Execute a

  

1 – Execute a chained UNIX command to display ONLY the TOTAL amount of disk space available on either your personal Linux environment. (Hint: You will use a pipe | and another command from Chapter 6.)

2 – Write a chained UNIX command that displays the number of PDF files contained within a specified directory. Note that you are not being asked to perform this command on the system, but to simply write the command you would use to accomplish the task. (Hint: You will use one command from Chapter 7, two pipes, and one command from Chapter 6.)

3 – Explain the difference between the finger, who, and w commands. Why would you use one over the other?

1. a. Change your bash shell prompt to display as follows, using your own actual user id, please userid currentDate currentTime $

b. Make the change permanent, so the new prompt displays every time you log in.

2. In your home directory, create a new directory called “bin”. Add the path to this new “bin” subdirectory to the PATH variable, permanently.

3. Create the following aliases. Make these changes permanent so the aliases exist the next time you log in.

4. Add a line to your config file that displays a welcome message similar to the following (using your own name, of course). Hint: perform a man lookup on the “echo” command. Welcome, Michael! NOTE: It is probably a good idea to log out and then back into your shell and double-check that the changes above work as expected.

CIS 415 Unit 1 DB: Data and Information

 1-2 paragraph apa format cite sources

Briefly describe the difference between data and information and explain what characteristics in your view, define data quality?
In response to your peers, share insight from having read your colleague’s posting.  When answering your peers, make sure your response is substantial and don’t hesitate to have a different opinion. The topic we are discussing provides for multiple possible outcomes. 

Need help in Homework

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Questions

 

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

Complete your answers on a WORD Document, 

Questions on Evaluating and Controlling Technology

 Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

PA1 plan

PLAN DUE03/01/23 BY 11:59 PM – PREFERABLY EARLIER

Save your plan as YourLastNameFirstInitialSecNoPA1Plan.  Submit here the plan you will write from the planning video below.  The plan is worth 10 points.  The plan is graded as all or nothing.  The plan grade added to your PA1 will be what you earn for PA1.  Plan is 10 points, PA1 is 90 for a total of 100 possible points. 

Watch this video to create your plan from which you will code your PA1.  The plan template is attached (above).  This video essentially gives you the 10 points.  The remaining PAs are usually based on PA1; therefore, getting PA1 to function properly from the start is critical.  The plan is graded all or nothing, so please follow the video carefully.  You also need time to code the program even if you already have the logic for it from the plan.  If you don’t have two monitors, you can run the video in one window, and type in another window on the same monitor.  Use the Windows Icon button (left of Alt) on your keyboard, press the left or right arrows to flush one window to the left or right of your monitor.

Paper

Information Technology and Organizational Learning Assignment:

  • Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

The above submission should be one -page in length and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment.  The paper requirements for the two-pages applies to the second part of the assignment directly related to the  Information Technology and Organizational Learning assignment.

Project Requirements

  

Project Requirements

 

Part I Design ( 25 pts – data fields 1 pt, others 3 pts each) :

Design a class named Account that contains:

1. A private int data field named id for the account (default 0).
2. A private double data field named balance for the account (default 0).

3. A private double data field named annualInterestRate that stores the current interest rate (default 0). Assume all accounts have the same interest rate.

4. A private Date data field named dateCreated that stores the date when the account was created.

5. A no-arg constructor that creates a default account.

6. A constructor that creates an account with the specified id and initial balance.

7. The accessor and mutator methods for id, balance, and annualInterestRate.

8. The accessor method for dateCreated.

9. A method named getMonthlyInterestRate() that returns the monthly interest rate.

10. A method named withdraw that withdraws a specified amount from the account.

11. A method named deposit that deposits a specified amount to the account.
 

Part I – Testing

 

Use the following test program to create an Account object with an account ID of 1122, a balance of $20,000, and an annual interest rate of 4.5%. Then using the withdraw method $2,500 is withdrawn, and the deposit method is used to deposit $3,000. Finally the balance, the monthly interest, and the date when this account was created are printed.

 

import java.text.*;

public class TestAccount {

public static void main (String[] args) {

DecimalFormat fmt_twoDecimalPlaces = new DecimalFormat(“0.00”);

Account account = new Account(1122, 20000);

Account.setAnnualInterestRate(4.5);

account.withdraw(2500);

account.deposit(3000);

System.out.println(“Balance is ” +

fmt_twoDecimalPlaces.format(account.getBalance()));

System.out.println(“Monthly interest is ” +

fmt_twoDecimalPlaces.format( account.getMonthlyInterest() ));

System.out.println(“This account was created at ” +

account.getDateCreated());

}

}

If you have written the Account class correctly, you should see the following displayed:

 

Balance is $20500.00

Monthly interest is $76.88

This account was created at < day and time that you correctly run the program> ( e.g.Wed Aug 15 15:22:31 CEST 2012) 

Part II Design using inheritance:

 

( 30 pts)Next create two subclasses of the Account class – one for the checking account (CheckingAccount) and the other for the savings account(SavingsAccount). A checking account has an overdraft limit. We will assume that you are not allowed to withdraw from a savings account until a preset date is reached. Both of the subclasses have a toString() , which return a String indicating the balance of the specific account.

 

( 25 pts) Finally write a test program that creates objects of CheckingAccount and SavingsAccount. Ask the user to deposit and withdraw arbitrary amount from the accounts. Be sure to check that the input is a valid input before using it. Finally, invoke the toString() method of each object to test the final balance of the objects. Please also make sure that you ask the user whether he/she would like to continue.

Read through all the provided source code to make sure that you understand the context. A class named BinarySearchTree with an add method plus various utility methods is provided for you. You must not change any provided method with a body that is alr

 

Instructions

  1. Read through all  the provided source code to make sure that you understand the context. A  class named BinarySearchTree with an add method plus various utility  methods is provided for you. You must not change any  provided method with a body that is already complete. Note that linked  nodes are used to implement the BinarySearchTree class. Note also that  the data type allowed in the BinarySearchTree is constrained to be a  class that implements the Comparable interface and thus has a natural  total order defined.
  2. The min method of the BinarySearchTree class currently has no body. You must provide a correct body for the min method.
  3. A  sample main method is provided to illustrate building a simple binary  search tree and then using the min method to search for particular  values.

Problem Description: Finding the Minimum Value in a Binary Search Tree

Complete the body of the min method so that it returns the minimum value in the binary search tree.

The  following table lists an example call to min and the expected return  value when called in the context of the binary search tree pictured  below.

Method CallExpected Return Value

min() 1

/**

 * Complete the min method in the nested BinarySearchTree class below.

 *

 */

public class BSTMin {

  /** Provides an example. */

  public static void main(String[] args) {

    BinarySearchTree iBst = new BinarySearchTree<>();

    iBst.add(10);

    iBst.add(12);

    iBst.add(8);

    iBst.add(2);

    iBst.add(6);

    iBst.add(4);

    Integer imin = iBst.min();

    // The following statement should print 2.

    System.out.println(imin);

    BinarySearchTree sBst = new BinarySearchTree<>();

    sBst.add(“W”);

    sBst.add(“A”);

    sBst.add(“R”);

    sBst.add(“E”);

    sBst.add(“A”);

    sBst.add(“G”);

    sBst.add(“L”);

    sBst.add(“E”);

    String smin = sBst.min();

    // The following statement should print A.

    System.out.println(smin);

  }

  /** Defines a binary search tree. */

  static class BinarySearchTree> {

    // the root of this binary search tree

    private Node root;

    // the number of nodes in this binary search tree

    private int size;

    /** Defines the node structure for this binary search tree. */

    private class Node {

      T element;

      Node left;

      Node right;

      /** Constructs a node containing the given element. */

      public Node(T elem) {

        element = elem;

        left = null;

        right = null;

      }

    }

    /*   >>>>>>>>>>>>>>>>>>  YOUR WORK STARTS HERE  <<<<<<<<<<<<<<<< */

    ///////////////////////////////////////////////////////////////////////////////

    //    I M P L E M E N T  T H E  M I N  M E T H O D  B E L O W     //

    ///////////////////////////////////////////////////////////////////////////////

    /**

     * Returns the minimum value in the binary search tree.

     */

    public T min() {

    }

    /*   >>>>>>>>>>>>>>>>>>  YOUR WORK ENDS HERE  <<<<<<<<<<<<<<<< */

    ////////////////////////////////////////////////////////////////////

    // D O  N O T  M O D I F Y  B E L O W  T H I S  P O I N T  //

    ////////////////////////////////////////////////////////////////////

    ////////////////////

    // M E T R I C S //

    ////////////////////

    /**

     * Returns the number of elements in this bst.

     */

    public int size() {

      return size;

    }

    /**

     * Returns true if this bst is empty, false otherwise.

     */

    public boolean isEmpty() {

      return size == 0;

    }

    /**

     * Returns the height of this bst.

     */

    public int height() {

      return height(root);

    }

    /**

     * Returns the height of node n in this bst.

     */

    private int height(Node n) {

      if (n == null) {

        return 0;

      }

      int leftHeight = height(n.left);

      int rightHeight = height(n.right);

      return 1 + Math.max(leftHeight, rightHeight);

    }

    ////////////////////////////////////

    // A D D I N G  E L E M E N T S //

    ////////////////////////////////////

    /**

     * Ensures this bst contains the specified element. Uses an iterative implementation.

     */

    public void add(T element) {

      // special case if empty

      if (root == null) {

        root = new Node(element);

        size++;

        return;

      }

      // find where this element should be in the tree

      Node n = root;

      Node parent = null;

      int cmp = 0;

      while (n != null) {

        parent = n;

        cmp = element.compareTo(parent.element);

        if (cmp == 0) {

          // don’t add a duplicate

          return;

        } else if (cmp < 0) {

          n = n.left;

        } else {

          n = n.right;

        }

      }

      // add element to the appropriate empty subtree of parent

      if (cmp < 0) {

        parent.left = new Node(element);

      } else {

        parent.right = new Node(element);

      }

      size++;

    }

  }

}