Please see the attachment and answer the questions listed there about the Chapter 2 of your textbook.
– Write your answers to a Word file and upload here
– You do not have to follow APA format but please add you name, a title and any references.
+1 (231)-518-0303 [email protected]
Home » Archives for chebby » Page 903
Please see the attachment and answer the questions listed there about the Chapter 2 of your textbook.
– Write your answers to a Word file and upload here
– You do not have to follow APA format but please add you name, a title and any references.
What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?
You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.
Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.
Complete the queries
Week 3 Written Assignment
Topic: After conducting independent research using at least three sources not used in the class write an essay that evaluates current issues surrounding the use of the Internet by businesses and organizations, particularly those that involve employees or members.
the question is
The code in project2 is for a program that plays a simple game called Chomp.
The programmers of this project have opted to package some of their code in a “module” called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated.
The steps necessary to produce this program are:
csplit chomp.adt "/Split Here/" xx00 to cookie.h.csplit chomp.adt "/Split Here/" xx01 to cookie.cpp.cookie.cpp to produce cookie.o.mainProg.cpp to produce mainProg.o..o files to produce an executable program named playChompWrite a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch.
_________________________________________________
I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile:
all: cookie.h cookie.cpp playChomp cookie.o mainProg.o
cookie.h: chomp.adt
csplit chomp.adt “/Split Here/”
cp xx00 cookie.h
cp xx01 cookie.cpp
playChomp: cookie.o mainProg.o
g++ -o playChomp cookie.o mainProg.o
cookie.o: cookie.cpp
g++ -c cookie.cpp
mainProg.o: mainProg.cpp
g++ -c mainProg.cpp
However, I am receiving this error code:
Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed:
csplit chomp.adt “/Split Here/”
1372
8632
cp xx00 cookie.h
cp xx01 cookie.cpp
g++ -c cookie.cpp
g++ -o playChomp cookie.o mainProg.o
is there anything that I can do to fix my makefile?
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?
2. are we working more and earning less?
3. Would you want a telecommuting job? Why or why not?
4. Does the gig economy appeal to you? Why or why not?
5. How is an employee differentiated from a contracter under US law?
6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?
7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?
8. How much monitoring of employee activities at work is appropriate?
9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?
10. What is the relationship betwee BYOD (bring your own device) and shadow IT.
11. What is cyberloafing?
Discuss, in your own words using 500 words or more, how business process as a service (BPaaS) reduces risk for commercial enterprises.
Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.
We have viewed how Blockchain has made a significant impact on businesses and industries. Select one industry and highlight the advancements Blockchain has had on that single industry.
Your paper should meet the following requirements:
Pick an organization for which you are interviewing and describe it in your post. Which concepts would you choose and what would your descriptions look like?Why would you select these concepts?