Need help in implementing and modifying the missing functions within the C++ programming code tree.cpp according to the attached problem description.
Assignment
Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.
Use your own words and do not copy the work of another student.
Limitations of Blockchain and Emerging Concepts
The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems. Several challenges have already been associated with the use of this technology. Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.
There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
Conclude your paper with a detailed conclusion section that discusses both limitations and emerging concepts.
Your paper should meet the following requirements:
- Be approximately six to eight pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
persuasive essay
Instructions
Select one of the papers/articles provided in this section. Based on the argument of the author, take a position and write persuasive essay (1000 +/- 10% words).
there are two links to Web Sites where you can find steps and guidelines for writing a persuasive essay.
http://www.studygs.net/wrtstr4.htm
The essay would be graded 0 to 10 points. If you submit late your highest grade would be six out of ten points.
While writing your essay, please do not read/use other references. This is not an English writing or a research assignment. This is a business writing assignment. Review the PowerPoint presentation (Persuasive essay structure) on how to write a persuasive essay.
Steps
1. Visit the web sites to find out how to write a persuasive essay.
https://www.hamilton.edu/academics/centers/writing/writing-resources/persuasive-essays
https://learning.hccs.edu/faculty/jason.laviolette/persuasive-essay-outline
2. Review the PowerPoint presentation on a persuasive essay structure. This is not an English writing assignment. It is Business Writing assignment, and your essay should have the proposed structure.
3. Please read the rubric before start working on your essay.
4. Select an article that compels you to write an essay with your opinion.
5. Write your persuasive essay (1000 +/- 100 words).
6. Submit your essay to the Writing Center (see how on BB) request a “grammar and mechanics” review. Reviews from the LRC are not accepted. We need the “grammar and mechanics” feedback
7. Use Project 4 link to submit your two files: 1) File with the “grammar and mechanics’ feedback from the Writing Center and 1) Your updated (if needed) essay on a Word document (no PDFs) file.
D6:350 words
Knowledge Management
Carefully review and use either of the book options below as a reference for various aspects of knowledge management.
- Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
- Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
- Important Note: All students are welcome to use outside research in aspects of knowledge management.
After reading and analyzing content from book references and or from outside research, consider respond to the task and case below.
Make a list of all the knowledge management methods you use during your day (work and personal). Which are the most effective? Which are the least effective? What kinds of work or activities does each knowledge management method enable?
Now think about methods to communicate this knowledge using various methods of communications in major work environments and investigate the impact of turning off every communication system in a firm (i.e., telephone, fax, television, radio, all computer systems). How effective and efficient would the following types of firms be: airline, bank, insurance company, travel agency, department store, grocery store? What would happen? Do customers expect 100 percent uptime? (When was the last time a major airline’s reservation system was down?) How long would it be before each type of firm would not be functioning at all? Investigate what organizations are doing to prevent this situation from occurring.
Cybersecurity
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
GEM5 project
Coding in GEM5
Can you solve this project, it is due Wednesday midnight.
Information Technology
https://www.cnet.com/news/lenovo-laptop-deals-get-a-thinkpad-t14-for-900-x1-yoga-for-1266-and-more/
Explore CNET
Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.
CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”
We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.
Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it
block chain
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
Cloud computing security
Cloud computing security Pros and cons,
how are Cloud service providers are Improve cloud security in the present situation and what are the companies expecting on better cloud security.
in 200 words