A course consists of many subjects, but each subject can only be associated with one course. Each subject is co-ordinated by a lecturer and each lecturer can co-ordinate many subjects. Subjects and courses are identified by subject and course codes, and have a name. Lecturers are identified by an ID and have a name, room number and telephone contact number
.a. Using Enterprise Architect, create an ERD representing the above scenario. You need to include the cardinality of the relationships.
b. Transform the ERD to a set of relational tables.
In: Computer Science
Write an ALP to control the different direction of rotation of stepper motor
Stepper motor has the following specifications
Stepper motor has 4 windings
Speed =12 rpm
No of teeth =200
In: Computer Science
In: Computer Science
Game worlds require an environment and a dimensional space.
In: Computer Science
Write a program to compute the total time and average speed it will take a runner to run 10 miles with the following pace segments:
they run the first mile at a pace of 7 minutes per mile, the following 4 miles at a pace of 8.5 minutes per mile, the next 4 miles at a pace of 9 minutes per mile and the last mile at a pace of 3.5 minutes per mile.
Performs the computations and prints the results in a single nice message
Language PYTHON3
In: Computer Science
Overview
Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated.
You may find the following Floor Plan helpful in completing this lab.
ABC Corporation’s Network Description
ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.
There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.
The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces.
The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.
The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.
Add Wireless Network Access Points
Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.
The “guest” network should have a different SSID than the company’s wireless network. It should be configured to allow anyone to connect with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the “guest” network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company’s servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).
Note: You might want to review this informative webpage to see how to configure Windows Server to handle the authentication for the access points.
Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it’s on its own subnet, separate from both the wired network and the company wireless network.
Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.
Place the wireless access points in the building. You may use the floor plan provided in the attached PDF.
Create a Network Diagram
Your network diagram needs to include the following elements:
Network Documentation
Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.
What to Turn In
For assignments that require you to submit Visio work, please
export your file and submit as a PDF. Also, please submit your
original Visio file.
You also need to turn in a Word document (.doc or .docx) file that
explains your network diagram elements. Include snapshots from your
network diagram in your Word doc file – and annotate your diagram
snapshots to better help your explanation of your network.
I want the answer in Microsoft VISIO screenshot
In: Computer Science
Around the world, governments are introducing laws which either limit or prohibit the availability of cryptography for their citizens, require key escrow (c.f. the Clipper chip), or require telecommunications and Internet service providers and software developers to somehow break or weaken cryptography in their products, perhaps by introducing 'back doors' or other vulnerabilities (e.g. the Assistance and Access Act (Cwlth) 2018).
Take a position for or against government intervention in cryptography, for government, the business sector and private individuals. In each case, you should briefly describe and weigh up the positive benefits of cryptography as well as the threats it poses. Should governments have the power to prohibit or break encryption?
There are obvious implications for confidentiality and privacy, but what about the other security properties such as integrity, entity authenticity, integrity, anonymity, fairness, etc.?
What are the implications of any weakening of protocols or the introduction of back doors? Are there other, perhaps more important, threats to democracy and individual liberties in cyberspace?
Take into account:
In: Computer Science
Explain turbidity,turbidity rod,turbimeters,jackson turbidimeter and baylis turbidimeters with example and explain in details.(50marks)
Need own answer and no internet answers r else i il downvote nd report to chegg.Even a single is wrong i il downvote.its 50marks question so no short answer minimum 10page answer required and own answer r else i il downvote.
Note:Minimum 10page answer and no plagarism r else i il downvote and report to chegg.Minimum 10 to 15page answer required r else dnt attempt.strictly no internet answer n no plagarism.
its 50marks question so i il stricly review nd report
Need own answer for 50marks.
In: Computer Science
discuss the challenges presented by the covid-19 pandemic when it comes to database management/ administration
In: Computer Science
Shindler gives lots of homework assignments, each of which have an easy version and a hard version1. Each student is allowed, for each homework, to submit either their answer to the easy version (and get ei > 0 points) or the hard version (and get hi > 0 points, which is also guaranteed to always be more than ei) or to submit neither (and get 0 points for the assignment). Note that ei might have different values for each i, as might hi. The values for all n assignments are known at the start of the semester.
The catch is that the hard version is, perhaps not surprisingly, more difficult than the easy version. In order for you to do the hard version, you must have not done the previous assign- ment at all: neither the easy nor the hard version (and thus are more relaxed, de-stressed, etc). Your goal is to maximize the number of points you get from homework assignments over the course of the semester. Give an efficient dynamic programming algorithm to determine the largest number of points possible for a given semester’s homework choices.
In: Computer Science
Doradla, P., Joseph, C., & Giles, R. H. (2017). Terahertz endoscopic imaging for colorectal cancer detection: Current status and future perspectives. World journal of gastrointestinal endoscopy, 9(8), 346.
Lambin, P., Leijenaar, R. T., Deist, T. M., Peerlings, J., De Jong, E. E., Van Timmeren, J., ... & van Wijk, Y. (2017). Radiomics: the bridge between medical imaging and personalized medicine. Nature reviews Clinical oncology, 14(12), 749-762.
Stouthandel, M. E., Veldeman, L., & Van Hoof, T. (2019). Call for a multidisciplinary effort to map the lymphatic system with advanced medical imaging techniques: a review of the literature and suggestions for future anatomical research. The Anatomical Record, 302(10), 1681-1695.
Bödenler, M., de Rochefort, L., Ross, P. J., Chanet, N., Guillot, G., Davies, G. R., ... & Broche, L. M. (2019). Comparison of fast field-cycling magnetic resonance imaging methods and future perspectives. Molecular physics, 117(7-8), 832-848.
Zhou, L. Q., Wang, J. Y., Yu, S. Y., Wu, G. G., Wei, Q., Deng, Y. B., ... & Dietrich, C. F. (2019). Artificial intelligence in medical imaging of the liver. World journal of gastroenterology, 25(6), 672.
In: Computer Science
In Python 3:
Software Design Patterns may be thought of as blue prints or recipes for implementing common models in software. Much like re-using proven classes in Object Oriented design, re-using proven patterns tends to produce more secure and reliable results often in reduced time compared to re-inventing the wheel. In fact, some high-level languages have integrated facilities to support many common patterns with only minimal, if any, user written software. That said, in software design and construction, often the challenge is to know that a pattern exists and be able to recognize when it is a good fit for a project. To give you a familiar frame of reference, below is a Singleton Pattern implemented in Java:
public class MySingleton {
// reference to class instance
private static MySingleton instance = null;
// Private Constructor
private MySingleton() {
instance = this;
}
// Returns single instance to class
public static MySingleton getInstance() {
if (instance == null) {
instance = new MySingleton();
}
return instance;
}
public static void main(String[] args)
{
MySingleton s1 = MySingleton.getInstance();
MySingleton s2 = MySingleton.getInstance();
System.out.println("s1: " + s1 + " s2: " + s2);
}
}
If you run this example, you will see that the address for s1 and s2 are exactly the same. That is because the pattern restricts the existence of more than one instance in a process. Of course this example only implements the pattern but other functionality can be added to this class just as any other class. The primary features of a singleton are:
The primary goal of this assignment is not to teach you how to write singleton patterns in Python, (though that’s part of it), but to familiarize you with the concept of design patterns as well as give you experience in adapting one into one of your own designs.
Description
Pick one of your previous assignments, either from MindTap or one of your Distributed Systems assignments and integrate a Singleton Pattern into it. Hint: Any class can be made into a Singleton.
Code to integrate Singleton pattern into:
import random
class Card(object):
""" A card object with a suit and rank."""
RANKS = (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
SUITS = ('Spades', 'Diamonds', 'Hearts', 'Clubs')
def __init__(self, rank, suit):
"""Creates a card with the given rank and suit."""
self.rank = rank
self.suit = suit
self.faceup = False
def turn(self):
self.faceup = not self.faceup
def __str__(self):
"""Returns the string representation of a card."""
if self.rank == 1:
rank = 'Ace'
elif self.rank == 11:
rank = 'Jack'
elif self.rank == 12:
rank = 'Queen'
elif self.rank == 13:
rank = 'King'
else:
rank = self.rank
return str(rank) + ' of ' + self.suit
class Deck(object):
""" A deck containing 52 cards."""
def __init__(self):
"""Creates a full deck of cards."""
self.cards = []
for suit in Card.SUITS:
for rank in Card.RANKS:
c = Card(rank, suit)
self.cards.append(c)
def shuffle(self):
"""Shuffles the cards."""
random.shuffle(self.cards)
def deal(self):
"""Removes and returns the top card or None
if the deck is empty."""
if len(self) == 0:
return None
else:
return self.cards.pop(0)
def __len__(self):
"""Returns the number of cards left in the deck."""
return len(self.cards)
def __str__(self):
"""Returns the string representation of a deck."""
result = ''
for c in self.cards:
result = self.result + str(c) + '\n'
return result
def main():
"""A simple test."""
deck = Deck()
print("A new deck:")
while len(deck) > 0:
print(deck.deal())
deck = Deck()
deck.shuffle()
print("A deck shuffled once:")
while len(deck) > 0:
print(deck.deal())
if __name__ == "__main__":
main()
In: Computer Science
In: Computer Science
Draw an ERD diagram for Hair Saloon and describe its relationship
In: Computer Science
Q, Haskell.
I need to define function encode and decode. Details about the functions are provided in code.
-- | encode -- -- Given a string, return a list of encoded values of type (Int,Char) -- -- >>> encode ['a','a','a','a','b','c','c','a','a','d','e','e','e','e'] -- [(4,'a'),(1,'b'),(2,'c'),(2,'a'),(1,'d'),(4,'e')] -- -- >>> encode "hello" -- [(1,'h'),(1,'e'),(2,'l'),(1,'o')] -- -- >>> encode [] -- [] -- encode :: String -> [(Int,Char)] encode = undefined -- | decode -- -- Given a list of encoded values of type (Int,Char), generate a string corresponding to -- this encoding. -- -- If the first element of any pair in the list is equal to zero or negative, -- skip the corresponding character in the output string, -- while still providing decodings for the remaining characters. -- -- -- >>> decode [(4,'a'),(1,'b'),(2,'c'),(2,'a'),(1,'d'),(4,'e')] -- "aaaabccaadeeee" -- -- >>> decode [] -- "" -- -- >>> decode [(-4,'a')] -- "" -- -- >>> decode [(3,'c'),(-4,'a'),(5,'b')] -- "cccbbbbb" -- -- >>>decode [(3,'c'),(0,'a'),(5,'b')] -- "cccbbbbb" -- -- prop> \x -> x == decode (encode x) -- decode :: [(Int,Char)] -> String decode = undefined
In: Computer Science