Display your name here X = 4, y = 30 х Display your name here х x = 5, y = 94 Display your name here х x = 210, y = 94

Beginning with the file that you downloaded named Proj06.java, create a new file named Proj06Runner.java to meet the specifications given below.

 

This is about java. I would appreciate your help!

Please do not provide a “copy and paste answer”! 

Among other things, the purpose of this assignment is to assess the student’s ability to write a program dealing with window events, mouse events, and the Delegation Event Model.

PROGRAM SPECIFICATIONS

Beginning with the file that you downloaded named Proj06.java, create a new file named Proj06Runner.java to meet the specifications given below.

Note that the code in the file named Proj06.java.

Be sure to display your name in both locations in the output as indicated.

When you place both files in the same folder, compile them both, and run the file named Proj06.java, the program must display the text shown below on the command line screen.

I certify that this program is my own work
and is not the work of others. I agree not
to share my solution with others.
Replace this line with your name

In addition, your program must display a single 300-pixel by 100-pixel Frame object as shown in the images below. When you click the mouse in the working area of the Frame, the coordinates of the mouse pointer must be shown in RED above the mouse pointer. (Multiple images are shown below to show the result of clicking at different locations in the working area of the Frame. Note that the 0,0 coordinate location is at the outer upper-left corner of the Frame, which is beyond the reach of the mouse pointer.)

When you click the X-button in the upper-right corner of the Frame object, the program must terminate and MUST RETURN CONTROL TO THE OPERATING SYSTEM.

You may find it necessary to consult the Java documentation and take class inheritance into account to meet these specifications.

Output:

Display your name here X = 4, y = 30 х Display your name here х x = 5, y = 94 Display your name here х x = 210, y = 94

Proj06.java (can’t be modified)

/*File Proj06

The purpose of this assignment is to assess the student’s

ability to write a program dealing with window events,

mouse events, and the Delegation Event Model.

************************************************************/

// Student must not modify the code in this file.

public class Proj06 {

public static void main(String[] args){

new Proj06Runner();

}//end main

}//end class Proj06

//========================================================//

week 3

 1 page

Select a specific type of organization (such as a bank, a hospital, or some other) and imagine you are an IT professional working there. Go online and look for information about WinGate. Look for reviews, articles, and other information beyond what can be found on the vendor’s site. Based on your research, what advantages would this product offer to your organization? What disadvantages?  

Questions 2

 please answer below questions(plagiarism applies)

  1. What is a database management system (DBMS)?
  2. What are the properties of a DBMS?
  3. Provide three examples of a real-world database (e.g., the library contains a database of books).
  4. How is a DBMS distinguished from a file-based system?
  5. What is data independence and why is it important?
  6. What is the purpose of managing information?
  7. Discuss the uses of databases in a business environment.
  8. What is metadata?

Manipulating One-dimensional Arrays

 

 Allows user to enter numbers into an array of 20 integers. The numbers are inputted in such a way that the array is  kept sorted. The array may or may not be filled up. Include an error message to indicate a full array (e.g., “Cannot  accommodate any more inputs. The array is full.”). 

If the user does not want to continue entering numbers (or if the array is full), segregate the numbers into two (2)  other arrays, which means you will be manipulating three (3) arrays in this program. The second array will contain  all even numbers, while the third array will have all odd numbers. Note that the first array contains the original  sorted data. Also, determine and output the largest and the smallest numbers in each array, the sum, and the average. 

Make use of structured/modular programming. This means that it is expected that you will 

1. make use of parameter passing by value and with reference (using pointers), and 

2. reuse your functions (by calling them again but with different values passed to the parameters) 

I will be adding 3 screenshots (specifications) so that it will be easy to understand it. For anyone helping, it would so grateful, thank you in advance <3 

CPU Scheduling computing the average response time and througput in FCFS SJF MultiLevel FB

 

As discussed in the class, please finish the three functions:

(1) public static void FCFS(List ready_q)                 (20%)

Complete it by computing the average response time and througput.  

(2) public static void SJF_preemptive(List ready_q)        (40%)

Complete this function by using shortest job first algorithm in preemptive mode. You need to compute the average waiting time, average response time and throughput and print them out.

      – Processes are executed in the correct order (25%)

      – Correctly print out the average waiting time, average response time and throughput. (15%)

(3) public static void multiLevel_FB(List ready_q)          (40%)

Complete this function by using multi-level feedback algorithm. You need to compute the average waiting time, average response time and throughput and print them out.

      – Processes are executed in the correct order (25%)

      – Correctly print out the average waiting time, average response time and throughput. (15%)

 

Submission:

Feel free to modify the Process class as needed. So after you finish the code, you only need to turn in the “CPUscheduling.java” file

use Kali to crack the passwords.

     

Use the attached file called hashes and   then use Kali to crack the passwords.

You can use Hashcat is a password   cracking tool used by ethical hackers/ penetration testers to break down the   hash into a plaintext.

The best dictionary that   you can use is rockyou.txt wordlist.

You need to know the type of the hash function being used. This   can be done by hash-identifier.

 

Setup a windows XP image and follow the   instruction given in metasploitable part 2 where we have compromised windows   XP.

Follow the instruction and provide   screenshots for all the steps you did.

 

Configure a bootable USB that can be used to bypass windows   OS admin login

Problem 15- Org Behavior

1. The management of ethical behavior is one area where national culture can rub up against corporate culture. Discuss some differences in how individualist and collectivist cultures might view the difference in the management of ethical behavior in relation to corporate culture.

at least 3-4 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Software Development History Presentation (6-8) Slides

 

Assignment Instructions

Create a narrated 6-8 slide presentation in Microsoft PowerPoint® in which you discuss the aspect of software development history that you found most interesting during this week’s learning. Be sure to discuss whether this historical aspect has a continuing influence in today’s software development environment in terms of core programming concepts such as repetition structures, decision structures, arrays, functions, and variables. For example, think about how the shift from procedural programming to object-oriented programming changed or did not change how the core concepts were handled. When composing your presentation, be sure to use Standard English and a highly developed and sustained viewpoint and purpose. The communication of your presentation should be highly ordered, logical and unified.

Additionally, one slide must be devoted to some aspect of software development history demonstrating the benefits of multiculturalism and diversity in a global context. How has software development evolved as we have become more globalized and how has it influenced the growth and change in software development?

Your presentation must have narration throughout as if you were delivering it in a live, professional setting. Focus on your word choice. Your oral delivery techniques, including word choice and oral expressiveness, should display exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.

For instructions on adding audio to your presentation, please review the HOONUIT module on adding media.
https://learnit.hoonuit.com/5567/learnit

Assignment Requirements

Narrated content must be effectively incorporated into the presentation. Oral delivery techniques, including word choice and oral expressiveness, displays exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion.

At least one slide must demonstrate the ability to analyze the benefits of multiculturalism and diversity in a global context.

Assignment Requirements

Points

Possible

Points

Earned

Student selects a specific aspect of software development history to discuss.

5

At least one slide analyzes an aspect of software development history that demonstrates the benefits of multiculturalism and diversity in a global context.

5

Student work includes recommended solutions to issues that arise from a more globalized software development environment.

5

Effectively discusses how this historical aspect continues to influence today’s software development environment (taking into account covered programming concepts, such as repetition structures, decision structures, arrays, functions, and variables).

15

Student’s voice narration effectively incorporated into the presentation.

10

Presentation is 6–8 slides in length.

5

Total (Sum of all points)

Setting Up Remote Access for Contractor,

 

Case Project 6-2: Setting Up Remote Access for Contractor, Page 251 

Scenario: Several new projects are being staffed by outside contractors, who will be working on servers in the contractors’ office, not in the company building, and will have their own VPN server. The contracting company has informed your company that none of its employees will be working weekends. What controls can you set up to minimize contract employees’ access to your network?

Writing Requirements: 

1-2 pages

2-3 Scholarly references

APA format, for citations and references