A small airline company needs a program to compute baggage charges. Write a program that asks the user to enter the weight of a passenger’s baggage. The program should display the baggage charge, which is calculated as follows. If the baggage weight is 50 pounds or less, the program should display “No Charge”. If the baggage weight is greater than 50 pounds, the baggage charge is $5.00 plus $0.95 for each pound over 50.
Technology Entrepreneurship
From a technology entrepreneurial perspective, the dangers of having exclusive focus on the product or service without due consideration to whether it sincerely addresses a real market or public concern raises numerous ethical issues. Address the following questions:
With the development of several COVID-19 smartphone applications used for tracking COVID affected people and virus heighten areas,
· Is this a possible violation of personal safety?
· Should all personnel be required to download and use the COVID app for monitoring and tracking purposes?
· What are crucial areas of commercialization of the COVID-19 smartphone app? Do you agree with the medical and social safety of their importance and if so why do you agree or disagree that commercialization of innovation is important.
· What are the external and internal environmental uncertainties?
· What is the risk profile associated with the smartphone tracking app?
· What other rewards besides financial and monetary gains can be obtained using this app?
NOTE:
- 5-7 pages in length (excluding cover page, abstract, and reference list)
- Include at least 5 online references to support your research.
- Assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end. Only use APA 7th edition. (There should be Abstract and conclusion)
Typing Test! MUST TYPE FAST and internet speed test. Due 10 mins after payment.
After completing the test you can download a certificate showing your test results.
If you make an error while typing, the cursor will stop until you type the right key. Do not use the backspace, simply retype the character.
Time does not begin until you press the first key.
If you are ready, you can start the test.
I will send the paragraph in a message.
Help
This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI). After reviewing the reading, please answer the following questions:
- What is your definition of AI? Please explain.
- What is your opinion of AI, is the technology currently available? Why or why not?
- Please note at least four AI technologies, explain if they are truly AI or something else. Thoroughly explain your answer.
- How is AI perceived as different in various industries and locations? Please explain.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Perform a Vulnerability Assessment of your place of employment or living area. (Security)
Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.
Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.
Please refer the attached template document for preparing the assessment.
For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each.
About HP (Hewlett Packard)
The paper needs to be in APA format
a. Why are Hewlett Packard (HP) solutions good for consumers and the business? (1 page)
i. Describe any policies that they have for their customers, suppliers, shareholders, employees, and society at large. Are there any conflicting policies?
b. The target market for HP (1 page)
Does Hewlett Packard (HP) have multiple target markets? Do they compete against each other?
I need at least 6 unique references that need to be journals or peer-reviewed articles. They need to be after 2010
Building Secure Web Applications
Submit final project materials.
- 500-700 word, double spaced, written in APA format, showing sources and a bibliography
- PowerPoint
Topic – WEB WAR I – ESTONIA ATTACK
Assignment #020
Computer Forensics
Assignment: Denial of Service ToolsLearning Objectives and Outcomes
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:
- Tribe Flood Network
- TFN2K
- Trin00
For this assignment:
- Search the Internet for information about these three tools.
- Provide a description of each of the three tools.
- Describe the damage or impact of denial of service attacks.
- Summarize the efforts used and solutions found to combat these attacks.
Required Resources
- Course textbook
- Internet
Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist
- I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
- I described each of the three tools.
- I described the damage or impact of denial of service attacks.
- I summarized the efforts and solutions found to combat these attacks.
Cryptography(subject) – Two page assignment for explaining and identifying differences between symmetric and asymmetric encryption and identify which one is the best
In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.