ITSD322U2IP

 

Assignment Details

In this assignment you will use a loop and a custom method (or “function”), as well as built-in Java classes. Create a Java program that meets the following requirements:

  1. Ask the user to input a number between 5 and 45. Tell the user to enter 1 if they wish to exit the program.
  2. Store the user’s input in a variable with the integer data type.
  3. Use a while loop to repeat the program, checking the user’s entry in case they entered a 1 to exit the program.
  4. Create a separate method (in the same Java file) called “checkEntry”. This method must use a single parameter of the integer data type. When the user enters a number, pass that number to checkEntry for evaluation (described below).
  5. (In the checkEntry method.) If the user enters a value of less than 35, the checkEntry method must multiply that value by 5 and return the result to main(). If the user enters a value greater than or equal to 35, the program must add 10 to that value and return the result to main().
  6. Display the result of checkEntry’s evaluation on the screen.
  7. Document your code using appropriate in-line comments. This includes variable declarations, input and output methods, and logic. Your comments must explain how the program works to a programmer who is familiar with Java and NetBeans but has not seen this program before.

Your deliverable for this assignment is the NetBeans project you created using the steps above (ZIP the whole folder that contains the project). (No screenshot.)

Note: It is fine if the program evaluates 1 (multiplying it by 5) and displays the success message before terminating. This is the expected behavior for the simplest solution to the program.

Note: This program does not check to see if the user failed to enter a number in the required range. That topic will be examined later in this course.

Tip: As with Unit 1, remember to import the Scanner class by adding the line “import java.util.Scanner” below the “package” declaration.

Please submit your assignment.

Security

  • What advantages and disadvantages should be discussed before an organization commits to implement Hadoop?
  • How can a database be enhanced to make it user-friendly to managers as well as programmers?
  • What are some of the current trends in telecommunications and networks?
  • Why would you choose a mesh topology over other types of network topologies?

2)

  • What functionalities or services make an e-commerce Web site effective?
  • What enhancements might encourage more people to embrace e-commerce and/or m-commerce?

Discussion 8- Monitoring Project

  • Offer some insights, from researching the Internet, around the importance of client acceptance throughout the project.
  • If you were leading a project, and the project declines the final acceptance, what do you believe the team may have failed at?
  • Provide a few highlights that the course has offered you (you can pull from your practical connection assignment).

Text

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

week-12 assignment

 

 Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Project Management…6

 Compare the following digital camera in terms of evaluation criteria. Also consider mentioning their

 brands, models and digital. 

Types of Cameras

  • Compact Camera
  • Waterproof Camera
  • Bridge Camera

Evaluation criteria

. Features

. Price

.specifications

.Durability

. Size

. picture quality

. weight

Use the following link to help you

https://www.which.co.uk/reviews/digital-cameras/article/which-type-of-digital-camera-should-you-choose-a6X9r1o3K8Nr

Problem 3- Initiating Project

Please check the attached file for instructions.

Using your Week 2 Business Case complete the following Stakeholder Register Exercise (Exhibit 6.4 on page 183 of the Kloppenborg text) and Project Communications Matrix (Exhibit 6.9 on page 192). Complete instructions and templates based on these exhibits have been provided (see attached document).

IntelliJ task

Hello, I have a project I need to make for school with IntelliJ. (mySQL, kotlin, ..). It should be simple data and code that gets shown only in terminal. Its about being able to track how many cars are parked etc.. pushing things in arrays and getting them out basically. Could someone help me out with this asap? Would be great, thanks! 

CAPS

  1. The use of playbooks is very common in sports. They can also serve very important purposes in business—as a user manual that outlines knowledge needed so anyone on your team can help ensure business continuity. But most importantly, security playbooks can keep your business running smoothly if a business experiences attacks or intrusions that can occur at any time.  

    For this assignment, you work for an enterprise business. The board of directors is worried about recent ransomware attacks that have happened across several industries that have made the news. They want to make sure the organization is prepared for potential attacks. You have been asked to present to the board of directors 3 playbooks that would be utilized as part of the incident response plan specifically for risk management at the business level. Create a playbook for each of the following:

    • SQL Injection 
    • Website Compromise 
    • Exploitation of Windows 7 Workstations
    • Read Cybersecurity in 2021 from All Hands on Tech for help completing this assignment.  

      To complete this, you should create a 12- to 16-slide presentation with speaker notes and media such as images, video, or tables that will be presented to the board of directors. Specifically, your presentation should do the following:  

    • Explain the importance of using playbooks to risk management.  
    • Summarize the risks of the 3 threats listed above and recommendation of remediation plan presented in the labs associated with SQL Injection, Website Compromise, and Exploitation of Windows 7 Workstations. 
    • Summarize incident response plans for each of the 3 attack scenarios listed above.  
    • Justify NIST implementation, including an explanation of why it is the best option rather than another quicker and easier process. 
    • Identify additional tools and systems that might reduce or mitigate the risk of the 3 identified threats.
    •