1. Define deployment and describe its overall goal.
In: Computer Science
Can following BNF convert to CFG (Context Free Grammar)
<Boolean_expr> →
<Boolean_expr>||<Boolean_term>|<Boolean_term>
<Boolean _term> → <Boolean _term> &&
<Boolean _factor>| <Boolean _factor>
<Boolean _factor> →ID | !<Boolean _factor>|
(<Boolean _factor>) |<relation_expr>
<relation_expr> → ID==ID | ID !=ID | ID < ID | ID≤ID |
ID>ID | ID>=ID
The above BNF is for Boolean Expression and Relational Expression.
In: Computer Science
Consider the following snapshot of a system: Allocation Max Available A B C D A B C D A B C D
P0 0 0 1 2 0 0 1 2 1 5 2 0
P1 1 0 0 0 1 7 5 0
P2 1 3 5 4 2 3 5 6
P3 0 6 3 2 0 6 5 2
P4 0 0 1 4 0 6 5 6
Answer the following questions using the banker’s algorithm: a. What is the content of the matrix Need? b. Is the system in a safe state? Demonstrate the reason for your answer. c. If a request from process P1 arrives for (0,4,2,0), can the request be granted immediately? Demonstrate the reason for your answer.
In: Computer Science
3. When a VM image is deployed to VMs, the image may contain only one single service or multiple services via the lightweight container technology (i.e., one service per container and multiple containers per VM). These two options for packaging services are illustrated in Figure 6.6 on p.112. Discuss advantage and disadvantage of these two packaging options.
In: Computer Science
2. Compare the two deployment strategies presented in Chapter 6 (All-or-nothing deployment, Partial Deployment) in terms of their cost and complexity.
In: Computer Science
Research and Discussion
1) What are some of the organizational benefits of real-time reporting?
2) What are some of the modern business intelligence (BI) tools that are available for organizations?
3) What are some of the key features and benefits of some particular BI tool or tools?
In: Computer Science
5) Post to the Discussion forum on the following question:
How useful would using a business intelligence tool be for the work organization(s) that you are familiar with?
In: Computer Science
After completing assignment 2. You have now created models and databases using two different modelling approaches (REA model and Logical or physical model).
What have you learned?
How would you summarize your experiences?
What is the value of this knowledge when related to activities in your workplace?
In: Computer Science
Need the answer to these question
True
False
True
False
True
False
True
False
True
False
True
False
In: Computer Science
*****************************C PROGRAMMING****************************************************
char social[][12] = {"164-55-0726","948-44-1038","193-74-0274","458-57-2867","093-00-1093","159-56-9731","695-21-2340","753-66-6482", "852-73-4196","648-81-1456","879-61-1829","123-87-0000","000-65-3197","741-85-9632","963-25-7418"};
Create a function to scan all of the patient's social security
numbers and detect if any of them are
invalid.
A Social Security Number (SSN) consists of nine digits, commonly
written as three fields separated by
hyphens: AAA-GG-SSSS. The first three-digit field is called the
"area number". The central, two-digit field
is called the "group number". The final, four-digit field is called
the "serial number". Any SSN conforming
to one of the following criteria is an invalid number:
Any field all zeroes (no field of zeroes is ever
assigned).
First three digits above 740
If you detect an invalid social security number, print the
patient's name, their social security number,
and then either "area number", "group number", or "serial number"
to indicate where the problem with
the social security number was detected.
In: Computer Science
QUESTION 1
a) It is now known the average rate of infection from the spread of corona virus endemic in a certain city daily is 2. Assume a suitable distribution to model the process.
b) Write a matlab program for model the probability of infection for the next 15 days.
c) Run as simulated plot for the Probability distribution and Cumulative distribution from the program above.
d) Using Simulation model estimate the probability that 3 people will infected in the next two days.
QUESTION 2
a) i) Based on a graph of the probability distribution (Q1d) indicate the probability that 3 persons will contract the virus in a given day
ii) Find the mean and standard deviation of the number of infections from (Q1) in the past three days.
b) The recent global climate change has necessitated the need for a new model for predicting weather patterns. Two scientists who were modeling this process in Ghana ended up with two different system models.
i) What could be the possible reason(s) for the differences in their system model? Justify your answer.
ii) In relation to real world data from the process how can you select the best model to employ for subsequent simulations and prediction of the process?
QUESTION 3
We wish to model the blood type of a person. It is known that blood type is inherited. If both parents carry genes for the AS and AS blood types, each child has probability 0.3 of getting two S genes and so of having blood type SS. Different children inherit independently of each other.
a) Write a Matlab program to determine the probability that the first child these parents have with type SS blood is their fifth child.
b) In relation to the three classifications of mathematical models, discuss the given genetic modelling problem in 2(a).
c) The administration of the Kasoa Government hospital wants to improve its quality of service by reducing the waiting time of travelers. For that purpose, they want to design what could be the best queuing strategy to have the minimum waiting time. You have been task to advice on the best queuing strategy in order to reduce the waiting time of patients before attended to. Discuss how you will address the problem
In: Computer Science
In: Computer Science
What is the goal of security audits and the importance of establishing best practices within and organization?
Need 300 words don't rewrite akready existing chegg answer
In: Computer Science
What should be the penalty for those who create viruses, worms, and other destructive
malware? Prison time? Monetary fines? How should it be enforced? And would this deter
attackers?
In: Computer Science
lease, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting.
Where can Radio Frequency Identification (RFID) be used? Explain the two types of RFID, and what is the main issue associated with it?
In: Computer Science