1)The Common Denominator AND 2)Spiderman is Afraid of Heights

1)The Common Denominator. 

Solve the problem “Basic Programming 2”, which you can find at this web address: open.kattis.com/problems/basicprogramming2 

Although this problem has several parts, there is a common theme to all of them. Part (a) of this problem is to write down what this common theme is (one sentence max). Part (b) is to solve the problem. 

2) Spiderman is Afraid of Heights.

Solve the problem “Spiderman’s Workout”, which you can find at this web address: open.kattis.com/problems/spiderman 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Jaba programming

Ship, CruiseShip, CargoShip Classes, and Displayable Interface

Design an abstract Ship class that has the following members:

• A field for the name of the ship (a string).• A field for the year that the ship was built (a string). • A constructor and appropriate accessor and mutators.• A toString method that displays the ships name and the year it was built.

Design a CruiseShip class that extends the Ship class. The CruiseShip class should have the following members:

• A field for the maximum number of passengers (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• A toString method that overrides the toString method in the base class. The CruiseShip class’s toString method should display only the ship’s name and the maximum number of passengers.

Design a CargoShip class that extends the Ship class. The CargoShip class should have the following members:

• A field for the cargo capacity in tonnage (an int).• A constructor, a copy constructor, and appropriate accessors and mutators.• toString method that overrides the toString method in the base class. The CargoShip class’s toString method should display only the ship’s name and the ship’s cargo capacity.

In a driver program (shipDemo.java) 

• Demonstrate the classes in a Ship array. Assign various CruiseShip and CargoShip objects to the array elements. The program should then step through the array, calling each object’s display method. (polymorphism)• Create an ArrayList of Ship objects and add various CruiseShip and CargoShip objects to the array list. The program should then step through the array list, calling each object’s toString method. (polymorphism)• Test your copy constructors in both CruiseShip and CargoShip in shipDemo.java

Interface to your lab 3 (Ship implements Displayable).

public interface Displayable
{
 void display();
}

Resource: 

• UML• Sample Program (OOP_example_2)

Deliverables:

• Displayable.java (10%)• Ship.java (20 %)• CargoShip.java (15%)• CruiseShip.java (15%)• ShipDemo.java (30%)• Screenshot (10%)

Note: Sparingly comment your java source code, save all the files in your_lastname_lab_3 folder, zip it, and upload for grading.

Thank you!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Microsoft Access and Excel 200 words minimum

Critical Thinking ; Please note how these programs Microsoft Access and Excel will benefit and may be used in your daily life , you should label each program separate and write about them separated . 

  Let’s Pause and Reflect on your journey with the MICROSOFT ACCESS relational database management application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others. 

 

Let’s Pause and Reflect on your journey with the MICROSOFT EXCEL digital spreadsheet application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research topic introduction

Explain the overall research topic – Cybersecurity in healthcare

Literature gathering process.

The scope and the healthcare sector of the literature review. 

The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. 

After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unix/linux

2. Assume that you are hired as the Network Administrator for a small company. The 4 current employees have 3 Windows computers and 1 Mac computer. However, the business is growing and hiring 10 more employees. The business owner wants to set up file and print sharing for the employees, and set up a web server to sell their products on the Internet. Would you suggest implementing a Windows based network server or a UNIX/Linux based network server? Of course you must explain your suggestion if you want to receive full points for this question. 

3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if all they were doing was typing commands. 

True 

False 

4. True or False. The Courts in the United States have determined that UNIX and Linux are the same thing as far as Intellectual Property rights are concerned. 

5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code 

for the ls command run, on your PC, or on the UNIX server? A. UNIX Server B. PC 

6. DOS has a tree structured file system for every logical disk. What is the maximum number of 

tree structures or top level directories in the UNIX file system ? A. 1 B. 1 for every physical drive C. 1 for every drive partition or physical drive D. 1 per device (drive, optical disk, thumb drive etc.) 

7. What key(s) or character(s) do you have to use to get out of the man page utility? A. exit B. x C. q D. Q 

8. What will be returned if you type: apropos delete user A. Every man page that has the word delete OR the word user B. Every man page that has the words delete AND user. Either word can be anywhere on the line. C. Every man page that has the exact phrase “delete user”. The words must be in that order, with 

just one space between them. D. A portal to another dimension will open 

9. What would you type to see all the files in the current directory? 

10. Assume you are in your home directory. What UNIX command do you use to see a listing of all the files in the directory /usr/lib ? 

11. While a directory may seem empty because it doesn’t contain any files or sub-directories, you will always see two items if you use the command to see all files. What are the names of these two items, and what are they? 

12. What you would type on the command line to move to the directory above the current 

directory? 

13. What you would type on the command line to move to your home directory? 

14. What you would type on the command line to move to the directory /etc/rc.d ? 

15. What you would type on the command line to move to a subdirectory of the current directory named junkDir? (You can assume that junkDir exists.) 

16. What is wrong with cat? That is, why do you typically use more or less instead of the cat command? A. It only works on files that have 10 or fewer lines. B. It only works on files that have lines that are 40 characters or less. C. It only works on files that have an extension of “.txt” D. The cat command sends the entire file to the display. This makes it cumbersome for files 

that are longer than a single screen. 

17. In WinSCP, which protocol should be used to connect to the CBC UNIX server? A. FTP B. SFTP C. SFTP (allow SCP Fallback) D. SCP 

18. True or False. UNIX follows the same 3 letter file extensions as Windows. That is, it uses .exe, .doc, .jpg etc. 

19. When you use the DOS COPY command you can assume many defaults. In fact you can leave the name of the destination blank, and DOS will assume that the destination is the current directory. Will the UNIX cp command work if you leave the destination blank? A. Yes. The cp command will assume you want to copy to the current directory. B. No. You must specify a destination. 

20. What is the difference between rmdir and rm –r ? A. The rmdir command will recursively delete any sub-directories and files while rm –r will not. B. The rm -r command will recursively delete any sub-directories and files while rmdir will not C. There is no difference, neither will recursively delete any sub-directories and files D. There is no difference, both will recursively delete any sub-directories and files 

21. When you delete a file using rm, how do you get it back out of the trash if you change your mind? A. Go to the trash folder in your home directory and move or copy the file. 

B. Use the undelete utility C. Run rm -recover filename, where filename is the name of the file you want to 

restore D. There is no trash and no way to recover the file without using special recovery software. 

22. Why can’t normal users, that is a user that is NOT an admin or superuser, change their user id (uid)? A. They CAN change it by using the usermod command B. The uids must be assigned in sequence, and only the admin knows which uid should be the 

next to use C. This would cause security issues as any user could impersonate any other user by simply 

changing to their uid D. The user may try to use a uid that has already been assigned and this would cause the OS to 

crash. 

23. Explain the difference between how umask and the chmod command affect your permissions? A. There is no difference B. The umask command only affects files that already exist, while chmod changes your 

default permissions C. The chmod command only affects files that already exist, while umask changes your 

default permissions D. The umask command only works in symbolic mode, while chmod only works in binary 

mode E. The umask command sets permissions for directories, while the chmod command sets file 

permissions. 

24. Can you set your default file permissions to 644 and at the same time have your default directory permissions set to 744? Why or why not? 

25. Say you had a file named q19 that had permissions of -r-xr-x—- What command would you use If you wanted to change permissions on q19 to -rwxr–r– (You must include the command name and the arguments to the command.) 

tsakoCross-Out

26. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to see details such as the file permissions for testfile if you ran ls –al testsub? A. Yes B. No 

27. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to cat testfile ? A. Yes B. No 

28. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to execute testfile ? A. Yes B. No 

29. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to cd into testsub ? A. Yes B. No 

30. Which of the following is NOT a requirement for making your umask changes permanent? A. You must add the source .login command to your startup script B. The umask command must be in your .login file C. The .login file must be in your home directory D. You must have read and execute permissions on your .login file 

31. Users with an account on a UNIX system can edit some of their own information in the /etc/passwd file, even though they do NOT have write permission. A. True B. False 

32. Assume you are in vi in command mode. What happens if you hit the i key? A. You will change to input/insert mode and the cursor will move to the beginning of the 

current line. B. You will change to input/insert mode and the cursor will move to the end of the current line. C. You will change to input/insert mode and the cursor will move to the right of the current 

character. D. You will change to input/insert mode and the cursor will stay where it is. 

33. Assume you are in vi in command mode. What happens if you hit the A key? A. You will change to input/insert mode and the cursor will move to the beginning of the 

current line. B. You will change to input/insert mode and the cursor will move to the end of the current line. C. You will change to input/insert mode and the cursor will move to the right of the current 

character. D. You will change to input/insert mode and the cursor will stay where it is. 

34. In vi, what key(s) do you hit to change from input/insert mode to command mode ? A. i, a, I, A, etc. B. <ctrl-x> C. <ctrl-q> D. <esc> 

35. Assume you are in command mode. What the vi command(s) would you use to delete or cut the current line? 

36. Assume you are in command mode. What the vi command(s) would you use to replace the current character? 

37. Assume you are in command mode. What the vi command(s) would you use to force vi to quit w/o making any changes, even though you have edited the contents of the buffer A. :q B. :q! C. 😡 

D. :x! 

38. Assume you are in command mode. Write the command you would use to have vi display line numbers. 

39. Assume that you are in vi. What would you expect to happen if you typed the following: <esc>:-5,+5 s@^tony@Tony@ 

(You should be able to look at this and determine what will the command is saying. If you want to test this you will should create a text file with at least 20 lines, and put the word “tony” on every line. Some of the lines should have “tony” as the first word on the line, but it should not be the first word in other lines. Position yourself about halfway through the file before running the command.) 

40. Explain this step by step: This question requires you to perform the following hands-on tasks on your account on the CBC Linux server. Make sure and follow the instructions very carefully, especially the last instruction. I will only check for a file named “all.done”, so if you name your file something else you will not receive credit for this question. 

Also remember that if the Linux server supports FTP (WinSCP), you can always move the file to your Windows PC or Mac, perform the tasks, then copy the file back to the Linux server. 

A.Copy the file /home/test2.txt to your home directory. 

B.Remove all of the tab (^I) characters. (Hint: it may be easier to do this if you can see the tabs.) 

C. Edit the file and add two lines at the top of the file which contain your name (on the first line) and the “Geek In Training” (on the second line). 

D. In the first 30 lines, change all occurrences of the phrase “WWW” to the phrase “Santa Claus is coming to town”. 

E.From line 30 to the end of the file change all occurrences of the phrase “WWW” to the phrase “Que pasa”. 

F.Add the line “FIN” to the end of the file. 

G.Save the file with the name: all.done 

41. Explain this step by step: This question requires you to perform the following hands-on tasks on your account on the CBC Linux server. Make sure and follow the instructions very carefully, especially step 2. I will only check for a file named “executeTest”, so if you name your file something else you will not receive credit for this question. 

A. Create a file on the PC (use any editor), which contains the following two lines: 

echo “I love UNIX” 

date 

B. Save the file as plain text with the name: executeTest 

C. Move the file to your account on the UNIX system 

D. Give yourself, your group, and the world execute permissions. You can add other permissions if you wish. (Hint – to test this try running the file by typing ./executeTest. If you get the “Permission Denied” error message then something is wrong. If you see “I love UNIX” followed by the current date then you have execute permission.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information and network security

  

Learning Objectives and Outcomes

  • Apply Payment Card Industry Data      Security Standard (PCI DSS) to a small- to medium-sized business.

Assignment Requirements

Lion Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Lion Media has stores in several cities across the U.S. and is planning to bring its inventory online. The company will need to support a credit card transaction processing and e-commerce website.

For this assignment:

  1. Obtain a copy of the latest PCI      DSS standards document from the PCI Security Standards website. The latest      standards document is typically in the document library. (Search for it on      the given link)
  2. Write a report detailing what Lion      Media must do when setting up its website to maintain compliance with PCI      DSS.
  3. Address all 6 principles and 12      requirements in your report.

Required Resources

  • Course textbook
  • Internet access
  • https://www.pcisecuritystandards.org/

Submission Requirements

  • Format: Microsoft Word (or      compatible) 
  • Font: Arial, size 12, double-space      
  • Citation Style: Any
  • Length:      3–4 pages

Self-Assessment Checklist

· I created a detailed plan for creating a PCI DSS-compliant website.

· I addressed all 6 principles and 12 requirements of the PCI DSS.

  • I created a professional, well-developed report with      proper documentation, grammar, spelling, and punctuation.
  • I followed the submission      requirements
  • I      did NOT plagiarize 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ppt/s4

  • What are the differences in protecting data globally versus protecting employee data nationally?
  • Why is protecting employee data essential?
  • What are the effects of improper employee data protection?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions

Discussion 1

Discussion 2

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Management

Identify a personal project of your choosing. This could be a family vacation, plans to clean or organize a part of your living space, etc. 

Provide a brief summary of your project that includes the scope of the project and at least three goals or objectives of the project.    

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operating System

 

  • Unit3: Check the slides of part II and the short videos (video8 and 9).
  • Assignment2 (10 points / due October 20 – 11:59pm): In that folder, you will find:
    • Zip folder (a number of .java files).
    • Video (explaining how to build the project, how to include the java files, and how to use locks and semaphores in Java).
    • Document (explaining the tasks)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now