JAVA program

 

a. Write a Java program that is reading from the keyboard a value between 111 and 900 and is printing on the screen the prime factors of the number.

Your program should use a cycle for validating the input (if the value typed from the keyboard is less than 111 or bigger than 900 to print an error and ask the user to input another value).

Also the program should print the prime factors in the order from smallest to biggest. 

For example,

for the value 128 the program should print 128=2*2*2*2*2*2*2 

for the value 122 the program should print: 122=2*61

b. change the program at a. to print one time a prime factor but provide the power of that factor:

for the value 128 the program should print 128=2^7

for the value 122 the program should print: 122=2^1*61^1

Research paper on the emerging technologies

Write a Research paper on emerging technologies. 

Your research paper must be at least 5 pages in length, double-spaced, 12 font, and include at least 5 references, at least 2 of which must be peer-reviewed. 

The cover page and reference page are NOT included in the 5-page length requirement. 

Assignment 3

 Chapter 5: Questions for Discussion #1 through #4

  • What is an artificial neural network and for what types of problems can it be used?
  • Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
  • What are the most common ANN architectures? For what types of problems can they be used?
  • ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode

Chapter 5: Exercise 6 and Internet Exercise 7

  • Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.
  • Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Chapter 6: Questions for Discussion #1 through #5

  • What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
  • List and briefly explain different learning paradigms/methods in AI.
  • What is representation learning, and how does it relate to machine learning and deep learning?
  • List and briefly describe the most commonly used ANN activation functions.
  • What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Chapter 6: Exercise 4

  • Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

Important Note:  In cases if any websites or links do not work, select another respective exercise of choice to replace. ????When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.  Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 2.Important Note:  When I see similarity indexes over 20%, I will review the similarity report to determine if points are going to be docked for plagiarism issues and as a tip, do not include or write the actual questions or exercise directions within these papers.  In other words, all work must be original and not copied from any source and very high similarity indexes will be reported to the University. 

Linux System Scan

 

Linux System Scan

Must post first.

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

Looking ahead to Project 2’s VM Scanner Background Report (due at the end of Week 5), you will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

You must start a thread before you can read and reply to other threads 

IOT & Challenges

Need this in a word document with no less than 1000 words in APA format with 3 references & Citations  

A) Securing IoT Devices: What are the Challenges?

B) Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Assignment

In a minimum 5-pages, develop an introduction to your Chapter 2 where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Exp22_Word_Ch02_Cumulative_Pool

 Exp22_Word_Ch02_Cumulative_Pool

 Exp22 Word Ch02 Cumulative Pool

Word Chapter 2 Cumulative – Pool

  

Project Description:

You and a friend from college are starting a new business, Pool Pros, a pool maintenance and supplies operation. You plan to have on hand various documents and brochures related to pool ownership, one of which you are working with now. You will use skills presented in this chapter to format text, adjust alignment and indents, bullet and number lists, and incorporate various types of graphic objects that help describe the process of caring for a pool.

     

Start Word. Download and open   the file named Exp22_Word_Ch02_Cumulative_Pool.docx.   Grader has automatically added your last name to the beginning of the   filename. Ensure that nonprinting characters are displayed.

 

Select crystal-clear perfection at the end of the first body paragraph   and bold it. Select all text and change the font to Arial. Change the   alignment of selected text to Justify.

 

Select the first two body   paragraphs on page 1 and adjust the line spacing to 1.5. Ensure that   paragraph spacing before and after is 0 pt for the selected paragraphs. Apply   a First line indent for the two paragraphs of 0.5″. 

 

Select all subheadings that are   formatted in bold and change the font size to 14

 

Select the four paragraphs that   precede the Get Rid of Debris   heading, beginning with Check the   pool’s water balance and ending with Add   an algaecide. Add a Box, double-line border with ¾ line weight and a color of   Blue-Gray, Text 2 (fourth column, first row). Shade the bordered area with Blue-Gray, Text 2 Lighter 60%   (fourth column, third row under Theme Colors).

 

Display the ruler. Click or   position the insertion point at the top of the document and press ENTER.   Click or select the newly inserted blank paragraph. Drag or move the First   line indent marker back to the left margin to remove the First line indent   from the blank paragraph.

 

Set a left tab at 1″ and a   right tab at 5″. Ensure that the right tab includes a dash leader. Press   TAB and type Your Pool. (Do not type the period.) Press TAB and type Your Way. (Do not type the period.) Change the font for Your Pool and Your Way to Lucida Calligraphy. Bold both text items on the first   line and change the font size to 10.

 

Click or position the insertion   point before the second sentence in the first body paragraph at the top of   page 3. The sentence begins with Add   more in hot weather. Delete the preceding space and period that ends the   first sentence. Insert an Em dash symbol and change the case of Add   to add.

 

Select the four paragraphs in   the shaded area near the top of page 1. Apply numbering, choosing Number   alignment: Left (1., 2., 3.).

 

Click or position the insertion   point at the top of the document and insert WordArt, selecting Fill: Blue,   Accent color 1; Shadow (row 1, column 2). Type Pool Maintenance. (Do not type the period.)   Change the font size of Pool   Maintenance to 24 and change the Text Fill to Black, Text 1. Ensure that WordArt   font is Arial. Wrap text at Top and Bottom and visually center the WordArt   horizontally on the first line 

 

Click or position the insertion   point at the end of the document and press ENTER. Insert SmartArt, selecting   Basic Cycle. Display the Text pane. Type Get rid of debris beside the first bullet. Type Vacuum pool beside the second bullet. Type Adjust   chemicals beside   the next bullet. Type Backwash filter and Add chlorine beside the next two bullets. Close the Text pane.

 

Adjust the SmartArt height to   3″ and the width to 5″. Choose Polished SmartArt style and change colors to Gradient Range   – Accent 3 (row 5, column 3). Choose text wrapping of Square. Align the   SmartArt object in the center relative to margins.

 

Click or position the insertion   point at the top of the document. Insert a Sun shape from the Basic Shapes category. Draw the   shape approximately 1″ wide and 1″ high, near the left margin on the top line   of the document. Using the Shape Format tab, adjust the height and width to   exactly 1″.

 

Change the shape fill of the sun   to Yellow. Insert a Cloud shape from the Basic Shapes category, sizing it to   be approximately ¾” high and ¾” wide. Position the shape so that it   overlaps the top right corner of the Sun shape. Change the shape fill of the   cloud to Light   Gray, Background 2. Send the cloud to the back so that it appears to be   peeking out from behind the sun.

 

Group the cloud and sun shapes   into one object. Duplicate the shape and drag the copy to the right, aligning   it at the right margin on the same line as the WordArt heading. Align the   first shape at the left margin, approximating a mirrored placement of the   copied shape.

 

Draw a text box of any size near   the middle of page 2. Copy the first sentence in the document, On a searing summer day, a swimming pool   is a welcome respite from the heat. (Include the period.) Paste the   copied sentence in the text box. Adjust text box height to 1″ and width   to 3″. Choose Tight text wrapping.

 

Change the font size of text in   the text box to 14 and change the font to Tahoma. Center the text. Click or press   Align in the Arrange group on the Shape Format tab and align the text box in   the middle and also in the center of the page. If the text box awkwardly   divides a heading, drag or move it down slightly to better position it   visually. Remove the outline from the text box and apply a shape fill of   Blue-Gray, Text 2, Lighter 80%.

 

View the document in Multiple   Pages and check for any poorly placed headings. Insert a page break before Vacuum the Pool at the bottom of page   1. Insert a page break before Add   Chlorine to the System at the bottom of page 2.

 

Save and close Exp22_Word_Ch02_Cumulative_Pool.docx.   Exit Word. Submit the file as directed.

IT 210

  

IT 210 

Title: CheckPoint: Iteration Control Structure
 

A worm is moving toward an apple. Each time it moves the worm cuts the distance between itself and the apple by its own body length until the worm is close enough to enter the apple. The worm can enter the apple when it is within a body length of the apple. 

discussion

 Discuss the implications of the strength of relationships on the strength of the entities. Provide examples. 

 Discussion Guidelines
You must provide an original response of 300+ words of your own 

Textbook:

 Printed Textbook: Database Systems: Design, Implementation, and Management, 13th edition, Coronel and Morris. 

How can I unlock my PST file

To unlock your PST File , you can take help from DRS PST Password Remover. It is a automated tool that can help you to lock or unlock your PST files in a very easy. This software supports both ANSI and UNICODE level of codes. It is a user friendly tool that can be used by any non technical or beginner user. Moreover ,the tool also offers a free demo version to its users.

To know more , visit – https://www.data-recovery-solutions.com/pst-password-remover.php