5) Post to the Discussion forum on the following question:
How useful would using a business intelligence tool be for the work organization(s) that you are familiar with?
In: Computer Science
After completing assignment 2. You have now created models and databases using two different modelling approaches (REA model and Logical or physical model).
What have you learned?
How would you summarize your experiences?
What is the value of this knowledge when related to activities in your workplace?
In: Computer Science
Need the answer to these question
True
False
True
False
True
False
True
False
True
False
True
False
In: Computer Science
*****************************C PROGRAMMING****************************************************
char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456","879-61-1829","123-87-0000","000-65-3197","741-85-9632","963-25-7418"};
Create a function to scan all of the patient's social security
numbers and detect if any of them are
invalid.
A Social Security Number (SSN) consists of nine digits, commonly
written as three fields separated by
hyphens: AAA-GG-SSSS. The first three-digit field is called the
"area number". The central, two-digit field
is called the "group number". The final, four-digit field is called
the "serial number". Any SSN conforming
to one of the following criteria is an invalid number:
Any field all zeroes (no field of zeroes is ever
assigned).
First three digits above 740
If you detect an invalid social security number, print the
patient's name, their social security number,
and then either "area number", "group number", or "serial number"
to indicate where the problem with
the social security number was detected.
In: Computer Science
QUESTION 1
a) It is now known the average rate of infection from the spread of corona virus endemic in a certain city daily is 2. Assume a suitable distribution to model the process.
b) Write a matlab program for model the probability of infection for the next 15 days.
c) Run as simulated plot for the Probability distribution and Cumulative distribution from the program above.
d) Using Simulation model estimate the probability that 3 people will infected in the next two days.
QUESTION 2
a) i) Based on a graph of the probability distribution (Q1d) indicate the probability that 3 persons will contract the virus in a given day
ii) Find the mean and standard deviation of the number of infections from (Q1) in the past three days.
b) The recent global climate change has necessitated the need for a new model for predicting weather patterns. Two scientists who were modeling this process in Ghana ended up with two different system models.
i) What could be the possible reason(s) for the differences in their system model? Justify your answer.
ii) In relation to real world data from the process how can you select the best model to employ for subsequent simulations and prediction of the process?
QUESTION 3
We wish to model the blood type of a person. It is known that blood type is inherited. If both parents carry genes for the AS and AS blood types, each child has probability 0.3 of getting two S genes and so of having blood type SS. Different children inherit independently of each other.
a) Write a Matlab program to determine the probability that the first child these parents have with type SS blood is their fifth child.
b) In relation to the three classifications of mathematical models, discuss the given genetic modelling problem in 2(a).
c) The administration of the Kasoa Government hospital wants to improve its quality of service by reducing the waiting time of travelers. For that purpose, they want to design what could be the best queuing strategy to have the minimum waiting time. You have been task to advice on the best queuing strategy in order to reduce the waiting time of patients before attended to. Discuss how you will address the problem
In: Computer Science
In: Computer Science
What is the goal of security audits and the importance of establishing best practices within and organization?
Need 300 words don't rewrite akready existing chegg answer
In: Computer Science
What should be the penalty for those who create viruses, worms, and other destructive
malware? Prison time? Monetary fines? How should it be enforced? And would this deter
attackers?
In: Computer Science
lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting.
Where can Radio Frequency Identification (RFID) be used? Explain the two types of RFID, and what is the main issue associated with it?
In: Computer Science
Write shell script code that displays the process tree on a Linux machine. The process tree should show the process identifier of each process. Those processes that have the same ancestor should be sorted by process identifier instead of by name. The process tree should show the full names of all threads, if any and available. Whenever the user identifier associated with a process differs from the user identifier associated with the parent of that process, the process tree should show the transition.
#!/bin/bash
while [[ $REPLY != x ]]; do
clear
echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"
read -p "Enter selection [1-3], or type x to exit: " REPLY
if [ $REPLY == 1 ]; then
echo -e "\n"
#identify a command that displays the tree of
processes in Linux
#identify the options of the command you have found that meet the
requirements described in section "Process Tree" of the description
of Homework 03
#put the command here, followed by the options. For example, if the
command is called displayprocesstree, and the options are -a, -b,
and -c, the command would appear as follows:
# displayprocesstree -abc
read void
clear
fi
if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the
system. identify the options of that command that can include the
state of each process in the output
read void
clear
fi
if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the
processes
#read a pid from the user onto a variable
# display the threads created by that process
read void
clear
fi
done
In: Computer Science
A wireless network has a loosely defined boundary as described in the lecture slides. Describe the security issues of such a network boundary. For at least one of the security issues, describe why CIA will not be able to solve the issue, and briefly describe a method which may be used as a solution.
In: Computer Science
Write shell script code that shows all threads created by a given process. The user will provide the process identifier of that process.
#!/bin/bash
while [[ $REPLY != x ]]; do
clear
echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"
read -p "Enter selection [1-3], or type x to exit: " REPLY
if [ $REPLY == 1 ]; then
echo -e "\n"
#identify a command that displays the tree of
processes in Linux
#identify the options of the command you have found that meet the
requirements described in section "Process Tree" of the description
of Homework 03
#put the command here, followed by the options. For example, if the
command is called displayprocesstree, and the options are -a, -b,
and -c, the command would appear as follows:
# displayprocesstree -abc
read void
clear
fi
if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the
system. identify the options of that command that can include the
state of each process in the output
read void
clear
fi
if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the
processes
#read a pid from the user onto a variable
# display the threads created by that process
read void
clear
fi
done
In: Computer Science
Write a C program to create a series of processes, as shown below in the diagram.
P - ------------------ > c1 ------------>c3
| |
|------------------> c2 |----- >c4
In other words, the parent process p creates processes c1 and c2, c1 creates c3 and c4.
In: Computer Science
Write shell script code that displays a list of all active processes in the system. Lift the BSD-style “only yourself” restriction. The output should show the status of the processes.
#!/bin/bash
while [[ $REPLY != x ]]; do
clear
echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"
read -p "Enter selection [1-3], or type x to exit: " REPLY
if [ $REPLY == 1 ]; then
echo -e "\n"
#identify a command that displays the tree of
processes in Linux
#identify the options of the command you have found that meet the
requirements described in section "Process Tree" of the description
of Homework 03
#put the command here, followed by the options. For example, if the
command is called displayprocesstree, and the options are -a, -b,
and -c, the command would appear as follows:
# displayprocesstree -abc
read void
clear
fi
if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the
system. identify the options of that command that can include the
state of each process in the output
read void
clear
fi
if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the
processes
#read a pid from the user onto a variable
# display the threads created by that process
read void
clear
fi
done
In: Computer Science
Two security methods are used in the Purchase Request message to protect it from potential passive and active attacks from a Merchant. Name the security methods and describe how they specifically protect the Purchase Request message from the relevant attacks.
In: Computer Science