Can you please convert this RAR into PDF and Word?
Mobile -3a
An EARCON is the sound your phone makes (PCs and do this too) when a particular event happens. There’s the “Swooshing” sound when you get an email for instance.
Question 1 Have you set-up any unique EARCONS on your phone?
Question 2 Do you think mobile phone should have a different sound to the caller if your phone is busy?
Question 3 Would you like to set-up your phone so that if persons A, B, or C (your favorite people) call you and you’re on your phone would you like them to hear something other than “beep … beep …. beep” (means your phone is busy)?
Question 4 Would you like your favorites to hear some other message on their phone when you’re busy – like maybe a warble tone or a siren sound or something else which means “You’re my favorite person, call me back right away”?
Question 5 What role do you think EARCONs play in applications?
Question 6 Would you like the EARCON to tell you more information than things like “Yes you got your ordering basket loaded correctly” such as maybe “What a great section of — product ” etc.
Question 7 What innovations would you like to see in EARCONS?
–//–
Web Design
Write two to three paragraphs. Each should be 2 – 3 sentences
- Explain two reasons why CSS is the preferred method for creating a web page layout
- Explain the box model
————————————————————————————-
Please answer all of the following questions. Each answer should be one or two sentences
- What is the correct code for adding a header element to a page?
- Which property determines where an element is placed relative to the containing element?
- Which type of CSS style is best used to format only a single element on a single page in a site?
SAVE AS MS Word file called Project-04-Questions-FDL
————————————————————————————-
Discuss the following in 6 sentences:
- What are ways to improve search engine optimization.
CS4310: Computer Networks
CS4310: Computer Networks
Project #2
1. Overview
In this project, we are going to build a component of a Command and Control (C2C) server that is used to allow agents in a multi-agent system to become aware of each other. In particular, the C2C server should be able to maintain a list of active agents and respond to various actions as issued by the agents. For example, the agents could be a group of UAVs and the C2C server could be a satellite. The agents would need to communicate through the satellite if they are out-of-range of each other. The C2C
server will run on a particular port (supplied by a command line argument) and should be able to respond to TCP connections from agents. Agents send various actions to the
server to update the information maintained. The agent code is supplied in this assignment and is written in C. An agent can issue one of those actions:
1- #JOIN
When the C2C server receives a join request, it will add this agent to its current list of active agents and responds with “$OK”. An agent can only join once before it leaves. If an agent tries to join while it is already an active agent, the C2C
server should respond with an error message “$ALREADY MEMBER”
2- #LEAVE
When the C2C server receives a leave request, it deletes the corresponding agent from its list of active agents and responds with “$OK”. An agent cannot leave if it has not already joined and the server responds with an error message “$NOT MEMEBER”
3- #LIST
When the C2C server receives a list request, it responds with the list of all active agents (agents that have joined, but not already left). The C2C server can only respond to list actions from active agents (otherwise ignored and no response is
given). The list contains the IP address and duration in seconds (how many seconds since an agent joined) for each agent. Each entry should be in the form of
4- #LOG
When the C2C server receives a log request, it responds with the log file (log.txt) to the agent. Similar to list, only active agents can issue log requests. You can assume that the log requests itself should be logged into the log file before its gets sent to the agent. Note that the log file could be quite large, so make sure not to try to load it into a buffer all at once.
The agent takes three arguments in its command line: the C2C server IP, server port and the action string. It sends the action string and writes the response, if any, to the screen. The agent code is listed under resources on TRACS.
The agent would connect to the server on its listening port and waits for a response to its actions before it exits. All actions start with a ‘#’ and all responses start with ‘$’
followed by the data/message.
The C2C server should be able to listen for actions on the port it is running on and once a request is received, the server responds with the information/confirmation based on its current state (e.g., active list of agents, when they joined and the agent requesting the information) and records its interactions in the log file. Notice that the C2C server will
never exit; it continues listening and servicing requests.
2. Log File
The C2C needs to maintain a log file the records any information about any given connection along with a time stamp (up to millisecond granularity) and the response
sent (if any). You can assume the file is called log.txt. For example:
“TIME”: Received a “#JOIN” action from agent “147.26.143.22”
“TIME”: Responded to agent “147.26.143.22” with “$OK”
“TIME”: Received a “#LIST” action from agent “147.26.12.11”
“TIME”: No response is supplied to agent “147.26.12.11” (agent not active)
3. Where to start
First, you need to get familiar with Internet programming API. This will be based on the material discussed in class.
Given the agent application provided, start working on the server part. To test your C2C server, you need to generate multiple actions from different agents by running them
from different machines. You can run a number of agents from different terminals, but all of them will have the same IP address and thus would be treated as the same agent.
You need to handle different cases such as a “#LEAVE” without joining, a “#LIST” from an inactive agent, among many others.
4. Submission
• You need to turn in a short design document stating the overall design decisions you made and the data structures used.
• Please provide a single command line to test your code and make sure to provide a working example of the command line.
• Please provide the output log file for 3 agents (using different terminals from different servers) that perform the following actions in that order:
1- Agent 1 joins
2- Agent 2 joins
3- Agent 3 joins
4- Agent 1 issues list
5- Agent 1 leaves
6- Agent 1 issues list
7- Agent 2 leaves
8- Agent 2 leaves
9- Agent 3 issues list
10- Agent 3 issues log
• Please submit only one zip file that contains all of the above by email to [email protected] with the subject: “CS4310: Project #2”
5. Notes
In a real-world setting, we will need to add a layer of authentication in which the C2C server can verify that it is really communicating with an agent (as opposed to an
attacker) and vice versa. Also, communication should be encrypted between them.
Finally, the server should be a multithreaded one, so it can respond to various agents in parallel (for example using pthreads).
IntegerSet
* IntegerSet.java
*//**
*
* @author StudentName
*/
public class IntegerSet {
/**
* Creates a new instance of IntegerSet
*/
// TODO: implement the constructor
/**
* Return a new IntegerSet containing the union of the two IntegerSet objects
* passed as arguments
*/
// TODO: implement the union method
/**
* Return a new IntegerSet containing the intersection of the two IntegerSet objects
* passed as arguments
*/
// TODO: implement the intersection method
/**
* Inserts an element into the IntegerSet by setting the corresponding
* value within the set array to true. Returns false if the value was out
* of range and true otherwise.
*/
// TODO: implement the insertElement method
/**
* Deletes an element from the IntegerSet by setting the corresponding
* value within the set array to false. Returns false if the value was out
* of range and true otherwise.
*/
// TODO: implement the deleteElement method
/**
* @Override the toString method in the Object class
* Displays the integers contained by the IntegerSet separated by spaces.
* An empty set should be displayed as:
* { — }
* An integer set containing 5 and 10 should be displayed as:
* { 5 10 }
*/
// TODO: implement the toString method
/**
* Returns true iff the current IntegerSet contains the same integers as
* the IntegerSet supplied as an argument
*/
// TODO: implement the isEqualTo method
Assignment 4
Chapter 7: Questions for Discussion #1 through #4
- Explain the relationship among data mining, text mining, and sentiment analysis.
- In your own words, define text mining, and discuss its most popular applications.
- What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.
- What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.
Chapter 7: Exercise 6 and Internet Exercise 7
- Go to teradatauniversitynetwork.com and find the case study named “eBay Analytics.” Read the case carefully and extend your understanding of it by searching the Internet for additional information, and answer the case questions.
- Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.
Important Note: In cases if any websites or links do not work, select another respective exercise of choice to replace. ????When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 4.Important Note: When I see similarity indexes over 20%, I will review the similarity report to determine if points are going to be docked for plagiarism issues and as a tip, do not include or write the actual questions or exercise directions within these papers. In other words, all work must be original and not copied from any source and very high similarity indexes will be reported to the University.
6.4 Final Paper
- Your paper should use the Capstone Project Template. As the project paper was started in earlier workshops, you should have already been using the template.
- You should have submitted a draft of your paper in Workshop Five for instructor feedback. Make any edits based on the feedback you received.
- The paper should be about 20 pages in length (double-spaced), and transitions between sections should be addressed. Any graphics or tables do not count toward page count.
- Make sure to use 7th edition APA where required. The paper should include credible references that are cited according to the 7th edition of APA. You may and should use research to develop your plans, but make sure to cite your sources. All written work should be your own.
- For questions on APA style, go to the OCLS APA Style Page.
- Please refer to the Capstone Project Guide for specifics on what the paper needs to contain.
Reflection 3 Computer ethics
I need guidance related to Philosophy of computer ethics.
reflection paper
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
demonstrate a connection to your desired work environment.
Write a program that prompts
Write a program that prompts the user to input a string and outputs
the string in uppercase letters. (Use a character array to store the string) Use only dynamic arrays