IT473: Interactive Computer Graphics

Weekly Assignment/Discussions via Unicheck:

Question 1: [See module video]

a. Calculate the reflection of the image below about the x-axis.

b. Graph the positions of the image in its original and reflected locations

Question 2:

a. Calculate the reflection of the image below anticlockwise about a 45o line.

b. Graph the positions of the image in its original and reflected locations.

Question 3: RESEARCH

a. Calculate the rotation of the image below 90o .

b. Graph the positions of the image in its original and rotated locations.

CSS and SASS style sheet

Hi, this assessment is very urgent.

I have a website for you to work on, you will have to work through the material and add CSS selectors and SASS elements. 

Please get in touch asap if you are interested

Thanks

Risk Assessment Tools

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

If you were tasked with assembling a ‘toolkit’ using only free or open source tools to perform network security assessment.

(1)What software applications or “tools” would you use? 

(2)What platform (Operating System) would you use?

(3)How does this toolkit differ from that you would use for an application security assessment, wireless security assessment?  You can list other types of related assessments if you know if how you might adjust for the given scenario.

Exp19_Access_Ch08_HOEAssessment – Real 1.0

 Exp19_Access_Ch08_HOEAssessment – Real 1.0

  

Project Description:

In this project, you will work with a database that tracks real estate agents and their property sales. You will add a hyperlink field that will store a link for each agent’s website. The HR department manager wants to store a photo for each agent as an attachment. You also export data from the database to three different formats. Finally, you import information from Excel, Access, and text files.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch8_HOEAssessment_Real.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

You will add a hyperlink field   to the Agents table to store each agent’s website address.
 

  Create a new field in the Agents table after PerformanceReview named Website with the Hyperlink data type.   Save the table.

 

Switch to Datasheet view, add   the website https://juanrosario.biz to the first AgentID (record   1). Close the table.

 

You will add an attachment field   to the Agents table to store the employees’ performance reviews and photos.
 

  Create a new field in the Agents table after PerformanceReview named EmployeeFiles with the Attachment data type.   Save the table.

 

Switch to Datasheet view and add   the downloaded the picture file named Juan.jpg   to the EmployeeFiles field for the first AgentID (record 1).

 

Create a basic form based on the   Agents table; the form will open in Layout view. For the first AgentID   (record 1), click the picture to   display the Attachment toolbar. Click Manage   Attachments to display the Attachments dialog box and then click Cancel. Save the form as Agents.   Close the form and the table.

 

You want to determine current   sales for a specific agent. You will filter the Sales Report query to locate   records and export the records to Excel and Word. You will also export   records to create a report in PDF format.
 

  Open the Sales Report query. Use Filter by Selection to display records in   the LastName column where the value equals Yang. Export the filtered records to an Excel file. Save the file   as a08c1Yang_LastFirst. Do not save the export steps.

 

Hide the Sale Price field from the datasheet results in the Sales Report   query. Export the same filtered records to a Word file. Open the destination   file after the export operation is complete. In the document, press ENTER one time and add the title Hart   Commissions to   the file. Format the title as bold and center aligned. Save the file as a   Word document with the name a08c1Yang_LastFirst. Close the document and exit Word. Do not save the   export steps. Save and close the filtered Sales Report query.

 

Use Filter by Selection to   display records in the Properties table where the Beds value equals 4 (twelve records will display).   Export the records to a PDF document. Save the file as a08c1FourBeds_LastFirst. Close the PDF reader program.   Do not save the export steps. Save and close the filtered Properties table.

 

You will import a new Customers   table from Excel.
 

  Open the a08c1Customers.xlsx   workbook, examine the Customers worksheet, and then close the workbook.   Create a linked table in the database by importing the workbook named a08c1Customers.xlsx. Use the first row   of the Customers worksheet as column headings and accept all other default   options.

 

You will also import subdivision   records from an Access database.
 

  Open the a08c1SubDivisions.accdb   database, examine the SubDivision2 table, and then close the database. Create   a linked table in the database by importing the SubDivision2 table from the   database named a08c1SubDivisions.accdb.

 

You will import additional   subdivision records from a text file.
 

  Open the a08c1TextSub.txt text   file, examine the content, and then close the file. Create a table in the   database by importing the text file named a08c1TextSub.txt.   Use the first row of the file as field names, SubDivisionID as the primary   key, and name the table SubDivision Text. Accept all other default options.

 

Append the 5 records from   SubDivision2 and the 5 records from SubDivision Text to the SubDivision   table. Open the SubDivision table to view the appended records. Close the   SubDivision table.

 

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Review Company's Security Policy

 you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

ECE 175: Computer Programming for Engineering Applications

ECE 175: Computer Programming for Engineering Applications

Homework Assignment 7

Conventions: Name your C programs as hwx py.c where x corresponds to the homework number and y corresponds

to the problem number. As an example the C program for hw1 problem 1 should be named as hw1 p1.c. Write

comments to your programs. Programs with no comments will receive PARTIAL credit. At each program you turn

in at least the following info should be included

– Author:

– Date created:

– Brief (two-line) description of the program:

Submission Instructions: Use the dropbox on D2L to submit only the .c les.

Problem 1: The les in sudoku.zip contain integer values for Sudoku puzzles (two dimensional integer arrays with

9 rows and 9 columns). Write a program that reads a sudoku le as input and prints out if the le is a proper

solution to the Sudoku puzzle.

For the rules of Sudoku, check Wikipedia: http://en.wikipedia.org/wiki/Sudoku.

Example of a correct Sudoku puzzle:

1 2 3 4 5 6 7 8 9

4 5 6 7 8 9 1 2 3

7 8 9 1 2 3 4 5 6

2 3 4 5 6 7 8 9 1

5 6 7 8 9 1 2 3 4

8 9 1 2 3 4 5 6 7

3 4 5 6 7 8 9 1 2

6 7 8 9 1 2 3 4 5

9 1 2 3 4 5 6 7 8

Problem 2: Insertion Sort is a sorting algorithm that moves the elements of an array to their correct position

one element at a time. The following example shows the steps for sorting array data= [3, 7, 4, 9, 5, 2, 6, 1]. In

each step, the item under consideration is underlined. The array before the underlined element is already sorted

while the array after the underline element is unsorted. The item that is moved (or left in place because it was the

biggest yet considered) to the correct position within the sorted part of the array. The new position of the element

that was moved in the previous step, appears in bold in the next step.

3 7 4 9 5 2 6 1

3 7 4 9 5 2 6 1

3 7 4 9 5 2 6 1

3 4 7 9 5 2 6 1

3 4 7 9 5 2 6 1

3 4 5 7 9 2 6 1

2 3 4 5 7 9 6 1

2 3 4 5 6 7 9 1

1 2 3 4 5 6 7 9

1

Develop C code that would implement the Insertion Sort algorithm. Your code should use the following functions

void insertion(int x[ ], int size)

void print ar(int x[ ], int size)

void swap(int *a, int *b)

The last two functions are already provided in the class notes.

Submit your .c les named hw7 p1.c and hw7 p2.c via D2L dropbox

2

Case Study Analysis

 Read the Module 1 Case Study Assignment 1 and address the following question in a word document and then submit/upload your document. Document format is listed below.

Question: In approximately two pages, compare the benefits and drawbacks of Google Wallet and Apple Pay from a consumer’s standpoint, a retailer’s standpoint, and a bank’s standpoint.

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1-inch margins on all sides
  • References should be identified/listed on a separate page (last page of submission). All references must follow APA format.
  • Save in Word Document

 Case Study 1:  Digital Wallets on Mobile Devices: Apple and Google

One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could account for half of all online retail sales by 2017.Google introduced one of the first digital wallet products that would work on a mobile device in 2011 when it also introduced support for the operation of NFC chips in its Android mobile operating system. Google Wallet stores a MasterCard account for users that agree to maintain a cash balance with the card’s issuing bank, so it operates essentially as a debit card. Google Wallet does not charge a fee to merchants or the MasterCard issuing banks, nor does it charge a transaction fee. Instead, it generates revenue from advertisers who pay to display ads, offer coupons or other promotions (specific ads are displayed based on the mobile device’s proximity to the stores that are making the offers). Google Wallet has been slow to catch on with users.In 2014, Apple introduced a digital wallet product for its mobile devices called Apple Pay. In operation, Apple Pay is similar to Google Wallet; however, the infrastructure and revenue model is different. Apple Pay charges the issuing banks a fee of 0.05 percent of the transaction amount and guarantees each transaction; that is, if the transaction is fraudulent, Apple will cover the loss. Credit card companies normally charge merchants a fee ranging between 2 and 3 percent of the transaction amount, so the additional Apple Pay fee serves as a low-priced insurance plan for them. Consumers will not be charged at all for using Apple Pay and will not be given advertising messages. Further, Apple has stated that it does not collect information about consumer buying habits from Apple Pay data. Apple arranged for American Express, Discover, MasterCard, and Visa credit cards to be included in their system, along with a group of large card-issuing banks. They also included major retailers such as Bloomingdales, Disney, Staples, Walgreens and Whole Foods. These participants will be able to collect data on consumer buying habits, but only on those consumers that use their card or shop at their stores. Apple reported that more than a million credit cards were registered with Apple Pay in the first three days it was available. After Apple Pay’s introduction, an increase in the number of retailers that accept NFC payments (as you learned in this chapter, NFC technology is used by both Google Wallet and Apple Pay) caused an increase in the use of Google Wallet. 

(Schneider 499)

Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.