Description
- Download and complete the problems as described the assignment handout: PS1.pdf
- Source code: f.cpp
- This file provides steps for importing source code into Dev-C++ and Visual C++: Importing Source Code.pdf
- website cant allow me to upload .pp file. so I type txt style.
Unformatted Attachment Preview
Importing Existing Source Code Files
This example shows how to import two existing files (myfile.h and myfile.cpp) into
your compiler. You use these steps to import source code files into your compiler, such as
those provided for the problem sets. Some problem sets may one contain a .cpp file. Note:
our first assignment does not have a .h file, other assignments, especially the final project
may have a .h file along with the .cpp file.
Using Microsoft Visual C++
1. Open Microsoft Visual C++ and create a new empty console application project,
and name the project Problem1a (or a name that you prefer).
2. Delete the Problem1a.cpp file that was created located in the Source Files folder.
Right click on the file and select Remove.
3. Extract the files for the assignment from Zip file and place them in your newly
created project folder.
4. Right click on the Header Files folder located in the left panel. Select Add >
Existing File. Then browse the folders on your computer to select the myfile.h
file. Perform this step an additional time to add the myfile.cpp file to the Source
Files folder.
5. Add the following include at the top of the driver.cpp file:
#include “stdafx.h”
6. Compile and run the program. If your console window closes before you can look
at the output, place the following line before the return statement in the function
main():
cout
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Awesome! Perfect study aid.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Secure Videoconferencing Communications Project
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. ...
Secure Videoconferencing Communications Project
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit. In this project, you will create a proposal for a secure videoconferencing system, which will include an executive summary, briefing/slide presentation, and lab report. The details can be found in the final step of the project. Step 1: Develop Functional Requirements for Videoconferencing The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs. In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements. The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions. Step 2: Discuss Implementation Challenges In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems. Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems. The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors. Step 3: Identify Vendor Risks You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure. This step will be a section of your Proposal for Secure Videoconferencing. Step 4: Develop Best Practices for Secure Videoconferencing The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping. This "best practices" section will be part of the overall Proposal for Secure Videoconferencing. In the next step, you will develop system integrity checks within a virtual lab environment. Step 5: Develop System Integrity Checks As part of the overall proposal, the CISO has asked you to develop system integrity checks for files shared between users of the videoconferencing systems. These checks will ensure file protection and prevent exfiltration of sensitive files. Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study. The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Submit all four components to the assignment folder.
Need help with "Personal Computers and Networks"
determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to ...
Need help with "Personal Computers and Networks"
determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer, and provide an explanation of why you would want such features.
4 pages
Practical Connection From Legal Regulations
Practical Connection from Legal Regulations, Compliance and Investigation in Workplace Practical Connection from Legal Reg ...
Practical Connection From Legal Regulations
Practical Connection from Legal Regulations, Compliance and Investigation in Workplace Practical Connection from Legal Regulations, Compliance, and ...
ISSC481 CTC Week 7 Employee Security Awareness Discussion
The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow AP ...
ISSC481 CTC Week 7 Employee Security Awareness Discussion
The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guideline
Schiller International University Blockchain and Finance Discussion
Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course ...
Schiller International University Blockchain and Finance Discussion
Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.2. Discuss the purpose and problem the article is addressing.3. Elaborate on the content of the article.4. Discuss the findings and conclusion(s) drawn by the article’s author.5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.6. Discuss the significance of the article. Why it is important? On what do you base your assertions?7. Conclude your paper. Summarize the important aspects of the review.8. ReferencesYour paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).Writing Requirements for all Written Work:References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.Always include a cover page and reference page with all submissions (even initial discussion posts)Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sourcesNo abbreviations, no contractions – write formallyWrite in the third person formal voice (no first or second person pronouns)Write more than the minimum requirement of the word count assignedAs always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paperIndent the first line of each new paragraph five spacesRefer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.
Similar Content
University of the Cumberlands Van Buren Vs the United States Discussion
Task1:words:300
Using WORD, write an ORIGINAL brief essay of 300 words or more:
Find a DoS attack that has occurred in ...
University of the Cumberlands Apply Data Analysis & Visualization Discussion
Write a short paper discussing the application of this course (Analyzing and Visualizing Data) to your work environment. A...
I need the answers for all the questions
1. Draw an ERD for the Parrot Palace information system. 2. Indicate cardinality. 3. Identify all fields you plan to inclu...
University of the Cumberlands Hierarchical System and Operational Linkages Discussion
Define the IT organizational structure and how the IT organizational structure impacts culture and change management p...
Harvard University Questions Machine Learning Classifier Questions
Design an experiment to establish that a classifier is high variance.
9.1) Design an experiment to establish that a cla...
Network Design
Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in or...
Vulnerability Assessment Components
Vulnerability assessment refers to the process of conducting a systematic and planned security analysis in the information...
20140926144602project Risk Assessment Assignment
Using your team's ITP WBS, develop and submit a project risk register in MS Excel: A project risk register, from the textb...
Gettysburg Zed Script
Zed commands to Perform the following actions on the Gettysburg #Move th last line to the top of the document...
Related Tags
Book Guides
Anthem
by Ayn Rand
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
Macbeth
by William Shakespeare
Les Miserables
by Victor Hugo
Heart of Darkness
by Joseph Conrad
A Brief History of Humankind Sapiens
by Yuval Noah Harari
The BFG
by Roald Dahl
The Second Sex
by Simone de Beauvoir
Little Women
by Louisa May Alcott
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Secure Videoconferencing Communications Project
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. ...
Secure Videoconferencing Communications Project
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit. In this project, you will create a proposal for a secure videoconferencing system, which will include an executive summary, briefing/slide presentation, and lab report. The details can be found in the final step of the project. Step 1: Develop Functional Requirements for Videoconferencing The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs. In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements. The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions. Step 2: Discuss Implementation Challenges In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems. Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems. The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors. Step 3: Identify Vendor Risks You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure. This step will be a section of your Proposal for Secure Videoconferencing. Step 4: Develop Best Practices for Secure Videoconferencing The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping. This "best practices" section will be part of the overall Proposal for Secure Videoconferencing. In the next step, you will develop system integrity checks within a virtual lab environment. Step 5: Develop System Integrity Checks As part of the overall proposal, the CISO has asked you to develop system integrity checks for files shared between users of the videoconferencing systems. These checks will ensure file protection and prevent exfiltration of sensitive files. Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study. The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Submit all four components to the assignment folder.
Need help with "Personal Computers and Networks"
determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to ...
Need help with "Personal Computers and Networks"
determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer, and provide an explanation of why you would want such features.
4 pages
Practical Connection From Legal Regulations
Practical Connection from Legal Regulations, Compliance and Investigation in Workplace Practical Connection from Legal Reg ...
Practical Connection From Legal Regulations
Practical Connection from Legal Regulations, Compliance and Investigation in Workplace Practical Connection from Legal Regulations, Compliance, and ...
ISSC481 CTC Week 7 Employee Security Awareness Discussion
The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow AP ...
ISSC481 CTC Week 7 Employee Security Awareness Discussion
The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guideline
Schiller International University Blockchain and Finance Discussion
Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course ...
Schiller International University Blockchain and Finance Discussion
Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.2. Discuss the purpose and problem the article is addressing.3. Elaborate on the content of the article.4. Discuss the findings and conclusion(s) drawn by the article’s author.5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.6. Discuss the significance of the article. Why it is important? On what do you base your assertions?7. Conclude your paper. Summarize the important aspects of the review.8. ReferencesYour paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).Writing Requirements for all Written Work:References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.Always include a cover page and reference page with all submissions (even initial discussion posts)Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sourcesNo abbreviations, no contractions – write formallyWrite in the third person formal voice (no first or second person pronouns)Write more than the minimum requirement of the word count assignedAs always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paperIndent the first line of each new paragraph five spacesRefer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.
Earn money selling
your Study Documents