Creating Data Recovery Plan

 Assignment: Create a Data Recovery PlanLearning Objectives and Outcomes

  • Describe the general process for examining and recovering data from a hard disk.
  • Create a data recovery plan for future use.

Assignment Requirements
You are an employee of DigiFirm Investigation Company. You received a call from Bill, an engineer at Skyscraper, Inc., a large commercial construction company. Bill reported that a disgruntled employee reformatted a hard disk that contained valuable blueprints for a current job. The computer is an ordinary laptop that was running Windows 7. No backup is available, and Bill wants the data to be recovered.

You can use a few built-in tools to recover deleted files from a Windows 7 operating system. There are also third-party tools that might be helpful. Before beginning any data recovery endeavor, it’s a good idea to research your options and plan your approach.For this assignment, write a report that includes a data recovery plan outline, listing the steps to be performed in recovering the data in the order of importance.
Required Resources

  • Course textbook
  • Internet access

Submission RequirementsFormat:Microsoft WordFont:Arial, 12-point, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched and identified the appropriate steps for recovering data from a reformatted hard disk.
  • I properly outlined each step in the data recovery process in correct order.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

In this project, you have to write a C++ program to keep track of banking transactions. with algorithm!

    

  1. As with all projects in this course, your program’s output will display your name, your EUID, your e-mail address, the department name, and course number. This means that your program will print this information to the terminal (see the sample output).
     
  2. Declare and initialize the following constants and variables.
     

    • A global floating-point constant of type double to store the minimum balance for the
      business account initialized to 10000.00.
       
    • A global floating-point constant to of type double to store the minimum balance for the
      personal account initialized to 1000.00.
       
    • A global integer constant of type integer to store the length of account number and
      initialize it to 6.
       
    • A global integer constant of type integer to store the maximum number of transactions
      and initialize it to 20.
       
  3. Declare an enumeration constant with values Business and Personal and assign integer values 0
    and 1 to the data items, respectively. They represent the type of bank account.
     
  4. Declare another enumeration constant with values Process, Display and Quit, and assign suitable integer values 1, 2 and 3 to the data items, respectively. They represent menu choice presented
    to the user.
     

 

  1. Write a
    • •


     
  2. Write a
    • •
     

function named getName which gets the name on the bank account. Inside the function: Using a suitable message, prompt the user for the name on the account. The name can have multiple words.
Only alphabets (A-Z or a-z) and whitespaces are permitted in the account name. 

o If the user enters any other characters in the name, you need to generate an error message and ask for the name again. 

o Yourprogrammustkeeponaskingtheusertoenterthenameuntiltheuserentersit correctly.(SEE SAMPLE OUTPUT 1) 

The user may type the name in either uppercase or lowercase, but you need to convert every initial to uppercase. (SEE SAMPLE OUTPUTS)
This function will be called by the main function. 

function named getAccountNumber which get the account number. Inside the function: Using a suitable message, prompt the user for the number of the account.
The account number must be a 6-digit number. 

  

  • If the user enters an account number with more than 6 digits generate an error message and ask the user to enter the number again.
     
  • Only numbers 0-9 are permitted in the account number. If the user enters an account number with non-numeric characters, generate an error message, and ask the user to enter the number again.
     
  • Your program must keep on asking the user to enter the number until the user enters it correctly. (SEE SAMPLE OUTPUTS 1 and 2)
     
  • This function will be called by the main function.
     

7. Write a function named encrypt_num. This function must receive the account number using a string variable and encrypt the account number. Inside this function: 

  • Declare an array of integers with size equal to the length of the account number.
     
  • Using a loop of your choice, populate the array with seeded randomly generated numbers
    between 10 and 20 inclusive.
     
  • In a second loop, add the randomly generated number to the characters in the account
     

 

• 

8. Write a 

• 

• • 

• • 

 

number to offset each character by the random value.
oStore the new characters in a different string. This new string is now your encrypted 

account number.
This function will be called by the main function. 

function named display_transactions. It accepts four parameters:
A 2D array of type double named transactions that stores the transactions performed on the accounts. The number of columns this 2D array is 2. The first column stores the business transactions while the second column stores the personal transactions. The maximum number of rows is limited to the maximum number of transactions declared globally, but note that the account may not have values for all 20 transactions. Also note that the number of personal and business transactions that are actually performed can be different.
An integer that represents the number of transactions to display.
An enum variable that determines whether the account is a Business account or a Personal Account.
A Boolean variable that determines if the transactions needed to sorted while displaying. The default value of this Boolean is false.
Inside this function: 

 

o Display the content of the transactions array that relates to the correct account type – Business and Personal (display the correct column, not both columns). 

o Sort if the default value has been overridden with true when this function is called.
o Your numeric data must have two numbers after the decimal point and a $ sign in front 

 

of the number (for example, $1375.85).
• This function will be called by the displayAccount function. 

9. Write a function named displayAccount.
• This function accepts three parameters. 

  

• 

10. Write a 

• 

• • 

• 

 

• 

o A 2D array of type double named transactions that stores the transactions performed on the accounts. 

o An integer that represents the number of business transactions to display.
o An integer that represents the number of personal transactions to display.
Inside this function:
o Using a suitable message, ask the user which account needs to be displayed – Business 

or Personal.
o Using a suitable message, ask the user if the display needs to be sorted.
o Based on the account type selected by a user, design a switch-case block with a default 

case, to implement the following features. 

  • ➢  You must use the enumeration constants to set up your cases.
     
  • ➢  You must use a variable of your enumeration constant type for switching control.
     
  • ➢  If the user chooses a Business account, call function display_transactions with
    suitable value of parameters.
     
  • ➢  If the user chooses a Personal account, call function display_transactions with
    suitable value of parameters.
     
  • ➢  If the user enters a wrong choice, use the default case to provide an error message
    and ask the user to make the choice again.
     
  • ➢  Your program needs to keep on asking the user for the choice until the user chooses
    a correct choice. (SEE SAMPLE OUTPUT 1) This function will be called by the main function.
    function named process_account.
    It accepts five parameters:
    o A 2D array of type double named transactions that stores the transactions performed
    on the accounts.
    oAn integer that represents the number of business transactions that has been
    processed.
    oAn integer that represents the number of personal transactions that has been
    processed.
    o A double that represents the current business account balance.
    o A double that represents the current personal account balance.
    Inside this function:
    Ask the user to choose which account the user wants to access – Business or Personal.
    o Use a suitable integer value to get the choice from the user.
    Based on the choice of the user, design a switch case block to implement the following requirements.
    o You must use the enumeration constants to set up your cases.
    o You must use a variable of your enumeration constant type for switching control.
    o If the user chooses a Business account
     
  • ➢  Prompt the user for a transaction to process. The transaction can be a positive or a negative value. Positive transactions are deposits and negative transactions are withdrawals.
     
  • ➢  If the current balance falls below the required minimum balance for a business account, there is a 10$ penalty (decrease current balance by $10 for every new
     

  

transaction) until the current balance updates to at least the minimum required 

balance. (SEE SAMPLE OUTPUT 5)
➢ If the current balance is below the minimum required balance, remind the user that 

the account is losing 10$ for every transaction using a suitable message. (SEE 

SAMPLE OUTPUT 5) 

o If the user chooses a Personal account 

  • ➢  Prompt the user for a transaction to process. The transaction can be a positive or a
    negative value. Positive transactions are deposits and negative transactions are
    withdrawals.
     
  • ➢  If any transaction drops the current balance below the minimum personal balance,
    the transaction will be denied with a suitable message to the user.
     
  • ➢  Note that for personal accounts the current balance will never be less than the
    minimum balance and hence there are no provision of penalties either.
     

o If the user enters a wrong choice, use the default case to provide an error message and 

ask the user to make the choice again.
➢ Your program needs to keep on asking the user for the choice until the user chooses 

a correct choice. (SEE SAMPLE OUTPUT 1)
oDisplay the current balance in either case after each successful transaction. (SEE 

SAMPLE OUTPUTS) 

➢ Your numeric data must have two numbers after the decimal point and a $ sign in front of the number (for example, $1375.85). 

o This function needs be able to process more than one transaction.
oAfter successfully processing a transaction, ask the user if the user wants to process 

another transaction.
o If the user chooses to process another transaction, use a suitable loop to ask the user 

about the type of account and the transaction to process. (SEE SAMPLE OUTPUTS )
o If the user chooses to process additional transactions, the previous transactions should 

not be overwritten.
o Assume the user will not perform more than 20 transactions on either account. 

• This function will be called by the main function. 

11. Inside your main function: 

  • Declare a 2D array of doubles to store the transactions performed on the account.
     
  • Display a menu for the user (SEE SAMPLE OUTPUT) that provides the user three choices.
    o Process an account
    o Display the transactions on an account. o Quit the program
     
  • Declare a double variable to store the current personal account balance and initialize it with the value 1000.00.
     
  • Declare a double variable to store the current business account balance and initialize it with the value 10000.00.
     
  • Declare two integer variables to store the number of business transactions and the number of personal transaction and initialize both with 0.
     
  • Declare a string variable to store the name on the account.
     

  

o Call the getName function and pass the string variable for name to get the name. 

  • Declare a string variable to store the account number.
    o Call the getAccountNumber function and pass the string variable for account number to get the account number.
     
  • Using a suitable message, ask the user to make the menu choice using an integer variable.
     
  • Based on the value entered by the user for menu choice, design a switch-case block to
    implement the following requirements.
    o You must use the enumeration constants to set up your cases.
    o You must use a variable of your enumeration constant type for switching control. o If the user chooses to process an account
    ➢ Call the function processAccount with suitable parameters. o If the user chooses to display an account
    ➢ Display the name with suitable message. Make sure the displayed name follows all requirements of Step 5.
    ➢Display the encrypted account number with suitable message. Call the encrypt_num function with appropriate arguments to encrypt the account number.
    ➢ Call the function displayAccount with appropriate arguments. o If the user choose to quit the program.
    ➢ Exit the program with a suitable message.
    o If the user chooses anything else, execute the default case to notify the user an incorrect
    choice.
     

    • ➢  Using a suitable loop, ask the use for the choice again.
       
    • ➢  Your program must keep on looping until the user enters the correct choice. (SEE
      SAMPLE OUTPUT 2)
       
  1. Your program source code should be named “euidProject2.cpp”, without the quotes.
    where euid should be replaced by your EUID.
     
  2. Your program will be graded based largely on whether it works correctly on the CSE machines (e.g., cse01, cse02, …, cse06), so you should make sure that your program compiles and runs on a CSE machine.
     

DESIGN (ALGORITHM): 

On a piece of paper (or word processor), write down the algorithm, or sequence of steps, that you will use to solve the problem. You may think of this as a “recipe” for someone else to follow. Continue to refine your “recipe” until it is clear and deterministically solves the problem. Be sure to include the steps for prompting for input, performing calculations, and displaying output. 

You should attempt to solve the problem by hand first (using a calculator as needed) to work out what the answer should be for a few sets of inputs.
Type these steps and calculations into a document (i.e., Word, text, or PDF) that will be submitted along with your source code. Note that if you do any work by hand, images (such as pictures) may be used, but they must be clear and easily readable. This document shall contain both the algorithm and any supporting hand-calculations you used in verifying your results. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CREATE TABLES AND QUERIES IN MS ACCESS

 

Overview

For this assignment, you will use MS Access to create tables and queries.

Instructions

Using an ERD to create tables in MS Access
  • Refer to the ERD that you created in the Week 8 assignment. Create an ERD, and perform the following steps in MS Access: 
    • Create the tables and relationships from the database design created in the Week 8 assignment. 
    • Add at least five records into each table (Note: You must determine the field values).

Include the following screenshots in a Microsoft Word document to show the completion of the steps above: 

  • Screenshot depicting the tables created within MS Access.
  • Screenshots depicting the records added into each table. Include one student where the student’s last name is your name. 
Query tables in MS Access

Perform the following steps in MS Access:

  • Create a query with all fields from the student table, where the student’s last name is your name. 
  • Create a query that includes students’ first names, last names, and phone numbers. 
  • Create a query that includes instructors’ first names, last names, and courses they teach.

Include the following screenshots in a Microsoft Word document to show the completion of the steps above: 

  • Screenshot depicting the tables created. 
  • Screenshots depicting the records added into each table. 
  • Screenshots depicting the query results from each of the queries created. 

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is: 

  • Use MS Access to create tables and queries.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data visualization in 24 hr

Review  Discussion: Storytelling and Success Stories then focus on Moritz’s work on the  OECD Better life index download the executive summary and the index data.

In a one-page summary, note a few particular places around the world and compare and contrast the statistics.  Also, note briefly how this graphic tells the story.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

For all integers, k ≥ 1, any sum of k multiples of five is also a multiple of 5.

 

Typically we think of the sum of two or more numbers. To make this problem work, let’s define sum for just one integer to be that integer. 

For your problem to turn in, you will write a proof. Use the proof technique of strong mathematical induction to prove this statement. 

For all integers, k  ≥ 1,  any sum of k multiples of five is also a multiple of 5.  

Notes: 

1. Write or type your work neatly and completely.

2. Submit a word document 

3.Showing this is true for one example is not proof that it is always true 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lab 7

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Must be 100% original work. no plagiarism. 

Please complete Lab #7 Assessment Worksheet, Part A – BIA of business functions and operations and Lab #7 – Assessment Worksheet, Part B – Business Impact Analysis Executive Summary attached. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 524 Small Parser

Write a Python 3 program tlparser.py to parse the five given timelog data files in the folder “Homepage/Course Project/Small Parser” of the Blackboard to get how many hours and minutes the author spent in each file. The timelog file name will be an argument for your Python program. For example, you run your program on the spirit machine like “python3 tlparser.py TimeLogCarbon.txt” a. Your program needs to report the line number if there is something wrong with the format of the time data in that line that your Python program cannot parse. We cannot assume that there will be a time data value in each line. The line like ‘- 10.remove “other”’ is a perfect line. b. Your program start to count the time after it found the hard-coded “Time Log:” (case insensitive, there is a space between Time and Log). c. The “pm” and “am” should be case insensitive, i.e., 9:10pm or 9:10PM or 9:10pM or 9:10Pm are all valid time value. d. “9:10pm – 11:40pm” or “9:10pm-11:40pm” or “9:10pm -11:40pm” are all valid time periods, i.e., the spaces between “-” and the time value are not important. e. Do not use the regular expression module “re” in your source code. f. We assume there will be no space within “9:10pm”. Please issue “python3 tlparser.py TimeLogCarbon.txt” on the spirit machine (Python version 3.8.10) to test your Python program before you turnin it. Please use “if __name__ == ‘__main__’:” in your code and avoid global variables (read sections 2.5 and 3.17 at Google Python Style Guide (https://google.github.io/styleguide/pyguide.html)). Two articles about the variable __name__ in Python: https://medium.com/python-features/understanding-if-name-main-in-python-a37a3d4ab0c3 https://www.geeksforgeeks.org/what-does-the-if-__name__-__main__-do/ ease type your solutions in a Word document file hwch4_xxxxxxx.docx where xxxxxxx is your CSU ID number. Choose File -> Save As from Word to save your solutions as a hwch4_xxxxxxx.pdf. The cover page should contain your name, your CSU ID and the login id you used to turnin the project. Turning it in You have to submit your program electronically by using the following command on the grail machine: turnin -ccis524x -p sparser tlparser.py Start on time and good luck. If you have any questions, send e-mail to [email protected], [email protected], or [email protected].

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Compare and contrast the vulnerability scanning tools you used in the labs. Are there scenarios in which a scanning tool would be advantageous to use over others?
  • When assessing the security risks of a network, a step that is important but sometimes overlooked is the gathering of organizational data. How can knowledge of organizational data give you leverage over network vulnerabilities? Name two types of organizational data and explain how a hacker might be able to exploit them.

Cite sources to support your assignment. 

Format your citations according to APA guidelines. 

Submit the reflection.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

introduction to data science

  

In this project you will investigate the impact of a number of automobile engine factors on the vehicle’s mpg. The dataset auto-mpg.csv contains information for 398 different automobile models. Information regarding the number of cylinders, displacement, horsepower, weight, acceleration, model year, origin, and car name as well as mpg are contained in the file. 

Perform some initial analysis and create visualizations using Tableau Public (reference will be available in week 9).

Create some visual plots and charts describing the data and information it is trying to give out.

Using the first 300 samples in the auto-mpg.csv, run a simple linear regression and multiple linear regression to determine the relationship between mpg and appropriate independent variable/(s).  Report all the appropriate information regarding your regression.

1) Multiple R-squared

2) Adjusted R-squared

3) Complete Linear Regression equation

Maintain a log of above values for all models.

For the remaining 98 samples in the dataset, use your best linear model(s) to predict each automobile’s mpg and report how your predictions compare to the car’s actual reported mpg.  

1) Residual Plot

2) Histogram.

As a part of submission, share the code and report explaining the research. You can submit your code by compiling the report on RStudio. Directions to save complete code on word / PDF file is as below.

RStudio -> File -> Knit Document / Compile Report -> Save as Word / PDF.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ch 12 ML1 Sorority dues

1Start Excel. Download and open the file named Exp19_Excel_Ch12_ML1_HW_MembershipDues.xlsx. Grader has automatically added your last name to the beginning of the filename.02Click cell A1, delete the template text, and type Membership Dues.23Delete Column L.04Select the range A1:L7 and clear all data validation that was included in the template.05Add a comment in cell A1 that says “Unprotect the worksheet before editing.“. Be sure to enter the comment as it appears, including the period and excluding the quotation marks.126Use the Macro Recorder to record a macro named Sort that sorts the records in ascending order based on selection (Hint: use relative references when recording the macro).27Ensure the Developer Tab is enabled, then create a Form Control Button named Sort spanning the cell range C1:D1 (ensure that the button is inside the cell borders), and assign the Sort macro. Be sure the label is displayed on the Form Control Button.98Use the VBA Editor to insert a new module named Unprotect. To complete the step, type the code as it appears below. Note there is one blank line after the opening declaration (sub Unprotect). The remaining code does not have space between lines.

Sub Unprotect()

‘Unprotect Sheet
Worksheets(“Member List”).Unprotect.Password = “eXploring”
09Insert a new module named Protect. To complete the step, type the code as it appears below. Note there is one blank line after the declaration (Sub Protect). The remaining code does not have space between lines. Type the following to complete the procedure.

Sub Protect()

‘Protect Sheet
Worksheets(“Member List”).protect.Password= “eXploring”
010Exit the VBA Editor and create a Form Control Button named Unprotect spanning the cell B1. Assign the UnprotectWorksheet macro. Be sure the label Unprotect appears on the Form control button. Then save the file as a macro enabled workbook.911Create a Form Control Button named Protect spanning the cell E1. Be sure to display the label Protect on the Form Control Button and then assign the Protect macro.912Use the Document Inspector to check the document for issues. Remove the Document Properties and Personal Information and the Headers and Footers information. Do not remove Comments and Macro information. Note: If using a Mac, please skip this step and proceed to step 13.213Check the document for Accessibility and compatibility with Excel 2010, 2013, and 2016.014Insert a new worksheet named Code.1015Open the VBA Editor, open module 1, and copy the code. Paste the code in the Code worksheet starting in cell A1. Then delete the rows that are blank (2,4,5, and 6).1516Open the VBA Editor, open the Protect module, and copy the code. Paste the code in the Code worksheet starting in cell A17. Delete any additional blank rows that appear in the code (row 18).1517Open the VBA Editor, open the Unprotect module, and copy the code. Paste the code in the Code worksheet starting in cell A22. Then delete any additional blank rows that appear in the code (row 23).1518Save and close Exp19_Excel_Ch12_ML1_HW_MembershipDues.xlsx. Be sure to save the workbook as a .xlsx file, not a macro enabled workbook. Exit Excel. Submit the file as directed.0
Close

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now