понедельник, 28 сентября 2015 г.

CS372 Programming Assignment 3

DOWNLOAD
Please answer the attached file ProgAssn3. Structured programing must be used (OOP is NOT allowed). The program must be able to compile and run on The DEV-C++ compilier:
2. The Orwell Dev-C++ IDE is a newer Windows 8 compliant version of Dev-C++ (recommended).

Advantages of the newer version:

Implemented using more stable version of the debugger.
Does not require using a system("pause") to keep the console window open at the end of program execution.
If you did not already download and install Orwell Dev-C++ for CS361, you can download the latest version of Orwell Dev-C++ (free) at:

http://sourceforge.net/projects/orwelldevcpp/files/Setup%20Releases/

Download the most recent version: 
Dev-Cpp x.x.x MinGW x.x.x Setup.exe (32-bit version)
or
Dev-Cpp x.x.x TDM-GCC x64 x.x.x Setup.exe (64-bit version)

CS372 Programming Assignment 5

DOWNLOAD
Please answer the attached file ProgAssn5. Structured programing must be used (OOP is NOT allowed). The program must be able to compile and run on The DEV-C++ compilier:
2. The Orwell Dev-C++ IDE is a newer Windows 8 compliant version of Dev-C++ (recommended).

Advantages of the newer version:

Implemented using more stable version of the debugger.
Does not require using a system("pause") to keep the console window open at the end of program execution.
If you did not already download and install Orwell Dev-C++ for CS361, you can download the latest version of Orwell Dev-C++ (free) at:

http://sourceforge.net/projects/orwelldevcpp/files/Setup%20Releases/

Download the most recent version: 
Dev-Cpp x.x.x MinGW x.x.x Setup.exe (32-bit version)
or
Dev-Cpp x.x.x TDM-GCC x64 x.x.x Setup.exe (64-bit version)

CSE205 Object Oriented Programming and Data Structures

DOWNLOAD
CSE205 Object Oriented Programming and Data Structures

Homework 1 :: 25 pts

1 Submission Instructions
Create a document using your favorite word processor and type your exercise solutions. At the top of the document be
sure to include your name and the homework assignment number, e.g. HW1. Convert this document into Adobe PDF
format and name the PDF file <asuriteid>.pdf where <asuriteid> is your ASURITE user id (for example, my ASURITE
user id is kburger2 so my file would be named kburger2.pdf). To convert your document into PDF format, Microsoft Office
versions 2008 and newer will export the document into PDF format by selecting the proper menu item from the File
menu. The same is true of Open Office and Libre Office. Otherwise, you may use a freeware PDF converter program, e.g.,
CutePDF is one such program.
Next, create a folder named <asuriteid> and copy <asuriteid>.pdf to that folder. Copy any Java source code files to this
folder (note: Java source code files are the files with a .java file name extension; do not copy the .class files as we do not
need those).
Next, compress the <asuriteid> folder creating a zip archive file named <asuriteid>.zip. Upload <asuriteid>.zip to the
Homework Assignment 1 dropbox by the assignment deadline. The deadline is 11:59pm Wed 26 Mar. Consult the online
syllabus for the late and academic integrity policies.
Note: not all of these exercises will be graded, i.e., random ones will be selected for grading.

2 Learning Objectives
1.
2.
3.
4.
5.
6.
7.

Use the Integer and Double wrapper classes.
Declare and use ArrayList class objects.
Write code to read from, and write to, text files.
Write an exception handler for an I/O exception.
Write Java classes and instantiate objects of those classes.
Read UML class diagrams and convert the diagram into Java classes.
Identify and implement dependency, aggregation, inheritance, and composition relationships.

3 ArrayLists
3.1

Write code that creates an ArrayList<Integer> object named list and fills list with these numbers (using one or a
pair of for or while loops):
0

3.2

1

2

3

4

0

1

2

3

4

Consider the ArrayList<Integer> object named list containing these Integers:
list = { 1, 2, 3, 4, 5, 4, 3, 2, 1, 0 }
What are the contents of list after this loop completes?
for (int i = 1; i < 10; ++i) {

Database transparencies

DOWNLOAD
In your own words, define both replication transparency and location transparency, and then answer the following questions:

How is transparency alike in these two effects on a database?
How is it different?
Give an example of a database that would potentially use each one. Please note that your answer should be at least two paragraphs in length. Additionally, please remember to cite your sources.

Design Data warehouse

DOWNLOAD
Design Data warehouse
An organization has several operational systems: Customer Relationship Management (CRM) for marketing and sales, Enterprise Resource Planning (ERP), and Supply Chain Management (SCM). They also have external customer data. A wide variety of departments utilize this data: sales, marketing, procurement, human resources, R&D, and senior management.

Design a high-level conceptual view of a data warehouse using Microsoft® Visio® that shows the following:

Integration layers

The data warehouse

Recommended data marts

Include arrows to show ETL (extract, transform, and load) locations and direction.

Determine the amount of translation adjustment that Alliance will report on its December 31, Year 1, balance sheet.

DOWNLOAD
Determine the amount of translation adjustment that Alliance will report on its December 31, Year 1, balance sheet.

Develop a working database in Microsoft Access.

DOWNLOAD
1.Develop a working database in Microsoft Access. 
2.The database needs to include at minimum the following: ◦Two tables
◦Two queries
◦Two joins
◦Two forms
◦Two reports

Development in the computer designs

DOWNLOAD
1) Your software development company has been contracted to build a tool that will manage user accounts and rights in an Active Directory environment. One of your developers tells you that he wants the tool to make use of direct manipulation. A second developer argues that a command line structure would be a better and more secure approach. Take a stand on this argument, providing at least three positives of each approach, and then make a decision for this project and support it.

2) Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure. Provide an example of your suggested use of the technology.

3) Describe the considerations that you would take into account when selecting the menu style for an application and why. Support your response with examples.

4) Imagine you have been asked to help a novice designer effectively organize his menu content in an application. Provide the novice designer with the advice you feel would be most helpful when organizing content for menus. Support your response

Discussion questions

DOWNLOAD
1. Discussion 2: “Organizational Growing Pains.” Please respond to the following:
• Describe the most common root causes of organizational growing pains not dealt with appropriately. Why do you think this occurs? 
• Discuss a method to measure organizational growing pains and how this method can help to overcome or minimize future growing pains. 
2. Discussion 1: “First Four (4) Stages of Organizational Growth.” Please respond to the following:
• Explain the challenges associated with developing a new venture and those challenges encountered during the expansion phase. 
• Discuss the differences between an entrepreneurial and a professionally managed organization. Identify the stage of organizational growth in which each style of management occurs. 
3. Corporate Social Responsibility (CSR) and Global Citizenship" Please respond to the following:
• You are the author of a popular CSR article. For this week’s discussion post, discuss the main reasons why Apple is or is not a socially responsible organization. List at least two examples of Apple’s actions that support your position. Be sure to use terms from Chapter 3 to demonstrate your understanding of corporate social responsibility.
• Additionally, rate the quality of your peers’ posts. You can rate posts by clicking on the stars in the upper right hand corner of each post. A rating of one star is the lowest and five stars is the highest. The post with the highest rating will be acknowledged by the instructor in next week’s announcements.

Discuss the role of security and penetration testers by defining

DOWNLOAD
QUESTION 1
•               Discuss the role of security and penetration testers by defining concepts such as hacker, cracker, ethical hacker, and script kiddies. Include in your discussion the classifications of ethical hackers and do you think that hacking can be an ethical occupation?
•               There have been several major cyber-attacks in the United States in the past few years. Choose one attack and explain two countermeasures that would have helped prevent or deter those attacks.  Support your answer with references.

QUESTION 2
•               Explain what a Null Session is and how it can be exploited. Also, include in your answer countermeasures for preventing null session’s vulnerabilities. What operating systems does this attack work on? When was the null session disabled by default by Microsoft?

•               Describe the various password cracking techniques and at least one tool that can be used for each technique (some tools can be used for all techniques). Also include countermeasures for password cracking in the discussion.

QUESTION C

•               Describe different types of session hijacking. Also research session hijacking on internet and see if you can find a case where session hijacking was successfully used to perform an attack against a system. Include references in your answer.

•               In your own words why do you think session hijacking is still a valid attack? What makes session hijacking possible and what technical control or controls would you put in place to prevent session hijacking from being successful? What would you implement to stop session hijacking?

QUESTION D
•               Describe and discuss three of the Web Application Threats discussed in the text book. Use the internet to research one the threats find a case that one these attacks was successfully used to attack a system. Give details about the attack. Included reference links.

•               Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.

Complete Assurance of Learning Exercise 1B, Step 4, on textbook page 36

DOWNLOAD
1.Complete Assurance of Learning Exercise 1B, Step 4, on textbook page 36. (Note: In addition to the instructions, you may choose to use the company's corresponding website for the Annual Report and/or the Securities and Exchange Commission's Edgar database for the corresponding 10K.)
2.Complete Assurance of Learning Exercise 10D on textbook page 321. (Note: There are correct and incorrect answers.)
3.Complete Assurance of Learning Exercise 1D, Steps 1–2, on textbook page 37.
4.Complete Assurance of Learning Exercise 1F, Step 1, on textbook page 38. (Note: Replace the use of " SMCO" in the assignment instructions with the use of www.ceoexpress.com or Standard and Poor's. Standard and Poor's can be accessed via Liberty University's Online Library.) Upon completion of Step 1, prepare a 1-page summary of your findings using current APA format.
5.Place the results of the exercise(s) in a single document and submit it via the link provided. Include your name, class, section number, and the number of the exercise(s) on the attachment (e.g.: 1B, Step 3). 
Be sure that the assignment is in a business-professional format; include current APA citing and referencing.

Complete Experiential Exercise 4C, Step 1, on textbook pages 124

DOWNLOAD
1. Complete Experiential Exercise 4C, Step 1, on textbook pages 124. Once you have found Table 4-6, complete the first 18 ratios and then 2 of your choice from the remaining ratios (this will equal the 20 required in the Assurance of Learning Exercise).

2. Complete Case 1: Domino's Pizza, Inc., on textbook page 372 in the case section by answering the 8 questions on textbook page 381 (last page of the case under the section heading "The Future").

3. Place the results of the experiential exercise and case in a single document and submit it via the link provided. Include your name, class, section number, and the number of the exercise(s) on the attachment (e.g.: 1B, Step 3). Be sure that the assignment is in a business-professional format; include current APA citing and referencing.

Complete Problem 5 on p. 350 in Ch. 6 of Prelude to Programming

DOWNLOAD

Complete Problem 5 on p. 350 in Ch. 6 of Prelude to Programming. You are required to generate only the pseudocode, as described in the Week Two CheckPoint. No charting is required, but you may have to incorporate the bubble sort algorithm on pp. 304-309 to determine the number median of home prices.

Complete problems 3.11 and 3.17

DOWNLOAD
3.11 Dave Fletcher (see Problem 3.10) was able to determine the activity times for constructing his laser scanning machine. Fletcher would like to determine ES, EF, LS, LF, and slack for each activity. The total project completion time and the critical path should also be determined. Here are the activity
times:
ACTIVITY               TIME (WEEKS)              ACTIVITY              TIME (WEEKS)
A                                   6                                      E                                   4
B                                   7                                      F                                   6
C                                  3                                      G                                10
D                                 2                                      H                                7

Complete problems B.1, B.5, B.7, B.11, and B.21 in the textbook.

DOWNLOAD
Complete problems B.1, B.5, B.7, B.11, and B.21 in the textbook.

Submit one Excel file. Put each problem result on a separate sheet in your file. 

B.1 Solve the following linear programming problem
graphically:
Maximize profit = 4X + 6Y
Subject to: X + 2Y ≤ 8
5X + 4Y ≤ 20
X, Y ≥ 0


B.5 Solve the following LP problem graphically:
Minimize cost = 24X + 15Y
Subject to: 7X + 11Y ≥ 77
16X + 4Y ≥ 80
X, Y ≥ 0

B.7 The Attaran Corporation manufactures two electrical
products: portable air conditioners and portable heaters. The
assembly process for each is similar in that both require a certain amount of wiring and drilling. Each air conditioner takes 3 hours
of wiring and 2 hours of drilling. Each heater must go through
2 hours of wiring and 1 hour of drilling. During the next production
period, 240 hours of wiring time are available and up to
140 hours of drilling time may be used. Each air conditioner sold
yields a profit of $25. Each heater assembled may be sold for a
$15 profit.
Formulate and solve this LP production-mix situation, and
find the best combination of air conditioners and heaters that
yields the highest profit.

B.11 The Sweet Smell Fertilizer Company markets bags
of manure labeled “not less than 60 lb dry weight.” The packaged
manure is a combination of compost and sewage wastes. To
provide good-quality fertilizer, each bag should contain at least
30 lb of compost but no more than 40 lb of sewage. Each pound
of compost costs Sweet Smell 5¢ and each pound of sewage costs
4¢. Use a graphical LP method to determine the least-cost blend
of compost and sewage in each bag.

B.21. Par, Inc., produces a standard golf bag and a deluxe
golf bag on a weekly basis. Each golf bag requires time for cutting
and dyeing and time for sewing and finishing, as shown in the following
table:

HOURS REQUIRED PER BAG
PRODUCT CUTTING AND DYEING SEWING AND FINISHING
Standard bag 1/2 1
Deluxe bag 1 2/3
The profits per bag and weekly hours available for cutting and
dyeing and for sewing and finishing are as follows:

PRODUCT PROFIT PER UNIT ($)
Standard bag 10
Deluxe bag 8

ACTIVITY WEEKLY HOURS AVAILABLE
Cutting and dyeing 300
Sewing and finishing 360
Par, Inc., will sell whatever quantities it produces of these two
products.
a) Find the mix of standard and deluxe golf bags to produce per
week that maximizes weekly profit from these activities.
b) What is the value of the profit?

Complete problems D.1, D.3, D.6, and D.8 in the textbook.

DOWNLOAD
Complete problems D.1, D.3, D.6, and D.8 in the textbook.

Submit one Excel file. Put each problem result on a separate sheet in your file.


D.1 Customers arrive at Rich Dunn’s Styling Shop at a
rate of 3 per hour, distributed in a Poisson fashion. Rich can perform
haircuts at a rate of 5 per hour, distributed exponentially.
a) Find the average number of customers waiting for haircuts.
b) Find the average number of customers in the shop.
c) Find the average time a customer waits until it is his or her
turn.
d) Find the average time a customer spends in the shop.
e) Find the percentage of time that Rich is busy.

D.3 Paul Fenster owns and manages a chili-dog and softdrink
stand near the Kean U. campus. While Paul can service 30
customers per hour on the average (m), he gets only 20 customers
per hour (l). Because Paul could wait on 50% more customers
than actually visit his stand, it doesn’t make sense to him that he
should have any waiting lines.
Paul hires you to examine the situation and to determine
some characteristics of his queue. After looking into the problem,
you find it follows the six conditions for a single-server waiting
line (as seen in Model A). What are your findings?

D.6 Calls arrive at Lynn Ann Fish’s hotel switchboard at
a rate of 2 per minute. The average time to handle each is 20 seconds.
There is only one switchboard operator at the current time.
The Poisson and exponential distributions appear to be relevant
in this situation.
a) What is the probability that the operator is busy?
b) What is the average time that a customer must wait before
reaching the operator?
c) What is the average number of calls waiting to be answered?


D.8 Virginia’s Ron McPherson Electronics Corporation
retains a service crew to repair machine breakdowns that occur
on average l = 3 per 8-hour workday (approximately Poisson in
nature). The crew can service an average of m = 8 machines per
workday, with a repair time distribution that resembles the exponential
distribution.
a) What is the utilization rate of this service system?
b) What is the average downtime for a broken machine?
c) How many machines are waiting to be serviced at any given
time?
d) What is the probability that more than 1 machine is in the
system? The probability that more than 2 are broken and
waiting to be repaired or being serviced? More than 3? More
than 4?