Construction -10

 

Directions: Use Visual Logic Console for all inputs and outputs.  If you are not familiar with Visual Logic, a flow chart can be used instead of a program to answer the questions that require Visual Logic.
Choose any 4 out of 5 Questions.

1. Write a Visual Logic program that calculates the following.    

a) The user enters an amount

b) The program calculates the interest at 5%. Write a procedure to calculate the interest earned and the total amount which includes the interest.

c) Write the output using format currency to display the interest earned and the total amount calculated in b).

Copy and paste the program and the output for credit and upload the program file.

2. Write a Visual Logic program where the user rolls two dice and the program displays the sum of them. Each dice contains numbers from 1-6.

a) Use random for the first dice. Display the first dice.

b) Use random for the second dice. Display the second dice.

c) Add them together as the sum.

Copy and paste the program and the output for credit and upload the program file.

  1. If the highest subscript in an array is nine and the subscripts start at zero, what is the size of the array?
  2. Think about arrays that they use in everyday life situations. What are the advantages of using these types of arrays? Are there any disadvantages?

5.       a) Write a Visual Logic program to declare and populate an array to hold five student test scores.  

           b) Write a Visual Logic program to calculate the student’s average for the test scores. Output the average test score.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 2

 

Instructions

Week 2 Assignment:

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                               (TOPIC BELOW)

Describes the steps involved in resetting the root password in Windows.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper Topic Proposal and outline

 

Instructions

Database Security Research Paper and Outline

In this course, each student is required to conduct research and write a paper that covers an approved topic area of database security.  Present your choice of topic for the Database Security Research Paper.  Your topic proposal should be at least one paragraph in length with citations to at least two references (besides the book) that help support the topic you wish to research.  A brief summary of these references should be included.  In addition, you must provide a one (1) page, high-level outline of your paper.  Draft and final versions of the research paper are due by the end of Weeks 5 and 7, respectively.  Although this is not a graded assignment, the quality of the research paper proposal and outline will factor into the overall research paper grade.  Topics for the Database Security Research Paper 

Below are examples of the topics students may choose from, or one can be suggested by the student for approval by the instructor.

Anonymization/Pseudonymization, Data Hiding, Metadata and Security, XML Security, Authorization and Access Control, Data Integrity, Privacy Preserving Data Mining, Statistical Database Security, Control of Data Disclosure, Private Information Retrieval, Secure Stream Processing, Secure Auditing, Data Retention, Search on Encrypted Data, Digital and Enterprise Rights Management, Multimedia Security and Privacy, Private Authentication, Identity Management, Privacy Enhancing Technologies, Security and Semantic Web, Security and Privacy in Ubiquitous Computing, Security and Privacy of Health Data, Web Service Security, Trust Management, Policy Management, Applied Cryptography

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Forum 2 (LO1) , Discussion Forum 1 (LO3)

In the video, “What is Data Mining and Why is it Important?” the presenter uses the statement “patterns in data help answer business questions,” a broad statement. Consider a small business that is a computer store. How would data mining help expand their business? (LO1)

Essential Activities: 

  1. Watching “What is Data Mining and Why is it Important?” will assist you with the discussion forum.

Notes:

  1. Please refer to this assignment’s discussion forum rubric on the start here tab.
  2. To earn total points on the discussion forums each week, include outside sources to support your discussion.

Discussion 2 

In the article, Why Business Analysts Are Essential to Your Operations Team, September 3, 2019 by Paul Crosby, the following 5 reasons are listed. 

 1.     Business Analysts Improve Operational Productivity

2.      Business Analysts Need to Prove Their Value to the Operations Team

3.      Business Analysts are Problem Solvers by Nature

4.      Business Analysts Drive Value By Wearing Many Hats

5.      Every Operations Team Will be Data and Analysis-Driven

Briefly discuss your view on the necessity of each.  Can you think of additional reasons? If so, please share. 

APA Stylesingle spacedTimes New Roman font of size 12, and references must all be cited. 

No divergence, no sidetrack, but focus on the question!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Measuring Results

Acme Corporation has taken your suggestions and created ethical guidelines as well as established organizational policies.

It is now 12 months later. How could you measure if your plan was a success? What metrics could you use to determine if your changes made an impact at Acme?

Create a 2-3 page memo asking the CEO and Board of Directors for time and money to investigate if the project was a success. Be persuasive with your writing.

Be sure to cite your sources according to APA formatting guidelines. For more information about APA formatting, please visit the Rasmussen Library Resources section on the Resources tab.

Be sure to review the content on the Course Project Overview page to gather all necessary informati

on.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Heterogeneous System Architecture

  1. What is the difference between between homogenous and heterogenous system architecture?
  2. Where are heterogenous system architecture applied?
  3. Why is coherence and consistency between FPGA cache, GPU and CPU in heterogeneous architecture beneficial? 
  4. What are the advantages and disadvantages of NUMA structure?
  5. Analyze the differences between distributed memory versus local memory (NUMA, NoC etc) in context of GPUs

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SECURE CLOUD ARCHITECTURE

BUSINESS CASE:  Airport Data Center

Airport’s currently capacity is 15 000 Passengers a day. There are 150 full time employees along with 128 part time employees.

IT system components of Airport Datacenter

– Database for Passengers

– Database for airlines / flights

– Database for Employees

– Processing / Computing: Preparing Passengers invoices, boarding passes  

Long term data storage to fulfill the regulations the airport must maintain (keep) the passenger and flight data for five years.

QUESTIONS 

QUESTION 1. There is an increased risk of accident where a huge cargo Aircraft might go out of control and damage Airport’s Datacenter. What can you do to reduce impact of this threat so Airport continues to operate?

QUESTION 2 There is an increased risk of power blackouts at the Airport’s Datacenter due to heavy storm in the region. What can you do to reduce impact of this threat so Airport continues to operate?

Consider this new case while answering the question 3,4,5 and 6.

Airport is growing fast and it is going to reach 30 000 Passengers a day. It looks like current data center would not be able to handle the influx of new passengers and new airlines. And, this is happing fast, there is no time to physically expand the Airport Datacenter.

QUESTION 3: Which components of the Airport’s Datacenter you would move the cloud to meet the demand? And which components of the Airport’s Datacenter you would keep in the datacenter of the airport. Explain your rationale (give the justification for the choice you make)

QUESTION 4:  Before moving the IT components to cloud that you have mentioned in question 3; What would be System Requirements that you look for the cloud service provider?

QUESTION 5: Assuming that; you decided to shift a great deal of day-to-day management the cloud-solution provider (agreement with the cloud service provider company). As an IT manager what you would do to monitor system performance for the Airport’s Datacenter?

QUESTION 6: How you would address following three Security issues related to long term operation of Airport’s Datacenter in partnership with the cloud service provider?

  1. Unauthorized disclosure of passengers’ data
  2. Unauthorized alternation and modification of airlines’ flight data
  3. Destruction of stored/ archived passengers’ data

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MARIE Simulator

  

1. (a) The Fibonacci numbers are the numbers in the following integer sequence, called the Fibonacci sequence, and are characterised by the fact that every number after the first two is the sum of the two preceding ones: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 114, … etc.

By definition, the first two numbers in the Fibonacci sequence are 0 and 1, and each subsequent number is the sum of the previous two. We define Fib(0)=0, Fib(1)=1, Fib(2)=1, Fib(3)=2, Fib(4)=3, etc. The first 22 Fibonacci numbers given below:

  

Fib(0)

Fib(1)

Fib(2)

Fib(3)

Fib(4)

Fib(5)

Fib(6)

Fib(7)

Fib(8)

Fib(9)

Fib(10)

 

0

1

1

2

3

5

8

13

21

34

55

  

Fib(11)

Fib(12)

Fib(13)

Fib(14)

Fib(15)

Fib(16)

Fib(17)

Fib(18)

Fib(19)

Fib(20)

Fib(21)

 

89

144

233

377

610

987

1597

2584

4181

6765

10946

Write a MARIE program to calculate Fib(n), where the user inputs n. For example, if the user inputs 7, the program outputs the value 13; if the user inputs 15, the program outputs the value 610; if the user inputs 20, the program outputs the value 6765 etc. You need to write and run the program using MARIE simulator. Please include appropriate comments to make your code readable.[10 marks]

(b) For some values of n, your program will not produce correct results. You can check this by gradually increasing the values of n and checking for the correct outputs. What is the maximum value of n for which your program produces a correct result? Why? Please comment on this [5 marks].

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Access labs 2017

There are word file that we will tell you what to do in access. In lesson 2 you have to create new. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ParaFEM

  

Would you like to be one of the early pioneers in voice driven computer aided engineering? Nowadays, natural language interaction comes built into a wide range of computing devices such as mobile phones, tablets and laptops. Typically usage is limited to searching for information on the internet or asking a virtual digital assistant to speed dial a specified contact. What might not be obvious is that this capability is rapidly evolving, not because of the cleverness or productivity of human programmers, but through machine learning. The introduction of natural language interaction to consumer devices that are connected to the internet means that potentially hundreds of millions of people interact with them. With artificial intelligence in the loop, the ability of software to interpret natural language is continually improving. In the future, we should expect this capability to be provided in engineering software packages such as Autocad, Abaqus or Ansys. This project involves investigating the capabilities of a number of open source toolkits for voice recognition and selecting one of them to use with ParaFEM, an open source package for finite element analysis developed at Manchester. The work will involve creating a prototype workflow on a Linux computer that takes very simple voice commands and converts them into computer commands to drive the engineering software. A good outcome from the project would be to allow a user to say “Run ParaFEM” to the computer and for the user to see the software running. Depending on the progress made, the implementation and level of user interaction could be more advanced such as using voice commands to change the value of simulation parameters. Focus on the libraries for voice recognition and how to turn voice commands into Python commands. Parafem can be downloaded freely.

 

Use a ParaFEM binary executable as a black box in windows. 

So you do not need to understand the finite element method in detail. Focus on the libraries for voice recognition and how to turn voice commands into Python commands. Parafem can be downloaded freely. I have also attached a book, it may be help but tutor said it’s not concerned too much. Also, very Important, please note that you do not need to understand the finite element method in detail. Focus on the libraries for voice recognition and how to turn voice commands into Python commands.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now