Two C program

 In Problems 2, you will be reading input from a file; use the fscanf() function to do so. When reading input from a file, you do not need to verify its validity. You can assume that it has the expected type and the expected value(s). In Problem 1, you will be reading input from stdin; input verification requirements for Problem 2 are described therein. 

In each of the three problems in this lab, you will be required to declare and define certain functions. Doing so is essential: code that compiles and runs correctly, but does not implement all the required functions will not receive full credit. You are also welcome to implement additional functions. While this is not required, it can make your code easier to write. 

And you should not use any functions from the C standard library, except for those functions that are declared in the file , such as printf (or fprintf), scanf (or fscanf), fopen, fclose, etc. In Problem 1, you can also use the functions rand and srand declared in and the function time declared in    

Physical Security

 Topic: Discuss the LEED certification process and comment on a classmates post. 

 You must have at least 3 references and 1 must be from the textbook. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission. 

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Discussion

Initial Post

There are countless graphs and charts to choose from when converting raw data into a visual format. For many, it can be difficult to decide whether to rely on a straightforward pie chart or bar graph or to opt for a more spatially complex chart type.

Two common questions we often hear are: “How do you know which graph to use?” and “How do you know which chart to use?” The answer, as always, depends on the nuances of your readership, including their experience level and familiarity with big data analytics.

Based upon your understanding of data visualizations, what are 5 Data Visualization pitfalls? What would you do to fix these pitfalls? How can you avoid making future mistakes in your own visualizations?

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Data Acquisition

Research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document.

Data base

 

Throughout the semester, you  learned about different database types and even studied a variety of  database platform. Where do you think data systems will be in five years  from now? How about 10 years from now? Will autonomous system, machine  learning, artificial intelligence, or blockchain play an integral role  in the future of data systems?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

EH week9 P9

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Using the following link as your reference, select TWO and explain the differences

(viruses, worms, trojans, and bots).

What Is the Difference: Viruses, Worms, Trojans, and Bots?

( https://tools.cisco.com/security/center/resources/virus_differences)

 400 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism