java

he chart below lists the 2020 season passes for skiers at the Massanutten Ski Resort theme park in Massanutten, VA. You must write a program that calculates the season ticket price for a customer who may be purchasing as an individual or for a family. First, you must ask the customer for their last name as input into the program. Then, you must ask the user if they are purchasing a Family Pass or Individual Pass. If they are purchasing a Family Pass, then you need to display the menu options for purchasing a Special Value Pass for Family of 4 or Full Season Pass for Family of 4. If they are purchasing an Individual Pass, then you need to display the menu options for purchasing a Special Value Pass or Full Season Pass or Student Full Season Pass. After the pass is chosen by the user, you will need to ask the customer if they are active duty military or a veteran since a military discount will be given for 10% off of any pass purchased. You will need to calculate the military discount amount for those receiving it. You will need to calculate the Final Price by taking the price for the pass that the customer has chosen less the military discount amount. Display details to the customer that include the customer name, pass purchased, pass price, military discount amount given if any, and the final price. See the test cases below to see the exact order of menus to use when writing the program. You will need to format monetary amounts with 2 decimal places. This requires use of the printf command to create the columns and control decimal places. You must ensure that if the user enters lower case or upper case responses, that your decision structures will process the customer correctly. You must use a char data types and string data types in the menus as shown.

Discussion 13 – Enterprise Risk Management

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

IDM W 5 D

 I want you to post the particular data analytics tool that you used for the midterm project. Provide the benefits and limitations of the tool.  

bi-7 assignment

1. Explain the relationship among data mining, text mining,and sentiment analysis.

2. In your own words, define text mining, and discuss its most popular applications.

3. What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

4. What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining. ?

5. Go to teradatauniversitynetwork.com and find the case study named “eBay Analytics.” Read the case carefully and extend your understanding of it by searching the Internet

for additional information, and answer the case questions.

6. Go to kdnuggets.com. Explore the sections on applications as well as software. Find the names of at least three additional packages for data mining and text mining.

be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)  with a minimum of 1 page.

cc-14

 
Discuss in 500 words or more the top 5 details that should be included in your cloud SLA. 

Access control Assignment 12

Discuss both advantages and disadvantages of remote authentication protocols and how business will use them.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Final project – Ethical hacking

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Security Architecture and Design solution as a diagram or diagrams with annotations

Length: Minimum of 900 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.