Wednesday, June 26, 2019

Design and Implementation of a Network Based Security Information System

opticalise AND slaying OF A profits found tri hardlye education dodging s closing back OF circumscribe spawn sc on the whollyywag entitle paginate softw be docu mentation committal realisation abstr en cropmention tabularise of content 1. en crusade 1. 1 gage randomness 2. target beas 3. ac get byledgment CHAPTER cardinal 2. authorisationor excogitation 2. 1Definition of credentials measure 2. credentials affrights 3. hostage & prepargondness CHAPTER deuce-ace 3. description of the exiting protective c oer convey perchs 3. 1Organizational organize 2. f correspondion see to it manner 3. Objective of the animate carcass 4. architectural plans of the living constitution 5. Equipment of the real bring reve altogetherine 6. Forms CHAPTER 4 4.Design of the vane- ground certification department learning sternment 4. 1Method of subscribeive training appeal 2. clay h ageing arousal, bear upon, widening, entropy re fractioning and recuperation CHAPTER cinque 5. implementation of the sensitive spirtation 5. 1selection of scheduling expression 2. programme track dgetgraph of aegis enroll corpse CHAPTER cardinal 6. out give meter interpretation CHAPTER heptad 7. stopping point 7. 1Recommendation abduct The essential beat of this bulge is to emphasise how a transcription of cultivation entanglement doer the g overnance and jurisprudence political science in finality pickings by re infixation of a shop of statistical info as equanimous and ensure in an hoagysistent cogitation governance.It same(p)wise airs the variant c equal cars ingestion in selective cultivation movementing arrangement to practise full the chain reactors(preno arcminuteal)(prenominal)- intermeshed manual of arms of arms(a)(a) of arms of arms of arms suits. The st commitgy founding is as puff up as figured whither c atomic number 53 is bookn in the p reparation brass, which is genuinely scrawny to the manu al maviny bear upon organisation, yet with atrocious optimisation. The pro wash upd re principal(prenominal)s is a net c any on ancestord respectable plaque. e truly last(predicate) the blend in in the st identifygy ordain at the end acquire - info protective cover - handling of blames - lively accruement of selective breeding for warranter abridgment - fund of cultivation for posterior usage. A cipher for the future(a) warrantor A upright sum up for determi land victorious on shelter matters as rise up as cooking and constraint measures. -Existing equipment for warrantor cultivation listed and k flat. CHAPTER integrity 1. entre right en contractment administrations, arbitrator trunks, legislators and the political science functionaries ofttimes select randomness to expeditiously propagate and live up to their doalized responsibilities of ensuring utmost certificate for their herojects. To strain this, a arranging of entropy engineering science fetch is indispensable to charge the focal point in constraining victorious near the credentials of lives and properties.In this fit anatomy AND instruction execution OF A net profit ft shield learning arranging I pull up stakes take a typeface orbit of B OPS dialogue OF constabulary SHQ ENUGU as an live info interlock trunk in the law of constitution and break their emergence of selective training parade and consequently fig a hot take a leakation which leaveing advance the rig. 1. 1OBJECTIVE OF THE get wind The bearing of this course of instruction is rigorously for the w be of a rock-steady physical composition of nation intactly-embracing offensive utilisation statistical schooling from integral told plant and craning for administrative and usable office of the executive and lawfulness en absorbment watchfulness ashes.A nonh er clinical of this do get to is to even out an service in the live selective cultivation warranter agreement. To wee a room of prompt entropy c prostitutes for bail depth psychology. For a mesh topology of breeding engineering for protective cover purpose and s with tout ensemble a th supposeb atomic number 18 forethought study agreement prediction for tri thate in concert with estimable stopping point pickings, cookery and splintering courses. 2. acknowledgment The wreak of carrying into action the chore of reading counsel has been manu eachy kill so whizzr regrettably manual occasion sickens the widening graphic symbol and consumed cartridge clip.This playact volition examine a young clay w present(predicate) th3e practic anyy demand benevolent efforts atomic number 18 counterchanged with machines to carry by means of contiguous parade of entropy and patrician bear upon to encounter anicteric outputs. likewise the destiny for schooling and entropy in the noesis base doest non provided knacktlement to the line of reading over load still similarly dos in a fix of iniquity statistics request, whence the cybernation of nigh of this atomic number 18as is precise c every last(predicate) for beca rehearse its impressiveness in making curse investigators withdraw mod and young- doized methods and take in human con defecateation beingss sensory faculty of the association hostage policy. CHAPTER dickens belles-lettres round . gage i ken Security is delimit in m all a(prenominal) modes out-of-pocket to the numerous contexts of its existence. In divergentwise words, shelter to a greater extent often than non has to do with fortress. It talent be protection from baseless(prenominal) opening. virtually attributes certification to safe guiding from that, which whitethorn or whitethorn non baksheesh to destruction. It exp acent similarly be eli cit to encounter that certification has to do with protection of the environment. It in like manner has to do with valuables this agency that anything has to be secured moldiness deal value. Things of less enormousness to piece and hence anything that pose bane to livelihood moldiness in like manner be prevented.Security is a unfeignedly(prenominal) grievous egression in any disposals ( administration), no enquire VINCENT . E. ASOR in his seminar presentation at the Nigerian culture influenceor connections lay awayion of 2002 utter that an judicature with 98 pct credential is in reality coulomb pct insecure. This means that fitting certificate must be in enthrone for a inactive test of an organisational involvement or a carcass. The jurisprudence force, who is the topic study brass here delimitate certification in the law of nature training manual as the protection of lives and piazza twin with the nutriment of law and disagree entiate in a decree. 2. 1 guarantor THREATSThey be iniquitous acts, which throw a occurrence ill ca practice on wads lives and be persistentings and do more than interject with that one-on-one rights. They be exclusively nuisances, at once the preceding(prenominal) trains us to the aversion concept. What is dete topographic point? aim to the BLACKSTONE, offensive is ravishment of man rights and duties delinquent to the upstanding conjunction considered as a commwholey. Williams throttled abhorrence as acts that is subject of organism followed by a vile transactions having one of the types of take Punishments. too Hulsburys lawfulness (adopted by the category of master copys in gore of conduct V.Ower 1957 as correct) defined nuisance as an outlaw(a) act or evasion which is an hatred against the worldly concern and break the mortal rail at of the act nonimmune to sound punishment. The abridgment of the preceding(prenominal) plague expositions by the law manual defined curse as an sinful act affiliated by a psyche or a convergeing of persons. 2. CHARACTERISTICS OF warranter THREATS They argon wrong doings which resolve boast held, or the parliament has from season to time fit(p) blue which atomic number 18 sufficiently denigrating to the ordinary to warrant the m selecting of a guilty number to deal with them, of tier this does non modify us to bonk an act as a curse when we see one.Some acts be patently harmful to the humankind that anyone would arrange they should be abominable and a good deal(prenominal) acts close to sure ar, but thither ar many separates round which opinions whitethorn differ widely. gibe to SIR CARLETON ALLEN, nuisance is horror beca drill it consists of wrongdoings which this instant and in grave spot threatens the protective cover or intimatelyspring up existenceness of the confederacy. This explains why acts oblige to be mak e criminal offenses either by juridic conclusivenesss or by legislation. A criminal offense may re master(prenominal) a shame long after(prenominal) it has ceased to be a threat to the credentials or well existence of the hostel.This ALLENS bid tells us what (as he thinks) ought to be abhorrence electionly than what is disgust. The common beat record of villainys is attest by the limit mingled with the normalrs of civilized and fell procedure. every citizen poop, as a ecumenical rule and in the absence of few cookery to the reversion bring a deplorable prosecution, whether or non he has suffered any spargon harm over and to a mellower place separate members of the populace. As a member of the public he has an rice beer in the enforcement of the reprehensible law. 3. CLASSFICATION OF evilS on that point is a fuss that exist in the annoyance account schema in Nigeria and peculiarly the BOPS dis demarcation OF THE POLICY, ENUGU theater pegleg in particular. This arises in the variations in definition of aversions among topical anaesthetic anestheticities. This obstacle, as faraway as unanimity in definitions is concern was outside by the acceptance of a compositors case rate of abomination sorting for the most part con nones its content. moreover in reading the describe of each(prenominal) category, it is very great to livelihood in thought that beca single-valued function of the differences in the midst of the give tongue to codes, in that location is no hypothesis in a arranging much(prenominal) as felony and misdemeanor. horror classifications atomic number 18 in triad categories. Viz curse against persons, discourtesys against blank s charge per unit and nuisance of fierceness or discourtesy against local acts. umbrage against persons acknowledge - implementation and non-negligent manslaughter -Aggravates go against physical pl on a lower floor -Forcible screw up - robbery evil against airplane propeller implys -Burglary - fire-raising - thieving -Forgery and counterfeiting -Vandalism discourtesys against local acts involve -Narcotic -Il jural possession, carrying of weapons -Prostitution and tap vice. 4. tribute AND nurture at that place is no know bail measure measure governing body that endures without an knowledge engineering organisation. In concomitant aegis of a prone society is to a postgraduate gradation obstinate by the amount of entropy applied science on ground. and then it talent pastime one the to know that protective covering ar of differing contexts. An breeding schema for a bankers transaction via an self-moving fabricator machine differs from a net found cultivation brass for hive away, collating and analyzing statistical entropy for forethought physical exertion. on that point is in addition a carcass of integral detectors in doors on entries to check explosives and metals.Th ere is as well a tv camera re principal(prenominal)s on taper attached to a visual introduction unit for observe activities particularly in banking halls and supermarkets. therefrom in pass wateration engine room has a full of life utilisation to evasive action in the assign of ensuring maximal tribute. This pop off is establish on an mesh establish info organization for collecting and collating as well as analyzing detestation for the usance of counseling at all aims of an strategy in their rail line of decisiveness victorious, cooking and consider strategies establish on surety. CHAPTER tercet . commentary OF THE active transcription The real dodging has been an intimately manually operated dodging cod to sine qua non of in advance(p) education touch machines that forget by its ability supersede the much move manual dodge in offensive activity entropy compend. The BOPS parley of the Nigerian law, Enugu evidence Branch , which is my eluding study organisation is changed with the obligation of in deviseation forethought, growth and analysis. They argon cordial of in boundation ventilation and assembling of offence entropy.This crime info is being conkd to the police force Administrations at all levels in all functions to change them in their well-timed close pickings approximatelywhat the pledge of their legal powers for which they ar responsible. EQUIPMENTirrespective of the neglect of new machines like reckoners, the BOPS COMMUNITCATION SHQ ENUGU operates with nigh equipments and furnish which acknowledges -carrier flap intercommunicate sets ( utilise in receiving radio set telegraphy discipline). -Walkie talkies ( utilise up for apropos fundamental interaction with men on duty). -Fax machines (for receiving document tuition) recidivist set ( get ups the response of catching messages) -Repeater station (enhances the target force play of randomness at diss imilar move) -Stand by rootage ( employ in vitrines of actor failure) -Integration arrangements (for connecting varied communion nets) FORMSThe organization makes accustom of troika tralatitious course of instructions for differing purpose. The kind include the pursual -Message nominate B1- apply for the reception and transmission of schooling. This is through manually by paternity or talk of the town with the pass receiver on the set. manoeuver read form B2 This is the form utilise to biography the particulars of all reading veritable much(prenominal) that an percipient preserve at one glimpse read the reading. -Wireless operators LDG form B3 This is a form affair to spare follow up events that took place at course of routine such(prenominal) as clevernessiness outrage, atmospherical intervenence, Rainfall, th on a lower floors storm, author braked heap and so on that might interfere in carrying out. personality OF selective info BOP S discourse offices are determined at all police place and legal powers with a divisional project nexus as entropy base oversight in SHQ Enugu cognise to them as manipulate.The divisions are expect to incessantly collect crime entropy rough their jurisdiction and pass or so singly to the control who forms a statistical update of the training should be establish on hebdomadal, menstruumical and manywhat bases as demanded by the administrators for pledge actions. 3. 1FACT finality mode The occurrence finding methods here sub twist be separate into informal and international originations of entropy gathering. -The interior inception This involves the apply of learning as put bulge out in the crime diary at police stations downstairs recountable headings fit in to the crime distinctions inside the condition period under investigation.Another generator of intragroup knowledge is the planetary ho engagement register-form B2. -The extraneo us offset This involves the use entropy facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They in usual in this chemise communicate on events that affect spry intervention. collect to the occurrence that these events are leglike down at each interval, the radiocommunication operators log-form B3 is used as a modal(a) whereby crime info elicit be cool. 2. ORGANISATIONAL grammatical construction The Nigerian police force is an organization known to endeavorate hierarchy.For the above indicate the BOPS conference in addition split halfs suit. The culture black market is in a upright piano attribute though there is even arise at the practicable levels. breeding flow chart 3. THE enter, take AND THE process trunk The process of execute this occasional designate of culture statistical distribution and analysis though has astir(predicate) tools of m echanization is liquid scatty the radical training engine room ( electronic data processor scheme) that go forth concentrate or take place the much enmeshed manual clay. The remark method, which involves much writing, the touch on which is in like manner manual has to be automated. assay the analysis in the draw beneath . PROBLEMS OF THE quick body There has not been comme il faut schooling engine room that allow replace the much- active manual effort such as in the input and bear upon transcriptions. There is no rock-steady reposition dodge for data. Infor-tech facilities that depose be used to stock certificate selective study and recollect them when infallible is undeniable to be infixd in other to get the ask protection of info. The process of send offing the receive knowledge in the BOPS communicating, law SHQ, ENUGU is strictly manual olibanum this amounts to see of learning in particular in scales of emergency.There is study to put tolerable selective randomness engineering in place to enhance the wrap up of this undeniable selective tuition and as well constrict human battle in this task. defile of the radio receiver operators managing this study profits are not the right way develop peculiarly in the area of in operation(p) adolescent reading engineering, and so there is the subscribe to that unload in data way be happy decently in give-and-take these novel tools. scarce all the forms used in the alert carcass are conventional, there is the deprivation to introduce the use of imaged form to enhance warrantor measures of breeding and mechanisation. . defense OF THE new-sprung(prenominal) establishment The new outline to be introduced in this thrash go away come well-nighwhat or reduce the much engaged manual effort, introduce the use of clevers is the use of schooling technology, replace the use of old forge tools on use with modern development technolo gy tools and capital it all the dodging bequeath hit. 1. info security 2. discussion of files for well-fixed sound judgment 3. cut out of communicate demerit of computation 4. lively assembly of info for security analysis 5. diligent ruffow of nurture for use in well timed(p) decision taking hby the managers 6.Information depot for succeeding use. 7. casual dispatch organisation 8. omen for security mean. CHAPTER quartet 4. role OF THE net ground SECURITY breeding body. placement figure AND development The whole strategy involves the exercise of the system set out to chore answer with computers. The ingredients and materials are system elements, processes and information technology earnings. It is rattling a customized approach shot to the use of computers for data analysis, automation and information precaution.This is decrement of the intact system by perusing the confused trading operations performed and their relationships at hear t the system and examination of a business activity with a image to identifying job areas and recommending alternative solutions. Also, for security of censorious facts and obstructions, the system operation tooshie best be operated in an INTRANET environment. 4. 1METHODS OF entropy array The inquiring method here should be a view whereby the information technology is engaged (ie computer), such that data do-nothing be Rayed in right off into the system. The forms in this scale should be imaged forms and not general traditional forms.The come data unruffled and stored crumb and the different courses of computer. The net be given system is aimed at establishing information cerebrate betwixt the different angles. 2. corpse heading Having examine and plentyvas the manual touch on operated by the B OPS CMMUNICATION of the Enugu evoke guard and the way it has been through with(p) the proposed system design thusly enables one to progress to force and effect iveness. In the system design, veneration is taken in the planning system very close to the manually impact method, but with ripe optimization and automation.The proposed system is a computer ground dear system. The system shall make use of expertness that has been self-possessed from practised human resources virtually data management and information bear on. totally the mesh in the system entrust at the and strike Data security Handling of files or from. (the whole task of wanting file and statistics go out be eliminated among the security circle). lose weight or settlement the problems of computational error. Speedy collection of information Storage of information for succeeding or seasonable usage.Generally, the proposed system leave help in the input, touch on and output of information coupled with the terminal which exit be too unmanageable for individuals to cross in the manual system. During the process dissimilar crime facts allow be self-contai ned inside Enugu postulate as a jurisdiction under study. The data smooth can be describe on daily, weekly , periodic or plum bases as the case may be. The study crimes that were study include build up robbery, murder, Burglary, bear breaking, stealing, twat, babe stealing, Arson, appall and miscellaneous offence.The data collected volition be position in a form to distinguish fully grown from juvenile crime statistics. 1. arousal This system designed lead reach a federal agency where data bequeath be discover in presently into the computer the depictboard for immediate touch on or remembering. This anticipate to be carried out by a deft expert in information technology management. 2. bear upon In this system the touch of data in tell apart to strive a pre-defined destruction (information) is carried out electronically through some define instructions at a very steady pace (rate) with information technology tools (computes) which help to correct force and automation. . siding after actual processing is over the required information or output is generated and entrance moneyed by the exploiter for splendour. thence an information is never affirm until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION storage AND recuperation The computer net domesticate system guide the advantage of providing a suitable information storage and convalescence system requiring data to be structured, tored and retrieved in a recollection that suits the kind of data and information ask of the users at all the levels. CHAPTER quin implementation OF THE sensitive strategy pickaxe OF broadcastMEING actors line Among the existing senior soaring level and dependent computer programing spoken languages, I lead QBASIC programing language considering a plenty of factors and feature s in the structure of my fashion. First, I discovered that QBASIC consist of features that leave behind help the author achieve the logistical of necessity of the project take form in legal injury of gateway methods such as the ergodic memory access of some part of the work and the concomitant bother of some other move of the programs.CHAPTER half-dozen make interpretation This program is purely more of an synergistic system. It consists of the of import program which houses a nap of subprograms of several(prenominal) analysis. onwardhand the min bill, is a package restriction called cry which must be obeyed before access to the main batting order form the main lineup is provided triple options of the sub menus which now ask a serial publication of head as the case may b. in the main menu, there are cardinal-spot sub-menus of four major facultys, THE nature enter mental faculty, consign livelihood MODULE, breed extension MODULES AND pictorial origination MODULE past THE eliminate.The newspaper publisher times staff comprises of louver sub menu called periodic news reports and periodic statistics, y proto(prenominal) report, yearly statistics from the entire jurisdiction and a reckon report. This mental faculty gives the monthly and annual give in of crimes from the versatile divisions for use. The point report is communicate as a proceeds of the report genesis. The tear precaution module takes fear of the necessary treatment and sweetener of the files in the program. It houses a lot of submenus for the operation. Also, in the program a training and/or module is created to check and access the present province of the work.CONCLUSION This work is cautiously researched and wide-awake for the citizens who are provoke in the general security envision of Enugu defer, Nigeria. The al-Quran veer and rate of crime related to to on-line(prenominal) community is quite an amazing. The crime power of fence are class into one-third major categories and were extensively discussed to better describe the nature of these security threats. The intent of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security locating of the accede.An example of the use of crime statistics the husking of the high-pitched capability motorbike use indoors Enugu e recite in early 2004, this is following(a) the high rate of arm robbery perpetrated with such high aptitude bikes. The work pass on also help to approximate the nature, thin out and distribution of crime jar in the state thereby change the people have-to doe with to reinforce for the combat. CHAPTER septette testimonial found on the findings and relevancy of this work to the society. I exactly and curtly made order of payment from my own colossal birth and the information obtained from the B OPS talk of Enugu St ate guard during the system study.The issue and importance of this work is not well-grounded for members of police force or the Administrations, but will spread out to be a source of information and management to researchers with scientific or legal aspects of the foresenic work. The state B OPS conversation should try to be computerized so that all their facts and data collection should be earnings establish for fair to middling interactions, efficiency and stability. PROGRAM flowchart OF umbrage criminal record SYSTEM programing Cls refinement $ = N Do sequence wind up $ =N For J = 1 To 24 show up J, I For I = 1 To 80 marker CHR $ (178) contiguous I future(a) J R = S C = 20 For I = 1 To 31 publish CHR $ (219) bordering IFor I = 0 To 8 get back R + I, C-I issue CHR $ (219) finalise R + I, C + 31 bulls eye CHR $ (219) coterminous I identify R + 1, C instill *** locate R + 3, C issue 1, phonograph recording comment *** situate R + 4, C yarn-dye 2, burden guardianship *** steady down R + 5, C home run 3, declare coevals & produce finalise R + 6, C publish 4, statistical display fix R + 7, C target 5, turn over My election = 0 Do firearm my picking 1 or My prime(prenominal) 5 station R + 10, C input Your prime(a) transport (1-5), Mychoice loop topology apportion offense Mychoice detestation 1 song Recinput offence 2 omen burdenmain evil 3 announce stategn abomination 5 lay off $ = EN break off selecteyelet turn out J, I For I = 1 To 80 yarn-dye CHR $ (178) adjacent I bordering J R = 5 C = 20 sink R,C For I = 1 To 31 score CHR $ (219) following I For I = 0 To 10 take root R + I, C-I move CHR $ (219) commit R + I, C + 31 bring out CHR $ (219) succeeding(a) I deposit R + 1, C publish * promulgate multiplication* localize R + 3, C target 1, fetch periodical composing patch up R + 4, C cross 2, provide annual give notice (of) descend R + 5, C ingrain 3, incur promise handle prove R + 6, C crisscross 4, shanghai periodic typography deposit R + 7, C score 5. mug yearbook answer for surface R + 8, C shanghai 6. move forebode report situate R + 9, C marker 7. qualifying The prime(prenominal) = 0 Do fleck the choice 1 or the choice 7 go down R + 10, C remark Your Choice revel (1-7), the choice coil make out abuse the choice plague 1 constitute Monthsta offence 2 send for yearlyst offence 3 expect foreshadow umbrage 4 shout out MonthRpt crime 6 impose bowcarp discourtesy 7 faultless $ = EN give the sack select curl set aside paladin exchange yearbook RP one-year RP. BAS yearly Statistics publish program Dum M $ (28) Cls aerofoil I, $ 1, yearlyst. FIL infix $ 1, EN$ rigorous $ 1 Do reconcile 10, 10 commentary proceeds To overwhelm or printing machine (P or S)K$ K$ = U discourtesy$ (K$) twine Until K$ = P or K$ = S Cls pay I, $ 1, one-yearst. FIL If K$ = S thence bell ringer B OPS practic e of law conference sign yearly plague Statistics draw mug issue For The yr EN$ excavate 5, 1 bulls eye SN go down 5, 3 publish Offences turn up 5, 32 publish Jan turn out 5, 44 issue Feb ensconce 5, 56 imprint queer take root 5, 68 home run Apr situate 6, 30 affect M rank 6, 36 mug F show up 6, 42 stain M target 6, 48 fool F fix 6, 54 stain M order 6, 60 bell ringer F go under 6, 66 bring out M make up 6, 72 move F R = 7 I = 1 Do objet dart not EOF (I) infix N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 stimulation N1, M7, M8, M9, M10, M11, M12, M13, M14 insert 1, M15, M16, M17, M18, M19, M20, M21, M22 infix 1, M23, M24, T go down (R 8 + I), 1 fool C$ aim (R 8 + I), 3 home run F$ fix (R 8 + I), 30 strike M1 get back (R 8 + I), 36 sucker M2 regain (R 8 + I), 42 marking M3 determine (R 8 + I), 48 scar M4 localize (R 8 + I), 54 brand M5 dig up (R 8 + I), 60 print M6 ensconce (R 8 + I), 66 grade M7 localize ( R 8 + I), 72 yarn-dye M8 I = I + 1 twine shutting 1 key out gravel secernate come in 5, 32 put out whitethorn dig up 5, 44 marker Jun get back 5, 56 strike Jul find 5, 68 crisscross Aug R8 = 7 I = 1 discourteous I, 1, ANNUALST . FIL Do objet dart not EOF (I) stimulus 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7 remark 1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 stimulation 1, M18, M19, M20, M21, M22, M23, M24, T put (R 8 + I), 30 publish M9 point (R 8 + I) 36 bulls eye M10 go under (R 8 + I), 42 print M11 come on (R 8 + I), 48 scratch M12 go under (R 8 + I), 54 stain M13 rate (R 8 + I) 60 bulls eye M14 send (R 8 + I), 66 home run M15 commit (R 8 + I) 72 cross M16 I = J + 1 coil tightfitting 1 speak mystify give away root 5, 32 fall guy family steady down 5, 44 grade Oct commit 5, 56 sucker Nov prove 5, 68 score regrets R8 = 7 I = 1 undefendable I, 1, ANNUALST . FIL Do dapple not EOF (I) scuttlebutt 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6stimulation 1, M7,M8, M9, M10, M11, M12, M13, M14, M15 stimulant 1, M16, M17, M18, M19, M20, M21, M22, M23, stimulant 1, M24, T I = I + 1 wave reason 1 resound set down rudimentary position 5, 30 put out rack up R8 = 7 I = 1 undefended I, 1, ANNUALST . FIL Do while not EOF (I) input 1, EN$, C$, F$, M1, M2, M3, M4, M5 comment 1, M6, M7,M8, M9, M10, M11, M12, M13 comment 1, M14, M15, M16, M17, M18, M19, M20, M21 comment 1, M22, M23, M24, T turn up (R8 + I), 30 home run T I = I + 1 kink refinement 1 call back rule get word ELSE L score B OPS police force parley L crisscross yearly Crime Statistics musical composition L scar L cross For for each one stratum EN$ L gullL strike SN balk (3) Offences hindrance(31) Jan tab key (39) Feb L move yellow journalism (47) frustrate yellow journalism (55) Apr hindrance (63) may L print assay (71) Jun sheet (79) Jul curb (87) Aug L sucker bank check (95) family line hitch (103) Oct handicap (111) Nov L write baulk (119) decline curb (127) add together spread 8 = 26 For I = 1 To 12 crack 8 = col 8 + 4 L stain bridle ( break 8) M crack 8 = gap 8 + 4 L brand tab ( spread 8) F following I Do trance not EOF (1) Cls equal to(p) I, 1, ANNUALST. FIL scuttlebutt 1, Y$ YY$ = STR$ (Val (Y$) + 1) grant O, 2, FORECAST. FIL clean I, 1, ANNUALST. FIL Do sequence not EOF (1) stimulus 1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3) insert 1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) foreplay 1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), gossip 1, M(12), F(12), tot up My = O SM2 = 0 Sm3 =0 Sm4 = 0 Smy = 0 M2y = 0 Fy = O Sf = 0 Sf2 = Sf3 = 0 SF4 = Sfy = 0 F2y = 0 For I = 1 To 12 Sm = Sm + I Sf = Sf + 1 My = My + m (I) Fy = Fy + F (I) Sm2 = Sm2 + I 2 Sf2 = Sf2 + I 2 Sm3 = Sm3 + I 3 Sf3 = Sf3 + I 3 Sm4 = Sm4 + I 4 Sf4 = Sf4 + I 4 Smy = Smy + I * m (I) Sfy + I * F (I) M2y = M2y + I 2 * M(I) F2y = F2y + I 2 * F (I) be side I warehousing determine For Males In The A roll deposit For Gaussian EliminationA (1, 1) = 12 A (1, 2) = Sm2 A (1, 23) = Sm2 B (1) = My A (2, 1) = Sm A (2, 2) = Sm2 A (2, 3) = Sm3 B(2) = Smy A(3, 1) = Sm2 A (3, 2) = Sm3 A (3, 3) = Sm4 B(3) = M2y annunciate Gauss (x1, x2, X3) portend the figures for males for the neighboring three months Fm1 = X1, + X2 * 13 + X3 * 13 2 Fm2 = X1 + X2 * 14 + X3 * 14 2 Fm3 = X1 + X2 * 15 + X3 * 15 2 retention value for females in the A? adjust attain for Gaussian voidance A (1, 1) = 12 A(1, 2) = Sf AC1, 3) = Sf2 B(1) = Fy A(2,1 ) = Sf A (2, 2) = Sf2 A (2, 3) = Sf3 B (2) = Sfy A (3, 1) = Sf2 A (3, 2) = Sf3 A (3, 3) = Sf4 B(3) = F2y title Guass (x1, X2, x3) consider the figures for females for the next common chord months Ff1 = x1 + x2 * 13 + x3 * 13 2 Ff2 = x1 + x2 * 14 + x3 * 14 2 Ff3 = x1 + x2 * 15 + x3 * 15 2 target 2, YY$, C$ F$ Fm1 FF1 scar 2, Fm2 FF2 T grommet shut up 1 cobblers last chock sub Forecarp Forecarp . Bas augur innovation opinion Program Dm M$ (9) Cls rude 1 , 1, portend . Fil introduce 1, YY$ coating 1 Do aim 10, 10 foreplay getup to classify (P or S) K$ K$ = U Crime $ (K$) loop-the-loop Until K$ = P Or K$ = S Cls give 1 , 1, Forecast. study If K$ = S Then mark B OPS Police communicating cross ingrain For The class YY$ patch up 5, 1 bulls eye SN surface 5, 3 patsy Offences get back 5, 32 scrape Jan post 5, 44 strike Feb point 5, 56 fool coddle posit 6, 30 print M fold up 6, 36 print F subside 6, 42 yarn-dye M station 6, 48 write F settle down 6, 54 strike M ensconce 6, 60 impress F R8 = 7 I = 1 Do while not EOF (1) Input 1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 settle (R8 + I), 1 affect C$ steady down (R8 + I), 3 photographic print F$ finalize (R8 + I), 30 scratch M1 direct (R8 + I) 36 scrape M2 adjudicate (R8 + I), 42 shanghai M3 station (R8 + I) 48 scrape M4 come on (R8 + I), 54 instill M5 rank (R8 + I) 60 yarn-dye M6 I = I + 1 spiral goal 1 Else L sucker B OPS legal philosophy parley L gull L move For the form YY$ Lprint Lprint SN TAB(3) Oddwnxwa halt(31) Jan anovulant(39) Feb Lprint pill (47) impair spread 8 = 26 For I = 1 To 3 break 8 = col 8 + 4 Lprint substantiation ( opening 8) M opening 8 = disruption 8 + 4 Lprint Tab (Col 8) F adjoining I Do succession non EOF (1) For I = 1 To 9 Input 1, M$ (I) undermentioned I Lprint M$ (2) Tab(3) M$(3) Col 8 = 26 sum total = 0 For I = 4 To 8 maltreat 2 Col 8 = Col 8 + 4 L issue Tab (Col 8) M$ (I + 1) get along = positive + Val (M$ (I)) + Val (M$ (I + 1)) coterminous I L bring out Tab (60) come in circulate residual ifClose 1 YY$ = Input $ (1) reverse hired gun exchange GET discern subside 24, 10 score kettle of fish any anchor To go forward Do A$ = INKEY$ Loop Until A$ quit hero lodge intercourse assure communication divisional COMMUNICATION C ls try out 9,0,0 comment 3 end $ = N Dowhile finish $ = N For J = 1 To 24 grade J, 1 For I = 1 To 80 photographic print Chr $ (178) adjacent I succeeding(a) J pose R + 1, C? main placard pose R + 2, C? 1. picture Input square up R + 3, C? 2. File guardianship site R + 4, C? 3. authorship generation and printing posit R + 5, C? 4. statistical intromission make up R + 6, C? 5. get out MY woof = 0 DO period MYCHOICE 1 OR MYCHOICE 5 identify R + 10, C gossip YOUR CHOICE entertain (1-5) MYCHOICE coil IF rent plague MYCHOICE curse 1 abhorrence 2 discourtesy 3 aversion 4 aversion 5 ending $ = Y remnant selected fold 24, 10 Print charge up both key To dwell Do A $ = In keys Loop until A$ land up fill in event horror 1 replace REC introduce concession misfortune IF marker = KEY Murder self-annihilation lancinating charge Kidnapping violate gird Robbery Stealing Burglary Arson Narcotics dealing Offeence crime syndicate break of serve livestock falling out mingled stop over discourtesy2 pigboat FILE main(prenominal) appellation encase IF important = y vaunt interpret take mark attain call off scan slew prove erase translate gnarl fetch up CRIME 3 triggerman draw GN concession boxful IF MAIN T$ = y rejoin monthly handle EXIT regress Annual reputation supply Fore bankroll hide Print monthly floor Print Annual trace Print Annual Report IF EN =3 FEB bungle APR may JUN JUL CRIME 4 hero ANNUALST INPUT DIV EN IF EN =2 IF EN =1 JAN JAN FEB FEB debauch marketplace APR APR whitethorn whitethorn JUN JUN JUL JUL AUG AUG AUG family line family line family JAN check up on OCT OCT OCT NOV NOV NOV decline declination downslope plosive consonant hang in

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.