Project Description: Chapter 2: Array Based Structures Programming Exercises 21 (Code an application program that keeps track of student information at your college…)

Project Description:

See textbook page 122

Chapter 2: Array Based Structures

Programming Exercises 21 (Code an application program that keeps track of student information at your college…)

Submission:

  • One project report in the form of PDF  
  • One separate zip folder which contains all the source codes (java preferred.)
  • ONLY ONE group member submits the files on behalf of the whole group. 

Evaluation:

  • Report: In the project report, please illustrate what the project is about, what operations you have implemented, and what the testing results are. Both text and pictures should be used to show the running results. Include the names of all team members clearly and contributions of each. (The contributions of all team members will be assumed to be equal by default.) The structure of the report should be clear and organized.(20%)
  • Code: Check whether all operations have been successfully implemented. Check whether the code is commented appropriately and structured well. (80%)

Computer Ethics

In a typical 700 to 1000 word essay, discuss the following points:

What is wrong with each of these nine theories?

Which theory you think most acceptable for you?  

Which one is most supportive to your values?

Which one should serve as the foundation for the society’s moral order where you would want to live?  

1. Subjective Relativism

2. Cultural Relativism

3. Divine Command Theory

4. Ethical Egoism

5. Categorical Imperative: Kant

6. Act Utilitarianism

7. Rule Utilitarianism

8. Social Contract Theory

9. Virtue Ethics

Do not select passages from any resources!  You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

OSI and TCP/IP Models

 

Discussion Topic

Choose a TCP/IP service, such as a web  browser, email, file transfer, remote shell, DHCP, DNS, network time  protocol, network address translation, etc. 

  Important!

  • Everyone should pick a different service, if possible, to keep the discussion fresh.

In your original post, answer the following about the service you have chosen:

  • How would you determine the IP addresses of your devices on your network?

 Success Hints

You can use ipconfig if you use the command line.

You can use whatismyipaddress.com if you have connectivity on your devices. 

  • Using Google, determine how to look up your IP address in the Windows 10 GUI.
  • How would you determine if your devices are able to communicate on your network?

 Success Hint

You can use ping on your computers. How would you do it on your mobile devices?)

  • Using ipconfig, how do you determine the IP address of your home router?
  • Trace a request and a response with the help of a diagram of the TCP/IP service that you chose.
  • Follow the request and response through each of the TCP/IP layers.
  • Describe what happens at each layer of the OSI and TCP/IP reference models. 

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Part 1

Top management of a large company has told you that they would like to be able to determine what the impact of years of service at their company has on workers’ productivity levels, and they would like to be able to predict potential productivity based upon years of service. The company has data on all of its employees and has been using a valid productivity measure that assesses each employee’s productivity.

What is a possible way to answer management’s question, and how does the analysis work? Reference the section on bi-variate linear regression from Green & Salkind.

Part 2

After reviewing the results of the analysis in Part I, the company found they are significantly related. However, a statistician reviewed the output and said that the results really do not explain much of what is happening in the total relationship.

What information is the statistician referring to from your output, and why is it important? Reference the section on bi-variate linear regression from Green & Salkind. 

week-6 assignment

   Compare and evaluate qualitative v quantitative risk assessment.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

discusion9etc

 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

SA

  

If you were to explain to a family/friend about Information technology, what would you say is its importance in today’s world, and what are future trends in Information Technology (IT)?

Discussion 5

How would you explain the correlation between the amount of corruption in a country and economic development?

250 to 300 words APA format with references.

Application Security or Penetration testing methodology

  1. Research 14-1 – Application security or penetration testing methodology.   APA formatting is expected.  Research various application security testing or penetration testing methodologies.  Compare and contrast the pros and cons of each methodology and recommend your preferred approach. 
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.