Description
I need some correction in final step printing the last part. For some reason the middle part of the program does not apply in the end...
int main(){
int year, month, days;
cout << "Enter month (1-12): ";
cin >> month;
cout << "Enter year (1990-): ";
cin >> year;
static int t[] = {0, 3, 2, 5, 0, 3, 5, 1, 4, 6, 2, 4};
int y = year - (month < 3);
int dayOfWeek = (y + y/4 - y/100 + y/400 + t[month-1] + 1) % 7;
switch(month){
case 1: cout << "January "; break; case 2: cout << "February "; break; case 3: cout << "March "; break; case 4: cout << "April "; break;
case 5: cout << "May "; break; case 6: cout << "June "; break; case 7: cout << "July "; break; case 8: cout << "August "; break;
case 9: cout << "September "; break; case 10: cout << "October "; break; case 11: cout << "November "; break; case 12: cout << "December ";
cout << month << endl;
}
cout << year << endl;
cout << "Mon Tue Wed Thu Fri Sat Sun" << endl;
if(month > 0 && month < 13){
while(month > 0){
}
}
else{
cout << "Error." << endl;
}
}
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I was looking for! Super helpful.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
King Fahd Petroleum and Minerals Quantitative Risk Assessment Question
Under
what circumstances might it be more beneficial for an organization to
utilize a quantitative risk assessment pro ...
King Fahd Petroleum and Minerals Quantitative Risk Assessment Question
Under
what circumstances might it be more beneficial for an organization to
utilize a quantitative risk assessment process? What are the pros and
cons associated with quantitative risk assessment programs?
University of Cumberlands Organizational Leaders Human Resources Director Report
Your project is a two-part The first portion is a response to a series of questions from organizational leaders. To ...
University of Cumberlands Organizational Leaders Human Resources Director Report
Your project is a two-part The first portion is a response to a series of questions from organizational leaders. To determine and justify the appropriate cloud-service. The second part of the assignment
Contoso Corp has decided to make the decision to move some department information systems to the cloud. Below are the conversations with the department leaders. Prepare a written response for each of the department leader. Your response must also include justification of your solution based on research.
PART I
Human Resources Director
Our HR platform is proprietary, resides in our datacenter server, and we want to continue using it. We would like to continue to the use the system as it is in the Cloud. The company that supports the product explain that they must have remote access to the Windows Server to make updates.
CIO
Since the organization has decided to shift to the cloud, I thought this would be a great opportunity to address user login security. We had a successful attack in which attackers were able to brute force a password and login in from Australia. We do not conduct business outside of the US and would like a cloud-based service that can notify or even block a user from logging in overseas.
Legal Department Director
Since we are a federal entity, we must ensure that our chosen service provider complies with the protection of federal information. What cloud service provider can you recommend and how do we know that they offer compliance with US government protection standards?
PART II
Review the attached service level agreement (SLA) and address the following points.
Outline the purpose of an SLA
After examining the attached SLA discuss any missing elements and be sure to support your assertion with research
Discuss at least two additional SLA considerations that Contoso should make based on the solution you selected in Part I
3D Printing
3D Printing Stage 1 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned rea ...
3D Printing
3D Printing Stage 1 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned readings, particularly those assigned in Weeks 1 and 2 of the class.Read the “3D Printing Case Study." The Case Study presents Mark's 3D printing business and explains how he wants to expand his operation with more IT infrastructure and additional employees.He has asked you to help him better understand what he currently has and what he will need to create the business he envisions.You realize that although he already has several hardware and network components in use, he really does not have any idea how to expand into a larger operation.You decide to begin with what he has, what his requirements are, and what components he will need to meet his requirements. Assignment: Using the Case Study and course materials, your task is to write a paper to Mark that includes the following: Background – briefly describe the business to be supported by the new infrastructure.Current IT infrastructure – List the hardware, software, and network components that Mark currently has in place (not what he wants to add with his "Expansion Plan").Note that you may need to make some assumptions about the components based on what is provided in the Case Study.Requirements - List five requirements Mark has identified that the systems will have to perform or support as he expands his business.These can be "business" needs or part of the 3D printing operation.How requirements will be met - Briefly explain to Mark what system components will be needed to meet each of the five requirements listed above.These may be components he already has or new components to be added.Data representation and storage - Finally, Mark needs to store and use several types of data:digital and numerical, audio, video and graphics data.Explain to him how each of these types of data are represented in digital form, how they are stored, and on which device(s) (either in place or something he needs to add) each type of data will be stored.Include each of the following:Digital and numerical dataAudio dataVideo dataGraphics data References: Incorporate at least two resources correctly; one reference should be from the course materials and one reference should be external.An external resource is a resource other than those provided in the class or textbook.Incorporate properly formatted APA citations in the text of your document for each reference used.Then, place an APA style reference page at the end of your document. Formatting: For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and ours. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed. Write a short concise paper, 2-3 single spaced pages in length. Use at least two resources with APA formatted citation and reference.Use at least one external reference and one from the course content. Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.Submit your paper as a Microsoft Word document, or a document that can be read in Word.Your submission should include your last name firstin the filename: Lastname_firstname_Stage_1 GRADING RUBRIC: The "right" and "wrong" answers have to do with whether or not you correctly incorporated the course vocabulary and concepts from the textbook to support your choices and have addressed all parts of the assignment.
Colorado State University Data Recovery Plan Discussion
In this assignment, you assume the role of a forensic investigator of the DigiFirm Investigation Company. The company has ...
Colorado State University Data Recovery Plan Discussion
In this assignment, you assume the role of a forensic investigator of the DigiFirm Investigation Company. The company has been asked to recover blueprint files from a hard disk that a disgruntled employee reformatted. The computer is an ordinary laptop that was running Windows, and no backup is available.
You can use a few built-in tools to recover deleted files from a Windows operating system (OS). However, there are also third-party tools that might be helpful. Before beginning any data recovery endeavor, it is a good idea to research your options and plan your approach.
Deliverable:
For this assignment, you are to:
? Locate two third-party tools that will assist you in the data recovery. Write a professional report that includes a data recovery plan outline, listing the steps to be performed and the Windows and third-party tools to be used in recovering the data in the order of their importance.
HC Risk Management & Empowering an Organization Discussion
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With ...
HC Risk Management & Empowering an Organization Discussion
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization's goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:Introduction - What is an ERM?Why Should an Organization Implement an ERM Application?What are some Key Challenges and Solutions to Implementing an ERM?What is Important for an Effective ERM?Discuss at least one real organization that has been effective with implementing an ERM framework/application.Conclusion – Final thoughts/future research/recommendationThe paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:Be approximately seven to ten pages in length, not including the required cover page and reference page.Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.Reference:IT Governance and IT Risk Management Practices"Vincent, N. E., Higgs, J. L., & Pinsker, R. E. (2017). IT Governance and the Maturity of IT Risk Management Practices. Journal of Information Systems, 31(1), 59–77. https://doi.org/10.2308/isys-51365Etges, A. P. B. da S., Grenon, V., Lu, M., Cardoso, R. B., de Souza, J. S., Kliemann Neto, F. J., & Felix, E. A. (2018). Development of an enterprise risk inventory for healthcare. BMC Health Services Research, 18(1), N.PAG. https://doi.org/10.1186/s12913-018-3400-7
4 pages
Strengths And Weaknesses Of Rc4
Rivest Cipher 4 (RC4), stream cipher, was designed by Ron Rivest in 1987. The stream cipher is designed with byte-oriented ...
Strengths And Weaknesses Of Rc4
Rivest Cipher 4 (RC4), stream cipher, was designed by Ron Rivest in 1987. The stream cipher is designed with byte-oriented operations for RSA ...
Similar Content
Security Architeture and Design: Article Paper Review
Read the following article on Scalable Methods for Conducting Cyber Threat Hunt Operations. Write a 3-page paper, make sur...
CUNY Lehman College Common Protocols and Applications Discussion
A hacker attacks a network in different ways, using common protocols and applications. A proxy server can protect the iden...
How to create 3D model in 3D Max?
How to create 3D model in 3D Max? Brief description, don't need long explaining...
University of Central Missouri Entergy New Orleans Case Discussion
Need research on online and search for information about companies that have been harmed or bankrupted by a disaster. Choo...
BST, 2-3-4 trees
this homework is due October 31, at 11:00 p.m. so you have 4 days to finish it. I can’t send the lecture video, it’s n...
Factoring Function
http://ultra.pr.erau.edu/~jaffem/classes/cs125/hom...This is the assignment, please use simple code as possible....
Wireshark And Glasswire Comparison
GlassWire is a security tool and also a free network monitor that contains a built-in firewall. Wireshark is a network pro...
Wageman And Donnerfelds Model Of Conflictmanagement
Team redesign is a deliberate change in the various aspects of the team. It involves specific structural changes that infl...
Risk Assesment.23304784
In this assignment, you will perform a qualitative risk assessment, using a template that has been provided below. Your la...
Related Tags
Book Guides
The Secret Life of Bees
by Sue Monk Kidd
The Age of Innocence
by Edith Wharton
The Knife of Never Letting Go
by Patrick Ness
Night
by Elie Wiesel
The Second Sex
by Simone de Beauvoir
Girl in Translation
by Jean Kwok
Little Fires Everywhere
by Celeste Ng
A Wrinkle as Time
by Madeleine L'Engle
Breakfast at Tiffanys
by Truman Capote
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
King Fahd Petroleum and Minerals Quantitative Risk Assessment Question
Under
what circumstances might it be more beneficial for an organization to
utilize a quantitative risk assessment pro ...
King Fahd Petroleum and Minerals Quantitative Risk Assessment Question
Under
what circumstances might it be more beneficial for an organization to
utilize a quantitative risk assessment process? What are the pros and
cons associated with quantitative risk assessment programs?
University of Cumberlands Organizational Leaders Human Resources Director Report
Your project is a two-part The first portion is a response to a series of questions from organizational leaders. To ...
University of Cumberlands Organizational Leaders Human Resources Director Report
Your project is a two-part The first portion is a response to a series of questions from organizational leaders. To determine and justify the appropriate cloud-service. The second part of the assignment
Contoso Corp has decided to make the decision to move some department information systems to the cloud. Below are the conversations with the department leaders. Prepare a written response for each of the department leader. Your response must also include justification of your solution based on research.
PART I
Human Resources Director
Our HR platform is proprietary, resides in our datacenter server, and we want to continue using it. We would like to continue to the use the system as it is in the Cloud. The company that supports the product explain that they must have remote access to the Windows Server to make updates.
CIO
Since the organization has decided to shift to the cloud, I thought this would be a great opportunity to address user login security. We had a successful attack in which attackers were able to brute force a password and login in from Australia. We do not conduct business outside of the US and would like a cloud-based service that can notify or even block a user from logging in overseas.
Legal Department Director
Since we are a federal entity, we must ensure that our chosen service provider complies with the protection of federal information. What cloud service provider can you recommend and how do we know that they offer compliance with US government protection standards?
PART II
Review the attached service level agreement (SLA) and address the following points.
Outline the purpose of an SLA
After examining the attached SLA discuss any missing elements and be sure to support your assertion with research
Discuss at least two additional SLA considerations that Contoso should make based on the solution you selected in Part I
3D Printing
3D Printing Stage 1 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned rea ...
3D Printing
3D Printing Stage 1 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned readings, particularly those assigned in Weeks 1 and 2 of the class.Read the “3D Printing Case Study." The Case Study presents Mark's 3D printing business and explains how he wants to expand his operation with more IT infrastructure and additional employees.He has asked you to help him better understand what he currently has and what he will need to create the business he envisions.You realize that although he already has several hardware and network components in use, he really does not have any idea how to expand into a larger operation.You decide to begin with what he has, what his requirements are, and what components he will need to meet his requirements. Assignment: Using the Case Study and course materials, your task is to write a paper to Mark that includes the following: Background – briefly describe the business to be supported by the new infrastructure.Current IT infrastructure – List the hardware, software, and network components that Mark currently has in place (not what he wants to add with his "Expansion Plan").Note that you may need to make some assumptions about the components based on what is provided in the Case Study.Requirements - List five requirements Mark has identified that the systems will have to perform or support as he expands his business.These can be "business" needs or part of the 3D printing operation.How requirements will be met - Briefly explain to Mark what system components will be needed to meet each of the five requirements listed above.These may be components he already has or new components to be added.Data representation and storage - Finally, Mark needs to store and use several types of data:digital and numerical, audio, video and graphics data.Explain to him how each of these types of data are represented in digital form, how they are stored, and on which device(s) (either in place or something he needs to add) each type of data will be stored.Include each of the following:Digital and numerical dataAudio dataVideo dataGraphics data References: Incorporate at least two resources correctly; one reference should be from the course materials and one reference should be external.An external resource is a resource other than those provided in the class or textbook.Incorporate properly formatted APA citations in the text of your document for each reference used.Then, place an APA style reference page at the end of your document. Formatting: For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and ours. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed. Write a short concise paper, 2-3 single spaced pages in length. Use at least two resources with APA formatted citation and reference.Use at least one external reference and one from the course content. Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.Submit your paper as a Microsoft Word document, or a document that can be read in Word.Your submission should include your last name firstin the filename: Lastname_firstname_Stage_1 GRADING RUBRIC: The "right" and "wrong" answers have to do with whether or not you correctly incorporated the course vocabulary and concepts from the textbook to support your choices and have addressed all parts of the assignment.
Colorado State University Data Recovery Plan Discussion
In this assignment, you assume the role of a forensic investigator of the DigiFirm Investigation Company. The company has ...
Colorado State University Data Recovery Plan Discussion
In this assignment, you assume the role of a forensic investigator of the DigiFirm Investigation Company. The company has been asked to recover blueprint files from a hard disk that a disgruntled employee reformatted. The computer is an ordinary laptop that was running Windows, and no backup is available.
You can use a few built-in tools to recover deleted files from a Windows operating system (OS). However, there are also third-party tools that might be helpful. Before beginning any data recovery endeavor, it is a good idea to research your options and plan your approach.
Deliverable:
For this assignment, you are to:
? Locate two third-party tools that will assist you in the data recovery. Write a professional report that includes a data recovery plan outline, listing the steps to be performed and the Windows and third-party tools to be used in recovering the data in the order of their importance.
HC Risk Management & Empowering an Organization Discussion
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With ...
HC Risk Management & Empowering an Organization Discussion
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization's goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:Introduction - What is an ERM?Why Should an Organization Implement an ERM Application?What are some Key Challenges and Solutions to Implementing an ERM?What is Important for an Effective ERM?Discuss at least one real organization that has been effective with implementing an ERM framework/application.Conclusion – Final thoughts/future research/recommendationThe paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:Be approximately seven to ten pages in length, not including the required cover page and reference page.Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.Reference:IT Governance and IT Risk Management Practices"Vincent, N. E., Higgs, J. L., & Pinsker, R. E. (2017). IT Governance and the Maturity of IT Risk Management Practices. Journal of Information Systems, 31(1), 59–77. https://doi.org/10.2308/isys-51365Etges, A. P. B. da S., Grenon, V., Lu, M., Cardoso, R. B., de Souza, J. S., Kliemann Neto, F. J., & Felix, E. A. (2018). Development of an enterprise risk inventory for healthcare. BMC Health Services Research, 18(1), N.PAG. https://doi.org/10.1186/s12913-018-3400-7
4 pages
Strengths And Weaknesses Of Rc4
Rivest Cipher 4 (RC4), stream cipher, was designed by Ron Rivest in 1987. The stream cipher is designed with byte-oriented ...
Strengths And Weaknesses Of Rc4
Rivest Cipher 4 (RC4), stream cipher, was designed by Ron Rivest in 1987. The stream cipher is designed with byte-oriented operations for RSA ...
Earn money selling
your Study Documents