Represent Family using Graph data structure

 

Using the below image represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file.

Additionally,

  • I also want there to be an interface in which a user can create a new family member and add them to the tree.
  • This can be a simple CLI where the user provides a name, gender, and age to create a person.
  • Then another simple CLI where they select which member of the family, they want the original relationship to be with and what kind of relationship it should be.
  • Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship.

Finally, make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person cannot marry themselves, a person cannot be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exist as part of the family tree, not as part of the graph.

As a hint, for a successful design:

I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore, those should be your function calls.

Attachments area
 

IT204 office 365 Application assignment 2

Note: Unicheck is not used for this assignment since you are re-formatting  instructor supplied text.

Use the text below and format as described. Copy and paste it into your document. The font for the header is Arial Black or another sanserif font. Use Times New Roman for the body. Your press release should fit on one page. You may need to adjust the photo’s size to make this happen. Run spell check to correct misspelled words as there are intentional misspelling and grammar errors in the original.

We will discuss the tools for this assignment in class, you can use online sources as a refresher.

Submit by Sunday 11:59 PM.

Email Richard Lanier with any questions. [email protected]

This is the beginning of the document you will submit.

(1 blank line from the top of the page)

Press Release (Center, 20 point Arial Black font, red color with a light gray fill)

For Immediate Release 1/12/2021 (center, underline, 12 point Arial Black font not bold)

(2 blank lines)

Celebrate the end of Covid! (Times New Roman font, bold 12 point, centered. Indent the following paragraph one tab)

You are invited to atend an a walkathon (Times New Roman font, 12 not bold 1.5 line spacing) to raise money for the capital area food bank. (capitalize and bold and underline the words capital area food bank) All money that is raised will be donated to feed hungry people in the Washington area. Please wear a mask ans social distance.

Date: Saturday, June 19, 2021

Time: 10:00 AM 

Place: The Mall in Washington, D.C. (Use bullets and indent two tabs for the date, time, place)

Contributions accepted. You decide what to give. (Indent two tabs, but no bullet)

Come join the fun! (Bold, 14 point, center, yellow highlight)

(1 blank space.  Make a bullet list for the following. Left align the list, one space, 14 point  not bold)

Exercise while helping people.

Wear comfortable walking shoes.

Free water and snacs will be provided.

Wear a mask and social distance. (add one line)

Insert a photo of someone jogging on the right of the type you just pasted. Rotate the photo and add a picture border.  Add as many lines as needed after the photo to fit the following information. Add a picture watermark titled Press Release.

Sponsored by students of I Global University, Fals Church, va (left align, 12 point type)

For more information, contact

Your name

Your email address

Check the document properties. Who created it? When was it created. Write this at the bottom of the page. Created by ______________ Date _______________.

Add a page border and a watermark. Add a light value background color to the page.

D6:350 words

 

Knowledge Management

Carefully review and use either of the book options below as a reference for various aspects of knowledge management.

  • Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
  • Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
  • Important Note:  All students are welcome to use outside research in aspects of knowledge management.

After reading and analyzing content from book references and or from outside research, consider respond to the task and case below.

Make a list of all the knowledge management methods you use during your day (work and personal). Which are the most effective? Which are the least effective? What kinds of work or activities does each knowledge management method enable?

Now think about methods to communicate this knowledge using various methods of communications in major work environments and investigate the impact of turning off every communication system in a firm (i.e., telephone, fax, television, radio, all computer systems). How effective and efficient would the following types of firms be: airline, bank, insurance company, travel agency, department store, grocery store? What would happen? Do customers expect 100 percent uptime? (When was the last time a major airline’s reservation system was down?) How long would it be before each type of firm would not be functioning at all? Investigate what organizations are doing to prevent this situation from occurring.

Essay

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of not less than 500 words, summarizing the court’s decision.

Java Programming

 I have an assignment that is almost complete but there are some lines of code causing it not compile and I can’t get to any of the logic errors. I would like these fixed along with some explanation of what you did. You can put this is lines of comment and I can delete them later. 

The syntax errors I caught are as follows on the lines I see: Controller class: 167; Person class: 139, 143 (there was a third at the end but i got rid of an extra }) Several lines in the Controller class don’t have a syntax error but they probably are logic errors: 39, 42, 69, 74, 79, 82, 86, 108, 111, 127, 130, 150, 153, 159, 163. 

There could also be logic errors elsewhere. There may also be typographical errors as well because the professor has always had at least one. 

Security breach

Review a Security Breach which occurred over the past year and present a research paper providing the below point!! 

Describe the incident

Provide Specifics about the incident.

What data or information was impacted?

Describe threat modeling techniques which could have assisted in the mitigation of breach.

How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references and 650 words

Information Systems Business and Beyond

  

students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 2 pages, double spaced of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. The assignment is worth 100 points. 

Requirements:

· Provide a minimum two (2) page, double spaced reflection paper. Include a coversheet with your name, title and class ID as a minimum.

· Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

· Coversheet, reference list, figures and tables don’t count toward the two (2) page count.

· Share a personal connection that identifies specific knowledge and theories from this course. 

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Discuss the impact of the GLBA on the financial services industry

 

Instructions

In order to complete assignment #4, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of the 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

1. Chapter 6 noted that Friendster has obtained a number of social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these two companies and you expect that you may eventually be sued by Friendster. In addition to contesting the validity or enforceability of the Friendster patents, what are some of your other options? 

2. The CEO of a small but promising start-up company is in need of an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?

3. Read about the Gramm–Leach–Bliley Act (GLBA). Discuss the impact of the GLBA on the financial services industry