Consider that a school “ABC” hired you as a programmer to maintain the record of its Students

 Consider that a school “ABC” hired you as a programmer to maintain the  record of its Students and Teachers. You need to develop a system in C++  to enter the data and show it as and when required. Keeping in the view above scenario, you are required to write a C++  program that can display the information of any specific Teacher or the  Student. It will contain following three classes:  1. Person 2. Teacher 3. Student 4. where a Person should be the base class and Teacher and Student  should be its derived classes.  You are required to use the concept of Polymorphism to generate the  sample output. Consider following class table for above scenario.     Class Data Members Member Functions Person • Name • Age • Gender  • Address  • Phone • Default Constructor • Setter and getter functions for all the data member.  • A function to save information of a person  • A function to display information of a person Teacher • Qualification • Salary • Default Constructor • Setter and getter functions for all the data members • A function to save information of a Teacher • A function to display information of a Teacher. Student • Previous Education • Obtained marks • Total Marks • Default Constructor • Setter and getter functions for all the data members • A function to save information of a Student. • A function to display information of a Student.   Solution Guidelines:  Create three classes: Person as a base class and Teacher and Student  as derived classes.  You have to create the default constructor for each class.  You have to create the setter and getter functions for each attribute  of Person class.  You have to create Save_Information function for each class as  mentioned in the table.  You have to create Display_Information function for each class as  mentioned in the table.  You have to use concept of Polymorphism to generate the sample output.  Sample Output:  

3 topics

Assignment Content

  1. In class, we learned how to write the introduction and conclusion of the Literature Review section, which includes:
    • Introduction (6 sentences on p. 10a)
    • Review of Literature (using notes on p. 13a – ONE objective summary is graded already — apply feedback)
    • Analysis of Literature (compare and contrast activity on p. 16a)
    • For this submission: You will submit your full draft of the Literature Review in a WORD document.
    •  YOU MUST CHECK YOUR SIMILARITY prior to submission here. 
    • Grading: 
    • Title Page = 10 pts
    • Literature Review: Intro, Review of Literature, and Analysis of Literature WITH in-text citations and correct level headings:
    • Introduction = 15 pts
    • Review of Literature = 40 pts
    • Analysis of Literature = 20 pts
    • References page with ALL four research articles listed = 15 pts

Data types

Respond to the discussions below with 150 words or more.

 Abstract data types (ADTs) exist only conceptually, and do not have any  concrete existence in a language. Their purpose is to define behavior  and state management (Abstract data type, 2021). Queues are an example  of an ADT. General purpose data structures are a class level  implementation of the abstract data type that is a collection of data  values, their relationships, and the operations that can be applied to  said data (Data structure, 2021). These do exist in the form of code.  Data types are a concrete instance of a class in the form of defined  class objects. To put this into simpler terms, it is an attribute of  data which tells the computer how the data is intended to be used (Data  type, 2021). An integer is an example of a common data type. Each one of  these terms is defined differently, but they all work together.  Abstract data types define operations, general purpose data structures  implement said operations, and data types classify data by values and  operations. If a data type cannot specify any sort of concrete  implementation, then it is an abstract data type. Data structures are an  efficient way to store said data. Examples of data structures include  Linked Lists. Let’s take a closer look at the ADT and data structure  examples: queues and linked lists. A queue is an interface, which means  that it needs a concrete class for declaration (GeeksforGeeks, 2020).  This is what makes a queue an abstract data type. One of the most common  classes that queues use to declare data is a linked list. A linked list  is the implementation of a linear data structure where the elements are  linked using pointers and addresses (GeeksforGeeks, 2021). Queues do  not have concrete implementation and linked lists do. So, while a Linked  List can act as the physical implementation of a queue, a queue must  rely on a data structure for implementation. The distinction may seem  subtle at first, but the difference is important. 

Exp19_PowerPoint_Ch03_Cap_Bryce_Adventure_Camp

  

Exp19_PowerPoint_Ch03_Cap_Bryce_Adventure_Camp

  

Project Description:

Bryce Adventure Camp is a successful outdoor retreat dedicated to the appreciation of the splendor and inspiration of nature for good health. The operation has been so successful in its two years of operation that the owners opened retreats in two additional locations. They now want to open another retreat so even more people can enjoy the exhilaration of nature in magnificent settings. They are meeting with officers of a venture capital corporation, that offers funding for unique opportunities. The representatives have asked for an overview of Bryce Adventure Camp’s philosophy, services and activities, sales for this year and last year, a year-to-year comparison, and charts showing the increase. The owners of Bryce Adventure Camp asked you for help in preparing the presentation for the meeting.

discussion

 There are a lot of resources that will be helpful when it comes to CSS and JavaScript. Share at least 2 of those resources here and include the URL as well as a short review of what it has that you found you could reference in this work. 

Machine Learning Model Training 2.

  

Assignment 3: Machine Learning Model Training 2 

• Two multi-part, multiple-choice questions.

•  AI in Healthcare with Phase 2 data set (HTML file)

• Details of the Q1 & Q2 m/c questions are shown in the attached question files.

• Lecture notes on Machine Learning in Healthcare for your reference

BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY

TOPIC: Networks, Privacy, and Security Presentation

Assessment Description

The purpose of this assignment is to explore legal and ethical issues related to networks, privacy, and security, as well as to research specific types of privacy and security threats and the measures that employee users should take to maintain privacy and security within an organization.

Assume you are part of the IT security team in your organization. Research one common employee IT privacy and security issues and ways that employee users can protect themselves and the business from privacy and security breaches and risks. Some common risks to business include:

  • Lack of password management
  • Electronic storage and transfer of information
  • Privilege abuse by employees
  • Use of unapproved hardware and software
  • Data mishandling
  • Equipment misuse (including hardware and systems)
  • Knowledge misuse
  • Unapproved workarounds
  • Securing company data and information on personal employee devices (e.g., cell phones, tablets)
  • Collaboration with third-party service providers
  • Social engineering
  • Phishing attacks

Summarize your research findings and educate employees about the identified IT privacy and security issues.

Create a PowerPoint presentation with a minimum of six slides that addresses the following:

  1. Define the employee privacy/security issue and explain why it could be a risk for an      organization.
  2. Provide a specific workplace scenario to illustrate the employee privacy/security issue.
  3. Discuss the legal and ethical implications the privacy/security issue presents for the employee, the company, and the customer.
  4. Describe the negative impact the employee privacy/security issue could present to the organization in terms of its overall effect on accounting, finance, marketing, management, economics, and general business operations.
  5. Discuss the ways that employee users can protect themselves and the business from these types of privacy and security breaches and risks.
  6. Discuss specific policies, strategies, and techniques that could be employed by the      organization and the employee to minimize the identified employee privacy/security issue.
  7. Discuss how to educate employees about the identified IT privacy and security risks.
  8. Include speaker notes at the bottom of each slide.

Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.

You are required to submit this assignment to LopesWrite to check for Plagiarism .