Need help with an assignment.
Program to demonstrate function
/* Program to demonstrate function.*/
Write a program which has two functions, the main function and the input function.
The input function asks the user to enter an integer from 0 to 100, inclusive.
In the input function:
• If the user enters a number that is out of the required range, the number is XXXXX returned to the main function; instead it prints an error message and then loops to ask the user to enter a correct number.
•If the user enters a number in the required range, the number is XXXXX to the main function.
•If the user enters End Of File, the input function returns -1 to the main function.
• When the main function receives -1 from the input function, it prints a completion message and the program ends.
• When the main function receives any other number, the main function prints it, and calls the input function again.
•The input function does NOT print the numbers; they are only printed in the main function.
•Except for the -1, the main function prints all numbers returned to it from the input function.
Hints:You might use a do…while loop in the main function, that runs as long as -1 is not returned. You might use a do…while loop in the input function, that loops as long as the user enters a number that is out of the required range. Make sure your program does not confuse the datum -1 with EOF, which is also -1Only code one return from each function.
Test data: use each of the following values: 100 101 20 -5 0 9 -1 18
The main function should print 100 20 0 9 18 and a run completed message.
DS-12
Propose and defend ” Quantitative v. Qualitative security risk assessment” topic for your final project. Write 500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list below to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth Library research databases
Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.
Write in essay format not in bulleted, numbered or other list format.
cloud troubleshooting
you will explore the CompTIA troubleshooting model. The model includes the following steps:
- Identify the problem.
- Establish a theory of probable cause.
- Test the theory to determine the cause.
- Establish a plan of action to resolve the problem and identify potential effects.
- Verify full system functionality and if applicable implement preventative measures.
- Document findings, actions, and outcomes.
Now that you are familiar with the steps, follow the instructions below to complete this assignment:
- In a Word document, answer the following questions with a brief summary:
- What advantages does the divide and conquer approach have over top-down or bottom-up?
- What problems might you encounter in a user’s description of a problem?
- Consider a technical problem you’ve solved in the past, whether in IT or some other aspect of life. Identify both the process you followed to solve it and how you would do things differently by following the CompTIA model.
- What steps would you take if you configured a new VM and found it unreachable through the network?
- What would be a good place to check if you’re only having connection issues with some kinds of traffic but not others?
- The certificate for one of your servers is expired. It uses strong enough security settings that you’re confident no one’s cracked its encryption, but why should you still replace it immediately?
Input Validation and Business Logic Security Controls
Input Validation and Business Logic Security Controls
4 pages Paper
Research-Brief
The focus of this assignment is on understanding the need for a brief as part of the data visualization workflow.
a. Briefly describe a data visualization project (either real or fictional) that might be needed in your workplace. (If you are currently not working, feel free to create a fictional, business-based example.)
b. Consider that there is a preference by leadership in the organization to skip the creation of a brief and begin working on acquiring and preparing the data, then moving directly to creating visualizations.
c. Construct an essay that acknowledges the perspective of the organization in skipping the brief, but supports the necessity for preparing the brief before working with the data. Use reference-based content to support the argument.
- Minimum count – 1000
- Minimum references – 3
- APA alignment required
30/p1
Write a 6-pages paper (deliverable length does not include the title and reference pages)
- Why are organizations interested in fostering good business ethics?
- What approach can you take to ensure ethical decision-making?
- What trends have increased the risk of using information technology in an unethical manner?