To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

Module 6: Analyzing an Algorithm

One can define an algorithm as a set of guidelines that describe how to perform a task. Given this definition, discuss how you would analyze an algorithm for correctness and efficiency. Conduct some research to assist you with your answer.

Project- Exe Res

The movie “The Martian” can be viewed through the framework of project management. There are two different but simultaneous projects going on in The Martian. One is the survival project of Mark Watney and the other is the project aiming to save him. Watney has the right skills for his survival project: he’s a botanist, he knows how to repair a broken Pathfinder and the most important thing is he doesn’t panic even in his first day alone on Mars. On the other hand, he’s not alone in this project. The members of the ‘remote’ team helping him are trying their best to achieve their goal. This is a good example for the importance of the communication between the team even if they are far away!

For this assignment, as we watch the movie, you will be required to address the following questions and answer them.  

·  Submitted through SafeAssign for originality, scores must be below 25%.

·  Follow APA formatting guidelines (i.e. include a reference page) Do not allow your margins to be reduced by utilizing bullet point margins. This will lead to point deductions. Only Pinto textbook needs to be cited; do not worry about citing the movie. 

See project management processes below. For which you must 

1) provide a brief description of each process, 

2) describe how Mark Watney or one of the project teams manages this process, and 

3) provide a specific example of the management of this process from the movie and why this is a good example. 

Project management process- Monitor Risk (Provide answers for above question in this project management process)

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Business Intelligence Discussion

 Discussion  (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

 
Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

cyber security discussions

1)  The student will successfully discuss current computer technology and principles used to secure computer systems. Specifically: discuss cryptography, authentication, AND access control. (300 words min).

2)  The student will successfully discuss current cyber security as it relates to IoT software protection mechanisms used to protect the consumer (i.e. cryptography, encryption, etc.). 300 words min

Number Sorting

  

Number Sorting

In this lab activity you are requested to an array of fifty numbers in ascending order. 

The task required:

· Obtain an Arduino Uno Board and connect it to the PC.

· From the computing programmes select Arduino program.

· The numbers are in the range of 0 to 255. 

· The result needs to be displayed on eight L.E.Ds on Ardunio board, and on the serial monitor.

· Write a hierarchal and structured programme in “C” and test its functionality using.

Write the same program using recursive functions.

You need to demonstrate the work in the lab within the time specified.

You will be assessed in the lab.

Project 1: Vulnerability and Threat Assessment Step 12: Write Overview and Compile Final Vulnerability and Threat Assessment Report

You have reached the final step. Use the Final Vulnerability and Threat Assessment Report template in preparing the final report. In APA style, write an overview and compile all the sections prepared throughout the project into a report according to the template.

Since this report will be delivered to Maria and other top executives, tailor your writing to the appropriate audience. Be sure that coherent paragraphs or points are developed so that each is internally unified, functioning as part of the whole document.

Final Vulnerability Assessment Report

Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.

Final Vulnerability Assessment Report (seven- to 10-page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:

  • Title Page
    • Include:
      • for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
  • Table of Contents
    • with all sections
  • Overview (introduction and purpose)
    • Include mission-critical aspects of current organizational processes:
      • personnel
      • physical security
      • network security
      • cybersecurity
  • Scope of Work (one-page report: Assignment 1, Steps 1 and 2)
    • Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects
  • Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)
    • Include key elements that need to be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Threats and Vulnerabilities Report (two- to three-page report: Assignment 3, Steps 4-6)
    • Include:
      • explanation of threats and vulnerabilities
      • classifications of threats and vulnerabilities
      • prioritizations of threats and vulnerabilities 
  • Lessons Learned Report (two- to three-page report: Assignment 6, Steps 9 and 10)
    • Include:
      • reviewed and recorded findings
      • consider the report’s approach including:
        • factors
        • assessment completion
        • next steps
        • other issues to address
  • Network Analysis Tools Report (one- to two-page report: Assignment 4, Step 7–include as Appendix A)
    • Include comprehensive recommendations of all components within each key element that should be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8–include as Appendix B)
    • Assess vulnerabilities of your organization

 

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.

PowerPoint_2G_Wedding_Services

#PowerPoint_2G_Wedding_Services  

#PowerPoint 2G Wedding Services

Project Description:

In the following project, you will format a presentation describing some of the wedding services offered by The Big Event Production and Entertainment.

     

#On   Slide 1, format the subtitle-Floral and Lighting Design-as a WordArt using the first   style in the second column. Change the Text Fill to Black, Text 1.

 

 

#Select the picture and then Crop   the image from the bottom so that the bottom-center crop handle aligns with   the lower half of the vertical ruler at 2.5 inches.

 

Change the picture Height to 3 and then apply a Glow: 5 point;   Dark Teal, Accent color 1 picture effect to the image. Align the picture and   title using the Align Selected Objects command to apply Align Top.

 

#On Slide 1, insert a Text Box   anywhere in the green content placeholder on the bottom of the slide. In the   text box, type The Big Event Production and Entertainment and then using the Align to   Slide option, apply the Align Center and Align Bottom alignment commands.

 

On Slide 2, remove the bullet symbol from the paragraph, and then   change the Shape Fill to the second color in the fifth column, and the Shape   Outline to Black, Text 1.

 

#On Slide 3, convert the bulleted list to the List type SmartArt   graphic-Vertical Curved List. Change the color to Colorful Range – Accent   Colors 4 to 5, and then apply the Simple Fill style.
 

  Note—Mac users, convert to any SmartArt style, and then change to Vertical   Curved List.

 

On Slide 4, change the bulleted   list to Numbering.

 

On Slide 5, in the placeholder on the right, insert an Online Picture   by searching for full bloom rose then insert the picture of the large single rose. Select and delete   any additional text boxes that may display when the image is inserted. To   avoid file size limitations, compress the online picture once it is inserted.
 

  Note—alternatively, search for an image in a web browser, and then download   and insert a relevant image from the results.

 

Remove the background from the   picture using the default selected area, and then apply the Glow: 18 point;   Brown, Accent color 6 picture effect.

 

 

On Slide 5, change the bullet   symbols to Star Bullets, change the Color to the first color in the last column,   and then change the Size to 80.

 

On Slide 6, from the Shapes gallery, under Basic Shapes, insert a   Diamond of any size anywhere on the slide. Resize the diamond so that its   Shape Height is 6 and its Shape Width is 8. Using the Align to Slide option, apply the Align Center, and Align   Middle alignment commands to the diamond shape. Apply the Intense Effect –   Dark Teal, Accent 1 shape style.

 

In the diamond, type The Big Event   Productions and Entertainment (no period). Change the Font Size to 36, and then, to the diamond   shape, apply the Round Convex Bevel effect to the diamond shape. Note—this   effect may be called Art Deco on some systems.

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, a Footer with the text 2G_Wedding_Services

 

Save and close the file, and   then submit for grading.

data mining in Business intelligence

 What are the privacy issues with data mining? Do you think they are substantiated? 

 Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.