Step 1: Requirements – Phone Dialing Program

    

Step 1: Requirements – Phone Dialing Program
 

Your mission: A prepaid phone service needs a program that converts alphanumeric keyboard input into a phone number. The user will input eight characters and the program will output either an error message or the translated seven-digit phone number. The input may contain digits, letters, or both. Letters can be uppercase or lowercase.
 

The program will perform the conversion per a standard telephone keypad layout.
 

0
 

5
 

J K L
 

1
 

6
 

M N O
 

2
 

A B C
 

7
 

P Q R S
 

3
 

D E F
 

8
 

T U V
 

4
 

G H I
 

9
 

W X Y Z
 

The program implements the following methods.
 

* Main(): Declares seven character variables and passes these to the following methods by reference:
o ProcessInput(): gets user input and performs the conversion
o ShowResults(): displays the results
* GetInput(): Gets seven characters from the user and stores them into the seven variables Main() has passed by reference.
* ProcessInput(): Calls ToDigit() for each, passing each character variable by reference, and returns one of these codes to Main() by value:
o 0 if there were no input errors
o -1 if there were input errors
 

Input errors include the following:
 

o The first character is 0 (seven-digit phone numbers can’t start with 0).
o The first three characters are “555” (no phone numbers start with 555).
o Any character is not a digit or an uppercase or lowercase letter.
* ToDigit(): Converts a character (passed by reference) to its corresponding digit per the table above, and returns one of these codes to ProcessInput() by value:
o 0 if the character is valid (a digit or uppercase or lowercase letter)
o -1 if the character is not valid
* ShowResults(): Writes converted telephone number to the screen, inserting a dash (-) between the third and fourth digits, and accepts the seven character variables from Main() by reference.
 

Sample Output:
 

Enter a 7 character phone number: 2132121
The converted phone number is: 213-2121
 

Enter a 7 character phone number: 2scdfER
The converted phone number is: 272-3337
 

Enter a 7 character phone number: 555resw
Invalid input, please try again.
 

Enter a 7 character phone number: 0988765
Invalid input, please try again.
 

Enter a 7 character phone number: 12345678
Invalid input, please try again.
 

Enter a 7 character phone number: @34*uy
Invalid input, please try again.
 

Tips
 

Best practice: Don’t try to write too much at a time! First, write an outline in comments based on the requirements and the pseudocode. Then, implement declaring seven char variables. Make sure to fix any compiler errors before implementing more. Then, write and call an empty GetInput() method that accepts parameters, but does nothing but return a dummy value. Make sure you can pass the seven character variables by reference without compiler errors before implementing any of the GetInput() logic. Keep working incrementally like this, testing as you go. Set breakpoints and use the debugger at each phase to make sure your logic is working correctly. Then, use the same approach to implement the other methods. Test each phase with valid input before handling any invalid conditions.
 

Pseudocode
 

* ProcessInput( ) Method
o Get 7 characters from the user and store them in the 7 variables that Main() has passed by reference
o Call ToDigit() for each of the 7 characters
+ If toDigit returns an error code (-1), return an error code (-1)
o If the first character is 0, return an error code (-1) to Main()
o If the first three characters are 555, return an error code (-1)
o If there are no errors, return 0
* ToDigit ( ) Method
o Convert the characters (passed from ProcessInput() by reference) to upper case
o Use a switch statement to translate characters into their corresponding digits.
+ Write a case statement for each digit and for each valid uppercase letter
+ Write a default case that returns an error code (-1) for invalid letters
o If there are no invalid letters, return 0
* ShowResults ( ) Method
o Display the Phone Number using the character variables Main() has passed by reference
* Main() Method
o Declare 7 char variables
o Get user input by calling the GetInput() method, passing it the 7 variables by reference
o Perform the conversion by calling the ProcessInput( ) method, passing it the 7 variables by reference
o Display an error message or call ShowResults(), depending on the code ProcessInput() returns

Microeconomics

 

For this week’s DB read chapter 4 and answer the following 2 questions,  You have to include a diagram with each answer that you provide.  If you are not too tech-savvy and can’t draw the graph on the computer,  you can draw the diagram on paper then scan it and attach it to the DB thread you create. 

1. Select 2 events below and for the 2 selected predict how each event will raise or lower the equilibrium wage and quantity of oil workers in Texas. In each case, sketch a demand and supply diagram to illustrate your answer. Events:

  1. The price of oil rises.
  2. New oil-drilling equipment is invented that is cheap and requires few workers to run.
  3. Several major companies that do not drill oil open factories in Texas, offering many well-paid jobs outside the oil industry.
  4. The government imposes costly new regulations to make oil-drilling a safer job.

2. Select 2 economic changes below and for each predicts how it will affect the equilibrium price and quantity in the financial market for home loans. Sketch a demand and supply diagram to support your answers.

  1. The number of people at the most common ages for home-buying increases.
  2. People gain confidence that the economy is growing and that their jobs are secure.
  3. Banks that have made home loans find that a larger number of people than they expected are not repaying those loans.
  4. The federal government changes its bank regulations in a way that makes it cheaper and easier for banks to make home loans.

Data in Each bytes

 In this question, you are going to assume the following data type and its corresponding sizes: char: 1 byte and int: 3 bytes. From a C-like snippet of a code below, answer the rest of this questions. Note: use a lost of casting in the second half of this snippet to make sure things are clearly declared. typedef struct type1{int i[3];} typeA; typedef struct type2{typeA j[2];} typeB; typeA *a; typeB *b; unsigned long *c; int i; a = malloc(2*sizeof(typeB)); b = a; c = a; for(i=0;i<18;i++) { *(c+i) = (unsigned char)(i%8); } Assuming that the actual location of a after malloc is called is at the physical address 0x10000 in DRAM. Using the concept of address we learn from our class, the table below shows our DRAM starting from the address 0x10000. Please put in the values inside each bytes in our DRAM starting at address 0x10000 up to the end of where a is malloced for. Write XX in the byte that is unknown/unassigned, and write YY on the byte that is not in the range that a covers. I gave you the first byte, finish the rest. Hint: Draw the organization of the struct out on a piece of paper. Pair this up with the concept of an array and type casting. This question is actually very easy but you need to be a bit careful. Hint2: Please note that our table is actually 1D. Each row is 8 bytes in size and the address of the next row basically continue from the end of the earlier row. I just have no method to draw a very long 1D table so I need to resort to a 2D table here. 

Benchmark – Developing Enterprise Framework for a Security Program

  

COMPANY PROFILE: 

Mission Statement

The mission of Across the States Bank is to provide superior customer service and tools that enable citizens of the United States to manage their money domestically and abroad.

Vision Statement

Our vision is to become the premier banking services provider across all business segments through offering outstanding customer-centered service.

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and      checking accounts
  • Debit and credit      cards
  • Personal and      automobile loans
  • Home loans,      including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment      banking services
  • Wealth management      and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings      and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment      banking
  • Trust services
  • Shareowner      Services

Strategic Goals

  • Increase annual sales to $12 billion within the next 3 years.
  • Improve customer relations and customer service response times through the implementation of a state-of-the-art customer resource management system.
  • Increase services in the commercial sector by 15%.
  • Achieve      an average customer service satisfaction survey score of 95%

1. Select a fictitious company to use for the duration of this course and create an associated abbreviation (e.g., Across the States Bank (ASB), Lopes Manufacturing (LM), or Pike’s Peak Health Care (PPHC)).

2. For the company selected, research online or use Chapter 2 of the textbook and identify, at minimum, two laws or regulations that include a set of standards the organization must implement to achieve compliance (i.e., PCI DSS, HIPAAHITECH, ISO/IEC 27001:2013, or NISPOM 5220.22).

3. Use the “NIST 800-53r5 Framework – Appendix C,” the two identified laws, and the “ITT-430 Developing Enterprise Framework Template,” to map the various standards to the controls within the framework. Refer to the “ITT-430 Developing Enterprise Framework Example.”

4. Map a minimum of two NIST controls per law or regulation. NIST 800-53 controls may duplicate across standards as shown in the Developing Enterprise Framework Example (see SC-13).

5. Complete at least 25 mappings.

6. In the “Notes” column, briefly explain the purpose that the two laws or regulations and the associated controls are trying to achieve. For example, the first row in the example is establishing a policy on risk assessment and the identification and management of threats and vulnerabilities.

7. Research and create a security program framework outline for your fictitious company that aligns to the mission and vision of the company. Your outline should include a table of contents; list the topics your company would need to address in order to resolve the many issues of its business concerning confidentiality, integrity, and availability.

8. In 500–750 words, explain your security framework outline and how it is specific to your company. Explain why you chose to include your specific topics and how they will help to secure your companies interests as well as systems long term, differentiating between legal, regulatory, and framework compliance needs. Describe the major components, policies, and processes related to cyber defense, security controls, and network security.

9. Include at least two references outside of the required reading.

database project

 

You will type a three to five page paper on a topic dealing with Database Systems. You may use the textbook in addition to researching  the internet for additional sources. Please submit your APA-formatted paper in a Word document. Your paper must be double spaced and include a cover page and a reference page for your cited sources. Please note that the reference page and cover page do not count towards your paper’s three to five pages in length. Please note that this project is 25 % of your grade.