MIPS Programming

  

MIPS Programming: Write a program that reads up to 15 temperatures into a static array, and then prints out the average temperatures to 5 decimal places using only integer commands. It will stop taking input when a -761 is entered. Valid temperatures are from -200 to 1000 degrees exclusive of the end points. It will then output the total, the count and the average to 4 decimal places using Integer Commands. It will do all the work in subprograms/functions and use to appropriate registers to pass information. There will be at least 3 subprograms. The first subprogram will receive the base address of the array and the maximum number of elements as arguments into the subprogram. It will return the number of valid elements read. The second subprogram will receive the base address of the array and the number of the valid elements as arguments into the subprogram. It will return the total of the valid elements in the array. The third subprogram will receive the total and count as arguments into the subprogram. It will output the total, count and the average to 5 decimal places or a message that there was no valid input. It will return nothing. Sample: Run 1 Enter a temp (>-200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and -200 and < +1000 degress fahrenheit) or -761 to exit: -761 The total is: -1 The count is: 2 The average temperature is: -0.50000

Project 1: Virtualization Assignment

 For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.

Step 1: Set Up and Log Into Your AWS Academy Account

CMIT 495 requires you to complete hands-on assignments in a virtual environment. We will be using Amazon Web Services (AWS) as our virtual environment. Amazon offers a free account for those that register.  UMGC will automatically add you to an AWS Academy Learner Lab. However, you still need to set up and log into your AWS Academy account to get started.

Review the following AWS Academy (Student Guide) to set up and log into your AWS Academy Account, then access and use your Learner Lab. Be sure to read the guide carefully before proceeding:

Note: The AWS Academy Learner Lab (Student Guide) provides students with instructions for using AWS Academy Learner Labs. The Learner Lab offers a lab environment suitable for student projects over a period designated by the department. 

Step 2: Download the Week 1 Project Template

Download the template you will use to submit your project. (Virtualization Assignment 1 Template)

Step 3: Install and Configure an AWS EC2 Instance (Virtual Machine)

Using the newly created AWS free account, install and configure an Ubuntu Server virtual machine (VM) using the most recent version of the 64-bit operating system.

You will need to provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, including screenshots of each step in the process in the Week 1 Assignment Template.

Review the following documentation detailing an overview and step-by-step procedure on how to install and configure an AWS EC2 instance. 

Step 4: Complete the Week 1 Project and Upload to the Assignment Folder

Answer the questions and embed the appropriate screenshots of your Ubuntu server installation. When providing a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, make sure to include screenshots of each step in the process. Further details and instructions are included within the Week 1 Assignment Template.

Explain how to develop null and alternative hypotheses.

   Provide detailed answers for each
1. Explain the central limit theorem. (Ch 22(07), 10 points)
2. Describe the advantages and disadvantages of stratified random sampling, cluster sampling, and systematic sampling. (Ch 22(07), 10 points)
3. Describe hypothesis testing and explain how to develop null and alternative hypotheses. (Ch 23(09), 10 points)
4. Compare type I and type II errors. (Ch 23(09), 10 points)
5. Explain and compare independent simple random samples and matched samples. (Ch 24(10), 10 points) 

300 words project (Mobile security)

 

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

Note your safe assign score. Score should be less than 25

    Submit a brief abstract describing your final project. 

Final Project: Design with Focus on Business Continuity Assignment

  

Overview

This phase of the project completes the design phase and develops a business continuity and disaster recovery plan for the final solution. This phase of the project must include the secured design diagrams that minimize risk and appropriately address the threats identified in Project 1: Problem Identification Assignment. Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Any single points of failure must be addressed with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.

Instructions

Each design must be justified by the textbook and peer-reviewed research. You will be evaluated based upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities. For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.

Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.

At the minimum, this phase of the project must include:

I. Executive summary and introduction

II. Systems Design

a. Detail the final systems design, supporting the results given the original review of the literature and the analysis performed in Project 2: Methodology Development Analysis Assignment

b. Design the final solution

i. Target of the attack

ii. Vulnerability

iii. Control

c. Create the appropriate design diagrams for the secured solution

d. NOTE: Required minimum length (8 peer-reviewed sources and at least 10 double-spaced, current APA-formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements

III. Business continuity and disaster recovery plan (must be supported by relevant and current research from scholarly, peer-reviewed journals)

a. Basic BCP Policy

b. Basic business impact analysis (BIA)

c. Preventative measures

d. Recovery and restoration

IV. Project conclusion

a. Summary of the solution

b. Future recommendations and implications for business

c. Final project conclusion

V. Diagram examples in this phase could include but are not limited to:

a. Secured and hardened advanced system and/or network architecture diagrams

b. Secured package, design class, system security, and system control diagrams

c. Secured CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings

d. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram, add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Project 1: Problem Identification Assignment

Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Project 2: Methodology Development Analysis Assignment – Communication and interoperability with existing networks must be protected by the NGN’s security architecture NEXT GENERATION NETWORK (NGN)

Management Information system.

 

Please upload your Project Topic here. Remember this should be a research paper with references,.

Possible topics (these are examples)

–Virtual teams in IT project management

–Agile project methodologies

–Social networking and quality of life/productivity

–COVID and work-life balance

–Need Blackboard submission of project topic and 200 words on what you would like to cover in the paper. 

Many websites ask for phone numbers

  

Lab #09 Flowchart
Many websites ask for phone numbers. The problem is that there are many different ways to represent a phone number. Examples include 817-555-1234, 817 555 1234 (c), and (817) 555-1234 x23. Write a Raptor program which inputs a string containing a phone number in any format and outputs it in the standard format. For this assignment, the standard format is (817) 555-1234.
Your Raptor program should:
1. Input a string including the number
2. Copy only the digits from the input string into another string
3. Issue an error message if the input string does not contain at least 10 digits
4. If the input string contains more than 10 digits, include only the first 10 digits in the formatted number
5. Output the phone number in standard format
Notes:
1. In Raptor, a string is just an array of characters.
2. Lesson #9 has an example of working with strings in Raptor.
3. When only digits are input, Raptor assumes it is an integer instead of a string. Your flowchart does not need to properly handle an input like 8175551234, but your C++ version does need to handle that.
4. I recommend passing the digits only string to a procedure which outputs it in the standard format.
Sample Output (inputs in bold)
Please enter a phone number: 817-555-1234
The properly formatted number is (817) 555-1234
Please enter a phone number: (817)515 7259 x23
The properly formatted number is (817) 515-7259
Please enter a phone number: 214-555-999
The phone number must have at least 10 digits
Please enter a phone number: 800**4444xxx333
The properly formatted number is (800) 444-4333

 

Lab #09 C++ 

using the flowchart for Lab #09 as a guide, write a C++ program that also inputs a phone number and displays it in the standard format, (817) 555-1234. Your program may use either C-Strings or the C++ string Class, but should not mix them. Chapter 10 has examples using both kinds of strings. 

Test your program to make sure it works properly, and then upload just the .cpp file. 

Exp19_Access_Ch02_ML1 – Game Collection 1.2

  

Project Description:

You have cataloged your vintage video games in an Access database. In this project, you add two tables to a database you have started? One to identify the game system that runs your game and the other to identify the category or genre of the game. Then you will join each table in a relationship so that you can query the database.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch02_ML1_Games. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Games table and review the fields containing the game information. Close   the table.
 

  Create a new table in Design view. Add the field name SystemID and select AutoNumber as the Data Type. Add the caption System ID. Set the SystemID field as the primary   key for the table.

 

Add   a second field named SystemName   with the Short Text Data Type.   Change the SystemName field size property to 15.   Add the caption System Name.   Save the table as System.

 

Switch   to Datasheet view and enter the following system names, letting Access assign   the System ID:
 

XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
 

  Double-click the border to the   right of the System Name column to set the column width to Best Fit. Save and   close the table.

 

Create   a new table in Design view. Add the field name CategoryID   and select AutoNumber as the Data   Type. Add the caption Category ID.   Set the CategoryID field as the   Primary Key for the table.

 

Add   a second field named CategoryDescription   and accept Short Text as the Data   Type. Change the field size property to 25.   Add the caption Category Description.   Save the table as Category.

 

Switch   to Datasheet view, and enter the following Category Description, letting   Access assign the Category ID:
 

Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
 

  Close the table.

 

Establish   relationships in the database by adding the Category, Games and System tables to the Relationships   window. Close the Show Table dialog box. Create a one-to-many relationship   between the SystemID field in the System table and the SystemID field in the   Games table, enforcing Referential Integrity. Select the option to cascade   update the related fields.

 

Create   a one-to-many relationship between the CategoryID field in the Category table   and the CategoryID field in the Games table, enforcing Referential Integrity.   Select the option to cascade update the related fields. Save and close the   Relationships window.

 

Create   a simple query using the Query Wizard. From the Games table, add the GameName and Rating fields (in that order). Save the query using the title Ratings. Switch to Design view. Sort the   Rating field in ascending order.

 

Click   the gray column selector at the   top of the Rating field, then click and drag the column to move it to the first position of the query design grid.   Add a Total row, click in the Totalrow   of the GameName column, click the arrow,   and then select Count. The records   will be grouped by rating, and the number of games will be counted for each   group. Run, save, and close the query.

 

Create   a new query in Design view. Add the Category,   Games, and System tables to the query design window. Add the following   fields to the query (in this order).
 

GameName

CategoryDescription
  Rating
  SystemName
  DateAcquired

 

Sort   the query in ascending order by GameName and run the query. Save the query as   Game List and close the query.

 

Copy   the Game List query in the   Navigation pane and paste it with the name PS3 Games.   Modify the query in Design view by using PS3   as the criteria for SystemName. Remove the sort by GameName and sort in   ascending order by CategoryDescription. Save and run the query. Close the query.

 

Create   a new query in Design view. Add the Category,   Games, and System tables to   the query design window. Add fields (in this order) to display the name of   the game, its rating, the category description of the game, and the system   name. You only want to display Wii games with a rating of Everyone or Teen.   Because the system name is the same for the games you plan to pack and share,   hide this value from the results. Save the query as Thanksgiving Games and run the query. Close the query.

Job Market Projection (Individual Assignment)

 After  loading “Labor Market 2018 & Projected 2018–28” data set (you can  download it in this assignment folder), please answer below questions.  (Data is provided by U.S. Bureau of Labor Statistics, https://www.bls.gov/careeroutlook/2019/article/wages-and-openings.htm)

Create  a scatter plot that shows “Median Annual Wage 2018” in Y axis and  “Annual Average Openings, Projected 2018-2028” in X axis, bubble sized  by number of records and colored by occupational group. 

Please create  your title of this figure and copy and paste it on this below box

Q1)  Please locate the jobs that are related to data systems in this data.  What are the median annual wages in 2018 and annual average openings  projected from 2018 to 2028?

Q2)  After exploring the data, are you willing to have this job for your  future career?  If you changed your mind, why? Then, locate the jobs  that interest you for your future placements and lable them in your  figure. Please elaborate on your decision.