To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

Sleuth kit tools

Use The Sleuth Kit tools to analyze the “able2.dd” disk image following the procedure outlined in this weeks lecture. Submit a PDF of your forensic documentation.

https://www.sleuthkit.org/sleuthkit/download.php

Discussion

COURSE:  InfoTech in a Global Economy 

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

 please cite properly in APA 

 At least one scholarly source should be used in the initial discussion thread. 

Project 1: Job Interview Presentation

This week, you will submit your answers to the interview questions.

If you didn’t download the Job Interview Presentation Template from Week 3, do so now and follow the instructions to record your work.

The questions are based on fundamental networking concepts that are likely to be asked at an entry-level networking job interview. The following topics are covered:

LAN topologies
OSI model and layers
networking devices
common protocols
IP ranges
class of network and default subnet mask
autonomous system
You will also need to include either an audio file along with your presentation or record a screen-capture video of the presentation. These presentation resources can help you prepare and record your presentation. Your presentation should be done as if you were in an actual interview. The presentation should be about five to 10 minutes.

How Will My Work Be Evaluated?

As you progress in your networking career, you will interview for positions and may even find yourself making presentations to customers, client audiences, and management. Effective interviewing includes a systematic, purposeful conversation. Your goal is to demonstrate your knowledge, skills, and/or experience; and ability to do the job successfully. You can achieve this by explicitly and confidently answering the questions posed.

The interview questions selected are likely to be asked during an interview for an entry-level networking position. Successfully answering these questions conveys a foundational networking knowledge that will help you land the position! Use the provided PowerPoint template to document your answer, then record yourself answering each question. Submit to the Assignment folder when complete.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.2: Support the main idea and purpose of a communication.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder

SE491 week 3 assignment

import java.util.*;

 public class Payroll

{

 public static void main(String args[])

 {

 String lastName;

 double hours, netPay, grossPay;

 double STD_PAYRATE = 15.50;

 double WITHHOLDING_RATE = 0.20;

 System.out.println(“Enter employee last name: “);

 Scanner input = new Scanner (System.in);

 lastName = input.nextLine();

 System.out.println(“Enter hours worked for  ” + lastName +” >> “);

 hours = input.nextDouble();

 grossPay = hours * STD_PAYRATE;

 netPay = grossPay – (grossPay * WITHHOLDING_RATE);

 System.out.println(“Net pay for ” + lastName + ” who worked for ” + 

 hours + ” hours is $” + String.format(“%.2f”,netPay));

 }

}

Research paper week 5 develop a computer and internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 **** Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, Use Calibri, 11 pt not including the required cover page and reference page. Try dividing your paper into section with section headers.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. 

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Favorite topic “Cloud Computing Risks”

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

QUESTION: Please summarize your favorite topic “Cloud Computing Risks” discussed in class explaining why.

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

Make sure you are using at least (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

INT 1010 assignment 7

  Please complete the steps below and upload your Excel workbook assignment under Chapter 7 Assignment Submit Here.

  1. Open a blank Excel workbook
  2. Create the following headers in row 1
    1. Class Date
    2. Topic of the week
    3. Assignment
    4. Due Date
    5. Possible Points
    6. Points Earned
    7. Grade
  3. Format Class Date column with MM/DD/YY format
  4. Format Due Date column with MM/DD/YY format
  5. Format Possible Points column as a Number with 0 Decimal Places
  6. Format Points Earned column as a Number with 0 Decimal Places
  7. Format Grade as a Percentage with two decimals
  8. The calculation for the grade column is Points Earned divided by Possible Points.  Complete for each topic. (use formulas)
  9. Enter a Row for assignment per the detailed schedule
  10. Enter all the Points Earned in the Points Earned Column (use formulas)
  11. Calculate the Grade for each Points Earned in the Grade Column (use formulas)
  12.  Add the sum of the column labeld Possible Points (use formulas)
  13. Add the sum of the column labeld Points Earned (use formulas)
  14. The Grade Column is the calculation for the sum of all Points Earned divided by the sum Possible Points (use formulas)
  15. Save the file as Excel_Database_StudentFirstandLastName and submit.