Evaluate how project management interacts with risk management.
500 words with APA format needed along with references.
Evaluate how project management interacts with risk management.
500 words with APA format needed along with references.
Area and Circumference of a Circle
Study the program below, which uses both variables and constants:
// ************************************************************
// Circle.java
//
// Print the area of a circle with two different radii
// ************************************************************
public class Circle
{
public static void main(String[] args)
{
final double PI = 3.14159;
int radius = 10;
double area = PI * radius * radius;
System.out.println(“The area of a circle with radius ” + radius +
” is ” + area);
radius = 2 0;
area = PI * radius * radius;
System.out.println(“The area of a circle with radius ” + radius +
” is ” + area);
}
}
Some things to notice:
The first three lines inside main are declarations for PI, radius, and area. Note that the type for each is given in these
lines: final double for PI, since it is a floating point constant; int for radius, since it is an integer variable, and double for
area, since it will hold the product of the radius and PI, resulting in a floating point value.
These first three lines also hold initializations for PI, radius, and area. These could have been done separately, but it is
often convenient to assign an initial value when a variable is declared.
The next line is simply a print statement that shows the area for a circle of a given radius.
The next line is an assignment statement, giving variable radius the value 20. Note that this is not a declaration, so the int
that was in the previous radius line does not appear here. The same memory location that used to hold the value 10 now
holds the value 20—we are not setting up a new memory location.
Similar for the next line—no double because area was already declared.
The final print statement prints the newly computed area of the circle with the new radius.
Save this program, which is in file Circle.java, into your directory and modify it as follows:
1. The circumference of a circle is two times the product of Pi and the radius. Add statements to this program so that it
computes the circumference in addition to the area for both circles. You will need to do the following:
Declare a new variable to store the circumference.
Store the circumference in that variable each time you compute it.
Add two additional print statements to print your results.
Be sure your results are clearly labeled.
2. When the radius of a circle doubles, what happens to its circumference and area? Do they double as well? You can
determine this by dividing the second area by the first area. Unfortunately, as it is now the program overwrites the first
Chapter 2: Data and Expressions
16
area with the second area (same for the circumference). You need to save the first area and circumference you compute
instead of overwriting them with the second set of computations. So you’ll need two area variables and two
circumference variables, which means they’ll have to have different names (e.g., area1 and area2). Remember that each
variable will have to be declared. Modify the program as follows:
Change the names of the area and circumference variables so that they are different in the first and second
calculations. Be sure that you print out whatever you just computed.
At the end of the program, compute the area change by dividing the second area by the first area. This gives you the
factor by which the area grew. Store this value in an appropriately named variable (which you will have to declare).
Add a println statement to print the change in area that you just computed.
Now repeat the last two steps for the circumference.
Look at the results. Is this what you expected?
3. In the program above, you showed what happened to the circumference and area of a circle when the radius went from
10 to 20. Does the same thing happen whenever the radius doubles, or were those answers just for those particular
values? To figure this out, you can write a program that reads in values for the radius from the user instead of having it
written into the program (“hardcoded”). Modify your program as follows:
At the very top of the file, add the line
import java.util.Scanner;
This tells the compiler that you will be using methods from the Scanner class. In the main method create a Scanner
object called scan to read from System.in.
Instead of initializing the radius in the declaration, just declare it without giving it a value. Now add two statements
to read in the radius from the user:
A prompt, that is, a print statement that tells the user what they are supposed to do (e.g., “Please enter a value
for the radius.”);
A read statement that actually reads in the value. Since we are assuming that the radius is an integer, this will
use the nextInt() method of the Scanner class.
When the radius gets it second value, make it be twice the original value.
Compile and run your program. Does your result from above hold?
Chapter 2: Data and Expressions
17
Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.
Outline a 2- to-3-page security policy in which your team:
Format your assignment according to APA guidelines.
Project Deliverable 3: Remediation Plan
Create a remediation plan to map vulnerabilities and risks found to appropriate remediation efforts. Provide a recommendation for the fixes and include an explanation of any resources you may need (i.e., funding, expertise, etc.). Use Appendix Q from the Howard textbook to assist you in this exercise.
Insert the Remediation Plan as Appendix 4 in the SSP.
Submit this assignment to Canvas no later than the date identified above.
Using Appendix M in your textbook on page 275. Develop an interconnection agreement based on utilizing your home computer system as your home business system. The movement, protection, and reliability of your interconnection is important to your business so provide sufficient depth and scope of your interconnection agreement to ensure your business is protected and remains available. Develop a drawing/network topology of your home network that includes computers, switches, routers, Internet Service Provider, and any security or firewall protection. Your paper should be 2 pages in length using APA, 6th edition. your cover page and reference page is not included in the page count.
Write a 7-10 pp. paper (or 1750 to 2500 words, not counting works cited) that takes a position informed by research on the ethical dilemma(s) associated with the case study you explored in steps 1-4.
All the info needed is attached.
THE TOPIC OF THE PAPER IS; “Misuse of Personal Information and Data”
2. What does a buffer overflow do? (10 points)
3. Why is it important for information security professionals to know the laws that affect them? (10 points)
4. What are some other security models besides the CIA triad? (10 points)
5. What are the four components of security documentation? (10 points)
6. What are responsibilities of a security architect? (10 points)
7. What is authentication? What is authorization? Together, what are authentication and authorization used for? (10 points).
8. What are the three commands for administering database object permissions? (10 points)
9. What best practice network architecture should be used for databases that provide data via a web server to the Internet? (10 points)
10. Why is encryption generally not used in the core layer? (10 points)
A word file that needs to be edited.
I’ve attached multiple files showing the instructions.
Please make sure you read the instructions carefully as the doctor is very specific about what she wants.
How to hack cryptocurrencies and block chain systems? What are the biggest weakness in those systems?