Coding

PROGRAM REQUIREMENTS

In this assignment you will implement three basic graph algorithms: breadth-first search, depth-

first traversal, and topological sort. We are not providing any code template, but you must follow 

the input and output formats specified below. Read carefully what you are required to do to 

receive full credit and attempt the extra credit tasks only after you are done with the 

requirements. 

First, implement a graph data structure using adjacency lists. Your code must read graphs of 

arbitrary size from a file (as long as there is enough memory available, your code must work: do 

not assume a maximum number of vertices). The input format is as follows: one line per vertex, 

the first element is the vertex id and the following numbers are the adjacent vertices. The input 

file will always be a bunch of integers and white space. For example,

1 3 4 

3 1 4 

4 1 3

is a graph with four vertices, and three undirected edges: (1, 3), (1,4) and (3,4). 

Then, implement three algorithms: 

• Breadth-first search. Calculate the distance from vertex 1 to all other vertices using BFS. 

Then, print all the vertices sorted by distance from vertex 1. Note that if the graph is 

unconnected, some nodes may have distance ∞.

• Depth-first traversal. Calculate discovery and finish times using DFT. Then, print all the vertices sorted by discovery time.

Topological sort. Print the topological sort of the graph. 

A few comments:

• Look carefully at the sample input and output files and follow the same format. 

• When you look through vertices, visit them in increasing order.

Extra credit: 

• Use BFS to determine whether a graph is connected. The input is a graph, and the output 

is yes or no.

• Implement an algorithm to detect whether a graph has a cycle. The input is a graph, and 

the output is yes or no.

• Design and implement an algorithm that takes as its input a graph ???? = (????, ????) and a 

permutation of ????, and outputs whether the permutation of ???? is a topological sort of ????.

Your algorithm must run in Θ(|????| + |????|).

Order # 13476

Title: Software Development and Your Role in It

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

In this assessment, you will articulate the roles played by team members in a software development project. You will explain how the Java programming language and development environment enable you to perform your role as a software programmer/developer in a development project.

In software development projects, a team is formed to carry out the project. The team is made of several members, each with a distinct role and responsibilities. Examples of these roles include the client, the project manager, the software architect, and the software programmer/developer roles.

Please refer to the resources of this assessment to learn about the software development process and the roles played in a typical software development project.

You may wish to reference these resources in your assessment.

Follow these steps to complete this assessment:

1.Research the software development process and the roles played by the development team members in software development projects. This research may include the readings suggested with this assessment, or you may conduct additional research.

2.Create a PDF or Word document named “U1A1_SWRoles” of 1–2 pages in which you: a.Describe the software development process and its phases.

b.Explain at least four of the roles played by team members in a software development project and examine their corresponding responsibilities. The four roles must include the role of the software developer/programmer.

c.As an aspiring Java programmer, articulate how the Java programming language and the Java development environment enable you to perform the role of a Java developer in a software development project.

Your document should follow APA style and guidelines, including proper spelling and grammar. APA guides are available in the assessment resources.

Deliverables

Submit your paper as Word document named as U1A1_SWRoles.doc (a PDF is also acceptable).Your document should follow APA style and guidelines, including proper spelling and grammar.

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

1.Describe the software development process and its phases.

2.Explain roles and responsibilities of the developer/programmer teams.

3.Articulate how the programming language and development environment enable the role of a developer/programmer.

4.Communicate efficiently, effectively, and in an appropriate manner for an IT professional.

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Discussion 1 (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.
Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Physical security

Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: 

Network Security

 Your home network is vulnerable to network attacks by hackers. There is a  concept in network security called defense-in-depth (as known as a  layered security approach). Consider a layered security approach  starting from the router to your devices in your discussion response.  

 

In your original post, answer the following:

  • What are the threats that you need to be concerned about on your home network?
  • What are the vulnerabilities for each of your devices on your home network?
  • What are some techniques you can use to protect your devices on your  home network? (Make sure to discuss how you are going to protect your  network traffic on your wireless network.)
  • Using your book and your responses above, what are the key themes you need to have in a network security policy?

Operative Paradigm

  1. Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
  2. The body of your paper should be 8 pages long, written in good APA, and with at least 10 references.

SQL writing assignment

 

Answer the following questions in a cohesive and comprehensive essay. 

  • What is the difference between “Stored Procedure” and “Function”?
  • What is difference between “Clustered Index” and “Non-Clustered Index”?
  • What is the difference between the “DELETE” and “TRUNCATE” commands?
    • Be specific and provide examples. 

 

  • A minimum of 350 words.
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.
    • NOTE:  An abstract, title page and reference page are not required for writing assignments in this course.
  • Use support from at least two reputable sources (other than course materials) written within the last five years.