Computer Science Question

Make the following changes to your video game code (or the code from lab #5 answer):

  1. Let’s make the game more playable! Currently, the player wins every other round and each game consists of a single turn. We want to change this! Create a new global variable named computerHealth and initialize it to 100. Inside the loop that represents a single game being played, place another loop. This loop will represent a single round of a game. In each iteration of the inner loop:
    • The computer will attack the player for a value between 0 and 50.
    • The player will choose an action (heal, block, special, or regular)
    • Make the calculated adjustments to computerHealth and playerHealth
      • If the player health goes below 0, count it as a player loss and break out of the inner loop.
      • If the computer health goes below 0, count it as a player win and break out of the inner loop.
      • Otherwise, the inner loop will iterate again (i.e. the computer will attack and the player will pick another action).
    • You can remove the previous logic of determining a winner based on if it’s an even or odd round.
  2. Update the block function to “return” two values. It should have one value parameter (computerDamage from before) and two reference parameters (named blockAmount and hitAmount). The function should calculate how much of the attack the user blocks. To do this, select a random number between 0 and computerDamage and assign it to blockAmount. After determining how much of computerDamage is blocked, assign the rest to hitAmount. In main, print the value of each (we will have access to both since the arguments will be passed by reference).
  3. Update your program so that when the user decides to quit, it saves the number of wins and losses to a file. When the program starts, load the data (if it exists). When the program ends, overwrite the previous data with the updated data. You can simply put the number of wins in the first line of the file and the number of losses in the second line.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Assignment:

In your responses to your peers, continue the conversation. You may want to consider:

  • How do you think that the key takeaways that your peer has posted can be applied in a profession or in future courses?
  • Are your key takeaways similar to or different from your peers’ takeaways?
  • What are your general thoughts on what your peer has initially posted about?

PEER POST # 1

The knowledge base of knowing and understanding HIPAA laws, ACM Code of Conduct, and the IEEE Code of Ethics. Though I heard of HIPAA laws before I never read them and reviewed what they meant, only what the laws generally were pertaining to. Health Information Technology is a booming field that is dealing with some of the most sensitive pieces of information with an individual: their health. I had never heard of the ACM Code of Conduct and wasn’t aware of all the guiding principles of honest and earnest that are in the IT world. IEEE Code of Ethics are another doctrine I never seen. So these documents made me aware that there are many documents that I need to familiarize myself. In addition, I learned more about the Software Development Life Cycle and the different stages within that cycle. Lastly, I learned that there to understand the legality, morality, and the stage at which to involved your superiors or higher authorities.

Knowing the rules and regulations when being involved in any situation is helpful and more importantly knowing your rights while operating in situations is crucial too. I will keep the different sets of rules: HIPAA, FERPA, ACM, and IEEE in the back of my mind while dealing in the IT world or personal endeavors. Legality vs. Morality is becoming even more important in these times. Knowing what are the laws vs. what is right is a key distinction that will help protect you and your families from assumptions that are made.

I hope to incorporate these skills so I could participate in working on a project until its completion. Becoming a project manager is now on my radar and I will study for the Project Manager Professional (PMP) certification after i acquire my CompTIA Network+ and CompTIA Security+ certifications. I love the structure of the SDLC life cycle and project structure.

This course has prepared me for other courses by understanding the team concept in IT and within projects there are tasks that needed to be accomplished before other tasks are completed. There are parallel tasks that are completely concurrently with certain tasks. However, understanding the roles and prioritize will better equipped be to manage an interact with my team/project members. This also helped me with managing my time pertaining to certain tasks getting done. Time management is a key attribute in IT professional world but also in academics too.

PEER POST # 2

We are finally at the end! I enjoyed engaging in these conversations that will help us develop our skills to be successful.

The most valuable skill I will take away from this class how to prepare information to be included in a SRS. That was one of the most difficult tasks I have encountered so far, being able to use non-technical language to explain how the system is going to work. I think learning how to basically paint a picture and occasionally use a picture, help me understand how to express myself and get my point across.

The most valuable knowledge I learned in class was how to navigate ethical situations. Although, ethics has always been a part of how I operate normally, IT ethics was something new. I enjoyed learning and understanding that there is a code of ethics for IT professionals that gears towards helping people and other IT professionals. I plan on continuing to follow this code and use them in everyday life, as they are instrumental in being not only a great technician but a great person.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Please check questions in the word documents

QUESTION 1

1.Refer to the following breakdown of responses to a survey of room cleanliness in a hotel.

What is the class interval for the following frequency table?
If there is a class interval, give the value, if no class interval, then the answer is 0.

5 points

QUESTION 2

1.The following frequency distribution shows the distribution of delivery times (in days) for swimstuff.com customer orders during the last month.

What is the relative frequency for orders delivered in three days or more?

5 points

QUESTION 3

1.The mean monthly income of a group of college students is $500; the standard deviation is $50. And the mean monthly income is normally distributed. Approximately, what percent of the incomes will lie between $400 and $600?

5 points

QUESTION 4

1.

In flipping a fair coin, what is the probability of either heads or tails on one toss?

5 points

QUESTION 5

1.

Airlines monitor the causes of flights arriving late. A total of 75% of flights are late because of weather, while 35% of flights are late because of ground operations. A full 10% of flights are late because of weather and ground operations. What is the joint probability that a flight arrives late because of weather and ground operations?

5 points

QUESTION 6

1.

Affirmative action commitments by many organizations have led to an increase in the number of women in executive positions. Satellite Office Systems has vacancies for two executives that it will fill from among four women and six men.
What is the probability that exactly one woman is selected?

5 points

QUESTION 7

1.Elly’s

Elly’s Hotdog Emporium is famous for its chilidogs. Elly’s latest sales indicate that 30% of the customers order their chilidogs with hot peppers. Suppose 15 customers are selected at random. What is the probability that exactly 10 customers will ask for hot peppers?

5 points

QUESTION 8

1.From past history, the scores on a statistics test are normally distributed with a mean score of 70 and a standard deviation of 5. To earn a “C” on the test, a student must be in the top 25% of the class. A student would need to score at least ______ to receive a “C” grade.

5 points

QUESTION 9

1.A university has 1,000 computers available for students to use. Each computer has a 250-gigabyte hard drive. The university wants to estimate the space occupied on the hard drives. A random sample of 100 computers showed a mean of 115 gigabytes used with a standard deviation of 20 gigabytes. What is the probability that a sample mean is greater than 120 gigabytes?

5 points

QUESTION 10

1.A local grocery store wants to estimate the mean daily number of gallons of milk sold to customers. Assume the number of gallons sold follows the normal distribution, with a population standard deviation of 5.10 gallons. A random sample of 60 days shows that the mean daily number of gallons sold is 10.00. Compute a 99% confidence interval for the population mean.

5 points

QUESTION 11

1.Records on a fleet of trucks reveal that the average life of a set of spark plugs is normally distributed with a mean of 22,100 miles. The fleet owner purchased 18 sets and found that the sample average life was 23,400 miles; the sample standard deviation was 1,412 miles. To determine if the spark plugs average 22,100 miles, what is the critical value for the test using a 0.05 level of significance?

5 points

QUESTION 12

1.A manufacturer wants to increase the shelf life of a line of cake mixes. Past records indicate that the average shelf life of the mix is 216 days. After a revised mix has been developed, a sample of nine boxes of cake mix had a mean of 217.222 days and a standard deviation of 1.2019 days. At the 0.025 significance level, decide if the sample data support the claim that shelf life has increased. State your decision in terms of the null hypothesis.

5 points

QUESTION 13

1.To test the hypothesis that two population variances are equal, a random sample of size 13 was selected from the first population, and a random sample of size 21 was selected from the second population. Given that the sample standard deviation from the first population is larger than the sample standard deviation from the second population, what is the F critical value using 0.01 as the significance level?

5 points

QUESTION 14

1.Given the data below, compute r using the z-score method.

X Y

1 2

2 10

3 7

5 points

QUESTION 15

1.A random sample of 400 families who planned to buy a vacation residence revealed that 228 families want to buy a condominium in Florida. At the 0.01 significance level, test the statement that 55% of those families who plan to purchase a vacation residence in Florida want a condominium. To decide if the sample data support the 55%, state your decision in terms of the null hypothesis. Use a 0.01 level of significance.

5 points

QUESTION 16

1.For a given set of 12 ranked data values, the sum of the squared differences is 63.18. What is Spearman’s coefficient of rank correlation for the data?

5 points

QUESTION 17

1.Twenty economists were sampled and asked to predict if the national economy would improve during the next 12 months. Eleven of the economists predicted an increase, two economists predicted no change, and seven economists predicted a decrease in the economy. Conduct a hypothesis test at the 0.10 significance level to determine if the majority of economists predict an increase.
The null hypothesis is:

5 points

QUESTION 18

1.Suppose the following are the ages of a group of individuals enrolled in a study looking at the relationship between sleep apnea and Alzheimer’s disease.

67, 87, 92, 86, 83, 85, 72, 65, 68, 73, 98, 78, 61, 90, 85, 84, 83, 72

A) Create a stem-and-leaf plot for the distribution of ages in this study.

B) Interpret the stem-and-leaf plot with respect to the spread of the distribution.

5 points

QUESTION 19

1.Suppose a researcher is interested in determining if there is a relationship between low birth weight and pediatric pneumonia. In order to test this relationship, the researcher will use a σ=746 grams and a margin of error plus or minus 646 grams. How many newborns will the researcher need to sample in order to be 95% confident?

5 points

QUESTION 20

1.In your own words, explain the difference between classification, clustering and association algorithms, give an example of application using each algorithm.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Many students make the mistake of not following the directions. This assignment can have a significant impact on your final grade. Please, be sure you understand the directions and ask if you have questions.

For this project, you will create a proposal to migrate a critical business function to the cloud at an organization you are familiar with or can easily research.

Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper must include the following sections. Each explicitly listed with a heading.

  • Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function: Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution: Describe your proposal for moving the function to the cloud. Be specific and detailed. What services would you use? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be a minimum of 2 pages. For example, indicate the specific services you will consume or subscribe to, (if you are moving to AWS, I would expect to see specific services listed such as EC2, S3, Redshift, Lambda, and others). Indicate where storage is duplicated and failovers may be present.
  • Diagram: You must diagram the solution you are proposing
  • Conclusion: Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success.

This paper should not be a cursory overview. This class has a technical focus and this work should center on the proposal of the technical solution. It should detail moving to the cloud, what cloud services will be used, and what the predicted benefits are. This is a persuasive paper trying to convince the organizational leadership to approve a well-defined project to move a function to the cloud. This paper is not an analysis of an organization that has already done so. Do not write about Amazon, Azure, Google, Apple, IBM, or other cloud providers. You may not use Netflix, Xerox, and Fitbit as a topic organization for this paper.

An example would be a company with an on-prem inventory solution – what cloud tools would you employ to replicate it in the cloud. Be sure to provide enough technical detail to be able to propose this project to technical leadership at the organization.

Requirements:
The paper must adhere to APA guidelines, including Title and Reference pages.
You must list at least three scholarly sources listed on the reference page. They must apply to your paper.
You must have at least four headings listed above.
You must cite each source in the body of the paper to give credit where due.
Per APA, the paper should use a 12-point Time New Roman font, double-spaced throughout, and you must indent the first sentence of each paragraph .5 inches.
The body of the paper should be a minimum of 6 pages in length.
The Title and Reference pages do not count towards the page count requirements.
Check your work with grammarly.com before submitting it.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Many students make the mistake of not following the directions. This assignment can have a significant impact on your final grade. Please, be sure you understand the directions and ask if you have questions.

For this project, you will create a proposal to migrate a critical business function to the cloud at an organization you are familiar with or can easily research.

Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper must include the following sections. Each explicitly listed with a heading.

  • Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function: Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution: Describe your proposal for moving the function to the cloud. Be specific and detailed. What services would you use? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be a minimum of 2 pages. For example, indicate the specific services you will consume or subscribe to, (if you are moving to AWS, I would expect to see specific services listed such as EC2, S3, Redshift, Lambda, and others). Indicate where storage is duplicated and failovers may be present.
  • Diagram: You must diagram the solution you are proposing
  • Conclusion: Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success.

This paper should not be a cursory overview. This class has a technical focus and this work should center on the proposal of the technical solution. It should detail moving to the cloud, what cloud services will be used, and what the predicted benefits are. This is a persuasive paper trying to convince the organizational leadership to approve a well-defined project to move a function to the cloud. This paper is not an analysis of an organization that has already done so. Do not write about Amazon, Azure, Google, Apple, IBM, or other cloud providers. You may not use Netflix, Xerox, and Fitbit as a topic organization for this paper.

An example would be a company with an on-prem inventory solution – what cloud tools would you employ to replicate it in the cloud. Be sure to provide enough technical detail to be able to propose this project to technical leadership at the organization.

Requirements:
The paper must adhere to APA guidelines, including Title and Reference pages.
You must list at least three scholarly sources listed on the reference page. They must apply to your paper.
You must have at least four headings listed above.
You must cite each source in the body of the paper to give credit where due.
Per APA, the paper should use a 12-point Time New Roman font, double-spaced throughout, and you must indent the first sentence of each paragraph .5 inches.
The body of the paper should be a minimum of 6 pages in length.
The Title and Reference pages do not count towards the page count requirements.
Check your work with grammarly.com before submitting it.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

You will complete your work in Visual Studio, being sure to work from the project file you already created in a previous milestone. This file already has the libraries set up correctly and contains the 3D object you built, which will be necessary for you to add to this week.

Specifically, you must address the following rubric criteria:

  • Create a 3D plane to situate a 3D scene. This will serve as the base for the rest of the objects in your world. Depending on your 2D image this plane may be used to represent a desk, the ground, a table, or something else entirely. It will be important to work on this first so you will understand the scope of the world your camera will be traversing. A plane is also a relatively simple shape so it will be a good place to start when managing the placement of different objects in your scene. Remember, you will need to take into account where the plane is located in relation to the 3D object you developed during a previous milestone (which used multiple 3D shapes).
  • Apply horizontal, vertical, and depth camera navigation around a 3D scene. It is recommended that you use the following keyboard controls to manipulate the basic camera movement:
    • WASD keys: These keys should be used to control the forward, backward, left, and right motion.
    • QE keys: These keys should be used to control the upward and downward movement.
  • Apply nuanced camera controls to a 3D scene. It is recommended that you use the following mouse controls to allow a user more specific input options for how they view the 3D scene:
    • Mouse cursor: This should be used to change the orientation of the camera so it can look up and down or right and left.
    • Mouse scroll: This should be used to adjust the speed of the movement, or the speed the camera travels around the scene.
  • Create perspective and orthographic displays of a 3D scene. Use the tap of a keyboard key to allow a user to change the view of the scene between orthographic (2D) and perspective (3D) views at will. (Hint: check the glViewport and the glOrtho functions.) For consistency, please use the letter “P” keyboard key. To accomplish this work, you will be switching the function call to retrieve either the perspective or orthographic projection matrix. Note that you will be keeping the camera in the same orientation that you already developed.
  • Create code that follows a logical flow without syntax errors. The code you create has to be executable and all the code that is included needs to be reached by the execution. Note that not everything should be written in a single function and your work should be well-modularized.
  • Apply coding best practices in your creations. Pay particular attention to the way you format and comment your code. Program code should be easy to read and follow industry standard code formatting practices, such as indentation and spacing. Commenting best practices should be in place to ensure the source code is briefly and clearly explained using descriptive comments.

Guidelines for Submission

Submit a completed ZIP folder with all of your code, which may include one or multiple CPP files along with Visual Studio project files. Also make sure the ZIP folder includes an EXE file, because without this your code will not be able to run. Checking for the EXE can be used as a quick reference on the functionality of your code before you submit.

Requirements: As long as needed | .doc file

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer science question

You will complete your work in Visual Studio, being sure to work from the project file you already created in a previous milestone. This file already has the libraries set up correctly and contains the 3D object you built, which will be necessary for you to add to this week.

Specifically, you must address the following rubric criteria:

  • Create a 3D plane to situate a 3D scene. This will serve as the base for the rest of the objects in your world. Depending on your 2D image this plane may be used to represent a desk, the ground, a table, or something else entirely. It will be important to work on this first so you will understand the scope of the world your camera will be traversing. A plane is also a relatively simple shape so it will be a good place to start when managing the placement of different objects in your scene. Remember, you will need to take into account where the plane is located in relation to the 3D object you developed during a previous milestone (which used multiple 3D shapes).
  • Apply horizontal, vertical, and depth camera navigation around a 3D scene. It is recommended that you use the following keyboard controls to manipulate the basic camera movement:
    • WASD keys: These keys should be used to control the forward, backward, left, and right motion.
    • QE keys: These keys should be used to control the upward and downward movement.
  • Apply nuanced camera controls to a 3D scene. It is recommended that you use the following mouse controls to allow a user more specific input options for how they view the 3D scene:
    • Mouse cursor: This should be used to change the orientation of the camera so it can look up and down or right and left.
    • Mouse scroll: This should be used to adjust the speed of the movement, or the speed the camera travels around the scene.
  • Create perspective and orthographic displays of a 3D scene. Use the tap of a keyboard key to allow a user to change the view of the scene between orthographic (2D) and perspective (3D) views at will. (Hint: check the glViewport and the glOrtho functions.) For consistency, please use the letter “P” keyboard key. To accomplish this work, you will be switching the function call to retrieve either the perspective or orthographic projection matrix. Note that you will be keeping the camera in the same orientation that you already developed.
  • Create code that follows a logical flow without syntax errors. The code you create has to be executable and all the code that is included needs to be reached by the execution. Note that not everything should be written in a single function and your work should be well-modularized.
  • Apply coding best practices in your creations. Pay particular attention to the way you format and comment your code. Program code should be easy to read and follow industry standard code formatting practices, such as indentation and spacing. Commenting best practices should be in place to ensure the source code is briefly and clearly explained using descriptive comments.

Guidelines for Submission

Submit a completed ZIP folder with all of your code, which may include one or multiple CPP files along with Visual Studio project files. Also make sure the ZIP folder includes an EXE file, because without this your code will not be able to run. Checking for the EXE can be used as a quick reference on the functionality of your code before you submit.

Requirements: As long as needed | .doc file

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

I’m working on a computer science question and need an explanation and answer to help me learn.

Write a program that allows the user to create and maintain a list of contacts in a file named MyContacts.txt. Each contact will have a name and a phone number. In the file, each line should have a contact’s name followed by their phone number. Note: To simplify things, for this assignment, you may assume that every contact’s name will just be a single word (i.e. no last names)

For example, if your file has two contacts in it, it might look something like this:

Bob 555-1234
Jill 555-4321

Recall that if you try to open a file for reading before it exists, the program will crash. Therefore, assume the user will first try to add a contact as their first option (i.e. I won’t try to print the list or print a number first when I’m testing your code). In the addContact method, when you open a file for appending, it will be created for you.

In a while loop, continually ask the user what option they would like to choose. Each option (other than the quit option) should call a function which performs a specific task. Their options are:

1. Call a function named printList: This function should print out the data in MyContacts.txt in the following way:

Contact 1: Bob Phone Number: 555-1234

Contact 2: Jill Phone Number: 555-4321

etc…

2. Call a function named findNumber which will find the phone number of a specific contact by asking the user enter a name. If the name is found in MyContacts.txt, return its corresponding phone number. Otherwise, return the empty string (quote-quote). Back in main, if a number is returned from findNumber, print it out. If the empty string is returned, tell the user the contact doesn’t exit.

3. Call a function named addContact which will allow the user to add a contact to the file. In this function, ask the user to enter a name and phone number and then append these values to the end of MyContacts.txt. Again, you may assume that the user will only enter single-word names.

4. Quit the program

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Business Requirements

Overview

This is the second of a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been tasked with delivering an information technology project plan in anticipation of the company relocating to a new facility. In the first course deliverable, you created a project plan inception document and supporting Gantt chart. This deliverable spelled out the company’s background information and business and provided an overview of the company’s information system infrastructure.

In this second course project deliverable, you are responsible for developing the business requirements to be incorporated into the information systems design you are creating.

Procuring quality business requirements is a critical step when designing quality information systems. Completing a quality requirements document captures user needs and expectations to facilitate the proper design of the company’s infrastructure and information systems.

This assignment consists of two parts:

Part 1: Business Requirements

You will develop a 5–7-page business requirements document for your hypothetical e-commerce company as part of the overall information systems project plan you are creating. Using the Business Requirements Template [DOCX], you will speculate on the company’s current and future requirements. Your assumptions need to be carefully considered and realistic.

Part 2: Updated Gantt Chart

You will use Microsoft Project to update the supporting project Gantt chart begun in your previous course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: Business Requirements

Using the Business Requirements Template, you are to write a 5–7-page business requirements document for your hypothetical e-commerce company in which you:

  1. Describe the functional business requirements (scope) and scope control.
  2. Describe non-functional business requirements, such as governance, risk, and compliance.
  3. Describe technical requirements to integrate various e-commerce infrastructure components.
  4. Identify potential risks, constraints, and assumptions.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart

Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the business requirements document.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the business requirements portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Overview

This assignment is a prerequisite for Milestone One. In this assignment, you will utilize your new skills in JavaScript to refactor the website code based on the client wireframe. You will organize the default code and folder layout into a structure that reflects a Model View Controller (MVC) approach to the software design.

Templating is a development technique used to build views dynamically. Handlebars (HBS) is a templating system offering extensibility and minimal logic that you will use in this assignment. You will learn about the application of HBS and MVC to produce efficient code that renders a website quickly.

Prompt

Follow the instructions in the MVC Routing section of the CS 465 Full Stack Guide. You will need to refactor the structure of the HTML travlr website using the MVC pattern (adding a route and controller). The website must align with the customer requirements found in the wireframe description (provided in the Project Guidelines and Rubric). You will continue this process for additional pages. Then you will begin implementing HBS templates. You will convert the static page to an HBS template page, then insert HBS directives to enable rendering of the views.

Once completed, submit a zipped file folder of your assignment work. Be sure your submission addresses the following:

  • Build the appropriate MVC architecture for templating and rendering data for the website.
  • Develop and run routes and controllers for a public website aligning to your client’s wireframe and software requirements.
  • Utilize the HBS templating engine to place directives into templates, and an MVC approach to display features in the web application.
  • Utilize the HBS templating engine to render HTML within the website.

Guidelines for Submission

Submit a zipped file folder that contains a new “app_server” folder with routes and views folders, as well as updates to app.js to register the new “traveler” controller class with the application.

Please note: You will also “push” your local Git repository module2 branch to your GitHub repository. This procedure will become second nature to you as you move through the course modules. In the end, you will have a full stack web application with branches that represent key stages of building a full stack application leading up to full project completion.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Overview

In this assignment, you will be creating a simple project in Android
Studio. This will provide you with a base to start with, which you will
add to in a later module. Be certain to save your work, as it will
support your success in the future of this course.

Prompt

To begin, open the Android Studio Layout Editor. For more details on
how to open and use the Android Studio Layout Editor, review the Android
Developers – Build a Simple User Interface reading that is linked in
this module’s Resources section.

Specifically, you must address the following rubric criteria:

  • Create a new Android Studio project with an empty activity. Complete the following in your set-up:
    • Name the project and be sure to include your name in the title. Make sure the selected language is Java.
    • Select API 28: Android Pie as the target SDK.
    • Once the new project loads, edit the existing activity_main.xml file.
    • Delete the existing TextView object.
    • Create a new layout of your choosing. The layout must include a
      button, a TextView, and a plain text (also known as an EditText).
  • Identify the Android Studio elements using relevant names. To accomplish this task, complete the following:
    • Name the button’s text as “Say Hello”.
    • Remove all text from the TextView.
    • Label the ID of the button as “buttonSayHello”.
    • Label the Plain Text as “nameText”.
    • Label the TextView as “textGreeting”.
  • Discuss any challenges you experienced with Android Studio.
    Now that you have had time to explore Android Studio, use this space to
    talk about your initial experience and ask any questions that you have.
    Explain any challenges you are experiencing with accessing or using
    Android Studio so that you will be prepared for later work in this
    course.

Guidelines for Submission

Submit your completed work in a Microsoft Word document. Include a
screenshot of the Layout Editor showing your activity_main layout and
your three objects (button, TextView, and plain text), and a discussion
of your challenges that is at least 200 words long.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Mindset

In week 1 discussion you provided a brief bio introducing yourself to your peers. You shared the following with your peers:

  • Your work experiences
  • Your educational goals
  • What you hope to gain from this course
  • Your industry (i.e. medical, retail, Pharmaceutical etc.) and the position you hold

Based on this discussion, you are asked to join a special team that focuses on managing risk for the organization’s information system assets. Your first assignment is to brief the on-boarding stakeholder about the company’s profile and the roles and responsibilities you have within the organization. As a new member of the risk management team, you will begin by performing an in-depth research of your industry and your role and responsibilities.

1. Research

2. Tasks

Part 1: Complete the “Organization and Industry Segment” form to deliver with your package

Organization and Industry Segment

Directions: Select an area of industry that you are interested in and create a hypothetical business, or you may use your current business. Complete the following sections to define the business environment and industry segment.

Company Details

Company name:

Established date:

Physical address (indicate if this is a cloud-based business):

Website URL:

Phone:

Fax:

Email:


Line of Business

Vision Mission Statement and Goals

Mission Statement:

Vision Statement:

Security Goals and Objectives:

Major Stakeholders (government, customer, employees, etc.)

Company Organizational Flow (use the job title only is ok):


Industry Information (finance, education, etc.)

Products and Services

Main Products:

Service Offerings:

Consumer Base:


Technology and Security Solutions (main technology use for critical business function)

Security Framework At least one):

Governing Laws (at least one):

Industry Compliance (at least one):

Part 2: Create a 2- to 3-minute video for the new stakeholder (a novice to information security), addressing the following:

  • Define the following terms:
    • Disaster recovery
    • Business continuity
    • Risk management
  • Describe any experience or skills that will contribute to the disaster recovery and business continuity efforts
  • What is your assigned role and responsibilities as a team member

Pay particular attention to the following:

  • Appearance and manner exhibit exemplary professionalism in the video.
  • The video is taken in an environment totally free of distractions.
  • video includes an appropriate introduction and purpose statement, along with seamless transitions between prompts.

3. Submission

  • Complete the form and submit both to this assignment dropbox.
  • *********NOTE: you will need this information for future assignments***********

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

****************TERM PAPER TOPIC – Internet Safety for Kids*******************

Paper Requirements:

Required topic headings for your paper should include the background surrounding the issue, a historical
perspective, current issues that are applicable, legislation dealing with this topic, examples, global
dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective,
and a summary. These are the topics to be discussed in the term paper

Each paper should contain a reference list of at least five (5) different substantial and quality references. The
references and reference citations for the term paper must be to a current event less than 3 years old (a
reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper
and a reference at the end of the paper to which the reference citation applies. You must include some
information obtained from the reference in your answer. The references must be found on the internet
and you must include a URL in your reference so that the reference can be verified.

You cannot use information from the text book or any book/article by the author of the text book as a
current event. Make sure that your reference has a date of publication.

The body of the paper should be a minimum of six typed double spaced pages. Your cover page and
reference page cannot be counted in this number. You should use the APA format for your reference citations
and the reference page.

This course has been designated as a global course which includes the requirement that you must place this term
paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for
grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync
Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences
Instructions.docx

Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm),
Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.
Check out www.citationmachine.net for tips on properly citing works.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

  1. Open excel file: download
  2. Click the Challenge tab in the bottom-left of the workbook.
  3. Create a formula in cell D4 that multiplies the quantity in B4 by the price per unit in cell C4.
  4. Use the fill handle to copy the formula in cell D4 to cells D5:D7.
  5. Change the price per unit for the fried plantains in cell C6 to $2.25. Notice that the line total automatically changes as well.
  6. Edit the formula for the total in cell D8 so it also adds cell D7
  7. Open excel file download
  8. Click the Challenge worksheet tab in the bottom-left of the workbook.
  9. In cell D7, create a formula that calculates the tax for the invoice. Use a sales tax rate of 7.5%.
  10. In cell D8, create a formula that finds the total for the order. In other words, this formula should add cells D3:D7.
  11. In cell D9 create a formula that calculates the total after a 10% discount. If you need help understanding how to take a percentage off of a total, check out our lesson on Discounts, Markdowns, and Sales (Links to an external site.).
  12. Open excel file: download
  13. Click the Paper Goods tab in the bottom-left of the workbook.
  14. In cell D4, enter a formula that multiplies the unit price in B4, the quantity in C4, and the tax rate in E2. Make sure to use an absolute cell reference for the tax rate because it will be the same in every cell.
  15. Use the fill handle to copy the formula you just created to cells D5:D12.
    1. Click the Catering Invoice tab. You may need to click on the left arrow in the tab area to see the Caterinig Invoice tab.
    2. Delete the value in cell C5 and replace it with a reference to the total cost of the paper goods. Hint: The cost of the paper goods is in cell E13 on the Paper Goods worksheet. See tutorial on cell referencing to multiple worksheets.
    3. Click on the Menu Order worksheet and use the same steps used to calculate the sales tax for each item on the Menu Order worksheet. The total cost in cell E14 should update. Then, in cell C4 of the Catering Invoice worksheet, create a cell reference to the total you just calculated. Note: If you used our practice workbook to follow along during the lesson, you may have already completed this step
    4. .
    5. Open excel file: download
    6. Click the Challenge tab in the bottom-left of the workbook.
    7. In cell F3, insert a function to calculate the average of the four scores in cells B3:E3.
    8. Use the fill handle to copy your function in cell F3 to cells F4:F17.
    9. In cell B18, use AutoSum to insert a function that calculates the lowestscore in cells B3:B17.
    10. In cell B19, use the Function Library to insert a function that calculates the median of the scores in cells B3:B17. Hint: You can find the median function by going to More Functions > Statistical.
    11. In cell B20, create a function to calculate the highest score in cells B3:B17.
    12. Select cells B18:B20, then use the fill handle to copy all three functions you just created to cells C18:F20.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Prior to beginning work on this assignment, complete all participation and challenge activities for the week’s chapters. In this assignment, you will begin your work on your mobile app design.

Step 1: If you have not already done so, review the instructor feedback for your Week 1 assignment. You will choose one of the mobile app ideas you listed in your Week 1 assignment template and save it to your computer. You will be submitting the Questionnaire template along with your written assignment.

Step 3: Write a paper describing the app, its key features, and user profile. Considering the design process, you may need to revise your key features and user profile from Week 1.

In your paper,

  • Describe why you selected this specific app among the others.
  • Provide a visual of your paper prototype. You may share this via photo, video, PowerPoint slide, or screencast.

Step 4: Create paper prototypes for your app. You may draw these by hand or on the computer using the software of your choice. You can submit your paper prototype via photo, video, screencast, or PowerPoint.

Submit your paper, prototype, and questionnaire via Waypoint.The Creating a Paper Prototype paper

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Summary:

Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy. Reference the attached video (Course Project Ph2 Video.mp4), for a full introduction and demonstration and expectations for this project.

Deliverables:

  • ER Model for the scenario presented.
  • You have the option to use MS Visio (if you have the software) to produce your ER Model.
  • Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model.

Required Software:

  • MS Visio by Microsoft OR
  • ERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.com

Lab Steps:

Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.

Scenario and Business Need

The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.

Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.

Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed. Courses are taught in one of the classrooms at one of the School’s several sites.

Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.

Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.

If you are using MS Visio follow the steps below:

  • Reference the Course Project Ph2 VIDEO.mp4, for a short demonstration and tutorial of this tool, and project overview/ expectations.
  • Open MS Visio
  • Click on the Software Database Template in the main window
  • Select the Database Model Diagram Template to open a new file.
  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.

If you are using ERD PLUS.

  • Watch the recorded short tutorial for this tool. Reference the attached video as follows: Course Project Ph2 VIDEO.mp4.
  • From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATE
  • Reference demonstration video for how to navigate tool, how to create entities, add attributes, relationships, and Cordiality. Demonstration video attached as follows: Course Project Ph2 VIDEO.mp4

Step 3: Define and Database ENTITIES

  • Add an entity for each Table you identified in the Scenario and Business Need.
  • You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.

Step 4: ADD the required ENTITY ATTRIBUTES

  • Add the required Attributes for each Entity that you feel would help to define each Entity as needed.
  • Select one of the attributes to be PRIMARY KEY (PK)

Step 5: Define RELATIONSHIPS

  • Use the Crow’s Feet Notation.
  • Reference recorded demonstrations on how to use these notations, for MS Visio and ERD PLUS. Reference attached video as follows: Course Project Ph2 VIDEO.mp4
  • Drag and drop (draw) relationships between the entities you defined.
  • Connect the ends to the two entities for each relation.
  • Defined the Primary Key for the parent entity.

Step 6: Define CARDINALITY RELATIONSHIP

Set the cardinality for each of your relationships defined in Step 5.

For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.

Step 7: Upload your Work

  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.

Rubric:

  • 40 points: ER Model (MS Visio OR ERD PLUS)
  • 40 points: Entities: Minimum of three entities are represented
  • 40 points: Attributes: Minimum of two attributes for each Entity. Most would require more than two attributes, and I am only requiring two per entity.
  • 40 points: Relationships: Minimum three relationships are presented.
  • 40 points: Cardinality is defined and specific for each relationship with Crow’s foot notation.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

This assignment will test your hardware knowledge and allow you to plan and build a computer system.

You are the IT specialist at Precision Inc. Your non-technically inclined boss has tasked you with building a computer that fulfills a specific purpose for a client on a budget

You will use the PC Part Picker website (https://ca.pcpartpicker.com/) to put together every

part you will need to build the PC that fulfills the requirements (not including tax or peripherals). Make sure you are using the Canadian site for the correct pricing!

Once you have decided what parts will be needed, you will write a memo addressed to your boss

Your memo should be approximately 500 words, not including figures, lists, and references. You must have at least 3 properly sourced references. Your memo should be in a proper memo format, with the following:

● A description of the type of PC that is required. Be clear and specific as your boss does not understand technical jargon.

● The reasoning behind your choices. For example, why does your build require an i7 instead of an i3? Why did you get more RAM rather than a more powerful GPU?

● How close to the budget did you get? Were you able to save the client some money?

● Your memo should refer to a list of parts from PC Part Picker (and where to buy the parts) as an appendix, and not as part of the memo

● Figures (such as benchmark graphs) must be included and should be referenced in the memo and included as appendices

My budget 600$ for a Home office PC for basic productivity

The memo providing justification for going over budget will be crucial here, to explain to the boss and customer why you are going over budget. As I mentioned during the assignment explanation, I will accept you going over budget if the reasoning is sound.

All sources must be properly cited in APA format.

Submitted as a pdf

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Class, the final project is due next week (week 15). Please use this week (where there are no graded activities), to get a start on this final project. Start working on a draft that you can continue to work on into next week for submission in Week 15 (nothing is submitted to Week 14).

Final Project Prompt:

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” (1-2 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section.

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately 5-8 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Summary:

Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy. Reference the attached video (Course Project Ph2 Video.mp4), for a full introduction and demonstration and expectations for this project.

Deliverables:

  • ER Model for the scenario presented.
  • You have the option to use MS Visio (if you have the software) to produce your ER Model.
  • Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model.

Required Software:

  • MS Visio by Microsoft OR
  • ERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.com

Lab Steps:

Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.

Scenario and Business Need

The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.

Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.

Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed. Courses are taught in one of the classrooms at one of the School’s several sites.

Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.

Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.

If you are using MS Visio follow the steps below:

  • Reference the Course Project Ph2 VIDEO.mp4, for a short demonstration and tutorial of this tool, and project overview/ expectations.
  • Open MS Visio
  • Click on the Software Database Template in the main window
  • Select the Database Model Diagram Template to open a new file.
  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.

If you are using ERD PLUS.

  • Watch the recorded short tutorial for this tool. Reference the attached video as follows: Course Project Ph2 VIDEO.mp4.
  • From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATE
  • Reference demonstration video for how to navigate tool, how to create entities, add attributes, relationships, and Cordiality. Demonstration video attached as follows: Course Project Ph2 VIDEO.mp4

Step 3: Define and Database ENTITIES

  • Add an entity for each Table you identified in the Scenario and Business Need.
  • You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.

Step 4: ADD the required ENTITY ATTRIBUTES

  • Add the required Attributes for each Entity that you feel would help to define each Entity as needed.
  • Select one of the attributes to be PRIMARY KEY (PK)

Step 5: Define RELATIONSHIPS

  • Use the Crow’s Feet Notation.
  • Reference recorded demonstrations on how to use these notations, for MS Visio and ERD PLUS. Reference attached video as follows: Course Project Ph2 VIDEO.mp4
  • Drag and drop (draw) relationships between the entities you defined.
  • Connect the ends to the two entities for each relation.
  • Defined the Primary Key for the parent entity.

Step 6: Define CARDINALITY RELATIONSHIP

Set the cardinality for each of your relationships defined in Step 5.

For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.

Step 7: Upload your Work

  • Save the File and ensure to have in your file name PROJECT2_LastName_FistInitial.

Rubric:

  • 40 points: ER Model (MS Visio OR ERD PLUS)
  • 40 points: Entities: Minimum of three entities are represented
  • 40 points: Attributes: Minimum of two attributes for each Entity. Most would require more than two attributes, and I am only requiring two per entity.
  • 40 points: Relationships: Minimum three relationships are presented.
  • 40 points: Cardinality is defined and specific for each relationship with Crow’s foot notation.

Requirements: 5-6 pages

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Prepare and submit a presentation of your topic and review of literature relevant to your topic.Develop a draft of Chapter 2 where you clearly provide a well developed introduction and other sections relevant to your topic. This should be your first complete draft of Chapter Two. In a minimum 10 pages, 30 references

Before submitting, you should carefully review Chapter 2 and check the following:

  • Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.
  • Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?
  • Did you follow the UC APA dissertation template?

Note: You will need to continually review and update Chapter Two as you work on other areas of the dissertation. Chapters are not complete and final until approved by your committee and you successfully defend.develop an introduction to your Chapter 2 where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 30 scholarly references.

Topic – Exploring issues of automation in Healthcare Insurance and how it impacts quality of Healthcare

Background – Problem, Gaps – Too much automation, No human interaction, loss of emotions & helplessness, No options for resolutions, increase in customer complaints and customer satisfaction, higher resolution time.

Significance of the Project Research Questions – What will the paper address – Gaps and what categories should be automated and what shouldn’t be automated?

Theoretical Framework –

Chapter 2 attached Chapter Two (Review of Literature) (DSRT 736)

Introduction
Subsections based on a deductive approach Summary

Note, this is health care insurance, so it will be more backend related automation rather front end. Also can you ensure that we have balance of at least 3 to 4 cons and pros for automation and why they should reduce automation.

Finally, focus on quantitative research, what are the variables you will be measuring based on yoyr theory/model?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Prompt

Begin by opening a Visual Studio project file that has correctly combined C++ and Python, which you already set up in a previous module. Remember you will be working in Release mode rather than Debug mode for this work because it includes Python. Next, add the code from the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files in the appropriate tabs of your project. Be sure you have already reviewed the Module Six Assignment Video or its transcript, as they contain important information regarding what is included in the starter code. Understanding the starter code will help you effectively build off the C++ and Python components you have been given in order to complete the design of a simple math-based program.

The simple math-based program you create will need to be able to print the multiplication table for a given number and double the value of a given number.

As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors might be missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.

Specifically, you must address the following rubric criteria:

  • Design a menu with appropriate user interactions and checks for valid entry. Use C++ to successfully complete this criterion. Your simple program will need a menu that can validate user input and is easy to use. It needs to include options for the display of a multiplication table, doubling a value, and exiting the program. If either of the first two options are selected, then users need to be prompted to input a numeric value. The menu should be displayed using a loop, where the user can choose to exit the program only by selecting option 3. Any user input other than 1, 2, or 3 should result in an error message that returns the user to the menu. An example menu might look like the following:
    1: Display a Multiplication Table
    2: Double a Value
    3: Exit
    Enter your selection as a number 1, 2, or 3.
  • Create code that prints a multiplication table for a given numeric value. Both C++ and Python will be necessary to successfully complete this criteria. Be sure to focus on their interactions as you work. Consider the following steps to help organize your code design. Note that you should have already written C++ code that prompts a user to input a number while working on the menu portion of this assignment.
    • Write C++ code that reads and passes a number, as an integer, to Python. C++ should also call a function in Python to display the multiplication table for the passed parameter. Note that you will be creating that function in the next step. For this step, be sure to check the starter code you were given and use the applicable components.
    • Write Python code to create a multiplication table for the given integer. Name this function MultiplicationTable for consistency. The printed table should include values for the multipliers one through ten. An example result is shown below.
6 X 1 = 6
6 X 2 = 12
6 X 3 = 18
6 X 4 = 24
6 X 5 = 30
6 X 6 = 36
6 X 7 = 42
6 X 8 = 48
6 X 9 = 54
6 X 10 = 60
  • Create code that doubles a given numeric value. Both C++ and Python will be necessary to successfully complete this criteria. Be sure to focus on their interactions as you work. Consider the following steps to help organize your code design. Note that you should have already written C++ code that prompts a user to input a number while working on the menu portion of this assignment.
    • Once the number has been read from the user in C++, call the callIntFunc function. Then pass the Python function name (which you will create in the next step) and the value entered by the user as parameters to the callIntFunc function.
    • Write a Python function to receive the user input and then return that value multiplied by two. For consistency, name the function you create DoubleValue. Refer to the example in your starter code as you work, but remember the example is squaring the value (or multiplying the value by itself) rather than doubling it.
    • In C++, receive the value sent from the Python function (DoubleValue) and display the value on the screen.
  • Apply industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability and maintainability. Remember that you must demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency. This includes the following:
    • Inputting validation and error handling to anticipate, detect, and respond to run-time and user errors (for example, make sure you have option 3 on your menu so users can exit the program)
    • Inserting in-line comments to denote your changes and briefly describe the functionality of the code
    • Using appropriate variable, parameter, and other naming conventions throughout your code

Guidelines for Submission

Submit your completed work as a ZIP file, including all Visual Studio project files that are required to run the program. Reference the Visual Studio Export Tutorial, linked in this week’s Resources section, for guidance on how to download the necessary ZIP folder.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

****************TERM PAPER TOPIC – Internet Safety for Kids*******************

Paper Requirements:

Required topic headings for your paper should include the background surrounding the issue, a historical
perspective, current issues that are applicable, legislation dealing with this topic, examples, global
dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective,
and a summary. These are the topics to be discussed in the term paper

Each paper should contain a reference list of at least five (5) different substantial and quality references. The
references and reference citations for the term paper must be to a current event less than 3 years old (a
reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper
and a reference at the end of the paper to which the reference citation applies. You must include some
information obtained from the reference in your answer. The references must be found on the internet
and you must include a URL in your reference so that the reference can be verified.

You cannot use information from the text book or any book/article by the author of the text book as a
current event. Make sure that your reference has a date of publication.

The body of the paper should be a minimum of six typed double spaced pages. Your cover page and
reference page cannot be counted in this number. You should use the APA format for your reference citations
and the reference page.

This course has been designated as a global course which includes the requirement that you must place this term
paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for
grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync
Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences
Instructions.docx

Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm),
Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.
Check out www.citationmachine.net for tips on properly citing works.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

PROBLEM SET

The attached file contains hypothetical data for working this problem. Goodman Corporation’s and Landry Incorporated’s stock prices and dividends, along with the Market Index, are shown in the file. Stock prices are reported for December 31 of each year, and dividends reflect those paid during the year. The market data are adjusted to include dividends.

  1. Use the data given to calculate annual returns for Goodman, Landry, and the Market Index, and then calculate average returns over the five-year period. (Hint: Remember, returns are calculated by subtracting the beginning price from the ending price to get the capital gain or loss, adding the dividend to the capital gain or loss, and dividing the result by the beginning price. Assume that dividends are already included in the index. Also, you cannot calculate the rate of return for 2015 because you do not have 2014 data.)
  2. Calculate the standard deviation of the returns for Goodman, Landry, and the Market Index. (Hint: Use the sample standard deviation formula given in the chapter, which corresponds to the STDEV function in Excel.)
  3. On a stand-alone basis which corporation is the least risky?
  4. Construct a scatter diagram graph that shows Goodman’s and Landry’ returns on the vertical axis and the Market Index’s returns on the horizontal axis.
  5. Estimate Goodman’s and Landry’s betas as the slopes of regression lines with stock returns on the vertical axis (y-axis) and market return on the horizontal axis (x-axis). (Hint: use Excel’s SLOPE function.) Are these betas consistent with your graph?
  6. The risk-free rate on long-term Treasury bonds is 8.04%. Assume that the market risk premium is 6%. What is the expected return on the market? Now use the SML equation to calculate the two companies’ required returns.
  7. If you formed a portfolio that consisted of 60% Goodman stock and 40% Landry stock, what would be its beta and its required return?
  8. Suppose an investor wants to include Goodman Industries’ stock in his or her portfolio. Stocks A, B, and C are currently in the portfolio, and their betas are 0.769, 0.985, and 1.423, respectively. Calculate the new portfolio’s required return if it consists of 30% of Goodman, 20% of Stock A, 30% of Stock B, and 20% of Stock C.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Question 13 pts

Which of the following Just Basic code waits for the user to click on OK?

Group of answer choices

Flag question: Question 2Question 23 pts

In Just Basic, which variable is the same as answer$?

Group of answer choices

Flag question: Question 3Question 33 pts

In Just Basic, which string function returns a value showing the number of characters in a string?

Group of answer choices

Flag question: Question 4Question 43 pts

Which of the following commands in Just Basic tests multiple conditions and suits better than if …then statement?

Group of answer choices

Flag question: Question 5Question 53 pts

Which of the following is a valid variable name?

Group of answer choices

Flag question: Question 6Question 63 pts

How many times does this program print i?

i=1

do

print i

i = i+1

loop until i >4

Group of answer choices

Flag question: Question 7Question 73 pts

Which of the following best defines an interpreter?

Group of answer choices

Flag question: Question 8Question 83 pts

In Just Basic to use “rem” to add a comment to the end of a code statement, what is placed before “rem”?

Group of answer choices

Flag question: Question 9Question 93 pts

Which of the following Just Basic code DOES NOT display a pop-up dialog window from the main window?

Group of answer choices

Flag question: Question 10Question 103 pts

In Just Basic, which is NOT a proper procedure when assigning a variable name?

Group of answer choices

Flag question: Question 11Question 113 pts

Which of the following commands in Just Basic converts a string that contains a number into a numeric value?

Group of answer choices

Flag question: Question 12Question 123 pts

Which of the following commands in Just Basic converts a numeric value into its string equivalent?

Group of answer choices

Flag question: Question 13Question 133 pts

How many elements are contained in this array?

dim age$(5)

Group of answer choices

Flag question: Question 14Question 143 pts

What’s wrong in the following code?

print “print 9 to 7”
b = 9
do until b = 6
print b
b = b – 1
loop
print

Group of answer choices

Flag question: Question 15Question 153 pts

In Just Basic, which of the following DOES NOT represent a loop?

Group of answer choices

Flag question: Question 16Question 163 pts

var$=”red”

select case var$
case “red”
print “red”
case “green”,”yellow”
print “green or yellow”
case else
print “color unknown”
end select

Group of answer choices

Flag question: Question 17Question 173 pts

In Just Basic to use “a variable” next to a print code statement, what is placed before “the variable”?

Group of answer choices

Flag question: Question 18Question 183 pts

  1. How many times does this program print i?

i=1

do

print i

i = i+1

loop while i < 4

Group of answer choices

Flag question: Question 19Question 193 pts

In Just Basic, which of the following loop repeats a set number of times?

Group of answer choices

Flag question: Question 20Question 203 pts

Which of the following conditions will produce an endless loop for this program below?

i=1
do
print i
i = i+1
loop until i>10

Group of answer choices

Flag question: Question 21Question 213 pts

A local variable is only accessible from within the function.

Group of answer choices

Flag question: Question 22Question 223 pts

The code songs$(10) prints the tenth element in the array.

Group of answer choices

Flag question: Question 23Question 233 pts

An array is an indexed list of values.

Group of answer choices

Flag question: Question 24Question 243 pts

A global variable can be accessible inside and outside a loop.

Group of answer choices

Flag question: Question 25Question 253 pts

The dim statement is used to size an array.

Group of answer choices

Flag question: Question 26Question 2615 pts

Match each question on the left with the corresponding answer on the right.

Group of answer choices

Flag question: Question 27Question 275 pts

What is wrong with this code?

Print “Hello, what’s your name?”
input name$
print “nice to meet you, ” name$
End

11

p0 words

Flag question: Question 28Question 285 pts

What’s wrong in the following code(s)?

Print “Hello, whats your age?”
input age
if age>14
print “You are old enough”
End

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Background: Read the article at the link below by Nicole Fallon “Destination Dream Job”. Pay close attention to the roadmap outlined in the article about career progression. Fallon outlines 4 steps that one needs to take to reach their career goal (see link below). Career experts have also shared their advice for mapping out a path to one’s ultimate dream job. Those steps include: (1) Know where you want to go, (2) Focus on the tools you need, (3) Find a guide, and (4) Be open to changing your route.

www.businessnewsdaily.com/6432-create-career-roadmap.html

Your assignment :

Plot your career direction based on each step in this roadmap. For step #1 you should look at where you are now (what industry, job, position, etc.). Also answer where you want to go (industry, job, position, salary, etc.) from here. For step #2, I would like you to go online and explore various job announcements and position descriptions to see what you need (what experience, degree, certification, interest, passion, etc.). In this context, I also would like you to state how pursuing this degree, and this course specifically, is a tool for the career direction in which you are going. Then for step #3, do you know anyone who might be a mentor; are you pursuing opportunities to network with like-mined professionals, etc. Finally, for step #4, is there some short-term deviation from your goal that you would accept – what is it?

It should take just a short paragraph that address each of the four steps mentioned above. The background and online research for this assignment can be done collectively in your group. However, the findings must be specific for you individually and so your post must be individual. As I have always mentioned, do not cut and paste information from other sources – I want your view and in your words. As your reader, I want to be able to follow whatever sources you use, so support your views (and findings) with at least two in-text citations . This means you will also need a reference list. For this assignment (only), a url reference is acceptable (not usually acceptable for APA). This is an individual assignment which must be accomplished by you alone. Please post your paper to iLearn NLT 6/11 – 8pm EST.

When you are ready to post, click the Res Wknd Practical Connection assignment link, then Either click the “Write Submission” link and directly paste your document into this assignment box OR Browse your Computer and add the entire Microsoft Word document as an attachment (Mac users, please remember to append the “.docx” extension to the filename).

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

For this assignment, we will be working on understanding the customer service experience offered by a hypothetical airline. When support is required, a customer initiates contact with the airline, either over the phone or using an online platform. Once connected, an agent of the airline works with the customer to understand the problem. When the interaction is complete, the agent creates records about the case. This includes the overall category of the issue along with whether the problem was resolved.

The airline would like to better understand the differences between support provided over the phone and online. With different types of interactions, the agents require different kinds of training, and the costs and resources are different in each modality. With this in mind, the airline is quite interested in comparing the quality of each type of service with regard to how well the cases can be resolved. They are also generally interested in improving their customer service and better understanding the experience.

In this assignment, we will be working with the information provided and consider the question of how to best understand the customer service experience.

Data

For each call, the following characteristics were measured:

category: Each case was classified according to the type of service that was requested by the customer.

service: This indicates whether the support was provided by phone or online. waiting.time.minutes: This records how long the customer waited to begin interacting with

an agent.

session.minutes: This records how long the customer interacted with the agent.

customer.demeanor: This records the agent’s perception of the customer based on the tone of the conversation.

resolved: This measures whether the agent was able to solve the customer’s main concern in the interaction.

Instructions

Based upon the information above and the data provided, please answer the following questions. When numeric answers are requested, a few sentences of explanation should also be provided. Please show your code for any calculations performed.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Over the past few weeks, we have learned how to develop the project scope, schedule, and cost baselines. While these are useful exercises, it is important for a project manager to acknowledge that human beings, unlike robots and machines, need to be motivated, trained, feel reassured and valued, etc. in order to be productive. All too often, the project management effort is overly obsessed with estimates, duration, costs, and schedules and downplays (or even ignores) engagement, motivation, and productivity – the invisible factors that can affect those very estimates, duration, costs, and schedules (and thereby affect project outcomes). After all, it is hard to measure and manage what is not visible!

The Develop Team process aspires to address this issue by trying to ensure that teams and individuals are engaged, motivated, and productive. However, this is more easily said than done. Read this brief Gallup article and this Wrike article and then quickly peruse this Gallup Meta-Analysis Brief to appreciate how team and employee engagement and motivation affect productivity and organizational well-being, and to also realize that the business world has much to do to address this issue. Here’s another Gallup article on the importance of employees’ psychological engagement to project outcomes.

This week’s Individual Assignment will simultaneously address learning curves and engagement/productivity. The notion of learning curves is very simple: if we know how long an individual or team or organization takes to perform a task or endeavor on the first and second attempts, then learning curve theory can predict roughly how long future attempts (on the same or very similar task/endeavor) will take. (Even though projects are unique endeavors, there could be – and usually are – activities that are routine, and which have been performed for earlier projects.) You do not need to understand the computations behind learn curve theory because the attached EXCEL spreadsheet takes care of that. Your goal is to understand how to use the attached EXCEL spreadsheet.

The amber colored cells are the ONLY cells which you should edit (and the green cells are for entering your answers). Cell C1 represents the IDEAL first-attempt time (how long the first attempt takes), and cell C2 represents the IDEAL second-attempt time (how long the second attempt takes). IDEAL means that we are assuming that the employee/team/organization is very highly engaged and motivated and is thus working at peak productivity (100% engagement/productivity factor in cell C3). You can play around with these three numbers (cells C1, C2, and C3) and as you do so you will, thanks to the magic of EXCEL functions and formulas, see the numbers in the second column of the gray table change and provide you the predictions for the future attempts. (DO NOT EDIT THE GRAY TABLE!)

Note that if the engagement/productivity factor is 100%, then the first and second attempt numbers in the gray table will exactly match those you entered in cells C1 and C2. However, if the engagement/productivity factor is less than 100%, then the first and second attempt numbers in the gray table will exceed those you entered in cells C1 and C2. Why? Because if you don’t work at ideal (100%) productivity, then you will take a longer time! The chart on the right simply plots the data in the gray table. The learning percentage is simply the ratio of second attempt time to first attempt time (and it is automatically computed – do not edit it).

You are not required to understand the EXCEL functions and formulas used in the computation of the numbers in the second column of the gray table, but if you simply cannot resist the urge to understand it all, here’s a paper you can peek at: Learning Curve Theory.

There are two parts to this Individual Assignment:

Part A.

Answer the two questions in the EXCEL spreadsheet. Type your answers in the green cells. All you need to do is read each question, enter the appropriate numbers in cells C1, C2, and C3 and then look at the gray table for the answer. It’s that simple!

Part B.

After entering your answers in the two green cells, complete and submit a roughly 3-page double-spaced paper that addresses the points below. No numerical calculations are needed in this paper, but you may base some of your answers on your thoughts/observations associated with the two short EXCEL questions (whose answers you entered in the green cells). You may also refer to information in the articles provided. Be concise but make sure that you clearly and cogently address the points below.

1. What implications does the learning curve have for developing project schedule and cost baselines?

2. What implications do engagement, motivation, and morale have for developing project schedule and cost baselines and for explaining variance from those baselines?

3. How can a project manager gauge engagement, motivation, and morale; and how can a project manager’s behaviors, personality, and attitudes affect engagement, motivation, and morale?

4. How might the level of organizational attention paid to fairness, diversity, equity, and inclusion impact project outcomes and organizational goals?

Submit the completed EXCEL file from Part A and the WORD/PDF file from Part B to

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Problem 1

Instructions: Your solution to this assignment will be submitted via Blackboard by using Word or some other editor for parts 1 and 2; Part 3 will be a java file. PDF or Word are great for Part 1 and Part 2. Your Java class for Part 3 should be submitted as .java file.

Part 1: Model a real world entity. completion. You may use the idea you started in class or something else. You need to include identity, at least 3 attributes, and at least 3 methods. Do this in a text-type document.

Part 2: Create a UML diagram for your object in Part 1. Be sure that you have at least one constructor to your diagram in addition to the attributes and methods. The diagram should be displayed similarly to the way we covered in class.

Part 3: Create the Java class for your object from your UML diagram in Part 2. The class should compile but you do not need to create a main to demonstrate that the class is runnable.

Problem 2: 9.1 (The Rectangle Class) pg. 360 in the textbook

Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:

■ Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height.

■ A no-arg constructor that creates a default rectangle.

■ A second constructor that creates a rectangle with the specified width and height.

■ A method named getArea() that returns the area of this rectangle.

■ A method named getPerimeter() that returns the perimeter.

Draw the UML diagram (using Word or some other editor) for the class and then implement the class. Write a test program that creates two Rectangle objects—one with width 4 and height 40

and the other with width 3.5 and height 35.9. Display the width, height, area,

and perimeter of each rectangle in this order.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

I need 10 page paper and 12 slides ppt excluding intro and reference page.And must and sure no plagiarism. Any plagiarised work may cause 6 members out of CPT program.

Include Intext citations and references in Apa format

Residency Project

Discuss the project and it’s required components:

Please ensure to review the basics from chapters 1-3 and relate these basic concepts to the predictive analytics components from part two (Chapters 4-7) in your text by:

Selecting a project in a company (this can be a made-up project but must be realistic). Note the current industry, name of the organization, and note how it’s currently functioning today.

Then select a key area of predictive analytics (from chapters 4-7) to implement in the organization. You must indicate:

Why the predictive analytic component is going to be implemented by noting the problem that you are trying to solve, noting how your team will solve the problem with the selected method (this must be a thorough in-depth analysis), and also present your findings using a power point presentation.

Note any Big Data Challenges or other technology or cultural challenges you may face and how you will mitigate these challenges in your presentation.

Prelim:

Break up the class into teams

Before the class ends for the night they should prepare a 1-page outline noting the following information:

The project they are selecting

The company and industry they are focusing on and related rationale

The overview of how the company is functioning today and the problem the team is trying to solve (at least high-level)

The chapter method they are focusing on – Chapter 4-7 and why they have selected this area to focus on

Delivery:

Friday we will start the basic research and create the high-level outline.

Prepare a 1-page outline noting the following information:

The project they are selecting

The company and industry they are focusing on and related rationale

The overview of how the company is functioning today and the problem the team is trying to solve (at least high-level)

The chapter method they are focusing on – Chapter 4-7 and why they have selected this area to focus on

Saturday the team will work on the paper and should have a timeline for how they are going to tackle the work

Sunday the paper will be finalized and the presentation will be completed.

https://m.box.com/shared_item/https%3A%2F%2Fucumberlands.box.com%2Fs%2F9nc89oqsavthkigg65ka87jmzr3ahdzv/browse/105741955682

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

I need a 10 page paper and 12 slides ppt.Make sure no plagiarism. If you plagiarised 6 members will be out if CPT program .

Include Intext citations and references in APA format.

Residency Project

Discuss the project and it’s required components:

Please ensure to review the basics from chapters 1-3 and relate these basic concepts to the predictive analytics components from part two (Chapters 4-7) in your text by:

Selecting a project in a company (this can be a made-up project but must be realistic). Note the current industry, name of the organization, and note how it’s currently functioning today.

Then select a key area of predictive analytics (from chapters 4-7) to implement in the organization. You must indicate:

Why the predictive analytic component is going to be implemented by noting the problem that you are trying to solve, noting how your team will solve the problem with the selected method (this must be a thorough in-depth analysis), and also present your findings using a power point presentation.

Note any Big Data Challenges or other technology or cultural challenges you may face and how you will mitigate these challenges in your presentation.

Prelim:

Break up the class into teams

Before the class ends for the night they should prepare a 1-page outline noting the following information:

The project they are selecting

The company and industry they are focusing on and related rationale

The overview of how the company is functioning today and the problem the team is trying to solve (at least high-level)

The chapter method they are focusing on – Chapter 4-7 and why they have selected this area to focus on

Delivery:

Friday we will start the basic research and create the high-level outline.

Prepare a 1-page outline noting the following information:

The project they are selecting

The company and industry they are focusing on and related rationale

The overview of how the company is functioning today and the problem the team is trying to solve (at least high-level)

The chapter method they are focusing on – Chapter 4-7 and why they have selected this area to focus on

Saturday the team will work on the paper and should have a timeline for how they are going to tackle the work

Sunday the paper will be finalized and the presentation will be completed.

https://m.box.com/shared_item/https%3A%2F%2Fucumbe…

This link has text book. 11th edition

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

APA FORMAT, PLAGIARISM, GRAMMARLY, REFERENCE….

Research Paper Format

⚫ You should follow the following content format:

⚫ Title: Topic: CHOSE ANY TOPIC RELATED TO GIVEN EXAMPLE

You have been asked by management (manufacturing, healthcare, retail, financial, and etc.,) to create a research report using a data mining tool, data analytic, BI tool. It is your responsibility to search, download, and produce outputs using one of the tools. You will need to focus your results on the data set you select.

example

1. Using data mining techniques for learning systems….

2. How to improve Health Care System using data mining techniques…

3. Design and develop Network/Information Security using data mining techniques…

4. How efficiently extract knowledge from a big data using data mining techniques…

5. Using data mining techniques to improve the financial/stock information systems…

⚫ Team Names

⚫ Group Name: Group No #.

I. Introduction

II. Background [Discuss tool, benefits, or limitations]

III. Review of the Data [What are you reviewing?]

IV. Exploring the Data with the tool

V. Classifications Basic Concepts and Decision Trees

VI. Other Alternative Techniques

VII.Summary of Results References Research Paper Instructions

⚫ No! ZIP file

⚫ At least 20 pages (not including heading and content list pages) and 5 references.

⚫ Use 12-font size and 2.0 lines space

⚫ No more than 5 figures and 5 tables

Research Paper Grading Rubrics

⚫ Please see as follows: – Organization of Ideas (Original ideas are effectively developed and presented in a logical, sequential order throughout the entire assignment. Includes adequate and appropriate supporting evidence): 20/20 percent

– Application of Course Knowledge and Content (Thorough technical application of course knowledge and content in a complete and concise manner): 20/20 percent

– Comprehension of Assignment (Addressed the question completely and thoroughly. Provided additional supporting evidence, demonstrating a full comprehension of subject matter): 20/20 percent

-Assignment Grading Rubrics

⚫ Please see as follows: – Writing Skills (Mechanics (APA format, spelling, grammar, and punctuation) are flawless, including proficient demonstration of citations, formatting throughout the entire assignment, at least 20 pages): 20/20 percent

– Research Skills (Accurate and applicable use of resources relevant to the subject matter that enhance the overall assignment): 20/20 percent

PPT Presentation Format

⚫ You should prepare at least 6 slides to present your topic on the residency day.

⚫ Title: Topic TAKE FROM Research PAPER

⚫ Team Names:

⚫ Group Name:

Group No #.

– 1 slide – introduce your topic, and provide abstracted description

2 – 3 slides – show the background/hypotheses to support your research topic (current technology or research papers)

– 4 – 5 slide – research methods and a time-line – 6 slide – conclusion

PPT Presentation Grading Rubric

⚫ Please see as follows: –

Organization of Ideas (Original ideas are effectively developed and presented in a logical, sequential order throughout the entire assignment. Includes adequate and appropriate supporting evidence): 25/25 percent

– Subject Knowledge and Content (Thorough technical application of course knowledge and content in a complete and concise manner): 25/25 percent

– Comprehension of Assignment (Addressed the question completely and thoroughly. Provided additional supporting evidence, demonstrating a full comprehension of subject matter): 25/25 percent

– Level of Presentation (Level of presentation is appropriate for class. Most of the information is appropriate. PPT forms, images, layout, and texts are appropriate): 25/25 percent

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Write solutions to the following problems involving classes and

Please write your own code. Do not copy from other solutions.

member functions using ONLY the C++ programming language.
For these questions, you will ONLY be writing the required
functions (prototyped exactly below).
The main( ) program to test your solutions will be provided for
you (also below).

SUBMISSIONS MUST NOT INCLUDE main( )
When submitting your code, you are NOT to include the main( ) function
and you may NOT add ANY additional C/C++ header files using the #include
directive other than the ones already provided with the main( ) below.
You will only be submitting the code containing YOUR solutions.

Symbolic constants using #define and any additional functions that you
wish to add may be included (provided the functions are properly prototyped).

Learning Outcomes:

After completing this lab, you will have demonstrated the ability to:
1. Edit, compile, and run C++ programs.
2. Declare, create, initialize, assign values to, and pass
   class objects to functions.
3. Use .cpp files to declare and define classes.
4. Use constructors to properly initialize object data members.
6. Write C++ member functions to perform specific routines with
   C++ objects.
SPECIFICATIONS:

The Mississauga Institute of Technology (M.I.T.) would like you
to demonstrate your knowledge of C++ to help them rewrite their
robotics software that was originally written in FORTRAN.
They would like you to write the code for a class called "Directive"
which will be used to encapsulate a keyword
(a string no longer than 40 characters) and a series of modifiers
(an array of 5 strings, each string being no longer than 20 characters).

// class declaration:

class Directive {
   private:
      char keyword[41];
      char modifiers[5][21];
      int wordCount, modNum;
   public:
      int words(const char *sentence);
      int matchDirective(const char *str, const char *sentence, int wordNum);
      Directive( );
      Directive(const char *data);
      int modifierCount( );
      int validDirective(const char *phrase);
      void getKeyword(char *s);
      void getModifier(char *s, int pos);
};
A "Directive" has the following publicly accessible characteristics
(member functions):

int words(const char *sentence)
   which returns the number of words in the string "sentence". For
   the purpose of this assignment, a "word" is defined to be a sequence
   of non-null, non-whitespace characters, separated from other words
   by whitespace. (Recall that whitespace is any sequence of one or
   more spaces, tabs and newlines).

   For example,

   words("Welcome  to    the  \n  \t\t\t robotics department")

   returns the value 5, and

   words("\n  \t   \t      \t       \n\n          ")

   returns 0.
int matchDirective(const char *str, const char *sentence, int wordNum)

   which returns a true value if the string "str" matches the part of
   the string "sentence" starting at word number "wordNum" of "sentence",
   and a false value otherwise. Special rules for determining a match are
   as follows:
   (1) the match is case insensitive. For example, 'A' matches both
       'a' and 'A'.
   (2) the end of "str" must not fall in the middle of a word in
       "sentence", for it to be considered a match.
   (3) The word number in "wordNum" is a value starting at 1, so that
       1 refers to the first word, 2 refers to the second word, and
       so on. If "wordNum" is less than 0 or greater than the number in
       "sentence", then no match will be found.

For example,

    matchDirective("left", "Proceed three units forward  and   turn  left", 7)

returns a true value, while

    matchDirective("left", "Proceed three units forward  and   turn  left", 3)

returns false. Similarly,

    matchDirective("*r2-d2*",
	  "Good     morning   \n\t  *R2-D2* &  c3-p0  ", 3)

returns true, however,

    matchDirective("robot",
	  "Welcome  to    the  \n  \t\t\t robotics department", 4)

returns false, since "robot" ends in the middle of the word "robotics".
Directive( )
   This function initializes the object's keyword to "go", and its
   modifiers to "north", "south", "east", "west", and "start"
   in this order respectively.
Directive(const char *data)
   This function is passed a constant string "data" which contains
   one (1) keyword and may contain a series of up to five (5)
   modifiers, each separated by the ';' semi-colon character. This
   function initializes the object's keyword and its modifiers to
   the values contained in the string 'data'. If more than 5 modifiers
   are found in 'data', then only the first 5 are used.

   An example of the constant string "data" might be:

   "turn;left;right;east;west;back"
    |__| |1_| |_2_| |3_| |4_| |5_|
     |    |_ _ _|_ _ |_ _ | _ _|_ _ series of 5 modifiers (note the order).
     |
     keyword

   Another example of "data" might be:

   "turn;left"
    |__| |1_|
     |    |_ _ only 1 modifier
     |
     keyword

     NOTE: You may assume that the array "data" will ALWAYS contain a
     keyword, however it may contain 0, 1, 2, 3, 4, 5, 6, or n modifiers.
int modifierCount( )
   This function returns the number of modifiers that have been
   properly initialized in the Directive object.
int validDirective(const char *phrase)
   This function will determine if any keyword or keyword-modifier
   combination is present in the string "phrase".
   HINT: You can use the matchDirective( ) function written earlier to
	 help complete this function.

   The function returns the following integer values:

return  combination:
value:
1       Only the keyword is present in "phrase" and no modifiers follow it.
	NOTE: modifiers may precede the keyword, but are considered
	meaningless and do not impact the result.

(e.g.)  keyword:   "turn"
	modifers:  "left", "right", "east", "west", "back"
	Then a phrase of: "do not turn here", would return a value of 1.

2 - 6   The keyword AND a modifier are present in "phrase".
	The return value here will depend on what position in the array the
	modifier is located. A value of 2 will be returned when the
	keyword and the first (1st) modifier are present. A value of 3 is
	returned when the keyword is followed the second (2nd) modifer, etc.

	NOTE: Modifiers preceding the keyword, or following the
	      first valid modifier are to be ignored and will not impact
	      the result.

(e.g.)  A phrase of: "turn left here"
		      |__| |__|
		      |     |_ modifier (index=0, value=1)
		      |
		      keyword (value=1)
	returns a value of 2 (1 + 1).

(e.g.)  A phrase of: "left turn to the     west then right then go   back"
		      |__| |__|            |__|      |_ _|           |__|
	  ignored _ _ _|    |               |         |_ __ _ _ _ _ _ _|
	  modifier          |               |         |
			    |               |         ignored
			    |               |         modifiers
			    |               |
			    |               |_ _ 1st valid modifier found
			    |                    (index=3, value=4)
			    |
			    keyword (value=1)

     returns a value of 5 (1 + 4).

0       No keyword is present in the string "phrase". Modifiers by
	themselves without a keyword are considered meaningless.

	NOTE: The string "phrase" can be of any size and may contain any
	      number of words. If more than one (1) modifier follows the
	      keyword, only the first modifier encountered is used.

	NOTE: You are expected to use the matchDirective( ) and words( ) functions
	      you wrote earlier to help complete this function.
void getKeyword(char s[ ])
   Fills "s" with the object's keyword. You may assume that the array "s"
   will be large enough to hold the keyword.
void getModifier(char s[ ], int pos)
   Fills "s" with the object's modifier at number "pos" (where a "pos"
   of 0 is the first modifier, 1 is the second modifier, and so on).
   You may assume that the array "s" will be large enough to hold the
   modifier. If "pos" is not the number of one of the object's
   modifiers, then s will be filled with an empty string ("").

MAIN PROGRAM:
///////////////////////////////////////////////////////////////////////////////
//                                                                           //
//  File:        a1main.cpp VERSION 1.10                                     //
//  Written By:  Danny Abesdris                                              //
//  Concept By:  Danny Abesdris & Evan Weaver                                //
//                                                                           //
//  Date:        October 22, 2020,                                           //
//  Main program to test assignment 1 for PRG355, Fall 2021.                 //
//                                                                           //
//  You must not modify this file!                                           //
//                                                                           //
///////////////////////////////////////////////////////////////////////////////

// Your solution may ONLY use functions from the following
// included C and C++ library header files.

#include <iostream>
using namespace std;
#include <cstring>
#include <new>
#include <cctype> // for character handing functions

class Directive {
   private:
      char keyword[41];
      char modifiers[5][21];
      int wordCount, modNum;
   public:
      int words(const char *sentence);
      int matchDirective(const char *str, const char *sentence, int wordNum);
      Directive( );
      Directive(const char *data);
      int modifierCount( );
      int validDirective(const char *phrase);
      void getKeyword(char *s);
      void getModifier(char *s, int pos);
};
#define SIZE 5

int checkInit(Directive &, int *, const char *, const char [ ][21], int);
void errMessage(int);

int main( ) {
   char data[SIZE][121] = {
			   "go;north;south;east;west;start;left;right;home",
			   "look",
			   "pick-up;gold;platinum;crystal;magic-sword",
			   "drop;gold;platinum;crystal;magic-sword",
			   "attack;crystal;magic-sword"
			 };

   char keywords[SIZE][41] = { "go", "look", "pick-up", "drop", "attack" };

   char modifiers[SIZE][SIZE][21] =
      { { "north",   "south",       "east",    "west",       "start"  },
	{ "",        "",            "",        "",            ""      },
	{ "gold",    "platinum",    "crystal", "magic-sword", ""      },
	{ "gold",    "platinum",    "crystal", "magic-sword", ""      },
	{ "crystal", "magic-sword", "",        "",            ""      }
      };

   char phrases[SIZE*3][81] = {
      "  Hello Robot! Please GO \t\t  over   to the \n other   side.",
      "Hello Robot  can you     \n\n\t do    something?     ",
      "Robot \t go over to the Right, then over to the left, then start",

      "Look over to the \n\n \t   \t  right",
      "Robot, can you see what I see?",
      "Did you see that? LOOK over   \n there! No not there, LOOK here!\n",

      "Can you pick up the platinum    gold   and crystal  over there?",
      "Over there, can you Pick-Up the \n\n  \t GOLD   \n?",
      "OK, I will get the crystal gold platinum and pick-UP the Magic-Sword",

      "  drop the crystal     ",
      "Robot, please drop the \n\n  \t\t PLATINUM   ",
      "Look can you see any gold platinum or crystal ?",

      "   Attack with the crystal and the magic sword",
      "You must look around, move up then attack with the MAGIC-sword",
      "ATTACK ATTACK ATTACK! First with a crystal, then with a Magic-Sword!"
   };

   int rvalues[SIZE*3] = { 1, 0, 6,  1, 0, 1,  0, 2, 5,  4, 3, 0,  2, 3, 1 };
   int modc[SIZE] = { 5, 0, 4, 4, 2 };

   int wordsInPhrase[SIZE*3] = { 9, 6, 13, 5, 7, 12, 11, 8, 12, 3, 5, 10, 8, 11, 11 };
   int phraseIndex[SIZE+1] = { 2, 6, 99, 2, 7, 11 };
   char wordToFind[SIZE+1][21] = { "Robot!", "something", "start", "the", "see?", "LOOK here!" };

   int matchRv[SIZE+1] = { 1, 0, 0, 0, 1, 1 };
   class Directive *robots[SIZE]; // SIZE number of Directive object pointers

   char tData[61];
   int i, j, valid=1, rc, count=0, pos=0, k, robotMods;
   Directive tester;

   // first check the words( ) member function
   for(i=0; i<SIZE*3; i++) {
      if(wordsInPhrase[i] != tester.words(phrases[i])) {
	 cout << "Error with your words( ) function for phrases[" << i << "]" << endl;
	 valid = 0;
      }
   }
   if(valid) {
      count++;
      cout << "Passed test " << count << "..." << endl;
      cout << "Your words( ) function worked well..." << endl;
   }
   // now check the matchDirective( ) member function
   for(i=0; i<SIZE+1; i++) {
      if(matchRv[i] != tester.matchDirective(wordToFind[i], phrases[i], phraseIndex[i])) {
	 cout << "Error with your matchDirective( ) function for phrases[" << i << "]" << " and word: '" << wordToFind[i] << "'" << endl;
	 valid = 0;
      }
   }
   if(valid) {
      count++;
      cout << "Passed test " << count << "..." << endl;
      cout << "Your matchDirective(...) function worked well too..." << endl;
   }

   for(i=0; i<SIZE; i++) {
      robots[i] = NULL; // set all Directive pointers to NULL
   }

   for(i=0; i<SIZE && valid; i++) {
      if(i==0) {
	 robots[i] = new Directive( ); // initializing with keyword "go", and modifiers
				     // "north", "south", "east", "west", and "start"
      }
      else {
	 strcpy(tData, data[i]);
	 robots[i] = new Directive(tData);
      }

      // check all Directive object keywords and modifiers
      rc = checkInit(*robots[i], &count, keywords[i], modifiers[i], modc[i]);

      if(rc) {
	 valid = 0;
      }
      else {
	 robotMods = robots[i]->modifierCount( );
	 cout << "Passed test " << count << "..." << endl;
	 cout << "robot object " << count-2 << " keyword: '" << keywords[i] << "'" << endl;
	 for(k=0; k<robotMods; k++)
	    cout << "robot object " << count-2 << " modifier[" << k << "] : '" << modifiers[i][k] << "'" << endl;
      }
   }

   if(valid) {
      count++;
      for(i=0; i<SIZE && valid; i++) {
	 for(j=0; j<3 && valid; j++) {
	    rc = robots[i]->validDirective(phrases[pos]);
	    if(rc != rvalues[pos]) {
	       cout << "Program failed when testing the validDirective( ) function..." << endl;
	       cout << "Phrase: " << "'" << phrases[pos] << "'" << endl;
	       cout << "Your return value-----> " << rc << endl;
	       cout << "Actual return value---> " << rvalues[pos] << endl;
	       valid = 0;
	    }
	    else {
	       cout << "Passed test " << count << "..." << endl;
	       cout << "robot " << i+1 << " understands phrase " << pos << "... very good!" << endl;
	    }
	    count++;
	    pos++;
	 }
      }
   }

   if(valid) {
      cout << "\nCongratulations... You passed all tests!\n";
      cout << "This assignment might just earn you a perfect score!!!\n";
   }
   else {
      errMessage(count);
   }

   // free up ALL allocated memory
   for(i=0; i<SIZE && valid; i++) {
      if(robots[i] != NULL)
	 delete robots[i];
   }
   return 0;
}

int checkInit(Directive &x, int *p, const char *key, const char mod[ ][21], int mc) {
   int rc, num, invalid;
   char keyword[41], modifier[21];

   x.getKeyword(keyword);
   invalid = strcmp(key, keyword);

   if(invalid) {
      rc = 1;
   }

   if(!invalid) {
      for(num=0; num<SIZE && !invalid; num++) {
	 x.getModifier(modifier, num);
	 invalid = strcmp(modifier, mod[num]);
	 if(invalid) {
	    rc = 2 + num;
	 }
      }
   }
   if(!invalid) {
      rc = x.modifierCount( );
      if(rc != mc) {
	 rc = 7;
	 invalid = 1;
      }
   }
   if(invalid) {
      cout << "Program failed when testing the Directive( )/Directive(const char *) constructor(s)...\n";
      cout << "Failed on test " << endl;
      switch(rc) {
	 case 1:
	    cout << *p+1 << " with keyword " << *p+1 << " '" << key << "'\n";
	    cout << "Your keyword-----> " << "'" << keyword << "'\n";
	    cout << "Actual keyword---> " << "'" << key << "'\n";
	    break;
	 case 2:
	 case 3:
	 case 4:
	 case 5:
	 case 6:
	    cout << *p+1 << " with modifier " << num << " '" << mod[num-1] << "'\n";
	    cout << "Your modifier-----> " << "'" << modifier << "'\n";
	    cout << "Actual modifier---> " << "'" << mod[num-1] << "'\n";
	    break;
	 case 7:
	    cout << *p+1 << " on modifier count...\n";
	    cout << "Your modifier count-----> " << x.modifierCount( ) << "\n";
	    cout << "Actual modifier count---> " << mc << "\n";
	    break;
      }
   }
   (*p)++;
   return invalid; // returns (0) true or (1) false
}

void errMessage(int total) {
   cout << "Your program passed " << total << " test(s)..." << endl;
   switch(total) {
      case 0:
      case 1:
      case 2:
      case 3:
      case 4:
      case 5:
      case 6:
      case 7:
	 cout << "Your program still needs considerable work!\n";
	 break;
      case 8:
      case 9:
      case 10:
      case 11:
      case 12:
      case 13:
      case 14:
      case 15:
      case 16:
      case 17:
	 cout << "Your program still needs some work!\n";
	 break;
      case 18:
      case 19:
      case 20:
      case 21:
	 cout << "Your program is almost complete!\n";
	 break;
   }
   cout << "Keep at it!\n\n";
}
/* ========== CODE TO PLACE IN YOUR SOURCE FILE FOR SUBMISSION STARTS BELOW ========== */

// You may add your own helper functions or symbolic constants here.
// The member functions below must ALL be correctly coded

int words(const char *sentence);
int matchDirective(const char *str, const char *sentence, int wordNum);
Directive( );
Directive(const char *data);
int modifierCount( );
int validDirective(const char *phrase);
void getKeyword(char *s);
void getModifier(char *s, int pos);
// ***** NOTE: TEST YOUR PROGRAM ON YOUR OWN COMPUTER FIRST TO SEE IF THE
//             OUTPUT MATCHES EXACTLY WHAT IS LISTED BELOW!!! *****

// The OUTPUT should match EXACTLY what is displayed below
// (including spaces and newlines).
Passed test 1...
Your words( ) function worked well...
Passed test 2...
Your matchDirective(...) function worked well too...
Passed test 3...
robot object 1 keyword: 'go'
robot object 1 modifier[0] : 'north'
robot object 1 modifier[1] : 'south'
robot object 1 modifier[2] : 'east'
robot object 1 modifier[3] : 'west'
robot object 1 modifier[4] : 'start'
Passed test 4...
robot object 2 keyword: 'look'
Passed test 5...
robot object 3 keyword: 'pick-up'
robot object 3 modifier[0] : 'gold'
robot object 3 modifier[1] : 'platinum'
robot object 3 modifier[2] : 'crystal'
robot object 3 modifier[3] : 'magic-sword'
Passed test 6...
robot object 4 keyword: 'drop'
robot object 4 modifier[0] : 'gold'
robot object 4 modifier[1] : 'platinum'
robot object 4 modifier[2] : 'crystal'
robot object 4 modifier[3] : 'magic-sword'
Passed test 7...
robot object 5 keyword: 'attack'
robot object 5 modifier[0] : 'crystal'
robot object 5 modifier[1] : 'magic-sword'
Passed test 8...
robot 1 understands phrase 0... very good!
Passed test 9...
robot 1 understands phrase 1... very good!
Passed test 10...
robot 1 understands phrase 2... very good!
Passed test 11...
robot 2 understands phrase 3... very good!
Passed test 12...
robot 2 understands phrase 4... very good!
Passed test 13...
robot 2 understands phrase 5... very good!
Passed test 14...
robot 3 understands phrase 6... very good!
Passed test 15...
robot 3 understands phrase 7... very good!
Passed test 16...
robot 3 understands phrase 8... very good!
Passed test 17...
robot 4 understands phrase 9... very good!
Passed test 18...
robot 4 understands phrase 10... very good!
Passed test 19...
robot 4 understands phrase 11... very good!
Passed test 20...
robot 5 understands phrase 12... very good!
Passed test 21...
robot 5 understands phrase 13... very good!
Passed test 22...
robot 5 understands phrase 14... very good!

Congratulations... You passed all tests!
This assignment might just earn you a perfect score!!!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Task 1 :

Why is the concept of time value of money important in the corporate context? Justify your answer. A complete post includes an explanation supported by examples and a minimum of 2 research sources. Your post must be substantive and demonstrate insight gained from the course material. A substantial post accomplishes one or more of the following:

  1. discusses the application of time value of money in the corporate setting
  2. offers additional research or examples, in support of the original answer
  3. describes implications of the time value of money concept for capital project financing
  4. compares and contrasts management practices in relation to corporate funds

[Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Once you send initial post. I will attach 2 secondary post which you need to provide reply’s with 200 to 250 words

Evaluation of posts and responses: Your initial posts and peer responses will be evaluated on the basis of the kind of critical thinking and engagement displayed. The grading rubric evaluates the content based on seven areas:

Content Knowledge & Structure, Critical Thinking, Clarity & Effective Communication, Integration of Knowledge & Articles, Presentation, Writing Mechanics, and Response to Other Students.

Task 2:

Assigned Readings:

Chapter 9. Pricing.

Chapter 10. Channels of Distribution.

Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Lawyers are changing their pay structures. It used to be that they would bill hourly (top dollar for top lawyers, less experienced helpers had cheaper rates). Now they’re beginning to price like consultants—per project. Thus they must begin assessing the value-added to the client firm of the legal expertise and assistance. What advice would you give a law firm to proceed fairly and profitably?
  2. Go online and compare three franchises (e.g., franchise.org, americasbestfranchises.com, or whichfranchise.com). Choose two franchises in the same industry (e.g., fast food) and the third franchise from another industry (e.g., hair cutting). Make a table to report the fee structures (upfront, continued licensing), as well as benefits touted for franchisees of each franchise system. What would tempt you to pitch in with some friends and buy a franchise when you finish your degree?

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

[Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced).

Once you send initial post. I will attach 2 secondary post which you need to provide reply’s with 200 to 250 words

Evaluation of posts and responses: Your initial posts and peer responses will be evaluated on the basis of the kind of critical thinking and engagement displayed. The grading rubric evaluates the content based on seven areas:

Content Knowledge & Structure, Critical Thinking, Clarity & Effective Communication, Integration of Knowledge & Articles, Presentation, Writing Mechanics, and Response to Other Students.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

COMPUTATION AND COMPLEXITY PROBLEMS: –

Give proof outlines for each problem statement (in some cases, you must first decide what you want to prove). Formal proof is not necessary, just description of how you think it could be done.

1)Turing Machine character set. In all our Turing Machine examples the characters of the alphabet used by aparticular TM are built into the states:

States look like :

read character C.

if C==1 then (do print something, move L or R and go to state N)

if C==0 then (do print something, move L or R and go to state M)

… and so on.

Does the alphabet have to be hardwired into the states?

2)Turing Machine number of states. All the TM examples have a finite number of states. This is part of the concept of an algorithm, since we need to be able to describe it in finite time

a) Is it possible to construct a TM that adds new states and so does not have limit on how many states it has? Our TM has finite states but an “infinite” tape, which really means we don’t run out of tape, we can deal with arbitrarily large data.Would a machine, with infinite (unbounded) tape and infinite (unbounded) states be able to solve a larger set of problemsthan the standard finite state TM?

b) If you conclude that the TM with unbounded tape and states is not more powerful than a standard TM with fixed states, can you think of some other system that could add states in a way that a TM could not? If so, would it be morepowerful than a TM?

3)Differential equations. Differential equations, specifically partial differential equations, are used to describe systems that change in time or space or both, us- ing real and complex numbers. We do numerical approximations to them on a digital computer, and (we think) that we can come arbitrariy close to the real num- ber results by increasing the precision of numeric computation. (Digital hardware represents value in a fixed number of bits , we get floating point by interpreting specified regions of a base 2 number as exponents to represent position of decimal point andmagnitude.)

a) Is the claim that partial differential equations reduce to TM true, even though our representation in a TM is actually anapproximation?

b) Can we represent a TM using differential equations? That is, does the TM model reduce to differential equations?

Something to think about: the Lambda Calculus, which is a formal description of mathematical functions, has been proved to be equivalent to TM (each model reduces to the other one).

4) Computability. Consider language problems: Given a language L, and a string w, is w L (all decision problems can be expressed in this way). It is possible to express specific instances of computational and optimization problems as decision problems (example Traveling Salesman, Optimization:given connected graph with values assigned to each edge, find the shortest complete cycle c that visits every node. Decision: is there a solution withcost c?)

Given two problems P1 and P2 , a reduction P1 P2 is an algorithm that converts any instance of P1 to a special case of P2, such that solving P2 gives a solution to P1. We usually want a Karp reduction, that is, a reduction in P time. Reduction can be used to prove computability,: if H is the halting problem, then H P1 proves that P1 is uncomputable.

Let A(P1) P2 be an algorithm that reduces P1 to P2. Is there an algorithm to generate A?

5) Reductions for NP-completeness. An example: Hamiltonian circuit prob- lem H: Given a graph G with N nodes, not fully connected. Is there a path that begins in some node i, visits every other node once and only once, and returns to i? This reduces to TSP decision as follows: Start from G. Assign cost 1 to all paths (i, j) G. Build a fully connected graph G from from G by taking all pairs of nodes (i, k) / G and adding the path (i, j) with cost 2N. Since TSP visits every node once and returns to the original node, every TSP solution is a Hamiltonian cycle. If there is such a solution thatjust uses paths in G,its cost will be N. So a solution to TSP Decision asking if there is a path of cost <2N gives a solution to Hamiltonian. Theconstruction of G requires is in O(N 2) because that is the num- ber of pairs considered in the construction., so H K TSP. Describe a reductionfrom TSP to H (we know it exists because both are NP complete. Feel free to look it up, but give a reference.)

5) Diagonalization. Real numbers can be divided into rational numbers (every- thing that can be expressed as a finite fraction, including integers) and irrational numbers like Π and the square root of 2 that can not be so expressed. Show that most of the irrational numbers are not computable.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

1. Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium, or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

  • Explain, define, or analyze the topic in detail
  • 1- 2 pages
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Please only bet if you are really good at javascript and html. DO NOT BET IF YOU ARE NOT GOOD AT Java.sc

Overview

The intent of this assignment is to demonstrate your ability to use JavaScript in several of the most common uses found on the web. Specifically, you will demonstrate your proficiency with loops, conditionals, arrays, and functions in JavaScript, as well as demonstrate your ability to respond to events, select and modify elements via the DOM, and to validate form data.

Grading

The grade for this assignment will be broken down as follows:

  • Functional Requirements (85/100)
  • Non-functional requirements (15/100)

Non-Functional Requirements

  • You must submit valid and semantically appropriate HTML5.
  • You have been provided with the two HTML files (BasicJavaScript.html and DOMJS.html) that includes the markup for the finished versions. Download and preview the files in a browser.
  • All pages in your site must contain a comment with your name, section, and date

Functional Requirements: Basic JavaScript Hands on Practice

Demonstrate your proficiency with loops, conditionals, arrays, and functions in JavaScript. The final product should look similar to that shown below.

  • Complete the assignment as directed below and within the image.
  • Test the page in the browser. Verify that the calculations work appropriately by changing the values in the data.js file.
  1. You have been Provided with the HTML file BasicJavaScript.html that includes the markup for the finished version. Preview the file in a browser.
  2. Examine the data file data.js. It contains 4 arrays that we are going to use to programmatically generate the data rows (and replace the hard-coded values supplied in the HTML file).
  3. Open the JavaScript file functions.js and create a function called calculateTotal () that is passed a quantity and price and returns their product (i.e., multiply the two parameter values and return the result).
  4. Within functions.js, create a function called outputCartRow () that has the following signature: function outputCartRow(file, title, quantity, price total) {}
  5. Implement the body of this function. It should use document.write () calls to display a row of the table using the passed data, Use the toFixed () method of number variables to display two decimal places.
  6. Replace the three cart table rows in the original markup with a JavaScript Loop that repeatedly calls outputCartRow () function. Put this loop within the BasicJavaScript.js file. Add the appropriate <script> tag to reference this BasicJavaScript.js file within the <tbody> element.
  7. Calculate the subtotal, tax, shipping, and grand total using JavaScript calculations. Use 10% as the tax amount. The shipping amount should be $40 unless the subtotal is above $1000, in which case it will be $0.

Test

  • Test the page in the browser. Verify that the calculations work appropriately by changing the values in the data.js file.

JavascriptBasic completed project instructions

Functional Requirements: DOM JavaScript Hands on Practice

  • Complete the assignment as directed below.
  1. You have been provided with the html file domjs,html that represents the data entry form shown below. Examine this file in your browser.
  2. You will notice that some of the form elements have the CSS class hilightable specified in their class attribute. Add listeners to the focus and blur events of all elements that have this hilightable class. In your event handlers for these two events, simply toggle the class highlight (which is in the provided CSS file). This will change their styling of the current form element. Be sure to setup these listeners after the page has loaded.
  3. You will notice that some of the form elements have the CSS class required specified in their class attribute. We will not submit the form if these elements are empty. Add an event handler for the submit event of the form. In this handler, if any of the required form elements are empty, add the CSS class error to any of the empty elements. As well, cancel the submission of the form (hint: use the preventDefault () method).
  4. Add the Appropriate handler for these required controls that will remove the CSS class error that have changed content.
  • Test the form in the browser. Verify the highlighting functionality works by tabbing from field to field. Try submitting the form with blank fields to verify the error formatting works. Verify the error formatting is removed if you add content and then resubmit.

DOM 1 Finished Project

DOM 2

DOM 3

Grading Criteria

Functional Requirements

  • Java Script Loop /8
  • Calls to Function /8
  • Function: single cart row /8
  • function: calculate /8
  • Required fields (3) /9
  • Hilightable fields (7) /14
  • handlers (2 – focus/blur) /6
  • submission error (3) /15
  • Submit handler /9

Non-Functional

  • Comments /5
  • Submission /10



Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

RESEARCH PAPER:

Please submit your chapters 1-3 drafts. Before submitting, you should review Chapter 2 to ensure that it aligns with Chapter 1 and 3. Are all of the variables in your research questions discussed in Chapter 2? Do you have literature in Chapter 2 that supports/justifies your research questions?

Please find the below attached Chapter 2 – Literature review document : Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx

Please check the below requirements

Chapter One and Chapter Three


Chapter One – Introduction

Main chapter sections:

  • Overview
  • Background and Problem Statement
  • Purpose of the Study
  • Significance of the Study
  • Research Questions
  • Theoretical Framework
  • Limitations of the Study Assumptions
  • Definitions
  • Summary

Chapter Three – Procedures and Methodology

  • Introduction
  • Research Paradigm (quantitative)
  • Research Project Design
  • Sampling Procedures and or/ Data Collection Sources (reference Informed Consent and IRB approval placed in Appendices)
  • Statistical Tests (if applicable)
  • Summar

Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.

Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?

Please find the below the UC APA dissertation template :Dissertation template APA 7th edition (10.20).docx

Note: Your answer must be

  • Chapters 1-3 Requirements:
  • Using below attached document (Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx) add additional (90 pages) to existing document and frame such a way
  • 75-140 pages of literature
    100-150 scholarly articles
  • For your information my research paper is on Qualitative research. Please follow the below instructions
  • Quantitative ResearchThere are many approaches to a quantitative dissertation study and quantitative research designs allowed for UC dissertation research include:Nonexperimental CorrelationPredictive CorrelationComparativeQuasi ExperimentalExperimentalJASP – Statistical Analysis ApplicationNew Dr. Anderson’s Statistical Alignment Matrix.
  • Please referrer to the below “DoctoralResearchHandbook 8.20.2 Note : Your answer must be 65 Pages and include my Dissertation Paper 60 pages. Please make it one document. Total document must be 125 pages.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

RESEARCH PAPER:

Please submit your chapters 1-3 drafts. Before submitting, you should review Chapter 2 to ensure that it aligns with Chapter 1 and 3. Are all of the variables in your research questions discussed in Chapter 2? Do you have literature in Chapter 2 that supports/justifies your research questions?

Please find the below attached Chapter 2 – Literature review document : Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx

Please check the below requirements

Chapter One and Chapter Three


Chapter One – Introduction

Main chapter sections:

  • Overview
  • Background and Problem Statement
  • Purpose of the Study
  • Significance of the Study
  • Research Questions
  • Theoretical Framework
  • Limitations of the Study Assumptions
  • Definitions
  • Summary

Chapter Three – Procedures and Methodology

  • Introduction
  • Research Paradigm (quantitative)
  • Research Project Design
  • Sampling Procedures and or/ Data Collection Sources (reference Informed Consent and IRB approval placed in Appendices)
  • Statistical Tests (if applicable)
  • Summar

Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.

Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?

Please find the below the UC APA dissertation template :Dissertation template APA 7th edition (10.20).docx

Note: Your answer must be

  • Chapters 1-3 Requirements:
  • Using below attached document (Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx) add additional (90 pages) to existing document and frame such a way
  • 75-140 pages of literature
    100-150 scholarly articles
  • For your information my research paper is on Qualitative research. Please follow the below instructions
  • Quantitative ResearchThere are many approaches to a quantitative dissertation study and quantitative research designs allowed for UC dissertation research include:Nonexperimental CorrelationPredictive CorrelationComparativeQuasi ExperimentalExperimentalJASP – Statistical Analysis ApplicationNew Dr. Anderson’s Statistical Alignment Matrix.
  • Please referrer to the below “DoctoralResearchHandbook 8.20.2 Note : Your answer must be 65 Pages and include my
    Dissertation Paper 60 pages. Please make it one document. Total document must
    be 125 pages.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

RESEARCH PAPER:

Please submit your chapters 1-3 drafts. Before submitting, you should review Chapter 2 to ensure that it aligns with Chapter 1 and 3. Are all of the variables in your research questions discussed in Chapter 2? Do you have literature in Chapter 2 that supports/justifies your research questions?

Please find the below attached Chapter 2 – Literature review document : Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx

Please check the below requirements

Chapter One and Chapter Three


Chapter One – Introduction

Main chapter sections:

  • Overview
  • Background and Problem Statement
  • Purpose of the Study
  • Significance of the Study
  • Research Questions
  • Theoretical Framework
  • Limitations of the Study Assumptions
  • Definitions
  • Summary

Chapter Three – Procedures and Methodology

  • Introduction
  • Research Paradigm (quantitative)
  • Research Project Design
  • Sampling Procedures and or/ Data Collection Sources (reference Informed Consent and IRB approval placed in Appendices)
  • Statistical Tests (if applicable)
  • Summar

Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.

Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?

Please find the below the UC APA dissertation template :Dissertation template APA 7th edition (10.20).docx

Note: Your answer must be

  • Chapters 1-3 Requirements:
  • Using below attached document (Dissertation_Role_of_Data_Science_Rajyalakshmi_Kommineni.docx) add additional (90 pages) to existing document and frame such a way
  • 75-140 pages of literature
    100-150 scholarly articles
  • For your information my research paper is on Qualitative research. Please follow the below instructions
  • Quantitative ResearchThere are many approaches to a quantitative dissertation study and quantitative research designs allowed for UC dissertation research include:Nonexperimental CorrelationPredictive CorrelationComparativeQuasi ExperimentalExperimentalJASP – Statistical Analysis ApplicationNew Dr. Anderson’s Statistical Alignment Matrix.
  • Please referrer to the below “DoctoralResearchHandbook 8.20.2 Note : Your answer must be 80 Pages and include my Dissertation Paper 60 pages. Total document must be 140 pages

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Assignment #1 Instructions: Sorting with Binary Search Tree

Through this programming assignment, the students will learn to do the following:

  1. Know how to process command line arguments.
  2. Perform basic file I/O.
  3. Use structs, pointers, and strings.
  4. Use dynamic memory.

This assignment asks you to sort the words in an input file (or from standard input) and print the sorted words to an output file (or standard output). Your program, called bstsort (binary search tree sort), will take the following command line arguments:

% bstsort [-c] [-l] [-o output_file_name] [input_file_name]

If -c is present, the program needs to compare the strings in upper case. If -l is present, the program needs to compare the strings in lower case. Otherwise, the case stays as read in. Note that you cannot have a -c and a -l. If the output_file_name is given with the -o option, the program will output the sorted words to the given output file; otherwise, the output shall be the standard output. Similarly, if the input_file_name is given, the program will read from the input file; otherwise, the input will be from the standard input. You must use getopt() to parse the command line arguments to determine the cases.

In addition to parsing and processing the command line arguments, your program needs to do the following:

  1. You need to construct a binary search tree as you read from input. A binary search tree is a binary tree. Each node can have at most two child nodes (one on the left and one on the right), both or either one can be empty. If a child node exists, it’s the root of a binary search tree (we call subtree). Each node contains a key (in our case, it’s a word which is a string). If the left subtree of a node exists, it contains only nodes with keys less than the node’s key. If the right subtree of a node exists, it contains only nodes with keys greater than the node’s key. You can look up binary search tree on the web or in your Data Structure textbook. Note that you do not need to balance the binary search tree (that is, you can ignore all those rotation operations) in this assignment.
  2. Initially the tree is empty (that is, the root is null). The program reads from the input file (or stdin) one word at a time; As long as you continue reading words, if the word is not already in the tree, it should create a tree node that stores a pointer to the word and then insert the tree node to the binary search tree. If the word exists, then do not create a node. All duplicate words are ignored.
  3. An empty line would indicate the end of input for stdin, an end of file would indicate the end of input for an input file.
  4. You must develop a string comparison function. You must not use the strcmp() and strcasecmp() functions provided by the C library. You must implement your own version. You will be comparing the ASCII values. Note that using ASCII, all capital letters come before all lower case letters.
  5. Once the program has read all the input (when EOF is returned or a blank line encountered), the program then performs an in-order traversal of the binary search tree to print out all the strings one word at a time to the output file or stdout. The output would be one word per line. If the -c option was used then use all capital letters, if the -l option was selected then use all lower case letters.
  6. Before the program ends, it must reclaim the tree! You can do this by performing a post-order traversal, i.e., reclaiming the children nodes before reclaiming the node itself. Make sure you also reclaim the memory occupied by the string as well.
  7. It is required that you use getopt for processing the command line and use malloc or calloc and free functions for dynamically allocating and deallocating nodes and the buffers for the strings. It is required that you implement your own string comparison function instead of using the corresponding libc functions.

Here’s are some examples:

crahn@ocelot:~ 105% cat infile1
apple
apple
APPLE
APPLE
Apple
banana
BANANA
crahn@ocelot:~ 106% bstsort -l infile1
apple
banana
crahn@ocelot:~ 107% bstsort -c infile1
APPLE
BANANA
crahn@ocelot:~ 108% bstsort -o outfile1 infile1
crahn@ocelot:~ 109% cat outfile1
APPLE
Apple
BANANA
apple
banana
crahn@ocelot:~ 110%

Please submit your work as one zip file. Follow the instructions below carefully (to avoid unnecessary loss of grade):

You should submit the source code and the Makefile in the zip file called FirstnameLastnameA1. One should be able to create the executable by simply ‘make’. The Makefile should also contain a ‘clean’ target for cleaning up the directory (removing all object files at a minimum). Make sure you don’t include intermediate files: *.o, executables, *~, etc., in your submission. (There’ll be a penalty for including unnecessary intermediate files). Only two files should be included unless permission is given for more, those would be bstsort.c, and Makefile. If you feel a need to include a bstsort.h file, please send me a note with a copy of the file asking for permission.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Word_3G_Newsletter_and_Research_Paper

Project Description:

In the following project, you will format a newsletter by inserting pictures and screenshots, applying two-column formatting, and adding a border to a paragraph. You will edit and format a research paper by inserting footnotes, creating citations, and formatting a bibliography.

Steps to Perform:

Step

Instructions

Points Possible

1

Open the file Word_3G_Research_Paper_and_Newsletter.docx downloaded with this project. Ensure that paragraph marks are displayed in the document.

0

2

On Page 1, click at the beginning of the newsletter title. From your downloaded files, insert the picture w03G_Microscope.jpg. If necessary, change the Height to 0.7”. Recolor the picture by applying a blue recolor option in a light shade. To the microscope image, apply a Black, Text 1 Picture Border and change the Weight to 2 ¼ pt.

3

3

Change the Text Wrapping of the inserted image to Square. Change the Horizontal Alignment to Left relative to Margin and the Vertical Alignment to Top relative to Margin.

6

4

Starting with the paragraph New Research on Electronic Health Records, select all of the text from that point to the end of the page—do not include the Section Break in your selection. Format the text in two columns, and then apply Justify alignment. Insert a Column break before the subheading Health Information Privacy. Save your file.

4

5

Start your web browser, and then navigate to www.nhlbi.nih.gov/health. In your Word_3G_Research_Paper_and_Newsletter.docx file, click at the end of the paragraph below the New Research on Electronic Health Records subheading. Insert a screenshot of the website. Apply a Black, Text 1 Picture Border and change the Weight to 1 pt.

8

6

Select the subheading New Research on Electronic Health Records, including the paragraph mark. Use the Font dialog box to apply Bold and Small Caps, and to change the font color to Dark Blue, Text 2. Apply the same formatting to the subheadings Doctors Define Meaningful Use, Health Information Privacy and Security and Research Sources Aid in EHR Implementation. Be sure to include the paragraph mark with each selection.

Select the Doctors Define Meaningful Use subheading and then change the Spacing Before to 18 pt.

8

7

Select the last paragraph in the newsletter—the text in bold italic that, begins Ensuring the privacy, and then apply a 1 pt Shadow border using Black, Text 1. Shade the paragraph using the Fill color Dark Blue, Text 2, Lighter 80%. Center the paragraph text.

8

8

On Page 2, below the newsletter, change the line spacing for all of the text on the page to 2.0. For the same text, change the spacing after to 0 pt.

8

9

On Page 2, apply a first line indent of 0.5 inches to the paragraph that begins There is often a discrepancy.

6

10

At the bottom of the page, in the next to last line of text, after the period at the end of the sentence that ends if they had it, insert the footnote The EMR (electronic medical record) is the patient record created in hospitals and ambulatory environments; it serves as a data source for other systems. Be sure to type the period at the end of the footnote.

8

11

Modify the Footnote Text style to set the Font Size to 11 and the format of the Footnote Text paragraph to include a first line indent of 0.5” and double spacing.

8

12

On Page 2, at the end of the paragraph that begins Those clinical practices, click to the left of the period, and then using MLA format, insert a citation for a Web site with the following information:

Author: Gabriel, Barbara A.
Name of Web Page: Do EMRS Make You a Better Doctor?
Year: 2008
Month: July
Day: 15
Year Accessed: 2016
Month Accessed: June
Day Accessed: 30
Medium: Web

(Mac users – fill in all available fields, Medium is not available.)

12

13

On Page 3, at the end of the paragraph that begins Further research, click to the left of the period, and then using MLA format, insert a citation for a book with the following information:

Author: DeVore, Amy.
Title: The Electronic Health Record for the Physician’s Office, 1e
Year: 2010
City: Maryland Heights
Publisher: Saunders
Medium: Print

(Mac users – fill in all available fields, Medium is not available.)

7

14

Edit the DeVore citation to include 253 as the page number.

5

15

From the References tab, open Researcher, and then—including the quotation marks—search for “electronic health records” and press ENTER. Under Top Sources, click Journals, and notice the extensive number of journal articles on this topic. Close the Researcher pane, and then on Page 1 of the research paper, in the paragraph that begins There is often a discrepancy, in the fourth line, select the text electronic health records. To the selected text, apply Yellow Text Highlight Color.

Note, if the Researcher feature is not available in your version of Office, skip that step and highlight the text as instructed.

4

16

On Page 3 of the research paper, click to place your insertion point in the blank paragraph. On the References tab, click Bibliography, and then at the bottom of the list, click Works Cited.
Select the paragraph Works Cited. From the Paragraph dialog box, change the Spacing Before to 0 pt, if necessary change the Spacing After to 0 pt, and set the Line spacing to Double. Center the Works Cited title. Move to the top of the document.

5

17

Save and close the file, and then submit for grading.

0

Total Points

100

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

I’m working on a computer science project and need guidance to help me study.

I need a step-by-step guide to apply this project. Thank you so much for support.I hope you understand the our project ,we need a step by step guide to apply and there are three people and three duty:

Data Analyst

A data analyst collects, processes and performs statistical analyses on large dataset. They discover how data can be used to answer questions and solve problems. With the development of computers and an ever-increasing move toward technological intertwinement, data analysis has evolved. The development of the relational database gave a new breath to data analysts, which allowed analysts to use SQL (pronounced “sequel” or “s-q-l”) to retrieve data from databases. My role is data analyst to help and solve problems. I will look at complex sets of information to reach the conclusions. I will lead the process of collecting and reporting on new data. I will collaborate with my team members to collect and analyze data. I would like to challenge to do Algorithm’s project. I did not have any coding experience before. My main language is Java. I also know Python, SQL for data analysis. I will try to set and meet deadlines.

Machine Learning Engineer

My role is “Machine Learning Engineer”. I will try to understand business objectives and developing models that help to achieve them, along with metrics to track their progress and verifying data quality, and/or ensuring it via data cleaning. Analyzing the ML algorithms that could be used to solve a given problem and ranking them by their success probability.

Qa Tester

I will be responsible for the quality of software development and deployment. I involved in performing automated and manual tests to ensure the software created by developers is fit for purpose. The biggest challenge for me is to find bugs in features which are already stable. I will create all efficient test cases and automate them to reduce our testing time and find the bugs easily.

please see the link below to get all descriptions :

Link1: to see all requirements detail click here

Link2: to watch the video of homework description click here

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Assignment Background and Description

In order to complete this assignment successfully, you need to complete your project management plan and present your plan to the class This assignment is worth 20% of your final grade.

This assignment is a group assignment, so you will work with the other members of your project team to develop further aspects of your project plan. You will also create an exciting and informative presentation that will promote your project.

2. AssignmentScope

Your project plan execution needs to allow for the assessment of the learning outcomes in section 3 of the course outline. Below is a list of the learning outcomes to be assessed in this assignment.

3.1 Determine how to manage quality
3.2 Demonstrate the ability to acquire resources 3.5 Implement risk responses as required
3.6 Conduct procurements
3.7 Manage engagements with stakeholders

3. High-LevelRequirements

From the list of learning outcomes above, the items listed in table 4-1 of the PMBOK (pg. 89), your existing resources from assignment two, along with any organizational process assets at your disposal, create the following:

  •  Quality Management Plan (BoF 2.23)
  •  Resource Management Plan (BoF 2.26)

o Define the resource requirements for your project (BoF 2.28)

o Create a Resource Breakdown Structure (BoF 2.29)

  •  Communication Management Plan (BoF 2.30)
  •  Risk Management Plan (BoF 2.31)
  •  Stakeholder Engagement Plan (BoF 2.40)

o Include a Stakeholder Register (BoF 1.3)  Update your WBS (MS Project file)

o Add any tasks required to complete this assignment
 Create a presentation (max 15 minutes), where you will present your project plan. Your presentation agenda

should include the following items:
o Introduction of group members
o Business case with the needs/benefits for the project clearly defined o Project scope, schedule, costs, assumptions, and risks
o Cost baseline with details of the funding requirements.

2

4. Deliverables

A completed project management plan in MS Word format that includes a MS Project file, and all of the items in the high-level requirements listed above.

A presentation where all members of your group will participate equally in the presentation of your project plan to the PMO. Use the agenda listed above. The presentation can be a PowerPoint (Use Office365) with embedded video, or a video in MP4 format. Contact me if you need to submit your presentation in another format.

5. OrganizationalProcessAssets

Your assignment should use the book of forms, the book of techniques, and the PMBOK guide, as the standard for any documents submitted. Basically, if there is a form available, use it!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

In this project, you will demonstrate your mastery of the following competencies:

  • Explain the basic concepts and techniques that pertain to artificial intelligence and intelligent systems
  • Analyze current trends and emerging technologies in Computer Science for their impacts on society

Scenario

You are the lead engineer for a major social networking company that utilizes neural networks in its personalization algorithms. Personalization plays a major role in your business model. The company is an industry leader in user experience and your customers expect the software to anticipate their needs in terms of recommended posts, recommendations for friends requests, groups to join based on shared interests, news articles they may be interested in, discussions they may want to join, games they may want to play, and other features available on the site. This experience is monetized through targeted advertising. Your sales reps claim a click-through rate that is double that of your closest competitor because you know everything there is to know about your users.

To achieve these results, the company collects user data in the form of mouse clicks, site navigation, links followed, time spent on a page, location data, and so on. Everything a user does within the app is stored and fed into multiple neural networks that create models designed to personalize the user’s experience on the site. In a nutshell, these algorithms are designed to create a personalized user experience that will maximize the time a user spends on the site and the number of ads they click on. An EU regulator has brought to the company’s attention that you may be violating some aspects of the GDPR law. Specifically, they are concerned that your business model may not conform to some or all of the following principles defined by the law:

  1. Transparency: The company must make it clear how they are using data.
  2. Purpose limitation: Data may be gathered for pre-specified purposes, not archived and reused for any future use.
  3. Data minimization: Only the data gathered for those pre-determined purposes may be gathered, not more.
  4. Accuracy: Companies have a responsibility to keep data up-to-date and accurate, and must fix inaccuracies as soon as possible.
  5. Storage limitation: Data may only be retained as long as it is applicable to the purposes noted above; it cannot just be stored indefinitely.
  6. Confidentiality: Data must be kept secure and confidential to a reasonably expected degree.
  7. Accountability: Companies may be held responsible for following these principles and can be penalized if they do not.

You have been asked to write a white paper that addresses the regulator’s concerns. Your white paper will be presented to an interdepartmental team of systems engineers, software developers, AI experts, and members of the legal team, so that they can move forward with bringing your company into GDPR compliance.

Directions

White Paper

Using your knowledge of how neural networks work and the GDPR principles outlined above, write a white paper that addresses the regulator’s concerns. Recommend changes where necessary and defend existing practices where applicable. Note that proposing remedies to one principle may violate another. In order to adequately address each aspect of the prompt, you will need to support your ideas with research from your readings. You must include citations for sources that you used.

  1. Explain the basics of neural networks and how they work by addressing the following:
    1. Provide a brief explanation of how neural networks work. How do the input layer, hidden layer, and output layer interact to classify objects? Consider the fact that your target audience may have limited technical knowledge.
  1. Evaluate how neural networks are used to create personalization by addressing the following:
    1. How are neural networks utilized to aid in the personalization of the user experience?
    2. What ethical concerns can this raise? Consider hidden biases that may arise in using a “black box” classification system, where the algorithms are unknown to the user.
  1. Analyze how portions of the GDPR affect personalization by addressing the following:
    1. Summarize the portions of the GDPR that affect personalization. Be sure to consider at least four of the following in your answer: transparency, purpose limitation, data minimization, accuracy, storage limitation, confidentiality, and accountability.
  1. Assess how the GDPR is affecting the company’s practices by addressing the following:
    1. What specific legal concerns may arise from your company’s use of neural networks as a classifier to personalize the user experience?
    2. Is not collecting data a possibility for the company’s business model? Defend your answer.
  1. Propose adaptations to the company’s practices to act in compliance with the GDPR by addressing the following:
    1. What are the current trends (best practices) in artificial intelligence and machine learning aimed at preserving privacy?
    2. What changes to the way the company collects, stores, and employs user data do you propose to comply with GDPR? Defend existing practices where applicable.

What to Submit

To complete this project, you must submit the following:

White Paper
Your submission should be a 3– to 5–page Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Purpose 

This assignment is intended to give you an opportunity to strengthen your skills in gathering and analyzing business-related information. It provides a deeper understanding of how companies can look at globalization as part of their strategic and operational plans. The assignment has two parts: one focused on information research and analysis, and the other is on applied analytics.

Resource- https://hbr.org/2018/10/how-netflix-expanded-to-19…

Part 1: Globalization and Information Research

Context: Companies that perform well in their country of origin usually consider expanding operations in new international markets. Deciding where, how, and when to expand is not an easy task, though.

Many issues need to be considered before crafting an expansion strategy and investing significant resources to this end, including:

  • the level of demand to be expected for the company’s products/services
  • presence of local competitors
  • the regulatory, economic, demographic, and political environments

Carefully researching and analyzing these and other factors can help mitigate the inherent risk associated with an overseas expansion strategy, thus increasing the likelihood of success.

As a data analyst in your company’s business development department, you’ve been tasked with the responsibility of recommending countries for international expansion. You’ll write a report to the company’s executive team with your research, analysis, and recommendations.

Instructions:

Write a 525-word summary covering the following items:

  • According to the article listed above, what were the most important strategic moves that propelled Netflix’s successful international expansion?
  • The article mentions investments in big data and analytics as one of the elements accompanying the second phase of overseas expansion. Why was this investment important? What type of information did Netflix derive from the data collected?
  • According to the article, what is exponential globalization?
  • Not all international expansion strategies are a resounding success, however. Research an article or video that discusses an instance in which an American company’s expansion efforts in another country failed. According to the article/video you selected, what were the main reasons for this failure? Do you agree with this assessment?
  • Explain some of the reasons why certain companies’ expansion plans have failed in the past.

Part 2: Hypothesis testing

Context: Your organization is evaluating the quality of its call center operations. One of the most important metrics in a call center is Time in Queue (TiQ), which is the time a customer has to wait before he/she is serviced by a Customer Service Representative (CSR). If a customer has to wait for too long, he/she is more likely to get discouraged and hang up. Furthermore, customers who have to wait too long in the queue typically report a negative overall experience with the call. You’ve conducted an exhaustive literature review and found that the average TiQ in your industry is 2.5 minutes (150 seconds).

Another important metric is Service Time (ST), also known as Handle Time, which is the time a CSR spends servicing the customer. CSR’s with more experience and deeper knowledge tend to resolve customer calls faster. Companies can improve average ST by providing more training to their CSR’s or even by channeling calls according to area of expertise. Last month your company had an average ST of approximately 3.5 minutes (210 seconds). In an effort to improve this metric, the company has implemented a new protocol that channels calls to CSR’s based on area of expertise. The new protocol (PE) is being tested side-by-side with the traditional (PT) protocol.

Instructions:

Access attachment for the call center waiting time file. Each row in the database corresponds to a different call. The column variables are as follows:

  • ProtocolType: indicates protocol type, either PT or PE
  • QueueTime: Time in Queue, in seconds
  • ServiceTime: Service Time, in seconds
  • Perform a test of hypothesis to determine whether the average TiQ is lower than the industry standard of 2.5 minutes (150 seconds). Use a significance level of α=0.05.
  • Evaluate if the company should allocate more resources to improve its average TiQ.
  • Perform a test of hypothesis to determine whether the average ST with service protocol PE is lower than with the PT protocol. Use a significance level of α=0.05.
  • Assess if the new protocol served its purpose. (Hint: this should be a test of means for 2 independent groups.)
  • Submit your calculations and a 175-word summary of your conclusions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Research and practical assessment of vulnerable code presented as a technical report

What is being submitted?

CASE STUDY WEB APPLICATION – 2000 WORDS

Module and Section Web Application Security (2020 MOD006363 TRI2 F01CAM)

INFORMATION Learning Outcomes 1-4 Weighting 100%

Marking Approach Fine-grade

2020/21 Assessment Description Form:- (2020 MOD006363 TRI2 F01CAM) Element:- 010

Assessment Description

OWASP top 10 DevSecOps research and mitigation testing

You work for a company called Anglia DevSecOps Solutions. They have contacted you to research the latest IT threats and, specifically, are interested in the OWASP Top 10 vulnerabilities.

Your job is to test for and document THREE of the following vulnerabilities:

A1 Injection

A2 Broken Authentication

A3 Sensitive Data Exposure

A4 XML External Entities (XXE)

A5 Broken Access Control

A6 Security Misconfiguration

A7 Cross-Site Scripting (XSS)

A8 Insecure Deserialization

A9 Using Components with Known Vulnerabilities

A10 Insufficient Logging & Monitoring

Explain the Vulnerabilities and Mitigation

Explain to the business executives why these vulnerabilities matter, including the potential risk to the business. You should link these vulnerabilities into the OWASP TOP 10 2017. You are expected to provide real-world examples for each vulnerability discussed and code that has issues, with then the student correcting it/suggesting better alternatives. The report is specifically for higher-ups in the business and needs to be readable by laymen (non-technical person). Please explain things in this technical report carefully.

You should explain how you have tested for each vulnerability and how you exploited each vulnerability. You should also explain why the vulnerability exists and what is needed to mitigate it. Provide a fully annotated example code to support your mitigation argument. The report should outline your test environment, such as an annotate network diagram, and justify the tools selected for testing. Lower marks will be awarded for just theory-based work.

Report Presentation and Referencing

The report should include the following sections. Failure to follow the headings (as a minimum) will result in a loss of marks.

Cover page

Contents page

Executive summary

OWASP Vulnerability one

Vulnerability

Mitigation

OWASP Vulnerability Two

Vulnerability

Mitigation

OWASP Vulnerability Three

Vulnerability

Mitigation

References

Appendix (if needed)

All your work should be supported with full in-text Harvard referencing. Please create sub-headings under these, so your work is easier to read for an executive or laymen (the legal term for someone without professional or specialized knowledge in a particular subject-specific area.)

Marking Scheme

You are to write a 2000 word professional report that details:

10% Explain the first vulnerability of choice in the OWASP Top 10.

(such as pick an OWASP Top 10 vulnerability, Then why it exists, how it works and what code it effects) good marks will be awarded for correct identification of code that has been explained and annotated correctly as well as referenced using Harvard referencing.

20% Using real-world code that you have researched or developed, mitigate the issue selected

(such as linking the code from the first part of this question) Show your test environment (or what you think it might look like), fixing the code and show threats have been mitigated correctly with examples. Lower marks will be awarded for just theory-based work. Annotations are also required for the code as well as referenced using Harvard referencing.

10% Explain the second vulnerability of choice in the OWASP Top 10.

(such as pick an OWASP Top 10 vulnerability, Then why it exists, how it works and what code it effects) good marks will be awarded for correct identification of code that has been explained and annotated correctly as well as referenced using Harvard referencing.

20% Using real-world code that you have researched or developed, mitigate the issue selected

(such as linking the code from the first part of this question), Show your test environment (or what you think it might look like), fixing the code and show threats have been mitigated correctly with examples. Lower marks will be awarded for just theory-based work. Annotations are also required for the code as well as referenced using Harvard referencing.

10% Explain the third vulnerability of choice in the OWASP Top 10.

(such as pick an OWASP Top 10 vulnerability, Then why it exists, how it works and what code it effects) good marks will be awarded for correct identification of code that has been explained and annotated correctly as well as referenced using Harvard referencing.

20% Using real-world code that you have researched or developed, mitigate the issue selected

(such as linking the code from the first part of this question), Show your test environment (or what you think it might look like), fixing the code and show threats have been mitigated correctly with examples. Lower marks will be awarded for just theory-based work. Annotations are also required for the code as well as referenced using Harvard referencing.

10% Report presentation

must be in the form of a technical format, written in ONLY 3rd PERSON with headings, sub-headings, and diagrams/tables/code labelled correctly. The work must be written in English and be spelling + grammar checked before submission. This report must be written so that a layman can understand it (non-technical person). If they can not, lower marks will be awarded. Work also needs to follow the headings above as a minimum, which students can add to.

Please note:

Marks for in-text Harvard referencing is included in each question. No in-text Harvard references may result in very low marks in those sections or failing this work outright. Do not share your assessment for this module with any other students, as this is a SOLO piece of work. Otherwise, it will be seen as plagiarism and given a penalty in-line with the student regulations.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Using Microsoft Visio. Create an ERD schema based on the following requirements for a simple college database.

Identify all the entities, relationships and attributes. State the cardinality of the relationship in each case. If you don’t think enough information is available to define either of these, state an assumption that makes it clear.

Problem Statement:
A college wants to track its departments, majors, faculty members, and students. The college has many departments. Each department has many faculty members, but each faculty is affiliated with one and only one department. A department has a department name. A faculty member has last name, first name, highest degree earned, title and email.

Each major has a name and description. Some departments do not offer any major, but some departments offer multiple majors.

Each student needs to declare at least one major at the beginning of the first year. A student has last name, first name, email, and class year. Additionally, each student is advised by a faculty member, but not all faculty members advise students.

Task:
Draw all entities with their attributes into Tables. Draw relationships, cardinality and finish the ERD.

*Help Getting Started: Identify the entities and attributes

Submission Status

Attempt number This is attempt 1.
Submission status No attempt
Grading status Not graded
Grading criteria
Professionalism
Diagram presents a professional appearance. It could be shared with a “real-world” customer without changes.

3points

Diagram largely presents a professional tone. It could be shared with a “realworld” customer with minor revisions.

2points

Diagram is unprofessional. Major revisions would be necessary before sharing the document with a “realworld” customer.

1points

Not professionally completed or work not submitted.

0points

Entity Sets

Diagram captures all entity sets necessary for a database that would satisfy the initial problem statement.

3points

Diagram captures most entity sets necessary for a database that would satisfy the initial problem statement.

2points

Diagram captures few or none of the entity sets necessary for a database that would satisfy the initial problem statement.

1points

Not completed correctly or work not submitted.

0points

Attributes and Keys

Diagram captures all attributes and primary keys necessary for a database that would satisfy the initial problem statement.

3points

Diagram captures most attributes and primary keys necessary for a database that would satisfy the initial problem statement.

2points

Diagram captures none or few of the attributes and primary keys necessary for a database that would satisfy the initial problem statement.

1points

Not completed correctly or work not submitted.

0points

Notation

Diagram uses an appropriate E-R notation. The notation is used correctly for all elements of the diagram.

3points

Diagram uses an appropriate E-R notation. The notation is used correctly for most elements of the diagram.

2points

Diagram does not use an appropriate E-R notation or uses a notation incorrectly for most or all elements.

1points

No notation or work not submitted.

0points

Relationships

Diagram captures all relationships necessary for a database that would satisfy the initial problem statement.

4points

Diagram captures most relationships necessary for a database that would satisfy the initial problem statement.

3points

Diagram captures none or few of the relationships necessary for a database that would satisfy the initial problem statement.

1points

Not completed correctly or work not submitted.

0points

Constraints

Diagram captures all cardinality and participation constraints necessary for a database that would satisfy the initial problem statement.

4points

Diagram captures most of the cardinality and participation constraints necessary for a database that would satisfy the initial problem statement.

3points

Diagram captures none or few of the cardinality and participation constraints necessary for a database that would satisfy the initial problem statement.

1points

Not completed correctly or work not submitted.

0points

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Abstract

Finish the provided specifications for the Word and WordStack classes. The WordStack Class will act as a stack of Word objects. You must implement your own linked list for this assignment. Additionally create a driver to demonstrate the features of the WordStack class. The driver will read and write files to reverse all of the words of some input file.

Finish the Word class implementation in Word.cpp

Use the provided Word.h. Complete the implementation of the Word class in a Word.cpp file.

Finish the WordStack class in WordStack.cpp

Use the provided WordStack.h. Complete the implementation of the WordStack class in a WordStack.cpp file.

Create a WordStack class with pop, push, and isEmpty.

This Wordstack holds Word objects using a linked list of Nodes.

The Stack class has the following methods:

void push(Word)

push accepts a Word object, then inserts it into the stack of Words

Word Pop()

The pop()method takes no arguments and returns the Word object from the top of the stack. This method also discards the top element from the stack. Throw an exception when popping from an empty stack.

bool isEmpty()

isEmpty returns True when the stack is empty. Return false when not empty.

Driver

Create a simple text file with some arbitrary text of your choice. This is the program input file.

Next, write a driver program to read an input file, save the words in a new file in reverse order. Do this using the WordStack class.

The Driver should do the following at minimum.

  • Open the input text file and read the contents into a WordStack.This must insert one word at a time into the stack.
  • Close the input file.
  • Open a new file for program output. This file begins empty.
  • The program should then pop all of the Words from the stack and save each word into an output file. This output file storesall of the words that were popped from the stack.
  • Close the output file.
  • The order of the words saved in the output file should be the reverse of their order in the input file.

Class Source Code

The classes must be defined in a header file with no implementation. Additionally, create an implementation file with all of the implementation code. See the provided Die class example for an example of this format.

.—————————————

word.h

#ifndef WORD_H_
#define WORD_H_
#include <string>;

class Word
{
private:
	std::string word;

public:
	Word();
	std::string getWord() const;
	void setWord(std::string);
};

#endif

---------------------------
wordStack.h
#ifndef WORDSTACK_H_
#define WORDSTACK_H_

#include "Word.h"

class WordStack{
private:
    struct StackNode
    {
        Word word;
        StackNode *next;
    };

    StackNode *top;

public:
    void push(Word);
    Word pop();
    bool isEmpty() const;
};

#endif /* WORDSTACK_H_ */

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

D-Assignment 1

We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). How do we ensure that the remote site is protected like we would the main location? Discuss the challenges of maintaining information security at a remote recovery location.

  • ·
    Explain, define, or analyze the topic in detail of
    about 600 words.
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

========================================================================

Assignment 2

Review over the DR template (IT Disaster Recovery Management Checklist Report on DISASTER.docx & IT Disaster Recovery Management Checklist Report on CONTINUITY.docx) Attached and pick an industry such as (airlines, ecommerce, banking, etc.).Within that industry, pick a specific organization for the development of the Disaster Recovery Plan such as Healthcare – Physical Therapy Clinics – ATI.

Pick an industry/company to focus on for this assignment.Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create a Disaster Recovery plan using the template provided.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Project selection is submitted for approval. Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

========================================================================

ETC – Assignment 3

Review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Paper should be strictly Plagiarism free

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

1. Presentation of project proposal done in class, in front of peers (20%)

2. Report containing proposal for final project with literature review and plan of action. Including ethical training certificate.

2020/21 Assessment Information Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

What the Canvas Due Date and Time (above) represent for this assessment

Your assessment must be submitted by the date and time shown

Your assessment has more than one component and due date as summarized below, the final submission is on the date and at the time shown

Descriptive Title

This assessment element has two parts: Project Proposal Presentation and Report:

1. Presentation of project proposal done in class, in front of peers (20%)

2. Report containing proposal for final project with literature review and plan of action. Including ethical training certificate. (80%)

What is being submitted

REPORT (3000 WORDS)

Module and Section

Research Methods (2020 MOD002695 TRI2 F01CAM)

INFORMATION

Learning Outcomes LOs 1,2,3 Weighting 100% 100%

Learning Level

Level 7

2020/21 Component Information Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

Element 010 Component

What is being submitted

Weighting

Submit to

Date

Time

Component 1

Presentation of project proposal

20%

In-Class

week 7 – 11

in class

Component 2

Project proposal report

80%

2020/21 Assessment Description Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

Assessment Description

Guideline for Online Submission:

Section 1. Assessment Overview

Presentation of project proposal(20% of module marks). Sharing your proposal with and getting feedback from peers and tutor. We ask you to do a presentation as it is a useful skill for your career and you will be required to present to your supervisors when you complete your Post Graduate Major Project Dissertation (PGMP).

Project proposal report (80%). Report your project proposal, research, literature review and plan of action. This will provide the essential starting point for your PGMP.

Section 2. Presentation of Project Proposal (20%, in weeks 7, 8, 9, 10 or 11, 600 words equivalent)

A short presentation to your peers of maximum 5 min, with a further 2 min answering questions and receiving feedback. You will need to have a title, make it clear who the author is, the aims (i.e. what you want to achieve), the context (i.e. what has been done in this area and/or why are you doing this) and the key deliverables. You should also include Harvard references to the most important resources. You should include your power point slides (maximum 5 slides) or other documents as an appendix for your final project proposal.

Mark scheme for Presentation (20%)

1 Presentation – use of slides (legibility, images and organization), presentation to audience (audibility and engagement). (10 marks)

2 Content – Is the topic suitable for the course? Is a coherent case made that explains why the project is being attempted, what is expected and how this will be achieved? Topics will need to be viable for the time / resources of the PGMP module. (5 marks)

3 Time – penalty marks will be deducted for presentation that run over time or have to be stopped. (5 marks)

Section 3. Project Proposal Report (80%)

The Project Proposal should be no more than 3000 words. The major part of the reflective journal will have been completed during the module as part of your formative work. Both these need to be combined along with power point slides from your presentation into a single document for submission to the online Turitin Grade Mark submission process.

Mark scheme for Project Proposal (80%)

You are required to write a research proposal on a topic of your choice. It is advisable that this should match your final dissertation. You should format your report around the following key aspects:

1 Provide a suitable title for your work and briefly describe the hypothesis that you intend to demonstrate, prove or test.

(10 marks)

2 Explain, backed up by the relevant academic literature, why you propose to carry out research on the chosen topic. This should involve a review of the relevant literature and the current practice to put your project in context and establish a justification for this work.

(20 marks)

3 Describe your research methodology and approach. Back up your decision with suitable references supporting methodological and design process.

(10 marks)

4 Describe the key technical aspects of your project, outlining the experimental procedures, design of any software, data collection processes and tools to analyse data.

(10 marks)

5 Include a Gantt Chart of the proposed activities required to successfully complete the proposed research within the time framework. This must be accompanied with brief descriptive text to provide details for your key milestones and deliverables.

(10 marks)

6 You should make it clear whether your proposed research will require ethics approval. Include the ethics checklist and online ethics-training certificate in your list of appendices.

(10 marks)

7 Provide a report format with contents list, numbered headings and sub-headings and correct use of Harvard style references.

(10 marks)

In general, assessment criteria will include:

Quality of argument

Does the work show the ability to reason, analyse and integrate elements?

Critical reflection and synthesis

Does the work demonstrate powers of critical reflection?

Evaluation

Does the work involve analysis of the relative importance of the different aspects or events described?

Attainment of university graduate generic outcomes

Does the work demonstrate understanding of the concept of being a postgraduate and is it written in a manner appropriate for postgraduate level?

Structure of the work

The presence of clear and sound objectives / identification of clear research question

Evidence of critical evaluation of the work of others

Evidence of proposed analysis, either from theoretical framework or empirical or both

Logical structure and argument

Relevance and depth

Summary/conclusion with clarity and conciseness

Presentation of work

The quality of text, writing and use of tables and figures

The quality and relevance of the bibliography, including evidence of wider reading

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Using the xCode-Swift SDK to build (simulate) an iOS mobile app that uses consumable web services. Requirements on page 215.

Like with Android last week, there are two options for starting our iOS application – build the desired UI layout then code populate OR build the code that will populate the UI layout (p. 194). A basic component in the “anatomy” of an iOS app is a VIEW. Views usually have UI elements (text fields, table fields, labels, buttons, etc.) that can be dragged and dropped onto a canvas then edited for size and position to simulate an interface. iPhone apps are made up of one or more such views.

The xCode IDE and Swift code formatter is a full array of tools that allow developers to plan, build, code, and test/debug iOS applications. The storyboarding tools in the xCode IDE allows for side-by-side configuration of UI elements and auto generation of code. I call our effort this week “simulation” because we don’t do the actual coding necessary to populate the layout or to make each UI element functional. Instead, we start with a UI layout that meets the Derby app in iOS requirements (p. 215). Here is what your simulated interface should look like: iOS app layout.jpg

For our project this week, we will use a design tool (Figma)> https://www.figma.com to design our iOS app interface. There are many wireframing tools like Figma that could be used for this purpose. Figma is an easy to learn and use tool that allows dragging and droppping icons, and other UI elements directly onto a frame/canvas which can be edited for size and position; a layout frame specifically for iPhone is incorporated in Figma; the layout that is modeled in Figma can be exported to enviroments like xCode. Best of all Figma is free to use for individuals and small teams. Here is a video that shows how to model iOS UI apps in Figma – http://www.youtube.com/watch?v=hb7Gvevu1UE. Coding examples and a brief explanations are provided in chapter 7 for each element used in the layout (TextView, Button, and TableLayout), but you ARE NOT required to implement any code for this assignment.

Click for more options

Your assignment:

Download and install Figma to our computer and create (simulate) an iOS interface that follow the sample above –

  • First download and install Figma (can use comparable SW of your choice)

Make one screen shot here that shows you have install the Figma wireframing tool (or a comparable tool of your choice)

* You are ready to start adding UI elements for your iOS app matching the layout above as your guide.

Make a second screen shot showing the final placement of the UI elements on the template; except for coding, this is your simulated iOS app.

Lastly, review the coding that our authors provide (pp. 164-182); based on that coding:

Write a brief explanation of each UI element you used – try to explain what specific function/method your UIs provide that make your app workable. Also mention other features peculiar to iOS (i.e, Views).

These two screen shots and UI explanations are the deliverables for your Res Wknd Group project. A cover page IS required. If you use supporting literature/resources other than you or your group posess, remember to properly cite and then include an APA style reference list. Although this is work done in your Group, each learner must post an individual copyn to iLearn for grade. 😀 Please post to iLearn NLT Sunday, 9/19 – 1:30pm EST.

When you are ready to post, click the Res Wknd – Group Project (Simulate building an iOS app) assignment link, then Either click the “Write Submission” link and directly paste your document into this assignment box OR Browse your Computer and add the entire Microsoft Word document as an attachment (Mac users, please remember to append the “.docx” extension to the filename).

Need PPT as well:

Background: In keeping with our text authors, our project is to build a Mobile app which will access, manipulate, and display consumable data specifically from a DerbyNames web service. We built that web service as an assignment in Week 3. After planning and designing (modeling with Figma) your app – adding and adjusting UI elements for features that you need, you should now be ready to display that on a template specifically for your app platform (this is your second screen shot); describe the overall features of the app and describe what UI elements gives its functionality. Normally, this is where you would hand the design off for development; for coding – perhaps to a completely unique development team. You should be able to describe in great detail any specfics of your design/model which accounts for function and operation.

Your Assignment:

No coding of any kind is required for this assignment. However, you should understand each UI element that you used in modeling your app; not the coding, but what functionality the UI gives to you app and how that functionality meets the stated requirements to work with the DerbyNames web services. You should also be aware of frameworks or toolsets needed to develop a Mobile app for the platform you modeled.

In your presentation (PPt):

  1. Introduction: Present what you know about Derby, the DerbyName web services, and the format of the data that your app must access.
  2. Describe the requirements for your apps design – see textbook page and figure.
  3. Discuss some absolute necessities (principles) for designing Mobile app interfaces (see your research paper).
  4. Describe issues you learned or encountered in preparing for this project – incompatible computer/laptop, in visioning and planning a multi-platform app., etc.
  5. Discuss what toolsets or framework(s) are available and are necessary to do enterprise development for this app platform of choice – what are some plusses and minuses of these tools?
  6. Discuss any special function(s) that is/are unique to the platform that you modeled (see textbook chapter).
  7. Mention the wireframing/modeling tool that you used.
  8. Discusseach UI elementused in modeling your app.
  9. Mention why it is needed and how this UI element is needed to meet the functionality and app requirements
  10. Recommentation: Make an argument, as you did in your research paper, for cross-platform frameworks for developing Moble apps.

If you make recommendations, cite at least two schorlarly sources as reference. So, you will then need a reference slide (this is your last slide). Your deliverable for this assignment includes: a cover page – showing: Group members, title of the presentation, University’s name, Course name, Course number, Professor’s name, and Date. Although this is work done in your Group, each learner must post an individual copy to iLearn for grade. Please post to iLearn NLT Sunday, 9/19 – 1:30pm EST.

When you are ready to post, click the Res Wknd – Group Project Presentation assignment link, then Either click the “Write Submission” link below and directly paste your presentation into this assignment box OR Browse your Computer and add the entire PowerPoint document as an attachment (Mac users, please remember to append the “.docx” extension to the filename).

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Various topics were covered in this course that could be the foundation for your dissertation. Think about a topic related to the course content that could possibly be used in your dissertation. Your actual dissertation topic is approved in DSRT 736, but this gives you an opportunity to start thinking about possible topics.

  • What possible topic could you identify that would be appropriate for a dissertation?
  • What are some possible research questions that you could ask related to the topic?
  • Find at least one research study related to your topic. The study should be from a peer-reviewed scholarly journal. You should read the entire article and not solely the abstract.
  • What were the research questions in the study?
  • Did the researchers conduct a survey?
  • What were the findings/results of the study?
  • Discuss the connection between your topic and the research study.

Your paper should be on your content specialty area focusing on the political decision-making process affecting leadership.

Content specialty areas include: (Religion/ Ministry, Math, History, English, Criminal Justice, Student Personnel Services, Information Systems, Instructional Technology, Education, Business, Nursing, Health Science). This is a good opportunity to further research for your dissertation topic. Paper should be ten double spaced pages, plus title page and reference page.

I Term Paper Format – APA – (Refer to the UC Dissertation Handbook Posted in Content)I Term Paper Format – APA – (Refer to the UC Dissertation Handbook Posted in Content)

Title Page

Chapter One. (Introduction)

This is where you present a short summary on the importance of your selected topic.

Chapter Two. (Review of Literature)

This where you will summarize the information and data from your references.

Chapter Three. (Procedures and Methodology)

This is where you provide your own analysis of your topic anchored in fact and reason.

Chapter Four. (Research Findings)

Summarize the meaning of your analysis and findings.

Chapter Five. (Summary, Discussion and Implications)

Practical assessment of research and implications for future study.

Reference Page

NOTE: Pick any topic, if possible related to Machine Learning.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

1. Presentation of project proposal done in class, in front of peers (20%)

2. Report containing proposal for final project with literature review and plan of action. Including ethical training certificate.

2020/21 Assessment Information Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

What the Canvas Due Date and Time (above) represent for this assessment

Your assessment must be submitted by the date and time shown

Your assessment has more than one component and due date as summarised below, the final submission is on the date and at the time shown

Descriptive Title

This assessment element has two parts: Project Proposal Presentation and Report:

1. Presentation of project proposal done in class, in front of peers (20%)

2. Report containing proposal for final project with literature review and plan of action. Including ethical training certificate. (80%)

What is being submitted

REPORT (3000 WORDS)

Module and Section

Research Methods (2020 MOD002695 TRI2 F01CAM)

INFORMATION

Learning Outcomes LOs 1,2,3 Weighting 100% 100%

Learning Level

Level 7

2020/21 Component Information Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

Element 010 Component

What is being submitted

Weighting

Submit to

Date

Time

Component 1

Presentation of project proposal

20%

In-Class

week 7 – 11

in class

Component 2

Project proposal report

80%

2020/21 Assessment Description Form:- (2020 MOD002695 TRI2 F01CAM) Element:- 010

Assessment Description

Guideline for Online Submission:

Section 1. Assessment Overview

Presentation of project proposal(20% of module marks). Sharing your proposal with and getting feedback from peers and tutor. We ask you to do a presentation as it is a useful skill for your career and you will be required to present to your supervisors when you complete your Post Graduate Major Project Dissertation (PGMP).

Project proposal report (80%). Report your project proposal, research, literature review and plan of action. This will provide the essential starting point for your PGMP.

Section 2. Presentation of Project Proposal (20%, in weeks 7, 8, 9, 10 or 11, 600 words equivalent)

A short presentation to your peers of maximum 5 min, with a further 2 min answering questions and receiving feedback. You will need to have a title, make it clear who the author is, the aims (i.e. what you want to achieve), the context (i.e. what has been done in this area and/or why are you doing this) and the key deliverables. You should also include Harvard references to the most important resources. You should include your power point slides (maximum 5 slides) or other documents as an appendix for your final project proposal.

Mark scheme for Presentation (20%)

1 Presentation – use of slides (legibility, images and organisation), presentation to audience (audibility and engagement). (10 marks)

2 Content – Is the topic suitable for the course? Is a coherent case made that explains why the project is being attempted, what is expected and how this will be achieved? Topics will need to be viable for the time / resources of the PGMP module. (5 marks)

3 Time – penalty marks will be deducted for presentation that run over time or have to be stopped. (5 marks)

Section 3. Project Proposal Report (80%)

The Project Proposal should be no more than 3000 words. The major part of the reflective journal will have been completed during the module as part of your formative work. Both these need to be combined along with power point slides from your presentation into a single document for submission to the online Turitin GradeMark submission process.

Mark scheme for Project Proposal (80%)

You are required to write a research proposal on a topic of your choice. It is advisable that this should match your final dissertation. You should format your report around the following key aspects:

1 Provide a suitable title for your work and briefly describe the hypothesis that you intend to demonstrate, prove or test.

(10 marks)

2 Explain, backed up by the relevant academic literature, why you propose to carry out research on the chosen topic. This should involve a review of the relevant literature and the current practice to put your project in context and establish a justification for this work.

(20 marks)

3 Describe your research methodology and approach. Back up your decision with suitable references supporting methodological and design process.

(10 marks)

4 Describe the key technical aspects of your project, outlining the experimental procedures, design of any software, data collection processes and tools to analyse data.

(10 marks)

5 Include a Gantt Chart of the proposed activities required to successfully complete the proposed research within the time framework. This must be accompanied with brief descriptive text to provide details for your key milestones and deliverables.

(10 marks)

6 You should make it clear whether your proposed research will require ethics approval. Include the ethics checklist and online ethics-training certificate in your list of appendices.

(10 marks)

7 Provide a report format with contents list, numbered headings and sub-headings and correct use of Harvard style references.

(10 marks)

In general, assessment criteria will include:

Quality of argument

Does the work show the ability to reason, analyse and integrate elements?

Critical reflection and synthesis

Does the work demonstrate powers of critical reflection?

Evaluation

Does the work involve analysis of the relative importance of the different aspects or events described?

Attainment of university graduate generic outcomes

Does the work demonstrate understanding of the concept of being a postgraduate and is it written in a manner appropriate for postgraduate level?

Structure of the work

The presence of clear and sound objectives / identification of clear research question

Evidence of critical evaluation of the work of others

Evidence of proposed analysis, either from theoretical framework or empirical or both

Logical structure and argument

Relevance and depth

Summary/conclusion with clarity and conciseness

Presentation of work

The quality of text, writing and use of tables and figures

The quality and relevance of the bibliography, including evidence of wider reading

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Learning Goal: I’m working on a computer science discussion question and need guidance to help me learn.

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section.

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

RESEARCH PROJECT – INDIVIDUAL SUBMISSION -2

You are to select a firm that is experiencing significant economic, social, personal distress as a result of the fallout from COVID and the measures taken to combat it. You are writing as a managerial economics consultant with no way of predicting the course of the virus, how long it and restrictions on business activities will last, or what the economic climate will be like in the future. Begin by providing a BRIEF background and history of the firm and their place in the industry/economy they operate in. Historical information is to be short. More important is their current status – but not the most important. The firm you are consulting for knows its history and is primarily interested in learning about what they can do in the present and near future – this is where the great majority of your work should be. Detail the challenges they face at present and may encounter in the days ahead. Frame these challenges in the context of the real risks and uncertainties being dealt with. With the goal of helping the firm to eventually reach a fully functioning and healthy, profitable state, you are to provide recommendations for what actions they should take to deal with these successfully. This is the core of the project and where the majority of your efforts are to be directed. These actions should be practical, achievable and clearly stated – no fuzzy, feel good notions allowed. The material should be based on what you gain from sound industry/firm/economic/societal research and the application of a broad range of concepts and theories covered in this course, with more from economics and other relevant areas added at your discretion.

Do not select business that are currently successful, like Google, Facebook, Home Depot etc. Find one that is of interest to you that is experiencing real distress and may not survive. Do not use any work from previous classes or individuals (your own or others). Material in this Research Project is to be CURRENT – as in up to today if possible – with a clear focus on what can be done in the days ahead.

The final product is to be a 7-10 page report submitted here as a word document, with all sources referenced. The 7-10 pages does not include a cover page or references and any charts, graphs, pictures etc. can be put in an appendix. The format is mostly up to you, with the qualifier that it serve the interests of firms needing paths of action that enable them to survive and prosper. To that end, do not use SWOT etc. forms that are not suited to the specifics of the present and near future.

Grading Criteria:

  • Content Knowledge & Structure (25 points): All of the requested components are completed as assigned; content is on topic and related to managerial economics, critical thinking is clearly demonstrated (few, if any, direct quotations from the source in the paper); scholarly research is demonstrated; topics and concepts gained from the assigned reading and/or from research is evident.
  • Critical Thinking (15 points): Demonstrates substantial critical thinking about topics and solid interpretation of materials and reflection.
  • Clarity & Effective Communication (15 points): Communication is clear, concise, and well presented; scholarly writing is demonstrated; grammar, sentence structure, writing in the third person, and word choice is used correctly.
  • Integration of Knowledge & Articles (15 points): Articles used are current and relevant (preferably published within last five (5) years and MUST be from peer-reviewed journal article publications. At least four (4) peer-reviewed journal articles are examined and analyzed in the paper.
  • Presentation & Writing Mechanics (30 points): Cover page, headings, in-text citations, page citations (page number citations required for specific information such as dates, years, list of items from article, names, numbers, statistics, and other specific information), and references are properly formatted.

Please Note: Plagiarism will not be tolerated. The paper must be written in your own words.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section.

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Assignment: Project Planning

Create a research paper based on the attached project details. A paper template is provided to assign in writing the paper.

Do
research on two large software systems
that were implemented successfully and on one-or-two
large software systems that failed in their implementation. Write at least a
3-page Word document, double-spaced, detailing each
system
.

Your
paper should include a number of topic sections. Using the concept of
A.D.D.I.E., create a section to discuss the A.-Analysis that went into the
system, a section to discuss the D.-Design of the system, a section to discuss
the D.-Development of the system, a section to discuss the I.- Implementation
of the system (successful or failed) and a section to discuss the E.-Evaluation
of the system (successful or failed). Provide the following:

1.
An Introduction paragraph describing the assignment and a short description of
the systems selected.

2.
A section that describes the first Software System (with an appropriate section
Heading) and a description of that Software System to include:

a. What is its purpose?

b. What operations it performs?

c. What are its inputs (resources, interfaces, when used)?

d. What are its outputs (interfaces, data)?

e. The system’s complexity/cost/feasibility.

f. Any constraints or risks found during the research.

3.
Sections with details for each component of A.D.D.I.E. (with an appropriate
section Heading) to include:

a. Success or failures
identified.

b. Issues or findings identified.

c. Recommendations or lessons learned.

Your
paper should then conclude with a Findings section the compares the two
systems. Provide the following:

1. What made one system successful but make the other system
fail.

2. What could have been done to make the failed system more
successful.

3. What could have been done to make the successful system
even more successful.

You
must include at least 3 scholarly references with citations.

ATTACHED DOCUMENTS OF BETTER UNDERSTANDING

NO
PLAGIARISM. The explanation should be related and as per requirement else not going
to accept

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

Design a system to keep track of employee data. The system should keep track of an employee’s name, ID number and hourly pay rate in a class called Employee. You may also store any additional data you may need, hint, you need something extra. This data is stored in a file (user selectable) with the id number, hourly pay rate, and the employee’s full name (example):

17 5.25 Daniel Katz 18 6.75 John F. Jones

Additionally we would like to be able to print payroll information from data in a different file. The data is the employee’s id number and a number of hours that they worked (example):

17 40 18 20 18 20

As you see we can have the same number listed twice in which case that person should be paid the sum of the numbers (John Jones did 40 hours work, but it’s listed as 20+20).

You should start by reading in the first file and storing the data as objects in a linked list. You will need to create the linked list class and the Employee data class. You may opt to create your own doubly linked list class. (Note: if you cannot get it working, you can use the STL list class but 20% will be deducted). The Linked list could be templated or not, it’s up to you, however templating it would allow it to be used for other projects, so it might be a good idea.

Once you have read in the information from the first file, read in the second file. Ultimately we would like to print payroll information based on the hourly wage from the first file multiplied by the number of times an employee worked in the second file. How you do this is entirely up to you.

The output must be in sorted (descending; so the person who gets paid most prints first) order in the form of:

*********Payroll Information******** Daniel Katz, $270
John F. Jones, $210
*********End payroll**************

notes*

There are two .txt files( emps.txt and hours.txt)

emps.txt

17 5.25 Daniel Katz

18 6.75 John F. Jones

Horus.txt

17 40

18 20

18 20

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

By the end of this week, you should be able to:

  1. Explain the concept of correlation and the difference between positive and negative correlation.
  2. Compute a Pearson product-moment correlation coefficient.
  3. Use correlation coefficients to assess reliability, common variance, and effect size.
  4. Compute regression coefficiencts and fit a regression line to a set of data
  5. Predict scores on one variable based on scores from another variable.

Learning Materials blue header

Read:

  1. Exploring Statistics – Chapter 6: Correlation and Regression
  2. Exploring Statistics – Chapter 7: Theoretical Distributions Including the Normal Distribution
  3. Exploring Statistics – Chapter 8: Samples
  4. Week 3 – 4 PowerPoint
  5. JASP Resources and Tutorial Videos in the JASP folder below.
  6. Statistical Analysis for JASP: A Guide for Students – Pages 61 – 79
  7. INSTRUCTIONS:
    After reiewing the weekly readings and powerpoints, please complete the following:
    1. Describe one specific example
    in which a regression/Pearson Product moment correlation could be used
    to help make an informed decision. Please write in complete sentences.
    (10 points)
    2. Make a table that contains data
    that would be used to perform an analysis. Use your answer from #1 as
    the basis for your table. YOU DO NOT HAVE TO COLLECT DATA FROM AN OUTSIDE SOURCE. Make up the data that would make sense in the situation that you described in #1. (15 points)
    3. Run the analysis in JASP, Excel, or another program and record/upload your results. (10 points)
    4. Explain what decision you would make based on the results of the analysis that you performed. (15 points)

    Example:
    1. A coach wanted to know if the
    number of hours of practice per week shooting free throws improved the
    players skill in shooting free throws over the 8 week basketball season.
    2.

    Week Hours of practice Number of free throws made (out of 100 shots)
    1 1 17
    2 5 56
    3 3 29
    4 11 84
    5 5 59
    6 3 38
    7 8 64
    8 2 27

    3. The value of R is 0.9606. The P-Value is .000148. The result is significant at p < .05.

    4. As a coach, I see that the data shows a strong correlation
    between the number of hours of practice and the number of free throws
    made. Therefore, I would encourage my players to practice free throws as
    much as possible. The data shows a strong positive correlation.

2.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Computer Science Question

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section.

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  • Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    Problem 1

    Instructions: Your solution to this assignment will be submitted via Blackboard by using Word or some other editor for parts 1 and 2; Part 3 will be a java file. PDF or Word are great for Part 1 and Part 2. Your Java class for Part 3 should be submitted as .java file.

    Part 1: Model a real world entity. completion. You may use the idea you started in class or something else. You need to include identity, at least 3 attributes, and at least 3 methods. Do this in a text-type document.

    Part 2: Create a UML diagram for your object in Part 1. Be sure that you have at least one constructor to your diagram in addition to the attributes and methods. The diagram should be displayed similarly to the way we covered in class.

    Part 3: Create the Java class for your object from your UML diagram in Part 2. The class should compile but you do not need to create a main to demonstrate that the class is runnable.

    Problem 2: 9.1 (The Rectangle Class) pg. 360 in the textbook

    Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:

    ■ Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height.

    ■ A no-arg constructor that creates a default rectangle.

    ■ A second constructor that creates a rectangle with the specified width and height.

    ■ A method named getArea() that returns the area of this rectangle.

    ■ A method named getPerimeter() that returns the perimeter.

    Draw the UML diagram (using Word or some other editor) for the class and then implement the class. Write a test program that creates two Rectangle objects—one with width 4 and height 40

    and the other with width 3.5 and height 35.9. Display the width, height, area,

    and perimeter of each rectangle in this order.

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    Final Paper Directions

    The purpose of this final paper is for the doctoral candidate to make personal connections, and to organize and articulate their thoughts regarding the leadership theories and practices studied during the course.

    Directions & Specifications for the paper: The doctoral candidate should:

    1. Present research on the major leadership theories studied within the course;
    2. Apply Leadership in Theory and Practice to a leadership initiative/endeavor within thecandidate’s home institution or in an educational setting. For example, if you have started a new initiative, or had to make a change within your organization, then how did your leader (or you) address that within the organization. Are there examples of traits, skills, behaviors, servant leadership, situational leadership, transformational leadership, etc. that were utilized or observed during that experience? Simply make connections and apply the appropriate leadership theories covered in the course to the leadership initiative within your own organization.
    3. Report on the outcomes of that initiative based upon your observations, interviews, and first hand involvement;
    4. Include an overall reflection on candidate’s own leadership style in relation to the results from the numerous surveys such as: Leadership Trait Questionnaire, Skills Inventory, Blake & Mouton Leadership Inventory, the Multifactor Leadership Questionnaire (MLQ) Form 5X-Short, and/or the Ethical Leadership Style Questionnaire (Short Form), etc.
    5. Lastly, address topics associated with leadership such as motivation, ethics, and the concept of authority. (Can be embedded or addressed separately.)

    Specifications for the paper:

    • Length: 10 –15 pages,
    • Times New Roman, 12 point font, double-spaced
    • APA format according to APA Manual 7th Edition
    • 7 –10 sources (books and professional journals)

    Optional Outline for Final Paper (multiple approaches with key components may be used)

    • Introduction;
    • Define leadership and explain why it is important;
    • Literature review of major leadership philosophies, including connections to ethicsand motivation;
    • Personal Reflection has two parts: (May use first person in this section.)
      1. Application of Leadership Theory & Practice to home institution;
      2. Final reflection on collection of surveys and questionnaires;
    • Conclusion and Final Thoughts;
    • APA

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    It’s easy to get smarter about your money when you have a head start.

    In this assignment, you will use Excel to create a household budget to help maintain control over your finances and see how your money is being used.

    Conduct a short internet job search for the type of position you will be applying for once you have completed your education. Consider your work experience in this search. For example, if you have no experience in field, please search for entry level positions or the type of position someone with your background could reasonably qualify for. Look for three positions that include wage/salary information. Once you have found 3 job ads that include salary information, determine the average starting salary and use this as the basis for your household budget.
    Create an Excel spreadsheet of your own design to breakdown your household budget. List monthly expenses and monthly income. You will need to list your expenses for 12 months (so you should have columns for each month). Remember your expenses are not always the same every month (for instance your electric bill could fluctuate based on how hot it is). Be sure to format the expenses and income as currency using one of the formatting options in Excel. Do NOT use an online template. The designs must be easy and logical to read. You should start from a blank, clean, Excel document.

    Requirements of the assignment

    • Title your spreadsheet with a meaningful title, in bold, at least 16 point size, centered above your spreadsheet content and is centered over more than 3 columns. Use “Merge & Center” provided in Excel. The rest of the document should be in 12 point font. All data that represents money is formatted as currency.
    • Write your job title and the city and state you will live in
    • Include 3 job titles, locations, and starting salaries from the job search you performed. Find the average starting salary (using the AVERAGE function) Calculate and label your monthly income by dividing the annual income cell (reference the cell) by 12. Please make sure that your salary realistically and accurately matches your skill set (for instance, you will not start an engineering job making 90,000 a year).
    • Include at least 8 expense items such as electricity, telephone, gas, groceries, rent/mortgage, car payment, student loan payments, credit card payments, entertainment allowance, clothing allowance, etc.
    • Make all negative numbers appear in red using automatic formatting or conditional formatting provided in Excel. Choosing RED as the choice for the font color is not correct. Apply this formatting to the entire worksheet. You must have a negative somewhere in your calculations
    • For the following items, you MUST use an Excel function. You cannot calculate the values and enter a number. Excel functions include SUM, AVERAGE, MIN, MAX, etc. You must choose the correct Excel function and then use it properly to get full credit.
      • Using an Excel function, calculate the average of each type of expense category for the months you have listed. You must select the right function, such as SUM or AVERAGE, and then use the function correctly in the cell you have selected. Be sure to label the row or column (note this will depend on how you set up your budget sheet).
      • Calculate a subtotal for each expense category, using a function provided in Excel. You must select the right function, such as SUM or AVERAGE, and then use the function correctly in the cell you have selected. Be sure to label the row or column (note this will depend on how you set up your budget sheet).
      • Calculate a subtotal for each month, then a grand total of all the months, using functions provided in Excel. You must select the right function, such as SUM or AVERAGE, and then use the function correctly in the cell you have selected. Be sure to label the row or column (note this will depend on how you set up your budget sheet).
      • Calculate your monthly income after expenses. For each month, subtract the monthly expenses from the monthly income. Use an absolute reference to reference the cell of the monthly income. You must select the right function, such as SUM or AVERAGE, and then use the function correctly in the cell you have selected. Be sure to label the row or column (note this will depend on how you set up your budget sheet).
    • Include a pie chart to display the breakdown of expenses. Use the expense categories you have listed and the monthly totals you have calculated to create your pie chart. Put the pie chart on its own worksheet labeled “Chart”. Please note, the chart values should be from the budget page of the worksheet. Do not copy the values into the new worksheet.
    • Make sure your spreadsheet is clearly organized and well formatted. For example, no values should display as ##### so make sure your columns are of the correct width for the data.
    • Check your spelling
    • Create a footer displaying the filename.
    • Save your completed file with the filename formatted as Excel_Budget_yourfirstname_yourlastname.xls. An Excel document should be uploaded to D2L.

    I have included two (2) example budgets for you to review, Budget Example 1, Budget Exampe 2. These are from students from another section of this course. These are meant to be guides and not exemplars. Please note, even though these are PDFs, you are expected to upload a XLS.

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    In this week’s module, you learned about whistle-blowers. A whistle-blower is an individual who releases information (typically confidential) about actions that are deemed illegal or unethical. For this week’s discussion, you will select one of the scenarios and determine whether you would blow the whistle.

    In your initial post for this week, address the following:

    • State which scenario you selected.
    • Explain what you would do in that situation, and provide a rationale for your decision. You may want to consider:
      • How would you make that kind of decision?
      • How would you follow through with your decision?
      • What is the potential impact of whistle-blowing or not whistle-blowing?
      • Who would be involved?

    Scenario One: You work as an IT specialist at a major stock exchange. One of your colleagues, who also is a childhood friend, works in the accounting department. Over lunch, your colleague discloses the troubling information that they have been providing insider information to clients before it is made public. Your colleague doesn’t seem to see any issues with this, but you understand that any time an employee reveals insider information to an external party, it can create huge losses. Also, there is an organizational policy that requires all employees to refrain from disclosing insider information until senior leadership deems it ready for public view. Even though you don’t work in the same department as your colleague, would you blow the whistle on your colleague and close friend?

    Scenario Two: You work for a federal government agency as an information security analyst. Your job involves carrying out security measures to protect your agency’s IT systems. After you accepted the position, you signed a nondisclosure agreement to keep secret all of the agency’s operations. As you gain expertise in your job, you begin to question some of the ethics of your department, which developed mass surveillance technologies that are used in many locations around the world. The original purpose of these technologies is to monitor criminal activities, but innocent people who have no idea that they are being watched are surveilled. Eventually you start to question whether there is a violation of privacy involved. Would you blow the whistle on a federal agency?

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    Answer below questions, Chapter 3 & 4 in Information Systems for Business and Beyond

    References: At least two peer-reviewed, scholarly journal references (not including textbook) .

    1. Develop your own definition of software being certain to explain the key terms.

    2. What are the primary functions of an operating system?

    3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds?

    4. What is your favorite software application? What tasks does it help you accomplish?

    5. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.

    6. What does an ERP system do?

    7. What is open-source software? How does it differ from closed-source software? Give an example of each.

    8. What does a software license grant to the purchaser of the software?

    9. If you were running a small business with limited funds for information technology, would you consider using cloud computing? Find some web-based resources that support your decision.

    10. What is the difference between data, information, and knowledge?

    11.Explain in your own words how the data component relates to the hardware and software components of information systems.

    12. What is the difference between quantitative data and qualitative data? In what situations could the number 42 be considered qualitative data?

    13. What are the characteristics of a relational database?

    14. When would using a personal DBMS make sense?

    15. What is the difference between a spreadsheet and a database? List three differences between them.

    undefined

    16. Describe what the term normalization means.

    17. Why is it important to define the data type of a field when designing a relational database?

    18. Name a database you interact with frequently. What would some of the field names be?

    19. What is metadata?

    20. Name three advantages of using a data warehouse.

    21. What is data mining?

    22. In your own words, explain the difference between supervised learning and unsupervised learning. Give an example of each (not from the text book).

    23.Conduct some independent research on the process of business intelligence. Using at least two scholarly or practitioner sources, write a two-page paper giving examples of how business intelligence is being used.

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    You are expected to demonstrate knowledge about the class. Please select one of the following topics, and then start to research their current background, survey the related information, and analyze the structure of the requirements. Finally, you design the paper involving an appropriate project organization-structure and surveyed topics based on APA format.

    undefined

    Then write the term paper.

    undefined

    1. Overview of Tools used in Digital Forensics

    undefined

    2. Digital Forensics Investigative Process

    undefined

    3. Network Analysis Forensics

    undefined

    4. Mobile Devices Forensics

    undefined

    5. Cloud and offsite application Forensics

    undefined

    6. Mobile Cloud Forensics

    undefined

    7. Critical analysis of investigation methods and phases in digital forensics

    undefined

    8. Application of computer forensics in preserving the quality of electronic evidence

    undefined

    undefined

    Assignment Instructions:

    undefined

    1. No ZIP file

    undefined

    2. The submitted assignment must be typed by ONE Single MS Word/PDF file

    undefined

    3. At least 10 pages and 3 references

    undefined

    4. Use 12-font size and 1.5 lines space

    undefined

    5. No more than 4 figures and 3 tables

    undefined

    6. Follow APA style and content format: TAMUC follows the APA (American Psychological Association) for writing style in all its courses which require a Paper or Essay.

    undefined

    http://www.apastyle.org/

    undefined

    Project Construction Format:

    undefined

    You have to follow the following format:

    undefined

    Title: Topic

    undefined

    Your Name:

    undefined

    ID:

    undefined

    Abstract:

    undefined

    • Introduction
    • Background
    • Current Issues and Suggest Topics
    • Methods, Techniques, and Evaluations
    • Future Works
    • Summary
    • References

    undefined

    undefined

    Grading Rubrics:

    undefined

    This assignment is a team project. Grading for this assignment will be based on answers of completed the above requirements, quality, logic/organization of the paper, and language and writing skills. Please see as follows:

    undefined

    – Comprehension of Assignment (Addressed the question completely and thoroughly. Provided additional supporting evidence, demonstrating a full comprehension of subject matter): 20 percent

    undefined

    – Application of Course Knowledge and Content (Thorough technical application of course knowledge and content in a complete and concise manner): 20 percent

    undefined

    – Organization of Ideas (Original ideas are effectively developed and presented in a logical, sequential order throughout the entire assignment. Includes adequate and appropriate supporting evidence): 20 percent

    undefined

    – Writing Skills (Mechanics (spelling, grammar, and punctuation) are flawless, including proficient demonstration of citations and formatting throughout the entire assignment): 20 percent

    undefined

    – Research Skills (Accurate and applicable use of resources relevant to the subject matter that enhance the overall assignment): 20 percent

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    I need 2 Documents for the assignment one for Assignment 1 & one for Assignment 2 and it should be STRICTLY PLAGIARISM FREE.

    undefined

    ASSIGNMENT TOPICS:

    undefined

    Assignment 1

    undefined

    The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

    Your paper should meet the following requirements:

    • Be approximately four to six pages in length, not including the required cover page and reference page.

  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • ———————————————————————————————————————————————–

    Assignment 2

    Start your paper with an introductory paragraph.

    Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

    Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

    Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

    Conclude your paper with a detailed conclusion section.

    The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

    Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  • Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    Answer the following questions.

    Q1) Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

    Q2) There has been much focus on job protection through tariffs and trade negotiation recently. Discuss how and why this focus may or may not address the job changes coming due to robotics and AI technologies.

    Q3) Laws rely on incentive structures to encourage prosocial behavior. For example, criminal law encourages compliance by punishing those who break the law. Patent law incentivizes the creation of new technologies by offering inventors a period of limited monopoly during which they can exclusively use their invention. To what extent do these (and other) incentives make sense when applied to AI? How can incentive structures be created to encourage AI devices to behave in prosocial manners?

    Q4) To what extent do extralegal considerations come into play with regard to the above issues? Are there moral (or religious) dimensions to be considered when determining whether AI should be given rights similar to those of a person? Would AI-assisted law enforcement or court action erode faith in the criminal justice system and judiciary?

    Q5) Adopting policies that maximize the value of AI encourages future development of these technologies Such a course, however, is not without drawbacks. For instance, determining that a “robot tax” is not a preferred policy choice would increase the incentive to adopt a robot workforce and improve any relevant technologies. Elevating the state of robotics is a laudable goal, but in this instance, it would come at the anticipated cost of reduced public funds. How should trade-offs such as these be evaluated? Where should encouragement of technological progress (especially regarding AI) fall in the hierarchy of government priorities?

    Q6) Conduct online research to find at least one new robotics application in customer service. Prepare a brief summary of your research: the problem addressed, technology summary results achieved if any, and lessons learned.

    Q7) Explain why it is useful to describe group work in terms of the time/place framework.

    Q8) Describe the kinds of support that groupware can provide to decision-makers.

    Q9) Explain why most groupware is deployed today over the Web.

    Q10) Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

    For questions, 11 refer to the attached case study and answer based on that.

    Q11) Compare Simon’s four-phase decision-making model to the steps in using GDSS.

    Answer in proper APA format including Times New Roman with font size 12 and double spaced with proper references and in-text citations.

    One of the references should include this text Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11th Edition

    Include an APA cover page and include at least three APA formatted references (and APA in-text citations) to support the work.

    Make sure no Plagiarism!


    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    Instructions:

    Happy Smiles Dental Office is a medium size business in a nice neighborhood in your hometown. They have been in business 10 years and do all kinds of dental work. The business manager has asked you to do a gap analysis on their existing appointment scheduling process. You have done good requirements gathering and have managed to write up this narrative about how the process works currently, Your next step is to build the process models to visually illustrate how the process works, using the Gane and Sarson notation and process modeling syntax (rules). For this question, use the below narrative as we did in class and draw these three diagrams accurately.

    1. Current Logical Context Diagram
    2. Current Logical Functional Decomposition Diagram
      • you must have at least three levels starting at the Context Diagram level
    3. Current Logical Level-0 Diagram
      • you must have at least 3 processes in your answer plus all the other Gane and Sarson entities

    When you have finished your diagrams, convert them into a .jpg or .pdf file and submit each as answers to the appropriate questions in this Quiz.

    Notes:

    • In this narrative, the Scheduler role is fulfilled by the person who is also the receptionist, but it is the role of Scheduler that we’re focusing on here.
    • This entire narrative is from the point of view of the Scheduler who is part of the process.

    You may print this narrative if you wish to work off paper.

    Narrative for the Appointment Scheduling process

    When existing patients want an appointment, they phone the Scheduler in the Dentist office to make an appointment request. As they talk to the Scheduler, Patients provide their name, birthdate, phone number for texting the confirmation, email address, and preferred dates and times for an appointment. (Prior to this scheduling process, as new patients, patients provided much more information, such as address and insurance info, and that information exists now in the Patient database. That process is NOT included in our scope, but you should know that that data already exists in the Patient database.) When the Scheduler receives this call and appointment request from the Patient, they fill out the Appointment Request web form, as they are talking to the Patient. They also fetch the patient’s id from the Patient database while they are on the phone talking with the Patient. When the Scheduler completes filling out the web form, the Scheduler then checks the patient’s preferred times and dates against the office’s Daily Appointment Calendar to look for an opening. When the Scheduler finds an opening that matches with the Patient’s preferred date, the Scheduler offers that time/date to the Patient. If the patient declines the offered appointment, then the Scheduler gets another preferred date/time from the Patient and checks the Daily Appointment Schedule again. The Scheduler and Patient iterate this process until they agree on a date / time. Once the Patient agrees to a date and time, the Scheduler makes an appointment by updating the office’s Daily Appointments Calendar and sending a confirmation text to the patient with the date and time, and the name and address of the dental office.

    If a Patient wants to change an appointment, the Patient must phone the Scheduler and provide their name and date of the original appointment. Then the process is basically the same as scheduling a new appointment except that the Scheduler retrieves the original request from the patient database, and all the information on it (like phone number), rather than asking the Patient for it.

    Finally, when the actual appointment is completed, and the Dentist has done the work, the Scheduler updates the Patient database with the current date and notes what services the Dentist performed for the patient.

    Based on the following narrative draw these diagrams (and I’ll provide a new narrative that you haven’t seen):

    • Current Logical Context Diagram
    • Current Logical Functional Decomposition Diagram (you must have at least three levels starting at the Context Diagram level)
    • Current Logical Level-0 Diagram (you must have at least 3 processes in your answer)

    ———————————–

    Then you will read the narrative and, using the technique I cover in the Class 12 videos, you will draw accurate diagrams.For this test you will draw 3 kinds of current logical process models based on the narrative provided.

    You may create and submit your drawings in one of three ways. Choose and prepare before the test day. I prefer you do #1, or if you can’t then #2. But you do you. 🙂

    1. You may draw your diagrams with any drawing app (Visio, Lucidchart, Powerpoint, whatever) and submit your drawings that way. This is the best way, because then you can tell interviewers that you know a process modeling tool. I highly advise you practice a bit before the day of the test. You MUST use the Gane Sarson notation that I use in the class videos.
    2. You may draw your diagrams with pencil and paper and scan your drawings (one drawing per photo) with the scanner you have on your printer or any other scanner, but not your phone. This is the second best way. Again, you MUST use the Gane Sarson notation that I use in the class videos.
    3. Only if you have no scanner nor are comfortable using any app including Powerpoint for this test….you may draw on pencil and paper, take a photo of your drawing (one drawing per photo) with your phone and submit those three photos as .jpg files. These will inevitably have worse resolution than either of the above approaches, so it’s likely you and I will have to go back and forth to resolve any legibility problems. This is the “least best” way. And again, you must use the Gane Sarson notation.

    You will have 90 minutes to complete this exam, including any drawing, scanning, photographing and submitting. I’ve designed it so that you’ll need no more than 60 minutes to prepare all the DFDs, then you get 30 minutes to get them cleaned up and submitted. I will not track what you do in those 90 minutes. However, if you have not finished submitting your answer by the end of that 90 minute window, you will not get credit.

    Submit three files with these file names EXACTLY within the Canvas quiz. If you fail to name them correctly, you will not receive credit for them. I will have nearly 200 diagram files to manage, and I can’t search for yours if you don’t name it properly.

    Context Diagram:

    Lastname.FirstName.ContextDFD.jpg

    Functional Decomposition Diagram:

    Lastname.FirstName.Decomp.jpg

    Level-0 Diagram:

    Lastname.FirstName.Level0DFD.jpg

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized

    Computer Science Question

    • The grading criteria are as follows as per the rubric.I do not want to read your paper multiple times to pull out the gradable material. I also do not have page amounts. Answer each of the different information gathering techniques fully. If it is not fully answered I will deduct. Just make the HEADERS of the paper sections numbered 1-5 (taken from the grading rubric) and answer each question in order. Make a reference section at the end in the proper format with a minimum of 3 references. 1. Researched: Gave reasons for use and best practices using: Interviewing users and Stakeholders (17 Points)2. Researched: Give reasons for use and best practices using distribution and collecting questionnaires. (17 Points)3. Researched: Give reasons for use and best practices using observing and documenting business procedures. (17 Points)4. Researched: Give reasons for use and best practices using collecting active user comments and suggestions. (17 Points)5. Researched: Give reasons for use and best practices using researching vendor solutions. (17 Points)6. Use at least 3 Quality Resources. (5 Points) 7. Clarity and writing mechanics. (10 Points)
    • INFORMATION-GATHERING TECHNIQUES

      Information-Gathering Techniques

      Create a report for your Manager on Information-Gathering Techniques.Gathering information for a new system is important and sets the tone of the development cycle. If not done thoroughly, the project could be a failure before it begins.You are the Project Manager of XYZ Enterprises. Your manager gives you the task of researching the different techniques used to gather information as the company is going to replace their Case Management System. He would like a report of all the different type of information gathering listed below. For each technique, give reasons to use it and the best ways to accomplish using each information-gathering method.

      • Interviewing users and stakeholders.
      • Distributing and collecting questionnaires.
      • Observing and documenting business procedures.
      • Collecting active user comments and suggestions.
      • Researching vendor solutions.

      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.The specific course learning outcome associated with this assignment is:

      • Research the techniques used to collect and gather information for the design of a new system.

    Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

    Posted in Uncategorized