Questions
A course consists of many subjects, but each subject can only be associated with one course....

A course consists of many subjects, but each subject can only be associated with one course. Each subject is co-ordinated by a lecturer and each lecturer can co-ordinate many subjects. Subjects and courses are identified by subject and course codes, and have a name. Lecturers are identified by an ID and have a name, room number and telephone contact number

.a. Using Enterprise Architect, create an ERD representing the above scenario. You need to include the cardinality of the relationships.

b. Transform the ERD to a set of relational tables.

In: Computer Science

Write an ALP to control the different direction of rotation of stepper motor​ ​      Stepper...

Write an ALP to control the different direction of rotation of stepper motor​

     Stepper motor has the following specifications​

  • Stepper motor has 4 windings ​

  • Speed =12 rpm​

  • No of teeth =200 ​

In: Computer Science

NASM - Create a program that adds two binary numbers and returns the result in binary.

NASM - Create a program that adds two binary numbers and returns the result in binary.

In: Computer Science

Game worlds require an environment and a dimensional space. a) Discuss and compare (one paragraph) the...

Game worlds require an environment and a dimensional space.

  • a) Discuss and compare (one paragraph) the differences between the environment and the dimensional space.
  • b) Using a game that you are familiar with as an example, discuss (one paragraph) its environment and its dimensional space

In: Computer Science

Write a program to compute the total time and average speed it will take a runner...

Write a program to compute the total time and average speed it will take a runner to run 10 miles with the following pace segments:

they run the first mile at a pace of 7 minutes per mile, the following 4 miles at a pace of 8.5 minutes per mile, the next 4 miles at a pace of 9 minutes per mile and the last mile at a pace of 3.5 minutes per mile.

Performs the computations and prints the results in a single nice message

Language PYTHON3

In: Computer Science

Overview Your assignment is to complete a wireless network design for a small company. You will...

Overview

Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated.

You may find the following Floor Plan helpful in completing this lab.

ABC Corporation’s Network Description

ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.

There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.

The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces.

The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.

The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.

Add Wireless Network Access Points

Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.

The “guest” network should have a different SSID than the company’s wireless network. It should be configured to allow anyone to connect with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the “guest” network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company’s servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).

Note: You might want to review this informative webpage to see how to configure Windows Server to handle the authentication for the access points.

Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it’s on its own subnet, separate from both the wired network and the company wireless network.

Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.

Place the wireless access points in the building. You may use the floor plan provided in the attached PDF.  

Create a Network Diagram

Your network diagram needs to include the following elements:

  • Each Wireless Access Point (WAP)
  • Each WAP’s critical configuration details – name, IP address, SSID, connection protocols, encryption protocols and wireless channel
  • The Windows authentication server – including name, IP address, and important configuration details
  • Additional switches and connections between the building’s floors to establish the network(s)
  • IP Address ranges that will be assigned to network devices when they join the wireless networks

Network Documentation

Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.

What to Turn In

For assignments that require you to submit Visio work, please export your file and submit as a PDF. Also, please submit your original Visio file.
You also need to turn in a Word document (.doc or .docx) file that explains your network diagram elements. Include snapshots from your network diagram in your Word doc file – and annotate your diagram snapshots to better help your explanation of your network.

I want the answer in Microsoft VISIO screenshot

In: Computer Science

Around the world, governments are introducing laws which either limit or prohibit the availability of cryptography...

Around the world, governments are introducing laws which either limit or prohibit the availability of cryptography for their citizens, require key escrow (c.f. the Clipper chip), or require telecommunications and Internet service providers and software developers to somehow break or weaken cryptography in their products, perhaps by introducing 'back doors' or other vulnerabilities (e.g. the Assistance and Access Act (Cwlth) 2018).

Take a position for or against government intervention in cryptography, for government, the business sector and private individuals. In each case, you should briefly describe and weigh up the positive benefits of cryptography as well as the threats it poses. Should governments have the power to prohibit or break encryption?

There are obvious implications for confidentiality and privacy, but what about the other security properties such as integrity, entity authenticity, integrity, anonymity, fairness, etc.?

What are the implications of any weakening of protocols or the introduction of back doors? Are there other, perhaps more important, threats to democracy and individual liberties in cyberspace?

Take into account:

  • Changes in the cryptologic landscape over the next 25 years or so
  • The geo-political threat landscape
  • The ethical and moral objectives society expects of its members
  • Other threats to individual liberty, the production of business, and the health of society

In: Computer Science

Explain turbidity,turbidity rod,turbimeters,jackson turbidimeter and baylis turbidimeters with example and explain in details.(50marks) Need own answer...

Explain turbidity,turbidity rod,turbimeters,jackson turbidimeter and baylis turbidimeters with example and explain in details.(50marks)

Need own answer and no internet answers r else i il downvote nd report to chegg.Even a single is wrong i il downvote.its 50marks question so no short answer minimum 10page answer required and own answer r else i il downvote.

Note:Minimum 10page answer and no plagarism r else i il downvote and report to chegg.Minimum 10 to 15page answer required r else dnt attempt.strictly no internet answer n no plagarism.

its 50marks question so i il stricly review nd report

Need own answer for 50marks.

In: Computer Science

discuss the challenges presented by the covid-19 pandemic when it comes to database management/ administration

discuss the challenges presented by the covid-19 pandemic when it comes to database management/ administration

In: Computer Science

Shindler gives lots of homework assignments, each of which have an easy version and a hard...

Shindler gives lots of homework assignments, each of which have an easy version and a hard version1. Each student is allowed, for each homework, to submit either their answer to the easy version (and get ei > 0 points) or the hard version (and get hi > 0 points, which is also guaranteed to always be more than ei) or to submit neither (and get 0 points for the assignment). Note that ei might have different values for each i, as might hi. The values for all n assignments are known at the start of the semester.

The catch is that the hard version is, perhaps not surprisingly, more difficult than the easy version. In order for you to do the hard version, you must have not done the previous assign- ment at all: neither the easy nor the hard version (and thus are more relaxed, de-stressed, etc). Your goal is to maximize the number of points you get from homework assignments over the course of the semester. Give an efficient dynamic programming algorithm to determine the largest number of points possible for a given semester’s homework choices.

In: Computer Science

Doradla, P., Joseph, C., & Giles, R. H. (2017). Terahertz endoscopic imaging for colorectal cancer detection:...

  1. Doradla, P., Joseph, C., & Giles, R. H. (2017). Terahertz endoscopic imaging for colorectal cancer detection: Current status and future perspectives. World journal of gastrointestinal endoscopy, 9(8), 346.‏

  2. Lambin, P., Leijenaar, R. T., Deist, T. M., Peerlings, J., De Jong, E. E., Van Timmeren, J., ... & van Wijk, Y. (2017). Radiomics: the bridge between medical imaging and personalized medicine. Nature reviews Clinical oncology, 14(12), 749-762.‏

  3. Stouthandel, M. E., Veldeman, L., & Van Hoof, T. (2019). Call for a multidisciplinary effort to map the lymphatic system with advanced medical imaging techniques: a review of the literature and suggestions for future anatomical research. The Anatomical Record, 302(10), 1681-1695.‏

  4. Bödenler, M., de Rochefort, L., Ross, P. J., Chanet, N., Guillot, G., Davies, G. R., ... & Broche, L. M. (2019). Comparison of fast field-cycling magnetic resonance imaging methods and future perspectives. Molecular physics, 117(7-8), 832-848.‏

  5. Zhou, L. Q., Wang, J. Y., Yu, S. Y., Wu, G. G., Wei, Q., Deng, Y. B., ... & Dietrich, C. F. (2019). Artificial intelligence in medical imaging of the liver. World journal of gastroenterology, 25(6), 672.‏

  6. DeSouza, N. M., Winfield, J. M., Waterton, J. C., Weller, A., Papoutsaki, M. V., Doran, S. J., ... & Jackson, A. (2018). Implementing diffusion-weighted MRI for body imaging in prospective multicentre trials: current considerations and future perspectives. European radiology, 28(3), 1118-1131.‏
  7. Pesapane, F., Codari, M., & Sardanelli, F. (2018). Artificial intelligence in medical imaging: threat or opportunity? Radiologists again at the forefront of innovation in medicine. European radiology experimental, 2(1), 35.‏
  8. Lee, J. G., Jun, S., Cho, Y. W., Lee, H., Kim, G. B., Seo, J. B., & Kim, N. (2017). Deep learning in medical imaging: general overview. Korean journal of radiology, 18(4), 570-584.‏
  9. Choi, H. (2018). Deep learning in nuclear medicine and molecular imaging: current perspectives and future directions. Nuclear medicine and molecular imaging, 52(2), 109-118.‏
  10. Wang, G. (2016). A perspective on deep imaging. IEEE access, 4, 8914-8924.‏
  1. Please can you write a short paragraph 6-8 lines (summary) for each reference

In: Computer Science

In Python 3: Software Design Patterns may be thought of as blue prints or recipes for...

In Python 3:

Software Design Patterns may be thought of as blue prints or recipes for implementing common models in software. Much like re-using proven classes in Object Oriented design, re-using proven patterns tends to produce more secure and reliable results often in reduced time compared to re-inventing the wheel. In fact, some high-level languages have integrated facilities to support many common patterns with only minimal, if any, user written software. That said, in software design and construction, often the challenge is to know that a pattern exists and be able to recognize when it is a good fit for a project. To give you a familiar frame of reference, below is a Singleton Pattern implemented in Java:

public class MySingleton {

    // reference to class instance

    private static MySingleton instance = null;

    // Private Constructor

    private MySingleton() {

        instance = this;

    }

    // Returns single instance to class

    public static MySingleton getInstance() {

        if (instance == null) {

            instance = new MySingleton();

        }

        return instance;

    }

    public static void main(String[] args)

    {

        MySingleton s1 = MySingleton.getInstance();

        MySingleton s2 = MySingleton.getInstance();

        System.out.println("s1: " + s1 + " s2: " + s2);

    }

}

If you run this example, you will see that the address for s1 and s2 are exactly the same. That is because the pattern restricts the existence of more than one instance in a process. Of course this example only implements the pattern but other functionality can be added to this class just as any other class. The primary features of a singleton are:

  1. Private or restricted constructor
  2. Internal variable for holding reference to single instance
  3. Static method for retrieving the instance

The primary goal of this assignment is not to teach you how to write singleton patterns in Python, (though that’s part of it), but to familiarize you with the concept of design patterns as well as give you experience in adapting one into one of your own designs.

Description

Pick one of your previous assignments, either from MindTap or one of your Distributed Systems assignments and integrate a Singleton Pattern into it. Hint: Any class can be made into a Singleton.

Code to integrate Singleton pattern into:

import random

class Card(object):

    """ A card object with a suit and rank."""

    RANKS = (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

    SUITS = ('Spades', 'Diamonds', 'Hearts', 'Clubs')

    def __init__(self, rank, suit):

        """Creates a card with the given rank and suit."""

        self.rank = rank

        self.suit = suit

        self.faceup = False

    def turn(self):

        self.faceup = not self.faceup

    def __str__(self):

        """Returns the string representation of a card."""

        if self.rank == 1:

            rank = 'Ace'

        elif self.rank == 11:

            rank = 'Jack'

        elif self.rank == 12:

            rank = 'Queen'

        elif self.rank == 13:

            rank = 'King'

        else:

            rank = self.rank

        return str(rank) + ' of ' + self.suit

class Deck(object):

    """ A deck containing 52 cards."""

    def __init__(self):

        """Creates a full deck of cards."""

        self.cards = []

        for suit in Card.SUITS:

            for rank in Card.RANKS:

                c = Card(rank, suit)

                self.cards.append(c)

    def shuffle(self):

        """Shuffles the cards."""

        random.shuffle(self.cards)

    def deal(self):

        """Removes and returns the top card or None

        if the deck is empty."""

        if len(self) == 0:

           return None

        else:

           return self.cards.pop(0)

    def __len__(self):

       """Returns the number of cards left in the deck."""

       return len(self.cards)

    def __str__(self):

        """Returns the string representation of a deck."""

        result = ''

        for c in self.cards:

            result = self.result + str(c) + '\n'

        return result

def main():

    """A simple test."""

    deck = Deck()

    print("A new deck:")

    while len(deck) > 0:

        print(deck.deal())

    deck = Deck()

    deck.shuffle()

    print("A deck shuffled once:")

    while len(deck) > 0:

        print(deck.deal())

if __name__ == "__main__":

    main()

In: Computer Science

You want to create five copies of an existing VM named TEST-ALPHA that’s currently running on...

  1. You want to create five copies of an existing VM named TEST-ALPHA that’s currently running on a Hyper‑V virtualization server. The VM has the Windows Server 2019 OS installed. You shut down the VM and export it to a location on the network. What steps should you perform next to accomplish your goal?
  2. You’re planning the deployment of 20 VMs that will run critical workloads for your organization. These workloads are so large that it’s necessary to ensure that if a VM host that hosts any of the VMs fails, the VMs will remain running without any downtime. Which high availability technology should you use when deploying and configuring the VMs to achieve this goal?

In: Computer Science

Draw an ERD diagram for Hair Saloon and describe its relationship

Draw an ERD diagram for Hair Saloon and describe its relationship

In: Computer Science

Q, Haskell. I need to define function encode and decode. Details about the functions are provided...

Q, Haskell.

I need to define function encode and decode. Details about the functions are provided in code.

-- | encode
--
-- Given a string, return a list of encoded values of type (Int,Char)
--
-- >>> encode ['a','a','a','a','b','c','c','a','a','d','e','e','e','e']
-- [(4,'a'),(1,'b'),(2,'c'),(2,'a'),(1,'d'),(4,'e')]
--
-- >>> encode "hello"
-- [(1,'h'),(1,'e'),(2,'l'),(1,'o')]
--
-- >>> encode []
-- []
--
encode :: String -> [(Int,Char)]
encode = undefined

-- | decode
--
-- Given a list of encoded values of type (Int,Char), generate a string corresponding to
-- this encoding.
--
-- If the first element of any pair in the list is equal to zero or negative, 
-- skip the corresponding character in the output string, 
-- while still providing decodings for the remaining characters.
-- 
--
-- >>> decode [(4,'a'),(1,'b'),(2,'c'),(2,'a'),(1,'d'),(4,'e')]
-- "aaaabccaadeeee"
--
-- >>> decode []
-- ""
--
-- >>> decode [(-4,'a')]
-- ""
--
-- >>> decode [(3,'c'),(-4,'a'),(5,'b')]
-- "cccbbbbb"
--
-- >>>decode [(3,'c'),(0,'a'),(5,'b')]
-- "cccbbbbb"
--
-- prop> \x -> x == decode (encode x)
-- 
decode :: [(Int,Char)] -> String
decode = undefined

In: Computer Science