The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

cc-5

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes

Research Report on Software Engineering and Data Verification

Detailed Research report on “Software Engineering and Data Verification” as per APA format. Please see the guidelines below and also the attachment.

 Chapter 1 – Background/Introduction, Problem Statement(s), Goal(s), Research Question(s), Relevance and Significance, Barriers and Issues related to topic chosen.

Chapter 2 – Literature Review

Chapter 3 – Methodology – Research Methods Employed

Chapter 4 – Findings , Analysis , Results

Chapter 5 – Results, conclusion, and future work recommendations.

1) Chapter 1 – Introduction

2) Chapter 2 – Literature Review

3) Chapter 3 – Methodology Specifics (comparative analysis)

4) Chapter 4 – Findings and Results

5) Chapter 5 – Conclusion and Future Recommendations

6) References – APA

7) Appendices

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Computer programing

 Assignment 2 tests your knowledge of Selection (Chapter 4) and Repetition (Chapter 5). Write a program YourName-Assignment2 (replace YourName with your actual name, no spaces) that reads/inputs from a file1 students’ records (one student per line) with the following format: LastName Tests Grade Assignments Grade and computes and outputs (to the console) the STUDENT STATISTICS in a table format one line per student: Student Name Total Points2 Numeric Grade3 Letter Grade4 The table should have the exact table header5 . The program should also compute and output (to the console) in the 2 rows 2 columns table format, the CLASS STATISTICS for the entire class: the number of students6 (row Number) and the average numeric grade7 (row Average) among all students. All text/character columns should have the same width, be aligned to the left and all floating-point values align to the right and formatted with 2 decimals. You can test your program on the attached Grades.txt (do not edit the file) and you can check your output by comparing it to the sample output shown here, but your program should work on any other files that have the correct format, thus, do not hardcode the output or the number of students. The program needs to use loops/repetition statements to read the data from the files and selection statements (Chapter 4) to compute the letter grades. You should write the program in Visual Studio 2019 using only concepts learned in classso far (Chapters 1 to 5, so, without arrays, functions, pointers, references, and any other concepts not studied in class so far). Create a Microsoft Word document called YourName-Assignment2-Screenshots.docx (replace YourName with your name, no spaces) that contains screenshots of your entire C++ code in editor (take multiple screenshots if the code is larger than one screen and is not readable in one screenshot), and the entire program console output in the Console Output Window for the attached Grades.txt (take multiple screenshots if the output is larger than one window). SUBMIT your YourName-Assignment2.cpp Visual Studio 2019 C++ source code and YourName-Assignment2- Screeshots.docx screenshots document files under Assignment2 on eCampus. Do not archive the files (no ZIP, RAR or other archived files) or submit other file formats. 

1 The program should work on any file with that format with different numbers of line. Do not hardcode the number of lines, compute it instead when you read from the file.

 2 You compute the Total Points as the sum between Tests and Assignments.

 3 You compute the Numeric Grade as the total points (from all the evaluations) divided by 2. The value will be between 0 and 100 

4 The Letter Grade is: A if the numeric grade is between 89.5 and 100, B if the numeric grade is between 79.5 and 89.49, C if the numeric grade is between 69.5 and 79.49, D if the numeric grade is between 59.5 and 69.49, and F if the numeric grade is between 0 and 59.49.

 5 The table header should have the exact text, but it does not have to be on 2 separate lines/rows, you can put them on one row (.e.g. “Total Points” on one row)

 6 The number of lines from the file

 7 The sum of all the numeric grades divided by the number of students 

rewrite my stor

base on my story (attached file below)

Rewrite your story for clarity/structure/grammar/etc. Also make sure you address any issues we discussed in the storytelling lecture.

Make the stories more fun to read. If there is anything about a story that is boring or confusing, rewrite it. This may include unnecessary or missing scenes, too many characters, tedious or confusing parts, etc. Additionally, point out any issues of clarity (all the material covered in the clarity lectures). Point out any grammar issues you notice too, but don’t focus on them.

Do not change the main idea of the story.

Tips:

The story is their story, not yours:

+ the story is definitely not about the interview process

+ the story probably doesn’t even involve you

Stories can take place over a lifetime, but cant be the same as describing the lifetime (think of history class)

Stories should let us understand the characters

+Give them a voice, don’t just describe what happened to them

Dont end the story with a moral lesson: it doesn’t feel like real things happing to real people.

Encryption Algorithms

 1 page discussion 

  • As the cybersecurity specialist in HU Investment Firm, you are responsible for the security of the system. Identify one encryption algorithm that you believe will meet the requirement of improving the security posture with encryption algorithms.
  • Explain exactly how you would incorporate this into the security structure of this company.
  • Identify and explain the associated costs for the identified encryption algorithm. Take into consideration the procurement costs, i.e. software / licensing, implementation, configuring, and updating. 

Cloud Computing Reflection

 

Write an essay of atleast 500 words on what you would like to learn for future study in this course.

Write in essay format, not outline or bulleted.

Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.

Mainframes

  • How do data transmission errors affect your perception of each? In other words, does the possibility of error influence your decision regarding which would be better?
  • What other factors would affect a company’s choice?

Computer Security Credentials

What avenues should an aspiring information security professional use in acquiring professional credentials?

Video Sources:

Security Education and Training Requirements

Top 10 IT Certifications for Security Cleared Professionals

What a CompTIA Security+ Certification Can Do For You

How to pass IT certifications