Information infrastructure.

 Research frequency-division multiplexing. Identify three everyday examples of FDM use. For each of these examples show how FDM is used and it works. Summarize your findings in a brief paper.

Instructions (from the syllabus): In these writing assignments, there is not a “right or wrong” answer. Rather, cases provide a vehicle for you to demonstrate your understanding and ability to apply course concepts. You must use at least two appropriate sources (other than your course textbook) that are properly cited; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:

  • Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
  • Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss those facts which are pertinent to the issues identified above.
  • Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation, based on the knowledge you have gained in this course? Be sure to support your recommendation by citing references in the text and in the supplementary readings. You should also draw on other references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
  • Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
  • Word count is 500 words, not including references and figures. References should be in the APA style. 

perimeter defence

 The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community. 

INT 2240 Lab 1

 

Lab ONE

Problem Statement:    Given four non-negative integers, display the integers using the IPv4 address format.================================================================================================
Input Data:

  • Have the user enter 4 non-negative integers at the keyboard
    • Each integer must be between 0 and 255
  • If any of the integers is less than 0 or greater than 255,
    • display an error message
    • have the user do the
    • inputting again, until the data in the proper range is entered

Proessing:

  • Set up a set of nested loops
    • The outer loop should control whether the user wants to continue or not
    • If the user wants to continue with the processing,
      • Set up the inner loop(s)
        • Have the user repeatedly enter 4 integers, one at a time 
          • If an entered integer is not in the proper range,
          • display an error message and have the user do the inputting again, 
          • until the data in the proper range is entered 
        • Display each of the non-negative integers, along with an appropriate message 
        • Display the integers formatted as an IPv4 addressad

Output Data:

  • Display each of the non-negative integers, along with an appropriate message
  • Display the integers formatted as an IPv4 address
     

 Lab 1 – Sample Program 1.pdf Lab 1 – Sample Program 1.pdf – Alternative Formats
================================================================================================.
Your lab will be graded on whether it’s been set up as a complete and workable solution.

For your solution to be complete, your program must be able to

  • Set up code to do the following:
    • prompt the user for the input data asked for (as explained above within the Input Data section)
    • If the data is not valid, then let the user know and try again
    • Once valid data is entered, set up the entered data, formatted as an IPv4 address
    • Repeat the above process as needed
  • compile (ie, no syntax error(s))
  • run (ie, no run-time error(s))
  • provide the output data (as explained above within the Output Data section) to the user

For your solution to be workable,

  • Your solution should be free of any type of errors (syntax, run-time, logic)
  • you may want to develop an algorithm first, using pseudocode
  • you do NOT need to turn in any algorithm

==========================================================================================================================Grading rubric:

  • You’ll receive full credit, if 
    • your program
      • compiles and runs with no problems 
      • produces the expected output
  • You’ll receive partial credit, if 
    • your program
      • compiles and runs with no problems 
      • produces partial output (that is, incomplete output)
  • You’ll receive 25% of the points, if your program will not compile
  • You’ll receive 30% of the points, if your program compiles but has a run-time problem
  • You’ll receive 40% of the points, if your program produces logic error(s)

database

 The exercise consists of doing exercises from attachment named “2.5 instructions” from the information on “1.9.docx” attachment.  

quiz

This quiz is based on chapter 6 in the text.  Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

project report

 

Content Requirement:

1. Task/Problem Description.

2. Dataset Description.

3. Brief Description of each method used.

4. Experimental Results and Discussions.

Paper requirement:

1) 4 pages. 

2) Write text (complete sentences), not bullet forms.

3) Optional: Any references

Dynamin and Static Data Structures

 Respond to the following with 150 words or more and be sure to use references.

Discuss the trade-offs between dynamic and static data  structures. What are the advantages of and differences between  ArrayList, LinkedList, and Vector? Provide examples of how to best  implement each of these data structures. 

Dice_game

need help coding a code on codehs and i think it is looping and there are 1 other assignments i need to be done also  called rock paper scissors