NEED HELP WRITING PSEUDOCODE AND FLOWCHART

I am trying to find some help as to how to make a pseudocode and flowchart to design a program that asks for fat grams and calories in a food item.

Validate input as follows:

-Number of fat grams and calories arent less than 0

-Number of calories arent greater than fat grams*9

Once correct data is entered, program should calculate and display percent of calories from fat. Use formula :

Percentage of calories from fat=(fat grams*9)/calories

If the results are less than 0.3, the program should display a message saying that the food is low in fat.

Please help ! thank you !

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Recovery Planning

1. Your organization is implementing a new file server. You have been asked to implement a disk subsystem that is a failure-resistant disk system (FRDS). Which criterion should this system meet?

A. It protects against data loss due to disk drive failure.

B. It protects against data loss due to external power failure.

C. It protects against loss of access to data due to power supply failure.

2.What is the term for RAID 1 implemented with a single hard disk controller?

A. Disk duplexing

B. Disk mirroring

C. Disk striping

3. Your company has a backup solution that performs a full backup each Saturday evening and an incremental backup all other evenings. A vital system crashes on Monday morning. How many backups will need to be restored? 

A. One

B. Two

C. Three 

4. Your organization implements a full/differential backup scheme. A full backup was completed two days ago. Yesterday, a differential backup was completed. Which files were backed up yesterday? 

A. All files in a backup set

B. All files in a backup set that were changed or created since the last full backup

C. All files in a backup set that were changed or created since the last differential backup 

5. Which electronic backup solution backs up data in real time but transmits the data to an offsite facility in batches?

A. Remote journaling

B. Hierarchical storage management (HSM)

C. Electronic vaulting

6. Your organization is researching alternate computing facilities to ensure that the organization is able to function if the primary facility is destroyed. Which offsite facility is the most expensive to implement?

A. Hot site

B. Warm site

C. Cold site

7. During a recent natural disaster, the primary location for your organization was destroyed. To bring the alternate site online, you restored the most critical systems first. Now a new primary site is complete, and you need to ensure that the site is brought online in an orderly fashion. What should you do first? 

A. Restore the most critical functions to the new primary site.

B. Restore the least critical functions to the new primary site.

C. Restore all independent functions to the new primary site. 

8. Which site is usually maintained within the company and requires no contract with an offsite vendor? 

A. Redundant site

B. Hot site

C. Warm site

9.Which of the following is the MOST important element that an incident handler should possess?

A. Integrity

B. Ability to cope with stress

C. Presentation skills  

10. Which of the following is MOST important when deciding whether to build an alternate facility or to acquire a hot site operated by a third party?

A. Cost to rebuild information-processing facilities

B. Estimated annual loss expectancy

C. Location and cost of commercial recovery facilities   

11. Which of the following documents should be contained in a computer incident response team manual?

A. Severity criteria

B. Employee phone directory

C. Table of all backup files

12. Which of the following practices would best ensure the adequacy of a disaster recovery plan regular reviews of recovery plan information?

A. Regular audits of disaster recovery facilities

B. Regular reviews of recovery plan information

C. Regular recovery exercises regular

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 1: Vulnerability and Threat Assessment Step 12: Write Overview and Compile Final Vulnerability and Threat Assessment Report

You have reached the final step. Use the Final Vulnerability and Threat Assessment Report template in preparing the final report. In APA style, write an overview and compile all the sections prepared throughout the project into a report according to the template.

Since this report will be delivered to Maria and other top executives, tailor your writing to the appropriate audience. Be sure that coherent paragraphs or points are developed so that each is internally unified, functioning as part of the whole document.

Final Vulnerability Assessment Report

Maria Sosa is depending on you, the chief information security officer at your organization, to provide her and other executive-level stockholders with a final vulnerability assessment report. This thorough report should be presented with your findings and recommendations.

Final Vulnerability Assessment Report (seven- to 10-page report using this template: Assignment 7, Steps 11 and 12) This report should include the following components:

  • Title Page
    • Include:
      • for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document
  • Table of Contents
    • with all sections
  • Overview (introduction and purpose)
    • Include mission-critical aspects of current organizational processes:
      • personnel
      • physical security
      • network security
      • cybersecurity
  • Scope of Work (one-page report: Assignment 1, Steps 1 and 2)
    • Include identified security threats, risks, and vulnerabilities within the organization from the preliminary classification of mission-critical aspects
  • Work Breakdown Structure (spreadsheet: Assignment 2, Step 3)
    • Include key elements that need to be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Threats and Vulnerabilities Report (two- to three-page report: Assignment 3, Steps 4-6)
    • Include:
      • explanation of threats and vulnerabilities
      • classifications of threats and vulnerabilities
      • prioritizations of threats and vulnerabilities 
  • Lessons Learned Report (two- to three-page report: Assignment 6, Steps 9 and 10)
    • Include:
      • reviewed and recorded findings
      • consider the report’s approach including:
        • factors
        • assessment completion
        • next steps
        • other issues to address
  • Network Analysis Tools Report (one- to two-page report: Assignment 4, Step 7–include as Appendix A)
    • Include comprehensive recommendations of all components within each key element that should be tested and analyzed:
      • internal threats
      • external threats
      • existing security measures
      • compliance requirements
  • Vulnerability Assessment Matrix (one-page matrix using template: Assignment 5, Step 8–include as Appendix B)
    • Assess vulnerabilities of your organization

 

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 1: Plot Literary Response: Submission Link

 

In this literary response, you will create a response to what you have learned about Plot as a literary device. 

This assignment focuses on your ability to: learn how to identify the plot devices of a piece of literature; craft your own creative piece with similar plot devices.

The purpose of completing this assignment is: as a student and a career professional, you will need to read and summarize many different forms of literature. Very often, you will need to report out on those summaries. This is a good practice in developing those skills!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Datamining Case study by Krizanic 2020

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Analysis and Design (ITS-535) – Paper

Please refer to the attached documents for the assignment.

Assignment Details: 

Part I – Using the attached Requirements template, create a list of requirements for a Smart Highway with at least five (5) integrated Smart systems identified in your research with at least 40 requirements (total) for these five (5) Smart systems. PMI (2021) indicates “the term requirement generally refers to a customer need while specification refers to a detailed, usually technical description of how that need will be met” (para. 1). A Requirement states what a product must/will/can do or a quality it possesses. A Specification is a collection of requirements that are used in the design of that product. Do not include specifications (such as products that you discover) – just requirements. 

Part II – Write at least a 5 page Word document, double-spaced, detailing your proposed trip on a Smart Highway. The paper must include all five (5) of the integrated Smart systems identified in your research and two (2) requirements for each of the five (5) integrated Smart systems.  Your paper must include at least seven (7) references along with their in-text citations. Research must include scholarly references but can also include YouTube videos, websites, blogs, etc. on the Smart system(s). Also view YouTube videos on Augmented Reality and Virtual Reality to extend your research on how Smart systems may evolve over time. 

Submit your paper and your Requirements list, using the template provided.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC 641 WK 6 Ass 600 word *

1. In an analog cellular structure, what is needed to establish valid authentication?

2. What is a rogue base station?

3. What is snarfing and how does it work?

4. Is there such a thing as legal eavesdropping? Give an example.

5. How does cellular authentication work? Briefly explain the process.

6. Describe GSM security goals and how does SMS meet those goals. Be specific.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Lab#4

Due after 4 hours. Wants A+  

Instructions:

Make sure to do the Activity as outlined in the LabCH06.pdf file. The activity is actually a tutorial that will help you to solve the problems in the exercises. It is expected that you will complete the Activity before you begin the exercises.

When you are finished, save and rename the completed document as “firstname_lastname_lab4.docx”.   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

*Python Creating objects with overloaded operators

Creating objects with overloaded operators allows you to use the object like a built in data type. In this lab, you will create a fraction class. By overloading its operators, you can easily use your class to solve mathematical problems related to fractions.

Part 1: Complete Fraction Class

Complete the implementation of the Fraction class provided below.

class Fraction:
#Constructor. Puts fraction in simplest form
def __init__(self,a,b):
self.num = a
self.den = b
self.simplify()
#Print Fraction as a String
def __str__(self):
if self.den==1:
return str(self.num)
else:
return str(self.num)+"/"+str(self.den)
#Get the Numerator
def getNum(self):
return self.num
#Get the Denominator
def getDen(self):
return self.den
#Give Numerical Approximation of Fraction
def approximate(self):
return self.num/self.den
#Simplify fraction
def simplify(self):
x = self.gcd(self.num,self.den)
self.num = self.num // x
self.den = self.den // x
#Find the GCD of a and b
def gcd(self,a,b):
if b==0:
return a
else:
return self.gcd(b,a % b)
#Complete these methods in lab
def __add__(self,other):
return 0
def __sub__(self,other):
return 0
def __mul__(self,other):
return 0
def __truediv__(self,other):
return 0
def __pow__(self,exp):
return 0

Complete Implementation of the following methods. All of these methods will return an instance of the Fraction class.

  • Add:
  • Subtract:
  • Multiply:
  • Divide:
  • Power (when k>0 and k is an integer):

Part 2: Fraction Problems

Create a file lab3.py. In this file, use your fraction class to implement functions for each of the following formula. You program should ask the user for the value of n to use in the summations.

Remember that a summation symbol just tells you to add all the values in a range.

Write functions for each of the below expressions.

  1. Harmonic Series:
  2. Two:
  3. Zero:
  4. Partial Riemann Zeta:

Your program will ask for n as input. Compute each of the functions for the given input n. When computing the Riemann Zeta function, print values for b=2,3,4,5,6,7,8.

Verify that the input is a valid number. If it is not, ask repeatedly until a valid number is given.

Once you have been given a valid input, print out the values of each of the functions in the order H, T, Z, R. See below execution trace for exact layout.

Scoring

  • Part 1
    • 6pts – Add
    • 6pts – Subtract
    • 6pts – Multiply
    • 6pts – True Divide
    • 6pts – Power
  • Part 2
    • 10pts – H Function
    • 10pts – T Function
    • 10pts – Z Function
    • 10pts – R Function

Example Execution Trace

Welcome to Fun with Fractions!
Enter Number of iterations (integer>0):
Bad Input
Enter Number of iterations (integer>0):
10
H(10)=7381/2520
H(10)~=2.92896825
T(10)=2047/1024
T(10)~=1.99902344
Z(10)=1/1024
Z(10)~=0.00097656
R(10,2)=1968329/1270080
R(10,2)~=1.54976773
R(10,3)=19164113947/16003008000
R(10,3)~=1.19753199
R(10,4)=43635917056897/40327580160000
R(10,4)~=1.08203658
R(10,5)=105376229094957931/101625502003200000
R(10,5)~=1.03690734
R(10,6)=52107472322919827957/51219253009612800000
R(10,6)~=1.01734151
R(10,7)=650750820166709327386387/645362587921121280000000
R(10,7)~=1.00834915
R(10,8)=1632944765723715465050248417/1626313721561225625600000000
R(10,8)~=1.00407735

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 275 Unit 3 Lab

 

Unit 3 Lab: Adding a Hard Drive

Outcomes addressed in this activity:

Unit Outcomes:

  • Modify the system to add storage devices, such as disk drives, to the system.
  • View available disks.
  • Partition disks.

Course Outcome:

IT275-2: Configure the key features of the Linux operating system.

Purpose

This lab focuses on adding a hard drive to a Linux system.

 

Lab Instructions

Review the Unit 3 Lab Rubric (under Course Resources, then Grading Rubrics) before beginning this activity.

  1. Using the techniques discussed in the readings, complete the lab in A Cloud Gurucalled “Managing Disks, Partitions, and File Systems in SUSE Linux Enterprise.”

You will have 2 hours to complete the lab. Run the command echo your name `date`. Note: The ` symbol is next to the number 1 on your keyboard.

  1. Take screen captures of the aforementioned information, along with the output of the “Create a Partition and Filesystem on…,” “Partition and Create A Filesystem Using Yast,” and “Mount the Drives to the System…” sections.
  2. Finally, write a paragraph on what you have learned in this lab and any items you still need to have explained.

 

Lab Requirements

Your lab document should include:

  • Required screenshots, as outlined in the Instructions tab, pasted inside a Microsoft Word document. Multiple screen captures are okay.
  • A paragraph describing what you learned and what you still have questions about.
  • Both in-text citations and references for all sources. For more information on APA style formatting, go to the resources under the Academic Tools area of this course.
  • No spelling, grammar, or APA style errors.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now