Data Structures

 

The Software Development Company now requests you add final elements to the C# program.

For this week’s assignment, build on the Week Four Individual Assignment, “Error Handling,” by reading the software developers’ C# data structure records data from a file (data.txt), implement an array data structure containing the data, and display on the console all the software developers’ data, monthly pay, monthly taxes, annual gross pay, annual taxes, and net pay. 

Program Input File:

Create a Comma Separated Values (CSV) text file and named “data.txt.” The data.txt file shall include information on at least five developers put into rows and including software developer name, addresses, and monthly gross pay separated by a comma.

Using Visual Studio® and C# programming concepts, write a program to meet the specifications of the company’s request. The program should have the following characteristics:

  • Compile and Execute without errors
  • Meets specifications by demonstrating file handling, array data structure manipulation, and console output mastery by accomplishing the following:
    • Read software developers’ data from a file
    • Input the data into an array data structure
    • Display the software developers’ data on the console
  • Logic flow is clear, concise, and effective
  • User inputs and outputs should be clear on screen
  • Validation for input types and data format
  • Appropriate indentation to logically illustrate program structure
  • Identifiers logically describe use
  • Naming conventions are consistent
  • Comments and headers to explain processing that is not obvious

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

modern oprating systems

  

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Virtual machine environments and nonvirtual or real-time machine environments each have their own challenges with selecting an operating system configuration with the most effective process-scheduling algorithms.

Investigate the library and Internet for information about process-scheduling algorithms used in operating systems for virtual machine and nonvirtual machine environments.

  • Select at least 2 operating      system process-scheduling algorithms, and compare and contrast their      effectiveness in a virtual machine environment and in a nonvirtual      environment.
  • Which scheduling algorithm is      effective in both a virtual machine and non-virtual machine or real-time      environment? Defend your answer.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your      classmate’s posting?
  • What additional questions do you      have after reading the posting?
  • What clarification do you need      regarding the posting?
  • What differences or similarities      do you see between your posting and other classmates’ postings?

For assistance with your assignment, please use your text, Web resources, and all course materials.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

due on saturday

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Access to the back-end database will be an important part of the network design. Research and discuss the different possibilities for virtual private network (VPN) access to the back-end database. Include in your discussion the different types of VPNs, their key characteristic, and how they would be set up and used for database access. 

Outline your ideas in a 3–5-paragraph posting. Study the postings of at least 2 other classmates, and respond to them with comments and questions. Ask for clarifications of their ideas if necessary. 

Be sure to document your references using APA format. 

Grading Rubric 

  Project Criteria Exceeds: 90%–100% Very good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%   

Content
(40%)

Response covers all topics indicated in the assignment and adds additional content. The writing was of collegiate level with no errors in spelling or grammar. Response covers most topics indicated in the assignment. The writing was of collegiate level with one or less errors in spelling or grammar. Response covers many topics indicated in the assignment. The writing was of collegiate level with two or less errors in spelling or grammar. Response covers none to some of the topics indicated in the assignment. The writing was less than collegiate level with errors in spelling or grammar.   

Interaction
(40%)

Multiple learner interactions per week that add to the discussion. Responses show evidence of critical analysis with questions to other classmates. At least three learner interactions per week that add to the discussion. Responses show evidence of critical analysis. No less than two learner interactions per week that add to the discussion. Responses show evidence of critical analysis. Zero to one learner interaction per week in the discussion board. Response lacks evidence of critical analysis.   

Supporting Analysis
(20%)

Analysis exceeded minimum requirements. Appropriate sources were used to support analysis and were properly referenced. Basic analysis provided to support discussion. When appropriate to support discussion, appropriate sources were cited and properly referenced. Some limited analysis provided to support discussion. When appropriate to support discussion, sources were cited, appropriate, and properly referenced. No or inaccurate analysis, no sources were cited when needed, analysis and/or sources were not appropriate. When sources used, were not properly referenced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

To enhance the security of information systems, enterprises are developing and adopting information system management systems. However, if an information management system is exploited, applications and the data they contain will be compromised. Therefore

 

To enhance the security of information systems, enterprises are developing and adopting information system management systems. However, if an information management system is exploited, applications and the data they contain will be compromised. Therefore, it is important to perform comprehensive threat modeling throughout the enterprise.

In your own words explain (a) what is threat modeling, and (b) why it is important for an enterprise to address threat modeling extensively. Please state your answer in a 1-2 page paper in APA format.  Include citations and sources in APA style.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

N & C 4-1

 Students are to observe two or more adults unknown to the observer. The student must not be able to hear the subjects being observed and those being observed must not be wearing a uniform of any kind as this would provide information about their occupation to the observer. Students must describe the environment and the people being observed, i.e., age, gender, dress, etc. Discuss the nonverbal communication, i.e. eye contact, body position and any other nonverbal behavior. Provide your interpretation of the relationship between those being observed. Be very discrete and do not have a conversation with those being observed. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

STRIDE Variations Please respond to BOTH of the following questions: Question A Compare and contrast the three STRIDE variants of (a) STRIDE-per-Element, (b) STRIDE per-Interaction, and (c) Desit. Question B Each week, research a unique news story or ar

STRIDE Variations

Please respond to BOTH of the following questions:

75-150 Words

Question A

  • Compare and contrast the three STRIDE variants of (a) STRIDE-per-Element, (b) STRIDE per-Interaction, and (c) Desit.

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Capstone Discussions

 

The Lessons Learned Discussion is your opportunity to reflect upon your experiences in this course and your degree program. Consider the following questions as you prepare the posting.

  1. What did you learn as a result of completing the project?
  2. What suggestions do you have for the improvement of the capstone course and/or project?
  3. What are some of the most interesting and/or useful topics or courses from your master’s program? Explain.
  4. How do you plan to use what you have learned in this course and in your program as you begin or continue your career?
  5. Consider you entire learning experience at CTU. What changes would you recommend to improve the learning experience for other students at CTU?

Instructions

  • You are encouraged to respond to the postings and questions of other students.
  • You are expected to respond to any questions asked by the professor or another student.
  • You are expected to edit your posting for errors of grammar, punctuation, spelling, and sentence construction.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Configuring BitLocker and Windows Encryption

1. Within a Microsoft Windows Server 2016 environment, who has access rights

to the EFS features and functions in the server?

2. What are some best practices you can implement when encrypting BitLocker

drives and the use of BitLocker recovery passwords?

3. What was the recovery key generated by BitLocker in this lab?

4. How would you grant additional users access rights to your EFS encrypted

folders and data files?

5. What are the main differences between EFS and BitLocker?

6. The customer privacy data policy in your company’s data classification

standard requires encryption in two places: data stored locally or on a LAN,

and data stored on a laptop. Describe your solution for meeting this policy

requirement.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CPS some question work

ONE:Now that you have read the chapter about the OSI model, how would you change it? Are there inefficiencies or redundancies in the model?

TWO:Learning Objectives

In this lab, you’ll examine the layers of the OSI seven-layer model and the TCP/IP model. When you’ve completed this lab you will be able to

● Explain why layered models are used to describe data communication.

● Identify each of the seven layers of the OSI model. 

Lab Materials and Setup

The materials you need for this lab are

The Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks textbook

● Pencil and paper

Instructions

Work through the following tasks to investigate the details of network data delivery using the OSI seven-layer model. 

Task 1: Answer the following questions.

1. How does the concept of layers describe flow of information or communications?

2. How are layers used to describe data communications? 

3. What is a mnemonic used for remembering the OSI model? 

4. What is the OSI model and what are its benefits?

5. What are some advantages of the OSI model? 

6. What is a PDU?

7. Explain data encapsulation. 

THREE:Use the following worksheet to complete the Hardware Lab. Make sure you also download the zip file with the images you will need for the lab. 

Attach your completed Hardware Lab worksheet to this drop box and submit it. Your submitted file can be in any of these formats: .doc, .docx, .rtf, or .pdf.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MN603 Wireless network security Punjab Assignment help

check and confirm if you can do it

Please read details before sending bid

Serious writers only

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now