CIS432 Strayer Lab 4 Electric Car Financing App

CIS432 Strayer Lab 4 Electric Car Financing App.

  1. ab Assignments Worth 60 points eachPlease download this document to complete and submit: CIS432 Lab 4, Electric Car Financing App
    To review screen shot signature requirements for this lab click hereAny and all written answers must be entered into the online course shell with the submission of the attached lab assignment.

    Weekly Lab Breakdown
    Week Due Graded Lab Exercises
    1 None
    2 None
    3 Lab 1: Sailing Adventures App
    4 None
    5 Lab 2: Bike and Barge App
    6 None
    7 Lab 3: Northern Lights Animation App
    8 None
    9 Lab 4: Electric Car Financing App
    10 Lab 5: Publishing Your Android App

    Each lab assignment will be graded based on the following:

    1. The program must compile, execute, produce correct results, and meet all of the specifications in the weekly lab.

    Additionally you must:

    1. Organize the code for user readability.
    2. Organize the code for reusability.
    3. Provide documentation with embedded comments for reader understanding.
    4. Organize the code for efficiency.

    Click here to view the grading rubric.

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

CIS432 Strayer Lab 4 Electric Car Financing App

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Expert Systems and Intelligent Agents Discussion

Expert Systems and Intelligent Agents Discussion.

“Expert Systems and Intelligent Agents”

  • Use the Internet or the Strayer Library to research articles on expert systems and companies which use them. Next, select two (2) companies that currently use expert systems. Then, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your response.
  • Select one (1) of the four (4) categories of intelligent agents, as discussed in Chapter 13 of the textbook, that is currently available. Identify the main risks of using intelligent agents in the category that you have selected. Next, speculate on one (1) way which you would use in order to mitigate the risks in question. Justify your response.

Expert Systems and Intelligent Agents Discussion

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

ISSC 366 AMU Keyloggers Software Testing and Port Scan Prevention Questions

ISSC 366 AMU Keyloggers Software Testing and Port Scan Prevention Questions.

Issc366 Assignment:

minimum of 250 words

In this exercise, you are going to connect to the site https://www.ssllabs.com/ssltest/. Paste in the Input Box – http://www.apus.edu
and click on SUBMIT. This SSL test will test the strength of the SSL
configuration of the Server. Analyze the results and point out 3
strengths and one weakness (if exists) of the site.

Issc431 Assignment:

You are encouraged to conduct research and use other
sources to support your answers. Be sure to list your references at the
end of your post. References must be in APA citation format and minimum of 250 words.

For this assignment, answer the following:

  • How do you remove a key logger?
  • What is the difference between black box testing and white box testing?
  • What can you do to prevent a port scan?

ISSC 366 AMU Keyloggers Software Testing and Port Scan Prevention Questions

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Celtics Income Statements and Kellogg Company Balance Sheet Analysis Report

Celtics Income Statements and Kellogg Company Balance Sheet Analysis Report.

Program 5

Learning Outcomes

  • Design and implement a solution from scratch.
  • Use the pandas library to load, manipulate, and analyze data.
  • Use the matplotlib library to create visualizations highlighting a specific insight.

Assignment

  • Use the Airlines CSV for this assignment.
  • Use the pandas library and the matplotlib library to create two different visualizations to help a user gain insight into the airlines.csv file.
  • Optional: you can make one of your visualizations about predictions generated using the sklearn package.
  • In order to save your visualizations, you can use the plt.savefig(output_filename.png)command, as in Lab 11.

Grading – 100 points

10 points – pandas is used to load and manipulate the data.

10 points – matplotlib is used to create the two visualizations.

10 points – Each matplotlib visualization is a different type. For example, one visualization could be a bar chart and the other could be a line chart.

10 points – The visualizations are saved in the same directory as the Python file as visualization1.png and visualization2.png.

20 points – All aspects of each visualization are clearly labeled (titles, axes, etc). 3 points for each type of improvement up to 20 points.

15 points – The first visualization contains at least two insights that are explained carefully in a comment at the top of your program. For example, in the matplotlib activity 3 video, we saw that Montana’s population growth slowed in the 1920s through 1940s and posited that this was due to drought and depression. 5 points per explained insight.

15 points – same as above for the second visualization.

10 points – The Python solution is properly commented, easy to understand and does not contain unnecessary code. 3 points for each type of improvement up to 20 points.

Celtics Income Statements and Kellogg Company Balance Sheet Analysis Report

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

ISSC 481 American Military University National Security Culture Discussion

ISSC 481 American Military University National Security Culture Discussion.

issc452 assignment:

References must be in APA citation format. posts
must be a minimum of 250-300 words.

1. If you could, what would you do to help create a national “security
culture” in which everyone is more knowledgeable and proactive about
threats to information security?

2. There have been several incidents of data theft or loss involving
personal information held by large companies. As a result, legislation
is being discussed that would provide penalties not just for data
thieves, but for companies that fail to keep private information secure.
Discuss your opinions about this as a group. Are such laws needed?
Please give reasons to support your answer.

issc481 assignment:

References must be in APA citation format. posts
must be a minimum of 250-300 words.

1. Are the security needs of small businesses different than those of a larger corporation? Please support your answers.

2. One of the major complaints regarding information security regulations is that they place an unfair burden on organizations as they are costly unfunded mandates. Do you think that it is fair for governments to require private organizations to comply with regulations that will cost them money?

ISSC 481 American Military University National Security Culture Discussion

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Advanced C++ coding discussion

Advanced C++ coding discussion.

The goal of this assignment is to give you practice in function and class templates and applying other concepts covered in the course.

You are to create a generic (class template) hash table. You will use this template to create a “Dictionary” of words. The words will be stored in a (library) class type that you will derive from string. You will use your hash table Dictionary to spell check a document and perform some analysis of the efficiency of your hash table.

Program Steps

  1. Derive a class from string, call Mystring. You will use this class to store words from the Dictionary file. The class should contain necessary constructors, a conversion operator to convert Mystrings to unsigned int, a tolower function to convert the letters in a word to lower case, and a removePunctuation function to strip off non-alphabetic characters from both ends of the word. This class should be tested and then placed in a library.
  2. Create a generic linked list. Do this by creating a Node and List class template. You will use this by instantiating a template class of type Mystring.
  3. Create a hash-table class template, called Myhash. You may use the hash function shown below for your hashing algorithm. To resolve “collisions” in your hash table, use “chaining” implemented with your generic linked list from the previous step. You will instantiate your hash table class template to create a template class of Mystring. The Myhash class template should have size, insert and find member functions and member functions necessary to produce the 3 statistics shown in the output below (percent of buckets used, average bucket size, and largest bucket size). The Myhash insert function should throw a DuplicateError exception when a duplicate Mystring is attempted to be inserted into the Myhash template class object (the dictionary).
  4. Create a DuplicateError class template, derived from the logic_error standard exception. This class template will be instantiated to create a template class of Mystring.
  5. Run the code found in the suggested main function below. Your output should identify duplicate words (type Mystring) that were attempted to insert into the Dictionary, the number of words in the Dictionary, the hash-table bucket statistics (shown in the sample output), and misspelled words (plus total).
// hash function adapted from: Thomas Wang https://gist.github.com/badboy/6267743
unsigned hash(unsigned key) {

int c2 = 0x27d4eb2d; // a prime or an odd constant
key = (key ^ 61) ^ (key >> 16);
key = key + (key << 3);
key = key ^ (key >> 4);
key = key * c2;
key = key ^ (key >> 15);
return key % buckets;
}

Note: if you use this function as a member function, make it a const member function.

Submission Requirements

Submit all of your source files, header files, and your archived Mystring library file in a compressed (zipped) file, contained in one folder. The instructor will unzip your files, compile and execute your program. Also, make sure you identify your compiler and OS in a comment in your main function.


Suggested main function

int main()
{
Myhash<Mystring,1500> Dictionary(true); // throw if duplicate words
Mystring buffer;

const string DictionaryFileName = “c:/temp/words”;
const string DocumentFileName = “c:/temp/roosevelt_first_inaugural.txt”;

ifstream fin(DictionaryFileName.c_str());
if (!fin)
{
cerr << “Can’t find ” << DictionaryFileName << endl;
exit(-1);
}
while (getline(fin, buffer))
{
// remove r if present (this for Mac/Linux)
if (buffer[buffer.size()-1] == ‘r’)
buffer.resize(buffer.size() – 1);
buffer.tolower();
try
{
Dictionary.insert(buffer);
}
catch (const DuplicateError<Mystring>& error)
{
cout << error.what() << endl;
}
}

cout << “Number of words in the dictionary = ” << Dictionary.size() << endl;
cout << “Percent of hash table buckets used = ” << setprecision(2) << fixed << 100 * Dictionary.percentOfBucketsUsed() << ‘%’ << endl;
cout << “Average non-empty bucket size = ” << Dictionary.averageNonEmptyBucketSize() << endl;
cout << “Largest bucket size = ” << Dictionary.largestBucketSize() << endl;

fin.close();
fin.clear();

// Spellcheck
unsigned misspelledWords = 0;

fin.open(DocumentFileName.c_str());
if (!fin)
{
cerr << “Can’t find ” << DocumentFileName << endl;
exit(-1);
}
while (fin >> buffer)
{
buffer.tolower();
buffer.removePunctuation();
if (!buffer.size())
continue;
if (!Dictionary.find(buffer))
{
misspelledWords++;
cout << “Not found in the dictionary: ” << buffer << endl;
}
}
cout << “Total mispelled words = ” << misspelledWords << endl;
}


Sample Output

Your output should look “similar” to the following:

Duplicate Mystring: clone
Duplicate Mystring: duplicate
Duplicate Mystring: resting
Duplicate Mystring: triplet
Duplicate Mystring: triplet
Duplicate Mystring: twin
Duplicate Mystring: two
Number of words in the dictionary = 24048
Percent of hash table buckets used = 100.00% <- You might see something different here (like 57.60%)
Average non-empty bucket size = 16.03
Largest bucket size = 43
Not found in the dictionary: consecration
Not found in the dictionary: induction
Not found in the dictionary: presidency
Not found in the dictionary: candor
Not found in the dictionary: impels
Not found in the dictionary: preeminently
Not found in the dictionary: boldly
Not found in the dictionary: conditions
Not found in the dictionary: nameless
Not found in the dictionary: paralyzes
Not found in the dictionary: retreat
Not found in the dictionary: frankness
Not found in the dictionary: vigor
Not found in the dictionary: understanding
Not found in the dictionary: convinced

Not found in the dictionary: rounded
Not found in the dictionary: registered
Not found in the dictionary: asked
Not found in the dictionary: direction
Not found in the dictionary: humbly
Total mispelled words = ??? <— The number should be between 150 and 200

Advanced C++ coding discussion

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Data Analysis Creation and Design of MySQL Schema Objects Lab 10

Data Analysis Creation and Design of MySQL Schema Objects Lab 10.

lab 9

Competencies:
  • Creation and Design of MySQL Schema Objects
    • Design and create normalized databases
      • Create and drop a database
    • Create and modify tables using appropriate data types and indexing
    • Describe and create table constraints enforcing data integrity
      • Code primary and foreign key constraints
      • Create and drop indexes

Requirements:

  • Create a new MySQL database for your data
  • Identify the data types and lengths for each field in your normalized table structure from Lab 10 or you may forward engineer the EER diagram into a table structure.
  • Create the table structures for each of your tables and save the commands in a .sql script or a text file.
  • Be sure to include all primary and foreign key constraints.
  • Add data to each of your tables. You should have 10 rows in each table. You may load the data directly or import it from a file.
  • Create a query for each of your tables to select all columns and rows of the tables in your database. Save your results as a .sql script.
  • Click on the View/Complete link at the bottom of this assignment. Attach the two text or script files (one with the structure and one with the data) to the assignment and Submit.

Grading Rubric:

Criteria Points

Create a MySQL database

5 points

Create the tables

30 points

Create all primary and foreign key constraints

15 points
Add at least 10 rows of data to each table 10 points
Create select queries for each table 15 points
Save the queries and structure commands in one or more sql files and submit. 5 points

Total

80 points


lab 10

Lab 10: Users and Views, Queries and Backup

Competencies:
  • Creation and Design of MySQL Schema Objects
  • Creating and modifying views
    • List the benefits of using views
    • Create a view
    • Alter or drop a view
    • Select and update database information using a view
  • Understand user privileges in SQL
    • Create, rename and drop users
    • Grant view and revoke user privileges
  • Query for data
  • Backup your database

Requirements:

  • Identify the types of users that would be using your database by job type. For example, you might have a sales clerk entering sales information and an hr rep entering personnel information. You should have at least 3 different categories of users for your system.
  • For each user category determine which tables they would need access to and the type of access they would need (select, update, insert, delete, grant)
  • Identify at least one view for each user category that would help them easily retrieve the data that they need access to. One of the views should be an updatable view.
  • Create the views and save the commands in a script file.
  • For each user category, identify and write 5 queries that they would need to use on a regular basis. You should have 15 queries, including the following:
    • At least 2 queries that join tables
    • At least 1 insert query, 1 update query and 1 delete query
    • At least 1 queries that uses a view
    • At least 1 query that includes a calculation or an aggregate function.
    • Save your queries in a .sql file.
  • Create one user for each role and grant them the privileges they need to do their job. Save the commands in a .sql file
  • Describe to me the role of each user, the access needed, the views created and why. This may be in a text file or typed into the comments for the assignment.
  • Perform a full backup of your database using the Export function in the workbench.
  • Attach all sql queries (views, queries, users and privileges) as well as the database export file to this assignment.

Grading Rubric:

Criteria Points

Identify 3 categories of users and the access required

5 points

Create 3 views – 1 for each category.

15 points

Create 1 user for each category and grant them access to the tables and views required.

15 points

Describe the roles of each user, access needed, views created and why. 15 points

Create 15 queries, including:

  • At least 2 queries that join tables
  • At least 1 insert query, 1 update query and 1 delete query
  • At least 1 queries that uses a view
  • At least 1 query that includes a calculation or an aggregate function.
15 points
Full database backup 10 points
Attach a file with the scripts and database export 5 points

Total

80 points

Data Analysis Creation and Design of MySQL Schema Objects Lab 10

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

California Southern University Encoding a Poem and Discussion

California Southern University Encoding a Poem and Discussion.

please find the assignment attached below

these are the poems; choose one and do the assignment on it.

Emily Dickinson, “After great pain, a formal feeling comes”: https://www.poetryfoundation.org/poems/47651/after-great-pain-a-formal-feeling-comes-372 (Links to an external site.)

Emily Dickinson, “Crumbling is not an instant’s Act”: https://www.poetryfoundation.org/poems/56823/crumbling-is-not-an-instants-act-1010 (Links to an external site.)

Emily Dickinson, “I felt a Funeral, in My Brain”: https://www.poetryfoundation.org/poems/45706/i-felt-a-funeral-in-my-brain-340 (Links to an external site.)

Emily Dickinson, “I heard a Fly buzz – when I died”: https://www.poetryfoundation.org/poems/45703/i-heard-a-fly-buzz-when-i-died-591 (Links to an external site.)

Emily Dickinson, “Much Madness is divinest Sense”: https://www.poetryfoundation.org/poems/51612/much-madness-is-divinest-sense-620 (Links to an external site.)

Charlotte Mew, “On the Asylum Road”: https://www.poetrynook.com/poem/asylum-road

California Southern University Encoding a Poem and Discussion

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

SFSU Features and Structures of Linker vs Loader Comparative Essay

SFSU Features and Structures of Linker vs Loader Comparative Essay.

This is a WRITTEN ESSAY based assignment.

Background:

When you compile a program it produces an OBJECT file. A number of these object files (along with library files) are combined into an EXECUTABLE file by the LINKER. It is the linker’s responsibility to combine the objects and resolve as many references as possible and produce an executable format file. The LOADER Is responsible for converting the executable image on disk to a runnable process in memory. This involves the relocation of the program to its starting point in memory as well as any dynamic linking and loading.

Task:

Compare and contrast the linker versus the loader and detail the features and structures of each. Show the actual specification of the embedded data structures and how they are transformed in the linking and loading processes.

Requirements:

The paper must include an abstract, detailed explanations, diagrams, references and were necessary a glossary of terms. The paper must also include a detailed bibliography of all cited and referenced materials. It is expected that this paper be at least 4 pages in length not including diagrams, abstract and bibliography.

Grading:

This paper will be graded based upon its completeness, accuracy, and clarity. Failure to site references will result in that aspect of the paper being ignored and not counted in the grading.

SFSU Features and Structures of Linker vs Loader Comparative Essay

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

San Francisco State University OBJECT File Programming Project

San Francisco State University OBJECT File Programming Project.

This is a PROJECT/PROGRAM based assignment and must be coded in C.

Background:

When you compile a program it produces an OBJECT file. A number of these object files (along with library files) are combined into an EXECUTABLE file by the LINKER. It is the linker’s responsibility to combine the objects and resolve as many references as possible and produce an executable format file. The LOADER Is responsible for converting the executable image on disk to a runnable process in memory. This involves the relocation of the program to its starting point in memory as well as any dynamic linking and loading.

Task:

Write a loader that can actually load a Linux executable file and execute it. This will require understanding the executable file format. Use the Hexdump program provided as part of the File System project as the program to load and run. Hint: look a mprotect, and mmap for allocating the memory needed. You will execute it under your own process (no need to fork).

Requirements:

This project must be coded in C, be well documented, and code segments copied must be attributed and must not be complete components of the project. Your program must allocate the memory for and jump to executing the loaded program (don’t forget the arguments). In addition to your source code file, include a short writeup on what you did and how you did it, include diagrams where appropriate.

Grading:

This project will be graded based upon its completeness, accuracy, and functionality. Failure to site cribbed code will result in that aspect of the project being ignored and not counted in the grading.

San Francisco State University OBJECT File Programming Project

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount