Questions
Enterprise architecture is often dependent on the vision, mission, goals, and strategies of an organization. Independence...

Enterprise architecture is often dependent on the vision, mission, goals, and strategies of an organization. Independence Medical Center's current mission and vision statements follow:

  • Mission Statement: Independence Medical Center is the premiere choice for customer service excellence, providing health care to the region by combining cutting-edge technology and equipment with evidence-based, patient-focused care.
  • Vision Statement: A regional medical center that provides compassionate, patient-centered care to all area residents.

Use the Internet to find descriptions of two organizations' enterprise structures or data governance programs. Compare the two, noting the pros and cons of each.

Post rough drafts of updates to the vision and mission statements for Independence Medical Center, incorporating the concept of enterprise information management based on your research.

Cite at least one reference using APA format in your initial post.

In: Computer Science

You are about to implement the wireless network security measures and policies you just described above,...

You are about to implement the wireless network security measures and policies you just described above, and your boss sends you to talk with two operations managers. The managers are concerned that new restrictions will inhibit their workers and lower performance, which would create a risk to the company in meeting its minimum production levels. Your task (to answer this question) is to explain to the managers how the wireless security measures and policies relate to risk management for the company and alleviate the managers’ concerns.

In: Computer Science

The industrialization of the world has been described as a “Faustian bargain.” Another perspective holds that...

The industrialization of the world has been described as a “Faustian bargain.” Another perspective holds that industrialization has freed humanity from the bonds imposed by nature. Based on the readings in this module, as well as on your own experience and other readings, do you agree with one of these positions? If so, why? If not, do you have an alternative perspective?

In: Computer Science

Briefly describe at least six (6) ways to harden a network, including servers and workstations, and...

Briefly describe at least six (6) ways to harden a network, including servers and workstations, and the network configuration (architecture); then explain in detail the first two steps you would take toward achieving a secure network.

In: Computer Science

Based on a Node class; Use Java to implement the OrderedList class which represents an ordered...

Based on a Node class;

Use Java to implement the OrderedList class which represents an ordered singly linked list that cannot contain any duplicates. Note that items in the OrderedList are always kept in descending order. Complete the class with the following methods.

  • Default constructor
    Create an empty list i.e., head is null.
  • boolean insert(int data)
    Insert the given data into the list at the proper location in the list. If the insertion is successful, the function returns true; otherwise, returns false.
  • boolean delete(int data)
    Delete the node that contains the given data from the list. If the deletion is successful, the function returns true; otherwise, returns false.
  • int find(int data)
    Search and return the index to the node that contains the data. Note that the index starts from 0. If it is not found, return -1.
  • int count()
    Count and return the number of nodes in the list
  • String toString()
    Return the string representation of this List where all data in the list are enclosed in square brackets [ ].

Then write the program that accepts a sequence of commands and print out the number of successful insertions, the number of successful deletions, the number of successful searches (through the “find” command), the number of items remaining in the list after executing all commands and the final contents of the list.

There are 3 commands which are “insert”, “delete” and “find”.

Input

Line 1: The number of transactions m on the list, where 1  m 200.

Line 2 to m+1: A string command (“insert”, “delete”, “find”) followed by an integer n (separated by a space).

  • • “insert” means insert n into the list
  • • “delete” means delete n from the list
  • • “find” means find n in the list

Output

Line 1: Display 4 integers (each number is separated by a space) which are:

  • • the number of successful insertions,
  • • the number of successful deletions,
  • • the number of items found (from the command “find”), and
  • • the number of items remaining in the list

Line 2: The final contents of the list

Sample Input

Sample Output

3

insert 1

delete 5

find 2

1 0 0 1

[ 1 ]

8

find 10

insert 3

insert 2

insert 1

delete 4

delete 3

insert 1

find 2

3 1 1 2

[ 2 1 ]

In: Computer Science

Please explain the differences between DHCP and DNS and discuss their purposes. I'm not looking for...

Please explain the differences between DHCP and DNS and discuss their purposes. I'm not looking for an easy google search, I need examples and explanations to help understand the concepts

In: Computer Science

The CASE structure is a selection structure, however not all selection structures may be represented as...

The CASE structure is a selection structure, however not all selection structures may be represented as CASE. Give an example of a selection problem that may be solved using the CASE structure and another selection problem that CANNOT be represented by the CASE structure. Type your response in the space provided (after you have created a thread). Indicate which problem CAN and CANNOT be represented by CASE Provide an explanation why each of your suggested problem fits the appropriate category.

In: Computer Science

Make a python calculator which deals with arithmetic include plus, minus, divide, and multiply as well...

Make a python calculator which deals with arithmetic include plus, minus, divide, and multiply as well as explaining each answer and use if statement using sign operator.

In: Computer Science

For this assignment you need to create a ToDo list using Javascript, along with HTML and...

For this assignment you need to create a ToDo list using Javascript, along with HTML and CSS.

Begin by creating a HTML page called todo.html. Then create a Javascript file called todo.js and link it in to the HTML page using a script tag. All Javascript for the assignment must be in the separate file. (For CSS, feel free to include styles in a style block at the top of the HTML page, or to link in CSS from a separate file).

On the todo.html page, create two blocks of content (see the attached diagram).

At the top of the page, create a HTML form with the label New Item.

  • The form should contain two elements: a textarea and a submit button.
  • The submit button should be disabled if there is no text in the textarea. Inputting text in the textarea should enable the button.
  • If the submit button is clicked while enabled, a new item should be added to the Item List section below the form. Once the item is added, the textarea should be cleared.

Below the form, create a block with the label Item List. This block will initially be empty.

When the submit button in the form is clicked, a new sub-block of content ('item block') should be created containing the following:

  • The text from the textarea in the form.
  • A timestamp below the text. This timestamp should be in a user-friendly format showing date and time (down to minute) that the item was created. This should be auto-generated based on the computer's local time.
  • A delete button in the upper right of the item block, floated to the right of the text. When the delete button is clicked, the entire item block should be deleted. (You can include an 'Are you sure' confirm dialog if you like.)

Additional item blocks should be appended after the first item in the list. Item blocks should stack vertically.

In: Computer Science

For the following infix expression, build the corresponding expression tree. 1.1 a*b 1.2 a+b*c 1.3 a+b*c/d-e...

For the following infix expression, build the corresponding expression tree.

1.1 a*b

1.2 a+b*c

1.3 a+b*c/d-e

Perform pre-order and post-order traversal of the above binary expression trees. What relationship exists among these scans and prefix and postfix notation for the expression?

In: Computer Science

Given a number n, what is the largest gap between successive primes which are less than...

Given a number n, what is the largest gap between successive primes which are less than number n?

For example, if n = 12, the prime numbers less than 12 are: [2, 3, 5, 7, 11]. The largest gap between any two prime numbers in this list is 4, so the function would return '4'. >>>print(largestGap(12))

4

Write Python code to solve this problem, and include the following 3 test cases in your answer.

>>>print(largestGap(100))

8

>>>print(largestGap(1000))

20

>>>print(largestGap(10000))

36

In: Computer Science

1. Write a program that read a sequence of positive integer inputs and print the sum...

1. Write a program that read a sequence of positive integer inputs and print the sum and average of the inputs. Assume that the user always enters a positive number (integer) as an input value or an empty space as a sentinel value. Please use the below to test your code [45 points]:

Enter an int value or empty string to end: 98

Enter an int value or empty string to end: 78

Enter an int value or empty string to end: 77

Enter an int value or empty string to end: 1

Enter an int value or empty string to end: 10

Enter an int value or empty string to end:

Sum: 264 Average: 52.8

2. Write a program that read a sequence of positive integers and print the number of odd inputs entered by the user. The sentinel value is an empty string. Use the following test case [48 points]:

Enter integer or empty string to end: 3

Enter integer or empty string to end: 2

Enter integer or empty string to end: 10

Enter integer or empty string to end: 5

Enter integer or empty string to end: 6

Enter integer or empty string to end: 7

Enter integer or empty string to end:

number of odd integers entered: 3

3.Write a program that read a sequence of positive integers and print the average value of all the odd integers entered by the user (hint: you need to compute the sum of all the odd integers first to calculate the average). Use the following test case [7 points]:

Enter an int value or empty string to end: 10

Enter an int value or empty string to end: 20

Enter an int value or empty string to end: 5

Enter an int value or empty string to end: 10

Enter an int value or empty string to end: 15

Enter an int value or empty string to end:

average : 10.0

use python code for all questions

In: Computer Science

Determine a suitable process model for the following projects. Also, you are required to provide a...

Determine a suitable process model for the following projects. Also, you are required to provide a short justification along with the necessary assumptions

d) An enterprise software system where the stakeholders do not well understand requirements. Thus, requirements are expected to be extremely changeable due to external changes, changing expectations, changes in the budget and the rapid change in technology.
e) Children learning mobile application. The stakeholders are concerned about the user interface more than the functionality of the application.

In: Computer Science

Identify a wireless threat and how to mitigate it. Need 300 words Don't rewrite already existing...

Identify a wireless threat and how to mitigate it.

Need 300 words Don't rewrite already existing answers

In: Computer Science

Answer the following questions about Windows registry: 1) Name at least four actions that trigger automatic...

Answer the following questions about Windows registry:

1) Name at least four actions that trigger automatic registry changes.

2) Describe an indirect method of backing up the registry that backs up much more, as it creates a snapshot of the Windows installation minus the user's data. This also occurs on a regular basis by default in Windows.

3) In your own words define the Windows registry.

4) Describe the locations in Windows 10 of the options referred to in this chapter as user options and power options, comparing their location to where they were found in Windows 7.

5) Describe and compare Sleep and Hibernate.

6) Describe a safe method to modify the system startup settings for Windows.

7) Describe plug-and-play.

8) Your computer will not boot up normally and boots into Safe Mode. You suspect the problem is with a new device you installed. What utility should you open in Safe Mode and what should you look for?

9) What does it usually mean when Device Manager puts a device under a type node named "Other Devices?"

10) What will occur after you install a compatible driver for a device previously classified by Device Manager under Other devices?

In: Computer Science