pseudocode

  

use pseudocode to write an object-oriented program that consists of class definition and main program to solve given problem-Write a program that inputs(from the user)the number of hours worked and hourly pay rate for employees and outputs their total pay. The program should process an arbitrary number of employee:the user will terminate input by entering 0 for hours worked and pay rate. Use a class called Worker with-Attributes:Hours,Rate,Total-Methods (), GetRate (), SetTotal (), and access methods (SetHours (),GetHours (),SetRate(), GetRate(), and GetTotal() )for each of the attributes…

Week 6 Discussion

This week we turn our attention to annotations.  Annotation is a crucial component of good data visualization.  It can turn a boring graphic into an interesting and insightful way to convey information.  This week, please navigate to any site and find a graphic that could use some annotation work.  Add the graphic and the website it is found as an attachment to this post and note what you would do to enhance the graphic and note why you would make these decisions.

In response to peers, add additional information to their posts noting what else could be done to enhance the graphic.

Write a paper with min of 3 pages APA Format with Summary, 7 References.

Write a min of 3-page APA-formatted report to answer the following questions. Make sure your analysis is detailed and your findings are clear. Remember to support your thoughts with a minimum of three (3) reliable academic or peer-reviewed resources besides the textbook. Note: Reliable means peer-reviewed or academic resources. While good technology business resources do exist such as Wired, Tech Republic, and CNET, these are not considered reliable for your academic work.

  1. Discuss the importance of following a well-integrated change control process on IT projects. What consequences can result from not following these best practices? 
  2. What types of change control would be appropriate for small IT projects? 
  3. What types of change control would be appropriate for large ones?

Computer and Information Networking

 

1. Why we need Component based design for software system developing? Is that a must or there are substitute approaches for developing software systems?

2. Explain why it is easier to develop automated unit tests than automated feature tests.

 

3. Since there are different data warehouse system available such as AWS, Snowflake,…etc.

If you want to retrieve some information/data/special topics from different warehouse system, what will you do? Such as what kind of steps needed to take and why shall we take those steps, or directly using keyword, etc. Note: you may need to concern about both of the efficiency and effectiveness (precision) performance.

4. What is data pipeline? List some advantages as using data pipeline.

discussion

 What are the principal benefits of developing a comprehensive project scope analysis?
(Note:  illustrate your point, include an example or case about a project) 

Textbook:

 • Project Management: Achieving Competitive Advantage (5th ed.) Jeffery K. Pinto
 

System Requirements

 Consider a system that could function as a Cloud solution. In order for that system to work as needed, several functional and non-functional requirements will be needed. 

  1. Write a 1-page paper describing at least 3 functional requirements and 3 non-functional requirements needed for the cloud solution. Your paper should also:
    • Explain what they do and why they are essential to the system.
    • Make sure those requirements take into consideration resource requirements, network requirements, and security requirements (attacks, mitigations, vulnerabilities).
  2. Remember to use proper APA formatting, including citations and references for all resources used.

Risk mitigation

 

Discuss web applications and risk to an organization. Include at least three examples of where web applications were compromised (such as the SQL injection hack at Qatar National Bank), and how security teams can assess and mitigate the relative risk of insecure web applications.

Your assignment should meet the following requirements:

  • 5-6 pages long, not including the cover page and reference page.
  • Conform to APA Style.
  • Support your answers with at least two current scholarly journal articles (not more than five years old). The Rasmussen Library is a great place to find resources.
  • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

Information security

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  1. What are risks that companies face because of their information systems?
  2. What are the implication of the risks to a company’s operations?
  3. How is risk accessed and what can companies do to combat the risks?

Due: Check Course Schedule for due date

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Data Analysis

 

In this assignment, you will perform an exploratory analysis that will allow you to get a feel for the data and start exploring potential relationships. This may include:

  • Descriptive statistics
  • Histograms
  • Bar charts
  • Heat maps
  • Line graphs
  • Box plots
  • Frequency tables

Once your analysis is complete, you will need to provide a Word document showing and describing the results of your exploratory analysis.