BaseToDecimal coding in Java

 

Write a program given a number in any base (base 2 to base 16) and rounds that number to a

specified place. Rounding up occurs when the digit to the right of the rounding place divided by the

number’s base is 0.5 or more. For example, 0.12468 rounded to 3 places is 0.125 because 6 divided by

8 is greater than 0.5; when rounded to 2 places, it’s 0.13 because 4 divided by 8 is 0.5; and it’s 0.1

when rounded to 1 place because 2 divided by 8 is less than 0.5. Input from the keyboard three (3)

values: a number, the base of that number, and the number of places to be rounded. Assume the

numbers entered will have at least one digit to the right of the place to be rounded and at least one digit

to the left of the decimal point. Also, assume the rounding place will never be 0 (round a whole

number). For each input, output to the screen the number rounded to the given number of places. Do

not output any digits beyond the rounded place. Finally, ask the user if he/she wishes to run the

program again (check case). Refer to the sample output below.

Sample Run:

Enter the value: 0.11101

Enter the base of the number: 2

Number of decimal places to round: 4

The resulting value: 0.1111

Run again (Y/N): y

Enter the value: 35.4321

Enter the base of the number: 7

Number of decimal places to round: 3

The resulting value: 35.432

Run again (Y/N): N

Computer Science Homework

1 – Explain why it is useful to describe group work in terms

of the time/place framework.

2 – Describe the kinds of support that groupware can provide

to decision makers.

3 – Explain why most groupware is deployed today over the

Web.

4 – Explain in what ways physical meetings can be inefficient.

5- Compare Simon’s four-phase decision-making model to

the steps in using GDSS.

ADVANCED EXCEL

Using the PERT method sample file uploaded, follow the method outlined in the .pdf file and PPT to complete the schedule with 95% confidence level.

Find the Z value for 95% confidence level in pdf file containing the z table.

Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Python

 

EMBL (European Molecular Biology Laboratory) and EBI (European Bioinformatics Institute) are basically the equivalent of NCBI here in the US. They hold the same data but store the data in a different format. Your task is to parse out an EMBL record (see file attached) just like we did for GenBank records in the discussions. 

EMBL’s records are actually easier to parse out! Just parse out the sequence ID (line starts with ID), description (DE) and sequence (SQ). Use at least one function. 

Net Present Value Analysis

 (KB) Net Present Value Analysis

In this assignment you will perform a Net Present Value Analysis for a project.

 1. Assume a student is planning to pursue a two-year master’s degree. There are two educational options the student is considering, with investment and cash flows as follows. 

Option A: Full-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The  student will quit his/her current job to study a Master’s degree in computer science.  Upon graduation the student hopes to earn $60,000 per year in new job. 

Option B: Part-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The  student can work part-time for three years at a salary of $20,000 while studying towards  the master’s degree in project management. Upon graduation the student anticipates a possible increase in salary by $10,000 (total $40,000) in the same company. 

The requirements for the assignment are:

 • Answer the following questions based on the unit readings: 

1. Briefly describe what net present value is, how it is calculated, and what it is used for.

 2. Calculate the NPV for each educational option. The discount rate is 8%. 

3. Which option should the student choose? Explain your decision including  any necessary assumptions made. 

• The paper must be APA-formatted as a Word document. 

• SafAssign will be used to check this assignment for plagiarism. Remember to  paraphrase in your own words and do not copy directly. 

• The length must be 1-2 pages, excluding the title and reference pages. 

• Include at least one reference. 

ERM W 9 D

 

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

2-3 paragraphs (Internet Research)

 In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs 

Information security policies – MS cybersecurity assignment

 

Identify a recent incident in cyber(in)security, investigate it in detail and write up a report on it using the following structure. Please see below for ineligible incidents.

Maximum 2000 words. This does not include references. Provide citation of sources using any recognized format.

The paper must contain the following two sections:

  1. Apply the Diamond model

Use the framework of the model to identify Adversary, Victim, Infrastructure and Capability. Pay special attention to what the paper calls “the Social-Political meta-feature determining the Adversary-Victim relationship, and the Technology meta-feature enabling both the infrastructure and capabilities.”

  1. Policy assessment

Identify at which level of organization this problem is best addressed. Does this incident, in your judgment, reflect the need for some kind of public policy change at the national (9) or transnational (10) level? Or is it best handled at the organizational (8) or industry level (8.5)? In making this assessment, consider how common these types of incidents are, what kinds of risks they pose, and what kind of legal, technical or policy tools could combat them.

Grading will be based on the following criteria:

  • Thoroughness of background research
  • Demonstrated understanding of and correct application of the diamond model
  • Demonstrated understanding of the different “layers” of governance and the reasoning underlying your policy recommendations
  • Clarity and organization of the writing 

Ineligible Incidents

The below incidents can not be used for this assignment. The reason is that some incidents have already been analyzed in class, or there are already too many materials floating around on the web that could be copied.  Here is a list of incidents that are not allowed:

  • Banrisul (Brazilian bank) (2016)
  • Capital One (2019)
  • Equifax (2017)
  • Marriott (2018)
  • Solarwinds (2020)
  • Target (2013)
  • TJX (2007)
  • Ukraine electrical power grid (2015/2016)
  • US Office of Personnel Management (2014)
  • Yahoo (2014/2016)