IT 345 Assignment 1

 Required Assignment 1: Submit one to two-page summary of a journal article on a relevant topic of your choice. You are required to use IGU’s learning resources such as university’s digital library and online resources and confirm your use of these resources with your instructor. See “LRS” section above.

Assignment Week 4
1. Use Library Database in Syllabus to find an article related to Organizational Behavior:
2. Capture five major points of from the article and use APA to acknowledge this is captured or copied by (authors last name, date)
3. Write a short paragraph explaining why you think this article interest you as Introduction
4. Summary: Write your conclusion of what you have learned from the article
5. List the title and author of the article
6. Reference put the article reference in APA format 

discussion

Discussion: Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Qualitative vs Quantitative

 

Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear and use examples to reinforce your ideas. Focus on the following questions:

• Describe the differences in the content and structure of a qualitative literature review as compared to a quantitative literature review. (Remember that the literature review is the second chapter of a dissertation.  Limit your response to differences in the literature review only, and not the entire paper.) 

Security Architecture Assignment

Minimum Length 700 Words.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Communication audit PPT

 

  1. Pay close attention to the rubric details for each of the following grading criteria as these will serve as your guidelines when preparing your presentation:
    1. Content
    2. Quality of Content
    3. Organization
    4. Written Communication
    5. Visual Aids
    6. Presentation Style
    7. Body Language
    8. Voice
    9. Grammar/Diction
  2. Create a simple thank-you note for your business/organization partner.
  3. Send or present the report to your business/organization partner.
  4. Submit the Audit Report Presentation and the note to the submission folder by the end of the workshop.

 //////////////////////////////////////////////////////////////////

Attached sample PPT. Need one presentation with 6-8 slides

paper

please look atttach document and write 4 pages 

 The research must be conducted using peer-reviewed trade or academic journals

info tech import plan

 

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

binary search tree java

need all bst.java methods to be completed and working. 

the instructions for the methods are in DefaultMap.java

no need to look into other 3 files, mainly for testing and compiling

do not change source code

Graph Algorithm Assignment

Graphs (Help! Really challenging assignment. Would appreciate any bit of help!)

Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file. Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made into a function, it should be if you plan on using the logic again.

Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.

As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.

Submission Goals

(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.
The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)

(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.
(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.

(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.

graph.py

graph = dict()

graph[‘A’] = [‘B’, ‘C’]

graph[‘B’] = [‘E’,’C’, ‘A’]

graph[‘C’] = [‘A’, ‘B’, ‘E’,’F’]

graph[‘E’] = [‘B’, ‘C’]

graph[‘F’] = [‘C’]

matrix_elements = sorted(graph.keys())

cols = rows = len(matrix_elements)  

adjacency_matrix = [[0 for x in range(rows)] for y in range(cols)]

edges_list = []

for key in matrix_elements:

    for neighbor in graph[key]:

       edges_list.append((key,neighbor))

print(edges_list)

for edge in edges_list:

        index_of_first_vertex = matrix_elements.index(edge[0])

        index_of_second_vertex = matrix_elements.index(edge[1])

        adjacency_matrix[index_of_first_vertex][index_of_second_vertex] = 1

println(adjacency_matrix)

WutherHeightsFamilyTree.docx

The Extended Families of Wuther Heights (Modified):

Family 1

Patrick Earnshaw (M) {id: 001}

Hannah Earnshaw (F) {id: 002}

Relationship: Married

Children:

Catherine Earnshaw (F) {id: 003}

Hindley Earnshaw (M) {id: 004}

Family 2

Andrew Linton (M) {id: 005}

Dolores Linton (F) {id: 006}

Relationship: Divorced

Children:

Isabella Linton (F) {id: 007}

Edgar Linton (M) {id: 008}

            Heathcliff Linton (M) [Adopted] {id: 009}

Family 3

            Hindley Earnshaw (M) {id: 004}

            Frances Byler (M) {id: 010}

            Relationship: Married

            Children:

                        Hareton Earnshaw (M) [Adopted] {id: 011}

Family 4

            Catherine Earnshaw (F) {id: 003}

            Edgar Linton (M) {id: 008}

            Relationship: Married

            Children:

                        Cathy Linton (F) {id: 012}

Family 5

            Isabella Linton (F) {id: 007}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 6

            Heathcliff Linton (M) {id: 009}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 7

            Hareton Earnshaw (M) {id: 011}

            Cathy Linton (F) {id: 012}

            Relationship: Married

Family 8

            Cathy Linton (F) {id: 012}

            Linton Heathcliff (M) {id: 013}

            Relationship: Divorced