Structure and Making Decisions

 In this assignment, you will continue your research into different programming paradigms through the evaluation of Structured, Procedural, Functional, and Object_Oriented paradigms. You will be analyzing sequence, selection, and loop, the relational comparison operators, precedence when combining AND and OR operators, and the case structure.  Instructions: Part 1: Research – Programming Paradigms In Unit 1, you researched early programming languages and object-oriented programming(OOP). For this portion of the assignment, research the three programming paradigms listed below. Describe each paradigm and how each differs from OOP. Explain which paradigm you believe to be the best for most programs. • Structured Programming • Procedural Programming • Functional Programming Part 2: Programs – Using Decision Logic Structures: 1. Design a program that asks the user to enter the length and width of two rectangles, Rectangle A and Rectangle B. Calculate the area of the two rectangles and display to the user if Rectangle A has a larger area, or if Rectangle B has the larger area, or if the two areas are equal.  2. The Acme company would like a program that they can use to quickly screen applicants’ qualifications for a job in their anvil factory. A potential employee must have a score of at least 85 on their anvil aptitude test and have a college degree in anvil engineering or have previous anvil factory experience. The CIS216 – Programming Principles Structure and Making Decisions program should enter the aptitude test score, a “Y” or “N” for the college degree, and a “Y” or “N” for previous experience. The program should then display if the applicant should be accepted or rejected based on their qualifications. Note: this program should use logic operators (AND, OR, NOT) as required to create a single conditional statement  3. Write a program that accepts a student’s numerical grade and returns the corresponding letter grade. If a grade less than zero or greater than 100 is entered, the program should display an error message. The program should also use a module to determine the appropriate grade. Letter grades are determined as follows: 0 – 59 F 60 – 69 D 70 – 79 C 80 – 89 B 90 – 100 A 4. Write a program that simulates a vending machine. The price of items in the vending range from $0.05 to $0.95. The vending machine only accepts $1.00 bills. Write a program that accepts the price of an item and calculates the correct change using the least amount of quarters, dimes, nickels, and pennies. If a price is entered that is less than $0.05 or greater than $0.95 should display an error message and the amount of change should not be calculated. 5. Write a program that asks a user to enter two numbers and one of the following letters: A, S, M, or D. If the letter A is entered, the program should add the two numbers. If an S is entered, the program should subtract the two numbers. If an M is entered, the program should multiply the two numbers. If a D is entered, the program should divide the two numbers. The program should then display the results. If the user enters any letter besides A, S, M, or D, the program should display an invalid option error message. If the user enters D and a zero for the second number, the program should display a cannot divide by zero error message. The program should use the case structure to determine the correct action to be taken given the user’s input.  

HW: Are Your Articles Research Articles?

Assignment Content

  1. In class today, you were asked to find research articles that explore your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval of a research question: Research Question Proposals.)

    For this assignment, follow directions CAREFULLY: 
    Step 1: download the document below which is your Finals Packet:

Step 2: Complete p. 13a, PHASE 1 ONLY

Step 3: Then, copy and paste the entire activity into a Word document and upload it here to be graded and approved. 

***If you need help finding research articles, 

visit the virtual library using the link in the Content page***

For each database you use, submit a screenshot or photo of your parameters (full text, research journals, timeline not over 10 years). This will help your professor troubleshoot any problems you may have had, and it will allow your professor to provide suggestions. 

  1. Grading is as follows:

    Article 1 (Basic Research Article): 25pts

    • HOW = Name the methodology AND cut and paste AND highlight indicator words 
    • WHAT = Findings 
    • Article 2 (Basic Research Article): 25pts
    • HOW = Name the methodology AND cut and paste AND highlight indicator words 
    • WHAT = Findings 
    • Article 3 (Basic OR Applied Research Article): 25pts
    • HOW = Name the methodology AND cut and paste AND highlight indicator words 
    • WHAT = Findings 
    • Article 4 (Applied Research Article): 25pts
    • HOW = Name the methodology AND cut and paste AND highlight indicator words 
    • WHAT = Findings 

Data Collection Technique

Background: As noted by Kirk (2019),  working with data, is one of the four stages of the visualization workflow.  According to Kirk (2019), “A dataset is a collection of data values upon which a visualization is based.” In this course, we will be using datasets that have already been collected for us – some cleaning has been done also. Data can be collected by various collection techniques. 

Reference: Kirk, Andy. Data Visualization: A Handbook for Data Driven Design (pp. 95 -117). SAGE Publications. 

Your Assignment:

Write and submit a paper that summarizes 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why?

Your paper should be at least 2 pages (800 words), double-spaced, have at least 2 different APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. This is an  individual assignment which must be accomplished by you alone. Please post your paper to iLearn NLT 6/11 – 10pm EST. 

When you are ready to post, click the Res Wknd Data Collection Technique assignment link, then Either click the “Write Submission” link below and directly paste your document into this assignment box OR Browse your Computer and add the entire Microsoft Word document as an attachment (Mac users, please remember to append the “.docx” extension to the filename).

Information Technology Act, 2000

 

Instructions

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 5-8 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 8.
  4. In addition to the 5-8 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  10. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

110s2

Using Appendix M in your textbook on page 275. Develop an interconnection agreement based on utilizing your home computer system as your home business system. The movement, protection, and reliability of your interconnection is important to your business so provide sufficient depth and scope of your interconnection agreement to ensure your business is protected and remains available. Develop a drawing/network topology of your home network that includes computers, switches, routers, Internet Service Provider, and any security or firewall protection. 

How can I disable Router Firewall?

 

To find out how to disable router firewall, you must know the steps that you are supposed to follow. First of all, you should log in to your router settings; then, you should search through your router menus or settings for phrases such as firewall, filter, or packet check. Now the terms and locations will change, and then you must choose the appropriate option to disable the firewall settings and then save and apply to change the settings.

Read more: configure netgear router as access point

Wk 4 Discussion – Indicators of Compromise

 

 Respond to the following in a minimum of 175 words: 

An important part of managing security in connections and communications between a secured network and the Internet at-large is to have a benchmark for what normal traffic looks like. Many applications exist for the purpose of monitoring, probing, or scanning traffic-related events to catch irregularities that can inform a deeper investigation. 

  • What types of irregularities could signal a potential security event or incident? Describe at least 2 types of indicators.
  • Which tools would you recommend to track these indicators, and how would you respond to these occurrences on your network? How would you determine if these indicators signaled a real threat?

HR & Blockchain

1. How might blockchain technology impact job repositories? 

500-word document

Introduction, Question 1, Conclusion, References.

References

1. Gromov, A. Y., Petrovskaia, T. A., Suslina, A. A., & Khizriyeva, N. I. (2018, June). Human resources intelligent selection algorithm with improvement of data validity. 7th Mediterranean Conference on Embedded Computing.

2. Chowdhury, S., Colman, A., Kabir, M. A., & Han, J. (2018). Blockchain for fraud prevention: A work-history fraud prevention system. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 1858-1863.