literature revie on hybrid cloud with IEEE references.
please do it nicely and dnt copy
thanks
In: Computer Science
To encourage good grades, Hermosa High School has decided to award each student a bookstore credit that is 10 times the student’s grade point average. In other words, a student with a 3.2 grade point average receives a $32.0 credit. Create an application that prompts a student for a name and grade point average, and then passes the values to a method (computeDiscount) that displays a descriptive message. The message uses the student’s name, echoes the grade point average, and computes and displays the credit, as follows: John, your GPA is 3.4, so your credit is $34.0. Grading Write your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade.
In: Computer Science
In: Computer Science
Instructions:
1. Write a MapReduce program to find the frequency of each letter,
case insensitive, in some given input. For example, "The quick
brown fox jumps over the lazy dog" as input should generate the
following (letter,count) pairs: (T, 2), (H, 1), (E, 3), etc.
2. Test your program against the 3 attached input files: HadoopFile0.txt, HadoopFile1.txt, and HadoopFile2.txt.
3. The input and output must be read/written from/into HDFS.
4. Please submit only the Java source file(s) on .
5. I've attached the WordCount.java as a sample
MapReduce program. You might find it useful.
WordCount.java ::
import java.io.IOException;
import org.apache.hadoop.fs.Path;
import org.apache.hadoop.io.IntWritable;
import org.apache.hadoop.io.LongWritable;
import org.apache.hadoop.io.Text;
import org.apache.hadoop.mapreduce.Job;
import
org.apache.hadoop.mapreduce.lib.input.FileInputFormat;
import
org.apache.hadoop.mapreduce.lib.output.FileOutputFormat;
import org.apache.hadoop.mapreduce.Mapper;
import org.apache.hadoop.mapreduce.Reducer;
public class WordCount
{
public static void main(String[] args)
throws Exception {
if (args.length != 2) {
System.err.println("Usage: WordCount <input path> <output
path>");
System.exit(-1); }
Job job = Job.getInstance(); job.setJarByClass(WordCount.class);
job.setJobName("Word Count");
//job.setNumReduceTasks(2); FileInputFormat.addInputPath(job, new
Path(args[0])); FileOutputFormat.setOutputPath(job, new
Path(args[1])); job.setMapperClass(WordMapper.class);
job.setReducerClass(WordReducer.class);
job.setOutputKeyClass(Text.class);
job.setOutputValueClass(IntWritable.class);
System.exit(job.waitForCompletion(true) ? 0 : 1);
}
public static class WordMapper
extends Mapper<LongWritable, Text, Text, IntWritable> {
public void map(LongWritable key, Text value, Context
context)
throws IOException, InterruptedException {
String line = value.toString().toLowerCase(); String[] tokens =
line.split("\\W+");
for (String token : tokens) {
if (token.length() > 0)
context.write(new Text(token), new IntWritable(1));
}
}
}
public static class WordReducer
extends Reducer<Text, IntWritable, Text, IntWritable> {
public void reduce(Text key, Iterable<IntWritable> values,
Context context)
throws IOException, InterruptedException {
int count = 0;
for (IntWritable value : values) {
count += value.get();
}
context.write(key, new IntWritable(count));
}
}
}
Hadoopfile0.txt::
Hadoop is the Elephant King!
A yellow and elegant thing.
He never forgets
Useful data, or lets
An extraneous element cling!
Hadoopfile1.txt::
A wonderful king is Hadoop.
The elephant plays well with Sqoop.
But what helps him to thrive
Are Impala, and Hive,
And HDFS in the group.
Hadoopfile2.txt::
Hadoop is an elegant fellow.
An elephant gentle and mellow.
He never gets mad, Or does anything bad,
Because, at his core, he is yellow.
In: Computer Science
Using python.
Produce a method for a linked list that is called FIND , which returns the index of a lookup value within the linked list
In: Computer Science
Print the total amount, the average dollar value of service visits (parts and labour costs) and the number of those visits for Acura, Mercedes and Jaguar car makes that are sold between September 2015 and December 2018 inclusive
In: Computer Science
INSTRUCTIONS
Read the following case study about Amazon, and then submit a posting with answers to the 5 questions below. Your answers will be graded primarily on content, but grammar, spelling, syntax, etc will also count. Please make sure that your answers are labeled to match the Question numbers so that I can easily read (and grade) your submissions
CASE STUDY: THE AMAZON OF INNOVATION
On December 2, 2013, Amazon.com customers ordered 36.8 million items worldwide, an average of 426 items per second, with more than half of the orders from mobile devices. At the peak of sales for the Xbox One and the Playstation 4, Amazon customers purchased more than 1,000 of those units per minute. The last local express delivery was ordered by a customer in Everett, Washington at 12:26pm and was delivered at 3:56pm that same day.
You may think of Amazon as simply an online retailer, and that is indeed where the company achieved most of its success. To do this, Amazon had to build enormous supporting infrastructure – just imagine the information systems and fulfillment facilities needed to ship 36.8 million items on a single day. That infrastructure, however, is needed only during the busy holiday season. Most of the year, Amazon is left with excess infrastructure capacity. Starting in 2000, Amazon began to lease some of that capacity to other companies. In the process, it played a key role in the creation of what are termed “cloud services,” which you will learn about shortly. For now, just think of cloud services as computer resources somewhere out in the Internet that are leased on flexible terms.
Today, Amazon’s business lines can be grouped into three major categories:
Consider Each.
ONLINE RETAILING
Amazon created the business model for online retailing. It began as an online bookstore, but every year since 1998 it has added new product categories. The company is involved in all aspects of online retailing. It sells its own inventory. It incentivizes you, via the Associates program, to sell its inventory as well. Or it will help you sell your inventory within its product pages or via one of its consignment venues. Online auctions are the major aspect of online sales in which Amazon does not participate. It tried auctions in 1999, but it could never make inroads against eBay.
Today it’s hard to remember how much of what we take for granted was pioneered by Amazon. “Customers who bought this, also bought that;” online customer reviews; customer ranking of customer reviews; books lists; Look Inside the Book; automatic free shipping for certain orders or frequent customers; and Kindle books and devices were all novel concepts when Amazon introduced them.
Amazon’s retailing business operates on very thin margins, meaning it makes very little money off of any one item. Products are usually sold at a discount from the stated retail price, and 2-day shipping is free for Amazon members (who pay an annual fee of $99) How does it do it? For one, Amazon drives its employees incredibly hard. Former employees claim the hours are long, the pressure is severe, and the workload is heavy. But what else? It comes down to Moore’s Law and the innovative use of nearly free data processing, storage, and communication.
ORDER FULFILLMENT
In addition to online retailing, Amazon also sells order fulfillment services. You can ship your inventory to an Amazon warehouse and access Amazon’s information systems just as if they were yours. Using technology known as Web services your order processing information systems can directly integrate, over the Web, with Amazon’s inventory, fulfillment, and shipping applications. Your customers need not know that Amazon played any role at all. You Can also sell that same inventory using Amazon’s retail sales applications.
CLOUD SERVICES
Amazon Web Services (AWS) allow organizations to lease time on computer equipment in very flexible ways. Amazon’s Elastic Cloud 2 (EC2) enables organizations to expand and contract the computer resources they need within minutes. Amazon has a variety of payment plans, and it is possible to buy computer time for less than a penny an hour. Key to this capability is the ability for the leasing organization’s computer programs to interface with Amazon’s to automatically scale up and scale down the resources leased. For example, if a news site publishes a story that causes a rapid ramp-up of traffic, that news site can, programmatically, request, configure, and use more computing resources for an hour, a day, a month, or whatever it needs.
With its Kindle devices, Amazon has become both a vendor of tablets and, even more importantly in the long term, a vendor of online music and video. And to induce customers to buy Kindle apps, in 2013 Amazon introduced its own currency, Amazon Coins. And, recently Amazon opened a 3D printing store from which customers can customize their own toys, jewelry, dog bones, and dozens of other products. Amazon is also beginning its foray into drone delivery.
QUESTIONS
In: Computer Science
Javascript Calculator
Algorithm to calculate a tip percentage given the bill amount and total bill including tip.
Asker suer for bill without tip:
Ask the user for total bill with tip:
Ask the user how many people splitting bill:
Submit button to calculate the tip percentage
In: Computer Science
Explain the main differences between grammars in problems 1, 2 and 3.
1. Expr -> Expr + Term I Expr * Term I Term
Term-> 0 I ... I 9 I (Expr)
2. Expr -> Term+ Expr I Term * Expr I Term
Term -> 0 I …. 9 I (Expr)
3. Expr -> Expr + Term I Term
Term-> Term* Factor I Factor
Factor-> 0 I ... I 9 I (Expr)
In: Computer Science
In 1-3 sentences, describe how you would "Change a number in to a word equivalent (132 -> one three two), Recursively" using C++
In: Computer Science
Playing with strings Assignment
Outcomes:
Program Specifications:
DESIGN and IMPLEMENT a short program that will:
Hint: Use a technique to read in strings that allows spaces:
https://www.programmingsimplified.com/c/program/print-string
Submission Requirements:
Requirements will be same as the first assignment which will be the same for all future assignments.
DO NOT:
In: Computer Science
Write a O(n) method valuesInLevelOrder() that returns a list of the nodes of a binary tree in level-order. That is, the method should return the root, then the nodes at depth 1, followed by the nodes at depth 2, and so on. Your algorithm should begin by putting the tree root on an initially empty queue. Then dequeue a node, add it to the output, and enqueue its left and right children (if they exist). Repeat until the queue is empty.
import java.util.*;
public class Node {
int data;
Node leftChild;
Node rightChild;
public Node(int data) {
this.data = data;
}
public Node(int data, Node leftChild, Node rightChild) {
this.data = data;
this.leftChild = leftChild;
this.rightChild = rightChild;
}
public static List<Integer> valuesInLevelOrder(Node root)
{
return null;
}
In: Computer Science
In: Computer Science
I am implementing a generic List class and not getting the expected output.
My current output is: [0, 1, null]
Expected Output in a separate test class:
List list = new SparseList<>(); list.add("0"); list.add("1"); list.add(4, "4");
will result in the following list of size 5: [0, 1, null, null, 4].
list.add(3, "Three");
will result in the following list of size 6: [0, 1, null, Three, null, 4].
list.set(3, "Three");
is going to produce a list of size 5 (unchanged): [0, 1, null, Three, 4].
When removing an element from the list above, via list.remove(1); the result should be the following list of size 4: [0, null, Three, 4]
import java.util.Collection; import java.util.HashMap; import java.util.Iterator; import java.util.List; import java.util.ListIterator; public class SparseList<E> implements List<E>{ private int endIndex = 0; private HashMap<Integer,E> list; public SparseList() { list = new HashMap<>(); } public SparseList(E[] arr) { list = new HashMap<>(); for(int i = 0; i <arr.length; i++) { list.put(i, arr[i]); } endIndex = arr.length - 1; } @Override public boolean add(E e) { list.put(endIndex, e); endIndex++; return true; } @Override public void add(int index, E element) { list.put(index, element); } @Override public E remove(int index) { return list.remove(index); } @Override public E get(int index) { return list.get(index); } @Override public E set(int index, E element) { E previous = list.get(index); list.put(index, element); return previous; } @Override public int size() { return endIndex + 1; } @Override public void clear() { list.clear(); } @Override public boolean isEmpty() { return list.isEmpty(); } @Override public String toString() { String s = ""; for(int i = 0; i < list.size(); i++) { if(list.get(i) == null) { s += "null, "; }else { s += list.get(i).toString() + ", "; } } return "[" + s + "]"; } @Override public boolean contains(Object o) { throw new UnsupportedOperationException(); } @Override public Iterator<E> iterator() { throw new UnsupportedOperationException(); } @Override public Object[] toArray() { throw new UnsupportedOperationException(); } @Override public <T> T[] toArray(T[] a) { throw new UnsupportedOperationException(); } @Override public boolean containsAll(Collection<?> c) { throw new UnsupportedOperationException(); } @Override public boolean addAll(Collection<? extends E> c) { throw new UnsupportedOperationException(); } @Override public boolean addAll(int index, Collection<? extends E> c) { throw new UnsupportedOperationException(); } @Override public boolean removeAll(Collection<?> c) { throw new UnsupportedOperationException(); } @Override public boolean retainAll(Collection<?> c) { throw new UnsupportedOperationException(); } @Override public boolean remove(Object o) { throw new UnsupportedOperationException(); } @Override public int indexOf(Object o) { throw new UnsupportedOperationException(); } @Override public int lastIndexOf(Object o) { throw new UnsupportedOperationException(); } @Override public ListIterator<E> listIterator() { throw new UnsupportedOperationException(); } @Override public ListIterator<E> listIterator(int index) { throw new UnsupportedOperationException(); } @Override public List<E> subList(int fromIndex, int toIndex) { throw new UnsupportedOperationException(); } }
In: Computer Science
1. FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this information for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices
UDP
HTTP
SSH
TCP
2. Which of the following tools can be used to determine if a network cable is good? Choose all that apply.
Group of answer choices multiple choice
Cable tester
Crimper
Loopback plug
Network multimeter
3. A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends messages only to the destination computer. What information does a switch collect from messages crossing its interfaces so it knows where to send data in future transmissions?
Group of answer choices
IP address
MAC address
Port number
FQDN
4. Which two of the following hosts on a corporate intranet are on the same subnet?
Group of answer choices/
multiple choice
192.168.2.143 // 255.255.255.0
172.54.98.3 // 255.255.0.0
192.168.5.57 // 255.255.255.0
172.54.72.89 // 255.255.0.0
5. Your SOHO router has failed and you have installed a new router. The old router’s static IP address on the network is 192.168.0.1. The new router has a static IP address of 10.0.0.1. You go to a computer to configure the new router and enter 10.0.0.1 in the browser address box. The router does not respond. You open a command prompt window and try to ping the router, which does not work. Next, you verify that the router has connectivity and you see that its local connection light is blinking, indicating connectivity. What is the most likely problem and its best solution?
Group of answer choices
The computer you are using to configure the router has a corrupted TCP/IP configuration. Restart the computer.
The router is defective. Return it for a full refund.
The computer and the router are not in the same subnet. Release and renew the IP address of the computer.
The computer and the router are not in the same subnet. Change the subnet mask assigned to the computer.
Question 6
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Group of answer choices
True
False
Question 7
You are configuring email on a customer’s computer. Which port should you configure for pop.companymail.com? For smtp.companymail.com?
Group of answer choices
143, 25
110, 143
110, 25
25, 110
Question 8
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTPS server. Why is it not a good idea to use Telnet to reach the remote computer?
Group of answer choices
Telnet transmissions are not encrypted.
Telnet is not reliable and the file might arrive corrupted.
FTP is faster than Telnet.
FTP running on the same computer as Telnet causes Telnet not to work.
Question 9
What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?
Group of answer choices
Multiple choice
T568A
T568B
TIA/EIA 586
T568C
Question 10
If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?
Group of answer choices
ipconfig
ifconfig
tracert
nslookup
Question 11
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
Group of answer choices
True
False
Question 12
What type of network device keeps a table of the MAC addresses of the devices connected to it?
Group of answer choices
hub
router
NIC
switch
Question 13
What TCP port is utilized by an SSH server listening for connections?
Group of answer choices
20
21
22
23
Question 14
What two protocols are used to deliver mail messages?
Group of answer choices
multiple choice
POP3
SNMP
SMTP
IMAP4
Question 15
Your customer recently installed a new router in her dance studio, as shown in the diagram in Figure 8-56. She then ran Ethernet cables through the drop ceiling to computers in various offices. Without any further testing, which computers do you suspect are experiencing connection problems? Choose all that apply.
Group of answer choices
Computer A
Computer B
Computer C
None of the above
Question 16
Phone cords are a type of twisted-pair cable and use an RJ-45 connector.
Group of answer choices
True
False
Question 17
Which of the following is true about cable Internet?
Group of answer choices
you share the cable infrastructure with your neighbors
you need filters on every phone jack
fiber optic cabling is required
provides up to 2.3 Mbps of bandwidth
Question 18
What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device?
Group of answer choices
MULTIPLE CHOICE
crossover cable
power over Ethernet cable
straight-through cable
patch cable
Question 19
What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps?
Group of answer choices
100BaseTX
100BaseFX
1000BaseFX
100BaseCX
Question 20
You’re setting up a secure email server on your local network that you want clients to be able to access from the Internet using IMAP4 and SMTP. Which ports should you open in your firewall?
Group of answer choices
25 and 143
587 and 993
80 and 443
25 and 110
In: Computer Science