Loops and Subcharts

  

using Loops and Subcharts
 

Create a RAPTOR program that will find multiples of either one of two integers, but not both, between 350 and 450.
The two integers are to be entered by the user at runtime. At least one of the integers must be an odd number. If not the program should end quickly. Your program must use a loop and at least one subchart. Refer to the graphic that demonstrates three sample runs with suggested ouput. 

YOUR ASSIGNMENT
Part 1
Work through an algorithm for the above program and submit pseudocode for this algorithm. Please enter the pseudocode in the dropbox message area.
 

Part 2
Use your pseudocode to create the RAPTOR flowchart program. Zip it up and submit the zip to this

Unit 6 DB

Recent decisions to ban users, including former President Trump, and to block or add disclaimers to certain stories, have raised questions about social media’s power and influence.

Mobile Security

  

Assignment Content

  1.     Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches. 

    Create a visual poster or infographic to display in the company’s break room.  

    Include the following information: 

    • At least 2 mobile device threats 
    • List of ideal mobile security settings to defend against threats 
    • Brief instructions for setting up at least 2 security settings 
    • An explanation on what happens when mobile devices are not secured from these threats 
    • Appropriate images and graphics 
    • 2 resources for more information on mobile security with appropriate citations 
    • Format your assignment according to APA guidelines.

It472 week 8

DQ8: 350 words 

  • Describe the primary activities of the design phase of the SDLC.
  • Describe the three primary strategies that are available to obtain a new system.
  • What is the purpose of a request for proposal (RFP)? How does it differ from the RFI?. What information is typically conveyed in an RFP?

1.4 Peer Review

  1. Conduct a critical analysis of two of your classmates’ proposed topics by the last day of the workshop.
  2. Each response to your classmates should be at least 150 words in length and should include APA citation to one credible information source.

Please find the attached document. 

Excel 100 words minimum

As per our textbook, Excel is spreadsheet software for creating an electronic workbook.  A spreadsheet consists of rows and columns used to organize data, perform calculations, print reports, and build charts. With Excel you can create simple to complex personal or business workbooks. For this exercise, you must demonstrate your understanding of an Excel workbook by discussing a personal or business workbook that you would create in order to help organize an area in your life. Some examples would be personal finance, a budget, counting calories, tracking an exercise routine, etc. What type of spreadsheets would be useful in your future career and personal business? How could you use Excel in your personal life? (Please consider any volunteer activities, clubs, etc.). What would be the names of the columns and rows, and functions you would use to create the described spreadsheets?

discussion

 

Describe your project and why you chose it. (needs to use the same project subject as in previous work) 

Discussion Parameters

Initial post response: Your posts should be of substance that address the topic. The initial response should be a minimum of 150 words. Use APA format for any quotations or citations you use to support your answer.

Individual programming assignments:Pinwheel

  

Individual programming assignments:Pinwheel Redux. Name the program pinwheel_redux.py

Download a version of this program without using functions at the end of this page 

You will write an improved version of the eight_parallelogram.py that you created for week 3. In this version, you will create the following two functions:parallelogram(s, parallelogramColor): This function draws a single parallelogram with longest side of length s and color parallelogramColor, as described in the Week 3 Assignment.pinwheel (s, nroParallelograms, parallelogramColor): This function uses a for-loop to call the function parallelogram() in order to draw the pinwheel. The parameter s represents the long diagonal of the parallelogram, nroParallelograms indicates the number of parallelograms in the pinwheel, and parallelogramColor is the fill color of the parallelograms. Your program should draw three pinwheels, in three different sizes, colors and at different locations on the window.
Create a function main() which asks the user for the sizes of the three pinwheels, the number of parallelograms in each pinwheel, and three color names.
Take a screenshot of the output of your program and submit with your program files.
Call the screenshot file pinwheel_redux.PNG 

Below are animations drawing a 3, 4, 8-parallelogram pinwheels:IP Address Descriptor Redux. Name the program ip_descriptor_redux.py.
Write a program that reads four integer values corresponding to an IP address “a1.a2.a3.a4” (IPv4), and determines whether the values form a valid IP address, the class of this IP address, and whether or not the values correspond to a reserved IP address space. Your program shall define and use the following functions:is_valid_ip(a1, a2, a3, a4): This function returns True if the address a1.a2.a3.a4 is valid; otherwise, the function returns False. The parameters a1, a2, a3 and a4 form a valid IP address if a1 is between 1 and 255, and the rest of the values are between 0 and 255, both included.determine_ip_class(a1): By providing the a1 component of an IP address, this function return one of the classes below depending on the range a1 falls in:
Class Range
—————–
“A” 1 – 127
“B” 128 – 191
“C” 192 – 223
“D” 224 – 239
“E” 240 – 255is_private_ip(a1, a2, a3, a4): This function returns True if the address a1.a2.a3.a4 falls in one of the address ranges below, considered Private IP Addresses; otherwise the function returns False.
Private IP Address
——————————-
10.0.0.0 – 10.255.255.255
127.0.0.0 – 127.255.255.255
172.16.0.0 – 172.31.255.255
192.88.99.0 – 192.88.99.255
192.168.0.0 – 192.168.255.255
——————————-main(): This function coordinates all the actions in the program: it asks the user for the components of an IP address, and determines whether it is valid or not. If it is valid, the program also shows the class of the IP address, and whether or not it is considered a private address.Here is a sample execution of the program when given a valid IP address (substitute me with your name):
IP Descriptor Program
by meEnter the four components of an IP address, separated by commas: 192,168,32,64
This is a valid IP address.
This is a class C address.
This is a Private address.Here is another example of a valid IP address that is not private.
IP Descriptor Program
by meEnter the four components of an IP address, separated by commas: 64,32,24,128
This is a valid IP address.
This is a class A address.
This is a Public address.This is an example of an invalid IP address:IP Descriptor Program
by meEnter the four components of an IP address, separated by commas: 64,32,-24,528
This is NOT a valid IP address

Software Project Management -1

 What is project management? Briefly describe the project management framework, providing examples of stakeholders, knowledge areas, tools and techniques, and project success factors.