist and that B is at least as large as A and that they are both of the same data type.

 

19. Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!

 

20. Write one Java statement to create a string containing “The average is xxx” where the xxx contains the formatted value from the double variable sum divided by 3. Make sure the formatted string contains only 2 digits following the decimal point. Store the formatted string into a String variable called str.

Computer and Information Networking

1.Discuss what is a Virtual LAN and what are the advantages of a Virtual LAN

Please list your reference/s

2. Review scholarly articles and reputable resources and discuss what are the latest technology/software for intrusion detection and prevention techniques.

Please  list  your references/resources.

SYSC2

  • Why and how are employers increasingly using workplace monitoring?
  • What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise?

Problem 12- Project Risk

Prathyusha Preethi

8:33 AM (8 hours ago)to me#1. Explain what a Pareto chart is – what the related philosophy is – and what they are commonly used for.In the light of the current virus situation, build a Pareto Chart based on the following data relative to medication issues and explain its meaning.

Wrong Patient – 52

Over Dose – 59

Wrong Drug – 76

Unauthorized drug – 1

Wrong IV – 4

Technique Error – 3

Wrong Time – 83

Dose Missed – 92

Under Dose – 7

Duplicated drug – 9

Wrong Route 27

Wrong calculation – 16

n=429

Requirements:

  • There is no minimum or maximum required number of pages. Your response will be considered complete, if it addresses each of the components outlined above.
  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Write a method to print

    

1. Write a method to print a (singly) linked list of integers in reverse order using a stack. (Pseudocode, assuming that a stack class is already defined for you) .

2. Assume that a queue is implemented with a circular array. Write a method in Pseudocode to calculate the sum of all elements in the queue.

3. A palindrome is a string that reads the same forward and backward. For example, “Able was I ere I saw Elba “. Write a program to determine whether a string is palindrome.

4. Write a program to add two large integers with up to 300 digits. One approach is to treat each number as a list, each of whose elements is a block of digits of that number, then add two integers (lists), element by element, carrying from one element to the next when necessary.

Network Lab 1……INT 2681

 

  1. Complete Netlab 1 and submit your lab summary here.

   NETLAB 1 A: DNS Footprinting/Social Engineering With Social Engineering Toolkit  

  1. Footprinting using nslookup 
  2. Comparing nslookup with dig 
  3. Virtual Machines: Kali Linux, pfSense, OpenSUSE 
  4. Using Social Engineering Toolkit (SET) 
  5. NETLAB 1 . B Package Crafting / Social Engineering with Social Engineering ToolKit.  
  6. Packet Crafting with Scapy
  7. Sending crafted packets 
  8. Virtual Machines: Kali Linux, pfSense, Owasp Broken App 
  9. Modifying SET Parameters. 
  10. Testing the SET Attack. 
  11. NETLAB 1. C: Reconnaissance with Nmap, Zenmap and Massacen.
  12. Reconnaissance Using Nmap 
  13. Reconnaissance Using Zenmap 
  14. Reconnaissance using Masscan 
  15. SAMPLE SCREENSHOT.pdf 

Instructions to follow

  

INSTRUCTIONS.

  1. NETLAB1, contains three different sub-labs. Please, read the      instruction for each submission carefully.
  2. As of today, most of your NETLAB will      be visible online.
  3. Each lab will be screenshot and attached to a word document,      PowerPoint (Converted to pdf)  before submission through Blackboard.      Please, read the instruction carefully.
  4. . Once you      submit, there is no other second submission.
  5. For each NETLAB, a minimum of five screenshots will be      accepted for full credit.
  6. Each lab should have about 20 screenshots per PowerPoint or      Word Document for full credit.
  7. Please, check the due dates for every LAB. There is much to      do; I suggest you begin as soon as you can.

USEFUL TIPS

  1. The goal of NETLAB is to give every student a real-life      hacking experience in a virtualized/sand Box environment, where you can      safely practice what you learn in theory in preparation for your CEH 11      certification.
  2. Please, note that the entire lab will give you a thorough      understanding of the most demanded and used tools in cyber security.
  3. Knowledge of Microsft Excel, Word, and PowerPoint will help      you a lot. Please, google, or use YouTube to learn some basic skills,      formatting, etc.
  4. Lastly, instructions for each labs, such as lab credentials      in all found in NETLAB. Please, make sure you preview the LAB, get      familiarized with it before you begin. 

research and critical analysis jan 25

Assignment Content

  1. This assignment was started in class and needs to be completed prior to submission. All submissions MUST be a WORD document – NOT a PDF document. 

    Directions and Grading: 

    APA-7-Compliant Title Page = 40 points

    • REFER to Foundations p. 31 (bottom right number) for perfect sample
    • Use the title “APA-7 Practice with Title and References Pages”
    • APA-7-Compliant References Page = 60 points
    • REFER to Foundations p. 32 for perfect sample
    • REFER to Foundations pp. 33-39 to find the CORRECT formula for EACH article listed below
    • USE THE BELOW ARTICLES: BE SURE TO LOG INTO MYMONROE BEFORE PASTING THESE LINKS
    1. https://www.proquest.com/abicomplete/docview/2713605548/43AC406D3E62437EPQ/1?accountid=41012
    2. https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression
    3. https://www.who.int/emergencies/situations/monkeypox-oubreak-2022

cybercrimes

 

Provide a response to the following:

What current cyber threats must be considered? How does this impact an organization’s security structure?

Instructions: Fully utilize the materials that have been provided to you in order to support your response. Your initial post should be at least 350 words. APA format. Please be sure to reference the attached sourc and the link provided in addition to other sources.

https://www.cio.com/article/2412056/wikileaks-and-the-authorized-insider-threat.html