Set up your project with the given starting code. The files should compile and run, but either no tests will be run, or tests will run but be failing. 2. For this project, start by uncommenting the first TEST_CASE in the assg10-tests.cpp file. These are the unit tests to test the functionality of your PriorityQueue enqueue() function, the class and overridden member function you are to implement. 3. Add the PriorityQueue class to the Queue.hpp header file. The class should inherit from LQueue and override the enqueue() method as described in more detail below. 4. Add a stub for your enqueue() member function to the assg07-stackfun.cpp implementation file. You could start by doing nothing, or by copying the code of the enqueue() function from the LQueue class. 5. Your code should compile and run now. Make sure after adding the class and your stub method your code compiles and runs. However, your unit tests will be failing initially. 6. Incrementally implement the functionality of your enqueue() member function. You should try to add no more than 2 or 3 lines of code, and then make sure your program still compiles and runs. Start by adding code to get the first failing test to pass. Then once that test passes, move on to the next failing tests until you have all tests passing. If you write something that causes a previously passing test to fail, you should stop and figure out why, and either fix it so that the original test still passes, or remove what you did and try a new approach. 7. Once you have the enqueue() member function implemented and all unit tests passing, you should then move on to the other functions in the order suggested. Some functions use previous ones in this assignment, so do them in the order given for you in the tasks below.
Dijkstra’s shortest-path (LS) routing algorithm
Use Dijkstra’s shortest-path (LS) routing algorithm to compute the shortest-path from u to all network nodes.
I will ping you image with nodes
Organ leader and decision making
Case study: International Foods Case Study
Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed, and in APA format. See the sample attachment for the expected format and length.
DQ
How do you feel blockchain will change the global economy or will it? Explain your answer.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
Cyber security Managment
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:
- Prohibit guessable passwords
- such as common names, real words, numbers only
- require special characters and a mix of caps, lower case and numbers in passwords
- Reauthenticate before changing passwords
- user must enter old pw before creating new one
- Make authenticators unforgeable
- do not allow email or user ID as password
Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necesarry.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.
Attach your WORD doc and then hit SUBMT.
Python homework
Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications. Be sure to use comments to identify each of your modifications.
discussion-2
Do a bit of research on-line. Find a criminal case that involved Digital Forensics.
Using WORD, write an ORIGINAL brief essay of 300 words or more .describing the case and the how digital forensics were used in the investigation
Disuccsion
describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.
ApA format 250words
PLE 11
Please answer the below in 2-3 lines:
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
You have been asked by management (manufacturing, healthcare, retail, financial, etc. ) to create a demo using a data analytic or BI tool.
Project Based Midterm
You have been asked by management (manufacturing, healthcare, retail, financial, etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.
Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections:
Introduction
History of Tool [Discuss the benefits and limitations]
Review of the Data [What are you reviewing?]
Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References
Types of Data Analytic Tools
- https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
- Excel with Solver, but has limitations
- R Studio
- Tableau Public has a free trial
- Microsoft Power BI
- Search for others with trial options
Examples of Dataset:https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d