p5

 You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P5-Last Name-First Nam.zip. For example, P5-Smith-John.zip.

  • A Word document containing the algorithms and the screenshots of the running programs for all of the five problems. Please name your Word document as P5-Last Name-First Name.docx or .doc. For example, P5-Smith-John.docx.

Consider the following problems, design the algorithms that would solve them, and then implement the algorithm in Java.

Problem 1:

Write a program that reads a set of floating-point values. Ask the user to enter the values, then print:

  • The average of the values
  • The smallest of the values
  • The largest of the values
  • The range, that is the difference between the smallest and the largest

Of course, you may only prompt for the values once.

Problem 2:

Write a program that reads a word and prints each character of the word on a separate line. For example, if the user provides the input “Harry”, the program prints:

H
a
r
r
y

Problem 3:

The Fibonacci numbers are defined by the sequence:

f1 = 1
f2 = 1
fn = fn-1 + fn-2.

Reformulate that as

Fold1 = 1;
Fold2=1;
Fnew=fold1+fold2;

After that, discard fold2, which is no longer needed, and set fold2 to fold1, and fold1 to fnew. Repeat an appropriate number of times.

Implement a program that prompts the user for an integer n and prints the nth Fibonacci number, using the above algorithm.

Problem 4:

Write a program that prints a multiplication table, like this:
1 2 3 4 5 6 7 8 9 10
2 4 6 8 10 12 14 16 18 20
3 6 9 12 15 18 21 24 27 30

10 20 30 40 50 60 70 80 90 100

Problem 5:

This problem is the Problem 4 in Module 2 for the algorithm project. Now you already have the algorithm and you can copy it here. You still need to write the source code and take a screenshot of the running program. 

Imagine yourself in the middle of Manhattan, where the streets are perpendicular on avenues. You are in a grid of streets, somewhat lost, and you randomly pick one of four directions and walk to the next intersection. Not knowing where you really want to go, you again randomly pick one of the four directions, and so on. After repeating the same movement for a number of times, you may want to know how far you got from the original point.

Represent locations as integer pairs(x,y). Create an algorithm that implements your movement through New York City, over 100 intersections, starting at (0,0) and print the ending location, taking into consideration that each movement, from one intersection to another will be one mile.

Submission:

You are required to submit the following files for this assignment by clicking the Submit Assignment button above.

ERD Diagram

  

Lab 2 – EERD

Overview

Wally Los Gatos, owner of Wally’s Wonderful World of Wheels, has hired you as a consultant to
design a database management system for his chain of stores that sell used vehicles. Wally requires this system to track details about inventory, employees, sales and customers. 

Requirements
Based on the following information, draw an EER diagram. Please indicate any assumptions that you have made in your diagrams!

After an initial meeting with Wally, you have developed a list of business rules and specification to begin the design of an the ER Model. 

· Customers place orders through a dealership. Wally has three dealership locations (Cambridge, Kitchener and London), and may add more in the future

· Wally would like to track the following about customers:
Name, Address, City, Province, Postal Code, Telephone, Date of Birth, Email

· A customer may place many orders

· A customer does not always have to order through the same dealer all the time

· A dealership may have many customers

· Orders are composed of one or more vehicles from inventory

· The following information about each order needs to be recorded:
Order Date, Final Sale Price, Credit Authorization Status

· We wish to record the following about each vehicle:
Vehicle Identification Number (VIN), Make, Model, Year, Colour, Km’s, Photo, Purchase Price, Sticker Price

· Wally obtains vehicles from a range of suppliers, including auctions, bank foreclosures, other dealerships, and private sellers

· Wally employs fifty-six employees

· He would like to track the following information about employees:
Name, Address (Street, City, Province, Postal Code), Telephone, Date of Hire, Title, Salary, Age

· If the employee’s role is that of a mechanic, we should track their Certification Number

· If the employee’s role is that of a salesperson, we should track their commission and total Vehicles Sold

· If the employee’s role is that of a manager, we should track which employees they manage

· Each employee works in one and only one dealership

· Each employee may have one or more dependents.
We wish to record the name of the dependent as well as the age and relationship
 

Sample Sales Record:

*********************

Thank you for choosing Wally’s World of Wheels at

Guelph Auto Mall for your quality used vehicle!

Sales Rep: #3265 Peter Green

Processed By: 5487 

Invoice Number: 123654

Date: On Sept. 20, 2017

Customer: John Smith!
22 Front St W

Kitchner, ON, N2A4G8

[email protected]

2013 Toyota Camry, White 

VIN: 27764534RTB KMS: 211023
Purchase Price: $15,260.00

Trade In: $ 0.00

Subtotal = $ 15,260.00

HST (13%) = $ 1,983.80

Sale Total = $ 17,243.80

Questions 1: Classes and Pointers

Instructions

This question set covers material on C++ classes (regular and templates) as well as pointers and references (readings from Chapters 1-3 in your book).  Use the lecture slides, your notes, textbook, and other resources to research questions.

When given a choice, always choose the best answer.  Answers such as “None” or “All”, maybe be listed in any order.  For short essay questions, answer in a cohesive paragraph in your own words. If you research any answers in your book or elsewhere, do not copy wording from those sources.

To better understand how any code works: create a C++ project in Visual Studio and test the code.  Include any needed header files.

discussion 10/31

 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role.  You can use outside research, or your personal work experiences as your basis for discussion. 

Project Part 1

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

Task   2: Risk Assessment Plan

Task   3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?
  • Did the student      create a professional, well-developed draft with proper grammar, spelling,      and punctuation?

  

  

Investigation Considerations

A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project, you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and provide focus for your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes, allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation.

This situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together.

There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify tools and software needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project. Consult the relevant sections of Guidelines for Project 1 Investigation Project Plan in every step.

In Step 1, get started on the plan by creating an interview form to record questions, key words, and authorization information, and to complete the legal forms needed in this case. However, before you can do that, you need to review your training in criminal investigations.

Your tasks in Step 1 are to create interview forms to record questions, key words, and authorization information, and to designate other legal forms that will be needed in this case. It is important for you to describe the importance of each form that you create in the body of your final Project Plan assignment and include in-text reference citations for all of your content. The forms that you complete as part of Step 1 will be included in your Investigation Project Plan, the final assignment for this project.

As part of the investigation into two computers and a thumb drive, it’s important to do the necessary preliminary work. In criminal investigations, there are laws governing chain of custody, search warrants, subpoenas, jurisdiction, and the plain view doctrine. It’s important to be familiar with these topics. Review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation.

The next thing to do is to read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case.

You have received an official request for assistance that provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First, you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated.

It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance. This situation may require you to follow special procedures.

In Step 2, you will consider the types of resources needed for the investigation. 

Step 2: List Required Forensic Equipment, Software, and Labor Expenses

In Step 1, you developed forms and templates to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In this step, you will consider the types of equipment and human resources needed to conduct the investigation and create a budget table that includes expenses for software licenses, computers, storage devices, number of digital forensics examiners, digital forensics examiners’ labor hours, examiner hourly pay rate, including time spent for each phase of the investigation process in gathering evidence analysis, reporting, presentation preparation and court appearance(s).

It is important to total overall costs of all equipment and expenses in your budget table. By making these preparations, you are establishing forensic readiness. Required resources can include people; tools and technologies such as RAID storagedeployment kits, or imaging programs; and budget and timeline information.

Develop a checklist. It will be included in the final Investigation Project Plan.

In the next step, you will begin to prepare a plan for managing a digital forensic investigation.

Step 3: Plan Your Investigation

In the prior step, you determined what resources would be necessary for your investigation. In this step, you will develop a plan for managing the investigation. The requirements for writing case reports reflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and personnel requirements is essential.

Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of “wild cards” such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings.

Your project plan should include a properly sequenced narrative timeline and a separately labeled and sequenced Visual Graphic Timeline chart that reflects the time intervals between each phase of the evidence acquisition and investigation processes (e.g., 30 hours gathering evidence spread across five business days, 60 hours of analysis over 10 business days, 90 days for reporting and court preparation, etc.) including detailed time estimates, and contingency plans. Your plan will serve many purposes, including the assignment of a project budget. As you create your plan, be sure to include in your meeting agenda communications and reporting: who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency).

Once you have developed your project management plan, move on to the next step, where you will submit your final assignment.

Step 4: Prepare and Submit Completed Investigation Project Plan

For your final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include:

  1. Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)
  2. Resource checklist for equipment, human resources and labor expenses (Step 2)
  3. Management plan (Step 3)
  4. Search and seizure form(s)
  5. Chain of custody form

The organization and details of your plan is important. Be sure to refer to the Guidelines for Project 1 Investigation Project Plan to meet the minimum standards needed for this project.

All sources of information must be appropriately referenced. Submit your completed Investigation Project Plan to your supervisor (instructor) for evaluation upon completion.

Mastering Blockchain

Mastering blockchain

 write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research. If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

Your paper should meet the following requirements:

• Be approximately 2-3 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Organ Leader & Decision Making

Required Reading:

Optional Resources:

Chapter 2 Journal articles

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

1.Define TAM and the components.

2.Note how TAM is impacting educational settings.

3.Give an overview of the case study presented and the findings.

 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Assignment (500 WORDS MINIMUM)

 

Assignment Instructions:

  • Explain URL and why you as the analyst should care about its importance.
  • Explain the URL parameters. 
  • Explain cookies and why these matter in web analytics.

Do your best to locate resources that are no more than three (3) years old. PLEASE DO NOT USE WIKIPEDIA AS A RESOURCE AND OR REFERENCE. 

 Please submit a Word Doc with your answers in 500 words or more, and use APA references in support of your answers.