Questions
Please find the best methodology for each of the three software development personalities below and explain...

Please find the best methodology for each of the three software development personalities below and explain why you chose that one en each case.

  1. The NinjaSix:

“Show don’t tell” describes his modus operandi best. He is an enigma: not outright friendly or forthcoming, but he works surprisingly well on a team.

His motto? Don’t have doubts; just resolve the problem quickly and efficiently. This no-nonsense attitude makes him an absolute joy to work with.

  1. The Clever Ambassador:

He is outspoken and the unofficial project manager. He is the consummate ring-master, able to please both clients (the ferocious lions) and team members (the elephants that could easily trample him if they wanted).

works behind the scenes, receiving lower pay for what amounts to the same work

  1. The Half-Cup Speedster:

The half-cup speedster takes on multiple projects at once. He works much faster than most, but his amazing quantity is tarnished by its quality: his speed results from cutting corners and hacking core.

Unfortunately, much like the handwriting of physicians, his code is practically indecipherable. Should someone need to fix a problem that surfaces later, they will surely encounter difficulties. You can’t fix what you can’t read or understand.

Methodologies:

Methodology

Focus

Waterfall

The linear and sequential approach to development

Agile

Continuous improvement and delivering better quality

Critical path method

Maximizing project activities and finding the shortest path (timeline) to task and project success

Critical chain project management

Optimizing resources usage

Six Sigma

Eliminating waste and improving processes and profitability

Scrum

Delivering higher quality

Lean Six Sigma

Customer-focused

Kanban

Customer-focused, fostering ongoing collaboration and continuous learning

Scrumban

Reducing waste, shorten lead time, turnaround time, and deliver higher quality products and services

Lean development

Reducing waste while maximizing output and increasing stakeholder value

Crystal

Improving project results by focusing efforts on the people-side of projects

Dynamic systems development method

Aligning projects with companywide strategic goals

Adaptive software development

Helping teams become more agile when dealing with change

In: Computer Science

Create a Huffman Tree and generate the codes for each character of the following input: create...

  1. Create a Huffman Tree and generate the codes for each character of the following input:

create a huffman tree

For consistency:

  1. If same frequency – put in priority queue alphabetically; put space before other characters of the same frequency

  2. Add subtrees to end of group with same priority

  3. Lower number has higher priority (goes to front)

In: Computer Science

The Government of Mauritius, through the Smart City Scheme from the Economic Development Board (EDB), is...

The Government of Mauritius, through the Smart City Scheme from the Economic Development Board (EDB), is offering a plethora of opportunities to global investors to share in the vision of Mauritius in creating intelligent, innovative and sustainable cities of tomorrow.
One IT concept critical to the implementation of smart cities is what we refer to as the "Internet of Things", commonly known as IoT.
a) Explain, using a relevant diagram, what is IoT?
b) List and explain two benefits that IoT will bring to smart cities in Mauritius.
c) List and explain two limitations of IoT.
d) Will smart cities be a success in Mauritius and will it achieve its main goals? Discuss

In: Computer Science

In Java: Problem 1. Write a program that performs the following two tasks: 1. Reads an...

In Java:

Problem 1.

Write a program that performs the following two tasks:

1. Reads an arithmetic expression in an infix form, stores it in a queue (infix queue) and converts it to a postfix form (saved in a postfix queue).

2. Evaluates the postfix expression.

Use the algorithms described in class/ lecture notes. Use linked lists to implement the Queue and Stack ADTs. Using Java built-in classes will result in 0 points. You must use your own Stack and Queue classes (my code is a good starting point). Submit the code + example runs to validate your code. Submit UML chart to show the program design.

Problem 2.

Given the following postorder and inorder traversals of a binary tree, draw the tree:

Postorder: A B C D E F I K J G H

Inorder: C B A E D F H I G K J

Explain your answer in a systematic and recursive fashion.

In: Computer Science

Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been...

Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library loan system that we have at present is mostly manual. The library has three types of items for loan to its members: Book, DVD, and Magazine. Each item is identified with a unique call number of six-digit long. The item has also a title and year of publication/production. Not all items are for loan. Some items are only for use inside the library. For a book, 4 weeks; for a DVD, one week; and for a magazine 2 weeks loan is granted if the item is available for loan. A member can borrow maximum of 5 items. The library maintains three different file systems: Membership, Item, and Loan. The university has also a separate software system called Unisys that deals with students and staff. The system has three major components: Staff/Student data, Registration data, and Course data. However, our library system needs data from UniSys to check the validity of the membership of the library. The university has another software system that deals with finance and payments, called FinSys which is also independent but communicates with other systems in the university. It has three components: Financial account of the staff/student, Salary, and Expenditure. Every person at Al-Ekra University has a FinSys account called Fin_Account. The information on the salary of the staff and the tuition fee of the student are stored here. We now want a library system that can provide the following functions. The member of the library can only borrow items from the library. The person must be either staff or student of Al-Ekra University. The person first submits an online application form. The forms include the name and address of the person, and the Fin_Account of the person with Al-Ekra University. A library administrative staff is immediately informed by the system that an application has been submitted. The admin staff first checks the application, and provides input if needed. The system saves the updated information of the application, and then contacts UniSys to get the confirmation that the applicant is either staff or student. Once the library system gets the feedback from UniSys, it records the feedback. If the person is a member of the university, the application is preliminary accepted; otherwise the application is rejected without further processing. The library system then requests FinSys to transfer QR. 500 from the applicant’s Fin_Account to the library. Once the money is transferred, the system creates a library membership account, and deposits the money in this account. After transferring the money to the library system, FinSys records in the applicant’s Fin_Account that QR. 500 has been transferred to library. Finally, it produces a membership card, and assigns a unique membership number. The system finally sends the membership card to the member. If FinSys does not transfer money, the system generates an error message to enter valid Fin_Account. Every team member MUST read this document carefully Page 2 In order to borrow an item from the library, a member first enters the membership card into a card reader of the library. The system retrieves the membership details and contacts the university system UniSys to find if the member is an active staff or student. If not, the system does not allow the member to borrow any item from the library and terminates the function. Otherwise, the system asks the member to place the item in the scanner. Once the member does this, the system gets the item details and its type. It also checks if the item is available for loan. The system also finds out the total items already borrowed but not returned. If the item is available for loan, and the total item borrowed but not returned is less than 5, it makes a loan for the member. The item is included in the membership account with the borrowing date and due date for return. The system then increments the total borrowed items by 1, and it makes the item unavailable for other members. The system also decrements the total items reserved of the member if the item was reserved by the member. The member has also choice to request for extended loan time for one more week. If the item was not reserved, one more week is added with the original return date. Finally, it creates a receipt of the loan, and releases the security code of the item. The receipt includes information such as membership number, item call number, loan date, and return date. A member can return a borrowed item to the library by scanning the item into the system that finds the loan details. It then checks the due date. If the due date already passed, it calculates the fine based on number late days. The system updates the member account with the fine. It then makes the item available and sets the security code of the item. The system decrements the total item borrowed by 1. It then creates a receipt of the return. The members can also extend the return date of an item if not reserved by other members. The member first inserts the membership card into the card reader. The system retrieves the list of all currently borrowed items. The member then selects the item that he/she wants to be extended. The system finds the current return date. If the return date has already passed, no extension is possible. An extension is only possible if the request is made before the return date. It also checks if the item has already been reserved. If reserved by other, the return date cannot be extended, otherwise one week extension is made. The system updates the member account with the new return date. It prepares a receipt with the new return date. A member can reserve an item if it is currently on loan with other member. The member first enters the card into the card reader. The system finds the membership details. It checks the total number of current reserved items. It the member has already reserved 3 items, no more reservation request is possible. The system asks for the call number of the item he/she wants to reserve. The system retrieves the item details once the member enters the call number of the item. If already reserved by other, it cannot be reserved by anyone. If not, the item is reserved under the member account, and increments the total reserved item by 1. The system confirms the reservation to the member. Every day at 10 am, the library system automatically checks if any item was not returned after 10 days of the due date. The system generates a list of such items and alerts the admin staff with the list. The staff then enters the call number of each item into the system which finds the loan details. It changes the status of the item as ‘lost’. The system deducts QR. 500 from the deposit money as a fine from the member account. It then requests FinSys with the Fin_Account of the applicant to transfer QR. 500 to the library. FinSys forwards the transfer information to the library that receives the advice and updates the member account with the deposit money. The member is informed about the lost item. The system should know which item was borrowed by which member, borrowing date, the return date, if the item was returned and when. It can also find out which item was lost and by which member, how many items were borrowed by one member, which item was borrowed by which members so far, etc. " Page 3 Ms. Asma wants that the managing of the above activities of the library should be automated as much as possible. There will be also possibility that the administrative staff can generate summary report of loans, returns, fines, etc. At this stage, she wants you to analysis ONLY the functionalities of the library system. She also warns you that you should not analyze any functionality of other systems in this phase. You need to define the system boundary carefully.

—————————————————————————-

I need a class diagram:

Using object-oriented design fundamentals, complete design class diagram with all required classes, their attributes and types, relationships (aggregation, generalization, association) with multiplicity where applicable, methods with major parameters, and visibility of attributes and methods.

In: Computer Science

You are an IT company and want to get a travel agency's network design, hardware, software,...

You are an IT company and want to get a travel agency's network design, hardware, software, and security.

Routing Protocols. Are routed protocol and routing protocol the same?  Give examples of both. What routing protocol(s) are you planning to use in the travel agency network? Justify your selection. As the travel agency network uses private ip addresses, what routing feature does need to be configured to access the WAN with public ip address? What device does have the feature?

In: Computer Science

Write C++ mathematics program that a Given an arc with its center at zero, and the...

Write C++ mathematics program that a Given an arc with its center at zero, and the arc should be user defined in 3D-space by means of a 3x3 transformation matrix, and a radius, start-angle and sweep-angle should be user defined. it gives output/tells the most extreme XY points that arc goes to

The radius,start angle and sweep angle should be user defined.

make the code quickly and send me

sir the matrix should always be 3x3 center is at zero initially
and raduis,start angle and sweep angle should be user defined
The program should calculate extreme points values of arc
initially assume any assumptions if u don't find sufficient info kindly solve and send me

In: Computer Science

WRITE IN JAVA 1) Create a constructor that can create objects in the following way: c...

WRITE IN JAVA

1) Create a constructor that can create objects in the following way: c = Circle(X, Y, R);

2) Please add a constructor that only accepts R value and initializes the Circle at the origin.

3) Please implement a constructor that behaves the same way as the default constructor.

4) Add a method named “touches” to the Circle class which receives another Circle instance and checks whether these two circles touch each other externally and only at one point. The method should return a Boolean value and will be called like this: c1.touches(c2) //returns either true or false.

5) Please implement a Test class with main method that simulates each of the following
cases and prints their outcome to the screen.

In: Computer Science

Management is pleased with the progress that has been made and likes the steps you have...

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, the following was asked: "Has everything been done that is possible to ensure the security of the environment?" Your response was that you believed it has, but one way to be sure is to conduct a vulnerability assessment and a penetration test.

  • Create a PowerPoint presentation of 6–8 slides that includes speaker notes and a references slide. It must cover the following:
    • Describe at least 2 common security threats against wired and wireless devices and typical countermeasures used by corporate security teams.
    • Describe at least 2 identity and access management tools needed to measure and monitor security risks across the enterprise.
    • Explain penetration testing and vulnerability assessments and how they differ.
    • Identify the benefits of using penetration testing and vulnerability assessments relative to threats.
    • Discuss the tools available in the industry (at least 5 different tools should be discussed), and explain how they can be used to mitigate security vulnerabilities.

The presentation must include a title slide, topics of discussion slides, main content slides, and reference slides. The references must use APA structure for organization of reference information. Font and font size are not required to meet APA format.

In: Computer Science

C PROGRAMMING LANGUAGE Problem title : Bibi's Array Bibi also has an array containing N elements....

C PROGRAMMING LANGUAGE

Problem title : Bibi's Array

Bibi also has an array containing N elements. Like Lili, Bibi wants to know the highest frequency (most occurrences) and all elements which have that frequency.

Format Input

The first line contains an integer T stating the number of test cases. For each test case, the first line contains a single integer N which indicate the number of element in the array. The next line contains N integers Xi (1≤ i ≤ N ) which indicate i^th element in the array.

Format Output

Consist of T lines where each line has the format "Case #X:Y" , where X is the test case number starting at 1 and Y is the highest frequency. Next line contains all elements which have that frequency sorted in ascending order.

Constraints

¶ 1≤ T ≤ 20

¶ 2 ≤ N ≤ 20.000

¶ 1 ≤ Xi ≤ 2 x 10^5

Sample Input (standard input)

3

8

1 1 2 2 3 4 5 5

8

5 5 4 3 2 2 1 1

4

1 1 1 3

Sample Output (standard output)

Case #1: 2

1 2 5

Case #2: 2

1 2 5

Case #3: 3

1

In: Computer Science

JAVA programming language Modify the following code. Make changes so that Movies can be sorted by...

JAVA programming language

Modify the following code. Make changes so that Movies can be sorted by title

-----------------------------------------------------------------

package Model;
import java.time.Duration;
import java.time.LocalDate;
import java.util.ArrayList;
import java.util.List;
// TODO - Modify the movie class so that Java knows how to compare two Movies for sorting by title
public class Movie extends DataStoreObj
{
private String title;
private String description;
private LocalDate releaseDate;
private Duration runningTime;
private Rating rating;
private List<Genre> genres = new ArrayList<>();
private List<Actor> actors = new ArrayList<>();
// TODO: Add list of reviews
private List<Review> reviews = new ArrayList<>();
public Movie(String title, String description, Rating rating, String releaseDate, int runningTimeMinutes) {
this(null, title, description, rating, releaseDate, runningTimeMinutes);
}
public Movie(Long id, String title, String description, Rating rating, String releaseDate, int runningTimeMinutes) {
super(id);
this.title = title;
this.description = description;
this.rating = rating;
this.releaseDate = LocalDate.parse(releaseDate);
// https://stackoverflow.com/a/41800301/673393
this.runningTime = Duration.ofMinutes(runningTimeMinutes);
}
public Duration getRunningTime() {
return runningTime;
}
public String getTitle() {
return title;
}
public void addGenre(Genre genre) {
genres.add(genre);
}
public void addActor(long actorId) {
Actor foundActor = Datastore.getActorById(actorId);
actors.add(foundActor);
}
public List<Actor> getActors() {
return actors;
}
public void addReview(Review review) {
// TODO: Write code to add the review to the list
reviews.add(review);
}
public String toString() {
int runningTimeMinutes = (int) this.getRunningTime().getSeconds() / 60;
return String.format("%s (%s, %s) %s {%s min}", this.title, this.rating, this.releaseDate.getYear(), genres, runningTimeMinutes);
}
// TODO - You'll need a new method here to tell Java how to compare two movies by title
public List<Review> getReviews() {
return reviews;
}

}

In: Computer Science

Create a C++ or Java program codes for Login Attendance applying the queue principle that will...

Create a C++ or Java program codes for Login Attendance applying the queue principle that will select students from the last attendance login to answer a question.

NOTE: Program execution should include deletion and insertion of attendance information/element

In: Computer Science

write a program that takes the input value from the user and calculate the sum from...

  • write a program that takes the input value from the user and calculate the sum from that number to zero in MIPS

In: Computer Science

Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following topics: 1. Quantum...

Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following topics: 1. Quantum Cryptography 2. Quantum Computing and its impact on Cryptography 3. Zero-knowledge protocols (or proofs) in Signature Schemes 4. Secret Sharing (or splitting) in Cryptography It is VERY important that references are included (Note: Wikipedia is NOT acceptable)

This assessment requires the student to choose a topic from a supplied list and write a report as if it were to be presented as a professional development lecture for their peers. The choice of topics may include but not be limited to, material covered throughout the subject. Potential topics not covered in lectures may include quantum cryptography and quantum computing. Students are expected to discuss their choice with their lecturer during the workshops. This assignment is designed to improve the student’s organisational skills and encourage independent research into other topics not directly covered in lectures. Please present your lecture in report format which includes the following sections: • Title page • Introduction • Body paragraph • Body paragraph • Body paragraph • Conclusion • References • Appendices (if necessary) The report should: • include diagrams explaining concepts • Include all references cited and must be referenced in Harvard AGPS

In: Computer Science

In python I have my code written and I want just 4 functions to be fix...

In python I have my code written and I want just 4 functions to be fix in my code according to rule. My code is running but it has some problem regarding to rules. (I have did all the other things so you do not have to worry about other functions)

1) all the players has to play until he/she reaches to at least 500 points in first round.

When user reach 500 points for the first time, user may choose to immediately end his turn to prevent losing the points.

If you user did choose to save his turn and if he get farkle the score will be 0. (This is just for the first round.)

2) fix my scoring according to point table.

point table for game:

5 = 50 points

1 = 100 points

Triplet of 1 = 300 points "Example(1,1,1)"

Triplet of 2 = 200 points

Triplet of 3 = 300 points

Triplet of 4 = 400 points

Triplet of 5 = 500 points

Triplet of 6 = 600 points

Four of a Kind [Example(4,4,4,4)] = 1,000 points

Five of a Kind[Example(4,4,4,4,4)] = 2,000 points

Six of a Kind [Example(4,4,4,4,4,4)] = 3,000 points

(1,2,3,4,5,6 ) = 1,500 points

Three Pairs [Example(4,4,2,2,1,1)]= 1,500 points

Four of a Kind + a Pair [Example(4,4,4,4,1,1)]= 1,500 points

Two sets of Three of a Kind [Example(4,4,4,6,6,6)] = 2,500 points

NOTE(single 2,3,4,6 does not have any point.)

3) there are six die in game and I have already implement it but it not working as rules.

computer have to Take out any dice worth points after each roll.

user has to Roll the remaining dice,

removing any dice worth points and adding them to your running total.

If user are ever able to set aside all six dice, user can roll again all of his dice and keep building his running total.

If ever user are unable to set aside any dice ( dice contain 0 points), user have Farkled. user lose his running point total and his turn is over.

4) Winning (I have also did little bit but i want to make it simple so can you see it and fix)

If any player score 10,000 points in game

The end game sequence will start

Each other player has one turn to try to beat score of player who scored 10,000 points.

After all remaining players have had their turn, the player with the highest score wins.

you should enter the number of players as a parameter ( 2 to 6 players) .

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

import random

import math

class Dice:

def __init__(self, sides=6):

  self.sides = sides

def roll(self, n=1):

  return [int(math.floor(random.random() * 6) + 1) for _ in range(n)]

class Farkle:

def __init__(self):

  print ("Lets play Farkle")

  self.gamers = [] #INIT

  self.num_gamers = int(input("No. of gamers? ")) #INIT

  if(self.num_gamers < 2 or self.num_gamers > 6):

   print("No of gamers need to be more than 2 and less than 6")

  else:

   for i in range(self.num_gamers):

#get name of gamer

    gamer = input("Name of gamer {0}: ".format(i+1))

    self.gamers.append(gamer) #list of gamers

#INIT

   self.scores = {'_highest':[0, '']}

   for gamer in self.gamers:

    self.scores[gamer] = 0

   self.Counter_round = 0 #INIT

   self.dice = Dice()

def Begin(self):

  if(self.num_gamers >= 2 and self.num_gamers <= 6):

    print ("The game has %s gamers. Their names are:" % self.num_gamers)

    self.gamer_scores()

    input("Enter if you are ready to begin!")

    while self.scores['_highest'][0] < 10000:

     self.Round()

  self.End()

def End(self):

  if(self.num_gamers >= 2 and self.num_gamers <= 6):

   print ("Hey Congratulations, {0}! You are the winner with a score of {1}.".format(self.scores['_highest'][1], self.scores['_highest'][0]))

   print ("The total scores were:")

   self.gamer_scores()

def Round(self):

  self.Counter_round += 1

  print ("******************")

  print (" Round {0}".format(self.Counter_round))

  print ("******************")

  if self.Counter_round > 1:

   print ("{0} is currently is leading with {1} points.".format(self.scores['_highest'][1], self.scores['_highest'][0]));

   print ("The total scores are:")

   self.gamer_scores();

  for gamer in self.gamers:

   self.AnotherRound(gamer)

  print(input("ENTER when you are ready to proceed to the next round"))

  return

def AnotherRound(self, gamer):

  input("{0}, it's your AnotherRound. Enter when you are ready to roll.".format(gamer))

  

  #create empty dictionery for count every number

  s_num = {}

  roll = self.dice.roll(6)

   

  #single 5's has 50 points

  z_s = 0

  #count any kind of number frequency and stored in dictionary

  for i in roll:

    s_num[i] = roll.count(i)

     

  #condition for three pairs or 1 pair and 4 any kind of

  flag_pairs = True

  l = 0

  k = 0

  m = 0

  for key,value in s_num.items():

    if(key in [1,2,3,4,5] and value == 2):

      l+=1

    #4 any kind of

    elif(key in [1,2,3,4,5] and value == 4):

      k +=1

    elif(key in [1,2,3,4,5] and value == 3):

      m +=1

  #for three pairs

  if(l==3):

    flag_pairs = False

    z_s += 1500

  #for 1 pair and 4 any kind of

  elif(l==1 and k==1):

    flag_pairs = False

    z_s += 1500

  #two sets any three kind of

  elif(m==2):

    flag_pairs = False

    z_s += 2500

  #simple for [1,2,3,4,5,6]

  elif(roll == [1,2,3,4,5,6]):

    flag_pairs = False

    z_s += 1500

  if(flag_pairs):

    for key,value in s_num.items():

      #5's

      if(key == 5 and value in [1,2]):

        z_s += 50*value

      #1's

      elif(key == 1 and value in [1,2]):

        z_s += 300*value

      #three 2's

      elif(key == 2 and value == 3):

        z_s += 200

      #three 3's  

      elif(key == 3 and value == 3):

        z_s += 300    

      #three 4's

      elif(key == 4 and value == 3):

        z_s += 400

      #three 5's

      elif(key == 5 and value == 3):

        z_s += 500

      #three 6's

      elif(key == 6 and value == 3):

        z_s += 600

      # 4 any kind of

      elif(key in [1,2,3,4,5,6] and value == 4):

        z_s += 1000

      # 5 any kind of

      elif(key in [1,2,3,4,5,6] and value == 5):

        z_s += 1500

      # 6 any kind of

      elif(key in [1,2,3,4,5,6] and value == 6):

        z_s += 3000

      else:

        z_s += key*value

    score = z_s

    print (" You scored {0}".format(roll))

    self.scores[gamer] += score

  print (" Your score is now: {0}".format(self.scores[gamer]));

  if self.scores[gamer] > self.scores['_highest'][0]:

   self.scores['_highest'][0] = self.scores[gamer]

   self.scores['_highest'][1] = gamer

  return

def gamer_scores(self):

  for gamer in self.gamers:

   print (gamer + "; Score: " + str(self.scores[gamer]))

if __name__ == '__main__':

play = True

while play:

  print(

'''Farkle is a dice game that is multiplayer (2 to 6 gamers)!

Whoever reaches 10000 points first wins

Rules:

5s : 50 points

1s : 100 points

2,2,2 : 200 points

3,3,3 : 300 points

4,4,4 : 400 points

5,5,5 : 500 points

6,6,6 : 600 points

Four of a kind : 1000 points

Five of a kind : 2000 points

Six of a kind : 3000 points

A straight 1 to 6 : 1500 points

Four of a kind + Pair: 1500 points

Two sets of Three of a Kind = 2500''')

  f = Farkle()

  f.Begin()

  replay = input("Would you like to play again? ")

  while True:

   if replay.upper() in ['Y', 'YE', 'YES']:

    break

   elif replay.upper() in ['N', 'NO']:

    play = False

    break

   else:

    print("Please enter yes or no")

    break

In: Computer Science