CMGT 554 week 3

Special attention must be concentrated on storage of digital records, such as X-rays, MRIs, CAT-scans, and other large-file-size records.
Analyze in 100-300 words: the storage requirements (size) and future growth and the best storage methods available for these and other records required by the hospital based on accessibility, and the legal requirement to keep the information private. 
Key question listed below:
the information about the Size of Storage (include for future growth)? and What legal requirements do we need to be concerned with?

apa format
references that creditable
no Wiki references of any kind
and proper referencing with in text citation.

General javascript questions

I have the following scripts as examples, but I don’t really understand what they do. If someone could give me a brief explanation that would be great, thankyou. 

   1) countryDropdown.init(true, JSON.parse(‘@Html.Raw(Json.Encode(Model.CountryViewModel.Cities))’));

        $(document).ready(function() {
            initDatepicker.initDay($(‘.input-append.date’), true);
            loadFilterValues.load();
            initSelectPicker.init($(‘select[name=PeopleIds]’), ‘Any Person’);
        });
   
2) 
   
        $(document).ready(function() {
            $(‘.btnDelete’).click(function() {
                $(‘.btnConfirm’).attr(‘href’, $(‘.btnConfirm’).attr(‘href’) ‘?id=’ $(this).data(‘id’));
            });
        });
   
}
3) Also, in some areas I have seen references like ”
   
    ” referenced with no other code, does this actually do anything? Thanks in advance!

IT Project

The smaller firm does not have an IT administrator on staff. As a result of the merger, a new building has been purchased to accommodate the additional employees in the city’s downtown historical district. (See attached floor plans below.)
The building has been included on the city’s register of historic buildings. The building has significant architectural features on the interior that must be maintained in compliance with the city’s historic landmark district and zoning ordinance. As a result, the interior can be updated only to make it structurally sound. All other architectural features must be maintained or restored to the same state as when the building was constructed.
Currently, the employees of the smaller firm are using older model Dell computers (circa 2005) with a Windows XP operating system. They are using a peer to peer network. Their employees are currently using Microsoft Small Office Accounting® Software, Microsoft Works, and Internet Explorer. They use avast!® (free version) for malware
Unit 9 [IT190: Foundations in Information Technology]
protection. Backups are performed by individuals when they feel it is necessary. There is no company standard for backup.
Your company is also in desperate need of hardware updates. Most employees are using older systems with Windows XP. A couple of newer employees are using Windows Vista. You have a client/server network using Windows 2000 server. Your accountants use either Intuit® QuickBooks® or Sage® Peachtree® software. You are currently using Symantec™ Antivirus™ Corporate protection. Your company currently performs full back-ups monthly, differential backups weekly, and incremental backups nightly. These backups are made to an onsite server.
You now need to integrate all of the employees onto a single network. Your boss has requested that you prepare a proposal for integration to present to the city council and the investors. Remember, as well, that as an accounting firm, security is of the utmost importance. The chapter references following each question should give you a good starting point for your research. Your proposal should consider the following:
A. Computers for each employee (Marketing has indicated a preference for Macs due to their graphic capability). Be sure to include the make, model, and price for each computer you recommend. (Chapter 1)
B. Be sure to include the hardware requirements for each model and why you are making the recommendations that you are. You should summarize the key hardware requirements for each computer – for instance, hard drive storage, RAM, CPU information, etc. For each component, be certain to explain why this is an important consideration and how it will benefit your company. (Chapters 2, 6)
C. Application software requirements for each computer (Chapters 3, 4)
a. Accounting software (review what the companies are currently using. What functions do they have? Will you keep one or both of the current options, or choose something new? Why?)
b. Graphic design software (for marketing) – remember, they will be using this for designing such items as the company logo, website, yellow page advertisements along with other marketing materials.
c. Browser – explain why you chose the particular browser (i.e. security, convenience, ease of use, etc…)
d. Security – be certain to discuss the companies’ original security measures. Are they appropriate? Why or why not? Then consider both physical and logical security options for your network.
e. Any additional software you feel will be necessary
D. Operating system recommendations for all computers. (Chapter 5) Explain the reasoning behind your choice. Why did you choose this browser for your particular firm?
Unit 9 [IT190: Foundations in Information Technology]
E. Network operating system recommendation (Chapter 7)
F. Network hardware – you should include anything you think you will need based on your reading from the book and any web research that you have done. (Chapter 7)
G. Backup System – remember that you should consider the location of your backup, and not just the software and schedule. (Chapter 9)
H. Additional devices that employees may require (PDAs, Cell Phones, Printers, Scanners, etc. (TiF – IT Ethics, Chapter 8)
I. Security – how will you secure your system? Remember to include both physical and logical security in your discussion. (Chapter 9)
Remember to give your justification for each of your decisions. Don’t just provide a list of your final recommendations. Assume that your audience has only basic computer knowledge. Also, please be sure to cite your sources! Everything should be summarized in your own words!
Project Format
Your final project may be in one of the following formats. If you would like to make your presentation in a format not listed here, please check with your instructor.
1. PowerPoint Presentation
a. You will prepare a detailed presentation for implementing your plan to the city council and investors.
b. For the presentation you can use PowerPoint and incorporate various tools like Jing screencasts, Authorpoint (where you can narrate the PowerPoint presentation), Videos, Animoto, images, etc.
c. The PowerPoint presentation should be at least 10-15 slides (excluding cover and reference slides)
d. Remember the requirements for a good presentation. Search term: Powerpoint tips
e. Please use the Notes section on your slides in order to fill in any information that you are not including on your slide. You can also include an audio file with your presentation.
f. Please remember to include a slide with references you used in preparing your presentation.
Unit 9 [IT190: Foundations in Information Technology]
2. Video/Audio
a. You may also choose to prepare a video or audio presentation (Podcast)
b. The video/audio presentation should be at least 5 minutes in length and include all the required information
c. The video/audio can be uploaded to YouTube, Vimeo®, Screencast®
d. Provide the link for the video/audio in a word document along with your citations for the presentation
e. Please provide a separate outline and reference page with your submission.
3. Written Paper
a. Finally, you may choose to present this information in the form of a written paper in Microsoft Word
b. The paper should be 3-5 pages in length (excluding title and reference pages) and include all the required information
c. Please include a reference page for your citations

Processing

Question 0 – Integrate Code
This codeTower Physics.zip has blocks with different forces assigned to it.  Make them into statues by using more or them or less to make a form without having them fall from the sky. They must be stable when you run the program. This must be done using arrays.
When the statues are done you must add them into this code. Working_Prototype_v1_1.zip this code has three levels to them You must integrate three different statues in them. This way when the ball touches them they fall over.

Developing a c program to practice arrays and bitwise operators

Read in 10 integers from the command line and store them in int arrayl. This part is
complete in the given starter program.
b. Reverse the order of array elements in int array_1 using swap _ints function. i.e. swap
I’ and 10′
element then 2nd and 9th and so on. (You can call swap_ints function within
a loop)
C.
Get an integer user input and add that number to all elements of the int array1 using
bitwise add function. (You can call bitwise add in a loop).
d.
Get the absolute values of numbers in int array_1 and save them back in the
uint array_1 array using bitwise abs function. Print all numbers within the
uint array_1 in a single line using display_array function.
e.
Get mod 32 of these unsigned integers using bitwise mod 32 function. (Hint: This can
be achieved bitwise by masking the 5 least significant bits in the integer number) and
save them into uint _array2. Print all numbers within the uint array2 in a single line
using display array function.
f.
Get an integer user input in the range of O to 31 and shift left each element of the
uint array2 with that number using bitwise_shift left function. Then print all elements”
of uint array2 using display_array function.
g. For each unsigned integer in uint _array2, in a separate line: print the number, number
of 1′ bits in the resulting binary representation by calling the function count_set_ bits
and print whether the number is even or odd using odd or even function.

Program Design

1. Suppose you are given a string s1, such as “psg”, representing the types of precious metal bars. Each character represents one type of metal bar, for example,‘p’ for platinum bar,‘s’ for silver bar, and ‘g’ for gold bar.
Another string s2 is given representing the bars you have, such as “abc”. Each character in s2 is a type of metal bar you have, for example,‘a’ for aluminum, ‘b’ for “brass”, ‘c’ for “copper”.
Write a program to calculate how many of the metal bars you have in s2 are in s1. Letters are case sensitive, so ‘a’ is considered a different type of metal barfrom‘A’.
Example input/output:
Enter s1: psg
Enter s2: abc
Output: 0

Enter s1: psg
Enter s2: ppbgc
Output: 3
1)Name your program metal.c.
2)Your program should include the following function:
int count(char *s1, char *s2);
The count function expects s1 and s2 to be strings. The function returns the number of characters in s2 are in s1. The count function should use pointer arithmetic (instead of array subscribing). In other words, eliminate the loop index variables and all use of the [] operator in the function.
3)Assume s1 and s2 have no more than 1000 characters.
4)String library functions areNOTallowedfor this program. If you use a string library function, you will not receive the credit for the count function part of the program.
5)To read a line of text, use the read_linefunction (the pointer version) in the lecture notes.

2. Command-line arguments
Modify project 2, problem 2 (validate words) so the word is a command-line argument. A word as a command-line argument is valid if all characters of the word are alphabetic letters and one of the following conditions holds:
1. All letters are capitals, like “UCLA”,
2. All letters are not capitals, like “program”.
Example input/output:
./a.out fall
Output: valid
./a.out 8littlepigs
Output: invalid
./a.out
Output: Incorrect number of arguments. Usage: ./a.out word
./a.out spring fall
Output: Incorrect number of arguments. Usage: ./a.out word
1)Name your program command_word.c.
2)The program should include the following function:
int validate(char *word);
The function expects “word” to point to a string containing the wordto be validated. The function returns 1 if word is valid, and 0 otherwise.The function should use pointer arithmetic (instead of array subscripting). In other words, eliminate the loop index variables and all use of the [] operator in the function.
3)The program shouldalsocheck if the correct number of arguments are entered on the command line. If an incorrect number of arguments are entered, the program should display a message.
4)The main function displays the output.

Programming discussion

It has to be using this language. Not integration of another language in this problem please.
http://processing.org
I would like to have someone who could do the work fast and efficiently and by giving me feedback as the work is being done. If it is done in a timely fashion I have three more assignment I will need help with . Thank you 

*Please give me feedback as the questions are answered one after the other please so I can comment them before my deadline.
Question 0 – Integrate Code
This code Tower Physics.zip has blocks with different forces assigned to it.  Make them into statues by using more or them or less to make a form without having them fall from the sky. They must be stable when you run the program. This must be done using arrays.
When the statues are done you must add them into this code. Working_Prototype_v1_1 2.zip this code has three levels to them You must integrate three different statues in them. This way when the ball touches them they fall over.

creating functions in c using bitwise operators

Read in 10 integers from the command line and store them in int arrayl. This part is
complete in the given starter program.
b. Reverse the order of array elements in int array_1 using swap _ints function. i.e. swap
I’ and 10′
element then 2nd and 9th and so on. (You can call swap_ints function within
a loop)
C.
Get an integer user input and add that number to all elements of the int array1 using
bitwise add function. (You can call bitwise add in a loop).
d.
Get the absolute values of numbers in int array_1 and save them back in the
uint array_1 array using bitwise abs function. Print all numbers within the
uint array_1 in a single line using display_array function.
e.
Get mod 32 of these unsigned integers using bitwise mod 32 function. (Hint: This can
be achieved bitwise by masking the 5 least significant bits in the integer number) and
save them into uint _array2. Print all numbers within the uint array2 in a single line
using display array function.
f.
Get an integer user input in the range of O to 31 and shift left each element of the
uint array2 with that number using bitwise_shift left function. Then print all elements”
of uint array2 using display_array function.
g. For each unsigned integer in uint _array2, in a separate line: print the number, number
of 1′ bits in the resulting binary representation by calling the function count_set_ bits
and print whether the number is even or odd using odd or even function.