Web Design

 Write two to three paragraphs. Each should be 2 – 3 sentences 

 

  • Explain two reasons why CSS is the preferred method for creating a web page layout
  • Explain the box model

————————————————————————————-

Please answer all of the following questions. Each answer should be one or two sentences

  1. What is the correct code for adding a header element to a page?
  2. Which property determines where an element is placed relative to the containing element?
  3. Which type of CSS style is best used to format only a single element on a single page in a site?

SAVE AS  MS Word file called Project-04-Questions-FDL

————————————————————————————-

Discuss the following in 6 sentences:

  • What are ways to improve search engine optimization.

CS4310: Computer Networks

CS4310: Computer Networks
Project #2
 

1. Overview
In this project, we are going to build a component of a Command and Control (C2C) server that is used to allow agents in a multi-agent system to become aware of each other. In particular, the C2C server should be able to maintain a list of active agents and respond to various actions as issued by the agents. For example, the agents could be a group of UAVs and the C2C server could be a satellite. The agents would need to communicate through the satellite if they are out-of-range of each other. The C2C
server will run on a particular port (supplied by a command line argument) and should be able to respond to TCP connections from agents. Agents send various actions to the
server to update the information maintained. The agent code is supplied in this assignment and is written in C. An agent can issue one of those actions:
1- #JOIN
When the C2C server receives a join request, it will add this agent to its current list of active agents and responds with “$OK”. An agent can only join once before it leaves. If an agent tries to join while it is already an active agent, the C2C
server should respond with an error message “$ALREADY MEMBER”
2- #LEAVE
When the C2C server receives a leave request, it deletes the corresponding agent from its list of active agents and responds with “$OK”. An agent cannot leave if it has not already joined and the server responds with an error message “$NOT MEMEBER”
3- #LIST
When the C2C server receives a list request, it responds with the list of all active agents (agents that have joined, but not already left). The C2C server can only respond to list actions from active agents (otherwise ignored and no response is
given). The list contains the IP address and duration in seconds (how many seconds since an agent joined) for each agent. Each entry should be in the form of . You may assume that each agent has a unique IP. Requests generated from the same IP address are treated as a single agent.
4- #LOG
When the C2C server receives a log request, it responds with the log file (log.txt) to the agent. Similar to list, only active agents can issue log requests. You can assume that the log requests itself should be logged into the log file before its gets sent to the agent. Note that the log file could be quite large, so make sure not to try to load it into a buffer all at once.
The agent takes three arguments in its command line: the C2C server IP, server port and the action string. It sends the action string and writes the response, if any, to the screen. The agent code is listed under resources on TRACS.
The agent would connect to the server on its listening port and waits for a response to its actions before it exits. All actions start with a ‘#’ and all responses start with ‘$’
followed by the data/message.
The C2C server should be able to listen for actions on the port it is running on and once a request is received, the server responds with the information/confirmation based on its current state (e.g., active list of agents, when they joined and the agent requesting the information) and records its interactions in the log file. Notice that the C2C server will
never exit; it continues listening and servicing requests.
2. Log File
The C2C needs to maintain a log file the records any information about any given connection along with a time stamp (up to millisecond granularity) and the response
sent (if any). You can assume the file is called log.txt. For example:
“TIME”: Received a “#JOIN” action from agent “147.26.143.22”
“TIME”: Responded to agent “147.26.143.22” with “$OK”
“TIME”: Received a “#LIST” action from agent “147.26.12.11”
“TIME”: No response is supplied to agent “147.26.12.11” (agent not active)
3. Where to start
First, you need to get familiar with Internet programming API. This will be based on the material discussed in class.
Given the agent application provided, start working on the server part. To test your C2C server, you need to generate multiple actions from different agents by running them
from different machines. You can run a number of agents from different terminals, but all of them will have the same IP address and thus would be treated as the same agent.
You need to handle different cases such as a “#LEAVE” without joining, a “#LIST” from an inactive agent, among many others.
4. Submission
 

• You need to turn in a short design document stating the overall design decisions you made and the data structures used.
• Please provide a single command line to test your code and make sure to provide a working example of the command line.
• Please provide the output log file for 3 agents (using different terminals from different servers) that perform the following actions in that order:
1- Agent 1 joins
2- Agent 2 joins
3- Agent 3 joins
4- Agent 1 issues list
5- Agent 1 leaves
6- Agent 1 issues list
7- Agent 2 leaves
8- Agent 2 leaves
9- Agent 3 issues list
10-  Agent 3 issues log
• Please submit only one zip file that contains all of the above by email to [email protected] with the subject: “CS4310: Project #2”
5. Notes
In a real-world setting, we will need to add a layer of authentication in which the C2C server can verify that it is really communicating with an agent (as opposed to an
attacker) and vice versa. Also, communication should be encrypted between them.
Finally, the server should be a multithreaded one, so it can respond to various agents in parallel (for example using pthreads). 

IntegerSet

 * IntegerSet.java
*//**
*
* @author StudentName
*/
public class IntegerSet {
/**
* Creates a new instance of IntegerSet
*/
// TODO: implement the constructor
/**
* Return a new IntegerSet containing the union of the two IntegerSet objects
* passed as arguments
*/
// TODO: implement the union method
/**
* Return a new IntegerSet containing the intersection of the two IntegerSet objects
* passed as arguments
*/
// TODO: implement the intersection method
/**
* Inserts an element into the IntegerSet by setting the corresponding
* value within the set array to true. Returns false if the value was out
* of range and true otherwise.
*/
// TODO: implement the insertElement method
/**
* Deletes an element from the IntegerSet by setting the corresponding
* value within the set array to false. Returns false if the value was out
* of range and true otherwise.
*/
// TODO: implement the deleteElement method
/**
* @Override the toString method in the Object class
* Displays the integers contained by the IntegerSet separated by spaces.
* An empty set should be displayed as:
* { — }
* An integer set containing 5 and 10 should be displayed as:
* { 5 10 }
*/
// TODO: implement the toString method
/**
* Returns true iff the current IntegerSet contains the same integers as
* the IntegerSet supplied as an argument
*/
// TODO: implement the isEqualTo method

 

Assignment 4

 Chapter 7: Questions for Discussion #1 through #4

  • Explain the relationship among data mining, text mining, and sentiment analysis.
  • In your own words, define text mining, and discuss its most popular applications.
  • What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.
  • What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Chapter 7: Exercise 6 and Internet Exercise 7

  • Go to teradatauniversitynetwork.com and find the case study named “eBay Analytics.” Read the case carefully and extend your understanding of it by searching the Internet for additional information, and answer the case questions.
  • Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Important Note:  In cases if any websites or links do not work, select another respective exercise of choice to replace. ????When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.  Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 4.Important Note:  When I see similarity indexes over 20%, I will review the similarity report to determine if points are going to be docked for plagiarism issues and as a tip, do not include or write the actual questions or exercise directions within these papers.  In other words, all work must be original and not copied from any source and very high similarity indexes will be reported to the University. 

6.4 Final Paper

  1. Your paper should use the Capstone Project Template. As the project paper was started in earlier workshops, you should have already been using the template.
  2. You should have submitted a draft of your paper in Workshop Five for instructor feedback. Make any edits based on the feedback you received.
  3. The paper should be about 20 pages in length (double-spaced), and transitions between sections should be addressed. Any graphics or tables do not count toward page count.
  4. Make sure to use 7th edition APA where required. The paper should include credible references that are cited according to the 7th edition of APA. You may and should use research to develop your plans, but make sure to cite your sources. All written work should be your own.
    1. For questions on APA style, go to the OCLS APA Style Page.
  5. Please refer to the Capstone Project Guide for specifics on what the paper needs to contain.

reflection paper

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

 demonstrate a connection to your desired work environment. 

Wireframing and Prototyping

 

The leadership team at Fast Readers, Inc. is interested in seeing an initial set of wireframes. As a reminder, the company wants to offer the ability for people to link to online content and have the app read the content at user-selected, variable speeds. Based on this scenario, draft four wireframes, each for a different screen. Provide an explanation for each wireframe.

Format:

  • Cover page
  • Introduction (include mention of the tool/methodology you used)
  • Wireframe 1
  • Wireframe 2
  • Wireframe 3
  • Wireframe 4
  • Conclusion

Unit 6 Part 1

 

IT332-4: Assess data communication and networking options for a computer system.

Purpose

The main focus of this assignment is performance factors and system implementations of clustering systems for a local area network (LAN) and a wide area network (WAN). Identifying the communication protocols of the OSI model can help network administrators plan and improve network performance and troubleshoot and avert errors that could take place during data transmission in a clustered system.

Assignment Instructions

Create a PowerPoint presentation of at least three slides that depict a cluster system connected over a LAN (local area network) and a WAN (wide area network). Include in the presentation each layer of the OSI model and clearly depict the communication protocols and devices that operate at each layer. Ensure that the following are represented in the presentation:

  • A cluster where the systems are connected over a LAN.
  • A cluster where the systems are connected over a WAN.
  • In the diagram, provide a depiction of communication protocols and devices used at each layer of the OSI model.

Drawings may be performed using a presentation tool or exported from Microsoft Visio or Apache OpenOffice Draw.

Assignment Requirements

Be sure to use the appropriate APA format and cite your textbook or other sources that you used in your presentation.

The presentation should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor’s discretion. 

For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

Also, review the university policy on plagiarism. If you have any questions, please contact your professor.