DISCUSSION

1- Topic: Some writers have called the emergence of electronic commerce to be a “revolution.” Others have described it as a series of waves. 

  •  Create a thread 
  • (Your post) In two to three paragraphs briefly describe the merits of each point of view

2- Topic: Situations (business or personal) in which you might find a personal area network to be useful.  

  •  Create a thread 
  • (Your post) In two to three paragraphs briefly describe the merits of each point of view

Link: https://www.youtube.com/watch?v=OAyB0qxFBhE&feature=emb_title

3- Topic: Why would an online retailer send printed catalogs to customers and or potential customers? 

  •  Create a thread 
  • (Your post) In two to three paragraphs briefly describe the merits of each point of view

Link: https://www.retaildive.com/news/why-paper-catalogs-still-matter/506298/

ITSD322U3DB

 

Modern applications can be complex and working on a programming team can raise that complexity even further. Classes offer a way to reduce that complexity by isolating teams from each other’s work. For example, one team can develop a class that includes all the necessary properties and methods for connecting the application to a database. Another team might develop a class that utilizes a remote Web service, such as package tracking at UPS or FedEx.

Discuss possible classes that might be used in a distributed application, such as e-commerce, order handling or inventory management. You may include the two mentioned above and be creative in your posts. Suggest properties and methods for these classes and explain how the class might be used.

In your replies to fellow students, suggest additional classes that might be applicable, and discuss additional properties and methods that could be added to their classes.

graphic design

 

Module 01 Content

  1. Jennifer Schiff reports at least 12 ways bad website design can affect your business.

    Access Jennifer Schiff’s article by clicking here.

    For this written assignment read the article from the link above and complete the following items:

    • Summarize the effects of using bad visual design elements.
    • Examine the response viewers may have and how that may negatively affect business.
    • Answer the question, “Why it is so important to use visuals in specific ways to effectively reach viewers?”
    • Include whether you believe it is important to use visuals strategically in business and website communication. Why or why not?
    • Support the items above by including relevant quotes and paraphrases from academic/scholarly sources.

      This written assignment should be at least one page in length and use APA formatting with a reference page (template here).

      APA_Paper_Template_07232019.docx

      Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:

https://www.proquest.com/docview/1873605469?accountid=40836

Case Study Phase 2

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

A) PROPOSE A RISK ASSESSMENT METHODOLOGY WHICH CAN BE USED ALONG WITH YOUR CHOSEN COMPANY IN CASE STUDY PHASE 1 (attached).
 

B) MAKE SURE YOUR REFERENCES LIST CONTAINS AT LEAST 4 SOURCES

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

Make sure you are using at least four (4) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

IT470: Computer Security Fundamentals

Week 3 discussion topic

  1. Explain that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks. 
  2. Compromising information systems is an increasingly popular method of espionage.  Discuss the challenges companies face and how can they prevent data loss?

you have to respond at least 2 students post

ECE 175: Computer Programming for Engineering Applications

ECE 175: Computer Programming for Engineering Applications

Homework Assignment 7

Conventions: Name your C programs as hwx py.c where x corresponds to the homework number and y corresponds

to the problem number. As an example the C program for hw1 problem 1 should be named as hw1 p1.c. Write

comments to your programs. Programs with no comments will receive PARTIAL credit. At each program you turn

in at least the following info should be included

– Author:

– Date created:

– Brief (two-line) description of the program:

Submission Instructions: Use the dropbox on D2L to submit only the .c les.

Problem 1: The les in sudoku.zip contain integer values for Sudoku puzzles (two dimensional integer arrays with

9 rows and 9 columns). Write a program that reads a sudoku le as input and prints out if the le is a proper

solution to the Sudoku puzzle.

For the rules of Sudoku, check Wikipedia: http://en.wikipedia.org/wiki/Sudoku.

Example of a correct Sudoku puzzle:

1 2 3 4 5 6 7 8 9

4 5 6 7 8 9 1 2 3

7 8 9 1 2 3 4 5 6

2 3 4 5 6 7 8 9 1

5 6 7 8 9 1 2 3 4

8 9 1 2 3 4 5 6 7

3 4 5 6 7 8 9 1 2

6 7 8 9 1 2 3 4 5

9 1 2 3 4 5 6 7 8

Problem 2: Insertion Sort is a sorting algorithm that moves the elements of an array to their correct position

one element at a time. The following example shows the steps for sorting array data= [3, 7, 4, 9, 5, 2, 6, 1]. In

each step, the item under consideration is underlined. The array before the underlined element is already sorted

while the array after the underline element is unsorted. The item that is moved (or left in place because it was the

biggest yet considered) to the correct position within the sorted part of the array. The new position of the element

that was moved in the previous step, appears in bold in the next step.

3 7 4 9 5 2 6 1

3 7 4 9 5 2 6 1

3 7 4 9 5 2 6 1

3 4 7 9 5 2 6 1

3 4 7 9 5 2 6 1

3 4 5 7 9 2 6 1

2 3 4 5 7 9 6 1

2 3 4 5 6 7 9 1

1 2 3 4 5 6 7 9

1

Develop C code that would implement the Insertion Sort algorithm. Your code should use the following functions

void insertion(int x[ ], int size)

void print ar(int x[ ], int size)

void swap(int *a, int *b)

The last two functions are already provided in the class notes.

Submit your .c les named hw7 p1.c and hw7 p2.c via D2L dropbox

2

Research

 

Assignment Instructions

  • Define cybercrime and the categories of cybercrime.
  • Research how cybercrime (either in general or with respect to  certain crimes — e.g., hacking, identity theft, cyberstalking) is  handled in at least three different countries (one can be the United  States).
  • Compare and contrast each country’s laws. What ethical issues  arise as a result of differences in cybercriminal prosecution across  cultures?
  • How will your understanding of cultural differences affect your ability to make decisions within your company?

Assignment Requirements 

  1. Your paper should be a minimum of 3 pages and formatted according to APA guidelines.
  2. Use Times New Roman 12 pt font.
  3. Add a Table of Content
  4. Define cybercrime and the categories of cybercrime.
  5. Research on the Internet how cybercrime is handled legally in three different countries of your choice.
  6. Compare and contrast the laws in each different country and  discuss the ethical issues that arise due to the differences in how cybercrime is prosecuted across different cultures.
  7. Explain how your understanding of these different ethics and  laws across cultures will affect your ability to make decisions within your organization.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Write a program that generates n random integers between 0 and 9 and displays the count for each number. (Hint: Use an array of ten integers, say count, to store the counts for the number of 0s, 1s, . . . , 9s.)

 

IN JAVA  

Write a program that generates n random  integers between 0 and 9 and displays the count for each number. (Hint:  Use an array of ten integers, say count, to store the counts for the  number of 0s, 1s, . . . , 9s.)

A modular program is expected – use Methods. The program specifications are as below. 

  1. In the main() method, declare an int array of size 10, named count.
  2. Implement a method populateCount(int[] cnt) that initializes the array to zero.
  3.  Implement a method countNums(int[] cnt, int n) that accepts  the count array and an integer n. The method should generate n random  numbers in the range of 0 to 9. It should keep a count of how many times  each number, 0 to 9; is generated in the array count. 
  4. Implement a method printNums(int[] cnt) to print the count  array.  Note, print “time” or “times” – which ever is appropriate. 
  5. Use basic structured programming and procedural programming.
  6.  Write a main() method that declares the count array. Invokes  the countNums() method with n = 10 followed by invoking the printNums().  Then invokes the countNums() method with n = 100 followed  by printNums(). And again, invokes the countNums() method with n =  1000 followed by printNums(). 
  7. Make sure you invoke  the populateCount(int[] cnt) method at appropriate times. And write out  the heading for each set, n = 10, 100, and 1000.
  8. Documentation. Includes your name, create date and purpose of lab.