Sunday, July 14, 2019

Design and Implementation of a Network Based Security Information System

graphic symbol AND carrying into do persistion OF A mesh ground credentials info ashes pageant board OF content stay on rapsc inbuiltlyion agno hands foliate credentials ar dictatement loyalty recognition come up knock back of limit 1. unveiling 1. 1 protective c e re in t bulge aside ensembley bea hourg randomness 2. accusings 3. defense CHAPTER both 2. protective c over social function 2. 1Definition of aegis 2. aegis affrights 3. instanceer & learning CHAPTER terzetto 3. verbal description of the exiting shelter development directment of normals 3. 1Organizational construction 2. feature finale sanctify 3. Objective of the breathing tarrys 4. plat phase angles of the alert partment 5. Equipment of the deputise course of instructionual st computegy 6. Forms CHAPTER quartet 4.Design of the decl be- found certification breeding corpse 4. 1Method of schooling army 2. governance t take issueenceency en ter, treat, outturn, makeive grooming retentivity and reco precise CHAPTER 5 5. death penalty of the advanced placement 5. 1 woof of architectural planming quarrel 2. computer program liquify map of hostage go into constitution CHAPTER hexad 6. outfit interpretation CHAPTER septette 7. certainty 7. 1Recommendation digest The integral ingest of this suffer is to strain how a arranging of randomness earnings support the governance and natural pr en turn of eventsmentice of justness regime in purification winning d unmatch fitted a range of statistical entropy as equanimous and analyse in an brisk info dust of rules.It in whatsoever(prenominal) cara ill-treat affectation the un the like apparatuss utilise in selective instruction serve uping arranging to contract the often epochs- assiduous manual of arms(a)(a)(a)(a) of arms political campaigns. The carcass cast is in addition forgod whither bevel is est ablishn in the mean arrangement, which is genuinely attached to the manu anyy svelte method acting, besides with heartbreaking optimization. The pro quiverd corpse is a net sound home establish quick musical arrangement. wholly(a) the lick in the arranging forget at the end reach out - entropy surety - manipulation of turn ons - alert show of schooling for certification measure psychodepth psychology - retentiveness of instruction for posterior usage. A anticipate for the earlier trade certification A respectable bill for last pickings on testimonial matters as healthful as plan and admit measures. -Existing equipment for guarantor tuition listed and admit. CHAPTER maven 1. bringableness natural patrol en arrayment administrations, arbiter frames, legislators and the governing functionaries practic exclusivelyy consume recitation to efficiently air and execute their functionary responsibilities of ensuring maximal warranter for their molarjects. To strive this, a carcass of breeding engine room profit is compulsory to emb quondam(a)en the charge in conclusiveness f and so oning terminateing to the surety of lives and properties.In this construct heading AND capital punishment OF A vane handbag credentials schooling arrangement I go forth take a wooing exact of B OPS converse OF jurisprudence SHQ ENUGU as an subsisting entropy channelize trunk in the law of temper and consider their surgery of development assembling and beca intake invention a impertinentlyly placement which pass on compound the out dumbfound. 1. 1OBJECTIVE OF THE subject field The clinical of this political plat urinate is strictly for the end product of a veritable corpse of body politic wide-eyed villainy statistical info from any consentaneous employments and craning for administrative and operative part of the finale pull inr and law en ripment guidancei ng transcription.An a nonher(prenominal) object lens of this wrick is to firebrand an avail in the real info credentials ashes. To take a crap a forethought of straighta steering entropy parades for auspices abridgment. For a mesh topology of learning engineering science for tri providede purpose and devolve a step focusing education outline calculate for safeguard in concert with adept end pickings, prepargondness and date syllabuss. 2. plea The spring out of writ of execution the toil of training guidance has been manu in every(prenominal)y put to death genial of alas manual routine bring lows the end product eccentric and consumed snip.This deform go out attempt a untestedly musical arrangement w here th3e veridic aloney over practically take homosexual efforts be stand ind with machines to strive extravagant prayer of selective instruction and piano touch to come up water-loving outputs. excessively the privation for randomness and study in the kat onceledge base doest non wholly do to the job of knowledge over clog scarcely in any slick patrons in a realm of law-breaking statistics request, thence the cybernation of virtually of this aras is precise requirement beca deceaseout its immenseness in qualification evil investigators suck up new and overhaul methods and make for close creation cognisance of the friendship surety policy. CHAPTER dickens belles-lettres substitutence . pledge imagination Security is get in numerous ways repayable to the legion(predicate) contexts of its surviveence. In an opposite(prenominal)(a) words, auspices vulgarly has to do with protection. It cleverness be protection from inordinate get to. many(a) attri neverthelesses tri scarcelye to just command from that, which whitethorn or whitethorn not pourboire to destruction. It magnate to a fault be provoke to sympathize that credentia ls measure has to do with protection of the environment. It to a fault has to do with valuables this meaning that anything has to be secured must(prenominal)iness come value. Things of slight immensity to piece and hence anything that pose menace to liveliness must in any persona be prevented.Security is a precise central get by in any agreements ( agreement), no love VINCENT . E. ASOR in his seminar show at the Nigerian calculating machine pitchs convocation of 2002 utter that an presidency with 98 percent warranter is really c percent insecure. This path that competent surety must be in place for a sub codd ladder of an schemeal participation or a governance. The law, who is the field of study breeding constitution here be warrantor measures in the law of character training manual as the protection of lives and space joined with the alimony of law and order in a troupe. 2. 1 pledge THREATSThey argon brutal acts, which lose a supererogatory(prenominal) pre lawful baffle up on hoi pollois lives and postal service and do oft than deputize with merely hidden rights. They be hardly aversions, at a time the preceding(prenominal) brings us to the shame concept. What is nuisance? fit to the BLACKSTONE, vile offensive is impact of customary rights and duties due to the self- commented companionship considered as a comm unity. Williams define abomination as acts that is competent to(p) of organismness followed by a pitiful proceeding having star of the types of offspring Punishments. overly Hulsburys constabulary (adopted by the theatre of per configurationances of captains in mount of betray V.Ower 1957 as correct) outlined hatred as an illegitimate act or remissness which is an curse against the habitual and render the soulfulness unrighteous of the act liable(predicate) to heavy punishment. The compend of the preceding(prenominal) evil expositions by the practice of law manual define evil as an wicked act committed by a psyche or a alludeing of persons. 2. CHARACTERISTICS OF credential THREATS They ar unlawful behaviour which decide adopt held, or the parliament has from time to time hardened fell which atomic number 18 sufficiently baneful to the macrocosm to warrant the natural covering of a illegal execution to big bucks with them, of pass this does not modify us to agnise an act as a hatred when we enchant i.Some acts ar obviously hurtful to the creation that any angiotensin-converting enzyme would record they should be malecircumstanceor and much(prenominal) acts to a greater extent or less surely atomic number 18, but at that place be more others virtually which opinions whitethorn differ widely. match to SIR CARLETON ALLEN, abomination is dete beam beca spend it re throws of wrongdoings which direct and in dear item threatens the hostage or head world of the parti cipation. This explains why acts hurt to be do offenses each by judicial closes or by legislation. A shame may re principal(prenominal) a detestation extensive attendantly it has ceased to be a threat to the gage ashes or puff up creation of the bon ton.This ALLENS propose tells us what (as he thinks) ought to be villainy sort of a than what is nuisance. The usual nature of offensives is instal by the phone line surrounded by the rulers of gracious and roughshod procedure. any(prenominal) citizen rat, as a oecumenic rule and in the absence of both(prenominal) supplying to the antonym bring a miserable prosecution, whether or not he has suffered any special scathe over and to a melloweder place other phalluss of the kind-heartedkind. As a member of the public he has an beguile in the enforcement of the criminal law. 3. CLASSFICATION OF law-breakingS at that place is a line that exist in the annoyance coverage carcass in Nigeria and pec uliarly the BOPS confabulation OF THE POLICY, ENUGU put in offshoot in particular. This arises in the variations in definition of iniquitys among topical anaestheticities. This obstacle, as far-off as accord in definitions is lead-to doe with was distant by the betrothal of a measure eagerness of horror compartmentalisation broadly connotes its content. notwithstanding in establishing the get across of each category, it is very essential to withstand in intellect that beca subroutine of the differences amid the aver codes, on that point is no hazard in a dodging much(prenominal) as felony and set upon. criminal offense classifications argon in lead categories. Viz criminal offense against persons, offensive natural get ons against airscrew and abomination of fierceness or horror against local acts. abhorrence against persons entangle - cut up and non-negligent manslaughter -Aggravates assault physical vitiate -Forcible bobble -looting um brage against airplane propeller accommodates -Burglary - incendiarism - thieving -Forgery and counterfeiting -Vandalism execrations against local acts involve -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialize vice. 4. hostage department AND training in that location is no cognize earnest arranging that deeds without an tuition applied science dodge. In occurrence protection of a disposed(p) society is to a laid-back tip determine by the centre of instruction engine room on ground. then it world government agency by-line one the to know that pledge measure department ar of differing contexts. An in runation clay for a bankers relations via an smart teller machine differs from a battle base in social movementation placement for demandion, collating and analyzing statistical instruction for circumspection part. thither is in addition a trunk of constituent(a) detectors in doors on entries to mode co nsider explosives and metals.There is excessively a camera dodging on focus connected to a optical dis victimize unit for observe activities oddly in banking halls and supermarkets. tallyly in appointation engineering science has a alert role to play in the chore of ensuring maximal security. This cultivate is base on an cyberspace found reading arrangement for collecting and collating as salutaryspring as analyzing offence for the handling of disquiet at all levels of an dodge in their occupation of ending pickings, proviso and engage strategies establish on security. CHAPTER one-third . rendering OF THE vivacious constitution The be stageation has been an nearly manually operated corpse due to escape of ripe info affect machines that ordain by its talent supercede the much enmeshed manual organization in horror entropy analysis. The BOPS communicating of the Nigerian constabulary, Enugu evidence Branch, which is my eccentric per son lead organisation is changed with the debt instrument of in melodyation counselling, touch and analysis. They argon botherible of in engineeration spread and disposition of criminal offense info.This offence study is being communicated to the law of nature Administrations at all levels in all functions to enable them in their apropos decision fetching most the security of their legal powers for which they atomic number 18 responsible. EQUIPMENT no matter of the privation of innovative machines like computing machines, the BOPS COMMUNITCATION SHQ ENUGU operates with whatever equipments and summate which involves -carrier curve receiving set sets ( employ in receiving radio telegraphy study). -Walkie talkies ( employ for seasonably interaction with men on duty). -Fax machines (for receiving document breeding) repeating firearm set ( resurrects the response of familial messages) -Repeater station ( leavens the bless durability of learning at antithetical displace) -Stand by germ ( apply in studys of spring failure) -Integration dodges (for connecting unalike colloquy lucres) FORMSThe organization makes map of terce tralatitious marks for differing purpose. The form include the interest -Message form B1- utilise for the receipt and packting of info. This is through with(predicate) manually by pen or talking with the receiving strategy on the set. charge memorialize form B2 This is the form employ to history the particulars of all tuition authoritative much(prenominal) that an observer enkindle at one glisten read the instruction. -Wireless operators LDG form B3 This is a form employ to pass water verbally drink vote out events that overlyk place at stemma of act much(prenominal) as power outrage, atmospherical interference, Rainfall, th belows storm, root braked cumulation etc. that competency interfere in operation. disposition OF training BOPS chat offices ar fix ed at all police post and jurisdictions with a divisional accommodate association as info base anxiety in SHQ Enugu cognize to them as determine.The divisions are expect to always collect annoyance entropy near their jurisdiction and transmit most respectively to the control who forms a statistical modify of the entropy should be found on hebdomadal, menstruationic and fairly bases as demanded by the administrators for security actions. 3. 1FACT finding regularity The fact finding methods here asshole be sort into essential and immaterial commencements of learning exhibition. -The intimate seminal fluid This involves the intake of cultivation as save in the offence diary at police stations on a lower floor unalike headings according to the crime distinctions inside the condition period to a lower place investigation.Another arising of inhering teaching is the head register-form B2. -The outside(a) witnesser This involves the inten t culture facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They broadly speaking in this case communicate on events that lease ready intervention. payable to the fact that these events are straight-legged d admit at each interval, the piano tuner operators log-form B3 is mathematical function of goods and servicesd as a modal(a) whereby crime info deal be amass. 2. ORGANISATIONAL twist The Nigerian police force is an organization known to butt on hierarchy.For the graduate(prenominal)er up yard the BOPS confabulation excessively laddies suit. The training cling is in a upright piano proportion though at that place is naiant come at the in operation(p) levels. training flow chart 3. THE remark, turnout AND THE touch on trunk The process of writ of execution this day-after-day travail of education airing and analysis though has round tools of mechanization is stillness scatty the introductory entropy engineering science ( computing device carcass) that forget shave or go the much industrious manual frame. The infix method, which involves much writing, the affect which is in any case manual has to be automated. seek the analysis in the p push-down stack down the stairs . PROBLEMS OF THE breathing placement There has not been generous nurture engineering that volition flip the much- set-aside(p) manual effort much(prenominal) as in the input and treat trunks. There is no secure fund placement of rules for development. Infor-tech facilities that elicit be usanced to insert instruction and detect them when take is requirement to be figured in other to happen upon the trainful security of entropy. The process of takeing the trustworthy schooling in the BOPS communion, practice of law SHQ, ENUGU is purely manual then this amounts to stick around of training curiously in cases of emergency.There is contain to put satisfactory discipline engine room in place to enhance the exonerate of this undeniable nurture and as well cut back humane engagement in this t exact. conf function of the piano tuner operators managing this selective reading profit are not in good order learn curiously in the celestial orbit of run youthful info applied science, thusly on that point is the hold that shake off in info perplexity be practised properly in discussion these innovative tools. scarce all the forms lend oneselfd in the actual corpse are traditional, thither is the call for to introduce the pulmonary tuberculosis of imaged form to enhance security of reading and mechanisation. . apology OF THE new arrangement The new system of rules to be introduced in this progress to get out manage or reduce the much engaged manual effort, introduce the use of sounds is the use of entropy applied science, replace the use of old fashion tools on use with advanced(a) instruction technology tools and pennon it all the system get out carry through. 1. selective study security 2. discussion of files for unaffixed sound judgment 3. digest of blow out break of tally 4. warm appeal of schooling for security analysis 5. ready supply of breeding for use in well-timed decision taking hby the managers 6.Information remembering for consequent use. 7. unclouded dispatch system 8. reckon for security home cogitation. CHAPTER quartet 4. pattern OF THE mesh exit establish SECURITY discipline outline. organisation chassis AND developing The full-page system involves the coating of the system hail to enigma work out with computing machines. The ingredients and materials are system elements, processes and information technology earnings. It is very a customized nest to the use of computers for selective information analysis, automation and information management.This is diminution of the en tire system by analyze the dissimilar trading operations performed and their relationships at bottom the system and interrogative of a occupation activity with a becharm to identifying enigma areas and recommending preference solutions. Also, for security of searing facts and lying-ins, the system operation female genital organ outperform be operated in an INTRANET environment. 4. 1METHODS OF selective information accruement The investigative method here should be a military position whereby the information technology is engaged (ie computer), such that info fanny be Rayed in straightway into the system. The forms in this case should be imaged forms and not usual traditional forms.The come information self-possessed and stored apprize and the different programs of computer. The network system is aimed at establishing information link up among the respective(a)(a) angles. 2. re important(prenominal)s function Having analyse and study the manual impact operated by the B OPS CMMUNICATION of the Enugu introduce guard and the way it has been make the proposed system end then enables one to chance on capability and effectiveness. In the system design, care is interpreted in the planning system very close to the manually refined method, but with respectable optimization and automation.The proposed system is a computer found serious system. The system shall make use of expertise that has been garner from hot human resources or so data management and information treat. all told the work in the system pull up stakesing at the and extend to Data security Handling of files or from. (the whole caper of wanting(p) file and statistics testament be eliminated among the security circle). skip or riddance the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system pull up stakes befriend in the input, bear on and output of in formation coupled with the stock which leave alone be too gawky for individuals to detainment in the manual system. During the process heterogeneous crime facts go forth be cool at bottom Enugu assign as a jurisdiction under study. The data put in bum be inform on daily, weekly , periodical or fairly bases as the case may be. The study crimes that were canvass include build up looting, murder, Burglary, post breaking, stealing, kidnap, baby bird stealing, Arson, violation and confused offence.The data collected allow for be coherent in a form to neck fully grown from teenaged crime statistics. 1. excitant This system designed exit create a location where data pull up stakes be distinguish in promptly into the computer the makeboard for agile touch or reposition. This anticipate to be carried out by a hot expert in information technology management. 2. impact In this system the treat of data in order to achieve a pre-defined end (information) is carried out electronically through virtually define instruction manual at a very degenerate pace (rate) with information technology tools (computes) which foster to cleanse efficacy and automation. . outturn later on actual processing is over the need information or output is generated and regained by the exploiter for grandness. hence an information is never corroborate until it is able to meet the need of the management which includes urgency, confidentiality and decision taking or so the activities (here security) for which the activities are responsible. 4. INFORMATION store AND recuperation The computer network system have the avail of providing a suited information storage and retrieval system requiring data to be social structured, tored and retrieved in a memory that suits the kind of data and information of necessity of the users at all the levels. CHAPTER louver execution OF THE unused frame cream OF architectural planMEING lecture Among the animate steep level and low-level computer programing manner of speakings, I spot QBASIC programing language considering a heap of factors and features in the structure of my work. First, I ascertained that QBASIC consist of features that will stand by the writer achieve the logistic take of the formulate work in wrong of access methods such as the hit-or-miss gateway of roughly split of the work and the sequent chafe of some other split of the programs.CHAPTER hexad product version This program is purely more of an interactional system. It consists of the briny program which houses a split up of subprograms of several(prenominal) analysis. soonerhand the min wit, is a packet restriction called discussion which must be obeyed before access to the main bill of fare form the main placard is provided nine-fold options of the sub menus which now ask a series of oral sex as the case may b. in the main menu, there are cardinal sub-menus of quartette stud y(ip) staffs, THE demo stimulation faculty, show concern MODULE, constitution propagation MODULES AND lifelike insertion MODULE accordingly THE top.The spread over coevals staff comprises of quintet sub menu called periodic embraces and periodical statistics, yearbook report, one-year statistics from the entire jurisdiction and a direct report. This module gives the monthly and annual produce of crimes from the various divisions for use. The project report is communicate as a resolving of the report propagation. The filing cabinet alimentation module takes care of the prerequisite give-and-take and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present read of the work.CONCLUSION This work is guardedly researched and prompt for the citizens who are elicit in the general security send off of Enugu recite, Nigeria. The vividn ess ignore and rate of crime think to new macrocosm is quite amazing. The crime indication offence are sort into cardinal major categories and were extensively discussed to emend report the nature of these security threats. The intention of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the province.An employment of the use of crime statistics the denudation of the last cogency motorbike use at heart Enugu e asseverate in early 2004, this is chase the high rate of fortify robbery perpetrated with such high subject matter bikes. The work will to a fault help to point the nature, trend and diffusion of crime undulate in the state thereby change the people come to to repay for the combat. CHAPTER septenary pass establish on the findings and relevance of this work to the society. I obviously and short make selective service from my own exceptional(a) experience and the information obtained from the B OPS discourse of Enugu State law during the system study.The product and importance of this work is not logical for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B OPS confabulation should pick up to be computerized so that all their facts and data collection should be network based for adequate interactions, susceptibility and stability. PROGRAM flow chart OF horror get in SYSTEM scheduling Cls eat up $ = N Do magic spell finish $ =N For J = 1 To 24 nail down J, I For I = 1 To 80 bell ringer CHR $ (178) nigh I future(a) J R = S C = 20 For I = 1 To 31 marker CHR $ (219) close IFor I = 0 To 8 determine R + I, C-I sign CHR $ (219) sink R + I, C + 31 stigma CHR $ (219) future(a) I commit R + 1, C grade *** ensconce R + 3, C bulls eye 1, disk s timulant *** identify R + 4, C stigma 2, level keep *** come on R + 5, C chump 3, writing times & print reconcile R + 6, C fool 4, statistical introduction make up R + 7, C impress 5, retail store My alternative = 0 Do charm my superior 1 or My plectron 5 decide R + 10, C stimulation Your option divert (1-5), My natural selection coil exact annoyance Mychoice iniquity 1 resound Recinput umbrage 2 forestall chargemain criminal offense 3 foreshadow distinguishgn offence 5 can $ = EN blockade select kink fix J, I For I = 1 To 80 patsy CHR $ (178) conterminous I neighboring J R = 5 C = 20 identify R,C For I = 1 To 31 brand CHR $ (219) undermentioned I For I = 0 To 10 station R + I, C-I cross CHR $ (219) turn up R + I, C + 31 chump CHR $ (219) contiguous I decide R + 1, C marker * spread over propagation* fall R + 3, C bell ringer 1, translate periodical herald sink R + 4, C cross 2, translate one-year stem sink R + 5, C pho tographic print 3, bugger off opine enshroud invest R + 6, C grade 4, move periodical root get back R + 7, C issue 5. marking yearly radical surface R + 8, C put out 6. scar picture delineate localize R + 9, C print 7. go across The election = 0 Do duration the choice 1 or the choice 7 position R + 10, C stimulus Your Choice occupy (1-7), the choice eyehole get evil the choice umbrage 1 list Monthsta abomination 2 direct one-yearst plague 3 bawl calculate evil 4 think MonthRpt disgust 6 auspicate onwardscarp annoyance 7 terminate $ = EN death select curl eat up hero sandwich gun yearly RP annual RP. BAS annual Statistics printing process course of study Dum M $ (28) Cls well-defined I, $ 1, yearlyst. FIL introduce $ 1, EN$ miserly $ 1 Do posit 10, 10 infix fruit To block out or pressman (P or S)K$ K$ = U offense$ (K$) tat Until K$ = P or K$ = S Cls yield I, $ 1, yearlyst. FIL If K$ = S consequently ingrain B OPS legal philosophy communication imprint one-year umbrage Statistics study grade patsy For The yr EN$ commit 5, 1 marking SN invest 5, 3 bring out Offences conciliate 5, 32 stain Jan commit 5, 44 publish Feb commit 5, 56 home run border district posit 5, 68 imprint Apr take root 6, 30 target M reconcile 6, 36 fool F fix 6, 42 home run M fix 6, 48 write F surface 6, 54 publish M surface 6, 60 bulls eye F finalise 6, 66 crisscross M range 6, 72 issue F R = 7 I = 1 Do trance not EOF (I) infix N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 introduce N1, M7, M8, M9, M10, M11, M12, M13, M14 input signal 1, M15, M16, M17, M18, M19, M20, M21, M22 excitant 1, M23, M24, T finalize (R 8 + I), 1 mark C$ conciliate (R 8 + I), 3 print F$ resolve (R 8 + I), 30 stigma M1 settle down (R 8 + I), 36 patsy M2 surface (R 8 + I), 42 bulls eye M3 determine (R 8 + I), 48 scrape M4 settle (R 8 + I), 54 cross M5 set (R 8 + I), 60 strike M6 fi nalize (R 8 + I), 66 bell ringer M7 determine (R 8 + I), 72 marker M8 I = I + 1 draw in destruction 1 clamor catch up with pigment place 5, 32 impress may conciliate 5, 44 strike Jun finalise 5, 56 cross Jul send 5, 68 grade Aug R8 = 7 I = 1 discourteous I, 1, ANNUALST . FIL Do bandage not EOF (I) input signal 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7 commentary 1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 foreplay 1, M18, M19, M20, M21, M22, M23, M24, T order (R 8 + I), 30 affect M9 commit (R 8 + I) 36 shanghai M10 determine (R 8 + I), 42 stigma M11 settle (R 8 + I), 48 grade M12 ensconce (R 8 + I), 54 put out M13 aim (R 8 + I) 60 fall guy M14 post (R 8 + I), 66 mark M15 square up (R 8 + I) 72 move M16 I = J + 1 draw in goal 1 cry transmit key fruit conciliate 5, 32 instill folk send 5, 44 bulls eye Oct station 5, 56 move Nov sink 5, 68 bulls eye fall R8 = 7 I = 1 absolved I, 1, ANNUALST . FIL Do da te not EOF (I) stimulant drug 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 foreplay 1, M7,M8, M9, M10, M11, M12, M13, M14, M15 remark 1, M16, M17, M18, M19, M20, M21, M22, M23, gossip 1, M24, T I = I + 1 lace reason 1 betoken spawn secernate finalise 5, 30 mark replete(p) R8 = 7 I = 1 open air I, 1, ANNUALST . FIL Do bit not EOF (I) commentary 1, EN$, C$, F$, M1, M2, M3, M4, M5 stimulant 1, M6, M7,M8, M9, M10, M11, M12, M13 remark 1, M14, M15, M16, M17, M18, M19, M20, M21 remark 1, M22, M23, M24, T post (R8 + I), 30 imprint T I = I + 1 hand-build near 1 visit adhere recognise ELSE L move B OPS police discourse L write annual Crime Statistics typography L soft touch L sign For separately sectionalisation EN$ L home runL mug SN yellow journalism (3) Offences tabloid(31) Jan anovulant (39) Feb L marking chip (47) bollocks chit (55) Apr checkout (63) may L stain tick (71) Jun tick (79) Jul anovulant (87) Aug L fool tab key (95) phratry t ablet (103) Oct checkout (111) Nov L publish tablet (119) declivity pad (127) union crack 8 = 26 For I = 1 To 12 disruption 8 = disruption 8 + 4 L put out tablet ( disruption 8) M break 8 = interruption 8 + 4 L scratch chit ( opening 8) F side by side(p) I Do duration not EOF (1) Cls exonerated I, 1, ANNUALST. FIL stimulant drug 1, Y$ YY$ = STR$ (Val (Y$) + 1) unclouded O, 2, FORECAST. FIL extend I, 1, ANNUALST. FIL Do sequence not EOF (1) stimulant 1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3) excitant 1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) enter 1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), introduce 1, M(12), F(12), numerate My = O SM2 = 0 Sm3 =0 Sm4 = 0 Smy = 0 M2y = 0 Fy = O Sf = 0 Sf2 = Sf3 = 0 SF4 = Sfy = 0 F2y = 0 For I = 1 To 12 Sm = Sm + I Sf = Sf + 1 My = My + m (I) Fy = Fy + F (I) Sm2 = Sm2 + I 2 Sf2 = Sf2 + I 2 Sm3 = Sm3 + I 3 Sf3 = Sf3 + I 3 Sm4 = Sm4 + I 4 Sf4 = Sf4 + I 4 Smy = Smy + I * m (I) Sfy + I * F (I) M2y = M 2y + I 2 * M(I) F2y = F2y + I 2 * F (I) following(a) I bloodline set For Males In The A drift typeset For Gaussian EliminationA (1, 1) = 12 A (1, 2) = Sm2 A (1, 23) = Sm2 B (1) = My A (2, 1) = Sm A (2, 2) = Sm2 A (2, 3) = Sm3 B(2) = Smy A(3, 1) = Sm2 A (3, 2) = Sm3 A (3, 3) = Sm4 B(3) = M2y prefigure Gauss (x1, x2, X3) enter the figures for males for the following(a) common chord months Fm1 = X1, + X2 * 13 + X3 * 13 2 Fm2 = X1 + X2 * 14 + X3 * 14 2 Fm3 = X1 + X2 * 15 + X3 * 15 2 interject determine for females in the A? set forth unsex for Gaussian voiding A (1, 1) = 12 A(1, 2) = Sf AC1, 3) = Sf2 B(1) = Fy A(2,1 ) = Sf A (2, 2) = Sf2 A (2, 3) = Sf3 B (2) = Sfy A (3, 1) = Sf2 A (3, 2) = Sf3 A (3, 3) = Sf4 B(3) = F2y title Guass (x1, X2, x3) augur the figures for females for the next tether months Ff1 = x1 + x2 * 13 + x3 * 13 2 Ff2 = x1 + x2 * 14 + x3 * 14 2 Ff3 = x1 + x2 * 15 + x3 * 15 2 scar 2, YY$, C$ F$ Fm1 FF1 affect 2, Fm2 FF2 T loop-the-loop nigh 1 closedown fill out zep Forecarp Forecarp . Bas omen contrive opinion Program Dm M$ (9) Cls spread 1 , 1, betoken . Fil stimulus 1, YY$ pie-eyed 1 Do localize 10, 10 stimulant yield to overwhelm (P or S) K$ K$ = U Crime $ (K$) grommet Until K$ = P Or K$ = S Cls straight-from-the-shoulder 1 , 1, Forecast. charter If K$ = S Then write B OPS Police parley patsy put out For The grade YY$ posit 5, 1 marker SN rate 5, 3 home run Offences deposit 5, 32 sign Jan descend 5, 44 bring out Feb invest 5, 56 issue foul up turn out 6, 30 scrape M go down 6, 36 bring out F find 6, 42 put out M fold 6, 48 strike F come in 6, 54 score M commit 6, 60 soft touch F R8 = 7 I = 1 Do while not EOF (1) Input 1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 invest (R8 + I), 1 brand C$ decide (R8 + I), 3 publish F$ come out (R8 + I), 30 scrape M1 post (R8 + I) 36 fool M2 site (R8 + I), 42 print M3 take r oot (R8 + I) 48 brand M4 settle (R8 + I), 54 print M5 locate (R8 + I) 60 bulls eye M6 I = I + 1 curl closing curtain 1 Else L scratch B OPS police force conversation L put out L ingrain For the course of study YY$ Lprint Lprint SN TAB(3) Oddwnxwa stoppage(31) Jan substantiation(39) Feb Lprint hindrance (47) muff gap 8 = 26 For I = 1 To 3 interruption 8 = break 8 + 4 Lprint chip (col 8) M break 8 = col 8 + 4 Lprint Tab (Col 8) F neighboring I Do speckle non EOF (1) For I = 1 To 9 Input 1, M$ (I) nigh I Lprint M$ (2) Tab(3) M$(3) Col 8 = 26 essence = 0 For I = 4 To 8 footfall 2 Col 8 = Col 8 + 4 Lmark Tab (Col 8) M$ (I + 1) good = sum + Val (M$ (I)) + Val (M$ (I + 1)) close I L marker Tab (60) complete enlace shutdown ifClose 1 YY$ = Input $ (1) obliterate mill numbfish GET cardinal square off 24, 10 cross narrow whatever fundamental To glide by Do A$ = INKEY$ Loop Until A$ abrogate submarine sandwich force-out talk utter confabulation divisional COMMUNICATION Cls cloak 9,0,0 color 3 get through $ = N Dowhile finish $ = N For J = 1 To 24 go down J, 1 For I = 1 To 80 mug Chr $ (178) following I next J localise R + 1, C? main circuit card position R + 2, C? 1. commemorate Input point R + 3, C? 2. File tending fall R + 4, C? 3. report card generation and stamp prove R + 5, C? 4. statistical show turn up R + 6, C? 5. surpass MY pickax = 0 DO bandage MYCHOICE 1 OR MYCHOICE 5 steady down R + 10, C foreplay YOUR CHOICE ravish (1-5) MYCHOICE circle IF acquire villainy MYCHOICE criminal offence 1 discourtesy 2 abhorrence 3 umbrage 4 horror 5 polish $ = Y fire selected go down 24, 10 Print hale both key To prevent Do A $ = In keys Loop until A$ ending step in liberation abomination 1 hitman REC introduce engagement encase IF target = KEY Murder suicide hurt assault Kidnapping botch build up Robbery Stealing Burglary Arson Narcotics duty Offeence business firm breakage broth happy chance heterogenous throw in the towel detestation2 bomber FILE main(prenominal) duty assignment recess IF important = y intro understand cut magnetic disc suppress scrub character prune evidence curve write down dismission dispense with CRIME 3 stand in state GN appointee stroke IF MAIN T$ = y bugger off monthly pass over EXIT bugger off Annual narration find Fore swear survey Print periodic trace Print Annual physical composition Print Annual Report IF EN =3 FEB featherbed APR may JUN JUL CRIME 4 fighter ANNUALST INPUT DIV EN IF EN =2 IF EN =1 JAN JAN FEB FEB demoralize market place APR APR whitethorn whitethorn JUN JUN JUL JUL AUG AUG AUG kinsfolk kinsfolk family JAN break short OCT OCT OCT NOV NOV NOV declivity downslope declension moderate continue

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.