Write a Program to calculate:
1) Kinetic Energy
2) Potential Energy
3) Total Energy
Requirement for this assignment includes the use of at least 3 Programmer Defined Functions, with at least one of the functions using PASS BY REFERENCE Parameters.
Please DO NOT use global variables unless specified.
But can use global constant to store “acceleration due to gravity”.
Formula & Explanation for these three are as follows:
Screen Shot 2020-03-25 at 11.01.03 PM.png
Screen Shot 2020-03-25 at 11.02.51 PM.png
For Kinetic Energy:
Mass is in “kg”
Velocity is in “m/s”
For Potential Energy:
Mass is in “kg”
Height is in “m”
Gravitational Acceleration is going to be considered as constant for the purpose of the program ie 9.81
Sample Output:
1)
Please enter mass in kg, for calculation of Kinetic Energy :2
Please enter velocity in m/s, for calculation of Kinetic Energy :5
Kinetic Energy in Joule is: 25
Please enter mass in kg, for calculation of Potential Energy :5
Please enter height in meters, for calculation of Potential Energy :2
Potential Energy in Joule is: 98.1
Total Energy is :123.1
2)
Please enter mass in kg, for calculation of Kinetic Energy :2
Please enter velocity in m/s, for calculation of Kinetic Energy :2
Kinetic Energy in Joule is: 4
Please enter mass in kg, for calculation of Potential Energy :2
Please enter height in meters, for calculation of Potential Energy :2
Potential Energy is: 39.24
Total Energy in Joule is :43.24
3)
Please enter mass in kg, for calculation of Kinetic Energy :10
Please enter velocity in m/s, for calculation of Kinetic Energy :10
Kinetic Energy in Joule is: 500
Please enter mass in kg, for calculation of Potential Energy :10
Please enter height in meters, for calculation of Potential Energy :10
Potential Energy is: 981
Total Energy in Joule is :1481
Note: Here is a link to understanding the concept of Kinetic Energy & Potential Energy, in case some one wants/needs to look at it.
https://www.mathsisfun.com/physics/energy-potential-kinetic.html
Point Distribution:
-50 Does not compile
-5 Warnings
-5 No description multiple line comments (name, date, etc)
-5 No single line comments (logic, input, output, etc)
-10 Kinetic Energy
-10 Potential Energy
-10 Total Energy
-10 Does not use at least 3 programmer defined functions
-10 Does not use at least 1 reference parameter
Technology
Due is August 22th.
ASSIGNMENT
Instructions
Assignment #2 (100 point, MS Word file only)
Students are required to submit the assignment 2 to your instructor for grading. The assignments are on the assigned materials/textbook topics associated with the course modules. Please read the following instruction and complete it to post on schedule.
Attention: This assignment does NOT require co-working. Please MUST follow the school Academic Honesty Policy.
1. What are the core processes in the SDLC used in this book, and what traditional predictive SDLC phase corresponds to each process? What are the 12 Agile modeling principles? by Agile Development and iterative development?
2. Explain how a Scrum sprint works.
3. List 10 types of benefits that may be considered when approving a project.
4. List four different types of major risks that may cause problems for a project. What is the purpose of a project dashboard?
5. What are a) persistent classes, b) entity classes, c) boundary classes, d) controller classes, and e) data access classes?
6. What is a method signature? What information is maintained on CRC cards?
7. What are the five components of a standard design pattern definition? What are the benefits of knowing and using design patterns?
8. Explain the two methods of accessing the database to create new objects in memory. List the major implementation responsibilities of each layer in a three-layer design.
9. List and briefly describe each activity of the SDLC core processes Build, test, and integrate system components and Complete system tests and deploy solution.
10. How do user documentation and training activities differ between end users and system operators?
Grading Rubric for the Assignment #2:
- Delivery: Delivered the assignments on time, and in correct format: 25 percent
- Completion: Providing a thoroughly develop the document including descriptions of all questions: 25 percent
- Understanding: Demonstrating a clear understanding of purpose and writing a central idea with mostly relevant facts, details, and/or explanation: 25 percent
- Organization: Paper is well organized based on the APA format, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent
Paper
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:
· Computer and email acceptable use policy
· Internet acceptable use policy
The plan should reflect the business model and corporate culture of a specific organization that you select.
Include at least 3 scholarly references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.
• approximately 2-4 pages in length, not including the required cover page and reference page.
Assignment
please provide a brief explanation of how the position(Information technology/software engineer) for which you are applying directly relates to your program of study(below is list of courses involved).
Security measures for good database
Considering the importance of data in an organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.
Your paper should meet the following requirements:
- Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
data structures and algorithm
In this programming assignment you are asked to expand the SortedArrayList data structure we
have developed in class by adding the following new methods:
void IncrementItems(T aValue)
– Function: Increments all lists’ values by aValue.
– Precondition: List has been initialized
aValue has been initialized
– Postcondition: Function value = elements of the list have their info incremented
by a Value.
int CountEven()
– Function: Returns the number of elements that appears an even number of
times the list.
– Precondition: List has been initialized
– Postcondition: Function value = number of even integers in the list.
void ReverseOrder ( )
– Function: Reverses the order of the list’s elements.
– Precondition: List has been initialized.
– Postcondition: Function value = elements changed to descending order, if
elements are in ascending order, and vice-vers
Wireless Security & Forensics
In this weekly discussion, you will discuss the use of a tool for manual examination of a phone:
- Select one of the tools mentioned in the text and describe the tools functionality and process used in an examination of a device.
- Using the Internet, research the web for an article related to the tool and answer the following questions:
- What are some of the advantages or disadvantages of the tool?
- Discuss the tools setup
- Appraise the value of the tool in gathering evidence for prosecution
Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.
Week 10
explain the importance of crime analysis in reference to secure architectural design.
Remember to cite at least one scholarly peer-reviewed article.
All citations should be in APA format.
music retrieval techniques assignment 5
Use the template for the assignment. I will send more files and example code from class that will make the assignment easier. The assignment uses python 3 and jupyter notebooks as the IDE. There are a bunch of class notes and code examples