Area and Circumference of a Circle

  

Area and Circumference of a Circle 

Study the program below, which uses both variables and constants:

// ************************************************************

// Circle.java

//

// Print the area of a circle with two different radii

// ************************************************************

public class Circle

{

public static void main(String[] args)

{

final double PI = 3.14159;

int radius = 10;

double area = PI * radius * radius;

System.out.println(“The area of a circle with radius ” + radius +

” is ” + area);

radius = 2 0;

area = PI * radius * radius;

System.out.println(“The area of a circle with radius ” + radius +

” is ” + area);

}

}

Some things to notice:

The first three lines inside main are declarations for PI, radius, and area. Note that the type for each is given in these

lines: final double for PI, since it is a floating point constant; int for radius, since it is an integer variable, and double for

area, since it will hold the product of the radius and PI, resulting in a floating point value.

These first three lines also hold initializations for PI, radius, and area. These could have been done separately, but it is

often convenient to assign an initial value when a variable is declared.

The next line is simply a print statement that shows the area for a circle of a given radius. 

The next line is an assignment statement, giving variable radius the value 20. Note that this is not a declaration, so the int

that was in the previous radius line does not appear here. The same memory location that used to hold the value 10 now

holds the value 20—we are not setting up a new memory location.

Similar for the next line—no double because area was already declared.

The final print statement prints the newly computed area of the circle with the new radius. 

Save this program, which is in file Circle.java, into your directory and modify it as follows: 

1. The circumference of a circle is two times the product of Pi and the radius. Add statements to this program so that it

computes the circumference in addition to the area for both circles. You will need to do the following:

Declare a new variable to store the circumference.

Store the circumference in that variable each time you compute it.

Add two additional print statements to print your results.

Be sure your results are clearly labeled. 

2. When the radius of a circle doubles, what happens to its circumference and area? Do they double as well? You can 

determine this by dividing the second area by the first area. Unfortunately, as it is now the program overwrites the first 

Chapter 2: Data and Expressions 

16

area with the second area (same for the circumference). You need to save the first area and circumference you compute

instead of overwriting them with the second set of computations. So you’ll need two area variables and two

circumference variables, which means they’ll have to have different names (e.g., area1 and area2). Remember that each

variable will have to be declared. Modify the program as follows:

Change the names of the area and circumference variables so that they are different in the first and second

calculations. Be sure that you print out whatever you just computed.

At the end of the program, compute the area change by dividing the second area by the first area. This gives you the

factor by which the area grew. Store this value in an appropriately named variable (which you will have to declare).

Add a println statement to print the change in area that you just computed.

Now repeat the last two steps for the circumference. 

Look at the results. Is this what you expected? 

3. In the program above, you showed what happened to the circumference and area of a circle when the radius went from

10 to 20. Does the same thing happen whenever the radius doubles, or were those answers just for those particular

values? To figure this out, you can write a program that reads in values for the radius from the user instead of having it

written into the program (“hardcoded”). Modify your program as follows:

At the very top of the file, add the line 

import java.util.Scanner; 

This tells the compiler that you will be using methods from the Scanner class. In the main method create a Scanner

object called scan to read from System.in.

Instead of initializing the radius in the declaration, just declare it without giving it a value. Now add two statements

to read in the radius from the user:

A prompt, that is, a print statement that tells the user what they are supposed to do (e.g., “Please enter a value

for the radius.”);

A read statement that actually reads in the value. Since we are assuming that the radius is an integer, this will

use the nextInt() method of the Scanner class.

When the radius gets it second value, make it be twice the original value.

Compile and run your program. Does your result from above hold? 

Chapter 2: Data and Expressions 

17

digital forensics

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Application Security Concerns Policy

 

Assignment Content

  1. For this assignment, your team will add to last week’s assignment and outline application security policies for the health insurance company. Your organization’s chief information security officer (CISO) wants to improve the application security controls throughout the company since it must protect confidential and personally identifiable information of its customers.

    Outline a 2- to-3-page security policy in which your team:

    • Defines application security policies
    • Defines user login and password policies
    • Defines secure coding policies and tests for internally created software
    • Includes 2 other standards or guidelines of your team’s choice
    • Cite any references to support your assignment.

      Format your assignment according to APA guidelines.

Project 3

 

Project Deliverable 3: Remediation Plan

Create a remediation plan to map vulnerabilities and risks found to appropriate remediation efforts. Provide a recommendation for the fixes and include an explanation of any resources you may need (i.e., funding, expertise, etc.). Use Appendix Q from the Howard textbook to assist you in this exercise.

Insert the Remediation Plan as Appendix 4 in the SSP.

Submit this assignment to Canvas no later than the date identified above.

syc2

 Using Appendix M in your textbook on page 275. Develop an interconnection agreement based on utilizing your home computer system as your home business system. The movement, protection, and reliability of your interconnection is important to your business so provide sufficient depth and scope of your interconnection agreement to ensure your business is protected and remains available. Develop a drawing/network topology of your home network that includes computers, switches, routers, Internet Service Provider, and any security or firewall protection. Your paper should be 2 pages in length using APA, 6th edition. your cover page and reference page is not included in the page count. 

Ethics and Technology paper

 Write a 7-10 pp. paper (or 1750 to 2500 words, not counting works cited) that takes a position informed by research on the ethical dilemma(s) associated with the case study you explored in steps 1-4. 

All the info needed is attached. 

THE TOPIC OF THE PAPER IS;  “Misuse of Personal Information and Data”

 

Data and Security System

  

  1. What are      some examples of confidential information? (provide at least 5 examples).      (10 points)

2. What does a buffer overflow do? (10 points) 

3. Why is it important for information security professionals to know the laws that affect them? (10 points)

4. What are some other security models besides the CIA triad? (10 points)

5. What are the four components of security documentation? (10 points)

6. What are responsibilities of a security architect? (10 points)

7. What is authentication? What is authorization? Together, what are authentication and authorization used for? (10 points).

8. What are the three commands for administering database object permissions? (10 points)

9. What best practice network architecture should be used for databases that provide data via a web server to the Internet? (10 points)

10. Why is encryption generally not used in the core layer? (10 points)