java splay tree program

 In addition to requiring you to get splay trees to work, I also want you to learn some basic things about
Java Strings, so you will build trees of Strings instead of int’s. For example, you will need to use compareTo
(or compareToIgnoreCase – we will need to discuss which) to compare two Strings.
Add whatever is necessary so that the three classes below behave correctly.  Leave all variables, method
names, and code fragments exactly as they appear. Only add code to make the methods work. Do not add a
setString method in the StringNode class.
Insert is easier than search so I recommend you work on that first. You will find reference to “top-
down” algorithms when you scan the Web. Do not do that. Use the algorithm as described in class and in
the Week 5 posting. In terms of implementing backtracking it is really nothing more than what you do after
making a recursive call. With insert, for example, you will make the usual recursive calls to insert and then
after the call you will have to deal with the splay. There are two cases. (1) If the element you inserted is a
child of the current node then it is not time to splay since we always splay two levels. (2) If the element is
not a child you need to determine (a) if it’s to the left or right of the current node and (b) whether to do a zig-
zig or a zig-zag. Make appropriate calls to the rotate methods to get the job done.
You might also have to do a final zig at the root if the splaying came out odd. This is best done in the
driver program.
Search is more complicated because if the element is not found you still must splay something to the
root. You will splay the last node visited before landing on null. For example, looking at the last tree drawn
in week5-lecture.pdf, if searching for 65, 60 will be splayed to the root. If searching for 5, 10 will be splayed.
But there is an additional complication. While backtracking, how do you tell your method what is
being splayed? You passed in a value to search and if it wasn’t found you must splay a different value. This
means you need to be able to change the parameter value so that when backtracking the parameter has
changed from the value being searched for to the value being splayed. That is why WrapString is used in the
recursive search (and only there). You will then be able to use a statement like this in your recursive search
to change the value of the String being searched to the String being splayed:
str.string = t.getString();
As always, I’d love to see some questions and conversations on Discussion.
Submission and other details. Many of you did not follow rules 2 – 4 from the last assignment despite my
pleas and threats to take off points. I will be less lenient this time. Of course this time the name of your file
should be prog2.java. This should not be the name of your class. Also do not use the word package
anywhere. I spent a lot of time editing “package” out of your programs, fixing class names, and numerous
other changes. Please don’t make me do that this time. Also, as some of you are aware, if you submit
multiple times Canvas tacks a suffix onto your file name. I can live with that. Just make sure the base part of
the file name is prog2.java. Finally, though it should go without saying, the program you turn in must be
your own work. Do not copy code from someone else. Do not share your own code. 

cyber security in health care

 

7.1 Theoretical Framework

Overview: Rather than writing a full-length literature review for your topic, you will practice developing your theoretical framework for your mock dissertation topic in this assignment and then develop your literature review funnel for assignment 7.2.                             

  • The purpose of the theoretical framework is to tie the dissertation together. As the researcher, you should approach the proposed research from a theory or set of theories that provide the backdrop for the work (researchers do not create theory; they use established theory in which to embed their work).
  • This section should describe how this study will relate to existing theories and discuss how the methodology being used in the study links to those theories
  • The theoretical framework justifies the methods you plan to use for conducting the study and presents how this research will contribute to the body of knowledge and/or practice. Further, it describes the context within which to locate the intended project and suggests why doing such a study is worthwhile.

Directions:

  1. Review the rubric to make sure you understand the expectations of this assignment.
    1. DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx – Alternative Formats
  2. Develop a 1 page (more is fine) theoretical framework for your mock dissertation topic.  Consider (but do NOT directly answer) the following questions when you write your theoretical framework:
    1. Is the theoretical foundation strong?
    2. Are the theoretical sources apparent?
    3. Are they appropriate for the topic?
    4. Do they need further explanation?
  3. Submit your theoretical framework to the submission box.

Nw wk 2

How do you believe an organization should measure information system success and satisfaction in the enterprise?

Software System Design jan 19

Assignment Content

  1. We spent a large amount of time in class talking about “good” systems and “not so good” systems…and we saw some of the characteristics of each…and I am sure (at least I hope) that while we discussing it, you were thinking of systems that you think are good, and those that you think are not so good…

    So for this assignment, I want you to tell me one system that you think is good, and one system that you think is not so good…if it is a website, include the link…tell me SPECIFICALLY why you think the system is good or not so good…and tell me how you would improve on what they have…

    And I know your next question…how long does this assignment have to be?…well, I am not really into counting words…but just to give you some perspective, I would say that by the time you are done, you should have a least one full page and maybe two full pages…if you wrote half a page, you probably wrote too little…if you wrote 5 full pages, you wrote too much…as I always tell my classes – just write!…and before you know it, you will have 1 to 2 pages…

In order to have a successful IG program

 In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.   From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked. 

1 Page, APA format

Communicating Technology Concepts to Business Professionals

 Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; the attendees use IT to perform their jobs on a daily basis.

For this 10 minute presentation, you should focus upon meeting the information needs of the attendees from the internal (business) organizations which are supported by the IT department. You should also anticipate questions which your audience might ask during the 10 minute Question & Answer period which follows your presentation. (When you write your peer critiques for this week — ask and then answer at least one question that you believe the audience is likely to ask.)

Choose one of the following articles to present to the attendees.

1. Selecting the Right Cloud Operating Model: Privacy and Data Security in the Cloud

2. Understanding Managed Services (focus on the benefits of Managed IT Services)

3. Shadow IT: Mitigating Security Risks

After reading the article, prepare a set of slides (talking points) with speaker notes in which you highlight key information about the article and why Padgett-Beale employees should “care” about the topic. Make the presentation relevant for Padgett-Beale by integrating information about its business operations (use the company profile, the weekly descriptions, and other readings in this course). At least one of your slides should address cybersecurity issues and concerns that arise in the context of your chosen article (use the CSCU textbook’s material and other course readings to help you identify these issues and concerns). 

You should have a title slide, a slide containing the article title & publication information, content slides, and a summary slide — 8 to 12 slides total. At the end of the presentation, include a Q&A slide followed by “backup” slide which has additional resources that the audience can consult for more information.

Each slide must have speaker notes (at least one paragraph). Watch out for jargon! Write in business appropriate language and/or plain English but do not speak down to your audience.