SlideShare a Scribd company logo
1 of 13
COMP 2103X1 Assignment 2
Due Thursday, January 26 by 7:00 PM
General information about assignments (important!):
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/General-
info.html
Information on passing in assignments:
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/Pass-in-
info.html
Information on coding style:
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/C-
coding-style-notes
[1] A filter program is a program which reads its input from
“standard input” (“stdin”) and writes
its output to “standard output” (“stdout”). Filter programs are
useful because they make it easy
to combine the functions they provide to solve more complex
problems using the standard shell
facilities. Filter programs are also nice to write, because the
programmer doesn’t have to worry
about writing code to open and close files, nor does the
programmer have to worry about dealing
with related error conditions. In some respects, filter programs
are truly “win-win”.
Write a filter program which uses getchar() to read in characters
from stdin, continuing until
end of file (read the man page and/or textbook to see the details
on getchar(), or, heaven forbid,
review the class slides). Your program must count the number
of occurrences of each character in
the input. After having read all of the input, it outputs a table
similar to the one below which, for
each character seen at least once, lists the total number of times
that character was seen as well as
its relative frequency (expressed as a percentage). Note that the
characters n, r, t, 0, a, b,
f, and v (see man ascii) must be displayed with the appropriate
“escape sequence”. Ordinary
printable characters must be output as themselves. Non-
printable characters (see man isprint)
must be printed with their three-digit octal code (see man
printf).
You can get input into a filter program (a2p1 in this case) in
three ways:
(a) “pipe” data from another program into it, like
$ echo blah blah | a2p1
(b) “redirect” the contents of a file into the program, like
$ a2p1 < some-file
(c) type at the keyboard, and (eventually) type ^D (control-d) at
the beginning of a line to
signify end of file.
Your output must look like the following, for this sample case:
$ echo ^Aboo | a2p1
Char Count Frequency
--------------------------
001 1 20.00%
n 1 20.00%
b 1 20.00%
o 2 40.00%
Note: in the above examples, and from now on in this course’s
assignments, text in red is text that
the human types, and a “$" at the beginning of a line like that
represents the shell prompt.
1
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/General-
info.html
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/Pass-in-
info.html
http://cs.acadiau.ca/~jdiamond/comp2103/assignments/C-
coding-style-notes
Note that I entered a ^A (control-a, not the circumflex character
followed by the capital A) by
typing ^V^A. The ^V tells your shell that you want it to
interpret the next character literally, rather
than to use any special meaning (during command line entry)
that the next character might normally
have. (Question: what does your shell do, when typing in a
command line, if you type ^A without
first entering ^V? Try it and see if you can figure it out. You
might find it useful to know this, and
to know what ^E and ^W do as well.)
You should run your program on a few different inputs to
demonstrate to the marker that you have
thought about (and programmed for!) the different cases that
could occur. If you redirect input
from a data file, rather than using “cat” to display the contents
of your file when creating your
transcript file, use a command like $ od -bc test-data-1 .
[2] The printf() function in C is very powerful and convenient,
but it takes some getting used to.
This question will give you experience with this function.
When you are testing functions like printf() which produce
formatted output, sometimes you
want to make sure that the spaces in the output are the ones you
expect. To make it obvious where
all the white space came from, it is often convenient to enclose
a format specification inside a pair
of characters that are not otherwise used in that output. For
example, if you use something like
printf("|%f|n", x)
then you will know whether the %f format specification
produced any spaces before the newline.
The constant M_PI, an approximation to the value of � , is
defined in the system include file math.h.
Write a program which prints out the value of M_PI using each
of the following specifications, one
specification per line of output:
(a) fixed point notation, field width of 9, 5 digits of precision,
left justified
(b) fixed point notation, field width of 9, 5 digits of precision,
right justified
(c) fixed point notation, field width of 9, no precision
specification, right justified
(d) fixed point notation, field width unspecified, 5 digits of
precision, right justified
(e) scientific notation, field width 9, 5 digits of precision, right
justified
(f) scientific notation, field width 9, 5 digits of precision, left
justified
(g) scientific notation, field width 14, 5 digits of precision,
right justified
(h) scientific notation, field width 14, 5 digits of precision, left
justified
As an example of what your output might look like, here is one
sample line of output:
|3.14159 | is field 9, precision 5, left justified
Examine your output and try to understand what the printf()
function is doing, especially any
outputs that you find surprising.
2
[3] These days, many people are very concerned with the
protection of private information. This
program will do a very rudimentary form of encryption. (Don’t
use this for anything you want to
keep secret!)
Write a filter program to encrypt standard input as follows:
(i) upper case letters between ‘A’ and ‘M’ are replaced with the
lower case letter 13 positions
further along in the alphabet (e.g., ‘B’ is replaced with ‘o’);
(ii) upper case letters between ‘N’ and ‘Z’ are replaced with the
lower case letter 13 positions
earlier in the alphabet (e.g., ‘Z’ is replaced with ‘m’);
(iii) lower case letters between ‘a’ and ‘m’ are replaced with the
upper case letter 13 positions
further along in the alphabet (e.g., ‘d’ is replaced with ‘Q’);
(iv) lower case letters between ‘n’ and ‘z’ are replaced with the
upper case letter 13 positions
earlier in the alphabet (e.g., ‘y’ is replaced with ‘L’);
(v) the four punctuation characters ‘.’, ‘,’, ‘!’ and ‘?’ are
replaced with, respectively, ‘!’, ‘?’, ‘.’
and ‘,’.
Of course, an encryption program is no use without a
corresponding decryption program. A bit of
thought (or experimentation) should show that this program will
decrypt its own output.
To test your program, create a few text files; some small, some
big. Then run some tests which will
convince the marker of the following things:
(i) the output of the program looks different than the input; and
(ii) running the output of the program through the program a
second time recovers the original
data.
You can make use of the Unix utilities diff and/or cmp, as well
as cat, to help convince the
marker that your program works. Here is a sample run with a
small number of tests. Note that you
don’t need to cat big files into the script file, but you can use ls
-l or wc to show the marker
that the files were big.
$ <cat a2p3.c, show gcc step, ...>
$
$ cat test1.dat
This is a short file.
Is it long enough, or should it be longer?
$
$ a3p1 < test1.dat
gUVF VF N FUBEG SVYR!
vF VG YBAT RABHTU? BE FUBHYQ VG OR YBATRE,
$
$ a3p1 < test1.dat | a3p1
This is a short file.
Is it long enough, or should it be longer?
$
$ wc test2.dat
1241 3394 44616 test2.dat
$ a3p1 < test2.dat > test2.dat.crypt
3
$
$ wc test2.dat.crypt
1241 3394 44616 test2.dat.crypt
$
$ cmp test2.dat test2.dat.crypt
test2.dat test2.dat.crypt differ: byte 3, line 1
$
$ a3p1 < test2.dat.crypt > test2.dat.crypt.decrypt
$
$ cmp test2.dat test2.dat.crypt.decrypt
$
Notice that, as is common for Unix programs, cmp says nothing
in the “success” case, which for
cmp is when the two files are identical.
The third (red) command entered above is interesting. It shows
how the Unix shell (command
interpreter) allows you to send the output of one program (the
first a2p3) into the input to another
program (in this case the second a2p3). This is an extremely
powerful feature of the shell,
especially since your program does not have to do anything
special to make this happen; as far as
your program is concerned, it is reading from standard input and
writing to standard output. The
fact that those may be the keyboard, screen, a file or another
program generally don’t matter to
your program. (In fact, the occasional program does care, but
that is an uncommon circumstance.)
In the partial script above I showed a test with a short file, and
a long file. I showed that (some)
letters got encrypted as they should, and that punctuation is
properly encrypted. I also showed that
my program works with a fairly long file, but you might want to
try a bigger file yet. And you
might consider using the head program to output just the first
few lines of a very long file to your
script file.
Should anything else be tested? Are there any boundary cases
here?
Did you use functions in any of these questions? Should you
have? Did you document them
correctly?
Does you program “blow up” on unexpected input, or does it
deal with bad input in a “graceful”
way?
How does your program deal with boundary conditions, if there
are any?
Did you remember to put all required comments in? Does your
program call out for any other
comments in the body of the code?
4
Fire Prevention Unit II Project
Community ISO Rating
For this assignment, you will research your community, and
calculate a rating similar to ISO/PPC though NOT using an
ISO/PPC rating scale. For this project, you will be using our
own rating scale, which is found in the grid below.
Emergency Communications
System
Fire Department
Structure
Water Supply
System
Community Efforts Risk
Reduction
0
No emergency call center
Non staffed
No public water
supply
No programs or
enforcement
1
Uses direct dial 7 or 10 digit
number to reach either police or
Staffed by first
responders only for
No public water
supply; only “dry wells” or ponds,
Annual fire prevention
activities limited to schools only
fire ; i.e. 222-1212 or 222-2323 or
901-222-1212 or 901-222-2323
EMS calls; stations are not open 24/7
lakes, and streams for drafting
2
County 911 system non Enhanced
system; separate police & fire dispatching
Staffed by part-time
paid-per-call EMS personnel only; one station open 24/7
Municipal fresh water
treatment; no hydrants
Annual fire prevention
activities limited to schools and senior centers
3
County E-911 (Enhanced) system
with central police & fire dispatching
Staffed by full-time
paid EMS personnel only; only one station open 24/7
Municipal fresh water
treatment; hydrants spaced greater than
1,000 feet apart
Annual fire prevention
activities and daily fire inspections of high risk occupancies
4
Municipal 911 system; non
Enhanced system; separate police
& fire dispatching
Staffed by full-time
paid EMS and fire suppression personnel; limited number of
stations
24/7
Municipal fresh water
treatment; fire hydrants spaced greater than 500 feet apart
Annual fire prevention and
public fire safety programs for all audiences
5
Municipal E-911 (Enhance)
system with central call intake center with central dispatch or
police and fire dispatch on own after E-911 call is received
Staffed by full-time paid EMS and fire
suppression personnel; stations
positioned
Municipal fresh water treatment; fire
hydrants spaced 500 or less apart; total
community coverage
Staffed full-time Fire
Prevention Division; annual fire prevention activities; fire
inspections; fire investigations & code enforcements
For this project, you will conduct an ISO/PPC “like” analysis of
your community. Using a five-point rating scale where 0 is the
worst and 5 is the best, analyze and rate your community’s
ability to address the four components used by ISO/PPC in its
rating system. Keep in mind that this rating is similar to, but not
the same as, the ISO/PPC rating scale.
Primary differences include: this scale is backwards in that 0 =
worst and 5 = best, and greater details are not included in each
of the four categories.
Using the rating-scale grid from above, analyze your own
community’s fire service capabilities. If you are a fire service
employee, you will most likely know how your community
operates and what services (emergency communications, fire
department structure, water supply, and risk reduction) are in
place.
If you are non-fire service employee, you will most likely be
able to assess two categories, emergency communications and
water supply, by simply knowing your emergency call system
and seeing fire hydrants on the streets. For the two remaining
categories, you will need to call your local fire department and
speak to a firefighter, or fire officer, who should be pleased to
answer your questions. You could also, time permitting, take a
trip to the fire department and ask for a tour for answers to your
questions.
To finish the project, you will need to construct a grid similar
to the one above, or identify each of the four categories with
their corresponding numerical rating number. Once you have
analyzed your community and composed your numbering
system, write a brief paragraph for each of the four categories
that supports your number selection for each category.
There is no “right” or “wrong” response here, as every student
may have a differently constructed community. Your final paper
should be written in proper APA format, and include citations
for sources as needed.
You must have a title page, double-spaced, with only the
following information written in the center: title of paper, your
name, and university name. No reference page is required, no
abstract is required, and no headers are required.
The finished paper should be a minimum of three pages of
written grid/graph and narration; however, not more than four
pages in length. This page requirement does not include your
cover page.
***Please no Plagiarism***

More Related Content

Similar to COMP 2103X1 Assignment 2Due Thursday, January 26 by 700 PM.docx

Chapter3
Chapter3Chapter3
Chapter3Kamran
 
Programming Fundamentals lecture 5
Programming Fundamentals lecture 5Programming Fundamentals lecture 5
Programming Fundamentals lecture 5REHAN IJAZ
 
Introduction to c
Introduction to cIntroduction to c
Introduction to camol_chavan
 
Program 1 – CS 344This assignment asks you to write a bash.docx
Program 1 – CS 344This assignment asks you to write a bash.docxProgram 1 – CS 344This assignment asks you to write a bash.docx
Program 1 – CS 344This assignment asks you to write a bash.docxwkyra78
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxmydrynan
 
cmp104 lec 8
cmp104 lec 8cmp104 lec 8
cmp104 lec 8kapil078
 
1 CMPS 12M Introduction to Data Structures Lab La.docx
1 CMPS 12M Introduction to Data Structures Lab La.docx1 CMPS 12M Introduction to Data Structures Lab La.docx
1 CMPS 12M Introduction to Data Structures Lab La.docxtarifarmarie
 
C programming session 08
C programming session 08C programming session 08
C programming session 08Dushmanta Nath
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorialhughpearse
 
C basics 4 std11(GujBoard)
C basics 4 std11(GujBoard)C basics 4 std11(GujBoard)
C basics 4 std11(GujBoard)indrasir
 
88 c programs 15184
88 c programs 1518488 c programs 15184
88 c programs 15184Sumit Saini
 
Introduction of c language
Introduction of c languageIntroduction of c language
Introduction of c languagefarishah
 
Introduction to C Unit 1
Introduction to C Unit 1Introduction to C Unit 1
Introduction to C Unit 1SURBHI SAROHA
 
c_pro_introduction.pptx
c_pro_introduction.pptxc_pro_introduction.pptx
c_pro_introduction.pptxRohitRaj744272
 

Similar to COMP 2103X1 Assignment 2Due Thursday, January 26 by 700 PM.docx (20)

Chapter3
Chapter3Chapter3
Chapter3
 
Programming Fundamentals lecture 5
Programming Fundamentals lecture 5Programming Fundamentals lecture 5
Programming Fundamentals lecture 5
 
Introduction to c
Introduction to cIntroduction to c
Introduction to c
 
Program 1 – CS 344This assignment asks you to write a bash.docx
Program 1 – CS 344This assignment asks you to write a bash.docxProgram 1 – CS 344This assignment asks you to write a bash.docx
Program 1 – CS 344This assignment asks you to write a bash.docx
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
 
cmp104 lec 8
cmp104 lec 8cmp104 lec 8
cmp104 lec 8
 
C programming
C programmingC programming
C programming
 
1 CMPS 12M Introduction to Data Structures Lab La.docx
1 CMPS 12M Introduction to Data Structures Lab La.docx1 CMPS 12M Introduction to Data Structures Lab La.docx
1 CMPS 12M Introduction to Data Structures Lab La.docx
 
C programming session 08
C programming session 08C programming session 08
C programming session 08
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorial
 
C basics 4 std11(GujBoard)
C basics 4 std11(GujBoard)C basics 4 std11(GujBoard)
C basics 4 std11(GujBoard)
 
88 c programs 15184
88 c programs 1518488 c programs 15184
88 c programs 15184
 
88 c-programs
88 c-programs88 c-programs
88 c-programs
 
Input-output
Input-outputInput-output
Input-output
 
Introduction of c language
Introduction of c languageIntroduction of c language
Introduction of c language
 
Introduction to C Unit 1
Introduction to C Unit 1Introduction to C Unit 1
Introduction to C Unit 1
 
C language tutorial
C language tutorialC language tutorial
C language tutorial
 
2 debugging-c
2 debugging-c2 debugging-c
2 debugging-c
 
88 c-programs
88 c-programs88 c-programs
88 c-programs
 
c_pro_introduction.pptx
c_pro_introduction.pptxc_pro_introduction.pptx
c_pro_introduction.pptx
 

More from donnajames55

KATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxKATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxdonnajames55
 
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxKate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxdonnajames55
 
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxKadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxdonnajames55
 
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxK-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxdonnajames55
 
JWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxJWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxdonnajames55
 
Just Walk on By by Brent Staples My firs.docx
Just Walk on By by Brent Staples               My firs.docxJust Walk on By by Brent Staples               My firs.docx
Just Walk on By by Brent Staples My firs.docxdonnajames55
 
Just make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxJust make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxdonnajames55
 
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxJUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxdonnajames55
 
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
July 2002, Vol 92, No. 7  American Journal of Public Health E.docxJuly 2002, Vol 92, No. 7  American Journal of Public Health E.docx
July 2002, Vol 92, No. 7 American Journal of Public Health E.docxdonnajames55
 
Journals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxJournals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxdonnajames55
 
Judgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxJudgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxdonnajames55
 
Joyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxJoyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxdonnajames55
 
Journal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxJournal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxdonnajames55
 
Journal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxJournal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxdonnajames55
 
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docxJournal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docxdonnajames55
 
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxJournal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxdonnajames55
 
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxJournal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxdonnajames55
 
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxJournal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxdonnajames55
 
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxJournal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxdonnajames55
 
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxJournal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxdonnajames55
 

More from donnajames55 (20)

KATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docxKATIES POST The crisis case I chose to discuss this week is th.docx
KATIES POST The crisis case I chose to discuss this week is th.docx
 
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docxKate Chopins concise The Story of an Hour.  What does Joseph.docx
Kate Chopins concise The Story of an Hour.  What does Joseph.docx
 
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docxKadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
Kadyr AkovaCosc 1437D. KirkEnemy.javaimport java.util..docx
 
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docxK-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
K-2nd Grade3rd-5th Grade6th-8th GradeMajor Concepts,.docx
 
JWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docxJWI 505 Business Communications and Executive Presence Lect.docx
JWI 505 Business Communications and Executive Presence Lect.docx
 
Just Walk on By by Brent Staples My firs.docx
Just Walk on By by Brent Staples               My firs.docxJust Walk on By by Brent Staples               My firs.docx
Just Walk on By by Brent Staples My firs.docx
 
Just make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docxJust make it simple. and not have to be good, its the first draft. .docx
Just make it simple. and not have to be good, its the first draft. .docx
 
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docxJUST 497 Senior Seminar and Internship ExperienceInternationa.docx
JUST 497 Senior Seminar and Internship ExperienceInternationa.docx
 
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
July 2002, Vol 92, No. 7  American Journal of Public Health E.docxJuly 2002, Vol 92, No. 7  American Journal of Public Health E.docx
July 2002, Vol 92, No. 7 American Journal of Public Health E.docx
 
Journals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docxJournals are to be 2 pages long with an introduction, discussion and.docx
Journals are to be 2 pages long with an introduction, discussion and.docx
 
Judgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docxJudgement in Managerial Decision MakingBased on examples fro.docx
Judgement in Managerial Decision MakingBased on examples fro.docx
 
Joyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docxJoyce is a 34-year-old woman who has been married 10 years. She .docx
Joyce is a 34-year-old woman who has been married 10 years. She .docx
 
Journal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docxJournal Write in 300-500 words about the following topic.After .docx
Journal Write in 300-500 words about the following topic.After .docx
 
Journal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docxJournal Supervision and Management StyleWhen it comes to superv.docx
Journal Supervision and Management StyleWhen it comes to superv.docx
 
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docxJournal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55  Ava.docx
Journal of Soc. & Psy. Sci. 2018 Volume 11 (1) 51-55 Ava.docx
 
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docxJournal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
Journal of Social Work Values & Ethics, Fall 2018, Vol. 15, No.docx
 
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docxJournal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
Journal of Policy Practice, 9220–239, 2010 Copyright © Taylor &.docx
 
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docxJournal of Personality 862, April 2018VC 2016 Wiley Perio.docx
Journal of Personality 862, April 2018VC 2016 Wiley Perio.docx
 
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docxJournal of Personality and Social Psychology1977, Vol. 35, N.docx
Journal of Personality and Social Psychology1977, Vol. 35, N.docx
 
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docxJournal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
Journal of Pcnonaluy and Social Psychology1»M. Vd 47, No 6. .docx
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

COMP 2103X1 Assignment 2Due Thursday, January 26 by 700 PM.docx

  • 1. COMP 2103X1 Assignment 2 Due Thursday, January 26 by 7:00 PM General information about assignments (important!): http://cs.acadiau.ca/~jdiamond/comp2103/assignments/General- info.html Information on passing in assignments: http://cs.acadiau.ca/~jdiamond/comp2103/assignments/Pass-in- info.html Information on coding style: http://cs.acadiau.ca/~jdiamond/comp2103/assignments/C- coding-style-notes [1] A filter program is a program which reads its input from “standard input” (“stdin”) and writes its output to “standard output” (“stdout”). Filter programs are useful because they make it easy to combine the functions they provide to solve more complex problems using the standard shell facilities. Filter programs are also nice to write, because the programmer doesn’t have to worry about writing code to open and close files, nor does the programmer have to worry about dealing with related error conditions. In some respects, filter programs are truly “win-win”. Write a filter program which uses getchar() to read in characters from stdin, continuing until end of file (read the man page and/or textbook to see the details on getchar(), or, heaven forbid,
  • 2. review the class slides). Your program must count the number of occurrences of each character in the input. After having read all of the input, it outputs a table similar to the one below which, for each character seen at least once, lists the total number of times that character was seen as well as its relative frequency (expressed as a percentage). Note that the characters n, r, t, 0, a, b, f, and v (see man ascii) must be displayed with the appropriate “escape sequence”. Ordinary printable characters must be output as themselves. Non- printable characters (see man isprint) must be printed with their three-digit octal code (see man printf). You can get input into a filter program (a2p1 in this case) in three ways: (a) “pipe” data from another program into it, like $ echo blah blah | a2p1 (b) “redirect” the contents of a file into the program, like $ a2p1 < some-file (c) type at the keyboard, and (eventually) type ^D (control-d) at the beginning of a line to signify end of file. Your output must look like the following, for this sample case: $ echo ^Aboo | a2p1 Char Count Frequency -------------------------- 001 1 20.00%
  • 3. n 1 20.00% b 1 20.00% o 2 40.00% Note: in the above examples, and from now on in this course’s assignments, text in red is text that the human types, and a “$" at the beginning of a line like that represents the shell prompt. 1 http://cs.acadiau.ca/~jdiamond/comp2103/assignments/General- info.html http://cs.acadiau.ca/~jdiamond/comp2103/assignments/Pass-in- info.html http://cs.acadiau.ca/~jdiamond/comp2103/assignments/C- coding-style-notes Note that I entered a ^A (control-a, not the circumflex character followed by the capital A) by typing ^V^A. The ^V tells your shell that you want it to interpret the next character literally, rather than to use any special meaning (during command line entry) that the next character might normally have. (Question: what does your shell do, when typing in a command line, if you type ^A without first entering ^V? Try it and see if you can figure it out. You might find it useful to know this, and to know what ^E and ^W do as well.) You should run your program on a few different inputs to demonstrate to the marker that you have
  • 4. thought about (and programmed for!) the different cases that could occur. If you redirect input from a data file, rather than using “cat” to display the contents of your file when creating your transcript file, use a command like $ od -bc test-data-1 . [2] The printf() function in C is very powerful and convenient, but it takes some getting used to. This question will give you experience with this function. When you are testing functions like printf() which produce formatted output, sometimes you want to make sure that the spaces in the output are the ones you expect. To make it obvious where all the white space came from, it is often convenient to enclose a format specification inside a pair of characters that are not otherwise used in that output. For example, if you use something like printf("|%f|n", x) then you will know whether the %f format specification produced any spaces before the newline. The constant M_PI, an approximation to the value of � , is defined in the system include file math.h. Write a program which prints out the value of M_PI using each of the following specifications, one specification per line of output: (a) fixed point notation, field width of 9, 5 digits of precision, left justified (b) fixed point notation, field width of 9, 5 digits of precision, right justified (c) fixed point notation, field width of 9, no precision specification, right justified (d) fixed point notation, field width unspecified, 5 digits of
  • 5. precision, right justified (e) scientific notation, field width 9, 5 digits of precision, right justified (f) scientific notation, field width 9, 5 digits of precision, left justified (g) scientific notation, field width 14, 5 digits of precision, right justified (h) scientific notation, field width 14, 5 digits of precision, left justified As an example of what your output might look like, here is one sample line of output: |3.14159 | is field 9, precision 5, left justified Examine your output and try to understand what the printf() function is doing, especially any outputs that you find surprising. 2 [3] These days, many people are very concerned with the protection of private information. This program will do a very rudimentary form of encryption. (Don’t use this for anything you want to keep secret!) Write a filter program to encrypt standard input as follows: (i) upper case letters between ‘A’ and ‘M’ are replaced with the lower case letter 13 positions further along in the alphabet (e.g., ‘B’ is replaced with ‘o’); (ii) upper case letters between ‘N’ and ‘Z’ are replaced with the lower case letter 13 positions
  • 6. earlier in the alphabet (e.g., ‘Z’ is replaced with ‘m’); (iii) lower case letters between ‘a’ and ‘m’ are replaced with the upper case letter 13 positions further along in the alphabet (e.g., ‘d’ is replaced with ‘Q’); (iv) lower case letters between ‘n’ and ‘z’ are replaced with the upper case letter 13 positions earlier in the alphabet (e.g., ‘y’ is replaced with ‘L’); (v) the four punctuation characters ‘.’, ‘,’, ‘!’ and ‘?’ are replaced with, respectively, ‘!’, ‘?’, ‘.’ and ‘,’. Of course, an encryption program is no use without a corresponding decryption program. A bit of thought (or experimentation) should show that this program will decrypt its own output. To test your program, create a few text files; some small, some big. Then run some tests which will convince the marker of the following things: (i) the output of the program looks different than the input; and (ii) running the output of the program through the program a second time recovers the original data. You can make use of the Unix utilities diff and/or cmp, as well as cat, to help convince the marker that your program works. Here is a sample run with a small number of tests. Note that you don’t need to cat big files into the script file, but you can use ls -l or wc to show the marker that the files were big. $ <cat a2p3.c, show gcc step, ...>
  • 7. $ $ cat test1.dat This is a short file. Is it long enough, or should it be longer? $ $ a3p1 < test1.dat gUVF VF N FUBEG SVYR! vF VG YBAT RABHTU? BE FUBHYQ VG OR YBATRE, $ $ a3p1 < test1.dat | a3p1 This is a short file. Is it long enough, or should it be longer? $ $ wc test2.dat 1241 3394 44616 test2.dat $ a3p1 < test2.dat > test2.dat.crypt 3
  • 8. $ $ wc test2.dat.crypt 1241 3394 44616 test2.dat.crypt $ $ cmp test2.dat test2.dat.crypt test2.dat test2.dat.crypt differ: byte 3, line 1 $ $ a3p1 < test2.dat.crypt > test2.dat.crypt.decrypt $ $ cmp test2.dat test2.dat.crypt.decrypt $ Notice that, as is common for Unix programs, cmp says nothing in the “success” case, which for cmp is when the two files are identical. The third (red) command entered above is interesting. It shows how the Unix shell (command interpreter) allows you to send the output of one program (the first a2p3) into the input to another program (in this case the second a2p3). This is an extremely powerful feature of the shell, especially since your program does not have to do anything special to make this happen; as far as your program is concerned, it is reading from standard input and
  • 9. writing to standard output. The fact that those may be the keyboard, screen, a file or another program generally don’t matter to your program. (In fact, the occasional program does care, but that is an uncommon circumstance.) In the partial script above I showed a test with a short file, and a long file. I showed that (some) letters got encrypted as they should, and that punctuation is properly encrypted. I also showed that my program works with a fairly long file, but you might want to try a bigger file yet. And you might consider using the head program to output just the first few lines of a very long file to your script file. Should anything else be tested? Are there any boundary cases here? Did you use functions in any of these questions? Should you have? Did you document them correctly? Does you program “blow up” on unexpected input, or does it deal with bad input in a “graceful” way? How does your program deal with boundary conditions, if there are any? Did you remember to put all required comments in? Does your program call out for any other comments in the body of the code? 4
  • 10. Fire Prevention Unit II Project Community ISO Rating For this assignment, you will research your community, and calculate a rating similar to ISO/PPC though NOT using an ISO/PPC rating scale. For this project, you will be using our own rating scale, which is found in the grid below. Emergency Communications System Fire Department Structure Water Supply System Community Efforts Risk Reduction 0 No emergency call center Non staffed No public water supply No programs or enforcement 1 Uses direct dial 7 or 10 digit number to reach either police or Staffed by first responders only for No public water supply; only “dry wells” or ponds, Annual fire prevention activities limited to schools only
  • 11. fire ; i.e. 222-1212 or 222-2323 or 901-222-1212 or 901-222-2323 EMS calls; stations are not open 24/7 lakes, and streams for drafting 2 County 911 system non Enhanced system; separate police & fire dispatching Staffed by part-time paid-per-call EMS personnel only; one station open 24/7 Municipal fresh water treatment; no hydrants Annual fire prevention activities limited to schools and senior centers 3 County E-911 (Enhanced) system with central police & fire dispatching Staffed by full-time paid EMS personnel only; only one station open 24/7 Municipal fresh water treatment; hydrants spaced greater than 1,000 feet apart Annual fire prevention activities and daily fire inspections of high risk occupancies 4 Municipal 911 system; non Enhanced system; separate police & fire dispatching Staffed by full-time paid EMS and fire suppression personnel; limited number of stations 24/7 Municipal fresh water treatment; fire hydrants spaced greater than 500 feet apart Annual fire prevention and public fire safety programs for all audiences
  • 12. 5 Municipal E-911 (Enhance) system with central call intake center with central dispatch or police and fire dispatch on own after E-911 call is received Staffed by full-time paid EMS and fire suppression personnel; stations positioned Municipal fresh water treatment; fire hydrants spaced 500 or less apart; total community coverage Staffed full-time Fire Prevention Division; annual fire prevention activities; fire inspections; fire investigations & code enforcements For this project, you will conduct an ISO/PPC “like” analysis of your community. Using a five-point rating scale where 0 is the worst and 5 is the best, analyze and rate your community’s ability to address the four components used by ISO/PPC in its rating system. Keep in mind that this rating is similar to, but not the same as, the ISO/PPC rating scale. Primary differences include: this scale is backwards in that 0 = worst and 5 = best, and greater details are not included in each of the four categories. Using the rating-scale grid from above, analyze your own community’s fire service capabilities. If you are a fire service employee, you will most likely know how your community operates and what services (emergency communications, fire department structure, water supply, and risk reduction) are in place. If you are non-fire service employee, you will most likely be able to assess two categories, emergency communications and water supply, by simply knowing your emergency call system and seeing fire hydrants on the streets. For the two remaining categories, you will need to call your local fire department and speak to a firefighter, or fire officer, who should be pleased to answer your questions. You could also, time permitting, take a
  • 13. trip to the fire department and ask for a tour for answers to your questions. To finish the project, you will need to construct a grid similar to the one above, or identify each of the four categories with their corresponding numerical rating number. Once you have analyzed your community and composed your numbering system, write a brief paragraph for each of the four categories that supports your number selection for each category. There is no “right” or “wrong” response here, as every student may have a differently constructed community. Your final paper should be written in proper APA format, and include citations for sources as needed. You must have a title page, double-spaced, with only the following information written in the center: title of paper, your name, and university name. No reference page is required, no abstract is required, and no headers are required. The finished paper should be a minimum of three pages of written grid/graph and narration; however, not more than four pages in length. This page requirement does not include your cover page. ***Please no Plagiarism***