Order # 13501

Title: Programming in C: Getting Started

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Technology

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

This assessment consists of four short programs. Use Code::Blocks to complete your work. You will submit the four C source code files for this assignment. Please zip the files and include your name in the name of the compressed file.

Part 1: Commenting Code

Including comments in source code that explains what the code does and how it does it are an important professional best practice. Code that is well-commented and well-formatted facilitates communication between programmers and others needing to work with the code. Commenting your code needs to be a habit from the beginning. Adding comments to code will also help reinforce important C programming concepts in your own mind.

Type in the code provided in the assignment Resources, build/compile the program, and run it. Typing the code in yourself rather than copying and pasting will help you get to know the C language. When you have the code running, go through the code and add comments to explain what the code does and how it does it. Be sure to add a header like the following to all code files (with your name and the date).

/* Ann Smith – IT-FP2240 – u01a1 – Part 1

* 10/01/2015 Rev. 1

*/

You should add at least five comments to the code provided. Be sure to recompile and test the code after you have added your comments to make sure you have not introduced any syntax errors.

Part 2: About You

Create a program that prints three lines of text about yourself. Be sure to include appropriate spacing and new line characters to make the output in the terminal window readable. As with all programming code, but sure to format the program correctly and include comments and a header for the file, such as shown above.

Part 3: Integer and Floating Point Arithmetic

Write a single program that prints the results of two arithmetic expressions using integers and the results of two floating-point calculations. Print out both the arithmetic expressions and the answers calculated by the code. For this program, it is fine to use “hard-coded” values (the numbers used in the calculations are provided in the code) rather than user input. Be sure to format the code correctly and include relevant comments in the source code (including the comment at the top of the file with your name and identification of the program).

Part 4: User Input

Write a program that prompts the user to enter a character, an integer, and floating point number. After reading the input, the program should print out the values entered. Be sure to format the code correctly and include relevant comments.

When you are ready to turn in your assignment, download your .c source code files and zip them together for submission.

Requirements

Include a title page and reference page, if necessary.

•APA format.

•Times New Roman font, 12 pt.

•Double-spaced.

Emerging Information Tech

 

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?

Please ask any questions in this week’s discussion. 

Introduction to technology 1010

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Essay

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of not less than 500 words, summarizing the court’s decision.

DataMining1

You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.

Introduction History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool Classifications Basic Concepts and Decision Trees Classifications Alternative Techniques Summary of Results References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/ Excel with Solver, but has limitations R Studio Tableau Public has a free trial Microsoft Power BI Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Discussion

Please search the internet for an answer to the following question.

  • Why did Cisco Systems transition from standalone access control systems to IP networked systems?
  • What challenges did Cisco face in order to solve the physical security problems?

Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Please write a 350 words essay

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Discussion

Using a firewall rules can hinder the performance of a network, what are some way to stop that from happening? What are some methods that you would use to improve the performance of a firewall? Can those methods be used with on-perm firewalls as well as cloud firewalls?