Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.
Microsoft access Project
Comp 131 Project
Download file, read carefully and then text me
C++ coding lab task
Write a Program to calculate:
1) Kinetic Energy
2) Potential Energy
3) Total Energy
Requirement for this assignment includes the use of at least 3 Programmer Defined Functions, with at least one of the functions using PASS BY REFERENCE Parameters.
Please DO NOT use global variables unless specified.
But can use global constant to store “acceleration due to gravity”.
Formula & Explanation for these three are as follows:
Screen Shot 2020-03-25 at 11.01.03 PM.png
Screen Shot 2020-03-25 at 11.02.51 PM.png
For Kinetic Energy:
Mass is in “kg”
Velocity is in “m/s”
For Potential Energy:
Mass is in “kg”
Height is in “m”
Gravitational Acceleration is going to be considered as constant for the purpose of the program ie 9.81
Sample Output:
1)
Please enter mass in kg, for calculation of Kinetic Energy :2
Please enter velocity in m/s, for calculation of Kinetic Energy :5
Kinetic Energy in Joule is: 25
Please enter mass in kg, for calculation of Potential Energy :5
Please enter height in meters, for calculation of Potential Energy :2
Potential Energy in Joule is: 98.1
Total Energy is :123.1
2)
Please enter mass in kg, for calculation of Kinetic Energy :2
Please enter velocity in m/s, for calculation of Kinetic Energy :2
Kinetic Energy in Joule is: 4
Please enter mass in kg, for calculation of Potential Energy :2
Please enter height in meters, for calculation of Potential Energy :2
Potential Energy is: 39.24
Total Energy in Joule is :43.24
3)
Please enter mass in kg, for calculation of Kinetic Energy :10
Please enter velocity in m/s, for calculation of Kinetic Energy :10
Kinetic Energy in Joule is: 500
Please enter mass in kg, for calculation of Potential Energy :10
Please enter height in meters, for calculation of Potential Energy :10
Potential Energy is: 981
Total Energy in Joule is :1481
Note: Here is a link to understanding the concept of Kinetic Energy & Potential Energy, in case some one wants/needs to look at it.
https://www.mathsisfun.com/physics/energy-potential-kinetic.html
Point Distribution:
-50 Does not compile
-5 Warnings
-5 No description multiple line comments (name, date, etc)
-5 No single line comments (logic, input, output, etc)
-10 Kinetic Energy
-10 Potential Energy
-10 Total Energy
-10 Does not use at least 3 programmer defined functions
-10 Does not use at least 1 reference parameter
Need Response to below discussion
Please read the below discussion posts and provide two responses in 50 to 75 words
Post#1
DNS Failover is designed to operate at the DNS level. That is, the level before a client connects to any of your servers. DNS essentially converts your domain name (e.g.www.example.com) into the IP address of your server. By monitoring applications and altering DNS dynamically so clients are pointed to different IP addresses, you can control traffic fairly easily and expensively. However, DNS failover does have two notable limitations: a) DNS Failover does not fix an outage when a client is already connected to an application. This is because their browser may not query DNS again for quite some time. b) DNS Failover has a TTL cache issue that could take anywhere from 1 to 30 minutes or more for the IP address change to be visible around the world. This is since many ISP’s recursive DNS servers cache longer than required to reduce traffic. “Time is an important component of the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS caches rely on an absolute notion of time (e.g., “August 8, 2018 at 11:59pm”) to determine how long DNS records can be cached (i.e., their Time To Live (TTL)) and to determine the validity interval of DNSSEC signatures. This is especially interesting for two reasons” (Malhotra, 2019).
DNS Failover has been around for quite some time and is reliable. As a result, the sequential mode is the most popular for e-commerce applications or where back-end databases exist and some type of synchronization step is required before falling back to the primary. The cloud network monitors all of the available servers based on the monitoring criteria you specify via the management GUI and when it detects the primary down, it automatically fails over to the secondary IP (or if the secondary is down, fails over to the tertiary, etc.). In a typical static content scenario, when the primary comes back, it updates DNS again to send traffic to the primary. However, in an application where back-end databases must be synchronized, you can easily disable auto-failback to prevent the primary server from receiving traffic again. “A passive redundancy approach with diversification has been applied to intrusion-tolerant systems (ITSs) that aim to tolerate cyberattacks on a server” (Okamoto, 2017).
The monitoring system will still alert you that it is back online, but you have to manually force it to start receiving traffic again. This allows you to perform whatever tasks are required to ensure that the primary has the latest copy of the database or whatever is required. One critical drawback to using DNS failover in a situation where back-end synchronization is critical is when the primary is only down for a very short period. The short period would be sufficient to trigger a failover, but insufficient so that existing client connections (or new connections where the TTL cache has not expired) permit some clients to still hit the primary site. In this case, both the primary and secondary sites could receive traffic and create completely different databases that are very difficult to synchronize. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Reguero Naredo, 2017).
Post#2
Cloud computing efficiency and security depends on several security concerns related to networks and connectivity. Protecting information system in cloud environment, from threats can be done largely by maintaining secure data traffic. The concepts of Domain Name System failover and Cloud failover come in this context of data traffic security. These two are most popular approaches in cloud security and share some similarities and dissimilarities between each other.
Comparison
Functionality of DNS and cloud failover depends on the authentication of IP addresses largely. Both the preventive measures in cloud service security find out necessary action to recover from failures such as downtime recovery. Both the solutions need open access to public cloud in order to become active. The monitoring mechanism used in both the systems are almost equal and works in the same way for identification of servers and detection of faults (Naredo & Pardavila, 2017). DNS and Cloud failover are equally capable of delivering fast recovery as soon as within 60 seconds and can change functions automatically based on the requirement scenario.
The differences in cloud and DNS failover starts with the process through which these functions run. DNS finds easiest solution in re-routing of traffic in cases where a particular server fails, and it makes the traffic run through other active servers. A system embedded in the process helps in detecting the active server through a technique known as ‘round-robin’ method. A fault in DNS failover is that it contains the cached data which keeps revolving till one user’s Time to Live (TTL) in the server. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Naredo & Pardavila, 2017).
Cloud failover is popular for its accuracy and precision of carrying out the task necessary for sustained uptime. It does not send cached data back frequently. Sessions cared by cloud have better utilization capacities as it allows remote deployment unlike DNS failover where critical applications of a server are interrupted. To sustain through the TTLs, cloud failover uses session-wise load-balancing that proves to be more efficient than round-robin of DNS. Further, DNS failover fails to offer the flexibility due to the pre-determined conditioning that makes it a rigit system. Cloud, however, includes the DNS often for offering optimized result via a permanent proxy IP address. “DNS, being open-source, is less secure and it has no uncommon method for deciding if data has been intercepted while transmission or information of a domain name originates from an approved domain owner or not” (Ansari et. Al., 2020).
Conclusion
As a result of limitations, cloud failover service is costlier than DNS. There are steady improvements identifiable in DNS in global network. Some of the services are also allowing cache-free recovery of server. In spite of the advancements, it is yet to compete equally with cloud failover. On the other hand, cloud has its challenges too. “In spite of Cloud Computing services seem to be very attractive as an alternative to traditional on-premise data centers, there is still some concern about the providers availability” (Goncalves & Fagotto, 2018).
CPSC 355 Assignment 3
Due Oct 30th
Information technology 1010…….2
We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.
WK12
Prepare a 4 page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?
Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.
Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.
country Presentation to the Board of Directors
Assignment Content
- Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand.
Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”
Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.
Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.
Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.
Submit your assignment.
empowering leadership and effective collaboration
This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:
- How do geographically dispersed teams collaborate effectively?
- Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool.
- Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Week 2 Technology Discussion
Please provide constructive responses to these two discussion posts (3-4 sentences minimum)
1. One of the advance features I have learned using Microsoft word is the insert feature. Being able to place all sorts of symbols, pictures, graphs to a word document helps make it stand out more. For example, if I were to write a document that talks about graphs and data, I can insert a chart to properly displays the numbers I want to present over just regular text. To do so, you must click on the Insert ribbon right next to Home, under the Illustrations tab, you will see the Chart option. Another window will open showing you the many different types of charts and graphs that you can use to present your data. After selecting the chart you want to use, the image will be inserted into the document along with another window that reads Chart in Microsoft Windows. It is a spreadsheet that you can use to enter the data you would like your chart to display.
2. An advanced feature that I learned in Microsoft Word was to insert a picture. This may not be advanced to others but was a feature I had to play with to insert correctly. To perform this task you would open Microsoft word and open a blank document. Once the document is opened use the tab on top that states insert, once you tap insert you have options to use picture on device or online pictures. I chose online pictures which provides more options. To use the online search you can type whatever your looking for in search engine. Once you select the picture you want to use on your document click picture and below will provide option to insert. After tapping insert picture will drop onto document. The picture on document will then need to be positioned by clicking on picture and dropping on document where desired. Once picture is positioned use arrow keys to adjust size of picture as desired. I find this a great feature and think an added illustration always enhances a document of any kind.