Design a flowchart or pseudocode for

Design a flowchart or pseudocode for a program that accepts rental contract data and displays a completed rental contract ready for a customer’s signature.
 

Accept the following as input:
 

Contract number
Customer’s first and last names
Automobile’s vehicle identification number
Starting date for the rental agreement stored as three separate variables—month, day, and year
Length, in days, of the rental agreement
Indicator of whether the customer bought the optional insurance policy
 

Display output as follows:
 

If the contract number is not between 10000 and 99999 inclusive, issue an error message and end the program.
If the customer ID number is not between 100 and 999 inclusive, issue an error message and end the program.
If the starting date for the rental agreement is invalid issue an error message and end the program.
(In other words, make sure the month is between 1 and 12, inclusive. If the month is 1, 3, 5, 7, 8, 10, or 12, the day must be between 1 and 31, inclusive. If the month is 2, the day must be between 1 and 28, inclusive. You do not need to check for leap years. If the month is 4, 6, 9, or 11, the day must be between 1 and 30, inclusive.)
If the length of the rental agreement is not between 1 and 30 days inclusive, issue an error message and end the program. Otherwise, calculate the ending month, day, and year based on the starting date and length of the agreement.
The insurance indicator must be “Y” or “N” (for “Yes” or “No”); otherwise, display an error message.
If all the entered data is valid, display it along with the fee for the rental, which is calculated as follows:
$25 per day for 10 days or fewer
$18 per day for each day over 10 days
$2.50 per day for insurance, regardless of the number of days in the contract

Parameter

  When you write the declaration for a function or method that can receive a parameter, you must include the following items within the method declaration parentheses:

  • The type of the parameter
  • A local name for the parameter

A. Please discuss the importance of providing parameters to methods and describe how a parameter is declared within a method header. Give examples.

B. Please describe the features of methods, including the number of methods permitted in a program, method naming rules, the composition of a method, and variable scope rules. Please give an example of each one.

What are the five simple data entry hacks?

Computers and other electronic devices are critical to the storage, sharing, and rapid retrieval of information in modern business organisations; nevertheless, the veracity of this information cannot be guaranteed across the board. The entry of accurate data is necessary for ensuring that operations in the industry run smoothly and effectively. In order to successfully enter data while making as few mistakes as possible, specialised skills and focused attention are required.

The repercussions of typographical errors might be extremely severe. A comma that was misspelt lost the United States government one million dollars in income in 1872, and on January 31, 2009, punctuation that was wrongly tagged as a banned symbol by Google effectively blocked most sites on the Internet for more than an hour. Processing data is a challenging operation, and entering it manually is not only time-consuming but also chaotic and prone to errors. The following are some of the straightforward hacks that can be used to guarantee accurate data processing.

 Developing a Ergonomic desk:  

The American Journal of Preventive Medicine conducted a study that found that women who spent more hours sitting down doing activities such as working, driving, lying on the couch, and indulging in other leisure pursuits had a greater chance of passing away prematurely from heart disease, cancer, and other health conditions. This highlights the importance of designing an ergonomic desk. Data processing operators put in a significant number of hours working tirelessly in order to complete their projects. Workers are required to cut back on their break time and concentrate more on their work because of the overwhelming volume of work. They run the risk of experiencing significant health issues as a result of this work arrangement over time. As a result, it is essential to cultivate an atmosphere that is welcoming to staff members. Workers who are outfitted with ergonomic seats, tables, and computer systems may experience fewer of the negative health effects that come along with leading a sedentary lifestyle. The efficiency of the data input operators will be improved as a result of this. The use of dual monitors has shown to be useful in a number of ways, including the reduction of errors and the acceleration of processes.

 Acquiring data from reliable sources: 

Many different industries deal with significant amounts of data coming from a variety of sources, all of which have to be examined and confirmed. The accuracy of the information can be ensured by collecting data from trustworthy sources and then verifying the data twice. Reliable sources of information include government statistical data, academic publications, country census data, and other such sources. For more detail visit:      https://it-s.com/our-services/data-tranformation-services/data-entry-service/        .Academics use this type of information. OCR, or optical character recognition, is a method that can be applied to the process of converting picture files and PDF files into digital format. These can be modified to suit your needs. In order to guarantee that the OCR result is accurate, it must be double-checked.

 Understanding data entry tools: 

A comprehension of the instruments used for data entry Microsoft Excel is an indispensable instrument for data entry operators. On the internet, one may find a great number of spreadsheet hacks that assist data processing operators in auto-completing entries. Data can be entered quickly and easily with the use of shortcuts like Excel’s Autofill and Flash fill features. The elimination of formatting is made easier by copying and pasting data from websites onto convenient notepads. Editors such as Ultra Edit provide a variety of advanced capabilities that allow for improved editing, such as multi-caret editing, column or block style editing, bookmarking, and more.

 Avoid distractions and follow a schedule: 

Working in an office setting where there are fewer opportunities for distraction makes it easier for data processing operators to get their tasks done fast. Regularly adhering to a timetable not only enables personnel to concentrate more intently on the accomplishment of the organization’s objectives, but it also educates the body to function effectively within these schedules. There are a variety of methods and tools for managing time, such as task lists, tomato timers, and calendar alarms, which can assist with assigning priorities to the tasks that need to be finished by a certain date and time. It is possible to be distracted, but there are several strategies available for overcoming this challenge, such as using headphones with noise-cancelling technology or playing white noise. Limiting the number of visual distractions might be helped by blocking your vision of persons who are continuously moving.

 Proofreading of data: 

In both manual and automatic data processing, errors are possible; nonetheless, the result should be mistake-free regardless of the processing method used. There are several articles and publications published online that contain inaccuracies, which can result in reading materials that are unclear. As a result, it is essential to do thorough proofreading before submitting any data. The process of proofreading data guarantees that the information is free of errors and can be relied upon.

Utilizing reputable data entry services is the best alternative available if you want to ensure that your data are accurate. They are adaptable and may be customised to meet the specific needs of each individual customer. They make it easier for businesses to concentrate on their core areas of expertise, which in turn leads to increased operational profits and enhanced operational efficiencies. They make use of the most recent technology in order to deliver services of high quality and a quick turnaround time. In this way, they assist their client organisations in staying ahead of the competition and making smarter business decisions. The operating costs associated with infrastructure, labour, and technology can all be reduced thanks to outsourcing’s assistance.

Assignment 5 (DF)

 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that a bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

Building decision tree model for dataset in R

The main objective of this assignment is to build a classifier using machine learning techniques that can accurately tell us if the person has diabetes or not

Decision Tree model

a. Does the data need any preparation for this algorithm? What did you do? Why? 

b. Draw the tree and write at least two rules. 

c. What are the variables that best split the data in the first and second level of the tree? 

d. Evaluate the developed model using at least three different metrics. 

Dissertation Thesis PhDIT

Research paper for Internet of Things(IoT).Please write the last part of Chapter 2, applications of your selected research method and design in the literature. It comprises one or more paragraphs describing widespread use of your selected research method in the IT literature (minimum five supporting citations/examples) and one or more paragraphs describing widespread use of your selected research design in the IT literature (also minimum five examples).

Chapter Topic

 At least 50 to 75 scholarly peer-reviewed articles, with a majority of them being recent (within three to five years) and 30 to 50 pages of APA work. 

ETC W 1 D

 

After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Database Research Assignment

  

For this assignment, you are going to do a detailed technical and business evaluation of Apache Databases (Pig, Hive, Cassandra, etc.)

You must answer the following questions. The report is a DETAILED, RESEARCH ASSIGNMENT. This is not an outline, excel spreadsheet, or a one-two project. This will require a significant level of effort and time. You are building a business use as to WHY a company would want to use this database technology solution or vendor technology. 

QUESTIONS

  1. What are the key database      products made by the vendor OR the key database platforms available under      the database category? (Describe functionality and technical highlights)
  2. If a vendor, who are the      competitors to the platform? If a database technology class, who is the      clear leader and why?
  3. What are the key features      for each of these database platforms that make them unique?
  4. Provide three (3) business      uses for why a customer/client would want to use your vendors/class of      database technology in their environment.
  5. What are key technical      skills a data administrator or database administrator would require if      they use this platform?

As you can tell, this is about a 15-20 Page Paper! Your group will have a LOT OF RESEARCH. Start BEFORE the residency (seriously)!

You MUST use APA citations throughout this paper. It counts as 20% of your overall grade for this assignment. Your paper will be graded against the assignment rubric which measures the following weight based on the points assigned (i.e. 20 points, 25 points depending on if you are in MAIN or 1G/IIG)

  1. Technical Competency      (25%)
  2. Business Competency      (20%
  3. Technical Accuracy      (25%)
  4. Spelling / Grammar      (10%)
  5. Citations / APA (20%)