Online Shopping Cart
Step 1: Build the ItemToPurchase class with the following specifications:
Attributes
item_name (string)
item_price (float)
item_quantity (int)
Default constructor
Initializes item’s name = “none”, item’s price = 0, item’s quantity = 0
Method
print_item_cost()
Example of print_item_cost() output:
Bottled Water 10 @ $1 = $10
Step 2: In the main section of your code, prompt the user for two items and create two objects of the ItemToPurchase class.
Example:
Item 1
Enter the item name:
Chocolate Chips
Enter the item price:
3
Enter the item quantity:
1
Item 2
Enter the item name:
Bottled Water
Enter the item price:
1
Enter the item quantity:
10
Step 3: Add the costs of the two items together and output the total cost.
Example:
TOTAL COST
Chocolate Chips 1 @ $3 = $3
Bottled Water 10 @ $1 = $10
Total: $13
Your program submission materials must include your source code and screenshots of the application executing the code and the results.
Please make sure you follow the submmition guid and there is a file in the attachment that shows how the submmiton file should look like.
Category: Computer science
-
“Building an Online Shopping Cart in Java”
-
“Script for Incident Response: Automating the Process for Efficient Resolution” Title: Script for Incident Response: Automating the Process for Efficient Resolution Script: “Automated Incident Response Script” Link: https://github.com/rapid7/automated
Find a script related to incident response. Describe the script and how it can be used for incident response. Include a link to the script
-
“Database Homework Assignments: Minimal Keys to Transactions”
you pretty much have to do all the homework assignments from chapter “minimal keys” till the end. it’s on a website for school so you don’t really have to write anything. It’s just assignments (questions) you have to answer correctly. I’ll provide the writer with the login to the website where the questions are when a suitable writer is found. sharing my info in this case is not really that big of a deal since there are only questions on the website and the results of those questions. the link to the website is: https://infinity.few.vu.nl/databases/ for now, please make sure the writer finishes all the exercises until chapter “Transactions” since that has to be finished before midnight today. When that is done, i would like for the writer to continue to do the exercises until the end. Shouldn’t be that much. for that, the deadline is next week sunday. For now, the deadline is today before midnight for all the exercises until chapter “transactions”
-
Title: “Maximizing Efficiency and Collaboration with Integrated Enterprise Systems” Slide 7: – Title: “What are Integrated Enterprise Systems?” – Summary: This slide should provide a brief overview of what integrated enterprise systems are, such as software
Course Title: Integrated Enterprise Systems
need some help with presentation (3 slides ) already have the slides and information ,need help with summarize and how to present them.
file attached slid numbers 7,8,9 -
“TechWorx ReSale Risk Assessment Plan: Evaluating Threats and Prioritizing Risks for Enhanced Security” Title: “Risk Assessment Plan for Data Center Assets and Activities”
Project Part 2: Risk Assessment
Scenario
You are an IT security analyst working for TechWorx ReSale, Inc. a fictitious IT organization headquartered in Chicago, Illinois, and is a subsidiary of Techworx.
TechWorx ReSale primarily refurbishes old IT equipment and resales it for a profit. TechWorx ReSale has over 777 employees throughout the organization and generates $77 million USD in annual revenue. The company has two additional locations in Lawton, Oklahoma, and Augusta, Maine which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.
Company Products
TechWorx ReSale has two main products: RExchange and RPay,
RExchange is the primary source of revenue for the company. This system is where customers can shop, request, and order equipment.
RPay is a web portal used by the company’s RExchange customers to support the management of secure payments and billing. The RPay web portal, hosted at TechWorx ReSale production sites, accepts various forms of payments and interacts with credit card processing organizations.
TechWorx ReSale customers, which are individuals and commercial organizations, connect to all three of the company’s products using HTTPS connections. All customers can make payments and update their profiles using Internet-accessible HTTPS websites. No government customers and no customers from the EU or California.
Information Technology Infrastructure Overview
TechWorx ReSale operates in three production data centers that provide high availability across the company’s products. The data centers host about 500 production servers, and TechWorx ReSale maintains 1100 corporate laptops and company-issued mobile devices for its employees.
Results from recent audit and inspection:
Consider using the National Vulnerability database and/or the MITRE CVE database to assist you. (also, see pages 50-51 in your textbook)
There has not been a recent Threat assessment, but leadership is concerned with all categories of threats.
Management Request
Senior management at TechWorx ReSale has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.
Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.
The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined
Project Part 2: Risk Assessment Plan
After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan.
TechWorks Resale operates a specialty system called the Repo. The system costs $1500, research has shown these systems fail once every 3 years, the administrators are paid $100/hr and it will take two (2) administrators 2 hours to replace one of these systems. Four (4) employees use this system, and they make $50hr. These employees are completely unproductive while the system is down. Assume the exposure factor for this system is 100%.
A recent audit report identified that many servers were running MS SMB v1.0 which, as you know, is susceptible to MS17-010 Eternalblue. Additionally, they are running They are running Apache HTTP Server 2.4.49. For this part of the project:
Review risk assessment approaches. (see week 5’s discussion for ideas). You may add sections to your report, but please ensure you include:the introduction (step 2)
Scope/Boundaries (step 3)
Risk Assessment results (step 4)
A priority list of Risks (step 5)
Summary/Conclusions (step 7)
Write an introduction to the plan explaining its purpose and importance. This is focused on the risk assessment not a repeat of the Risk management plan’s introduction.
Define the scope and boundaries for the risk assessment.Identify data center assets and activities to be assessed.
Complete a risk assessment using both qualitative and quantitative methods for a total of 4. You will come up with one risk on your own. The three other risks you must develop are based on a threat exploiting these three vulnerabilities: They are running Apache HTTP Server 2.4.49
The Repo (This is a quantitative risk based on the background information. Calculate the Annual Loss Expectancy (ALE) of the specialty server described in the background. Show your work. Identify ARO, SLE, and ALE in your calculations.
The SMBv1 vulnerability (Eternal Blue) You will have three qualitative risks. Use Tables 5-1 and 5-2 for probability and impact. You may come up with your own probability and impact scales, but please explain. Prioritize the four risks after completing the risk assessment. In other words, what is the order of the risks that we must deal with first to last?
Summary/Conclusions.
Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used. -
Title: “Pursuing My Passion: My Motivation for Applying to the Computer Science MSc Honours Program”
Please explain why you are applying for this course. It is important you include information about your motivation to study this course, what you feel you can contribute to the course and how it relates to your career aspirations. https://www.mdx.ac.uk/courses/postgraduate/computer-science-msc-honours/
I will also write something in our chat to help with you, I just want to get the order in now. -
Title: The Role of Number Theory in Cryptography: Exploring the History, Applications, and Real-Life Use of RSA Algorithm and Congruence in Encryption and Decryption Processes
1.In detail discuss the history, applications, impact, and real-life use of number theory in cryptography.[10mks]
. With relevant examples explain how the RSA algorithm works.[10mks]
) With relevant examples, explain how the concept of congruence’s is used in enciphering and deciphering processes of cryptography
10mks] -
The Reliability of AI Content: A Critical Analysis Introduction Artificial Intelligence (AI) has become an integral part of our daily lives, from virtual assistants to personalized recommendations. With the increasing use of AI, it is important to examine the
Discuss the reliability of the AI content provided for each search in the attached file. Use reliable and recent sources to back up your discussions. Each discussion of reliability should be 275 words. Please use two in text citations for each discussion. Please let me know if there is any confusion.
-
“Team Sports Game: 2 vs 2 Soccer/Basketball” # Team Sports Game: 2 vs 2 Soccer/Basketball # Import necessary libraries import random # Define a function to generate random team names def
I want you to write me a code where you create a game for four players, 2 vs 2. You can create any game, but I would prefer it to be either soccer or basketball. Please, if possible, thank you. But it needs to be the most simplest game, and I need one team to win. But, as I said, I need the game to be very simple because I just started coding. So, please, make it very simple and easy. Also, if possible, please use one of these sites to create the code: colab, replit, or Wing. thank you so much
-
“Analyzing the Effects of Social Media on Mental Health”
HelloI need help with my assignments you can check the file for the information and instructions please I don’t want copied ans