R exercise

This is the R exercise from the first lecture.

As discussed in class please submit the following:

The R code & line plot of the boys, girls and total all on the same plot and in separate color.  Do not foreget Title and axes labels and Chart legend

Complete R lab Assignment as per Instructions in Class.

https://cdn.inst-fs-iad-prod.inscloudgate.net/181b95eb-37bf-43a2-ac63-81cd33f19840/Lecture%201.R?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii8xODFiOTVlYi0zN2JmLTQzYTItYWM2My04MWNkMzNmMTk4NDAvTGVjdHVyZSUyMDEuUiIsInRlbmFudCI6ImNhbnZhcyIsInVzZXJfaWQiOiIxMDEyNDAwMDAwMDAwMTI3NzYiLCJpYXQiOjE2MDQyODc5ODEsImV4cCI6MTYwNDM3NDM4MX0.IrsQ2YaOqooI-cHS4mLplBqtXM_HV_E1qzK5M4-lOpnZxsmKj17v_Cnme5UY4QFT9O7xtn4MGtkf2QV0jHA3FQ&download=1&content_type=null

Hexadecimal Calculator

Please check the attached file.

Hexadecimal Calculator Implement a hexadecimal calculator for iOS. Requirements: • The calculator should support 4 basic arithmetic operations: + – * and / • The calculator will operate on hexadecimal numbers, not decimal numbers • The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions. • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. • The calculator should handle overflow and underflow gracefully. The app must not crash. • The calculator should handle division-by-zero error gracefully. The app must not crash. • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. Hint: • To convert a string to a hex number, use “radix: 16” as an argument. For example: var s:String? s = “1A” var intHex:UInt = 0 intHex = UInt(s!, radix: 16)! print(intHex) // shows 26 intHex = 90 s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. • Strings may be concatenated by using + operator. E.g. var s1 = “1234” var s2 = “5” print(s1 + s2) // shows 12345 You may want to do string concatenation in the action of each digit button. • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. • To support different devices and orientations, use stack view, scroll view, or both. • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interfaces worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why. The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing-looking, it should be fine. 

Organ Leader and decision making PHDIT

 

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Week 7 Discussion – ITM capstone

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. 

Please add references in APA format. Answer should be in 250 words. 

 

css210

Technical Report-

Your report should consist of the following sections.

  1. Cover Page: Include the course title, project title, submission date, and name.
  2. Introduction: State the objective of the case studies, and provide some background information.
  3. Network Design: Summarize the background for Case Study I. Provide a diagram of your network and the class diagram. Describe in detail the research/changes/suggestions.
  4. Security Implementation: Summarize the background for Case Study II.  Discuss the strategies you proposed for securing your network as well as any added to the class network.
  5. Hacking: Summarize the background for Case Study III. Discuss the methods you suggested to test the security strength of your network  (i.e., attempt to hack into your network) as well as any added to the class network.
  6. Results and Discussion: Discuss overall results of the final network and any additional insights and information related to your findings.

Encryption:

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

CLoud_Computing_Research_paper

 Heartland Payment Systems 

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 800 words and to label which section below written about.

Include:

I. Company Name- Heartland Payment Systems—type of company—brief history—Industry—Customers (consumer, business, or both)

II. Type of threat

III. What or (who) caused the threat

IV. How the threat was discovered

V. How the threat was resolved

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded. – THIS IS MY QUESTION TO WORK ON. PLEASE START WRITING ON THIS QUESTION.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Body

· Conclusion

· Reference page

· Minimum 3 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted