Basic Algorithm

 

Think of two day-to-day tasks that you do regularly.   You will write describe each of your chosen tasks and identify what parts could be written out as a conditional or looping structure as it relates to programming. The you will write them out in pseudocode statements with the proper structure and indentations.  There is an example/hint at the bottom of this assignment to help you on the pseudocode portion.

Minimum requirements:

  • A minimum of two full paragraphs describing each task and their related conditional and/or looping structures (four paragraphs total)
  • One full pseudocode statement for EACH task with proper indentations, syntax, and structure (two pseudocode statements total)
  • Submit only one document via the link title above.
  • Use paragraph structure where necessary. Use complete sentences where necessary and proper grammar and spelling.
  • Place a header on your page that contains your first and last name, the assignment name, and the course code from page two of the syllabus.
  • Your document must be one of the following formats (.doc, .docx, or .rtf).
  • Cite any and all sources. 

 

HINT:

This is a generic Algorithm:

  1. Put a teabag in a cup
  2. Boil some water
  3. Add water to cup
  4. Remove the tea bag
  5. Add sugar
  6. Add milk
  7. Stir
  8. Serve

Below are some possible pseudocode statements for step 5 ONLY, you will need to write out the appropriate syntax and structure for ALL steps to include any implied steps in between.

IF (want sugar)

     THEN (add sugar);

     ELSE (don’t add sugar);

ENDIF

WHILE (want sugar)

     Add teaspoon of sugar;

ENDWHILE

home work 5

   Write short answers, uploaded as a WORD DOCUMENT (300 words) and attach references   

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

This I believe – Leadership theories and practices

 

This essay should reflect the culmination of your thoughts about leadership. It is based on the NPR series “This I Believe,” but with a twist. Rather than crafting a statement about your beliefs in general, you are asked to write a concise summary of your beliefs about leadership, using the quotation from Warren Bennis (our class theme) as the starting point:

“The point is not to become a leader. The point is to become yourself, and to use yourself completely–all your gifts, skills and energies–to make your vision manifest. You must withhold nothing. You must, in sum, become the person you started out to be, and to enjoy the process of becoming.” (Warren Bennis, On Becoming a Leader).

What is your vision?

How are you making it manifest?

How are you becoming yourself?

Are you enjoying the process of becoming?

  • In preparation, you are asked to read at least six “This I Believe” columns online to see the range of people and ideas represented.

    Click here for the “This I Believe” Columns.    https://thisibelieve.org

CSS 215 Project

 

Instructions

Read the information below, then complete the designated tasks with your team.

In the previous milestone, you conducted a preliminary investigation into Millennium request for a business support system and a medical practice support system. After discussing your recommendations, Dr. Johnson and the partners decided to move forward with the Business Support System project and want you to describe the next steps.

To ensure the quality, cost, and timeliness of the new system, you suggested that Millennium Health use a project management approach. Dr. Johnson agreed, and he wants you briefly describe project management concepts and benefits. You realize that most of the partners do not have project management experience, and it is important to deliver a clear, informative overview.

Tasks:

1.  Create a Microsoft Word document to include the following points: 

  • Explain project management concepts and benefits. 
  • Explain how project management will be used by your team to manage the Millennium Health Project. 

 2.  To illustrate the PM process, refer to table 3.39 of textbook and complete the following tasks: 

  • Create a  two-column  table with column titles  Tasks  and  Expected Time.  List activities A through J in the Tasks column.   
  • Calculate  the Expected Time for each task and enter into this table. 
  • Refer to table 3.40. Based on the activities listed complete the following three steps:  
    • Convert the activity times to days (multiply the number of weeks by 7)
    • Construct a Gantt Chart  
    • Copy/paste the Gantt chart into a  Word  document.

Mutli-factor Authentication

 Need below Answers in a word document with a minimum of 4-5 lines for each question in APA format.

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication(Need Citations as well).

Discussion

 (Chapter 1):  Give examples of systems in which it may make sense to use traditional file processing instead of a database approach. 

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

(Chapter 2):  If you were designing a Web-based system to make airline reservations and to sell airline tickets, which DBMS Architecture would you choose from Section 2.5? Why? Why would the other architectures not be a good choice?

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.