Lab Section

  

Lab Section: e.g. CP107-[1 2]-[A B C] Lab Assignment: Lab9 Pointers & StructsProject 

Name: Lab9_1 Array Builder Description: Dynamically allocates a new integer array or larger integer arrayLimitations:Credits: 

Includes mandatory file header:- uses empty Win32 Console Application:- Programs submitted with correct folder structure and correct files (cpp & h):user Interface (10%):———————- Clean easy-to-use:- Informed user of application:- Prompted user for input data:- Leaves cursor at end of line prompting input:- Correct spelling in user interface: Source Code Formatting (40%):—————————— Descriptive Names for functions and variables:- Correct Use of Indentations:- Effective use of newlines:- Use of local variables:- Misuse of global variables:- Effective use of comments:- Use of constants and enums:Demo Results (40%):——————– Compiles w/o errors:- Instructor pause included in all return paths:- Input validation done according to requirements:- Produced expected program output:- Test Coverage (5%):——————– Program output included:- Boundary conditions tested:*/#include
using namespace std;int * arrayBuilder(int * arr, int size, int newSize);void showArray(int * arr, int size);int main(){int * theArray = 0;int i;cout << "This program demonstrates an array builder function." << endl << endl;// create the initial array. The initial size is zero and the requested size is 5.theArray = arrayBuilder(theArray, 0, 5);// show the array before values are addedcout << "theArray after first call to builder: " << endl;showArray(theArray, 5);// add some values to the arrayfor(int i = 0; i < 5; i++){theArray[i] = i + 100;}// show the array with added valuescout << endl << "Some values stored in the array: " << endl;showArray(theArray, 5);// expand the size of the array. size is not the original size. newSize// must be greater than size.theArray = arrayBuilder(theArray, 5, 10);// show the new array with the new sizecout << endl << "The new array: " << endl;showArray(theArray, 10);cout << endl;delete [] theArray; // be sure to do this a1t the end of your program!system("pause");return 0;}/*FUNCTION: arrayBuilderINPUTS: Pointer to an array. Size of the array. If size is zero, arr can be NULL.
Size of the new array.OUTPUTS: Returns a pointer to allocated memory. If newSize is greater than size, an array of newSize is allocated and the old array is copied into the new array. Memory pointed to by the old array is deleted. All new elements are initialized to zero.*/int * arrayBuilder(int * arr, int size, int newSize){// TODO: Your code goes here// HINT: Design the function before writing it.return NULL; // default return value. No memory allocated!}/*FUNCTION: showArrayINPUTS: Pointer to an array. Size of the array. If size is zero, arr can be NULL.OUTPUTS: Prints the contents of the array to the console.*/void showArray(int * arr, int size){cout << "arr = ";for(int i = 0; i < size; i++){cout << arr[i] << " ";}cout << endl;}  

DSS and BI

 

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Explain the relationship and the difference between Decision Support Systems (DSS) and business intelligence (BI) systems in a manufacturing organization. Include either a real-world example or a scenario-based example of this relationship. Include sources to support your response and examples. You should define DSS and BI systems in the context of your response.

MKT-6

 

1.  What are some of the primary reasons people resist change? What are some of the ways a team leader can ensure that change is accepted or at least not resisted? 

Read chapter 10. Based on case 10-1 on page 343 as reproduced below, answer the following question.

THE QUIET MEETING:Debbie Ronson, sales supervisor, was just opening a meeting she had called for members of her department. Debbie did most of the talking for the first five minutes, recounting her group’s performance over the past week. Then she asked, “Are there any questions?” No one responded. Debbie then changed subjects. “As you know, in two weeks we’ll be going to a new format for scheduling our calls. This was outlined in the memo from the vice president, copies of which I sent to each of you. This is going to alter your calling schedules and significantly change the way we’ve been doing things. I have some ideas on how we can best work into this new system. But before getting into that, I’d like to see if anyone here has any ideas … [pause]. Anyone care to contribute anything?” No one in the group responded. Debbie continued, “Well, here’s what I think we should do. …” She then spent eight minutes outlining her plan. After the meeting was over, Debbie discussed it with one of her fellow supervisors. “I don’t know what it is,” she said, “but I can never get my people to say much at meetings. I try to give them a chance, but I always end up doing most of the talking. It seems they’re either shy or disinterested, but I really don’t know if that’s the reason or not. I just wish they’d contribute their ideas.”2. What might be some reasons for participants not saying much at Debbie’s meetings? 

4 topics powerpoints

  1. MAKE REVISIONS to your Draft submission before submitting it here. 
    • There is no minimum amount of slides required. You decide based on your worksheets. It’s your story to tell. 
    • You MUST use the concepts of H.A.T.S taught in class. 
    • You MUST use the CHECK YOUR SIMILARITY HERE folder to ensure no plagiarism. 
    • Grading: You MUST go to p. 78 to see the Rubric for PowerPoints. 

  4 topics 

1. Development of Self-Driving Vehicles 

2.Cybersecurity Readiness in SMEs

3.Internet of Things and Individual Privacy

4. Implications of Utilizing Artificial Intelligence in Assessing and Hiring Employees

Research Paper

Answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

dq

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

computer

 

  • Identify job titles and responsibilities for various technology jobs

work should be citied