The purpose of this program is to

  

The purpose of this program is to process a sequence of points in a Cartesian coordinate system, and determine, for each point, whether it lies inside or outside of a forbidden region. The program begins by reading in the definition of the forbidden region, which is defined by a sequence of points defining the vertices of a polygon region. For example, the figure below depicts a forbidden region described by 7 points. 

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 

REQUIREMENTS

1. You must use as your main module the instructor supplied file “Prog1.cpp” without modification.

2. Your program’s output must appear exactly as shown in the sample run, producing exactly the same output format.

3. Use const definitions to define symbolic constants rather than hard-coding constants into your program. For example specify the array dimensions (size) with a symbolic constant. Then, it is easy to change the sizes of all of the arrays. Do not use #define to name constants.

4. Use descriptive names throughout your program. Strive to make your code so readable that is self-explanatory. If you can’t think of a meaningful name for a variable, constant, parameter, of function, then you don’t really understand your program.

5. Use a consistent indentation scheme to help show the structure of your program.

6. Use the required capitalization convention to distinguish variables from constants. The required convention is that constant names and function names have the first letter of each word capitalized (e.g., MaxSides), and variable names, member names, and parameter names, have the first letter of every word except the first capitalized (e.g.,

thePoint, numSides). Thus, constants and functions always start with a capital letter, and variables and parameters start with lower case. 

7. Include a sufficient number of comments to explain your program. See your instructor’s demo programs, which illustrates acceptable comment usage.

8. Do not use goto statements.

9. Do not use global variables. Define all variables inside function definitions.

10. No function definition may be longer than one page (60 lines).

11. Do not use redundant code. If you need the same procedure in more than one place, make it a function.

12. Keep your functions simple. If your program seems overly complex, it probably is. This means that you did not spend enough time designing, before you started typing code. KEEP IT SIMPLE!

13. Eliminate all compiler warning messages.

14. Use C++ style input/output. Do not use C-style input-output functions (stdio) such as printf(), scanf(), getchar(), putchar(), etc. 

ASKER only need to enter the code in the commented lines
.Incomplete

oldm wk1

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources

CWE

 

Common Weakness Enumeration Assignment

CIS244 – Network Security

Due: by 11:59pm EST on Sunday at the end of Unit 2

Write a paper discussing at least 7 Common Weakness Enumeration (CWE). Discuss how you would correct these issues in development of a software application or web application. Look at the Open Web Application Security Project (OWASP) and provide which tools would you use to test web applications for vulnerabilities.

The requirements for your paper are:

  • Compare and contrast a minimum of 7 CWEs.
  • Discuss how these weaknesses could be corrected.
  • Identify at least 3 tools that could be used to test web applications for vulnerabilities.
  • APA formatted including title page, reference page, and in-text citations.
  • Length of 2-3 pages, excuding the title and reference pages.
  • Minimum of 2 scholarly resources

Discussion 7- Project risk & Quality Mngt

Chapter 9: Risk Response and Treatment OptionsQuality Management Conference Paper :  https://www.pmi.org/learning/library/quality-management-software-development-programs-1059Quality Management Conference Paper: https://www.pmi.org/learning/library/initiating-planning-stages-project-quality-management-10Quality Management Conference Paper: https://www.pmi.org/learning/library/project-quality-assessment-potential-failure-8936Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:Risk concerns both positive and negative aspects of a possible event. For example, when the covid 19 crisis occurred it offered an unexpected business advantages or new product for certain organizations – a positive risk came to volition for these organizations. Also, the crisis offered an unexpected negative risk, where no one would come to a movie theatre – a negative risk volition.  

  1. How should an organization prepare for either type of event?
  2. How should a business avoid negative events occurring and enhance opportunity for positive events?

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

ITCO425U1IP

 

Assignment Description

In the fast-paced, evolving enterprise environment, there is a need to integrate systems, whether with recently acquired organizations or with the latest off-the-shelf technology. The challenge seems insurmountable without some formalized approaches, tools, techniques, and best practices to support the effort. You will select a manageable systems integration project so that you will have practice with all phases of the systems integration process, from determining enterprise integration requirements through the final implementation planning.

Project Selection

The first step will be to select an enterprise as the target for your systems integration project, along with a list of the major systems to be integrated within the target organization. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

  • Nontrivial: The selected enterprise should be large enough to reflect the need to integrate systems.
  • Domain knowledge: You should be familiar enough with the organization to allow you to focus on its system’s integration needs.

Select an enterprise that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first few days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment Guidelines

For the assignments in this course, you will be developing a comprehensive Systems Integration Design Proposal as your project. Your first task in this process will be to select an enterprise to use as the basis of your project. You will also create the shell document for the final project deliverable, which you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the analysis in your report, and assumptions may be made when necessary.

Following is an outline for the comprehensive design proposal that will evolve throughout the course. This deliverable will be created in incremental steps. For Week 1, submit the following for review by your instructor: the proposal shell and completed sections Project Information, Project Plan, and System Integration Best Practices, labeled “Week 1.”  The Requirements Specifications section will be completed and delivered during Week 2, and so on.

  • New Content (Week 1) 
    • Project Information
      • Provide a brief description of the enterprise (can be hypothetical) where the system integration design proposal has the potential of being adopted.
      • Describe the overall project objectives.
      • List the business or technical needs that will be met by the project.
      • List the major components of the project (major systems that will be integrated).
        • This list may change after further analysis is completed.
      • List the boundaries of the project (what the project will not address).
      • Material can be taken from the approved proposal that you submitted.
      • Be sure that this project is approved by the instructor.
    • Project Plan
      • This contains the work breakdown structure (WBS) for all of the tasks that will be required to complete the project.
      • Determine the start and completion dates (within the course’s start and end dates).
      • List other resources that are required to complete the project.
    • System Integration Best Practices
      • Based on what you learned during completion of the Discussion Board activity, identify best practice areas you will cover in your project.
      • Provide a diagram that shows the process flow that you intend to use for designing the systems integration architecture.
  • Make sure that the document is in APA format.

Business Ethics

Business Ethics:

 

–   Pick one of the following terms for your research: Morals, principles, values, corporate social responsibility, or ethical culture. 

–  The paper should have a definition, Summary and Discussion ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index. 

You MUST type all of your answers

  

· You MUST type all of your answers for each question in the space provided. 

· For full credit, you need to show all of your work when requested.

· You MUST save your exam file as “LastName, FirstName – Final” and place it in the Drop Box before the deadline specified in the ENGAGE online course shell. Note that you have a total of 6 hours (typed answers only) OR 80 minutes (handwritten answers) once you access the exam file.

· You can easily insert symbols by copying & pasting what you need from the following list. 

  1. [5 pts] Given the word below, tell what characters      are stored in the computer memory. We assume our computer uses 8 bits      to represent a single character. Use the ASCII table and show all of your      work.
  2. [5 pts] Given the word below, tell what decimal      number (base 10) is stored in the computer memory. We assume our      computer uses 16 bits to represent an integer. Show all of your      work. 
  3. Write a Formal Negation for the      following statements using symbols (/) and      variables. There is no partial credit for this problem.
    1. [5 pts] qR such       that q < 0 and qq3.
    2. [5 pts] bZ, if 2 b,       then b is odd.
  4. In the questions below, suppose A = {a, b, c} and B = {a, b, {c}, d}.
    1. [5 pts] Is A Í B.? Make sure to justify       your answer.
    2. [5 pts] Find the power set of A: P       (A)
  5. [5 pts] Show the following number is a      rational number. Show all of your work.
  6. [10 pts] Use the Euclidean algorithm to      calculate the greatest common divisor of the following pair of integers:      2431 and 4131. Show all of your work. 
  7. [10 pts] Disprove the following      statement:
  8. [10 pts] Write a proof by contraposition      of the following statement:
  9. You need to show that the following      equality is false by doing the following:
    1. [5 pts] Draw a Venn diagram for each       side.
    2. [5 pts] Disprove the equality
  10. [10 pts] Write a proof by contradiction      of the following statement.

Exp19_Excel_Ch10_ML1_Dow_Jones

 #Exp19_Excel_Ch10_ML1_Dow_Jones

 #Exp19 Excel Ch10 ML1 Dow Jones 

 #Excel Chapter 10 Mid-Level 1 – Dow Jones 

  

Project Description:

You are an intern for Hicks Financial, a small trading company located in Toledo, Ohio. Your intern supervisor wants you to create a report that details all trades made in February using current pricing information from the Dow Jones Index. To complete the task, you will import and shape data using Power Query. Then you will create data connections and visualizations of the data.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch10_GRADER_ML1-Dow.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Use Get & Transform tools to   import and transform Table 0 located in the file e10m1Index.txt. Split the company column using space as the   delimiter at the left-most occurrence. Rename the respective columns Symbol and Company. Remove the columns Change, %Change, and   Volume. Name the table Dow and load it to the existing worksheet.

 

Name the worksheet Current_Price.

 

Use Power Query to import trade   data located in the workbook Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv.   Before loading the data, if necessary use the Power Query Editor to remove   the columns that contain NULL values. Split the company column using the left   most space as the delimiter and rename the respective columns Symbol and Company Name.

 

Rename the worksheet Trades.

 

Add the Dow table and the Exp19_Excel_Ch10_GRADER_ML1-TradeInfo   table to the Data Model.

 

Use Power Pivot to create the   following relationship:
 

  Table
Exp19_Excel_Ch10_GRADER_ML1-TradeInfo
 

  Field
Symbol
 

  Table
Dow
 

  Field
Symbol

 

Use Power Pivot to create a   PivotTable with the EXP19_Excel_Ch110_GRADER_ML1_TradeInfo Date field as a   Filter, Last Price as a value, and the Dow table Company Name as Rows. 

 

Create a Clustered Column   PivotChart based on the PivotTable that compares the trading price of Apple   and Coca-Cola stocks.

 

Add the chart title Trading   Comparison,   apply Accounting Number Format to cells C4:C5, and name the worksheet Price_Comparison.

 

Delete Sheet 1, if necessary.

 

Save and close Exp19_Excel_Ch10_GRADER_ML1-Dow.xlsx   and Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv.   Exit Excel. Submit the file as directed.