Computer Science
A Traditional For Loop
Write a static method called calc that has one parameter that is a 2D array of int called data (some of its arrays can be null). Your method should return a 1D array of Integer, with each element being the sum of its corresponding array in data. If any of the arrays in data are null, use null as the value for the corresponding element. You must use a traditional outer for loop and a traditional inner for loop.e.g if data is => { {1,1,2} , {6} , {7,1} , null } , then calc should return => { 4 , 6 , 8 , null }b) The above method is in a class called Util. Write code to create the following 2D array of int and called nos, then call your method above using nos and save the results in a variable called ans (declare it).
Security and Cyber Threats
Security and Cyber ThreatsName the major points of vulnerability in a typical online transaction, and describe the technology solutions that a company can use to defend itself against security and cyber threats.The requirements below must be met for your paper to be accepted and graded:· Write between 500-750 words (approximately 2-3 pages) using Microsoft Word.· Attempt APA style. Use the APA Resources in your course for guidance.· Use font size 12 and 1″ margins.· Include a cover page and reference page.· At least 80% of your paper must be original content/writing.· No more than 20% of your content/information may come from references.· Use at least two references from outside the course material, preferably from EBSCOhost. The textbook, lectures, and other materials in the course may be used, but are not counted toward the two reference requirement.Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must be identified in the paper and listed on a reference page. Reference material must come from sources such as scholarly journals found in EBSCOhost, online newspapers such as The Wall Street Journal, government websites, etc. Sources such as Wikis, Yahoo Answers, eHow, etc. are not acceptable.
Robotics Applications
Discussion: There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?Questions: Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?Exercise:1. Conduct online research to find at least one new robotics application in customer service. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned.2. Conduct research to identify the most recent developments in self-driving cars.
System Security Plan
In this assignment, students will learn to integrate course topics into an actionable security plan.Use your organization’s current system security (if this is not available find one on the Internet), and create a system security plan that is appropriate for the environment under consideration.Note: If you work in a large company, create the system security plan for a single division or department.Use the “System Security Plan Template,” to complete this assignment. Make sure to include screenshots (as applicable).Refer to the “System Security Plan,” located within the Topic Materials, when working on this assignment. This resource provides detailed explanations of each section that should be included within the plan.APA style is not required, but solid technical writing is expected.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.You are not required to submit this assignment to LopesWrite.
Testing of Web Applications
* Reflect on the connection between knowledge concepts from the above listed courses and how those have been, or could be, applied in the workplace.My job duties are:·Provide leadership and guidance for QA engineers in creation of a dedicated test environment and test data management practices for automation and performance testing of web applications.·QA Management practices for automation and penetration testing of web applications·Lead selection and standardization of automation tools and test environment, suggesting the best practices for automation which is to be implemented across organization·Lead the development of end-to-end test plans and processes to meet quality objectives and product requirements.·Work on required documentation needed for the project adhering to existing process guidelines.·Serve as an expert and knowledge source for the escalation of complex application design and development issues.·Coordinate software installation/deployment activities and monitor implementation verification proces·Develop automated test scripts for web interface and web services using Selenium WebDriver with Java.·Ensure system performance by validating stability, scalability, reliability, latency and response time of different products and applications.·Participate in troubleshooting and triaging of issues with different teams to drive towards root cause identification and resolution.
Bottling Company
Case 9.1 Carpita Bottling CompanyPart 2Don Carpita and his younger brother, Edward, purchased Carpita Bottling Company from their father in 1983. The company bottles and distributes soda and beer in Wisconsin. Since purchasing the company, Don has been instrumental in modernizing operations. One of the latest acquisitions is a filling machine that can be adjusted to fill at any average level desired. Because the bottles and cans filled by the company are exclusively the 12-ounce size, when they received the machine, Don set the fill level to 12 ounces and left it that way. According to the manufacturer’s specifications, the machine will fill bottles or cans around the average, with a standard deviation of 0.15 ounce. Don just returned from a convention at which he attended a panel discussion related to problems with filling machines. One bottling company representative discussed a problem her company had. It failed to learn that its machine’s average fill went out of adjustment until several months later, when its cost accounting department reported some problems with beer production in bulk not matching output in bottles and cans. It turns out that the machine’s average fill had increased from 12 ounces to 12.07 ounces. With large volumes of production, this deviation meant a substantial loss in profits. Another company reported the same type of problem, but in the opposite direction. Its machine began filling bottles with slightly less than 12 ounces on the average. Although the consumers could not detect the shortage in a given bottle, the state and federal agencies responsible for checking the accuracy of packaged products discovered the problem in their testing and substantially fined the company for the underfill. These problems were a surprise to Don. He had not considered the possibility that the machine might go out of adjustment and pose these types of problems. In fact, he became very concerned because the problems of losing profits and potentially being fined by the government were ones that he wished to avoid, if possible. After the convention, Don and Ed decided to hire a consulting firm with expertise in these matters to assist them in setting up a procedure for monitoring the performance of the filling machine. The consultant suggested that they set up a sampling plan in which once a month, they would sample some number of bottles and measure their volumes precisely. If the average of the sample deviated too much from 12 ounces, they would shut the machine down and make the necessary adjustments. Otherwise, they would let the filling process continue. The consultant identified two types of problems that could occur from this sort of sampling plan:1. They might incorrectly decide to adjust the machine when it was not really necessary to do so.2. They might incorrectly decide to allow the filling process to continue when, in fact, the true average had deviated from 12 ounces. After carefully considering what the consultant told them, Don indicated that he wanted no more than a 0.02 chance of the first problem occurring because of the costs involved. He also decided that if the true average fill had slipped to 11.99 ounces, he wanted no more than a 0.05 chance of not detecting this with his sampling plan. He wanted to avoid problems with state and federal agencies. Finally, if the true average fill had actually risen to 12.007 ounces, he wanted to be able to detect this 98% of the time with his sampling plan. Thus, he wanted to avoid the lost profits that would result from such a problem.In addition, Don needs to determine how large a sample size is necessary to meet his requirements.
The Database
Discussion 1:::How can the key and foreign key constraints be enforced by the DBMS? Is the enforcement technique you suggest difficult to implement? Can the constraint checks be executed in an efficient manner when updates are applied to the database?Discussion 2:::What is the FUNCTION operation? For what is it used? And Present a practical example/ scenario.Need 250 to 300 words with references for each discussion. No APA format required and the textbook is attached.
Binary Search Algorithm
But, what if we wanted to find the maximum number of guesses?Write a short paragraph or few lines explaining your logic and giving a guess to the maximum number of guesses to solve the problem.· Binary Search· Divide and Conquer Algorithms· What is Big O for the Binary Search algorithm?· What must be true about the data to implement an effective Binary Search?Nature of Data· size (n)· What are the different possibilities for data organization?· Random· Sorted· Sorted in Reverse Order· Mostly Sorted· Mostly Unsorted· Compare and contrast trade-offs associated with implementing a Binary Search and a Linear Search· Which algorithm is better?
New Communication Device
Choose a project with a relatively simple description (building a LAN, designing a web page, inventing a new communication device, etc.). Describe your project scope in a few sentences and then identify at least five significant varied risks associated with the project. Be sure that at least one of them is a positive risk.Would each of these risks be considered major, moderate, or minor? What degree of likelihood and impact leads you to that assessment?Would each risk be best addressed by risk avoidance, risk transfer, risk mitigation/reduction, risk sharing, or risk acceptance?CLASSMATES RESPONSE:
Java Coding
Pointers: The Good, the Bad, and the Ugly.Why were they invented (as indirect addresses), in what ways are they used,why are they unsafe,and why they are they needed in C and C++ but not needed in Java?Why does C# add them back in but warn about them?Do you ever use them? Why or why not?Write a three or four page double-spaced essay on this
Use Promo Code: FIRST15