Order # 13501

Title: Programming in C: Getting Started

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Technology

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

This assessment consists of four short programs. Use Code::Blocks to complete your work. You will submit the four C source code files for this assignment. Please zip the files and include your name in the name of the compressed file.

Part 1: Commenting Code

Including comments in source code that explains what the code does and how it does it are an important professional best practice. Code that is well-commented and well-formatted facilitates communication between programmers and others needing to work with the code. Commenting your code needs to be a habit from the beginning. Adding comments to code will also help reinforce important C programming concepts in your own mind.

Type in the code provided in the assignment Resources, build/compile the program, and run it. Typing the code in yourself rather than copying and pasting will help you get to know the C language. When you have the code running, go through the code and add comments to explain what the code does and how it does it. Be sure to add a header like the following to all code files (with your name and the date).

/* Ann Smith – IT-FP2240 – u01a1 – Part 1

* 10/01/2015 Rev. 1

*/

You should add at least five comments to the code provided. Be sure to recompile and test the code after you have added your comments to make sure you have not introduced any syntax errors.

Part 2: About You

Create a program that prints three lines of text about yourself. Be sure to include appropriate spacing and new line characters to make the output in the terminal window readable. As with all programming code, but sure to format the program correctly and include comments and a header for the file, such as shown above.

Part 3: Integer and Floating Point Arithmetic

Write a single program that prints the results of two arithmetic expressions using integers and the results of two floating-point calculations. Print out both the arithmetic expressions and the answers calculated by the code. For this program, it is fine to use “hard-coded” values (the numbers used in the calculations are provided in the code) rather than user input. Be sure to format the code correctly and include relevant comments in the source code (including the comment at the top of the file with your name and identification of the program).

Part 4: User Input

Write a program that prompts the user to enter a character, an integer, and floating point number. After reading the input, the program should print out the values entered. Be sure to format the code correctly and include relevant comments.

When you are ready to turn in your assignment, download your .c source code files and zip them together for submission.

Requirements

Include a title page and reference page, if necessary.

•APA format.

•Times New Roman font, 12 pt.

•Double-spaced.

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Research Paper (operation security)

 

The primary goal of operational  security is to protect & secure the operations of an enterprise,  while securing the technologies needed to maintain network and resource  availability.  Your residency project will include research &  analysis on the below: 

Write a ten to fifteen (10 – 15) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability. 
  2. Research  and discuss how different auditing and monitoring techniques are used  to identify & protect the system against network attacks. 
  3. Explain  the relationship between access control and its impact on CIA  (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue  the need for organizations to implement access controls in relations to  maintaining confidentiality, integrity and availability (e.g., Is it a  risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format.
  • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page and the reference page are NOT included in the required assignment  page length.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

Research and make powerpoint

As you can see from this module’s content, technology can be found everywhere including musics and movies. For example, “Kodachrome” by Paul Simon mentioned “kodachrome” and “Nikon camera”. If you are not familiar with this song, you need to search and listen to “Kodachrome” in order to complete this assignment.

1. Research on what kodachrome is/was and the history of it;

2. Research on the history of cameras; 

3. Create a PowerPoint document to include your research results. (25 points)

4. In the Notes section for each slide, provide a description and interpretation of the information you put on that slide:

You need to present your research results within these notes, as well as, discuss how technology can affect people’s way of communication and affect people’s way of sharing information based on your research. For example, what impact of kodachrome had? Why is it not popular now? What impact of cameras (film and digital cameras) have on people’s life? What other technologies have made or are making impact on people’s communication?

The information on your slides should not be an exact mirror of your notes (and vice versa). 

You may want to review Tips for Making Effective PowerPoint Presentations (Links to an external site.)

(25 points)

css210

Technical Report-

Your report should consist of the following sections.

  1. Cover Page: Include the course title, project title, submission date, and name.
  2. Introduction: State the objective of the case studies, and provide some background information.
  3. Network Design: Summarize the background for Case Study I. Provide a diagram of your network and the class diagram. Describe in detail the research/changes/suggestions.
  4. Security Implementation: Summarize the background for Case Study II.  Discuss the strategies you proposed for securing your network as well as any added to the class network.
  5. Hacking: Summarize the background for Case Study III. Discuss the methods you suggested to test the security strength of your network  (i.e., attempt to hack into your network) as well as any added to the class network.
  6. Results and Discussion: Discuss overall results of the final network and any additional insights and information related to your findings.

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

IT 203 8

 Describe an ethical dilemma related to information technology and business management. Look at it from multiple points of view and tell about your ethical solution. Examples of topics: security and liability, privacy, misuse of personal information, HIPAA law, etc. Submit one and a half to two pages in APA format with references. 

must be on c code

 

A Command-Line Interpreter, or Shell

Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.

  1. Batch Mode

In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.

  1. Interactive Mode

No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.

You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ‘, “, , etc. You may assume that the command-line a user types is no longer than 512 bytes (including the ‘n’), but you should not assume that there is any restriction on the number of arguments to a given command.

main discussion

 Discuss the strengths and weaknesses of using K-Means clustering algorithm to cluster multi class data sets. How do you compare it with a hierarchical clustering technique.