Summarize the prominent regulations related to information security and cybercrime. Using library and Internet resources, include the laws and regulations used in the state of Chicago and also recent attempts and enactments at Federal level.
Exercises
Exercise P1.1. Write a program that prints the message, “Hello, my name is Hal!”
Then, on a new line, the program should print the message “What would you like
me to do?” Then it’s the user’s turn to type in an input. You haven’t yet learned how
to do it—just use the following lines of code:
string user_input;
getline(cin, user_input);
Finally, the program should ignore the user input and print the message “I am sorry,
I cannot do that.”
This program uses the string data type. To access this feature, you must place the
line
#include
before the main function.
Here is a typical program run. The user input is printed in boldface.
Hello, my name is Hal!
What would you like me to do?
Clean up my room
I am sorry, I cannot do that.
When running the program, remember to hit the Enter key after typing the last
word of the input line.
P1.3. Write a program that computes the sum of the first ten positive integers,
1 + 2 + … + 10. Hint: Write a program of the form
int main()
{
cout <<
return 0;
}
Exercise P2.3. Write a program that prompts the user for two integers and then
prints
• The sum
• The difference
• The product
• The average
• The distance (absolute value of the difference)
• The maximum (the larger of the two)
• The minimum (the smaller of the two)
Hint: The max and min functions are defined in the algorithm header.
Exercise P2.30. Your boss, Juliet Jones, is getting married and decides to change her
name. Complete the following program so that you can type in the new name for
the boss:
int main()
{
Employee boss(“Jones, Juliet”, 45000.00);
// Your code goes here; leave the code above and below unchanged
cout << "Name: " << boss.get_name() << "n";
cout << "Salary: " << boss.get_salary() << "n";
return 0;
}
The problem is that there is no set_name member function for the Employee class.
Hint: Make a new object of type Employee with the new name and the same salary.
Then assign the new object to boss.
Exercise P3.3. Write a program that reads in three floating-point numbers and prints
the largest of the three inputs. For example:
Please enter three numbers: 4 9 2.5
The largest number is 9.
Exercise P3.16. Write a program that first asks the user to type in today’s exchange
rate between U.S. dollars and Japanese yen, then reads U.S. dollar values and converts
each to Japanese yen. Use 0 as the sentinel value to denote the end of dollar
inputs. Then the program reads a sequence of yen amounts and converts them to
dollars. The second sequence is terminated by the end of the input file.
Exercise P4.2. Write a procedure void sort2(int& a, int& b) that swaps the values
of a and b if a is greater than b and otherwise leaves a and b unchanged. For example,
int u = 2;
int v = 3;
int w = 4;
int x = 1;
sort2(u, v); // u is still 2, v is still 3
sort2(w, x); // w is now 1, x is now 4
Exercise P4.8. Write a function
double get_double(string prompt)
that displays the prompt string, followed by a space, reads a floating-point number
in, and returns it. (In other words, write a console version of cwin.get_double.)
Here is a typical usage:
salary = get_double(“Please enter your salary:”);
perc_raise =
get_double(“What percentage raise would you like?”);
If there is an input error, abort the program by calling exit(1). (You will see in
Chapter 5 how to improve this behavior.)
Exercise P4.15. Consider the following buggy function:
Employee read_employee()
{
cout << "Please enter the name: ";
string name;
getline(cin, name);
cout <> salary;
Employee r(name, salary);
return r;
}
When you call this function once, it works fine. When you call it again in the same
program, it won’t return the second employee record correctly. Write a test harness
that verifies the problem. Then step through the function. Inspect the contents of
the string name and the Employee object r after the second call. What values do you
get?
Exercise P5.1. Implement all member functions of the following class:
class Person
{
public:
Person();
Person(string pname, int page);
void get_name() const;
void get_age() const;
private:
string name;
int age; // 0 if unknown
};
cloud dev
explaining how an organization can develop its own cloud. Include how tools such as OpenStack, VMware, HyperV, etc. can be used in the implementation. Detailed explanation of how to develop an organization’s cloud including the use of related tools. APA formatted including title reference page in-text citations. Length of 2-3 pages, excuding the title and reference . Minimum of 2 scholarly resources.
csss
cs related stuff
Prolog problems
I have two problems that need to be solved. Please help
Fundamentals of Security
As the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval.
Based on your research for Unit 1:
Develop the PCS security program charter for the corporate network and satellite offices.
Clearly state the CISOs vision including elements of a strong security program.
Include information regarding some of the regulations or laws that influence the direction of your security program.
Identify the key roles and responsibilities of the various company stakeholders.
The requirements for your assignment are:
Cloud Computing Risks
All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.
Please Read the following articles on Cloud Security and their Associated Risks:
Zamfiroiu, A., Iancu, B., Boja, C., Georgescu, T., Cartas, C., Popa, M., & Toma, C. (2020). IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data. Proceedings of the … International Conference on Business Excellence, 14(1), 1109–1120. https://doi.org/10.2478/picbe-2020-0104
Maniah, Abdurachman, E., Gaol, F., & Soewito, B. (2019). Survey on Threats and Risks in the Cloud Computing Environment. Procedia Computer Science, 161, 1325–1332. https://doi.org/10.1016/j.procs.2019.11.248
Keshta, I., & Odeh, A. (2020). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal. https://doi.org/10.1016/j.eij.2020.07.003
Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk assessment framework for cloud computing environments. Security & Communication Networks, 7(11), 2114–2124. https://doi-org.ezproxy2.apus.edu/10.1002/sec.923
Using Library EBSCO
Then, discuss why Cloud Security is different from that of traditional network architectures and what you think the future holds for Cloud Security and it’s adoption rate with company’s. What are some technologies and solutions that can be used to reduce risk for the “Cloud” or “Cloud Data”.
Python homework assignment
assignment in files
SOFTWARE -9 dIS
Chapter 10
1. Describe why a project manager needs good verbal and written communication skills.
2. What is meant by the term interpersonal skills? Give some examples of interpersonal skills and explain why they are important.
SE week6 assignment
Assignment:
Discuss different types of cost estimates and methods for preparing them.
350 words apa format and citation