## It 402- 3452

All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism). The Assignment must be submitted in (WORD format only). Use 2 to 4 References and write it in the last page by APA style. I want new words, No plagiarism “Please make it 0% percentage (we want put it the solution with the Cove page🙏)

## Need help with Signal and System Problems

Warning this is not Signal and System problems I don’t know if it’s C language, I am having trouble finding what it falls under.
P571.1, 1.21.3 c, f1.4 a, c, d1.5 a, b, c, d1.6 a1.7 b1.8 a, b, c, d1.21 a, c, e1.22 a, c, g1.231.241.25 a, c, e1.26 a, c, e

1. Create a program named bunnies.java that recursively calculates the total number of rabbit ears. Rabbits are in a line numbered 1, 2, 3, 4, … The even numbered rabbits have 2 ears. The odd numbered rabbits have 3 ears. The exception to both of these rules is that every 5th rabbit has only 1 ear.Create a recursive method (no for or while loops) to calculate the total number of ears named BunnyEars(n). The recursive method should calculate the number of ears on the current rabbit, and call itself with the number of ears on the previous rabbit.BunnyEars(1) = 3 BunnyEars(2) = 5 BunnyEars(3) = 8 BunnyEars(4) = 10 BunnyEars(5) = 11 BunnyEars(6) = 13 BunnyEars(7) = 16 BunnyEars(8) = 18 BunnyEars(9) = 21 BunnyEars(10) = 22
1 2 3 4 5 6 7 8 9 10
| / /| |/| | / /| |/| / |/| | / /| |/| | / /| /
|| || || |||| || || || |||| || |||| || || || |||| || || || ||
||||/ ||/ ||||/ ||/ || ||/ ||||/ ||/ ||||/ ||
/ oo / oo / oo / oo / oo / oo / oo / oo / oo / oo
=_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/= =_ Y_/=

Example output
How many bunnies are in the line? 5
This is a total of 11 ears.

2. Create a program named sum.java that recursively calculates the sum of all the digits in an integer.
Create a recursive method (no for or while loops) named SumDigits(n).

Hint: When you mod an integer by 10, you get the rightmost digit
(169 % 10 is 9). When you divide an integer by 10, you remove the
rightmost digit (169 / 10 = 16).

SumDigits(1) = 1
SumDigits(14) = 5
SumDigits(169) = 16

Example output
The sum of these digits is 16.
3. Write a program named recurse.java that recursively reverses the characters in a String. Create a recursive function named RevString that returns the last character of a string the remainder of the string.

Example output
Please enter a string: video gamer
Your string in reverse: remag oediv

4. Write a program fibonacci.java that recursively calculates the nth Fibonacci number. Prompt the user which Fibonacci number to calculate. Also, calculate the number of method calls and computer time is used for the calculation.

Example output
Which Fibonacci number would you like to calculate? 42

This Fibonacci number = 267914296
Number of method calls made = 866988873
Seconds used for this calculation = 4.292174803
Extra Credit: Write a more efficient algorithm for calculating Fibonacci numbers. Compare the two.

## It 402- 9627

All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism). The Assignment must be submitted in (WORD format only). Use 2 to 4 References and write it in the last page by APA style. I want new words, No plagiarism “Please make it 0% percentage (we want put it the solution with the Cove page🙏)

## Multithreaded version of Monte Carlo

Each thread will count the number of points that occur within the circle and store that result in a global variable. When these threads have exited, the parent thread will calculate and output the estimated value of π. You can reference fig4-23.c in the source code on how to use Pthread.

## kd search

i have most of the code and the most important details i only need to form and write the full code and make it running to solve the search for the nearest point to an input in 16 dimension
the idea is
the user inter a point
the program first deside in which diminishing is going to search ( it is 16 dim )
then will do the kd search for the nearest point to this entry
if you know c programing and has an idea about kd tree search you can help in this project when i give you my note for the code, the main idea here is the 16 dimension rather than regular 3 or 2 in regular kd
i need the code to run in right answer

## Write 2 blogs for Cybersecurity

write two blog posts on any cybersecurity topics of your choice. Each blog post should be 10 sentences minimum.
For inspiration, review the following cyber blogs (but do not copy directly from these or other blogs):https://www.troyhunt.com/
https://www.lastwatchdog.com/
https://krebsonsecurity.com/

You can select any topic to write about from any of the domains that we have covered, including the following:GRC, networking, network security, cloud, cryptography

Here are some possible ideas that you could use for blog topics:Ransomware: Should organizations pay or not?
Who should have the final say on product security decisions, the business or the security department?
Are humans really the weakest link in security?
How could quantum computing affect cybersecurity?
Should organizations try to utilize open source security software?

YOU ARE FREE TO CHOOSE ANY TOPIC RELATED TO CYBERSECURITY

## ppt on variables , arrays ,sequence data and few more topics

QUESTIONS
5.2Explain the difference between a literal and a variable.
5.4Retrieve and set values in variables.
5.5Create string data containing tabs, newlines, and other special characters.
5.6Combine string data using concatenation and interpolation.
6.2 Create a new instance of .NET Class Library classes to call methods that maintain state.
6.4 Use docs.microsoft.com to research what a method does, its overloaded versions, its return value type, its input parameters, and what each parameter represents.
7.1 Describe the most widely used branching statements and provide use cases for each.
8.1 Explain the difference between arrays and collections.
8.6 Iterate through sequences of data using the for each statement.
8.7 Sort and manipulate sequences of data.
Create Examples For each of the topics you created in Step 1, create at least one realistic and unique example of code (created by you) that demonstrates the concepts described in the accompanying learning objectives for that topic.
Create a PowerPoint Create a PowerPoint presentation that will aid you in explaining each of the topics you created Step 1. Your PowerPoint presentation should include:
A title slide with your name(s) and student ID number(s).
An introduction slide that introduces your audience to the topics you created in Step 1 that will be discussing.
At least one slide for each of the topics you created in Step 1. Each topic should include a written description of the topic (sentence or point-form) and the accompanying example you created in Step 3.
A conclusion slide that summarizes the topics you discussed.
Include a reference slide that cites all of your sources in the format described on the Cambrian Library website — not citing your sources breaks Cambrian’s Academic Integrity Policy.You can use the following document as an example of how to properly format your sources:https://teaching.cambriancollege.ca/wp-content/upl…

## need explain the code (function, how it run)

there 3 codes in zip file. when you open it you read the file “main.c” only the other file you don’t have read or do anything.
the LAB1 exercise2 each like code it has the appendix like (// Start the delay counter at 25,000 or // Count down until the delay counter reaches 0) please doing same thing for lab1 exercise3 and exercise4.
then create three flow chart for three exercise ( I have an example how to to it you can review and try it).
to understand the function of three code you can read the lab1 instruction

## project for banking bot

Thesis Outline
Thesis Outline
You may not use everything in this guide, but you should use most of it. Contact me if you have a doubt.
Title Page
Abstract
Table of Tables (if you have one)
Chapter One: The Problem
oProblem Backup
oPurpose of the Study
oResearch Question
oNull Hypothesis
oPrimary Alternative/Research Hypothesis
oLimitations and Delimitations
oDefinitions
oImportance of the Study
Chapter Two: Review of the Literature
oLiterature Review
oDeficiencies in the Current Body of Academic Literature
Chapter Three: Methodology
oResearch Design
oSelection of the Subjects
oPopulation
oSample
oData Collection Methods and Procedures
oInstrumentation
oMethodological Assumptions, Limitations, and Delimitations
Chapter Four: Results (How the Results will be Handled)
Chapter Five: Discussion, Conclusion, and Recommendations
oThe Correlations
oLimitations
oImplications
Tables
References