IT345 Week 9 B

Discussion 9B

Summarize what you have learned over the last 9 weeks. Has it changed your opinion about technology? Do you believe technology will continue to evolve? What businesses should concerned about being “phased” out due to new technology?

Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see other posts until you make your first post.

Malware Attack

Playbooks, sometimes known as Standard Operating Procedures (SOPs) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

During weeks 2, 3, and 5, you will develop individual playbooks for a fictional company that hired you to write their playbooks and manage the team. The first playbook is a response to malware found at the company. Each week is a separate playbook and needs to have a cover page and references.

Outline a 2- to 3-page playbook in Microsoft Word or Word Compatible to address a category of malware attacks of your choice. 

Complete the following in your playbook: 

  • Provide details of the malware category.
  • Identify the expected vulnerability and attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Cite at least 2 resources to support your assignment. 

Format your assignment according to APA guidelines. 

Review Rubric to assure all requirements are met.

Network Design Ideas

Reviewing a network’s requirements, why would you provide different network security for the developers at a company from what you provide the CEO?

If you were to apply a firewall and packet inspection device on the network, what type of differences would need to be applied to the different teams (developers versus CEO). Please identify the different restrictions you would apply to each group and why you think these are applicable.

Aligned Objectives

  • Identify physical and logical network components
  • Identify and describe the services and tools used in network operations
  • Describe the processes involved in running a datacenter

Turnitin™ enabled

week 6 assignment

 Hide Assignment InformationTurnitin™Turnitin™ enabledThis assignment will be submitted to Turnitin™.Instructions

Assignment Instructions:

  • ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection between our headquarters and our satellite offices. The two locations are approximately one mile apart and are in a heavily populated area.
  • You can make assumptions as to what technologies, cabling, etc. are available.
  • In a Word document, you need to lay out, how you would connect these two facilities together using what you feel to be the best solution.
    • Include a budget, figures are going to be a range, which is understood
    • What technologies, hardware, software, cabling, etc. are you using to make the connection
    • Why is your choice the best choice (justify!)?

You are an entry-level programmer

  

You are an entry-level programmer with the ACME Development Firm. Your boss has selected you to plan new payroll application for a new client. This could be the big break you have been looking for to move up in the company. In general, the application you are planning takes employee information and appropriate timecard data and generates payroll data for the pay period. The application should also be able to generate and print paycheck statements for each employee. (There are samples of these documents attached to these instructions.)
 

Calculations Required:
 

Gross pay is the total amount an employee makes BEFORE deductions; net pay is what they get to take home. Net pay is calculated by subtracting the following deductions from an employee’s gross pay:
 

Medical Insurance: $25 + $5 for each dependent
Dental Insurance: $2 per covered person (employee and dependents)
State Tax: determined using a tax table (data file)
Social Security: 7% of gross earnings up to $60,000 – No Social
Security is paid on amounts over $60,000
 

Taxable Pay = Gross Pay – (Medical Ins. + Dental Ins.)
Use the Taxable Pay to calculate State taxes. Use Gross Pay to calculate Social Security tax.
 

Data Dictionary:
All of the data in your program will involve a variable or constant. These variables and constants will be used throughout your program. In the data dictionary, you must identify the following items for each data item:
 

Name
Variable name used
Data type
Size (Maximum number of digits or characters)
Module(s) in which it is used
Scope (Local or Global)
Whether or not it is a constant
 

Design/Planning Charts:
Hierarchy Chart
Flowcharts
Pseudocode

This assignment lets you build a set of classes to support a program to find paths through a cave. By the end of Unit 4, you will have a program that can read a 2-dimensional cave layout from a file, search the layout to find a path to a mirror pool,

 

This  assignment lets you build a set of classes to support a program to find  paths through a cave. By the end of Unit 4, you will have a program that  can read a 2-dimensional cave layout from a file, search the layout to  find a path to a mirror pool, then print the path to take. This unit,  you will build the infrastructure for this project, including  storing  data in a two dimensional structure, searching the data structure for a  simple path from start to finish and reading data from a text file.  

Preparation

See the announcements for the link to the GitHub repository for this assignment. 

Directions

Write a class CaveExplorer, that has the following methods:

  1. Constructor  with no parameters. It should create the two-dimensional structure  shown below, where the characters in the layout are ‘R’ for rock, ‘.’  for a clear path, ‘M’ for mirror pool, and ‘S’ for self. This  constructor hardcodes the cave without reading from a file.
  2. toString  – no parameters, returns a string (including new lines) showing the  current state of the cave exploration. For the initial configuration,  this string would be
    “RRRRRRnR..SRRnR.RRRRnR.MRRRnRRRRRRn”
  3. solve  – no parameters, returns a boolean true if there is a path to the  mirror pool, and false if there is not. This method is where you will  spend some time figuring out the logic. Even though there is only one  path, you still have to search in four different directions and make  sure you don’t get caught in an infinite loop. How you do this is up to  you.
  4. getPath – no parameters, returns a String showing the path  taken to get to the mirror pool. In the example, this path would be the  string of directions “wwsse” for West, West, South, South, East. The  method should return the empty string if there is no path.
  5. Constructor  with one String parameter – the name of a text file with the cave  layout. The file has a line with two integers, the number of rows and  columns of the cave layout, followed by the layout itself.  For  exampleYou will have to modify the text file with the cave data using  your favorite editor. Your cave layout should contain a path requiring  at least 4 moves in two different directions. There must be exactly one  path through the cave, that is, from any location, there is only at most  one location to move to next that hasn’t already been visited. If you  need help reading from a file, there are many resources on the web  regarding using the Scanner class to read text data. A short one is the   section on Scanners at https://math.hws.edu/javanotes/c11/s1.html (Links to an external site.)
  6. main  – test your class by writing a main method that creates at least 2  CaveExplorer objects, solves each one, then prints the starting layout,  the final layout, and the path taken, if it exists, for each one. Be  sure to follow this order of operations.

Java homework

Deadline today 3hr … 11:50

my last name start with C…

For this homework you are going to write a program to read in values for a small business that starts with the first letter of your last name. So if your last name is Gonzalez, you can write a program for a Grocery Store.

You will need to read in one integer value, one boolean value, one decimal value and one String value. Use a Scanner to read in the data. Based on the data you read in, use a series of if, else if, else if, else to determine the price of the product or service depending on what the user entered in to the program.

You will create a class based on the type of product or service you are offering that will keep track of the integer, boolean, decimal, and String.

CLASS WORTH 20 points

For example, you let’s say your last name is Fernandez and you chose a flower shop:

“Enter the number of flowers desired:”

4

“Enter if you want a vase:”

true

“Enter your address:”

123 Fake Street

“Enter your local tax rate as a percent:”

6.5

INPUT WORTH 30 points.

OUTPUT TO THE SCREEN:

“YOUR FLOWER ORDER WILL BE $19.99”

After displaying the output for the product (price will depend on the type of business you select based on your last name), you will save the entire order in a file called output.txt using a PrintWriter.

OUTPUT WORTH 30 points.

SAVING DATA WORTH 20 points.

Your code must be unique and based on the business selected and related to your name. Submit your code here.

SUBMISSION: Upload a single .java file. No Word, text or other files will be considered.

Draw the hierarchy

  

Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index(BMI). BMI is a statistical measure that compares a person’s weight and height. The program uses three modules. The first prompts a user for and accepts the user’s height in inches. The second module accepts the user’s weight in pounds and converts the user’s height to meters and weight to kilograms. Then. it calculates BMI as weight in kilograms times height in meters squared, ad displays the results. There are 2.54 centimeters in a inch, 100 centimeters in a meter, 453.59 grams in a pound, and 1,000 grams in a kilogram. Use named constants whenever you think they are appropriate. The last module display the message End of job.