Select one of the programming languages from the list below. Research the origins of the language. How has it changed over the years? What historical computer scientists have been involved in its evolution. What are important features that promoted its use? What types of applications has it been used for? Would you use it today? If so, for what types of software applications? If not, why not?
Ada
BASIC
C
C++
C#
COBOL
Fortran
Java
JavaScript
Lisp
Objective C
Pascal
PHP
Python
Smalltalk
Submit a 5-8 page paper of 12 point sans-serif font in single space with 1 inch margins. No title page or table of content. Use APA format for in-text-citations and reference list. For APA style guide, please visit:
https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
This is not a copy and paste paper. Any work that is not in your own words must be properly cited. You may not have more that 15% content that is not in your own words. Your submission will be screened by TurnItIn which detects and reports content sources.
Plagiarism will result in a grade of 0 for this paper.
Author: admin
-
The Evolution and Impact of C++: From its Origins to Modern Applications
-
“Designing and Developing Algorithmic Solutions using Data Structures: A Project Report”
1. Objectives
The main objective of this project is to get familiar with designing and developing an algorithmic problem solution using data structures concepts.
2. Introduction
On this project each group of students will solve a problem to assess their understanding of data structure. Students will work in groups of 2-3 students then collect their work in one report to be submitted with the other project materials.
3. Required work
Choose an algorithmic problem related to the concepts of data structures (one that has been covered in class) and write a problem statement on it.
Examples of projects topics:
Problem Name
Suggested Data Structure
Train Schedule Manager
Student Course Scheduler
Social Network Connections
Shopping Cart
Flight Reservation System
Shortest Path Finder
Music Streaming Playlist
Doubly Link list
2D- Array
Graph
Singly Link list
2D-Array
Graph
Circular Link list
Select one of the projects Name in the table above. It is also possible to suggest new project (must be approved by course instructor). Understand the problem. Implement at least two solutions of the problem using data structures.
You must use at least one data structure in your solution. Analysis the Algorithm complexity of your solutions 4. What to submit?
Project Report Source Code Describe the Problem. Describe the Algorithm used to solve the problem. Analysis the Algorithm complexity of your solutions.
Write the program in Java code to solve the problem. -
Part I: Components of Due Process in Criminal Procedure Due process in criminal procedure refers to the set of legal protections and procedures that are guaranteed to individuals accused of a crime. These protections are designed to ensure that the accused receives a fair trial and
Part I
This segment of the discussion asks you to examine due process. The Due Process Clause is a guarantee of basic fairness. Fairness has many components to it. Here, please thoroughly discuss each of the following:
What are the various components of due process in criminal procedure? In your response, include some examples of procedural protections that are afforded to individuals in a criminal case.
What is meant by “Fundamental Fairness”?
Part II
Please read the following fictional case scenario below. You will be using these facts over the next several weeks. The case heading and type of case is listed below.
PEOPLE OF THE STATE OF TEXAS, Plaintiff
VS.
Scott Mayo, Defendant
TYPE OF CASE-Criminal
SUMMARY OF FACTS
Scott Mayo worked as a bartender at The Local Watering Hole. One night at work, Scott got into an argument with Basil Scowen. Mayo owed Scowen $1500.00. The argument heated up and afterwards, Scowen picked up a beer bottle threateningly and appeared to be intoxicated, Mayo grabbed a pistol kept behind the bar and fired at Scowen, killing him. Mayo says Scowen told him, “I am going to kill you,” and what he believed was imminent danger from Scowen.
Mayo was placed under arrest. He was not read his rights. He was transported to the local county jail. The prosecution witnesses are the police officer, who came to the scene and took statements from Mayo, and a frequent bar customer, Dawn Dietz, who witnessed some of what happened. The defense witnesses are the defendant, Mayo, and Joe “the fireman”, who was outside and saw some of the action through the window while sitting on the patio.
Based on the facts provided to you, if you are the prosecutor, with what crimes will you charge Mayo, using your own state law? Please discuss why in your response, providing a detailed analysis of how you reach your decision on the charge(s). -
“The Power of Effective Communication in the Workplace”
instructions are listed in the uploaded file, as long as content is met the length of the essay does not matter.
-
Title: Understanding the Uniform Commercial Code (U.C.C.): A Comprehensive Discussion of its History, Importance, and Key Provisions
1. U.C.C.- Discuss
Tell me what the U.C.C is
a. discuss the history of the U.C.C.
b. Tell me why article 2 id your favorite article in the U.C.C., discuss article 2
c. Take on section of article 2 and discuss what that section of law regulates
OR
d. otherwise fill the 3 pages with any info about the U.C.C. -
Title: The Impact of Gender Stereotypes in Advertising on Consumer Societies
Word count: 2500 words. NB: You MUST adhere to the word limit – failure to do so will result in penalties.
Due date: 3 June 2024.
As outlined in the instructions for the essay proposal, this research paper involves building a complex understanding of a particular aspect of gender, media and/or consumer societies covered in the unit.
Your research will essay plan will have been articulated in your research essay proposal. You should make sure you incorporate your tutor’s feedback as you develop your research essay.
You should not be using the same case studies or debates as in your previous assignments and you will be penalised if you do so.
The key point here is RESEARCH: The research essay itself will be marked on the level of research you have undertaken and the ways in which you use it help make a persuasive argument. Your argument must be clearly articulated and supported by evidence from primary and secondary sources.
Set course readings, as well as those discussed in lectures, can be drawn upon to help build your argument but your emphasis should be on finding relevant secondary material – academic journal articles, book chapters, and books – to put in dialogue with the primary material that you are analysing.
You may use any referencing style as long as it consistent. All material from sources must be appropriately referenced. If you are unsure about referencing practices, please consult the following: https://www.sydney.edu.au/students/writing/referencing.html.
Please double space your essays and use a 12 pt font. -
“Exploring the Intersection of Society, Technology, and Ethics in Science Fiction Films: A Structuralist and Philosophical Analysis”
Through an analysis informed by the perspectives of “The
Structuralists: from Marx to Levi-Strauss” and “The Philosophy of
Science Fiction Film,” explore how these films illuminate the
relationship between societal structures, technological development, and the ethical
considerations of such development. -
“Exploring the Impact of Social Media on Mental Health: A Critical Analysis of Current Research and Perspectives”
please no AI CHATGPT OR Plagiarism used to complete this assignment it needs to be 1500-1700 words
I have attached the instructions and the list of readings you have to chose from -
“Creating an Effective Presentation: From Planning to Delivery”
Making a presentation part C The content for Part C will be sent from Part A and Part name of student and D first page
-
Title: The Ethical Dilemma of Medical Devices and Electronic Health Records: Risks and Solutions In today’s world, technology plays a crucial role in the healthcare industry, especially with the increasing use of electronic health records (EHRs
Read the following IT ethical dilemma:
Medical devices that are controlled by computer software—from heart monitors and pacemakers to mammogram and X-ray machines—are new targets for computer viruses and malware.* This could put patients at risk, although no injuries or deaths have been reported so far. A recent survey reveals some interesting facts:
The global market for medical device technologies is expected to exceed $674 billion by 2022.
Connected medical devices, also called Internet of Medical Things (IoMT), are becoming a key part of healthcare infrastructure, with the average hospital room containing nearly 15–20 of them.
The number of IoMT devices in a hospital can be more than twice the number of traditional networked devices, such as laptops and smartphones.
18 percent of providers reported that their medical devices were affected by malware or ransomware.
The U.S. Food and Drug Administration (FDA) is warning the manufacturers of medical devices about the problem and is requesting them to review the parts of their security plans that are related to these devices when they seek approval from the government agency. In October 2016, Johnson & Johnson warned patients that use its insulin pumps to exercise caution, as it had learned of a security vulnerability that a hacker could exploit to overdose diabetic patients with insulin, although the risk is low.
A Department of Veterans Affairs (VA) report has shown that 327 devices at VA hospitals have been infected by malware since 2009. In January 2010, a VA catheterization laboratory was temporarily closed due to infected computer equipment that is used to open blocked arteries. And in a case at a private Boston Hospital, computer viruses exposed sensitive patient data by sending it to outside servers. The increased applications of electronic record systems as a part of the 2009 stimulus package is adding to this risk.
In addition to privacy issues, hackers can change patients’ medical records and treatment plans. If the system does not have a strong login access, some patients can access a system and alter their own medications, such as those taking narcotic substances. Hackers could use Shodan, a search engine for locating Internet-connected devices, using terms such as “radiology” and “X-ray.”
Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. And there needs to be close coordination between the manufacturers and healthcare providers to further enhance security. Also, hospitals and medical facilities must make sure that all the software running these devices is up-to-date and any updates have been installed. Finally, these devices must be blocked from Internet access.
Using the materials learned in the course, write a five-paragraph essay (between 300 and 1,000 words) that answer the following questions:
What are the risks related to using electronic health records in hospitals and medical facilities?
What are three pieces of advice for reducing the risk associated with using these devices?