Which of the following best describes what the private scope means

  

1. Which of the following best describes what the private scope means:

a. Private class members are private withn the scope of that file.

b. Each object’s private data is directly inaccessible to other objects.

c. Each object’s private data is directly inaccessible to other objects of a different type. But is accessible to other objects of the same time.

d. Private data is stored safely on the heap, where no other programs or users can access it.

3. How many bytes of memory are allocated for the following two dimensional array:

4. What is the maximum value of an unsigned char?

5. What will int x = 5/8 * 8 + 16 evaluate to?

a. 21

b. 15

c. 16

d. 0

2. How many times will the statement “here” print to the screen?

Se492 week 6 D

 

Type your discussion in a Word document (No less than 200 words), and submit  for similarity verification. Please DO NOT REPEAT THE DISCUSSION TOPIC, only type your answer to the discussion topic. You can revise and resubmit your word document as many times as you wish until % of similarity is 30% Or less. (Preferably 0%.)

Then if % of similarity is 30% or less, Copy and Paste your discussion on Discussion 1: (Required posting)

Note: Please submit only MS Word, other file types are not acceptable.

YOUR INITIAL DISCUSSION   Due:No later than Friday of this week. 100 words or more (80 Points).

Discussions posted on Sunday will receive a reduction of 20 points.

Discussions posted after Sunday of this week  WILL RECEIVE POINT DEDUCTIONS FOR EVERY WEEK OF BEING LATE.

PEER REPLY/COMMENT   Due: No later than Friday or Saturday of this week (50 words or more), Provide comments to other class member. (20 points ). 

Please take a few minutes and check the discussion board on Saturday Or Sunday to respond to peer OR my comments/queries,

Peer replies posted after Sunday of this week WILL NOT BE GRADED.

Thank you for your timely participation.

Discussion Topic

Read chapter 6. Answer the following question.

1.  Go through pages 234-241 of the textbook to complete the Resource on your Consumer Market Study project you started earlier. Show screenshots of your work and discuss what you learn. 

Create a presentation

  

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course:

  • Devil’s Canyon      (Wks 4–5)

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

  • Potential Risk      to be Reviewed: Describe the risk. (10pts)
    • Example:       Viruses and malware can negatively impact the confidentiality, integrity,       and availability of organizational data.
  • Regulation and      Compliance Issues: Analyze how regulations and compliance issues could      impact the organization. (10pts)
    • Provide a       detailed analysis of regulations and compliance issues, beyond the simple       explanation in score point two.
  • Regulation and      Compliance Resources and Tools: Analyze what resources and/or tools are      available to address regulations and compliance issues. (10pts) 
  • Describe the      control objective and the specific controls you will evaluate to determine      potential risk is mitigated. Please note that typically, there will be more      than one control that should be reviewed for a potential risk. (10pts)
    • Example:       Determine whether anti-virus software is in use.
    • Example:       Determine whether virus signatures are periodically updated.
    • Example:       Determine whether periodic virus scans are performed.
  • Provide a      detailed analysis of the resources and/or tools available, beyond the      simple explanation in score point two. (10pts)
  • IT Security –      Processes and Methods: Differentiate between the various processes      and methods involved in management of IT security resources.
    • Review the       various options available to address those processes and methods       previously explained, and which ones might be feasible. (10pts)
  • IT Security –      Measures: Analyze the various security measures that could be taken within      the organization. (15pts)
    • Demonstrate a       detailed understanding of what the alternatives are to approach security,       how much security is needed, different methods to employ, etc.
    • Describe the       criteria/measures that you will use to evaluate the adequacy of each       area/review step that you review (i.e., what criteria will you use to       perform your evaluation/how will you determine that the risk has been       mitigated to an acceptable level).
    • Example: 100%       of servers and PCs have virus software installed.
    • Example: 100%       of the virus software installed is set to automatically update, including       virus signatures.
    • Example: 100%       of the virus software installed is set to automatically perform a scan at       least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. (10pts)

Note: The title page and reference page do not count toward the assignment – power point and summary – length requirements.

Information Security and Risk Management – Practical Connection

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Information Security and Risk Management have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Program to demonstrate function

  

/* Program to demonstrate function.*/

 Write a program which has two functions, the main function and the input function.

The input function asks the user to enter an integer from 0 to 100, inclusive.

In the input function: 

• If the user enters a number that is out of the required range, the number is XXXXX returned to the main function; instead it prints an error message and then loops to ask the user to enter a correct number. 

•If the user enters a number in the required range, the number is XXXXX to the main function.

•If the user enters End Of File, the input function returns -1 to the main function.

• When the main function receives -1 from the input function, it prints a completion message and the program ends. 

• When the main function receives any other number, the main function prints it, and calls the input function again. 

•The input function does NOT print the numbers; they are only printed in the main function.

•Except for the -1, the main function prints all numbers returned to it from the input function.

Hints:You might use a do…while loop in the main function, that runs as long as -1 is not returned. You might use a do…while loop in the input function, that loops as long as the user enters a number that is out of the required range. Make sure your program does not confuse the datum -1 with EOF, which is also -1Only code one return from each function.

Test data: use each of the following values: 100 101 20 -5 0 9 -1 18 

The main function should print 100 20 0 9 18 and a run completed message.

IT473: Interactive Computer Graphics

Weekly Assignment/Discussions via Unicheck:

Question 1: [See module video]

a. Calculate the reflection of the image below about the x-axis.

b. Graph the positions of the image in its original and reflected locations

Question 2:

a. Calculate the reflection of the image below anticlockwise about a 45o line.

b. Graph the positions of the image in its original and reflected locations.

Question 3: RESEARCH

a. Calculate the rotation of the image below 90o .

b. Graph the positions of the image in its original and rotated locations.