Lab computer science

 

For this lab you will implement a Java program that uses several different data types and operators.

  1. Start Apache NetBeans.
  2. Create a new project called Lab 3.
  3. Add a java main class called yourlastnameLab3.java with your last name to the project and csci1011.lab3 as the package name
  4. Your program must have the following comments at the top of it

//
// Sample program to calculate the value of a deposit
// after a year of earning interest.
// CSCI 1011 Lab 3

  1. It then should show a welcome message
  2. It then prompts the user to enter an initial deposit amount
  3. It reads the initial deposit value and assigns it into a double variable.
  4. Program then updates the new value of balance by using the following formula:

balance = balance + (balance * 0.049);

  1. Then the program will show a message like:

With a 4.9% APR your deposit will be worth $Y in one year.”

  1. Instead of Y you must show the value of balance variable.
  2. Run the program and test it with sample input. Do this several times.
  3. Modify the program so it uses a named constant in place of 0.049.
  4. Run the program and test it to see if it gives the same values.
  5. Modify the interest rate to 0.059.
  6. Run the program again and test it to see the values it gives have changed.
  7. Did you change the output so it now says 5.9%? If not make that change and run the program again.
  8. Since it would be easier not to have to change the program in two places, declare a new double variable called percent and set its value to 100 times the interest rate.
  9. Modify your output statement so it uses the percent variable instead of 5.9.
  10. Run the program again and test it to make sure it still works properly.
  11. Add some additional statements to compute what the balance will be after a second year of earning interest and display this result along with the original result.
  12. Run the program again and test it to make sure that the new code works.
  13. Here is an output of the program:

Welcome to (your name)’s interest calculator

Please enter your initial deposit amount:

10

With a 5.8999999999999995% APR your deposit will be worth $10.59 in one year.

With a 5.8999999999999995% APR your deposit will be worth $11.21481 in two years.

  1. Upload the file yourlastnameLab3.java to the drop box folder labeled Lab 3.

Legal Reg, Compliance, Invest Discussion

One and half page is fine

Managing Risk

Your company has decided to implement a human resource demographic portal.  Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc.  In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.  

Under the current system, employees must go to the HR office to make any changes – there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed.  Employees would be able to do this as needed through the portal.

 There are many potential risks associated with this project

  1. Your task is to Identify as many risks as you can (4 is a minimum, but feel free to identify more risks if you so desire).
  2. Determine the relative likelihood of each risk occurring (lowmedium high)
  3. Propose at least one strategy for addressing each risk, and describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.  For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,

.

Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)

Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the  human resource demographic portal.

Research topic

 Topic- Journal of Systems and Software 

This is a continuing assignment; you will be using this drop box until you and your faculty mentor approve your topic. 

In a 200-word document, describe your topic. Identify research in the area any models/theories developed in the area. Have you identified a cite problem/gap in this body of knowledge?

Are you considering doing a qualitative, quantitative, mixed method, project, etc., study, identify a possibly population to gather data from.

If you are a CPT student, please include the following as well:
Have you been issued CPT or are currently on CPT? If so what is your CPT code?

If you have a CPT code then:
Post your job description.Upload an official job description on company letterhead. Please copy/paste your current job responsibilities identify how your proposed topic in your discipline relates to the program goals and core courses. 

  • Once your mentor has approved your topic, you will use the below form to add all the components and submit to the school.

3 page APA compliant paper with NO PLAGIARISM on transformational leadership and knowledge and knowledge sharing

3 page APA compliant paper with NO PLAGIARISM with a minimum of five peer-reviewed journal articles.

Answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Operating System Project 2

Developing a Linux-like command shell with C/C++ language

 your implementation of the “builtin commands”:
a. cd – Change the current default directory to
. If the argument is not present, report the current directory. If the directory does not exist an appropriate error should be reported. This command should also change the PWD environment variable.
b. clr – Clear the screen.
c. dir – List the contents of directory .
d. environ – List all the environment strings.
e. echo – Display on the display followed by a new line (multiple spaces/tabs may be reduced to a single space).
f. help – Display the user manual using the more filter.
g. pause – Pause operation of the shell until ‘Enter’ is pressed.
h. quit – Quit the shell.
i. The shell environment should contain shell=/myshell where /myshell is the full path for the shell executable(not a hardwired path back to your directory, but the one from which it was executed). 

Project Documentation

Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans begin to come to life and assumptions are able to be tested and measured in real-life scenarios.

One of the outcomes of project implementation is a set of deliverables that typically includes a system diagram; a network diagram; a database design document, including an entity-relationship diagram, a data dictionary, and table definitions; a clearly articulated cybersecurity plan; and source code.

To complete this assignment, you will create:

  • A system diagram that shows, in graphic form, the components of your project.
    • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
    • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
    • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Answer the following 2 questions in 2-3 pages

 

Consider diagram 7-1 from your textbook. Answer the following questions: diagram is in 215th page in the text book which is attached below.

  1. Do presentation layers add an attack surface to the enterprise? How about an e-commerce presence?
  2. The supply chain will interact with an entire business ecosystem of many other organizations. Interactions will probably include both people and automated flows. Are these third parties to be trusted at the same level as the internal systems, such as content management or data analysis?

CC-3

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

Discussion

Engaging recent (Past 5 years) scholarly research, outline and discuss the top 5 factors driving Information Security Governance today.

Cloud computing and digital forensics – Week 11

Week 11 Discussion(500 words)

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Eleven Assignment(250 words)

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.