2. Consider the following code that will assign a letter
Question 2. Consider the following code that will assign a letter grade of ‘A’, ‘B’, ‘C’, ‘D’, or ‘F’ depending on a student’s test score. if (score >= 90) { grade = ‘A’; } if (score >= 80) { grade = ‘B’; } if (score >= 70) { grade = ‘C’; } if (score >= 60) {grade = ‘D’; } else {grade = ‘F’; } (a) This code will work correctly in all cases (b) This code will work correctly only if grade >= 60 (c) This code will work correctly only if grade < 60 (d) This code will work correctly only if grade < 70 (e) This code will not work correctly under any circumstances 3. The break statement does which of the following? (a) ends the program (b) transfers control out of the current control structure such as a loop or switch statement (c) ends the current line of output, returning the cursor (d) denotes the ending of a switch statement (e) indicates the end of line when using System.out.print 4. If x is an int where x = 1, what will x be after the following loop terminates? while (x < 100){ x *= 2; } (a) 2 (b) 64 (c) 100 (d) 128 (e) none of the above, this is an infinite loop 5. Given the following code, where x = 0, what is the resulting value of x after the for-loop terminates? for (int i=0;i 0); (a) 0 times (b) 1 time (c) 9 times (d) 10 times (e) 11 times 7. The statement if (x < 0) { y = x; }else{ y = 0; } can be rewritten using a conditional operator as (a) y = (x < 0) ? x : 0; (b) x = (x < 0) ? y : 0; (c) (x < 0) ? y = x : y = 0; (d) y = (x < 0); (e) y = if (x = 90) { grade = ‘A’; } if (score >= 80) { grade = ‘B’; } if (score >= 70) { grade = ‘C’; } if (score >= 60) {grade = ‘D’; } else {grade = ‘F’; } (a) This code will work correctly in all cases (b) This code will work correctly only if grade >= 60 (c) This code will work correctly only if grade < 60 (d) This code will work correctly only if grade < 70 (e) This code will not work correctly under any circumstances 3. The break statement does which of the following? (a) ends the program (b) transfers control out of the current control structure such as a loop or switch statement (c) ends the current line of output, returning the cursor (d) denotes the ending of a switch statement (e) indicates the end of line when using System.out.print 4. If x is an int where x = 1, what will x be after the following loop terminates? while (x < 100){ x *= 2; } (a) 2 (b) 64 (c) 100 (d) 128 (e) none of the above, this is an infinite loop 5. Given the following code, where x = 0, what is the resulting value of x after the for-loop terminates? for (int i=0;i 0); (a) 0 times (b) 1 time (c) 9 times (d) 10 times (e) 11 times 7. The statement if (x < 0) { y = x; }else{ y = 0; } can be rewritten using a conditional operator as (a) y = (x < 0) ? x : 0; (b) x = (x < 0) ? y : 0; (c) (x < 0) ? y = x : y = 0; (d) y = (x < 0); (e) y = if (x < 0) x : 0; 8. Once we have implemented the solution, we are not done with the problem because (a) the solution may not be the best (most efficient) (b) the solution may have errors and need testing and fixing before we are done (c) the solution may, at a later date, need revising to handle new specifications (d) the solution may, at a later date, need revising because of new programming language features (e) all of the above 9. Having multiple class methods of the same name where each method has a different number of (or type of) parameters is known as (a) encapsulation (b) information hiding (c) tokenizing (d) importing (e) method overloading 10. Which of the following is a legal way to declare and instantiate an array of 10 Strings? (a) String s = new String(10); (b) String[10] s = new String; (c) String[ ] s = new String[10]; (d) String s = new String[10]; (e) String[ ] s = new String;
Read the ModMeters Case Study on pages 82-85 in the
Question Read the ModMeters Case Study on pages 82-85 in the textbook. Answer the Discussion Question at the end of the Case Study
Question.Many of the security threats discussed in this unit have
Question Question.Many of the security threats discussed in this unit have actually been experienced by individuals, but on a much smaller scale than discussed here. Think of a time that you or someone you know has experienced such a threat. Discuss what happened, how it was discovered, and what was affected by this threat.If you or someone you know has not experienced such a threat before, think of someone that you may have heard about in the news who was been affected by a cybersecurity threat, and discuss the details mentioned above.
Question 2Choose an organization with which you are familiar, and
Question Question 2Choose an organization with which you are familiar, and assume the role of director of IT. Which compliance law do you think you would be most concerned with in your organization? Discuss how the need to adhere to this law would affect your IT security policies.
Question 3Someone in your organization has suggested that you should
Question Question 3Someone in your organization has suggested that you should use authentication via digital signatures and digital certificates. As an IT security professional, identify the potential security threats associated with doing this. Explain each threat, and offer your opinions about how you would address each one.
Question 6Assume that you are an IT Security Manager who
Question Question 6Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide for your employees. Please explain your choices and why these policies are important.
Question 7Assume you are an IT security manager working with
Question Question 7Assume you are an IT security manager working with the database administrator. What do you consider to be the most important policies to adopt in order to secure your company’s data? Explain your choices.
Question 5In this unit, we discussed firewall policies for companies
Question Question 5In this unit, we discussed firewall policies for companies and businesses. Do you feel that a firewall policy is necessary for your own home network or the home network of someone you know? Why, or why not?
Question 4Assume that you are an IT security professional with
Question Question 4Assume that you are an IT security professional with a newly installed intrusion detection system. You are setting up alerts for an auditing tool that is collecting network traffic. Knowing that receiving too many alerts is just as undesirable as receiving too few, what types of items would you want to be notified about? Please explain.
Which of the follow is a definition of “Cybersecurity?”1) Assembles
Question Which of the follow is a definition of “Cybersecurity?”1) Assembles a management plan for minimizing cyber threats.2) Covers the technical and managerial aspects of cyber information. 3) Assess risks and vulnerabilities. 4) Prevention of damage to, protection of, and restoration of computers, electronic communication services, wire communication, and electronic communication, including information contained therein.
Hot Water(HW) is a small start-up company that sells spas.
Question Hot Water(HW) is a small start-up company that sells spas. HW does not carry any stock. A few spas are set up in a simple warehouse at different locations, so customers can see some of the models available, but any products sold must be ordered at the time of the sale.· HW can get spas from several different manufacturers.· Each manufacturer produces one or more different brands of spas.· Each and every brand is produced by only one manufacturer.· Every brand has one or more models.· Every model is produced as part of a brand.· Every customer could buy multiple spas· Every manufacturer is identified by a manufacturer code. The company name, address, area code, phone number, and account number are kept in the system for every manufacturer.· For each brand, the brand name and brand level (premium, mid-level, or entry-level) are kept in the system.· For each model, the model number, number of jets, number of motors, number of horsepower per motor, suggested retail price, HW retail price, dry weight, water capacity, and seating capacity must be kept in the system.· For each customer, customer name, address and contact phone number are kept in the system.Scenario example: Iguana Bay Spas is a manufacturer that produces Big Blue Iguana spas, a premium-level brand, and Lazy Lizard spas, an entry-level brand. The Big Blue Iguana brand offers several models, including the BBI-6, an 81-jet spa with two 6-hp motors, and the BBI-10, a 102-jet spa with three 6-hp motors.Create an ERD for each of the above statements that describe the current business rules for HW. For each new statement being the business rule. Use Crows Foot notations and include all of the following in each part:
how ERM is leveraged to minimize risk and create opportunity
Question how ERM is leveraged to minimize risk and create opportunity in industry with specific examples.
Utilizing comprehensive Security plan outline, develop a proposal for implementing
Question Utilizing comprehensive Security plan outline, develop a proposal for implementing IT Security Management.
Develop a comprehensive security plan outline for the organization.
Question Develop a comprehensive security plan outline for the organization.
in regards to Ubiquitous data style=”color:rgb(73,76,78);background-color:rgb(255,255,255);”>What impact do you think
Question in regards to Ubiquitous data style=”color:rgb(73,76,78);background-color:rgb(255,255,255);”>What impact do you think ubiquitous computing will have on security? How about increased computing power with breakthroughs like quantum computing?
Security Trends What do you think are the main trends
Question Security Trends What do you think are the main trends in information security? What impact do you think they will have on security policies and regulations?
Chapter 12 – From the chapter reading, we learned that
Question Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?
Chapter 13 – According to Franks and Smallwood (2013), information
Question Chapter 13 – According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks
Compare and contrast 2 distinctions between legal and ethical issues
Question Compare and contrast 2 distinctions between legal and ethical issues relating to computer security. Justify your answer and provide examples of the issues.
Compare and contrast Patents, Copyrights and Trademarks. Justify your answers
Question Compare and contrast Patents, Copyrights and Trademarks. Justify your answers and provide an example of where each one is used.
Using Porter’s Five Forces Model, personal Critical Success Factors (CSFs)
Question Using Porter’s Five Forces Model, personal Critical Success Factors (CSFs) and/ personal Key Performance Indicators (KPIs), explain how you will overcome threats from each of the five forces while achieving your professional goal(s) after graduation from the MS-IST Program. The paper’s first paragraph must identify and define, at least one, of your post-graduation professional goals.
The post 2. Consider the following code that will assign a letter appeared first on Smashing Essays.