Questions
5)     Post to the Discussion forum on the following question: How useful would using a business...

5)     Post to the Discussion forum on the following question:

How useful would using a business intelligence tool be for the work organization(s) that you are familiar with?

In: Computer Science

After completing assignment 2. You have now created models and databases using two different modelling approaches...

After completing assignment 2. You have now created models and databases using two different modelling approaches (REA model and Logical or physical model).

What have you learned?

How would you summarize your experiences?

What is the value of this knowledge when related to activities in your workplace?

In: Computer Science

Need the answer to these question If N represents the number of elements in the list,...

Need the answer to these question

  1. If N represents the number of elements in the list, then the index-based remove method of the ABList class is O(N).

True

False

  1. A list allows retrieval of information based on the size of the information.

True

False

  1. If N represents the number of elements in the list, then the index-based add method of the ABList class is O(N).

True

False

  1. According to the text's specifications, a collection is a list.

True

False

  1. When an object of class LBList represents an empty list, its front variable is null.

True

False

  1. A list is a collection with additional index- and iteration- related operations.

True

False

In: Computer Science

*****************************C PROGRAMMING**************************************************** char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456

*****************************C PROGRAMMING****************************************************

char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456","879-61-1829","123-87-0000","000-65-3197","741-85-9632","963-25-7418"};

Create a function to scan all of the patient's social security numbers and detect if any of them are
invalid.
A Social Security Number (SSN) consists of nine digits, commonly written as three fields separated by
hyphens: AAA-GG-SSSS. The first three-digit field is called the "area number". The central, two-digit field
is called the "group number". The final, four-digit field is called the "serial number". Any SSN conforming
to one of the following criteria is an invalid number:

Any field all zeroes (no field of zeroes is ever assigned).
First three digits above 740
If you detect an invalid social security number, print the patient's name, their social security number,
and then either "area number", "group number", or "serial number" to indicate where the problem with
the social security number was detected.

In: Computer Science

QUESTION 1 a) It is now known the average rate of infection from the spread of...

QUESTION 1

a) It is now known the average rate of infection from the spread of corona virus endemic in a certain city daily is 2. Assume a suitable distribution to model the process.

b) Write a matlab program for model the probability of infection for the next 15 days.

c) Run as simulated plot for the Probability distribution and Cumulative distribution from the program above.

d) Using Simulation model estimate the probability that 3 people will infected in the next two days.

QUESTION 2

a) i) Based on a graph of the probability distribution (Q1d) indicate the probability that 3 persons will contract the virus in a given day

ii) Find the mean and standard deviation of the number of infections from (Q1) in the past three days.

b) The recent global climate change has necessitated the need for a new model for predicting weather patterns. Two scientists who were modeling this process in Ghana ended up with two different system models.

i) What could be the possible reason(s) for the differences in their system model? Justify your answer.

ii) In relation to real world data from the process how can you select the best model to employ for subsequent simulations and prediction of the process?

QUESTION 3

We wish to model the blood type of a person. It is known that blood type is inherited. If both parents carry genes for the AS and AS blood types, each child has probability 0.3 of getting two S genes and so of having blood type SS. Different children inherit independently of each other.

a) Write a Matlab program to determine the probability that the first child these parents have with type SS blood is their fifth child.

b) In relation to the three classifications of mathematical models, discuss the given genetic modelling problem in 2(a).

c) The administration of the Kasoa Government hospital wants to improve its quality of service by reducing the waiting time of travelers. For that purpose, they want to design what could be the best queuing strategy to have the minimum waiting time. You have been task to advice on the best queuing strategy in order to reduce the waiting time of patients before attended to. Discuss how you will address the problem

In: Computer Science

write in c plus plus Write a program that computes the sum of the odd numbers...

write in c plus plus

Write a program that computes the sum of the odd numbers and the sum of the even numbers between two values a and b. For example a=1 and b=10

In: Computer Science

What is the goal of security audits and the importance of establishing best practices within and...

What is the goal of security audits and the importance of establishing best practices within and organization?

Need 300 words don't rewrite akready existing chegg answer

In: Computer Science

What should be the penalty for those who create viruses, worms, and other destructive malware? Prison...

What should be the penalty for those who create viruses, worms, and other destructive

malware? Prison time? Monetary fines? How should it be enforced? And would this deter

attackers?

In: Computer Science

lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting.

Where can Radio Frequency Identification (RFID) be used? Explain the two types of RFID, and what is the main issue associated with it?

In: Computer Science

Write shell script code that displays the process tree on a Linux machine. The process tree...

Write shell script code that displays the process tree on a Linux machine. The process tree should show the process identifier of each process. Those processes that have the same ancestor should be sorted by process identifier instead of by name. The process tree should show the full names of all threads, if any and available. Whenever the user identifier associated with a process differs from the user identifier associated with the parent of that process, the process tree should show the transition.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

A wireless network has a loosely defined boundary as described in the lecture slides. Describe the...

A wireless network has a loosely defined boundary as described in the lecture slides. Describe the security issues of such a network boundary. For at least one of the security issues, describe why CIA will not be able to solve the issue, and briefly describe a method which may be used as a solution.

In: Computer Science

Write shell script code that shows all threads created by a given process. The user will...

Write shell script code that shows all threads created by a given process. The user will provide the process identifier of that process.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

Write a C program to create a series of processes, as shown below in the diagram....

Write a C program to create a series of processes, as shown below in the diagram.

P - ------------------ > c1 ------------>c3

   |                                          |

   |------------------> c2 |----- >c4

In other words, the parent process p creates processes c1 and c2, c1 creates c3 and c4.

In: Computer Science

Write shell script code that displays a list of all active processes in the system. Lift...

Write shell script code that displays a list of all active processes in the system. Lift the BSD-style “only yourself” restriction. The output should show the status of the processes.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

Two security methods are used in the Purchase Request message to protect it from potential passive...

Two security methods are used in the Purchase Request message to protect it from potential passive and active attacks from a Merchant. Name the security methods and describe how they specifically protect the Purchase Request message from the relevant attacks.

In: Computer Science