Swift Assignment

  

The challenge of this game is to collect as many as flower with the vase (catcher). Flowers fall down from the top of the screen and user will move the vase and collects flowers. In the above figure the dashed line arrows show possible movement directions of the components. In the game no dashed line will be shown. The game scene runs in gravity. The flower will be left from randomly chosen X points (Y is fix) from the top. User can swipe vase only to the right and/or left to collect them. Once the vase touches a flower, then a score is made, and that particular flower disappears with a sound (for example, http://soundbible.com/1536-Stapler.html). User will be granted 60 sec to collect as much as flowers. On the top-right corner of the game, show the remain time and score. Make sure that not many flowers will release at the same time. You may adapt a strategy to release flowers in a discrete way, such as one flower will be release every 2 – 5 seconds from random coordinates. Make sure that flower and vase sprites are not so small and/or big. A typical size for a flower is 64×64, and for vase image is 100×100. Game ends after 60 seconds, shows the score and a restart button a new game.

Analyze the concept of clusters and distributed computing.

 

Purpose

One of the latest, cost-efficient forms of technology that has proven effective for productivity is computer clustering. When devices are interconnected and shared, they create a single and very powerful system that offers speed, capacity, and quality of work. You will research the different types of computer clustering available and advise a chief technology officer (CTO) on the best option.

Assignment Instructions:

The chief technology officer (CTO) at ABC Widgets just returned from a technology conference where he heard about computer clusters. All he knows is that they are the big thing for businesses, and he wants to explore the technology. He has asked you to help.

Write a 3-page research paper explaining computer clustering, benefits, challenges, and potential applications. The paper should focus on one type of clustering application (file server, database, load balancing, web hosting, or data processing) and detail the use, potential setup (high availability or load balancing), type (COTS versus blade clusters), and network connectivity. Be sure that your paper has an introduction and a conclusion.

Assignment Requirements

Your paper should be 3 pages in length. Be sure to use the appropriate APA format and cite your textbook or other sources that you used in your paper.

The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor’s discretion. 

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Also, review the university policy on plagiarism. If you have any questions, please contact your professor.

how much would it cost to have the following assignment done?

 

There are various resources where you can find information on recent cyber threats, for example:

Have a look at these resources, (or any other resources that you identified). Write an article discussing 5 threats that you found interesting.

The article should include the following information:

  • Choose 5 topics from list below, and describe one interesting threat on each topic:
    • Physical security
    • IAM
    • Asset (including data, operating systems, endpoints, etc)
    • IoT
    • Web application
    • Network
    • Malware
    • Others (you may decide yourself)
  • For each threat, describe:
    • Resources you used;
    • What is it about, which topic (see the list above) it covers;
    • Why interesting;
    • Which vulnerability is involved;  what is its CVSS value? use the calculator (https://www.first.org/cvss/calculator/3.0) ; motivate the CVSS values;
    • Describe at least one incident associated with this threat;  explain its impact on CIA; and give suggestion on possible mitigations.

Each threats should be described at about two A4 pages.  So in total, the body of this document should be about 10 pages, excluding citations.

Complete exercises 3 and 4

  

Complete exercises 3 and 4 at the end of chapter 21

Please use “Clearly Visual Basic: Programming with MS Visual Basic 2010 (2nd ed.). Zak, Diane

Ch 21 Pg 396 “Clearly Visual Basic: Programming with MS Visual Basic 2010 (2nd ed.). Zak, Diane.

Ex 3 &4. In this exercise you modify the application from TRY THIS Excersice 1.

OS Discussion Response -1

 Read the post below and respond with 150 words.

Object-oriented programming is a model of programming that is often  used to create programs that are simple, efficient, and easy to  maintain. The way that object-oriented programming achieves this is by  breaking a complex problem down into smaller, simpler problems. It uses a  hierarchical inheritance approach–meaning that the sub classes (or  child classes)  of a class can access all methods from the parent  class. 

A class is utilized as a type of blueprint for objects to be created,  and is basically a collection of similar objects. For example, a  “Computer” might be considered a class, while it’s objects might be 3  different computers: a Lenovo, a Dell, and an Acer. We can declare  variables in the class, and then define what attributes that the objects  in the class “Computer” will share, such as cost, color, and brand.   The “state” of an object is considered to be something that describes  an object, such as the three attributes we listed above.  The “behavior”  of an object is considered to be something that the object “does”, such  as a computer “running”. 

Within the class, a main method as well as other methods are created  which utilize objects, statements, and commands to achieve a desired  result. There must be at least one main method in the program so that  the system knows where to begin executing the program. I have attached  an example of a small program that creates a class of “Computer1” which  declares two variables: cost and brand. I then create an object called  “myComputer” which utilizes those variables to show the cost and brand  of my computer, and to display the result along with a string as the  output.

solve the question

Safety-critical systems are one of the software types that raise many legal and ethical issues. You can touch its benefits everywhere but .the consequences of malfunctions are disastrous Write a report titled “Risks and liabilities of safety-critical systems” and cover the following topics:

 What is a safety-critical system? What does it consist of? 

 Safety-critical systems are everywhere in our lives, mention eight different examples for safety-critical systems from different areas and specify each for each application the

area it belongs to. 

 Discuss four distinguishable features of safety critical systems. 

 Discuss four reliability regimes/factors for safety-critical systems. 

 Discuss four challenges in developing safety-critical systems that are not usual in

developing traditional systems. 

 Discuss five errors that may lead to system failure in the safety-critical systems. 

 Explain one real example about a safety-critical system failure and explain the reasons

of the failure and its consequences, and what should have been done to avoid such

crisis.

 As a software developer, write some recommendations and guidelines to your

colleagues to use when developing safety-critical systems and make sure to make their liabilities, responsibilities, skills required clear. Cover at least ten important points. 

 Conclude your report by summarizing importance of safety-critical systems in enhancing our lives and work and the need to put standards and legislations in advance to avoid any ethical or legal issues that may emerge. 

Also pay attention to the following:

 Add at least two figures/tables.

 Add captions for the figures/tables.

 Use cross referencing for the figures/tables.

 Write at least five references not including your book or Wikipedia.

 Use Harvard system (author-date) system in writing the references.

 Citation.

 Use meaningful titles and if needed subtitles and in general logical report format.

 Correct grammar and spelling.

 Format used should be formal and consistent for a repot such as using consistent front sizes and

styles and justify alignment.

 Use (1350-1550) words not including references.

 State number of words at the end of the report.