Relational Operators

 

Read the following requirements, first write pseudo code based on  your understanding, and then develop a Java application program based on  your pseudo code.

  1. The program will first ask users to key in their taxable annual income.
  2. Depending on the income level, the program will calculate the tax owed. Using the following table as reference:

Income tax bracket percentage:

0–$8,500: 10%

$8,500–$34,500: 15%

$34,500–$83,600: 25%

$83,600–$174,400: 28%

$174,400–$379,150: 33%

$379,150 and above: 35%

Hint: use the following as reference to write if and else statement.

https://www.youtube.com/watch?v=zqfxpcVlJYI

 

The following items will be assessed in particular:

  1. Ability to use pseudo code.
  2. Ability to use a selection statement in Java.
  3. Ability to use a repetitive statement in Java.  

Object-oriented programming

  

Object-oriented programming has been adopted widely because of its capability to reuse code. Most application development software provides class libraries and extensive support for complex data structures, including linked lists. Investigate one of these libraries, such as the Microsoft Foundation Classes or the Java 2 Platform application programming interface (API). What data structures are supported by the library? What types of data are recommended for use with each data structure object? Which classes contain which data structures, and what methods does the library provide?

dis 4 micro

 

Windows 10 allows users to customize their desktop preferences.

For the purpose of this discussion, consider a scenario where you manage more than 100 Windows 10 devices and are asked to provide input on allowing users to customize items such as the Start Menu.

  • What settings should you allow users to change, and what settings should be controlled by the system administrator?
  • What are the advantages and disadvantages?
  • How does the industry of the organization play a role in your answer?

Abstract #3

 

*Below is the instructions, and I have attached an SAMPLE EXAMPLE document 

Legal Abstracts – Instructions

A sample legal abstract is posted in Blackboard. Use the sample as your template.

Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed. 

The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.

Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites. 

To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues. 

Each abstract must contain the following headings:

Article title

Author

Publication

Publication date

URL

Facts of the dispute

The background of the case or controversy.

Plaintiff’s claim

In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?

Defendant’s claim

How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint. 

Applicable law (i.e. statute, regulation, treaty)

Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply. 

Issue of law

This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case. 

Holding (if an adjudicatory body has rendered a decision)

This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding. 

Impact on IT

Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here. 

Information Technology

Objective: In this project, you will compare the specifications and prices for two computers to decide which one would be best for you.

1. Assess your computing needs. Which of the items in this list pertain to you?

Chart is attached with assignment

2. Decide on a form factor. Do you want a desktop, an all-in-one, a tablet, a tablet or a smart phone? Explain why?

3. Select a platform. Which operating system do you prefer: Windows 7, Windows 8, Windows 10 or another kind.

4. Use the Internet to locate two computers that meet your needs. For each computer, record the following information:

Computer manufacturer

Computer model

Processor Type

Processor speed

Memory capacity

Drive capacity

Screen size

Number and type of expansion ports

Price (excludes shipping and taxes)

5. List any additional characteristics of the computers that might be important to your purchase decision. Factors you might consider include laptop weight, camera resolutions, battery like, bundled software, and available accessories.

6. Create a side-by-side comparison of the two computers you’ve selected for consideration.

7. Write a paragraph explaining which computer you would select and why.

Network Risk Assessment

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

Please complete the scenario below following these guidelines for your deliverable.

Attached is the chapter from the textbook for your reference.

Scenario: 

You have been hired as a consultant to secure all network devices for a large firm.

1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)

2. Detail the countermeasures (and tools) you would put in place.

*******(Note: You are not limited to following the steps/countermeasures described in your textbook. If there are additional steps you would take please list them and explain why you are taking them.)

GUIDELINES:

Paper must be a minimum of 2 pages double spaced

Make sure you are using at least two (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Assignment

 Assignment

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

PowerPoint_1B_Seattle

PowerPoint_1B_Seattle

     

Open the PowerPoint presentation   Student_PowerPoint_1B_Seattle_HW.pptx   downloaded with this project. Then, in your textbook, turn to Project 1B and   complete all of the steps in Activities 1.17-1.33.

 

Complete Activity 1.17 Changing   Slide Size

 

Complete Activity 1.18 Inserting   Slides from an Existing Presentation

 

Complete Activity 1.19   Displaying and Editing the Presentation Outline

 

Complete Activity 1.20 Deleting   and Moving a Slide

 

Complete Activity 1.21 Finding   and Replacing Text

 

Complete Activity 1.22 Applying   a Theme Variant

 

Complete Activity 1.23 Changing   Fonts and Font Sizes

 

Complete Activity 1.24 Changing   Font Styles and Font Colors

 

Complete Activity 1.25 Aligning   Text

 

Complete Activity 1.26 Changing   Line Spacing

 

Complete Activity 1.27 Changing   the Slide Layout

 

Complete Activity 1.28 Deleting   Slides in Slide Sorter View

 

Complete Activity 1.29 Moving a   Single Slide in Slide Sorter View

 

Complete Activity 1.30 Selecting   Contiguous and Noncontiguous Slides and Moving Multiple Slides

 

Complete Activity 1.31 Applying   Slide Transitions to a Presentation

 

Complete Activity 1.32 Setting   Slide Transition Timing Options 

 

Complete Activity 1.33 Displaying a Presentation in Reading View

 

Save and close the file, and   then submit for grading.