Java Programming

 These files are needed for successfully completing Lab Assignment 5:

  • Address.java, Class definition for Address
  • CreditCardDemo.java, “Driver” program for CreditCard class.
  • Money.java, Class definition for Money
  • MoneyDemo.java
  • Person.java

 Submit copies of any Java source code files you create or modify:

  • Money.java
  • CreditCard.java

Submit a word processing document that contains screen shots demonstrating successful completion of this Lab Assignment.Submit copies of the Money.java file that defines the Money class and the CreditCard.java file that defines the CreditCard class as two separate files. 

Assignment: Case Study of a Criminal Offender

  

Assignment: Case Study of a Criminal Offender
In this assignment, you will develop a case study for a well-known criminal offender. Begin by selecting one criminal offender from the following high-profile individuals:
• ***** *****
• Jeffrey Dahmer
• Aileen Wournos
• Kip Kinkel
• Bernie Madoff
• Charles Manson
Research your selected case and complete the following:
• Describe the charges against the individual.
• Discuss the biological, developmental, and environmental factors that relate to the criminal behavior.
• Discuss the theories that could be applied to explain their actions.
• Analyze whether mental illness, substance abuse/dependence, or psychopathy factors contributed to the criminal action(s).
• Describe your reaction to the court verdict and if you agree or disagree with the final disposition. If you agree, make sure that you thoroughly defend that position. If you do not agree, include what you believe would be the appropriate verdict and use appropriate reasoning.
Remember to provide examples from the offender’s history, referring to course materials as well as a minimum of five external sources. For example, journal articles, books, credible Web sites, and newspaper articles may be used to support your explanation. Your external sources must include at least two peer-reviewed journal articles.
Write a 3–5-pages paper in Word format. Apply APA standards to citation of sources. Be sure to include a tile page and reference page in APA format.

data encryption

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer in 300 words or more with references(whether you believe all data should or should not be encrypted).  

Digital Forensics

  

Prepare a report 1500 to 5000 words long on any of the following subject. involving Digital Forensics.  The report must have at least two references.

2. Legal Compliance

3. Affidavits

4. How to Testify

5. Case Law

6. Chain of custody

7. Digital Investigations

  1. Authentication of Evidence
  2. Chain of Custody Procedures
  3. Metadata
  4. Root Cause Analysis
  5. Using Virtual Machines for      Analysis
  6. Mobile Device Analysis (e.g.      smart phones, tablets)
  7. Embedded Systems (e.g. GPS, games      consoles, Smart TVs)
  8. Internet of Things Devices      (e.g. consideration of potential for evidence storage)

Java classes from

In the first part, you will complete a partially-implemented web crawler program. In the second,

you will use Java classes from the package java.util.concurrent to divide the workload

among multiple threads of control. 


Download the starting code in this zip file. Inside the src directory are two

subdirectories: spider contains the (partially complete) sequential web crawler for use with Part

1, and concurrentSpider contains the threaded web crawler code for use with Part 2.  This code

uses classes from the Java class library for parsing HTML files and pulling out links

(java.net.url among others).

Part 1 – Sequential Web Crawler.

1. In this part, you will complete a program that is able to “crawl the web” starting from a

given URL. A detailed problem specification and descriptions of the provided classes can

be found in the first section of Concurrent Data Structures in Java. Complete the tasks

given in the To Do sections and the Try This section.

2.

3. The finished program should output the URLs it processes as it crawls the website.

Capture this output in a file.

4.

5. There will be a check-in date to make sure nobody is waiting until the last minute to

complete this part. I will ask for copy of your Spider.java file to ensure everyone is

making progress.

Part 2 – Multi-threaded Web Crawler.

1. Production-quality web crawlers divide the work of following links from multiple web

pages among multiple versions of themselves, using a Java (and operating system)

concept called threads (you used threads in CSci 157 whenever you

programed ActiveObjects). Each thread must share the data structures being used,

which can cause problems if (for example) two instances try to remove from the work

queue at the same time. Because our Queue implementations are not thread-safe, they

cannot be used in this version. Instead, we can use implementations provided by the Java

package java.util.concurrent. Unfortunately the interface these classes

implement is different from the QueueInterface. For example, the method add is

used instead of enqueue, and peek or poll instead of dequeue.  


 

2. A detailed problem specification can be found in the second section of Concurrent Data

Structures in Java. An outline of the concurrent solution and the problems that concurrent

data structures solve can be found in the third section. 

 

3. Complete the tasks given in the To Do sections and the Try This section of section two.

Deliverables

For this project you will turn in:

• a README file for each part, containing SHORT instructions on how to compile and run

each program and a description of any issues or known bugs. You do not need to describe

the program itself.

• all Java files required to build and run the program(s), using the same file structure as the

provided zip file

These files are to be turned in as follows: zipped into a single archive file, emailed to me.

Do not include binary files (such as .class files); sometimes Gmail flags those as malware and

won’t send them.

Discussion

 

Topic( Minimum 300 words):

–   Discuss the primary factors that motivate companies to expand internationally.  

– Minimum two references. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

Final project- PD

Project 1

((

Susans Consulting Company (SCC) – Problem Overview

Susans Consulting Company (SCC) has been in business for ten years and has experienced a significant

turnover in the project management group, which has prompted senior leadership to investigate. 

A preliminary review by senior leadership has determined that Project Managers are frustrated with the

amount of required project management documentation, which has impacted their ability to manage

projects successfully. 

A recent review of the project management process has determined that SCC has spent between 30-40%

of its total project budget on projects' overhead costs to include project management costs. A review of

industry standards is between 5-15% higher than most companies. In addition, senior leaders found that

projects are being delivered between 25% and 50% over budget and late 95% of the time.

Note: Project Management overhead includes the PM's time managing the project, attending meetings,

and developing the required documentation.   

SCC Request: SCC has reached out to your team because you are experts in defining project

management processes and delivering projects on time. The SCC request includes the following:

 The development of a new project management process which at a minimum should include the

following:

o The ability to track issues, risks, changes

o The ability to view project activities consists of a view of what has been completed and

what activities the team is working on over the next reporting period

o The company must have a view into total life cycle project costs to include what has been

spent to date, baseline budget, any changes to the budget, remaining budget, and cost of

the project at completion

 In addition, to the new process request, SCC has a new project they need to complete by the end

of the year with a limited budget and no project management staff.  

Assignment

 Identify a project manager – this individual is responsible for the team assignment ensuring that

team members are completing their assigned work on time.

 I will act as the sponsor both for the project and for the methodology build-out.  Any questions

should be directed to me.

))

OVERVIEW- For Understanding the Project

((Your paper should include the following information:  

 Project scope statement

 Using the methodology outlined above, describe each phase of the project and its deliverables))

MY PART

USE SPIRAL Methodology

-Need references as well.

Problem 7- Org behavior

1. Describe and discuss Maslow’s hierarchy of needs including the types of needs and how they become dominant.

Text

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Computer Science IT505 assignment

Follow the instructions and answer the questions as asked 

No plagiarism and no copy 

QUESTION 1:   

Your computer received the following digital, binary signal sequence. Now, your computer should cover the binary data to the text so you would read it on your computer screen. Assume, the received binary code was generated based on ASCII.

Received binary data:

01001001 01010100 00110101 00110000 00110101 00100000 01010111 01101001 01101110 01110100 01100101 01110010 00100000 00110010 00110000 00110010 00110011 00100000 01010111 01010101 01010011 01010100 00100000

You should write the text that will appear on your computer screen. Simply convert the binary data to text.

HNIT:  Do your web search and find (Binary to Text Translator) to convert the binary to back to text.

QUESTION 2:  

The user would like to save the incoming binary that you decoded in question 1. Therefore, the user would like to make sure there is enough memory space in his/her computer. What would be the minimum memory space (in Bytes) required to save the incoming data?  

QUESTION 3:  

Develop the Manchester Code for the first character of the digital data stream in question 1.  You should develop Manchester Code for 01001001

Your name must be on the digital signal code diagram 

QUESTION 4:  

In an airport, two computers in two different terminals will be in communication-based on the requirements below;

The user in terminal 1 and the receiver terminal 2 can operate on different clock frequencies.

The speed of the communication is not a concern; however, the quality of the communication is important.

The terminals are more than 100 meters apart. There is a heavy external electrical noise which would impact and disrupt the communication and cause miscommunication (corrupted message) between terminals

4a) 

What would be your preferred data transmission technique? Synchronous or Asynchronous transmission. Explain your answer

4b) 

What kind of Error Detection method you would use to make sure you will detect most of the communication errors? Explain your answer

QUESTION 5:  

There are three given different communication cases. Where a user would like to access a database.  

CASE 5-1: The user computer is on a transatlantic cruise ship and the receiver (the database) is in NYC.  

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.

CASE 5-2: The computers are in different cities. The user computer is in Los Angeles and the receiver (the database) is in NYC.  This has to be a fast and secure communication  

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.

CASE 5-3: Both computers are in the same building. The user computer is on the second floor and the database is on the third floor.

  1. a) What type of communication (digital or analog) would you use between given to communication points?
  2. b) If it is digital then write the cable type you would use, if it is analog then write the wireless communication type you would use.