Unit5

In: Computers and Technology

Submitted By Brown123
Words 712
Pages 3
James Wall
Pt1420 Unit 5 Assignment 1
Short Answer
1. Explain what is meant by the term “conditionally executed”. Conditionally executed is called a single alternative decision structure because it provides only one alternative path of execution. The action is conditionally executed because it is performed only when a certain condition is true.
2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use?
I will use the “If” statement because it is a dual alternative decision structure. 3. If you need to a test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? The case structure lets the value of a variable or an expression determine which path of execution the program will take. 4. Briefly describe how the AND operator works.
The AND operator takes two Boolean expressions as operands and creates a compound Boolean expression that is True only when both sub-expressions are true. 5. Briefly describe how the OR operator works. The OR operator takes two Boolean expressions as operands and creates a compound Boolean expression that is true when either of the sub-expressions is true. The following is an example of an If-Then statement that uses the OR operator: 6. When determining whether a number is inside a range, which logical operator is it best to use?
The AND operator would be the best to use to determine whether or not a number is within a given range.
7. What is a flag and how does it work?
A flag is a Boolean variable that signals when some condition exists in the program. When the flag is set to False, it indicates the condition does not exist. When the…...

Similar Documents

Nt2580 Unit 5 Assignment 1

...It255 Unit5 Assignment TO: FROM: DATE: SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1) How Grade: One hundred points total. See each section for specific points. Assignment Requirements Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.) # | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | | Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.) # | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage privileges to outside users. |...

Words: 258 - Pages: 2

Random

...NT2580 Introduction to If ti S itInformation Security. Lab itt edition nt2580 answers - 1 ebooks - free download www.getbookee.org/lab-itt-edition-nt2580-answers/ Jan 30, 2013 – Lab itt edition nt2580 answers download on GetBookee.org free books and manuals search - 061 CLO 01-30-13 01-30-13 Vol 23 - ITT Tech ... NT2580 Week2 Unit2 Homework pdf free ebook download from ... ebookbrowse.com/nt2580-week2-unit2-homework-pdf-d427735126 Download NT2580 Week2 Unit2 Homework pdf documents from stankong.bol.ucla.edu at @EbookBrowse. ... ET156 Week2 Unit2 HomeWork Labs.pdf ... NT2580 Week5 Unit5 Homework pdf free ebook download from ... ebookbrowse.com/nt2580-week5-unit5-homework-pdf-d435177319 Pages: 2. Date: 2012-12-10. NT2580 Week2 Unit2 Homework.pdf. Add to your account. Size: 352 KB. Pages: 10. Date: 2012-10-22. IS3120 Week5 Unit5 Lab. NT2580 - Mr. McClain's IT Courses mcclainitcourses.com/index-NT2580.php NT2580 Menu. Syllabus & Schedule · Exercises & Labs · Digital Dropbox; Lab Videos; Register. Design by: Mr. Samuel McClain © 2011 Copyright Info ... 1 2 3 4 5 6 7 8 9 10 Next Advanced searchSearch HelpGive us feedback Google Home‎Advertising Programs‎Business Solutions‎Privacy & Terms‎About Google‎...

Words: 435 - Pages: 2

It302-Unit5

...IT302-Unit5- Kaplan University Part 1: Design choice and wireframe. The range of purposes that kiosks serve is broad and varied. From providing information or services to the purchase of an extensive array of goods a kiosk can be and frequently is used to meet the desires and needs of the general public and consumers. In recent years there has been a substantial and steady increase in the frequency that we see or use some form of stand alone kiosk. The wireframe that I considered is more general in nature. This was done to provide flexibility in the design that can be easily used across a broad range of services with minimal modification. It also accommodates easy adjustment for use by disabled individuals. [pic] Part 2: Report of design principles. The final goal in designing a kiosk is to generate a product that will meet the needs of the business or organization that is using it to provide goods or services to its potential clientele. The purpose is to produce a product that is highly intuitive, and also provides clear and concise instructions on the proper use of the kiosk in general and specific features for those patrons that need assistance. The final design is influenced by several factors; • The service it provides and its ultimate function. • Ease of use and convenience for all users including handicapped. • The surroundings it needs to blend with. • Ease...

Words: 807 - Pages: 4

Managerial Economics

...per year for each company resulting from the interaction of their strategies. a. Briefly explain whether Wal-World has a dominant strategy. If Wal-World goes with the new barcode technology they will have a dominant strategy b. Briefly explain whether Tarbo has a dominant strategy. If Tarbo goes with the existing barcode technology they will have a dominant strategy. c. Briefly explain whether there is a Nash equilibrium in this game. Yes, there is Nash equilibrium as this situation in which each firm chooses the best strategy. Directions for Submitting your Assignment Complete your assignment in this Microsoft Word® document and save it as Username-MT445Assignment-Unit#.doc (Example:TAllen-MT445Assignment-Unit5.doc). Submit your file by selecting the Unit 5: Assignment Dropbox by the end of Unit 5....

Words: 505 - Pages: 3

Grading System

...rec!dt1 dt2 = rec!dt2 dt3 = rec!dt3 dt4 = rec!dt4 dt5 = rec!dt5 dt6 = rec!dt6 dt7 = rec!dt7 dt8 = rec!dt8 dt9 = rec!dt9 dt10 = rec!dt10 If Is null(rec!unit1) Then Unit1 = 0 Else unit1 = rec!unit1 End If If IsNull(rec!unit2) Then unit2 = 0 Else unit2 = rec!unit2 End If If IsNull(rec!unit3) Then Unit3 = 0 Else unit3 = rec!unit3 End If If IsNull(rec!unit4) Then unit4 = 0 Else unit4 = rec!unit4 End If If IsNull(rec!unit5) Then unit5 = 0 Else Unit5 = rec!unit5 End If If IsNull(rec!unit6) Then unit6 = 0 Else Unit6 = rec!unit6 End If If IsNull(rec!unit7) Then unit7 = 0 Else unit7 = rec!unit7 End If If IsNull(rec!unit8) Then unit8 = 0 Else unit3 = rec!unit8 End If If IsNull(rec!unit9) Then unit9 = 0 Else unit9 = rec!unit9 End If If IsNull(rec!unit10) Then unit10 = 0 Else unit10 = rec!unit10 End If time1 = rec!time1 time2 = rec!time2 time3 = rec!time3 time4 =......

Words: 1687 - Pages: 7

Mm250 Unit5 Assignment

...Unit 5: Mathematical Recursion - Project Total points for project: 45 points. Projects must be submitted as a Microsoft Word document and uploaded to the Dropbox for Unit 5. All Projects are due by Tuesday at 11:59 PM ET of the assigned Unit. NOTE: Project problems should not be posted to the Discussion threads. Questions on the project problems should be addressed to the instructor by sending an email or by attending office hours. You must show your work on all problems. If a problem is worth 2 points and you only show the answer, then you will receive only 1 point credit. If you use a calculator or online website, give the source and tell me exactly what you provided as input. For example, if you used Excel to compute 16 * 16, state “I typed =16*16 into Excel and got 256. You may type your answer right into this document. Part I. Basic Computations 1. According to the National Education Association[1], the average classroom teacher in the US earned $43,837 in annual salary for the 1999-2000 school year. a. If the teachers receive an average salary increase of 2.5%, or $1096, write out the first 6 terms of the sequence formed by the average salaries starting with the 1999-2000 school year. Explain how you got your answer. (2 points) Answer: $50,837 Explanation: The formula is A₂ = (A₁ * 2.5%) + A₁ , A₁ = $43,837 therefore A₂ = $44,933 and we keep doing this for A₃ , A₄, A₅, A₆ b. Write the general form for the......

Words: 1537 - Pages: 7

Economics

... 3. Suppose that Wal-World and Tarbo are independently deciding whether to implement a new bar code technology. It is less costly for their suppliers to use one system and the following payoff matrix shows the profits per year for each company resulting from the interaction of their strategies. [pic] a. Briefly explain whether Wal-World has a dominant strategy. b. Briefly explain whether Tarbo has a dominant strategy. c. Briefly explain whether there is a Nash equilibrium in this game. Directions for Submitting your Assignment Complete your assignment in this Microsoft Word® document and save it as Username-MT445Assignment-Unit#.doc (Example:TAllen-MT445Assignment-Unit5.doc). Submit your file by selecting the Unit 5: Assignment Dropbox by the end of Unit 5....

Words: 298 - Pages: 2

It301-Unit5

...Leading thinkers make great philosophies, and great philosophies make great thinkers, and one of them is W. Edwards Deming. Deming changed our lives by developing better ways for people to work together. He was educated in engineering physics and became an early student of statistics. He derived the first philosophy and method that allows individuals and organizations, to plan and continually improve themselves, their relationships, processes products and services. His philosophy is one of cooperation and continual improvement; to steer clear of blame and redefines mistakes as opportunities for improvement. Deming’s philosophy came about while he was in Japan, doing census work after World War II. He also taught statistical process control to leaders of prominent Japanese businesses. Japanese businesses started applying Deming’s philosophy and saw great improvement; their quality was way more superior then of their competitors. Deming’s points and philosophies apply equally to any kind of business, everyone could use his logic. After using his philosophy, the Japanese saw such improvement in their products and their businesses in general; their business was soaring and their cost was lower than that of other businesses. Japanese businesses soared and ruled the global market. By improving quality, companies will decrease expenses as well as increase productivity and market share. Companies that were using Deming’s philosophy saw that they didn’t have to sacrifice quality to...

Words: 709 - Pages: 3

Bus Law

...fixtures are all considered part of the real property, as are the air above land and mineral rights below the surface of the land. Because modern business often involves all three types of property, a basic understanding of property law is essential for business students. A company will protect its name, its logo, and its advertising slogans through intellectual property law. The company's factory, whether owned or leased, is governed by the law of real property. The goods the company manufactures are personal property of the business. One way or another, property law is unavoidable for almost any business. http://content.ashford.edu/print/AUBUS311.12.1?sections=ch11,sec11.1,sec11.2,sec11.3,sec11.4,ch13,sec13.1,sec13.2,sec13.3,sec13.4,unit5&content=content&clientToken=6c80a5d6-4e56-b6d3-e0ca-65830a503… 1/31 8/6/2014 Print 11.1 Personal Property Is possession nine-tenths of the law, as the old saying goes? Not really. In order to own property, title must be acquired and that depends on more than just possession. In general, property (and title) may be acquired through a few basic methods: purchase or manufacture, gifts, and, in some situations, found property. Acquiring Personal Property The following are ways in which personal property can be transferred or acquired. Purchase and Manufacture Purchase means that an owner contracted to buy the property; manufacture means that the owner is the person who created the The horse is personal property; the......

Words: 21517 - Pages: 87

Unit5 - Individual Project

...Student Sheet Name: Date: Instructor’s Name: Assignment: SCIE207 Phase 5 Lab Report Title: Taxonomy Lab to Show Organism Relationships Instructions: You will need to fill out the data table and answer a set of questions. When your lab report is complete, submit this document to your instructor in your assignment box. Part 1: Using the lab animation, fill in the following data tables to help you answer the questions that follow: Table 1: Samples 1–5 Phylum/Class | Sample 1: Chrysophyta | Sample 2: Annelida | Sample 3: Arthropoda | Sample 4: Amphibia | Sample 5: Aves | Common Feature | | | | | | NutritionHow does the organism break down and absorb food? | | | | | | Circulatory System (Transport)How does the organism get what it needs to the cells (open, closed, diffusion only)? | | | | | | Respiratory SystemHow does the organism get oxygen and release carbon dioxide? | | | | | | Reproductive SystemDoes the organism use asexual or sexual reproduction (eggs, seeds, spores, placenta, and type of fertilization)? | | | | | | Excretory SystemHow does the organism get rid of waste and maintain an ionic balance of fluids? | | | | | | Growth and Development Does the organism go through metamorphosis, develop in an egg or uterus, or grow from seeds? | | | | | | RegulationHow does the organism control body processes (hormones, nervous system)? | | | | | | Sample Organism | | | | | | Table 2:......

Words: 447 - Pages: 2

Observations of One Sort or Another Play a Key Role in Scientific and Other Forms of Research. It Has Also Been Argued, However, That the Usefulness of Observations Has Limitations. Discuss

...it is likely that an exception may arise. Inductive statements always involve an element of doubt. There is no guarantee that the next observation will be the same as all the others and disprove the law. Another challenge is that it may be difficult to determine how many observations would be enough to support a law, as the number may be unlimited, and testing would have to be done under varied conditions. Despite the aforementioned limitations of using this method, I believe that it is still an important factor of all approaches and is the basis to making conclusions to support laws. BIBLIOGRAPHY “Advantages and Disadvantages of Observation.” University of Strathclyde http://www.strath.ac.uk/aer/materials/3datacollection/unit5/advantagesanddisadvantagesofobservation/...

Words: 289 - Pages: 2

Unit5

...TCP/IP network, TCP/IP identifies both the stuff and how the stuff works together. Networking standards record the details of exactly what a new networking technology does, and how it does what it does. TCP/IP model defines a large set of standards, which, when implemented together, create a safe and useful network. Open networking model like TCP/IP purposefully shares the details so that any vendor can make products using those standards. Open system interconnection (ISO) set out with a noble goal to create an open networking model. Encoding standard creates something like a spoken language that uses electricity. A header and/or trailer as a place to store a message that needs to flow through the network with the user data. Leased line creates the equivalent of a cable directly between two remote sites. T Internet Protocol (IP), list the rules so that the network can forward data from end to end through the entire TCP/IP network. IP address identifies that device in a TCP/IP network. Remember, computer networks, including TCP/IP networks, need to deliver bits from one device to another. IP routing defines exactly how routers makes their choices of how to forward data in a TCP/IP network. : frame and packet. The term frame specifically refers to encapsulated data that includes the data-link header and trailer, plus everything in between—including the IP header. The term packet refers to what sits between the data-link header and trailer, but not including the......

Words: 257 - Pages: 2

Unit5 P2

...In this task I will explain the difference between capital and revenue items of expenditure and income Capital income Capital income is money coming into the business, but not necessarily from direct sales of products or services. Capital income is money that comes into the business but not as revenue from what the businesses main frame of making profit is. Zara’s capital income would be any loans that the business receives. Another form of capital income Zara receives is money that comes into the business from sales of shares. Sole trader’s capital investments is also another form of capital income. Revenue income Revenue income is money coming into the business from sales of goods or services. This is the form of revenue that the businesses main purpose for setting up is to make profit in this form of revenue income. Revenue income could also be from receiving payments loans given out with interest in return or money coming in from rent payments that come into the business. Zara’s main form of revenue income is from the sales of their clothing goods both online and in store. Difference between capital and revenue income The difference between capital and revenue income is that capital income is made from money that comes into the business but not from the direct method that the businesses main purpose of making profit is. For example a business’s main objective may be to make as many sales from a product as possible, the money that they receive from this is revenue......

Words: 706 - Pages: 3

It255 Unit5 Assignment

...TO: FROM: DATE: SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1) How Grade: One hundred points total. See each section for specific points. Assignment Requirements Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.) # | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | | Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.) # | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage......

Words: 295 - Pages: 2

Define an Acceptable Use Policy

...Chris Browning Unit5 assignment2 Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) * Security monitoring controls for intrusion * Apply email server and attachment antivirus and email quadrating for unknown file types * Disablement for ping, probing, and port scanning on all exterior IP devices * Denying of outbound traffic using source IP addresses * Apply file transfer monitoring, scanning and alarming for unknown file types Web Surfing is the usage of the internet browsing a series of web browsers For Security (Administrators and Managers) * Apply domain-name content filtering at the internet entry/access point * Employees may lose productivity while searching web for no work related material Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers question and has to find it on the web? Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers. Guidelines to usage of email are covered under email usage policy Richman Investment Employees: Certain traffic is expressly forbidden: * No......

Words: 341 - Pages: 2