Questions
literature revie on hybrid cloud with IEEE references. please do it nicely and dnt copy thanks

literature revie on hybrid cloud with IEEE references.

please do it nicely and dnt copy

thanks

In: Computer Science

To encourage good grades, Hermosa High School has decided to award each student a bookstore credit...

To encourage good grades, Hermosa High School has decided to award each student a bookstore credit that is 10 times the student’s grade point average. In other words, a student with a 3.2 grade point average receives a $32.0 credit. Create an application that prompts a student for a name and grade point average, and then passes the values to a method (computeDiscount) that displays a descriptive message. The message uses the student’s name, echoes the grade point average, and computes and displays the credit, as follows: John, your GPA is 3.4, so your credit is $34.0. Grading Write your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade.

In: Computer Science

Create a "Date" class that contains: three private data members: month day year (I leave it...

Create a "Date" class that contains:

three private data members:
month
day
year
(I leave it to you to decide the type)
"setters" and "getters" for each of the data (6 functions in total)
One advantage of a "setter" is that it can provide error checking. Add assert statements to the setter to enforce reasonable conditions. For example, day might be restricted to between 1 and 31 inclusive.
one default constructor (no arguments)
one constructor with three arguments: month, day, and year
Add assert statements to enforce reasonable conditions.
a printDate function. This function will have no arguments and return void
a sameMonth function. This function will have one Date argument and a boolean return type
In main (in the following order):

instantiate one date object (date1) using the default constructor
use the getters to display the month, day, and year of date1 (should print the default values)
read keyboard input from the user for a month, day and year
use the setters to set the values of date1 to the values that came from the user
read keyboard input from the user for a second date
use the constructor with three arguments to instantiate date2 to the second date input from the user
print both objects using printDate
print a message to say if the two months are the same (testing the sameMonth function)
Your code should be in three files:

Date.h
contains the class definition
Date.cpp
includes "Date.h"
contains the functions for the class
main.cpp
includes "Date.h"
tests the class
Sample Output (Two Runs)

>./main
Testing the default constructor and the getters
The initialized date is (M-D-Y):1-1-1

Please enter a date:(Month Day Year): 11 03 1976
Please enter a second date:(Month Day Year): 03 03 1999

Printing the two days:
The date is (M-D-Y): 11-3-1976
The date is (M-D-Y): 3-3-1999
The months are different
>./main
Testing the default constructor and the getters
The initialized date is (M-D-Y): 1-1-1

Please enter a date:(Month Day Year): 12 15 2009
Please enter a second date:(Month Day Year): 12 25 2020

Printing the two days:
The date is (M-D-Y): 12-15-2009
The date is (M-D-Y): 12-25-2020
The months are the same

In: Computer Science

Instructions: 1. Write a MapReduce program to find the frequency of each letter, case insensitive, in...

Instructions:


1. Write a MapReduce program to find the frequency of each letter, case insensitive, in some given input. For example, "The quick brown fox jumps over the lazy dog" as input should generate the following (letter,count) pairs: (T, 2), (H, 1), (E, 3), etc.

2. Test your program against the 3 attached input files: HadoopFile0.txt, HadoopFile1.txt, and HadoopFile2.txt.

3. The input and output must be read/written from/into HDFS.

4. Please submit only the Java source file(s) on .

5. I've attached the WordCount.java as a sample MapReduce program. You might find it useful.

WordCount.java ::

import java.io.IOException;
import org.apache.hadoop.fs.Path;
import org.apache.hadoop.io.IntWritable;
import org.apache.hadoop.io.LongWritable;
import org.apache.hadoop.io.Text;
import org.apache.hadoop.mapreduce.Job;
import   org.apache.hadoop.mapreduce.lib.input.FileInputFormat;
import org.apache.hadoop.mapreduce.lib.output.FileOutputFormat;
import org.apache.hadoop.mapreduce.Mapper;
import org.apache.hadoop.mapreduce.Reducer;
public class WordCount
{
public static void main(String[] args)
throws Exception {
if (args.length != 2) {
System.err.println("Usage: WordCount <input path> <output path>");
System.exit(-1); }
Job job = Job.getInstance(); job.setJarByClass(WordCount.class); job.setJobName("Word Count");
//job.setNumReduceTasks(2); FileInputFormat.addInputPath(job, new Path(args[0])); FileOutputFormat.setOutputPath(job, new Path(args[1])); job.setMapperClass(WordMapper.class); job.setReducerClass(WordReducer.class); job.setOutputKeyClass(Text.class); job.setOutputValueClass(IntWritable.class); System.exit(job.waitForCompletion(true) ? 0 : 1);
}
public static class WordMapper
extends Mapper<LongWritable, Text, Text, IntWritable> {
public void map(LongWritable key, Text value, Context context)
throws IOException, InterruptedException {
String line = value.toString().toLowerCase(); String[] tokens = line.split("\\W+");
for (String token : tokens) {
if (token.length() > 0)
context.write(new Text(token), new IntWritable(1));
}
}
}
public static class WordReducer
extends Reducer<Text, IntWritable, Text, IntWritable> {
public void reduce(Text key, Iterable<IntWritable> values, Context context)
throws IOException, InterruptedException {
int count = 0;
for (IntWritable value : values) {
count += value.get();
}
context.write(key, new IntWritable(count));
}
}
}

Hadoopfile0.txt::
Hadoop is the Elephant King!
A yellow and elegant thing.
He never forgets
Useful data, or lets
An extraneous element cling!

Hadoopfile1.txt::
A wonderful king is Hadoop.
The elephant plays well with Sqoop.
But what helps him to thrive
Are Impala, and Hive,
And HDFS in the group.

Hadoopfile2.txt::
Hadoop is an elegant fellow.
An elephant gentle and mellow.
He never gets mad, Or does anything bad,
Because, at his core, he is yellow.

In: Computer Science

Using python. Produce a method for a linked list that is called FIND , which returns...

Using python.

Produce a method for a linked list that is called FIND , which returns the index of a lookup value within the linked list

In: Computer Science

Print the total amount, the average dollar value of service visits (parts and labour costs) and...

Print the total amount, the average dollar value of service visits (parts and labour costs) and the number of those visits for Acura, Mercedes and Jaguar car makes that are sold between September 2015 and December 2018 inclusive

In: Computer Science

INSTRUCTIONS Read the following case study about Amazon, and then submit a posting with answers to...

INSTRUCTIONS

Read the following case study about Amazon, and then submit a posting with answers to the 5 questions below. Your answers will be graded primarily on content, but grammar, spelling, syntax, etc will also count. Please make sure that your answers are labeled to match the Question numbers so that I can easily read (and grade) your submissions

CASE STUDY: THE AMAZON OF INNOVATION

On December 2, 2013, Amazon.com customers ordered 36.8 million items worldwide, an average of 426 items per second, with more than half of the orders from mobile devices. At the peak of sales for the Xbox One and the Playstation 4, Amazon customers purchased more than 1,000 of those units per minute. The last local express delivery was ordered by a customer in Everett, Washington at 12:26pm and was delivered at 3:56pm that same day.

You may think of Amazon as simply an online retailer, and that is indeed where the company achieved most of its success. To do this, Amazon had to build enormous supporting infrastructure – just imagine the information systems and fulfillment facilities needed to ship 36.8 million items on a single day. That infrastructure, however, is needed only during the busy holiday season. Most of the year, Amazon is left with excess infrastructure capacity. Starting in 2000, Amazon began to lease some of that capacity to other companies. In the process, it played a key role in the creation of what are termed “cloud services,” which you will learn about shortly. For now, just think of cloud services as computer resources somewhere out in the Internet that are leased on flexible terms.

Today, Amazon’s business lines can be grouped into three major categories:

  • Online Retailing
  • Order fulfillment
  • Cloud services

Consider Each.

ONLINE RETAILING

Amazon created the business model for online retailing. It began as an online bookstore, but every year since 1998 it has added new product categories. The company is involved in all aspects of online retailing. It sells its own inventory. It incentivizes you, via the Associates program, to sell its inventory as well. Or it will help you sell your inventory within its product pages or via one of its consignment venues. Online auctions are the major aspect of online sales in which Amazon does not participate. It tried auctions in 1999, but it could never make inroads against eBay.

Today it’s hard to remember how much of what we take for granted was pioneered by Amazon. “Customers who bought this, also bought that;” online customer reviews; customer ranking of customer reviews; books lists; Look Inside the Book; automatic free shipping for certain orders or frequent customers; and Kindle books and devices were all novel concepts when Amazon introduced them.

Amazon’s retailing business operates on very thin margins, meaning it makes very little money off of any one item. Products are usually sold at a discount from the stated retail price, and 2-day shipping is free for Amazon members (who pay an annual fee of $99) How does it do it? For one, Amazon drives its employees incredibly hard. Former employees claim the hours are long, the pressure is severe, and the workload is heavy. But what else? It comes down to Moore’s Law and the innovative use of nearly free data processing, storage, and communication.

ORDER FULFILLMENT

In addition to online retailing, Amazon also sells order fulfillment services. You can ship your inventory to an Amazon warehouse and access Amazon’s information systems just as if they were yours. Using technology known as Web services your order processing information systems can directly integrate, over the Web, with Amazon’s inventory, fulfillment, and shipping applications. Your customers need not know that Amazon played any role at all. You Can also sell that same inventory using Amazon’s retail sales applications.

CLOUD SERVICES

Amazon Web Services (AWS) allow organizations to lease time on computer equipment in very flexible ways. Amazon’s Elastic Cloud 2 (EC2) enables organizations to expand and contract the computer resources they need within minutes. Amazon has a variety of payment plans, and it is possible to buy computer time for less than a penny an hour. Key to this capability is the ability for the leasing organization’s computer programs to interface with Amazon’s to automatically scale up and scale down the resources leased. For example, if a news site publishes a story that causes a rapid ramp-up of traffic, that news site can, programmatically, request, configure, and use more computing resources for an hour, a day, a month, or whatever it needs.

With its Kindle devices, Amazon has become both a vendor of tablets and, even more importantly in the long term, a vendor of online music and video. And to induce customers to buy Kindle apps, in 2013 Amazon introduced its own currency, Amazon Coins. And, recently Amazon opened a 3D printing store from which customers can customize their own toys, jewelry, dog bones, and dozens of other products. Amazon is also beginning its foray into drone delivery.

QUESTIONS

  1. Based on the facts presented, what do you think is Amazon.com’s competitive strategy?
  2. Jeff Bezos, CEO of Amazon.com has stated that the best customer support is none. What does that mean?
  3. Suppose you work for Amazon. What do you suppose is the likely reaction to an employee who says to his or her boss, “But, I don’t know how to do that”?
  4. Using your own words and your own experience, what skills and abilities do you think you need to have to thrive at an organization like Amazon?
  5. What should UPS and FedEx be doing in response to Amazon’s interest in drone delivery?

In: Computer Science

Javascript Calculator Algorithm to calculate a tip percentage given the bill amount and total bill including...

Javascript Calculator

Algorithm to calculate a tip percentage given the bill amount and total bill including tip.

Asker suer for bill without tip:

Ask the user for total bill with tip:

Ask the user how many people splitting bill:

Submit button to calculate the tip percentage

In: Computer Science

Explain the main differences between grammars in problems 1, 2 and 3. 1. Expr -> Expr...

Explain the main differences between grammars in problems 1, 2 and 3.

1. Expr -> Expr + Term I Expr * Term I Term

    Term-> 0 I ... I 9 I (Expr)

2. Expr -> Term+ Expr I Term * Expr I Term

    Term -> 0 I …. 9 I (Expr)

3. Expr -> Expr + Term I Term

Term-> Term* Factor I Factor

   Factor-> 0 I ... I 9 I (Expr)

In: Computer Science

In 1-3 sentences, describe how you would "Change a number in to a word equivalent (132...

In 1-3 sentences, describe how you would "Change a number in to a word equivalent (132 -> one three two), Recursively" using C++

In: Computer Science

Playing with strings Assignment Outcomes: Demonstrate the ability to create strings. Demonstrate the ability to manipulate...

Playing with strings Assignment

Outcomes:

  • Demonstrate the ability to create strings.
  • Demonstrate the ability to manipulate strings.
  • Demonstrate the ability to write well written code.

Program Specifications:

DESIGN and IMPLEMENT a short program that will:

  • Allow the user to enter a string with up to 100 letters.
  • Display the user-entered string:
    • Forward
    • Backward
    • Vertical
    • As a triangle made from the letters of the string
  • Display the number of letters in the string.
  • Once everything above is displayed, the program will ask the user if he or she wishes to enter a different string or quit.

Hint: Use a technique to read in strings that allows spaces:

https://www.programmingsimplified.com/c/program/print-string

Submission Requirements:

Requirements will be same as the first assignment which will be the same for all future assignments.

DO NOT:

  • Use global variables, in this or any program ever.
  • Use goto statement(s) , in this or any program ever.

In: Computer Science

Write a O(n) method valuesInLevelOrder() that returns a list of the nodes of a binary tree...

Write a O(n) method valuesInLevelOrder() that returns a list of the nodes of a binary tree in level-order. That is, the method should return the root, then the nodes at depth 1, followed by the nodes at depth 2, and so on. Your algorithm should begin by putting the tree root on an initially empty queue. Then dequeue a node, add it to the output, and enqueue its left and right children (if they exist). Repeat until the queue is empty.

import java.util.*;

public class Node {
int data;
Node leftChild;
Node rightChild;
  
public Node(int data) {
this.data = data;
}
  
public Node(int data, Node leftChild, Node rightChild) {
this.data = data;
this.leftChild = leftChild;
this.rightChild = rightChild;
}
  
public static List<Integer> valuesInLevelOrder(Node root) {
return null;
}

In: Computer Science

Please explain the roles of project managers in various organizational environments and various phases of the...

Please explain the roles of project managers in various organizational environments and various phases of the project.

( one page expected )

In: Computer Science

I am implementing a generic List class and not getting the expected output. My current output...

I am implementing a generic List class and not getting the expected output.

My current output is: [0, 1, null]

Expected Output in a separate test class:

List list = new SparseList<>(); 
list.add("0");
list.add("1");
list.add(4, "4");

will result in the following list of size 5: [0, 1, null, null, 4].

list.add(3, "Three");

will result in the following list of size 6: [0, 1, null, Three, null, 4].

list.set(3, "Three");

is going to produce a list of size 5 (unchanged): [0, 1, null, Three, 4].

When removing an element from the list above, via list.remove(1); the result should be the following list of size 4: [0, null, Three, 4]

import java.util.Collection;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.ListIterator;

public class SparseList<E> implements List<E>{
    private int endIndex = 0;
    
    private HashMap<Integer,E> list;
    
    public SparseList() {
        list = new HashMap<>();
    }
    
    public SparseList(E[] arr) {
        list = new HashMap<>();
        for(int i = 0; i <arr.length; i++) {
            list.put(i, arr[i]);
        }
        endIndex = arr.length - 1;
    }
    
    @Override
    public boolean add(E e) {
        list.put(endIndex, e);
        endIndex++;
        return true;
    }
    
    @Override
    public void add(int index, E element) {
        list.put(index, element);
    }
    
    @Override
    public E remove(int index) {
        return list.remove(index);
    }
    
    @Override
    public E get(int index) {
        return list.get(index);
    }
    
    @Override
    public E set(int index, E element) {
        E previous = list.get(index);
        list.put(index, element);
        return previous;
    }
    
    @Override
    public int size() {
        return endIndex + 1;
    }

    @Override
    public void clear() {
        list.clear();
        
    }
    
    @Override
    public boolean isEmpty() {
        return list.isEmpty();
    }

    @Override
    public String toString() {
        String s = "";
        for(int i = 0; i < list.size(); i++) {
            if(list.get(i) == null) {
                s += "null, ";
            }else {
            s += list.get(i).toString() + ", ";
        }
        }
        return "[" + s + "]";
    }

    @Override
    public boolean contains(Object o) {
        throw new UnsupportedOperationException();
    }

    @Override
    public Iterator<E> iterator() {
        throw new UnsupportedOperationException();
    }

    @Override
    public Object[] toArray() {
        throw new UnsupportedOperationException();
    }

    @Override
    public <T> T[] toArray(T[] a) {
        throw new UnsupportedOperationException();
    }


    @Override
    public boolean containsAll(Collection<?> c) {
        throw new UnsupportedOperationException();
    }

    @Override
    public boolean addAll(Collection<? extends E> c) {
        throw new UnsupportedOperationException();
    }

    @Override
    public boolean addAll(int index, Collection<? extends E> c) {
        throw new UnsupportedOperationException();
    }

    @Override
    public boolean removeAll(Collection<?> c) {
        throw new UnsupportedOperationException();
    }

    @Override
    public boolean retainAll(Collection<?> c) {
        throw new UnsupportedOperationException();
    }

    @Override
    public boolean remove(Object o) {
        throw new UnsupportedOperationException();
    }
    
    @Override
    public int indexOf(Object o) {
        throw new UnsupportedOperationException();
    }

    @Override
    public int lastIndexOf(Object o) {
        throw new UnsupportedOperationException();
    }

    @Override
    public ListIterator<E> listIterator() {
        throw new UnsupportedOperationException();
    }

    @Override
    public ListIterator<E> listIterator(int index) {
        throw new UnsupportedOperationException();
    }

    @Override
    public List<E> subList(int fromIndex, int toIndex) {
        throw new UnsupportedOperationException();
    }

}

In: Computer Science

1. FTP requires confirmation that a file was successfully transmitted to a client, but it has...

1. FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this information for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?

Group of answer choices

UDP

HTTP

SSH

TCP

2. Which of the following tools can be used to determine if a network cable is good? Choose all that apply.

Group of answer choices multiple choice

Cable tester

Crimper

Loopback plug

Network multimeter

3. A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends messages only to the destination computer. What information does a switch collect from messages crossing its interfaces so it knows where to send data in future transmissions?

Group of answer choices

IP address

MAC address

Port number

FQDN

4. Which two of the following hosts on a corporate intranet are on the same subnet?

Group of answer choices/

multiple choice

192.168.2.143 // 255.255.255.0

172.54.98.3 // 255.255.0.0

192.168.5.57 // 255.255.255.0

172.54.72.89 // 255.255.0.0

5. Your SOHO router has failed and you have installed a new router. The old router’s static IP address on the network is 192.168.0.1. The new router has a static IP address of 10.0.0.1. You go to a computer to configure the new router and enter 10.0.0.1 in the browser address box. The router does not respond. You open a command prompt window and try to ping the router, which does not work. Next, you verify that the router has connectivity and you see that its local connection light is blinking, indicating connectivity. What is the most likely problem and its best solution?

Group of answer choices

The computer you are using to configure the router has a corrupted TCP/IP configuration. Restart the computer.

The router is defective. Return it for a full refund.

The computer and the router are not in the same subnet. Release and renew the IP address of the computer.

The computer and the router are not in the same subnet. Change the subnet mask assigned to the computer.

Question 6

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.

Group of answer choices

True

False

Question 7

You are configuring email on a customer’s computer. Which port should you configure for pop.companymail.com? For smtp.companymail.com?

Group of answer choices

143, 25

110, 143

110, 25

25, 110

Question 8

Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTPS server. Why is it not a good idea to use Telnet to reach the remote computer?

Group of answer choices

Telnet transmissions are not encrypted.

Telnet is not reliable and the file might arrive corrupted.

FTP is faster than Telnet.

FTP running on the same computer as Telnet causes Telnet not to work.

Question 9

What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?

Group of answer choices

Multiple choice

T568A

T568B

TIA/EIA 586

T568C

Question 10

If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?

Group of answer choices

ipconfig

ifconfig

tracert

nslookup

Question 11

A punchdown tool is used to wire twisted-pair cabling to a keystone jack.

Group of answer choices

True

False

Question 12

What type of network device keeps a table of the MAC addresses of the devices connected to it?

Group of answer choices

hub

router

NIC

switch

Question 13

What TCP port is utilized by an SSH server listening for connections?

Group of answer choices

20

21

22

23

Question 14

What two protocols are used to deliver mail messages?

Group of answer choices

multiple choice

POP3

SNMP

SMTP

IMAP4

Question 15

Your customer recently installed a new router in her dance studio, as shown in the diagram in Figure 8-56. She then ran Ethernet cables through the drop ceiling to computers in various offices. Without any further testing, which computers do you suspect are experiencing connection problems? Choose all that apply.

Group of answer choices

Computer A

Computer B

Computer C

None of the above

Question 16

Phone cords are a type of twisted-pair cable and use an RJ-45 connector.

Group of answer choices

True

False

Question 17

Which of the following is true about cable Internet?

Group of answer choices

you share the cable infrastructure with your neighbors

you need filters on every phone jack

fiber optic cabling is required

provides up to 2.3 Mbps of bandwidth

Question 18

What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device?

Group of answer choices

MULTIPLE CHOICE

crossover cable

power over Ethernet cable

straight-through cable

patch cable

Question 19

What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps?

Group of answer choices

100BaseTX

100BaseFX

1000BaseFX

100BaseCX

Question 20

You’re setting up a secure email server on your local network that you want clients to be able to access from the Internet using IMAP4 and SMTP. Which ports should you open in your firewall?

Group of answer choices

25 and 143

587 and 993

80 and 443

25 and 110

In: Computer Science