Discussion: Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Qualitative vs Quantitative
Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear and use examples to reinforce your ideas. Focus on the following questions:
• Describe the differences in the content and structure of a qualitative literature review as compared to a quantitative literature review. (Remember that the literature review is the second chapter of a dissertation. Limit your response to differences in the literature review only, and not the entire paper.)
Security Architecture Assignment
Minimum Length 700 Words.
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?
Communication audit PPT
- Pay close attention to the rubric details for each of the following grading criteria as these will serve as your guidelines when preparing your presentation:
- Content
- Quality of Content
- Organization
- Written Communication
- Visual Aids
- Presentation Style
- Body Language
- Voice
- Grammar/Diction
- Create a simple thank-you note for your business/organization partner.
- Send or present the report to your business/organization partner.
- Submit the Audit Report Presentation and the note to the submission folder by the end of the workshop.
//////////////////////////////////////////////////////////////////
Attached sample PPT. Need one presentation with 6-8 slides
paper
please look atttach document and write 4 pages
The research must be conducted using peer-reviewed trade or academic journals.
info tech import plan
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
binary search tree java
need all bst.java methods to be completed and working.
the instructions for the methods are in DefaultMap.java
no need to look into other 3 files, mainly for testing and compiling
do not change source code
Graph Algorithm Assignment
Graphs (Help! Really challenging assignment. Would appreciate any bit of help!)
Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file. Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made into a function, it should be if you plan on using the logic again.
Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.
As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.
Submission Goals
(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.
The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)
(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.
(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.
(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.
graph.py
graph = dict()
graph[‘A’] = [‘B’, ‘C’]
graph[‘B’] = [‘E’,’C’, ‘A’]
graph[‘C’] = [‘A’, ‘B’, ‘E’,’F’]
graph[‘E’] = [‘B’, ‘C’]
graph[‘F’] = [‘C’]
matrix_elements = sorted(graph.keys())
cols = rows = len(matrix_elements)
adjacency_matrix = [[0 for x in range(rows)] for y in range(cols)]
edges_list = []
for key in matrix_elements:
for neighbor in graph[key]:
edges_list.append((key,neighbor))
print(edges_list)
for edge in edges_list:
index_of_first_vertex = matrix_elements.index(edge[0])
index_of_second_vertex = matrix_elements.index(edge[1])
adjacency_matrix[index_of_first_vertex][index_of_second_vertex] = 1
println(adjacency_matrix)
WutherHeightsFamilyTree.docx
The Extended Families of Wuther Heights (Modified):
Family 1
Patrick Earnshaw (M) {id: 001}
Hannah Earnshaw (F) {id: 002}
Relationship: Married
Children:
Catherine Earnshaw (F) {id: 003}
Hindley Earnshaw (M) {id: 004}
Family 2
Andrew Linton (M) {id: 005}
Dolores Linton (F) {id: 006}
Relationship: Divorced
Children:
Isabella Linton (F) {id: 007}
Edgar Linton (M) {id: 008}
Heathcliff Linton (M) [Adopted] {id: 009}
Family 3
Hindley Earnshaw (M) {id: 004}
Frances Byler (M) {id: 010}
Relationship: Married
Children:
Hareton Earnshaw (M) [Adopted] {id: 011}
Family 4
Catherine Earnshaw (F) {id: 003}
Edgar Linton (M) {id: 008}
Relationship: Married
Children:
Cathy Linton (F) {id: 012}
Family 5
Isabella Linton (F) {id: 007}
Children:
Linton Heathcliff (M) {id: 013}
Family 6
Heathcliff Linton (M) {id: 009}
Children:
Linton Heathcliff (M) {id: 013}
Family 7
Hareton Earnshaw (M) {id: 011}
Cathy Linton (F) {id: 012}
Relationship: Married
Family 8
Cathy Linton (F) {id: 012}
Linton Heathcliff (M) {id: 013}
Relationship: Divorced
Web-Based Business Application
34) What JavaScript object and method is used to write HTML to the web page?
a. document.println()
b. document.writeln()
c. window.write()
d. window.print()
35) How many DOM nodes are created from the paragraph?
Feed the dog.
a. None
b. One for the p element
c. One for the p element and one for the paragraph text
d. One for the p element, one for the paragraph text, and one for the whitespace within the paragraph text
36) Which statement changes the Pinterest link to a YouTube link?
a. para.href = “https://www.youtube.com/”;
b. link.href = “https://www.youtube.com/”;
c. para.innerHTML = “https://www.youtube.com/”;
d. link.innerHTML = “https://www.youtube.com/”;
37) What is the preferred way to register an event handler that allows multiple handlers for the same event?
a. myButton.addEventListener(“click”, clickHandler);
b. myButton.onclick = clickHandler;
c.
d.
38) An event that occurs when someone enters their name in an input field is a(n) _____ event.
a. click
b. load
c. input
d. submit
39) On a given keypress event, the event object’s _____ property is used to access the object where the keypress event occurred.
a. event
b. click
c. target
d. element
40) The _____ is required to cancel the interval:
let timerId = setInterval(repeatMe, 1000);
a. clearInterval(repeatMe)
b. clearInterval(timerId)
c. stopInterval(timerId)
d. setTimeout(timerId)
41) What code would be used to call a function called repeat every 3 seconds?
a. setTimeout(repeat, 3)
b. setInterval(repeat, 3000);
c. setInterval(repeat, 3);
d. setTimeout(repeat, 3000)
42) How many times isshowMe()called when the following code is executed?
let timerId = setTimeout(showMe, 3000);
function showMe() {
let div1 = document.getElementById(“div1”);
div1.style.display = “block”;
alert(“called”);
let timerId = setTimeout(showMe, 3000);
}
a. indefinitely
b. 1
c. 2
d. 3
43) In the following JSON, the datatype associated with friends is _____.
{“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]}
a. string
b. object
c. array
d. char
44) How is the age field accessed after the following is executed:
let obj = JSON.parse(‘{“name”:”Bobby”, “age”:20}’);
a. this.age
b. age
c. obj.age
d. obj.name.age
45) What doesstringify()return?
JSON.stringify({“friends”: [{ “name”:”Bobby”}, {“name”:”Celia”},{“name”:”Judy”}]});
a. single string
b. string array
c. JSON object
d. undefined
46) A(n) _____ allows older browsers to function with newer features by providing missing functionality.
a. trifill
b. backfill
c. polyfill
d. altfill
47) A polyfill is engineered to:
a. Use JavaScript to implement a feature whenever possible
b. Replace HTML to implement a feature after checking if a feature exists
c. Use JavaScript to implement a feature after checking if a feature exists
d. Use Ajax to implement a feature whenever possible
48) The _____ website shows what features are supported by major browsers and frequency of use.
a. W3C
b. Tiobe
c. CanIUse
d. W3Schools
49) Which strings match the regex?
let words = [“dapper”, “paper”, “cat”, “flack”];
let re = /pa|ac/;
a. dapper, paper
b. paper, flack
c. flack, cat
d. dapper, flack
50) Which regular expression matches only the words burp, dirt, and right?
let randomWords = [“burp”, “try”, “dirt”, “right”];
a. let re = /[a-i]/
b. let re = /[e-i]/
c. let re = /[i-u]/
d. let re = /[r]/
51) Which string inwordNumsmatches the regex?
let wordNums = [“blahblah!!”, “yea”, “N()P3”, “H!”];
let re = /waS!/;
a. blahblah!!
b. yea
c. N()P3
d. H!
52) Which line of code instantiates Adele and the album 21?
function PlayList(artist, album) {
this.artist = artist;
this.album = album;
};
a. Adele.PlayList = (“Adele”, “21”);
b. Adele = new PlayList(“Adele”, “21”);
c. Adele new PlayList = (“Adele”, “21”);
d. Adele = PlayList (“Adele”, “21”);
53) Which line of code creates a prototype method for PlayList called showCollection?
function PlayList(artist, album) {
this.artist = artist;
this.album = album;
};
a. PlayList.prototype.showCollection = function() {
console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};
b. prototype.PlayList.showCollection = function() {
console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};
c. this.prototype.showCollection = function() {
console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};
d. PlayList.showCollection.prototype = function() {
console.log(“My playlist so far: ” + this.artist + ” : ” + this.album);
};
54) In strict mode, _____ variables must be declared.
a. most
b. some
c. all
d. no
55) Which function is in strict mode?
a. function abc123() {
“restrict”;
}
b. function abc123() {
“use strict”;
}
c. function abc123() {
“strict”;
}
d. function abc123() {
“strict mode”;
}
56) http://www.google.com and https://www.google.com are _____.
a. different origins
b. the same
c. data sharers
d. web storage objects
57) Which line of code deletes all data fromlocalStorage?
a. localStorage.clear();
b. localStorage.delete();
c. localStorage.remove();
d. localStorage.clearAll();
58) What does this line of code do?
localStorage.removeItem(“name”);
a. Removes the “name” key and associated value from storage
b. Removes the “name” key from storage
c. Removes all values from storage
d. Deletes a local variable named “name”
policy
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What kind of speech was the First Amendment written to protect?
2. Does the First Amendment apply only to spoken words?
3. What does it mean that laws regulating speech must be content neutral?
4. Why are common carriers prohibited from controlling the content of the material they carry?
5. How does the Supreme Court determine whether material is obscene?
6. Why have attempts to censor the Internet failed in the US?
7. Why not just ban spam?
8. Why did Facebook ban Alex Jones and Louis Farrakan?
9. Should websites that show how to 3d print guns be banned?
10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?