Questions
The Government of Mauritius, through the Smart City Scheme from the Economic Development Board (EDB), is...

The Government of Mauritius, through the Smart City Scheme from the Economic Development Board (EDB), is offering a plethora of opportunities to global investors to share in the vision of Mauritius in creating intelligent, innovative and sustainable cities of tomorrow.
One IT concept critical to the implementation of smart cities is what we refer to as the "Internet of Things", commonly known as IoT.
a) Explain, using a relevant diagram, what is IoT?
b) List and explain two benefits that IoT will bring to smart cities in Mauritius.
c) List and explain two limitations of IoT.
d) Will smart cities be a success in Mauritius and will it achieve its main goals? Discuss

In: Computer Science

Show all working. Use the following data to: a) draw a scatter plot b) find the...

Show all working.

Use the following data to:
a) draw a scatter plot
b) find the coefficient of correlation and test the significance at the 0.05 level
c) find the regression line
d) predict y' for x = 5

Number of alcoholic drinks - x            Score on a Dexterity Test - y
              2                                                    15
                1                                                    18
                3                                                   11
                4                                                     7
                2                                                    10
                1                                                    16
                5                                                    4
                6                                                     2

In: Math

Identify the fallacy of failed induction in the following argument: "It is overly pessimistic to think...

Identify the fallacy of failed induction in the following argument:

"It is overly pessimistic to think that a global nuclear war would destroy all human life on Earth. The well-known political commentator Glen Beck has presented substantial evidence for this view."

In: Psychology

In Java: Problem 1. Write a program that performs the following two tasks: 1. Reads an...

In Java:

Problem 1.

Write a program that performs the following two tasks:

1. Reads an arithmetic expression in an infix form, stores it in a queue (infix queue) and converts it to a postfix form (saved in a postfix queue).

2. Evaluates the postfix expression.

Use the algorithms described in class/ lecture notes. Use linked lists to implement the Queue and Stack ADTs. Using Java built-in classes will result in 0 points. You must use your own Stack and Queue classes (my code is a good starting point). Submit the code + example runs to validate your code. Submit UML chart to show the program design.

Problem 2.

Given the following postorder and inorder traversals of a binary tree, draw the tree:

Postorder: A B C D E F I K J G H

Inorder: C B A E D F H I G K J

Explain your answer in a systematic and recursive fashion.

In: Computer Science

Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been...

Ms. Asma Ahmed is the new director of the Al-Ekra University library. Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library loan system that we have at present is mostly manual. The library has three types of items for loan to its members: Book, DVD, and Magazine. Each item is identified with a unique call number of six-digit long. The item has also a title and year of publication/production. Not all items are for loan. Some items are only for use inside the library. For a book, 4 weeks; for a DVD, one week; and for a magazine 2 weeks loan is granted if the item is available for loan. A member can borrow maximum of 5 items. The library maintains three different file systems: Membership, Item, and Loan. The university has also a separate software system called Unisys that deals with students and staff. The system has three major components: Staff/Student data, Registration data, and Course data. However, our library system needs data from UniSys to check the validity of the membership of the library. The university has another software system that deals with finance and payments, called FinSys which is also independent but communicates with other systems in the university. It has three components: Financial account of the staff/student, Salary, and Expenditure. Every person at Al-Ekra University has a FinSys account called Fin_Account. The information on the salary of the staff and the tuition fee of the student are stored here. We now want a library system that can provide the following functions. The member of the library can only borrow items from the library. The person must be either staff or student of Al-Ekra University. The person first submits an online application form. The forms include the name and address of the person, and the Fin_Account of the person with Al-Ekra University. A library administrative staff is immediately informed by the system that an application has been submitted. The admin staff first checks the application, and provides input if needed. The system saves the updated information of the application, and then contacts UniSys to get the confirmation that the applicant is either staff or student. Once the library system gets the feedback from UniSys, it records the feedback. If the person is a member of the university, the application is preliminary accepted; otherwise the application is rejected without further processing. The library system then requests FinSys to transfer QR. 500 from the applicant’s Fin_Account to the library. Once the money is transferred, the system creates a library membership account, and deposits the money in this account. After transferring the money to the library system, FinSys records in the applicant’s Fin_Account that QR. 500 has been transferred to library. Finally, it produces a membership card, and assigns a unique membership number. The system finally sends the membership card to the member. If FinSys does not transfer money, the system generates an error message to enter valid Fin_Account. Every team member MUST read this document carefully Page 2 In order to borrow an item from the library, a member first enters the membership card into a card reader of the library. The system retrieves the membership details and contacts the university system UniSys to find if the member is an active staff or student. If not, the system does not allow the member to borrow any item from the library and terminates the function. Otherwise, the system asks the member to place the item in the scanner. Once the member does this, the system gets the item details and its type. It also checks if the item is available for loan. The system also finds out the total items already borrowed but not returned. If the item is available for loan, and the total item borrowed but not returned is less than 5, it makes a loan for the member. The item is included in the membership account with the borrowing date and due date for return. The system then increments the total borrowed items by 1, and it makes the item unavailable for other members. The system also decrements the total items reserved of the member if the item was reserved by the member. The member has also choice to request for extended loan time for one more week. If the item was not reserved, one more week is added with the original return date. Finally, it creates a receipt of the loan, and releases the security code of the item. The receipt includes information such as membership number, item call number, loan date, and return date. A member can return a borrowed item to the library by scanning the item into the system that finds the loan details. It then checks the due date. If the due date already passed, it calculates the fine based on number late days. The system updates the member account with the fine. It then makes the item available and sets the security code of the item. The system decrements the total item borrowed by 1. It then creates a receipt of the return. The members can also extend the return date of an item if not reserved by other members. The member first inserts the membership card into the card reader. The system retrieves the list of all currently borrowed items. The member then selects the item that he/she wants to be extended. The system finds the current return date. If the return date has already passed, no extension is possible. An extension is only possible if the request is made before the return date. It also checks if the item has already been reserved. If reserved by other, the return date cannot be extended, otherwise one week extension is made. The system updates the member account with the new return date. It prepares a receipt with the new return date. A member can reserve an item if it is currently on loan with other member. The member first enters the card into the card reader. The system finds the membership details. It checks the total number of current reserved items. It the member has already reserved 3 items, no more reservation request is possible. The system asks for the call number of the item he/she wants to reserve. The system retrieves the item details once the member enters the call number of the item. If already reserved by other, it cannot be reserved by anyone. If not, the item is reserved under the member account, and increments the total reserved item by 1. The system confirms the reservation to the member. Every day at 10 am, the library system automatically checks if any item was not returned after 10 days of the due date. The system generates a list of such items and alerts the admin staff with the list. The staff then enters the call number of each item into the system which finds the loan details. It changes the status of the item as ‘lost’. The system deducts QR. 500 from the deposit money as a fine from the member account. It then requests FinSys with the Fin_Account of the applicant to transfer QR. 500 to the library. FinSys forwards the transfer information to the library that receives the advice and updates the member account with the deposit money. The member is informed about the lost item. The system should know which item was borrowed by which member, borrowing date, the return date, if the item was returned and when. It can also find out which item was lost and by which member, how many items were borrowed by one member, which item was borrowed by which members so far, etc. " Page 3 Ms. Asma wants that the managing of the above activities of the library should be automated as much as possible. There will be also possibility that the administrative staff can generate summary report of loans, returns, fines, etc. At this stage, she wants you to analysis ONLY the functionalities of the library system. She also warns you that you should not analyze any functionality of other systems in this phase. You need to define the system boundary carefully.

—————————————————————————-

I need a class diagram:

Using object-oriented design fundamentals, complete design class diagram with all required classes, their attributes and types, relationships (aggregation, generalization, association) with multiplicity where applicable, methods with major parameters, and visibility of attributes and methods.

In: Computer Science

Compare and contrast the two types of inventory management and explain with examples why one is...

  1. Compare and contrast the two types of inventory management and explain with examples why one is more effective over the other for an Original Equipment Manufacturer?

In: Operations Management

A privately owned island off the coast of Florida has been left to you by the...

A privately owned island off the coast of Florida has been left to you by the eccentric owner who recently died. The island is large enough for several small communities to be developed. You want to start off on the right foot by establishing a local government, a judicial system, and a law enforcement system. The only stipulation is that you cannot be the dictator of the island.

In: Operations Management

Can someone assist me with this, please? Read the information below. Select & research a company...

Can someone assist me with this, please? Read the information below.

  • Select & research a company that employs a High-performance culture and I think  Net Flix can possibly be one.
  • Identify any of the 8 substantive culture-changing actions that the company has undertaken in the last five years. I  must have at least 300 words with a reference.

In: Operations Management

You are an IT company and want to get a travel agency's network design, hardware, software,...

You are an IT company and want to get a travel agency's network design, hardware, software, and security.

Routing Protocols. Are routed protocol and routing protocol the same?  Give examples of both. What routing protocol(s) are you planning to use in the travel agency network? Justify your selection. As the travel agency network uses private ip addresses, what routing feature does need to be configured to access the WAN with public ip address? What device does have the feature?

In: Computer Science

Use Porter’s 5 forces model for PETRO-CANADA to describe the forces that are acting on the...

Use Porter’s 5 forces model for PETRO-CANADA to describe the forces that are acting on the industry in which the company operates. Discuss each of the 5 forces in terms of threat (Is the threat from each force high or low? Why?  

In: Operations Management

A company is developing a new high performance wax for cross country ski racing. In order...

A company is developing a new high performance wax for cross country ski racing. In order to justify the price marketing​ wants, the wax needs to be very fast.​ Specifically, the mean time to finish their standard test course should be less than 55 seconds for a former Olympic champion. To test​ it, the champion will ski the course 8 times. The​ champion's times​ (selected at​ random) are

58.9​,

64.3​,

45.6​,

52.1​,

45.2​,

49.9​,

54.9​,

and

44.3

seconds to complete the test course. Should they market the​ wax? Assume the assumptions and conditions for appropriate hypothesis testing are met for the sample. Use 0.05 as the​ P-value cutoff level.

Calculate the​ P-value.

​P-value=

In: Math

What do you need in order to be happy? Is it better to be satisfied with...

What do you need in order to be happy? Is it better to be satisfied with what you have or to strive to improve it?

In: Psychology

Students will analyze the marketing activities of a company of their choice or their own company...

Students will analyze the marketing activities of a company of their choice or their own company (real of fictitious.) This analysis should cover the major topics as discussed in the course. The paper should focus on the strategic marketing decisions of a particular product or service. Students will take the position of a marketing manager for the product or service being studied and make appropriate recommendations in their concluding remarks. This paper should be 4-5 pages in length

In: Operations Management

Write C++ mathematics program that a Given an arc with its center at zero, and the...

Write C++ mathematics program that a Given an arc with its center at zero, and the arc should be user defined in 3D-space by means of a 3x3 transformation matrix, and a radius, start-angle and sweep-angle should be user defined. it gives output/tells the most extreme XY points that arc goes to

The radius,start angle and sweep angle should be user defined.

make the code quickly and send me

sir the matrix should always be 3x3 center is at zero initially
and raduis,start angle and sweep angle should be user defined
The program should calculate extreme points values of arc
initially assume any assumptions if u don't find sufficient info kindly solve and send me

In: Computer Science

How are the three characteristics of effective teams evident in each of Tuckman's five stages of...

How are the three characteristics of effective teams evident in each of Tuckman's five stages of team development? Provide examples to support your response.

In: Operations Management