Questions
After completing assignment 2. You have now created models and databases using two different modelling approaches...

After completing assignment 2. You have now created models and databases using two different modelling approaches (REA model and Logical or physical model).

What have you learned?

How would you summarize your experiences?

What is the value of this knowledge when related to activities in your workplace?

In: Computer Science

Need the answer to these question If N represents the number of elements in the list,...

Need the answer to these question

  1. If N represents the number of elements in the list, then the index-based remove method of the ABList class is O(N).

True

False

  1. A list allows retrieval of information based on the size of the information.

True

False

  1. If N represents the number of elements in the list, then the index-based add method of the ABList class is O(N).

True

False

  1. According to the text's specifications, a collection is a list.

True

False

  1. When an object of class LBList represents an empty list, its front variable is null.

True

False

  1. A list is a collection with additional index- and iteration- related operations.

True

False

In: Computer Science

*****************************C PROGRAMMING**************************************************** char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456

*****************************C PROGRAMMING****************************************************

char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456","879-61-1829","123-87-0000","000-65-3197","741-85-9632","963-25-7418"};

Create a function to scan all of the patient's social security numbers and detect if any of them are
invalid.
A Social Security Number (SSN) consists of nine digits, commonly written as three fields separated by
hyphens: AAA-GG-SSSS. The first three-digit field is called the "area number". The central, two-digit field
is called the "group number". The final, four-digit field is called the "serial number". Any SSN conforming
to one of the following criteria is an invalid number:

Any field all zeroes (no field of zeroes is ever assigned).
First three digits above 740
If you detect an invalid social security number, print the patient's name, their social security number,
and then either "area number", "group number", or "serial number" to indicate where the problem with
the social security number was detected.

In: Computer Science

QUESTION 1 a) It is now known the average rate of infection from the spread of...

QUESTION 1

a) It is now known the average rate of infection from the spread of corona virus endemic in a certain city daily is 2. Assume a suitable distribution to model the process.

b) Write a matlab program for model the probability of infection for the next 15 days.

c) Run as simulated plot for the Probability distribution and Cumulative distribution from the program above.

d) Using Simulation model estimate the probability that 3 people will infected in the next two days.

QUESTION 2

a) i) Based on a graph of the probability distribution (Q1d) indicate the probability that 3 persons will contract the virus in a given day

ii) Find the mean and standard deviation of the number of infections from (Q1) in the past three days.

b) The recent global climate change has necessitated the need for a new model for predicting weather patterns. Two scientists who were modeling this process in Ghana ended up with two different system models.

i) What could be the possible reason(s) for the differences in their system model? Justify your answer.

ii) In relation to real world data from the process how can you select the best model to employ for subsequent simulations and prediction of the process?

QUESTION 3

We wish to model the blood type of a person. It is known that blood type is inherited. If both parents carry genes for the AS and AS blood types, each child has probability 0.3 of getting two S genes and so of having blood type SS. Different children inherit independently of each other.

a) Write a Matlab program to determine the probability that the first child these parents have with type SS blood is their fifth child.

b) In relation to the three classifications of mathematical models, discuss the given genetic modelling problem in 2(a).

c) The administration of the Kasoa Government hospital wants to improve its quality of service by reducing the waiting time of travelers. For that purpose, they want to design what could be the best queuing strategy to have the minimum waiting time. You have been task to advice on the best queuing strategy in order to reduce the waiting time of patients before attended to. Discuss how you will address the problem

In: Computer Science

write in c plus plus Write a program that computes the sum of the odd numbers...

write in c plus plus

Write a program that computes the sum of the odd numbers and the sum of the even numbers between two values a and b. For example a=1 and b=10

In: Computer Science

What is the goal of security audits and the importance of establishing best practices within and...

What is the goal of security audits and the importance of establishing best practices within and organization?

Need 300 words don't rewrite akready existing chegg answer

In: Computer Science

What should be the penalty for those who create viruses, worms, and other destructive malware? Prison...

What should be the penalty for those who create viruses, worms, and other destructive

malware? Prison time? Monetary fines? How should it be enforced? And would this deter

attackers?

In: Computer Science

lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting.

Where can Radio Frequency Identification (RFID) be used? Explain the two types of RFID, and what is the main issue associated with it?

In: Computer Science

Write shell script code that displays the process tree on a Linux machine. The process tree...

Write shell script code that displays the process tree on a Linux machine. The process tree should show the process identifier of each process. Those processes that have the same ancestor should be sorted by process identifier instead of by name. The process tree should show the full names of all threads, if any and available. Whenever the user identifier associated with a process differs from the user identifier associated with the parent of that process, the process tree should show the transition.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

A wireless network has a loosely defined boundary as described in the lecture slides. Describe the...

A wireless network has a loosely defined boundary as described in the lecture slides. Describe the security issues of such a network boundary. For at least one of the security issues, describe why CIA will not be able to solve the issue, and briefly describe a method which may be used as a solution.

In: Computer Science

Write shell script code that shows all threads created by a given process. The user will...

Write shell script code that shows all threads created by a given process. The user will provide the process identifier of that process.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

Write a C program to create a series of processes, as shown below in the diagram....

Write a C program to create a series of processes, as shown below in the diagram.

P - ------------------ > c1 ------------>c3

   |                                          |

   |------------------> c2 |----- >c4

In other words, the parent process p creates processes c1 and c2, c1 creates c3 and c4.

In: Computer Science

Write shell script code that displays a list of all active processes in the system. Lift...

Write shell script code that displays a list of all active processes in the system. Lift the BSD-style “only yourself” restriction. The output should show the status of the processes.

#!/bin/bash


while [[ $REPLY != x ]]; do
clear

echo -e "Launch utilities:\n 1. Process Tree\n 2. Process States\n 3. Threads\n"

read -p "Enter selection [1-3], or type x to exit: " REPLY

if [ $REPLY == 1 ]; then
   echo -e "\n"

   #identify a command that displays the tree of processes in Linux
#identify the options of the command you have found that meet the requirements described in section "Process Tree" of the description of Homework 03
#put the command here, followed by the options. For example, if the command is called displayprocesstree, and the options are -a, -b, and -c, the command would appear as follows:
# displayprocesstree -abc

read void
   clear
fi

if [ $REPLY == 2 ]; then
#identify the command that displays a list of processes on the system. identify the options of that command that can include the state of each process in the output

   read void
   clear
fi

if [ $REPLY == 3 ]; then
#display a string that asks the user to enter the pid of one of the processes
#read a pid from the user onto a variable
# display the threads created by that process

read void
clear
fi

done

In: Computer Science

Two security methods are used in the Purchase Request message to protect it from potential passive...

Two security methods are used in the Purchase Request message to protect it from potential passive and active attacks from a Merchant. Name the security methods and describe how they specifically protect the Purchase Request message from the relevant attacks.

In: Computer Science

Create individual python code cells for each of the three problems below. In each code cell,...

Create individual python code cells for each of the three problems below. In each code cell, use any additional variables and comments as needed to program a solution to the corresponding problem. When done, download the ipynb file and submit it to the appropriate dropbox in the course's canvas page

. 1.

a. Cell Number 1 * Recreate the same list of dictionaries you used during assignment 2.09. (Scroll down to see assignment 2.09 instructions) * Create another variable and define it as an empty list. It will store middle names, so name the variable appropriately. * Loop through the list of dictionaries using a `for` loop, and add each middle name to the list created to hold middle names in the previous bullet point.

b. Cell Number 2 * Create a variable and assign it the length of the middle names list created in the previous cell. Use the appropriate instruction to calculate the length instead of just typing the correct number, which is known as hard-coding. (Hint: You don't have to redefine the list in the new cell as long as you ran the previous cell recently) * Use a `while` loop to count up to the length of the middle names list, and print out the index and value of each item in the list using a format string. (Hint: start your counter at `0` and stop iterating before you reach the length by using a `<` operator)

c. Cell Number 3 * Loop through the list of dictionaries defined in the first cell using another `for` loop. (Hint: Again, you do not need to redefine the list of dictionaries from the previous cell as long as you executed it recently) * Nested inside of that loop, loop through the keys in the current dictionary using another `for` loop and the `enumerate()` instruction. * Nested inside of the nested loop, print out the key and value using a format string. (Hint: You'll need to use the key to get the value out of the dictionary) * Also inside of the nested loop, once the index is greater than or equal to 2, break out of the loop.

2.09 assingment instructions for question 1

**Requirements:** * Create a list containing separate dictionaries for at least 3 people (family members, actors, invisible friends, etc.) and assign the list to a variable. Instead of using your actual family members' names, I want you think of different names starting with the same letter as your family member so that I can't be accused of identity theft. * Each person dictionary should have at least 4 key/value pairs: * first name * middle name. * age (rounded to the nearest decade) * your favorite thing about them * Be sure to use the same keys for each person (eg. "first_name" for everyone's first names). * Print out the entire list.

In: Computer Science