Prelab Assignment Lab 5

In: Computers and Technology

Submitted By afrocdm
Words 471
Pages 2
ITCS 1212L

PreLab 5

Rational and equality operators, logical operators, conditional operators, conditional structures, selective structures, typecasting, and working with debuggers.

Learning Objectives:
● Practice more with if-else-if and switch statements.
● Understand the concept of scope
● Understand the difference between static, local and global variables
● Practice with functions that can return more than a value and whose parameters’ scopes are not local to the function
● Input validation

These pre-labs are directly related to the lab activities. You don’t need to complete the program. What you need to do is to work on the logic and perhaps some key parts of each program and then complete them in the lab.

Assigned: Date of your lab 4
Due: the night before lab 5

Questions Prelab activity for Lab 5A:
Find the difference between two types of returning values.
Implement the following function prototypes (which take hours of work as integer and the rate of pay as float and calculates the net-payment as float) on paper. Also, write a main function which calls both functions. Compare the calculated net values and show the proper message whether or not they match. Name your variables as hours, rate, and netPay.

float calNetPay(int, float); void calNetPay2(float&, int, float);

Also, answer the following questions:
What does the operator & do? Create a table and put all of the variables of the program inside the first column. The second column should show the scope of each variable. For example for calNetpay2 function if you called the integer variables hours, its scope will be the function calNetPay2.

Prelab activity for Lab 5B:

Create a flowchart showing the following scenario: 1. Present the user with a list of options, 1-3 with proper message as indicated below.
2. Get the user’s choice.
3. If it is one,…...

Similar Documents

Lab 5

...Lab #5 Assessment Questions & Answers 1. What is the purpose of the address resolution protocol (ARP)? * ARP converts IP addresses to Ethernet addresses.. 2. What is the purpose of the dynamic host control protocol (DHCP)? * Dynamic Host Configuration Protocol (DHCP) is a method for assigning Internet Protocol (IP) addresses permanently or temporarily to individual computers in an organization's network. 3. What was the DHCP allocated source IP host address for the “Student” VM and Target VM? * 172.30.0.4 - Student VM * 172.30.0.8 – Target VM 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? * Source: 172.30.0.2 * Target: 172.30.0.8 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? * Yes, 8 packets. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? * The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as reliability. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet? * 8. During the instructor’s Telnet session to LAN Switch 1 and LAN Switch 2, what was the captured......

Words: 342 - Pages: 2

Lab 5

...reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script 4. Based on the tests you performed in this lab, which Web application attack is more likely to extract privacy data elements out of a database? 5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases? Well coordinated and regularly audited security checks is the best way forward. 6. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits? 7. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? 8. What is the purpose of setting the DVWA security level to low before beginning the remaining lab steps? 9. As an ethical hacker, once you’ve determined that a database is injectable, what should you do with that inf...

Words: 296 - Pages: 2

Lab#5

...testing procedures fail to examine all possibilities or legitimate behavior permits unauthorized activity. Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Always consider that even legitimate traffic can be used in illegitimate ways, and sometimes, legitimate traffic can appear illegitimate. Protected services can be attacked from the inside or accessed externally through loopholes in firewall rules. Vulnerabilities may remain unidentified by intrusion detection system (IDS) or intrusion prevention system (IPS) signatures and evade detection. Monitoring helps you capture pieces of the puzzle that creates a timeline of events. Think on the following lines to answer this assignment: * How do you obtain a baseline of system or network behavior? * What is an anomaly in relation to baseline behavior? * Why might certain anomalies be worth investigating? * How can traffic have patterns that signify known attacks? * What do log files help you learn that filtering systems overlook? * Why can legitimate traffic sometimes seem suspicious? Policy violations and security breaches take many forms, and not all of them are obvious. You might have a policy that specifies a certain minimum password length but fails to enforce proper complexity allowing passwords to be easily guessed. Given the following list of end-user policy violations and security breaches, select three breaches and......

Words: 477 - Pages: 2

Lab 5

...Lab 5.1 The Condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True | Lab 5.2 The Condition | Expected Output | If tmobileAverage > 800 AND verizonAverage> 800 ThenDisplay “Both have average downloadrates over 800”ElseDisplay “One or both of the averagesare less”End If | Both average download Rates over 800 | If sprintAverage == 800 ThenDisplay “Sprints download rate is 800”End If | No display | If attAverage >= 1300 OR tmobileAverage>=900Display “Select either carrier”End If | Select either carrier | Lab 5.3 Main Module() //Declare variables on the next 3 lines Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “ //Make Module calls and pass necessary variables on the next 4 lines Call getScore(testScore) Call employCat(testScore, category) Call interviewPoss(testScore, interview) Call displayInfo(testScore, category, interview) End Main Module getScore(Integer Ref testScore) //Ask user to test score Display “Please enter test score” Input testScore End Module Module employCat(Integer testScore, String ref category) //Determine what employment category they are in based on their test score //Similar to if the score is less than 60, then category is “No” //Otherwise, if score is less than 70, then category is “Maybe” //…and so on if testScore => 85 then Set...

Words: 288 - Pages: 2

Lab 5

...it will give you more information that all of the scans. It includes every port UDP and TCP. Plus you can enable different switches like operating system detection. This is an intrusive scan, so I guess if you where enumerating and trying to find out information about the network, you would use this. • Intense Scan – This is like the comprehensive scan. The intense scan is slow but not as slow as comprehensive. You can still run switches like operating system detection and version detection. 4. How many different tests (i.e., scripts) did your "Intense Scan" definition perform? List them all after reviewing the scan report. • It loaded 36 scripts, but I only saw a few performed. APR scan, SYN Stealth Scan, Service Scan, OS detection 5. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. • ARP Ping Scan scanned to look for the machine • SYN Stealth Scan - Scans to see if the ports are open by sending a SYN packet if a packet is sent back, the port is open. If the port is closed, you would receive a different response. • Service Scan – Scans what services are available. • Detects operating system details 6. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) find on the network? • It found 256 IP Addreses. 7. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you perform on the VSCL target machines?...

Words: 424 - Pages: 2

Lab 5

...must be overcome depends on the normal force as and the normal force is given by . When the surface becomes an inclined plane, the normal force changes and when the normal force changes, so does the friction. In this lab, you will change the angle of an inclined plane and observe how weight is resolved into its components (Fn and F//) using the basic trig functions. Procedure: Play with the Sims  Motion  The Ramp • Be sure to stay in the part of the simulation. More features will be used later when we investigate energy. Start by playing with the cabinet some. • Move the cabinet up and down the ramp by dragging it with your mouse. • Move the ramp to an angle of zero (horizontal) and draw a free body diagram of the cabinet here: 1. On a horizontal plane, the normal force is Perpendicular to the weight. 2. The cabinet has a mass of 100kg. It therefore has a normal force of -100 N and a friction force (on the horizontal plane) of ___2.22___ μ = 0.30 • the ramp and draw a free body diagram of the cabinet in the box here: 3. The force down the plane and normal force are components of Force Diagrams. 4. Before we add an applied force on the ramp, there is a force of Gravity that acts against the force down the plane( Force parallel). 5. When we apply a force to get the cabinet moving, the friction force acts in the Opposite direction as movement of the cabinet. 6. Slowly increase angle (0.1 degrees at a time) of the ramp until the cabinet starts to......

Words: 666 - Pages: 3

Ntc 324 Week 5 Individual Assignment with Labs

...Week 5 Individual Assignment With Labs http://homeworkyahoo.com/downloads/ntc-324-week-5-individual-assignment-labs/ To Buy this tutorial Copy & paste above link in your Brower NTC 324 Week 5 Individual Assignment With Labs NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab Challenges, independent student reading, and research. Complete MOAC Lab 16,......

Words: 432 - Pages: 2

Ntc 324 Week 5 Individual Assignment with Labs

...NTC 324 Week 5 Individual Assignment With Labs http://hwguiders.com/downloads/ntc-324-week-5-individual-assignment-labs NTC 324 Week 5 Individual Assignment With Labs NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab Challenges, independent student reading, and research. Complete MOAC Lab 16, “Creating Group Policy Objects.” ID: 74010_16......

Words: 421 - Pages: 2

Ntc 324 Week 5 Individual Assignment with Labs

...Week 5 Individual Assignment With Labs http://homeworkfy.com/downloads/ntc-324-week-5-individual-assignment-with-labs/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab......

Words: 444 - Pages: 2

Ntc 324 Week 5 Individual Assignment with Labs

...NTC 324 Week 5 Individual Assignment With Labs http://hwguiders.com/downloads/ntc-324-week-5-individual-assignment-labs NTC 324 Week 5 Individual Assignment With Labs NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab Challenges, independent student reading, and research. Complete MOAC Lab 16, “Creating Group Policy Objects.” ID: 74010_16......

Words: 421 - Pages: 2

Ntc 324 Week 5 Individual Assignment with Labs

...NTC 324 Week 5 Individual Assignment With Labs http://homeworklance.com/downloads/ntc-324-week-5-individual-assignment-with-labs/ NTC 324 Week 5 Individual Assignment With Labs NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the Microsoft® Official Academic Course (MOAC) Lab Challenges, independent student reading, and research. Complete MOAC Lab 16, “Creating Group Policy Objects.” ID:......

Words: 422 - Pages: 2

Lab 5

...Name: Date: Instructor’s Name: Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6 |Acid |Pure Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |12 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use for each test, based on industry standards......

Words: 696 - Pages: 3

Ntc 324 Week 5 Individual Assignment with Labs

...NTC 324 Week 5 Individual Assignment With Labs To Buy this tutorial Copy & paste below link in your Brower http://homeworkregency.com/downloads/ntc-324-week-5-individual-assignment-with-labs/ Or Visit Our Website Visit : http://www.homeworkregency.com Email Us : homeworkregency@gmail.com NTC 324 Week 5 Individual Assignment With Labs NTC 324 Week 5 Individual Assignment Assignment Preparation: Activities include completing the assigned reading, independent student reading, and research. Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment. Ch. 16, “Creating Group Policy Objects,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 17, “Configuring Security Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 Ch. 18, “Configuring Application Restriction Policies,” of Exam 70-410 Installing and Configuring Windows Server® 2012 When justifying your choice, you may point out the sections of the book that carry the specific content or you may point out why the other answers are not the best answer (process of elimination). NTC 324 Week 5 Individual Assignment Lab Challenge Assignment Preparation: Activities include completing the Microsoft® Official Academic Course (MOAC) Labs, completing the......

Words: 447 - Pages: 2

Lab 5

... c.s. * Prepared slide of mature lily anther (pollen grains), c.s. * Mature pollen * Glass slide * Coverslip * Compound microscope * 0.5% sucrose, in dropping bottle * Prepared slide of lily ovary, c.s megaspore mother cell * Compound microscope * Bean fruits * Soaked bean seeds * Iodine solution(I2KI), in a dropping bottle * Herbarium mount of Capsella, with fruits Procedure: Refer to Biology lab manual, lab 5- pages 3-7. Results: Questions: 1. Gymnosperms | Angiosperms | | | a.cones | flowers | c.Bare, not enclosed; found on scales, leaves or as cones. | Enclosed inside an ovary, usually in a fruit. | b. seed | Endosperm | 2. Pollination is the act of transferring pollen from the male part of a flower to the female part of a flower. Fertilization occurs when the male gamete of any sexually reproducing organism combines with a female gamete to form a zygote. 3. A. receptacle B. c.ovary D. filament E. stigma 4. It is a monocotyledon. 5. A. anther pollen tetrad B. pollen sacs...

Words: 362 - Pages: 2

Lab Assignment

...Lab Assignment No. 5 Topic: Inheritance Instructions: Write a program called bookstore.cpp that can read information of book, CDMusic, and DVDMovie from keyboard and then display all the information by its type: book, CDMusic, and DVDMovie. Specifications: Create a base class called Publication. The Publication class contains two member data: * title as an array of characters * price as float It also contains two member functions: * GetData() reads title and price from the keyboard. * DisplayData() displays title and price. Create a derived class called Book. The Book class is derived from Publication class. It contains the page_number as an integer. It also contains two member functions: * GetData() reads the page number from the keyboard. * DisplayData() displays the page number. Create a derived class called CDMusic. The CDMusic class is derived from Publication class. It contains the playing time as float type. It also contains two member functions: * GetData() reads the length of playing time in minutes from the keyboard. * DisplayData() displays the length of playing time in minutes. Create a derived class called DVDMovie. The DVDMovie class is derived from Publication class. It contains the rating as an array of characters. It also contains two member functions: * GetData() reads the rating type from the keyboard. * DisplayData() displays the rating type. In the main routine, the program will...

Words: 430 - Pages: 2