Heaps and prority queus In python

You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide:

Develop a heap data structure using a linked structure (Nodes and Pointers)

The heap must support add and remove from the heap

All operations most abide by the rules that govern a heap (see lecture slides for reference)

Once you have your heap structure created, next you must use it as a backing structure to a priority queue.

Develop a priority queue data structure that is backed by a heap (linked structure NOT A LIST)

Implement the normal methods that accompany a priority queue structure

Enqueue, dequeue, and peek by priority not position

Also length and whether or not the structure is empty (is_empty)

Perform the following operations to showcase your working structure

Enqueue the following items: 4, 7, 5, 11, 8, 6, 9

Dequeue 3 items by priority, they should be 4, 5, & 6.

related heap.py file code is below

class Heap:

    def __init__(self):

        self.heap = [0]

        self.size = 0

    def float(self, k):

        while k // 2 > 0:

            if self.heap[k] < self.heap[k//2]:

                self.heap[k], self.heap[k//2] = self.heap[k//2], self.heap[k]

            k //= 2

    def insert(self, item):

        self.heap.append(item)

        self.size += 1

        self.float(self.size)

    def sink(self, k):

        while k * 2 <= self.size:

            mc = self.minchild(k)

            if self.heap[k] > self.heap[mc]:

                self.heap[k], self.heap[mc] = self.heap[mc], self.heap[k]

            k = mc

    def minchild(self, k):

        if k * 2 + 1 > self.size:

            return k * 2

        elif self.heap[k*2] < self.heap[k*2+1]:

            return k * 2

        else:

            return k * 2 + 1

    def pop(self):

        item = self.heap[1]

        self.heap[1] = self.heap[self.size]

        self.size -= 1

        self.heap.pop()

        self.sink(1)

        return item

h = Heap()

for i in (4, 8, 7, 2, 9, 10, 5, 1, 3, 6):

    h.insert(i)

print(h.heap)

for i in range(10):

    n = h.pop()

    print(n)

    print(h.heap)

Application Security

 

Discuss  the following, supplying citations to support any information that you  provide.  Do not include your opinion, only what you can support with a  citation.  Address the following topics.

  1. Describe operating system hardening 
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment? 
  2. Describe system restoration methods and procedures  
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls 
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence 
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence 
      1. Describe why evidence is collected, 
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format. 
  • Utilize at least five scholarly references.  
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.  
  • Utilize Google Scholar and/or the university library.  
  • Do  not copy and paste bulleted lists.  Instead, read the material and in  your words, describe the recommendation citing the source.  
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment.  
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Business analytics

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Risk Assessment

Briefly provide an overview/description of your fictitious company.

Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.

Discussion 2

Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs.  This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text. 

Textbook Name — Information Technology and Organizational Learning text.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Just need my worked checked

I need my SQL assignment looked over. I’m currently using MS management studio

  

1. List the employee whose employee number is 100.

Select * from Employee where employee_Num=100;

2.  List the Employee whose salary is between 50 K to 100k.

Select * from Employee where salary between 50000 and 100000;

Select * from Employee where salary >= 50000 and salary <= 100000;

3.  List the Employees whose name starts with ‘Ami’.

Select * from Employees where name like ‘Ami%’;

4. List the Employees whose name starts with A and surname starts with S.

Select * from Employees where name like ‘A%’ and surname like ‘S%’;

5.  List the Employees whos surname contains kar word.

Select * from Employees where  surname like ‘%kar%’;

6.  List the Employees whose name starts with P,B,R characters.

Select * from Employees where name like ‘[PBR]%’;

7. List the Employees whose name not starts with P,B,R characters.

Not Operator Symbol

Select * from Employees where name like ‘[!PBR]%’;

Not Operator

Select * from Employees where name not like ‘[PBR]%’;

8. Write a query to fetch first record from Employee table?

Select * from Employees where rownum=1;

9. Write a query to fetch the last record from Employees table?

Select * from Employees where rowid = select max(rowid) from Employee; 

10. Write a query to find the 2nd highest salary of Employees using Self Join

Select * from Employees a where 2 = select count (distinct salary) from Employee where a.salary <= b.salary;

11. Write a query to display odd rows from the Employees table 

Select * from(select rownum as rno,E.*from Employees E) where Mod(rno,2)=1;

12. Write a query to display even rows from the Employees table 

Select * from(Select rownum as rno,E.* from Employees) where Mod(rno,2)=0;

13. Write a query to show the max salary and min salary together form Employees table

Select max (salary) from Employees

Union

Select min (salary) from Employees;

14. Write a query to fetch all the record from Employee whose joining year is 2018 

Select * from Employees where substr(convert(varchar,joining_date, 103),7,4)= ’2018′

15. Write a SQL Query to find maximum salary of each department 

Select Dept_id,max(salary) from Employees group by Dept_id;

16. Write a query to find all Employees and their managers (Consider there is manager id also in Employee table). 

Select e.employee_name,m.employee name from Employees e,Employees m where e.Employee_id=m.Manager_id;

17. Write a query to display 3 to 7 records from Employee table 

Select * from (Select rownum as ‘No_of_Row’,E.* from Employee E)

18. Write a query to fetch common records from two different tables Employees and Employees1 which has not any joining conditions 

Select * from Employees 

Intersect 

Select * from Employees1;

19. Write a query to validate Email of Employee 

SELECT

EMAIL 

FROM

EMPLOYEE

Where NOT REGEXP_LIKE(Email, ‘[A-Z0-9._%+-]+@[A-Z0-9.-]+.[A-Z]{2,4}’, ‘i’);

20. Write a query to remove duplicate rows from Employees table 

Select Employee_No FROM Employees WHERE ROWID < >

(Select max (rowid) form Employees b where Employee_No =b.Employee_No);

BI and Chryptography

Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. (250 to 300 words)

Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)

1.What is an artificial neural network and for what types of problems can it be used?

2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?

3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.

6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

7.List and briefly explain different learning paradigms/ methods in AI.

8.What is representation learning, and how does it relate to machine learning and deep learning? 

9.List and briefly describe the most commonly used ANN activation functions.

10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

ET WK3 – S

 Research Paper – 5 Full pages

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

 Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks.  IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, Security Technology, 535–543. https://doi.org/10.1109/CCST.2003.1297616