Description
you have to write a code for both questions attached in C++.
You have to complete the following programs by writing all functions. DON’T MAKE ANY CHANGES IN THE MAIN
please make sure there are no errors or wrong outputs!! they all should be done as what the worksheet wants you to do it,
After finishing it, please attach each code in a separate txt file and a screenshot of the output
Unformatted Attachment Preview
Computer Science 120
Project No. 11 (user defined functions)
Complete the following programs by writing all functions. DON’T MAKE ANY CHANGES IN THE MAIN
1. int main()
{
Enter 3 integer numbers: 10 20 30
//declare identifiers
int x, y, z, max, min;
Sum = 60
//read three integer numbers into x,y,z
Average = 20.00
ReadData(x,y,z);
//find and display the sum and average of x,y,z
Maximum = 30
int Sum; float Average;
Minimum = 10
FindSumAve(x,y,z, Sum, Average);
ShowSumAve(Sum,Average);
//find and display the max. and min. of x,y,z
FindMaxMin(max, min, x,y,z);
ShowMaxMin(max, min);
//terminate
program
system(“pause”); return o;
----------Practice Arithmetic--------- 1.
}
Addition
2. int main()
2. Subtraction
{ // display menu
DisplayMenu();
Enter your choice (1/2): 1
//select your choice
10 + 20 =? 30
int choice;
CORRECT
Select( choice); //
Continue(y/n)? y
test your choice
11 + 14 =? 35
switch( choice )
WRONG
{ case 1: PracticeAdd(); break;
case 2:
Continue(y/n)? n
PracticeSub(); break;
No.
of
CORRECT answers = 1
}
No. of WRONG answers = 1
//terminate
program
system(“pause”); return 0; }
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Attached is the full answer. Pleas...
Completion Status:
100%
Review
Review
Anonymous
Really helpful material, saved me a great deal of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
San Diego Mesa College Mod 1 Client Tracker of Ferrante & Dahl Consultants Project
I've attached everything you need to follow and fill is in the uploads. It's very straight forward and if you happened to ...
San Diego Mesa College Mod 1 Client Tracker of Ferrante & Dahl Consultants Project
I've attached everything you need to follow and fill is in the uploads. It's very straight forward and if you happened to have any questions please ask away.
6 pages
Final Copy Cybersecurity Threat Landscape
The Concept of Machine Learning (ML) and Data Analytics ML is a subset of Artificial Intelligence (AI) that uses statistic ...
Final Copy Cybersecurity Threat Landscape
The Concept of Machine Learning (ML) and Data Analytics ML is a subset of Artificial Intelligence (AI) that uses statistical learning algorithms to
IRS PIA Model and Template
Q1. Take a look at both the PIA Handbook from the UK: CIO link above and the IRS PIA Model from above. Currently, the ...
IRS PIA Model and Template
Q1. Take a look at both the PIA Handbook from the UK: CIO link above and the IRS PIA Model from above. Currently, these are a few good examples of what types of generic questions should be part of a Privacy Impact Assessment. The IRS example site has additional examples of PIA documents. Using the links above as a starting place, create a minimum one-page PIA template with generic questions that might be used as a prototype for any type of organization. Include at least two additional sources for PIA information, templates, or guidance.Links:UK:CIO Privacy Impact Assessment(PIA) HandbookIRS PIA ModelRequirement:1 - 2 Pages with Citations in APA Format.
Grand Canyon University Python Collage Looping Arrays Basic Debugging Project
The purpose of this assignment is to use Python to merge several photographic elements into a single photo.Search for and ...
Grand Canyon University Python Collage Looping Arrays Basic Debugging Project
The purpose of this assignment is to use Python to merge several photographic elements into a single photo.Search for and download a photograph of a jackrabbit.Use the web to search and download an image depicting a GCU campus or event.Locate and use your antelope photograph from Topic 1Take a head-to-toe photograph of yourself.Trade the antelope horns with the jackrabbit ears to create 2 possible candidates for a Jackalope.The textbook outlines several ways to manipulate multiple images using Python. Choose one (or more) of these methods and use Python to collage the GCU photo (background), along with the jackrabbit and antelope photos (foreground).Save the resulting (completed) image file.Create an HTML Web document within LopesCloud that displays the collaged image from step 7, and plays the blended WAV document that you created in Topic 5. Add a headline "Mythological Jackalope Discovered!"Submit the following in compressed, zip file format:Your Python program. Naming convention is: firstInitial+lastName+Collage.py. Example: dharalson Collage.pyOriginal antelope, jackrabbit, GCU picture and picture of yourself.2 Jackalope pictures.HTML web page and blended wav file.Screen capture of web page running in browser.Completed collage picture.At least one screen capture demonstrating that your program was functional.Zip file naming convention is: firstInitial+lastName+collage.zip
Week 7 assignment
Congratulations on joining the hacktivist group The Wide Awake Know Nothings (WAKN). Here at WAKN, our goal is to let the ...
Week 7 assignment
Congratulations on joining the hacktivist group The Wide Awake Know Nothings (WAKN). Here at WAKN, our goal is to let the world know that people’s right to free Internet access is being infringed upon by every nation on this planet. This offense must stop right now. Your goal to help WAKN get the message to the world is to find a target and build a misinformation profile on that target that our hacking team can inject onto that targets website. We recommend you read Manipulation Through Mass Media (http://www.slideshare.net/iulia_bilbie/manipulation-through-mass-media) and use the ideas discussed in this paper as a guide to building your misinformation campaign.
Pick a real person, group, business, entity, religious faction, nation, or organization and build a PowerPoint brief discussing how you would go about discrediting your selection. Keep in mind WAKN has access to underground newspapers, public TV, and of course the Internet. Include a 1-page talking paper* with information from your briefing and on the target and the processes you will use to discredit them. Your brief must be convincing, avoid generic blasts such as, “OSHA is horrible because of all their regulations.” This just does not fit with the process of discrediting through misinformation.
This assignment is worth 50 points total, based on content, analytical thought applied, and proper use of formatting, spelling, punctuation, and grammar. Submit both your PowerPoint and talking paper .
*This page provides an example of a Talking Paper: http://www.airforcewriter.com/talking-paper.htm.Read/Review
Libicki, Martin C., Conquest in Cyberspace, Chapter 11
FBI Testimonies Keeping America Safe in the New Age of Terror. Nov 30, 2017. https://www.fbi.gov/news/testimony
ICS-CERT Cyber Threat Source Descriptions: https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions#terror
CIA Director on National Security Interview: Transcripts https://www.csis.org/analysis/discussion-national-security-cia-director-mike-pompeo or Video https://www.youtube.com/watch?v=WKZxGD229cA
Supplemental Reading and Websites
Lohrmann, Dan, “Where Next for Hackers with a Cause,” July 2016, http://www.govtech.com/blogs/lohrmann-on-cybersecurity/understanding-new-hacktivism-where-next-for-hackers-with-a-cause.html
Schaefer, Ben. How Hezbollah Could Transform Cyberterroism. March 2018. http://georgetownsecuritystudiesreview.org/2018/03/11/the-cyber-party-of-god-how-hezbollah-could-transform-cyberterrorism/
Sands, Geneva ABC News: Want to know more about the worldwide hacker group "Anonymous". http://abcnews.go.com/US/worldwide-hacker-group-anonymous/story?id=37761302
Segall, Laurie. Anonymous Says it's hacking Trump.http://money.cnn.com/2016/03/18/technology/trump-hack-anonymous/index.html
Anonymous Official Website (enter and click at own risk) http://anonofficial.com/
Anonymous 2016 message to US Government https://www.youtube.com/watch?v=z2WO8qG1Ywk
Carr, Jeffrey, Inside Cyber Warfare, Chapter 2 (if you have the book)
Similar Content
Saudi Electronic University AT&T Inc Ethical Issues Related to Green Computing Case Study
Identify an organization that has had ethical issues related to green computing that affected their operations and stakeho...
IT Strategic Analysis Paper, IT Sourcing and Cloud Strategy
IS Strategic Analysis PaperPlease read this information on IT sourcing strategies:Chapter 12.4 – "IT Sourcing and Cloud ...
DFC 610 UMGC Cyberspace & Cybersecurity Foundation Infrastructure Systems Report
You are part of a collaborative team that was created to address cyber threats and exploitation of US financial systems' c...
Python Coding
For this assignment we need to use python programming language. I have attached the file for more details please let me kn...
Designing Compliance within the LAN-to-WAN Domain, Computer Science Assignment Homework Help
ssignment 4: Designing Compliance within the LAN-to-WAN DomainNote: Review the page requirements and formatting instr...
"Control Objectives for Information and Related Technology (COBIT)
Evaluate the concepts and techniques covered by ITIL. Select the concept that you believe to be the most critical for any ...
Liz Final Repaired 3
A Research Project Submitted in Partial Fulfillment of the Requirement for the Award of Diploma in Management (Purchases a...
Oracle Product Life Cycle
Oracle Product Life Cycle Analytics enables organizations to attain insight it a large volume of lifecycle product data fr...
Info Assu.edited
The security policy offers insights into the numerous susceptibilities that act as prospective threats to various applicat...
Related Tags
Book Guides
Death on the Nile
by Agatha Christie
Dracula
by Bram Stoker
A Brief History of Humankind Sapiens
by Yuval Noah Harari
The Fault in Our Stars
by John Green
Dr Jekyll And Mr Hyde
by Robert Louis Stevenson
Alice in Wonderland
by Lewis Carroll
The Calcutta Chromosome
by Amitav Ghosh
Notes from Underground
by Fyodor Dostoyevsky
The Hunger Games
by Suzanne Collins
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
San Diego Mesa College Mod 1 Client Tracker of Ferrante & Dahl Consultants Project
I've attached everything you need to follow and fill is in the uploads. It's very straight forward and if you happened to ...
San Diego Mesa College Mod 1 Client Tracker of Ferrante & Dahl Consultants Project
I've attached everything you need to follow and fill is in the uploads. It's very straight forward and if you happened to have any questions please ask away.
6 pages
Final Copy Cybersecurity Threat Landscape
The Concept of Machine Learning (ML) and Data Analytics ML is a subset of Artificial Intelligence (AI) that uses statistic ...
Final Copy Cybersecurity Threat Landscape
The Concept of Machine Learning (ML) and Data Analytics ML is a subset of Artificial Intelligence (AI) that uses statistical learning algorithms to
IRS PIA Model and Template
Q1. Take a look at both the PIA Handbook from the UK: CIO link above and the IRS PIA Model from above. Currently, the ...
IRS PIA Model and Template
Q1. Take a look at both the PIA Handbook from the UK: CIO link above and the IRS PIA Model from above. Currently, these are a few good examples of what types of generic questions should be part of a Privacy Impact Assessment. The IRS example site has additional examples of PIA documents. Using the links above as a starting place, create a minimum one-page PIA template with generic questions that might be used as a prototype for any type of organization. Include at least two additional sources for PIA information, templates, or guidance.Links:UK:CIO Privacy Impact Assessment(PIA) HandbookIRS PIA ModelRequirement:1 - 2 Pages with Citations in APA Format.
Grand Canyon University Python Collage Looping Arrays Basic Debugging Project
The purpose of this assignment is to use Python to merge several photographic elements into a single photo.Search for and ...
Grand Canyon University Python Collage Looping Arrays Basic Debugging Project
The purpose of this assignment is to use Python to merge several photographic elements into a single photo.Search for and download a photograph of a jackrabbit.Use the web to search and download an image depicting a GCU campus or event.Locate and use your antelope photograph from Topic 1Take a head-to-toe photograph of yourself.Trade the antelope horns with the jackrabbit ears to create 2 possible candidates for a Jackalope.The textbook outlines several ways to manipulate multiple images using Python. Choose one (or more) of these methods and use Python to collage the GCU photo (background), along with the jackrabbit and antelope photos (foreground).Save the resulting (completed) image file.Create an HTML Web document within LopesCloud that displays the collaged image from step 7, and plays the blended WAV document that you created in Topic 5. Add a headline "Mythological Jackalope Discovered!"Submit the following in compressed, zip file format:Your Python program. Naming convention is: firstInitial+lastName+Collage.py. Example: dharalson Collage.pyOriginal antelope, jackrabbit, GCU picture and picture of yourself.2 Jackalope pictures.HTML web page and blended wav file.Screen capture of web page running in browser.Completed collage picture.At least one screen capture demonstrating that your program was functional.Zip file naming convention is: firstInitial+lastName+collage.zip
Week 7 assignment
Congratulations on joining the hacktivist group The Wide Awake Know Nothings (WAKN). Here at WAKN, our goal is to let the ...
Week 7 assignment
Congratulations on joining the hacktivist group The Wide Awake Know Nothings (WAKN). Here at WAKN, our goal is to let the world know that people’s right to free Internet access is being infringed upon by every nation on this planet. This offense must stop right now. Your goal to help WAKN get the message to the world is to find a target and build a misinformation profile on that target that our hacking team can inject onto that targets website. We recommend you read Manipulation Through Mass Media (http://www.slideshare.net/iulia_bilbie/manipulation-through-mass-media) and use the ideas discussed in this paper as a guide to building your misinformation campaign.
Pick a real person, group, business, entity, religious faction, nation, or organization and build a PowerPoint brief discussing how you would go about discrediting your selection. Keep in mind WAKN has access to underground newspapers, public TV, and of course the Internet. Include a 1-page talking paper* with information from your briefing and on the target and the processes you will use to discredit them. Your brief must be convincing, avoid generic blasts such as, “OSHA is horrible because of all their regulations.” This just does not fit with the process of discrediting through misinformation.
This assignment is worth 50 points total, based on content, analytical thought applied, and proper use of formatting, spelling, punctuation, and grammar. Submit both your PowerPoint and talking paper .
*This page provides an example of a Talking Paper: http://www.airforcewriter.com/talking-paper.htm.Read/Review
Libicki, Martin C., Conquest in Cyberspace, Chapter 11
FBI Testimonies Keeping America Safe in the New Age of Terror. Nov 30, 2017. https://www.fbi.gov/news/testimony
ICS-CERT Cyber Threat Source Descriptions: https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions#terror
CIA Director on National Security Interview: Transcripts https://www.csis.org/analysis/discussion-national-security-cia-director-mike-pompeo or Video https://www.youtube.com/watch?v=WKZxGD229cA
Supplemental Reading and Websites
Lohrmann, Dan, “Where Next for Hackers with a Cause,” July 2016, http://www.govtech.com/blogs/lohrmann-on-cybersecurity/understanding-new-hacktivism-where-next-for-hackers-with-a-cause.html
Schaefer, Ben. How Hezbollah Could Transform Cyberterroism. March 2018. http://georgetownsecuritystudiesreview.org/2018/03/11/the-cyber-party-of-god-how-hezbollah-could-transform-cyberterrorism/
Sands, Geneva ABC News: Want to know more about the worldwide hacker group "Anonymous". http://abcnews.go.com/US/worldwide-hacker-group-anonymous/story?id=37761302
Segall, Laurie. Anonymous Says it's hacking Trump.http://money.cnn.com/2016/03/18/technology/trump-hack-anonymous/index.html
Anonymous Official Website (enter and click at own risk) http://anonofficial.com/
Anonymous 2016 message to US Government https://www.youtube.com/watch?v=z2WO8qG1Ywk
Carr, Jeffrey, Inside Cyber Warfare, Chapter 2 (if you have the book)
Earn money selling
your Study Documents