Problem 4- Project Process

Activity I: Give an example of an organization with an ineffective or cumbersome structure. Explain the problems with the current structure and how these problems could be solved.

Activity II: Prepare a risk management plan for the project of finding a job after graduation.

Text-

Title: Project Management ISBN: 9780134478661 Authors: SHTUB Publisher: Pearson Edition: 3RD 17

PaySum

  

using the file layouts below, write a class called PaySum (you should already have this from assignment 7). Then write a class called Earnings that extends the PaySum class. Instance fields are to be declared as private. Provide get and set methods for each field and an overridden method for the display data method. Include a constructor method for the Earnings class that initializes the check date to the assignment due data and check number to 102375. 

Hearsay rule assignment

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Python

 

EMBL (European Molecular Biology Laboratory) and EBI (European Bioinformatics Institute) are basically the equivalent of NCBI here in the US. They hold the same data but store the data in a different format. Your task is to parse out an EMBL record (see file attached) just like we did for GenBank records in the discussions. 

EMBL’s records are actually easier to parse out! Just parse out the sequence ID (line starts with ID), description (DE) and sequence (SQ). Use at least one function. 

Create a function that accepts

  

Exercise 1:
Create a function that accepts a single array as an argument. Given an array of integers, x, sort x and split the integers into three smaller arrays of equal length. If the length of x is not evenly divisible by three, increase the size of the smaller arrays by one starting from the first array. The function should return an array of arrays. Example: Input = [2,1,3,4,7,5,9,6,8,13,12,11,10,0,15,16,14] Output = [ [0, 1, 2, 3, 4, 5], [6, 7, 8, 9, 10, 11], [12, 13, 14, 15, 16] ]Exercise 2:
Write a function that find the frequency occurrence of a letter in a sentence. The function should return an integer. (Do not use the str.count() default python function) Examples: find_frequency(“t”, “this is a test”) → 3 find_frequency(“y”, “this is a test”) → 0Exercise 3:
Write a function that identifies if an integer is a power of 2. The function should return a boolean. Explain why your function will work for any integer inputs that it receives. Examples: is_power_two(6) → false is_power_two(16) → true

CYBERLAWS & ETHICAL HACKING PROJECT

Scenario  It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.  The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.  Tasks  You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis: 

    Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)

    Common Vulnerabilities and Exposure (CVE) database search
(http://cve.mitre.org/find/index.html)

    Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:

What threats are new this year, and which have become more prevalent?

Why are these threats more common and why are they important?

What threats remain constant from year to year? Why?

What threats do you believe will become more critical in the next 12 months? Why?

What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s)does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write a binary search tree class. Fo

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write

 Lab Goal : 

 

Java – Binary Tree. Will leave an upvote.

Lab Goal : This lab was designed to teach you more about Binary Trees. Lab Description : Write a binary search tree class. Fo

This lab was designed to teach you more about Binary Trees.  Lab Description : Write a binary search tree class. For the base lab,  you must write the following methods :: preOrder, postOrder, inOrder,  revOrder, getNumLeaves, getNumLevels, getWidth, getHeight, getNum Nodes,  toString, is Full. The following method groups are extra credit. Each  group will net you an extra ten points on your base 100 point lab grade.  You can complete any or all of the options in any order you prefer.  Complete as many of these options as you can. Group 1 :: write a method  to search the tree for a value and return true or false Group 2 :: write  getLargest and getSmallest methods to return the smallest and largest  tree values Group 3 :: write a level order traversal using the Java  LinkedList as a Queue Group 4 :: write a method to remove a node from  the tree – must be recursive Group 5 :: write a method to display the  tree like a tree-level order traversal might be useful Sample Output :  IN ORDER 70 80 85 90 98 100 120 ROOT 90 80 100 70 85 98 120 PRE ORDER 90  80 70 85 100 98 120 POST ORDER 70 85 80 98 120 100 90 height = 2 width =  5 numLevels = 3 numLeaves = 4 numNodes = 7 isFullTree = true REVERSE  ORDER 120 100 98 90 85 80 70 Tree height is 2 Tree width is 5 Number of  leaves is 4 Number of nodes is 7 Number of levels is 3 Tree as a string  70 80 85 90 98 The tree is full. 100 120 © A+ Computer Science –Binary  Trees – www.apluscompsci.com BONUS SECTION The tree contains 100! The  does not contain 114! The smallest tree node 70 The largest tree node  120 Tree before removing any nodes – using level order traversal. 90 80  100 70 85 98 120 Tree after removing 90. 98 80 100 70 85 120 Tree after  removing 70. 98 80 100 85 120 Tree after removing 85. 98 80 100 120 Tree  after removing 98. 100 80 120 Tree after removing 80. 100 120 Tree  after removing 120. 100 Tree after removing 100.  

MS Tables, Images, & Tools Duscussion

 tables, images, research tools, mail merges, and much more. Tell us how these features can help you collaborate and work with others? What feature surprised you the most? Do you think you can do better research documents after this week? Why are tools such as spelling and translation so important specially in the United States? Add a PowerPoint and a word document