Submit in a word document, template attached. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be one page. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. Attached is the assignment, template, and prior paper to use as a guide.
HIGH PERFORMANCE COMPUTER ARCHITECTURE ASSIGNMENT 2 ― A Comparison of the Scoreboard & Tomasulo Approaches and Quick Revisions of Key Concepts
HIGH PERFORMANCE COMPUTER ARCHITECTURE
ASSIGNMENT 2 ― A Comparison of the Scoreboard & Tomasulo Approaches and Quick Revisions of Key Concepts
Object oriented with java
This assignment is for you to gain hands-on experiences of our weekly (week 9) covered topics including Queue, Heap, and Priority Queue. In this assignment, you need to write Java programs that meet the following requirements:
=== Basic Requirements (100 ‘pts) ===
1) (50 ‘pts) Implement a MyQueue class that supports the following interfaces within O(1) time:
1.1) int size(); //return the total number of stored elements
1.2) boolean isEmpty(); //return if the queue is empty
1.3) void offer(E val); //enqueue an element val for generic type E
1.4) E poll(); //remove head and return the removed value, return null if isEmpty()
1.5) E peek(); //return head, return null if isEmpty()
2) (50 ‘pts) Based on our class demonstration of MinHeap implementation, write a MaxHeap class that at least supports all the queue interfaces stated above as in 1).
=== Bonus (20 ‘pts) ===
a) (10 ‘pts) In the above requirement 2) MaxHeap, can you implement a class method: heapify(E[] arr) that takes in an array input, and transfer that array into a max heap?
b) (10 ‘pts) Inspired by the above practices, now revisite Leetcode 912. Sort An Array, this time use heap sort to conquer this coding challenge. Make sure your submission passes all Leetcode test cases.
wk 13 fn
What future developments will we see for blockchain applications? Provide at least 2-3 examples.
positive rights table
Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:
- The right to a higher education
- The right to private phone conversations
- The right to health care
- The right of a presidential or government candidate to receive time on television
List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.
portfolio project-cloud computing
For this, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Requirements:
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 pages in length.
Use the Web to search for examples of hacks that made the news.Write a brief description of the attack
Use the Web to search for examples of hacks that made the news.Write a brief description of the attack indicating what type of hack was involved. Read and respond to at least two other students Discussions.Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.Post between 200 and 300 words.
Describe the technologies, hardware, and software used within the information technology field using visio to create a diagram that identifies the networking equipment needed to enable the workflow between these employees.
Directions
The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.
The manager has provided the following employee descriptions:
- Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
- Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
- Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.
For each employee, you must:
- Describe all hardware components, including peripherals, needed to create the systems
- Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:
- Operating systems
- Applications such as:
- Office automation products
- Security products
- Describe security measures needed to support this system. Security measures could focus on:
- Access
- Administration and user passwords
- Firewalls
Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.
Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.
Need literature review for 40 pages
Need literature review for 40-70 pages
C++ pogramming
Assignment2 and 3 are helpful for completing Assignment4
