C programming

 

0) Random number generation. (50 pts)

Often, computer scientists, statisticians, physicists, social scientists, and mathematicians need a list of random numbers. Political pundits also find lists of random numbers useful to provide ‘statistical’ evidence of their arguments.

Implement a tool to generate and print a sequence of 10 random numbers.  Each random number should be an integer in the range from

0 to 100, inclusive (that means both 0 and 100 should have a chance of appearing). I do not expect you to implement your own random number generator. I expect you to use the standard way of obtaining randomness in a secure fashion.

$ ./grand

56 77 91 2 33 40 72 100 6 2

Augment your program to take a command line parameter specifying how many random numbers to generate. That is, if grand is invoked by:

$ ./grand 4

it will output 4 random numbers from 0 to 100, inclusive. Make sure your program does something sensible if the supplied argument is not a valid integer. There should not be an arbitrarily imposed upper limit to this number (in other words, do not have an artificial cap on the value of the argument).

Since it is easy to forget how to use programs, it is often useful to provide a well-known command line switch (or parameter) that tells the user how to invoke the program. Augment your program to recognize two more command line arguments, ‘-h’ and ‘–help’ that prints out the usage information for the program. For example,

$ grand -h

and

$ grand –help

should output the following usage information:

grand [-h | –help]       : output this usage message.

grand [n]                 : print out n random integers in [0,100]

Finally, augment your program to print out its version. Don’t forget to add this usage case to your help dialog.

$ grand –version OR -v

grand-0.0.3

1) Functions and Recursion (50 pts)

Experiment with recursion. The Fibannaci sequence is a famous naturally recursive series of numbers whose ratio approaches the Golden Ratio.

f(n) = f(n-1) + f(n-2)

Implement a program named ‘fib’ that uses recursion to calculate and print the first n Fibannaci numbers, where ‘n’ is less than or equal to 30.

Usage:

fib [n]

For example, ‘fib 4’ should output:

fib(0) = 1

fib(1) = 1

fib(2) = 2

fib(3) = 3

fib(4) = 5

Modify your program so that providing the –target or -t option will print only the nth Fibannaci number.

$ ./fib –target 3

fib(3) = 3

Add the ability for your program to calculate the Fibannaci sequence iteratively rather than recursively. Output should not change. If you execute your program with the name ‘ifib’ then it performs the iterative calculation.  If it is executed via ‘rfib’ or ‘fib’ it performs the recursive method of calculating.

$ ./fib –target 3

fib(3) = 3

$ ./ifib –target 3

fib(3) = 3

$ ./rfib –target 3

fib(3) = 3

There is an example of how to accomplish this sort of test of the program name in “C Programming Language, 2nd Edition, by Brian W. Kernighan, Dennis M. Ritchie” textbook. You can search Google for an iterative version of Fibannaci, but be sure to cite where you found it in your README.

Note:

You may want to consider using GNU getopt library for processing command line options.

Analyzing and visualization data – Research paper

Research: Quantitative vs Qualitative

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains the following:

  • Discuss Quantitative Methodology
  • Discuss Qualitative Methodology
  • Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 2 pages (600 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

PLE 10

Please answer each below in 2-3 lines 

 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

 

The  recent advances in information and communication technology (ICT) has  promoted the evolution of conventional computer-aided manufacturing  industry to smart data-driven manufacturing. Data analytics in massive  manufacturing data can extract huge business values while it can also  result in research challenges due to the heterogeneous data types,  enormous volume and real-time velocity of manufacturing data.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations. 
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Discussion – Block chain

There is still much confusion regarding what Blockchain is and what it is not.Discuss the following:

1.  Your explanation of Blockchain to include why it has been gaining so much popularity.  In your own words please.

2.  Using a blockchain as a data source, what data science project do you think would be interesting?

500 words

At least two scholarly source should be used.

Use proper citations and references

Where Is Current Research on Blockchain Technology?

Using the University Digital Library or the Google scholar website locate articles discussing different use of Blockchain Technology. 

Where Is Current Research on Blockchain Technology?  

1.Your final document should include an Abstract and a Conclusion. 

2. This assignment should be in APA format and have to include at least six references. 

3. Minimum of 1000 words.

Leadership Traits and Attributes

 Please write a 1 page paper with references of at least one peer reviewed paper.

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational  leadership and how both leadership styles impact organizational  effectiveness. Please note how these leadership styles affect  implementing new innovative technologies.
  3. The work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions. Please explain.

Emerging threats – Discussion

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Organ Leader & Decision Making

 Week 1 Research Paper

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

 

 Required Reading: 

   http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=1&sid=892bc91d-de32-4b46-954f-f13755964dae%40pdc-v-sessmgr01 

Optional Resource:  

The paper should meet the following requirements:

3-4 pages in length (not including title page or references)

APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Manual Code Review

 

For this assignment, I want to someone to help me to do by using Notepad++ or other text editors that can nicely format source code.

I gotta get a Download file, Java source code  Assignment 6.1 zip file. The zip file contains a number of source code files from the WebGoat project. My task is to manually read the code line-by-line and identify the blocks of code that contain a known vulnerability from the OWASP Top 10 list.

and Prepare a simple report based on OWASP Findings Report Guide and I wanna get the report in a PDF format to the assignment dropbox below.