Relational Operators
Read the following requirements, first write pseudo code based on your understanding, and then develop a Java application program based on your pseudo code.
- The program will first ask users to key in their taxable annual income.
- Depending on the income level, the program will calculate the tax owed. Using the following table as reference:
Income tax bracket percentage:
0–$8,500: 10%
$8,500–$34,500: 15%
$34,500–$83,600: 25%
$83,600–$174,400: 28%
$174,400–$379,150: 33%
$379,150 and above: 35%
Hint: use the following as reference to write if and else statement.
https://www.youtube.com/watch?v=zqfxpcVlJYI
The following items will be assessed in particular:
- Ability to use pseudo code.
- Ability to use a selection statement in Java.
- Ability to use a repetitive statement in Java.
critical elements of Computer Software Security
Discuss the critical elements of Computer Software Security in a 1 to 2 page APA format paper. References must not be more than 5 years old and no more than one entity source and no more than one N.D source.
Object-oriented programming
Object-oriented programming has been adopted widely because of its capability to reuse code. Most application development software provides class libraries and extensive support for complex data structures, including linked lists. Investigate one of these libraries, such as the Microsoft Foundation Classes or the Java 2 Platform application programming interface (API). What data structures are supported by the library? What types of data are recommended for use with each data structure object? Which classes contain which data structures, and what methods does the library provide?
dis 4 micro
Windows 10 allows users to customize their desktop preferences.
For the purpose of this discussion, consider a scenario where you manage more than 100 Windows 10 devices and are asked to provide input on allowing users to customize items such as the Start Menu.
- What settings should you allow users to change, and what settings should be controlled by the system administrator?
- What are the advantages and disadvantages?
- How does the industry of the organization play a role in your answer?
Abstract #3
*Below is the instructions, and I have attached an SAMPLE EXAMPLE document
Legal Abstracts – Instructions
A sample legal abstract is posted in Blackboard. Use the sample as your template.
Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed.
The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.
Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites.
To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues.
Each abstract must contain the following headings:
Article title
Author
Publication
Publication date
URL
Facts of the dispute
The background of the case or controversy.
Plaintiff’s claim
In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?
Defendant’s claim
How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint.
Applicable law (i.e. statute, regulation, treaty)
Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply.
Issue of law
This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case.
Holding (if an adjudicatory body has rendered a decision)
This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding.
Impact on IT
Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here.
Information Technology
Objective: In this project, you will compare the specifications and prices for two computers to decide which one would be best for you.
1. Assess your computing needs. Which of the items in this list pertain to you?
Chart is attached with assignment
2. Decide on a form factor. Do you want a desktop, an all-in-one, a tablet, a tablet or a smart phone? Explain why?
3. Select a platform. Which operating system do you prefer: Windows 7, Windows 8, Windows 10 or another kind.
4. Use the Internet to locate two computers that meet your needs. For each computer, record the following information:
Computer manufacturer
Computer model
Processor Type
Processor speed
Memory capacity
Drive capacity
Screen size
Number and type of expansion ports
Price (excludes shipping and taxes)
5. List any additional characteristics of the computers that might be important to your purchase decision. Factors you might consider include laptop weight, camera resolutions, battery like, bundled software, and available accessories.
6. Create a side-by-side comparison of the two computers you’ve selected for consideration.
7. Write a paragraph explaining which computer you would select and why.
Network Risk Assessment
The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.
Please complete the scenario below following these guidelines for your deliverable.
Attached is the chapter from the textbook for your reference.
Scenario:
You have been hired as a consultant to secure all network devices for a large firm.
1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)
2. Detail the countermeasures (and tools) you would put in place.
*******(Note: You are not limited to following the steps/countermeasures described in your textbook. If there are additional steps you would take please list them and explain why you are taking them.)
GUIDELINES:
Paper must be a minimum of 2 pages double spaced
Make sure you are using at least two (2) academic APA references.
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition
Assignment
Assignment
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
- Who is likely to attack your site?
- When are attacks likely to occur?
- What sort of attacks might take place?
- How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words.
PowerPoint_1B_Seattle
PowerPoint_1B_Seattle
Open the PowerPoint presentation Student_PowerPoint_1B_Seattle_HW.pptx downloaded with this project. Then, in your textbook, turn to Project 1B and complete all of the steps in Activities 1.17-1.33.
Complete Activity 1.17 Changing Slide Size
Complete Activity 1.18 Inserting Slides from an Existing Presentation
Complete Activity 1.19 Displaying and Editing the Presentation Outline
Complete Activity 1.20 Deleting and Moving a Slide
Complete Activity 1.21 Finding and Replacing Text
Complete Activity 1.22 Applying a Theme Variant
Complete Activity 1.23 Changing Fonts and Font Sizes
Complete Activity 1.24 Changing Font Styles and Font Colors
Complete Activity 1.25 Aligning Text
Complete Activity 1.26 Changing Line Spacing
Complete Activity 1.27 Changing the Slide Layout
Complete Activity 1.28 Deleting Slides in Slide Sorter View
Complete Activity 1.29 Moving a Single Slide in Slide Sorter View
Complete Activity 1.30 Selecting Contiguous and Noncontiguous Slides and Moving Multiple Slides
Complete Activity 1.31 Applying Slide Transitions to a Presentation
Complete Activity 1.32 Setting Slide Transition Timing Options
Complete Activity 1.33 Displaying a Presentation in Reading View
Save and close the file, and then submit for grading.