Questions
JAVA question here, and thank you. I need ot update the following classes an fixme's on...

JAVA question here, and thank you. I need ot update the following classes an fixme's on this.canvas = null etc.

Thanks!

import android.graphics.Canvas;
import android.graphics.Paint;
import android.graphics.Paint.Style;
import edu.luc.etl.cs313.android.shapes.model.*;

/**
 * A Visitor for drawing a shape to an Android canvas.
 */
public class Draw implements Visitor<Void> {

   // TODO entirely your job (except onCircle)

   private final Canvas canvas;

   private final Paint paint;

   public Draw(final Canvas canvas, final Paint paint) {
      this.canvas = null; // FIXME
      this.paint = null; // FIXME
      paint.setStyle(Style.STROKE);
   }

   @Override
   public Void onCircle(final Circle c) {
      canvas.drawCircle(0, 0, c.getRadius(), paint);
      return null;
   }

   @Override
   public Void onStrokeColor(final StrokeColor c) {

      return null;
   }

   @Override
   public Void onFill(final Fill f) {

      return null;
   }

   @Override
   public Void onGroup(final Group g) {

      return null;
   }

   @Override
   public Void onLocation(final Location l) {

      return null;
   }

   @Override
   public Void onRectangle(final Rectangle r) {

      return null;
   }

   @Override
   public Void onOutline(Outline o) {

      return null;
   }

   @Override
   public Void onPolygon(final Polygon s) {

      final float[] pts = null;

      canvas.drawLines(pts, paint);
      return null;
   }
}

In: Computer Science

As a Sys admin you were asked to plan a network including three subnets each one...

As a Sys admin you were asked to plan a network including three subnets each one for a different usage. You may plan the net for the organization you are familiar with, or an imaginary net you dreamed to implement. Be specific with your plan including all IP Addresses hosts. Include a graphic layout of your plan.

In: Computer Science

In this case study, your task is to study different search algorithms to solve the N-Queens...

In this case study, your task is to study different search algorithms to solve the N-Queens Problem which has been presented in class. We will focus on the incremental formulation in which we add a queen to any square in the leftmost empty column that is not attacked by any other queen.

Question: Does Simulated Annealing (SA) algorithms (with 10 iterations) solve the 14-Queens Problem? What about Simulated Annealing (SA) algorithms (with 50 iterations). Show your answer.

In: Computer Science

Create a java program with class Customer: Name, Surname, ID (incremental ID by 1 for each...

Create a java program with class Customer: Name, Surname, ID (incremental ID by 1 for each new customer), Email, Phone, Address. The program must create New customer, and Print information for customer with a certain ID.   

In: Computer Science

**I need rewrite the answer with unique word ... thank you   Q1: What strategic competitive benefits...

**I need rewrite the answer with unique word ... thank you  

Q1:

What strategic competitive benefits do you see in a company’s use of extranets?

Answer :

An extranet can increase the value of your organization by helping you convey and work together more viably with customers, clients, and accomplices. Especially in the business-to-business market, an extranet can give your organization an edge over the opposition and set aside you cash by smoothing out conventional business capacities and reducing overhead expenses.

Extranets accomplish a similar work as an intranet, however it additionally takes into account correspondence on the planet. An extranet permits client, sellers and providers to get to the data through the PC framework. The organizations use extranets to get strategic like:

1. Expanded efficiency: As you mechanize measures that were generally done physically, bottlenecks will vanish and your organization's profitability will increment. Basic data won't lose all sense of direction via the post office or covered in an email inbox, and occupied representatives won't miss or overlook key functions. An extranet can, for instance, screen business exercises and trigger explicit activities, for example, naturally submitting a request with a provider when your stock dips under a specific level.

2. More limited chance to advertise: In the event that your business isn't moving at "Web speed," you hazard being abandoned. An extranet can assist you with getting your items to showcase all the more rapidly by making proposition and determinations accessible to providers, and surrendering customers and accomplices to-date data on current undertakings.

3. Construct client loyalty : Extranets make business simpler for your clients. The more you make convenient, precise data accessible to your clients, the more probable it is you'll keep their business

4.Reduced stock : One of the signs of a business-to-business extranet is its effect on flexibly chain the board. By connecting your stock framework straightforwardly to a provider, you can handle arranges when the framework realizes you need them, in this manner lessening the stock you keep available and making the acquirement cycle more proficient.

Q2:

Data Modelling is the primary step in the process of database design. Compare and contrast Conceptual data model versus Physical data model. Illustrates with help of example to list down data (entities), relationship among data and constraints on data.

Data modelling is the first step in database design. It is the process of creating a data model for the data to be stored in a database. It is considered as the high level. It is also referred as the conceptual design. Data modeling helps in the visual representation of data and enforces business rules, regulatory compliances, and government policies on the data. Data Models ensure consistency in naming conventions, default values, semantics, security while ensuring quality of the data..It describes the data contained in the database, relationship between data items and the constraints on the data.

Conceptual data model

This Data Model defines WHAT the system contains. The purpose is to organize, scope and define business concepts and rules. It  is an organized view of database concepts and their relationships.. It does not have the complete data of the database. It is used to create  entities, their attributes, and relationships.

·Includes the important entities and the relationships among them.

·No attribute is specified.

·No primary key is specified.

Physical Data model

This Data Model describes HOW the system will be implemented using a specific DBMS system. The purpose is actual implementation of the database.It offers database abstraction and helps generate the schema. The physical data model also helps in visualizing database structure by replicating database column keys, constraints, indexes, triggers and other schemas.

  • Specification all tables and columns.
  • Foreign keys are used to identify relationships between tables.
  • Denormalization may occur based on user requirements.
  • Physical considerations may cause the physical data model to be quite different from the logical data model.

In: Computer Science

“The software design/development team and test engineers need to develop a strategy for planning, design, execution,...

“The software design/development team and test engineers need to develop a strategy for planning, design, execution, data collection, and test evaluation”. Discuss this statement.

please no handwrite

please no picture

In: Computer Science

PYTHON WHILE Write a program that prompts for and reads the number ? of spheres to...

PYTHON WHILE Write a program that prompts for and reads the number ? of spheres to be processed. If ?≤0 your program must display an error message and terminate; otherwise it does the following for ? times:

  • Write a program that prompts for and reads the number ?n of spheres to be processed. If ?≤0n≤0 your program must display an error message and terminate; otherwise it does the following for ?n times:
    • Prompts for and reads the volume of a sphere, it then displays the surface area of the sphere with that volume. Assume that each volume is in cubic centimeters.
  • The program finally displays the average of the surface areas of the ?n spheres.
  • Please note that
    • ?=3.14159π=3.14159.
    • volume =43??3=43πr3.
    • surface area =4??2=4πr2.
  • The following are sample runs of the program.

In: Computer Science

Java question: I need to fix a point class (code below) Thank you! /** * A...

Java question: I need to fix a point class (code below) Thank you!

/**
 * A point, implemented as a location without a shape.
 */
public class Point extends Location {

   // TODO your job
   // HINT: use a circle with radius 0 as the shape!

   public Point(final int x, final int y) {
      super(-1, -1, null);
      assert x >= 0;
      assert y >= 0;
   }
}

In: Computer Science

A = [-1000:1:1000] write a script file that gives the positive numbers greater than 480 and...

A = [-1000:1:1000] write a script file that gives the positive numbers greater than 480 and divisible by 3. Hint: Use this command if A(i)>480&&(rem(A(i),3)==0) and indeed, if is always accompanied by an end

In: Computer Science

In terms of Cubersecurity, Develop your organizations (or organization of choice) Comprehensive Information and Security Program...

In terms of Cubersecurity, Develop your organizations (or organization of choice) Comprehensive Information and Security Program answering the following questions:

Organisation Name: Kisi
Company Type: Wireless Access Control Ststem
Employee number:30-50

(PLEASE TRY TO ANSWER ALL MY QUESTIONS. THANK YOU)

11. Physical Security
What are the basic fundamentals of your physical security program?
12. Policies
• Data Classification and Governance Policy
Write a short description
• Identify and Access Management Policy
Write a short description
• Data Retention and Destruction Policy
Write a short description
• Website Privacy Policy and Terms of Use
Write a short description
• Mobile Device Policy
Write a short description
• Acceptable Use Policy
Write a short description
13. Procedures
• Business Recovery Procedures
Write a short description
• Disaster Recovery Procedures
Write a short description
• Incident Response Procedures
Write a short description
• Identity and Access Management Procedures
Write a short description
• Third Party / Supply Chain Due Diligence Procedures
Write a short description
• Software Development Lifecycle Procedures
Write a short description (Include how your software team handles cybersecurity fundamentals)
14. Guidelines
• Data Loss Prevention Guidelines
Write a short description
• Physical Security Guidelines
Write a short description
• Inventory and Asset Management Guidelines
Write a short description
• Vulnerability Management
Write a short description
15. Testing
• Annual Risk Assessments
Write a short description
• Annual Penetration Testing
Write a short description
• Annual DR/BCP Testing
Write a short description
• Periodic Phishing Testing
Write a short description
16. Configuration Standards
• Mobile Device Configuration Standards (Mobile Device Management)
Write a short description
• Desktop / Laptop Configuration Standards
Write a short description
• Network Device Configuration Standards
Write a short description
• Network Security Standards
Write a short description
• Email Configuration Standards (incoming / outgoing / mail client)
Write a short description
17. Cyber Defense Program
Outline your Cyber defense strategy. What are the core tenets? What are the baseline fundamentals of cyber defense?
• Technical Cyber Program:
o Outside your borders
o Outer shell
o Inner Shell
o Bedrock / Underpinnings (items that apply to all layers, and all architectures … cloud e.g.)
• Team / Organization Structure:
How is your Cyber team structured? What are the key roles and responsibilities? What are the operations this group is responsible for (think about “event” and “incident” handling class we took e.g.)

In: Computer Science

what is an analog system? what is an digital system? which one is better the analog...

what is an analog system?
what is an digital system?
which one is better the analog or digital and why?

In: Computer Science

What role should measurement play in a good testing strategy?

What role should measurement play in a good testing strategy?

In: Computer Science

Write a Python program that asks the user to enter the monthly costs for the following...

Write a Python program that asks the user to enter the monthly costs for the following expenses incurred from operating his or her automobile:

  1. Loan payment
  2. Insurance
  3. Gas
  4. Oil
  5. Tires
  6. Maintenance

Write a function that takes these six items as arguments and computes the total cost of these expenses.

Write a main program that asks the user for these six items and calls your function.

Print total monthly cost and the total annual cost for these expenses.

Your function should not have any input statements or print statements (except for debugging print statements).

In: Computer Science

Explain the crypto-economy concept of blockchain? Explain how cryptographic hash function is applied to protect the...

Explain the crypto-economy concept of blockchain? Explain how cryptographic hash function is applied to protect the integrity of blockchain transactions and to detect double-spending attack. State the property of the hash function that is relevant for each application.

In: Computer Science

Question is based on AWS Fortinet 7000 What is application ID in an application firewall and...

Question is based on AWS Fortinet 7000

What is application ID in an application firewall and how is it used? What does a firewall signature mean?

In: Computer Science