computers pro 3

 

Consider the following problems, design the algorithms that would solve them, and then implement the algorithm in Java.

You are free to choose between writing pseudo-code or drawing flowcharts. Make sure to include screenshots of your running programs. You can take screenshots using PrintScreen of the console window in which you run the program. Put your algorithm and the screenshots together in a Word document.

Problem 1:

Write a program that prompts the user for a measurement in meters, and then converts it in to miles, feet, and inches.

 

Problem 2:

Write a program that reads in an integer, and breaks it into a sequence of individual digits. Display each digit on a separate line.

For example, the input 16384 is displayed as

1

6

3

8

4

You may assume that the input has no more than five digits and is not negative.

Problem 3:

Write a program that asks the user to input:

  • The number of gallons of gas in the tank
  • The fuel efficiency in miles per gallon
  • The price of gas per gallon

Then print the cost per 100 miles and how far the car can go with the gas in the car.

Problem 4:

Write a program that asks the user to enter the name of his or her favorite city. use a String variable to store the input. The program should display the following:

  • The number of characters in the city name
  • the name of the city in all uppercase letters
  • the name of the city in all lower case letters
  • the first character in the name of the city

Problem 5:

Read a word from the user and display the string with the letters shifted to the right by two positions and with the letters shifted to the left by two positions in the string. Save all of the three strings in separate variables and display all three of them at the end of the program.

Submission:

You are required to submit the following files for this assignment by clicking the Submit Assignment button above. Make sure all of the following required files have been attached before you submit the assignment.

  • You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P3-Last Name-First Nam.zip. For example, P3-Smith-John.zip
  • A Word document containing the algorithms and the screenshots of the running programs for all of the five problems. Please name your Word document as P3-Last Name-First Name.docx or .doc. For example, P3-Smith-John.docx.

This needs to include everything 

.5 Algorithms 

. 5 Java Programs

. 5 Screenshots

Research Paper 6

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

case study

 

Use the library and other internet resources to research for answers for the following questions. Write a 2–3 pages research paper answering these questions.

  • What encryption standard is currently recommended by NIST and why? Explain your answer with examples.
  • How can we apply that security protocol in real life situations?
  • Provide at least two references to support your initial post.

Blockchain IT Assignment

 Please read “R3: Putting the ‘Fin’ Back into Fintech” case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1.How does Fintech compare to regular banking? 

2. Discuss R3 and its distributed ledger technology mission.

3. What are some of the applications of cords and strategies of growing and expanding?

4. What are some of the emerging markets that Fintech has impacted?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

Software Reference Architecture document.

 

Write a Software Reference Architecture document for a fictitious University information technology department. This Software Reference Architecture should include at least one software framework (e.g. Spring, struct, Hibernate). You can assume the data storage is part of software because it normally uses a database.

Attached is the full description and requirement and rubric for this project.

Access control

Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector or the Critical Infrastructure.

Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

PCI Noncompliance

 

Small business owners and large corporations must understand their roles and responsibilities in keeping payment card data secure and must comply with PCI DSS. Small business owners may have little IT knowledge and little knowledge of security.

From the standpoint of a security professional helping a small business owner understand the ramifications of noncompliance with PCI DSS, develop a Microsoft® PowerPoint® presentation with detailed speaker notes. In your presentation:

  • Accurately describe the role and responsibility of the merchant bank in providing guidance on PCI DSS training.

Cite all sources using APA guidelines. 

This is part of a bigger presentation I only need 2 PowerPoint slides of information and speaker notes please.

Cellular network

  Base on the reading assignment, your experience, and personal research, please  answer the following questions: 

  • Thoroughly explain the Base Station Controller (BSC) as it relates to a cellular network?
  • What is a Mobile Equipment Identifier (MEID) and what is it used for?
  • As an examiner, why is it important for you to understand how a call is routed through the cellular network?
  • What is the significance of Code Division Multiple Access (CDMA)?
  • List and explain three components of a SIM file system

Post your main response to the question (400 words minimum). 

Response to discussion 2 Info tech Strat Plan

Please write two posts for the documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.