Computer science

1.What do you understand by Data Independence? What are its two types?
2.Define the relationship between ‘View’ and ‘Data Independence’.
3.What are the advantages and disadvantages of views in the database?
4.What do you understand by Functional dependency?
5.When is functional dependency said to be the fully functional dependent?
6.What do you understand by the E-R model?

Information Security

In 175 words or more discuss why information is an asset to a company. Explain why an effective information governance strategy is essential in safeguarding information assets. What is the importance of digital signatures in today’s corporate environment?

Need someone good expert in scheme programming

 Domino Loops in Scheme Dominoes are small rectangular game tiles with dots embossed at both ends. They are used to play a variety of games involving patterns on a tabletop. A standard “doublesix” domino set has 28 tiles: one for each possible pair of values from (0 . 0) to (6 . 6). In general, a “double-N” domino set would consist of (???? + 1)(???? + 2)/2 tiles. One possible pattern to make with dominos is a loop, in which the tiles are laid in a circle, end-to-end, with identical numbers of spots on all adjacent ends. In a doubletwo domino set, with six tiles, ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0)) is a domino loop. You are to write a program in Scheme that prints all domino loops in a double-N domino set. Specifically, you are to flesh out the following program: (define domino-loops (lambda (n) (filter loop? (permutations (dominoes n))) ) ) (define filter (lambda (f L) ; return list of those elements in L which pass through filter f (if (null? L) L (let ((N (f (car L)))) (if (null? N) (filter f (cdr L)) (cons N (filter f (cdr L))) ) ) ) ) ) The expression (domino-loops 2) would evaluate to (((2 . 2) (2 . 1) (1 . 1) (1 . 0) (0 . 0) (0 . 2)) ((2 . 2) (2 . 0) (0 . 0) (0 . 1) (1 . 1) (1 . 2)) ((2 . 1) (1 . 1) (1 . 0) (0 . 0) (0 . 2) (2 . 2)) ((2 . 0) (0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2)) ((1 . 2) (2 . 2) (2 . 0) (0 . 0) (0 . 1) (1 . 1)) ((1 . 1) (1 . 2) (2 . 2) (2 . 0) (0 . 0) (0 . 1)) ((1 . 1) (1 . 0) (0 . 0) (0 . 2) (2 . 2) (2 . 1)) ((1 . 0) (0 . 0) (0 . 2) (2 . 2) (2 . 1) (1 . 1)) ((0 . 2) (2 . 2) (2 . 1) (1 . 1) (1 . 0) (0 . 0)) ((0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0) (0 . 0)) ((0 . 0) (0 . 2) (2 . 2) (2 . 1) (1 . 1) (1 . 0)) ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0))) (NB: order in this list doesn’t matter. If your code prints the loops in a different order that’s fine.) For larger values of N, where N is even, the number of loops grows exponentially. Note, however, that there are no domino loops when N is odd. There are many possible ways to write your program. Perhaps the simplest (but not the fastest) is to generate all permutations of a list of the tiles in the domino set, and check to see which are loops. You are required to adopt this approach, as described in more detail below. You can implement a more efficient solution for extra credit. Note that the number of permutations of a double-N domino set is ((???? + 1)(???? + 2)/2)!. For N=6 (the standard number), this is about 3.05×1029 . Clearly you can’t afford to construct a data structure of that size. My own (slow) solution to the assignment generates the double-2 loops quite quickly. It takes a couple minutes to determine that there are no double-3 loops. When asked for double-4 loops it thrashes. Requirements You must begin with the code shown above. These three sub-functions will be tested individually, giving partial credit for the ones that work correctly: 1. (dominoes N) returns a list containing the (N+1)(N+2)/2 tiles in a double-N domino set, with each tile represented as a dotted pair (an improper list). Order doesn’t matter. (dominoes 2) ==> ((2 . 2) (2 . 1) (2 . 0) (1 . 1) (1 . 0) (0 . 0)) 2. (permutations L) given a list L as argument, generates all permutations of the elements of the list, and returns these as a list of lists. (permutations ‘(a b c)) ==> ((a b c) (b a c) (b c a) (a c b) (c a b) (c b a)) (Again, order doesn’t matter, though obviously all permutations must be present.) Hint: if you know all the permutations of a list of (N-1) items, you can create a permutation of N items by inserting the additional item somewhere into one of the shorter permutations: at the beginning, at the end, or in-between two other elements. 3. (loop? L) given a list L as argument, where the elements of L are dotted pairs, returns L if it is a domino loop; else returns the empty list. Note that the first and last dominoes in the list must match, just like the ones in the middle of the list. Also note that a straightforward implementation of your permutations function will give you lists that should be considered loops, but in which you need to “flip” certain dominoes in order to make all the ends match up. For example, in a double-2 domino set, ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (0 . 2)) should be considered a domino loop, even though the last tile needs to be flipped. Important: ⚫ You are required to use only the functional features of Scheme; functions with an exclamation point in their names (e.g. set!) and input/output mechanisms other than load and the regular read-eval-print loop are not allowed. ⚫ Output function may not be needed. Returning the result list is sufficient. ⚫ Defining any helper function(list) is allowed, but modifying the interface of three functions isn’t. ⚫ Make sure your scheme program is workable in different PC. (Test it on your friend’s PC) 10 points deducted for the inexecutable program. 

Help

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discussion 5

 

Answer the following questions:

1) Explain the use of a Flasher Box

2) Why would the investigator be considered with EEPROM?

3) Explain the important points in evaluating dates and times on a device?

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

research paper

select one out of four

• Data Science & Analytics (Visualization, Analytics, Data Mining) 

• Artificial Intelligence (Computational Linguistics, Machine Learning, Robotics).

 • Programming Languages (Foundations, Design & Application, Implementation).

 • Project Management (Computer Technology, Agile Frameworks, Triple Constraints)

Discussion post – Blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies.

question1) In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. 

question2) Lastly, discuss if you have any experience using any cryptocurrencies. 

Note: Minimum 250 words. Use atleast one google scholarly article. Intext citation should be added.

I need python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.

Complete the Unix scripts

| Firewall // 1pt

Open the following ports and services: 443, http

| Account Management // 3 pts

From the csv, use the OS as the filter to complete the following tasks.

– Add each username and make sure to place it on the correct base dir. You can check the /etc/passwd to ensure it is correct.

roary001:x:1000:1000::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each username must be part of the right primary group. See filter below

roary001:x:1000:1020::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each home folder must contain the corresponding files. See filter below

– Add the right content to the about file.
* All text must be lower case
* Single space characters
* No extra characters at the end of the document

| MAC

– Base directory = /home/mac/

– Primary group = color

$ ls /home/mac/canada/roary001/

.DS_Store
about

$ cat /home/mac/canada/roary001/about
first last

dob

| WINDOWS

– Base directory = /home/windows/

– Primary group = fruits

$ ls /home/windows/mexico/roary002/

Thumbs.db
about

$ cat /home/windows/mexico/roary002/about
last first

shell

Ubuntu // 4pts

| Firewall // 1pt

Open the following ports and services: 21, 22, 53, 143, 443

| Apache2 // 3pt

Install Apache on the server

$ apt-get install apache2

From the csv, use the permission as the filter to complete the following tasks. 

– Create a base directory under the /var/www/html for each permission

/var/www/html/permission/   // all, create, delete, drop, execute, insert, select, update

– From the CSV, filter all users that match each permission and create a new directory for each month of the year for which your users were born. 

fh7058,forrester,hochstein,m,august 9 1998,ghana,plum,bananas,mac,/bin/tcsh,execute

gm1513,greydon,merrick,m,september 21 1992,bahrain,medium_aquamarine,grapes,mac,/bin/csh,select

iw7165,iriana,weick,f,august 20 1987,cyprus,medium_purple,plums,windows,/bin/tcsh,select

/var/www/html/select/september

– Inside of each folder above, create an index.html file and add all matching users data int the following order: country,color,fruits,os,shell,username,first,last,gender

cat /var/www/html/select/september/index.html

bahrain,medium_aquamarine,grapes,mac,/bin/csh,gm1513,greydon,merrick,m

Fedora // 2pts

// scripts

All scripts must be placed on the /root folder.

Scripts can not be executed prior to submission. This will cause issues.

Make sure to test your scripts before turning in the assignment.

* Ensure that all file references in your scripts are absolute paths.

| useradd

Create a script named useradd.sh. This script will complete the same steps outlined on CentOS, but will run them on demand.

| httpd

Create a script named httpd.sh. This script will complete the same steps outlined on Ubuntu, but will run them on demand.

* Keep in mind that to install apache2 on Fedora you need to use the command below. The folder structure for the web server is the same.

$ dnf install httpd.