Assignment 1A tests your knowledge of Recursion (Chapter 18. Design a program/project/driver class (the program/project/driver class file should be called YourNameAssignment1A; replace YourName with your actual name), with the following exact1 methods in this order: Method Description Method1 A recursive method that computes the Nth element in this series: Method1(x, N)=1+x 1+x2+x3+…+xN where N is an integral number between 0 and 1000 and x is a floating-point number. The method should return N+1 if x is 1. For example, Method1(1,0) is 1, Method1(1,1) is 2, Method1(1,2) is 3, Method1(2,1) is 3 Method1(2,2) is 7. The method should receive the floating-point number x and integral number N as parameters and return the Nth value in the series for that x and N. Method2 A recursive method that finds the number of occurrences of a specific letter in a word (any case). The method should receive the character for the Letter and the string with the Word as parameter and return the number of occurrences of the Letter in Word. For example, Method2(‘a’, “cat”) is 1, Method2(‘a’, “Azalea”) is 3, Method2(‘a’, “CALAMATA”) is 4, Method2(‘a’, “biotechnologies”) is 0. main The main method should call the 2 methods as follows: ▪ Ask the user for a floating-point number X and print the first 21 values from the Method1 series (call Method1 for X and all the Numbers between 0 and 20) and output them in a table format, with first column showing the value for the Number and the second column showing the corresponding value computed from Method1(X, Number) call. For example, if the user enters 2 for the floating-point number X, the output should be: N METHOD1(2, N) 0 1 1 3 2 7 … (and so on until 20) ▪ Ask the user for Word, and use Method2 to compute the number of occurrences of each Letter in the alphabet (from ‘a’ to ‘z’) in the Word (counting both lower and upper case of the Letter) and output it in a table format with first column showing the letter and the second column showing the corresponding number of occurrences computed from the Method2(Letter, Word) call). For example, if the user enters “cat” for the Word, the output should be: Letter METHOD2(Letter, ”cat”) A 1 B 0 C 1 … (and so on until Z)
Assignment
1. Please share your thoughts about DoS and DDos.(your own words)
2. Please define the role of DoS versus DDos.(detailed)
DB 7 CIS 222
Last week’s working group meeting on encryption has carried over to discussions on securing the network connections between the PCS corporate office and satellite offices.
Consider the network risks that may be discovered during the assessment phase of RMF. Assessments can be time consuming. Propose an automated tool that may be used to identify some of these risks. Additionally, discuss some of the devices that can add security protection for the network links between the corporate and satellite offices. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discussing the importance of network security devices.
Discussion 11- Org Behavior
Assigned Readings: Chapter 11. CommunicationInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:
- You have recently been promoted to district manager of a large scale restaurant chain which specializes in affordable meals in a pleasant environment. In accordance with management objectives, you are responsible for increasing sales of appetizers by 20 percent by the next quarter for the 15 locations in your area. Keeping channel richness in mind, how will you make contact with the restaurant employees to facilitate the sales increase?
Text-
Title: Essentials of Organizational Behavior, Student Value Edition
ISBN: ISBN-13: 9780135468890
Authors: Stephen P. Robbins, Timothy A. Judge
Publisher: Pearson
Edition: 15TH
Security Architecture and Design – Final project
Final Project
Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. The assignment must be at least 1500 words. Include a cover sheet with a title, your name, class ID, and date at minimum.
Your work over the next 8 weeks will lead up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses:
- Financial (Bank, brokerage, Insurer, etc.)
- Hospital/Medical Services
- Pharmaceutical/Chemical
- Social Media Company
- Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
- Manufacturer (Automobile, Computer, Consumer Electronics, etc.)
Respond to the following:
- Identify the business type you have selected for your paper.
- Provide a brief overview of the business
- Provide the goals and approach to the project
- Architectural diagrams and annotations
Submission
Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. Check your work and correct any spelling or grammatical errors. Include at least two APA most recent references.
Chapter Summary
Need to write about 350 words of summary of EACH CHAPTER, so that it contains:
(part 1) important concepts of the chapter
(part 2) experience/application/opinions of the chapter.
Total 6 chapters, 350 word for each
Java programming, network
You are required to write an Echo Client and an Echo Server program. The echo client communicates with the echo server using UDP. The programs should fulfill the following requirements:
Client:
1. Prompts the user to input the IP address, port number of the server, and a message to send to that server.
2. Sends the message to the server.
3. Display the server replay by using the same socket.
4. Displays an error message if the IP address or port number were entered incorrectly.
5. The client should be able to send multiple messages to the server. You may need to consider using the infinite loop as we discussed in the class.
Server
1. Receives the message from the client.
2. Change the letters of the message to “capital letters” and send it back to the client by using the same socket.
3. The server should be able to send multiple messages to the client. You may need to consider using the infinite loop as we discussed in the class.
Note:
1. Java language should be used.
2. Do NOT hard code the server address and port number in your source code.
3. Your program should work under MS-DOS window (command line). You need to compile your code by using JavaC.
IT476: Database Management System week 1
Week 1: Discussion
After you review Chapter 1 in your textbook and review all course materials in Module 1, please answer the following two questions:
Assignment Question :
1A)- What is the difference between a database and a DBMS?
1B) – What is data, metadata, and information? What are the differences?
2- Go to: https://www.niche.com/k12/search/best-public-elementary-schools/s/virginia/
Convert the school data found on this page into a row-column format (Click on the link below for hints)
You are required to make at least two comments on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words.
Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans
Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans
100% Marked on MYITLAB
Project Description:
You work for the vice president’s office at a major university. Human Resources provided a list of deans and associate deans, the colleges or schools the represent, and other details. You will use text functions to manipulate text, apply an advanced filter to display selected records, insert database summary statistics, use lookup functions, and display formulas as text.
Start Excel. Download and open the file named Exp19_Excel_Ch11_CapAssessment_Deans.xlsx. Grader has automatically added your last name to the beginning of the filename.
First, you want to combine the year and number to create a unique ID.
In cell C8, enter 2006-435 and use Flash Fill to complete the IDs for all the deans and associate deans.
Next, you want to create a three-character abbreviation for the college names.
In cell E8, use the text function to display the first three characters of the college name stored in the previous column. Copy the function to the range E9:E28.
The college names are hard to read in all capital letters.
In cell F8, insert the correct text function to display the college name in upper- and lowercase letters. Copy the function to the range F9:F28.
You want to display the names in this format Last, First.
In cell J8, insert either the CONCAT or TEXTJOIN function to combine the last name, comma and space, and the first name. Copy the function to the range J9:J28.
Columns K and L combine the office building number and room with the office phone extension. You want to separate the office extension.
Select the range K8:K28 and convert the text to columns, separating the data at commas.
You decide to create a criteria area to perform an advanced filter soon.
Copy the range A7:M7 and paste it starting in cell A30. Enter the criterion Associate Dean in the appropriate cell on row 31.
Now you are ready to perform the advanced filter.
Perform an advanced filter using the range A7:M28 as the data source, the criteria range you just created, and copying the records to the output area A34:M34.
The top-right section of the worksheet contains a summary area. You will insert database functions to provide summary details about the Associate Deans.
In cell L2, insert the database function to calculate the average salary for Associate Deans.
In cell L3, insert the database function to display the lowest salary for Associate Deans.
In cell L4, insert the database function to display the highest salary for Associate Deans.
Finally, you want to calculate the total salaries for Associate Deans.
In cell L5, insert the database function to calculate the total salary for Associate Deans.
Format the range L2:L5 with Accounting Number Format with zero decimal places.
The range G1:H5 is designed to be able to enter an ID to look up that person’s last name and salary.
In cell H3, insert the MATCH function to look up the ID stored in cell H2, compare it to the IDs in the range C8:C28, and return the position number.
Now that you have identified the location of the ID, you can identify the person’s last name and salary.
In cell H4, insert the INDEX function. Use the position number stored in cell H3, the range C8:M28 for the array, and the correct column number within the range. Use mixed references to keep the row numbers from changing. Copy the function to cell H5 but preserve formatting. In cell H5, edit the column number to display the salary.
In cell D2, insert the function to display the formula stored in cell F8.
In cell D3, insert the function to display the formula stored in cell H3.
In cell D4, insert the function to display the formula stored in cell H4.
In cell D5, insert the function to display the formula stored in cell L3.
Create a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side.
Save and close Exp19_Excel_Ch11_CapAssessment_Deans.xlsx. Exit Excel. Submit the file as directed.
150/p3
- What are different types of inventory management software that could be used to track an organization’s assets?
- What are the defining features of these software programs?
