Write about OAuth.

Write  500 words or more explaining why this “OAuth” is important for your peers to understand. Be focused and specific. You should do a deep dive into a topic.

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

federated architecture in cloud systems

 

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

BI

Discussion (Chapter 7): What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Questions for Discussions: 

1. Explain the relationship among data mining, text mining, and sentiment analysis. 

2. In your own words, define text mining, and discuss its most popular applications. 

3. What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them. 

4. What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining. 

Exercise: Go to teradatauniversitynetwork.com and find the case study named “eBay Analytics.” Read the case carefully and extend your understanding of it by searching the Internet for additional information, and answer the case questions. 

Internet exercise: Go to kdnuggets.com. Explore the sections on applications as well as software. Find the names of at least three additional packages for data mining and text mining. 

Project 1: Executive Summary

Hide Assignment InformationInstructions

This week, you will submit the one- to two-page executive summary that you started last week. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

Be sure to cite any sources you use.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.

When you are finished, click “add a file” to upload your work, then click the Submit button.

COMPUTER

 

  • This assignment must be in APA format. 
  • The assignment should be in paragraph form using complete sentences and avoiding bullet points and numbered list.
  • Use a Level 1 heading to separate your sections (Page 47 of the APA Publication Manual).
  • Title and reference pages do not count toward the total word or page count. 
  • Textbook and outside sources need to be referenced and cited in the paper.

Essays: (at least 300 words per prompt)

1. How is the Gram stain used to classify bacteria? How do antibiotics inhibit the growth of bacteria? Explain how carriers play an important role in the transmission of pathogens. Jan acquired a MRSA infection during a stay at a rehabilitation facility. Jan’s physician tells her that her MRSA was caused by S. aureus. How would you explain to Jan what S. aureus is and how it can cause diseases?

2. Lou had abdominal surgery. During his stay at the hospital a catheter was inserted into his bladder. After returning home Lou was diagnosed with a nosocomial infection. What are the principle routes of transmission of nosocomial infections? What can be done to prevent nosocomial infections? What are three reasons why rates of nosocomial infections are markedly higher in developing countries? What are five things that increase the risk of nosocomial infection?

3. What is the difference between a neoplasm, benign tumor, and malignant tumor? Identify four chronic infections that may cause cancer, and what cancer the infection might cause. Mr. Brown age 63 and Mrs. Brown age 61, are being seen in for a routine check-up. What cancer screenings should Mr. and Mrs. Brown receive (name at least 3 and why)?

4. In Western societies, why is colorectal cancer the most common cancer, but yet there has been a decline in the incidence and mortality of cervical cancer over the last 40 years? Identify and discuss four nonspecific warning signs of cancer and which cancer the warning sign is linked to. Aaron is a 28-year-old who had an EBV infection during high school. He noticed one of his lymph nodes in his neck is swollen but is not painful. He is also experiencing night sweats. What is a possible diagnosis? Give some possible treatments for this diagnosis?

make pdf report on software development

we should make powerpoint as a software developer or programmer. we need to make powerpoint report of parking space software.

it should include 

1. user stories

2. present the planning chart.

3. iteration

4.calculation

5. burn down chart

please provide notes on each slide. it kind of progress report.

Assignment

intro to sql data

 

  • Exercise 1: HistogramExercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExecise 2: Calculating QuartilesExercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 3: Central TendencyExercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 4: DispersionExercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales.  Comment your images so the viewer knows what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
  • AssignmentExercise 5: Pearson CorrelationExercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentActivity 2: Exploring Sales DataThere is no activity 1.Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.  dealerships.csv

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Advanced Operating Systems Project

There are 4 part for the project and the question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.

*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk

{

public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);

int putblock(int blocknumber, string buffer);

int getnumberofblocks(); // accessor function

int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk

int blocksize;          // block size in bytes

};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
                        

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk

{

Public :

Filesys(string diskname, int numberofblocks, int blocksize);

int fsclose();

int fssynch();

int newfile(string file);

int rmfile(string file);

int getfirstblock(string file);

int addblock(string file, string block);

int delblock(string file, int blocknumber);

int readblock(string file, int blocknumber, string& buffer);

int writeblock(string file, int blocknumber, string buffer);

int nextblock(string file, int blocknumber);

Private :

int rootsize;           // maximum number of entries in ROOT

int fatsize;            // number of blocks occupied by FAT

vector filename;   // filenames in ROOT

vector firstblock; // firstblocks in ROOT

vector fat;             // FAT

};

An explanation of the member functions follows :

  • Filesys()
    This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:
                                                      
                                                             -figure 1 (what I attached below)           

  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like

                                                    -figure 2 (what I attached below)

    The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”.
    PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9].
    Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.
  • fssynch
    This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose
    This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file)
    This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file)
    This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file)
    This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer)
    This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber)
    The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer)
    gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer)
    writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber)
    returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys

{

Public :

Shell(string filename, int blocksize, int numberofblocks);

int dir();// lists all files

int add(string file);// add a new file using input from the keyboard

int del(string file);// deletes the file

int type(string file);//lists the contents of file

int copy(string file1, string file2);//copies file1 to file2

};

An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :

See the figure 4  (what I attached below) for the ls function of Filesys.

See the figure 5 (what I attached below) for dir function of Shell. 

See the figure 6 (what I attached below)  for main program of Shell.

*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys

{

Public :

Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);

int Build_Table(string input_file);

int Search(string value);

Private :

string flatfile;

string indexfile;

int IndexSearch(string value);

};

The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile)
    This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file)
    This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value)
    This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value)
    This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command.