Please review 4 posts and provide feedback individually in 150 words each.
Practical Connect Assignment – Legal Regulations, Compliance, Invest
Assignment 1: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Write a program
Program 1: a) Write a program that will ask the user some questions and award points based on answers given. The total points will determine whether a prize is won. Here are the criteria: 3. K your program “L3Qlinitials.py” must start with a commented ID Box AND include a comment that indicates the purpose of the program. . Your program should: (a) Display the title as shown in the examples later on (b) For each question: a. Display the question text identically as shown in the examples. b. Prompt the user for an answer and allow them to type it in. The user input in the examples was colored to help you identify visually it. NOTE: Your program is not expected to include colors. e. Ensure your program is not case sensitive for any text response. d. Calculate and display the number of points awarded for each question based on the following table. use feedback as in the examples. points 2 points 4 points Question 1 no Lycs Question 2 0 1-6 Question 3 none AAA C 7+ Once all of the questions have been answered, output the total points achieved and the prize awarded (if any). The user will win the big prize with 10 points, the small prize with 6 or 8 points, and no prize with any other total. ** Scavenger hunt results 1. Did you find a 3.5 inch floppy disk (yes or no) ? YES You get 2 points. Example 2. How many marbles did you find? Enter a number: 8 You get 4 points. 3. What size battery did you find (none, AAA, C)? C You get 4 points. You have 10 points. You win the big prize! *** Scavenger hunt results *** 1. Did you find a 3.5 inch floppy disk (yes or no)? yes You get 2 points. 2. How many marbles did you find? Enter a number: 2 You get 4 points. 3. What size battery did you find (none, AAA, C)? You get 2 points. You have 8 points. You win the small prize! *** Scavenger hunt results *** AND 1. Did you find a 3.5 inch floppy disk (yes or no)? no No points awarded. ha 2. How many marbles did you find? Enter a number: 9 No points awarded. 3. What size battery did you find (none, AAA, C)? None No points awarded. Pro You have 0 points. Sorry! No prize won. Keep in mind that non-colored parts of the examples form the template and must appear identically in your program as written. This includes tabs, numbering, spacing, blank lines, wording, and punctuation. Template text cannot be altered, The only parts that will change are the parts that the user types in the calculated points, and the prize won (if any). Save your program as “L3Qlinitials.pyreplacing initials with your actual initials. Submit your file electronically for marking (unless otherwise instructed).
HR Management & Blockchain
Explain the contents of human resource information management and address how a human resource information management system based on blockchain would look.
Reference:
Wang, X., Hui Zhang, L. F., Lyu, C., & Yue You, L.W. (2017). Human resource information management model based on Blockchain technology. IEEE Symposium on Service-Oriented System Engineering, 168-173. DOI: 10.1109/SOSE.2017.34
Chapter 5 from Blockchain for Business
Unit 10 db#1 + 2 responses/////// and 100 words rephrase
There are three parts to this request.
1. I need initial post to DB.
2. Respond to 2 of my classmates posts
3. Rephrase 100 words and provide me with turnitin.com report. Needs to show less than 10%.
There are several trends in IT and computing that might present challenges in the future. For example, quantum computing might be able to break encryption keys.
Topic 1: Biggest Changes
What do you think will be the biggest changes in computers and cybersecurity in the next decade? Please use outside research to back up what you say and be sure to cite your sources.
HOMEWORK 5
HOMEWORK 5
STRUCTURES
Write a C program that will calculate the gross pay of a set of employees.
The program should prompt the user to enter the number of hours each employee worked. When prompted, key in the hours shown below.
The program determines the overtime hours (anything over 40 hours), the gross pay, and then outputs a table in the following format. Column alignment, leading zeros in Clock#, and zero suppression in float fields is important. Use 1.5 as the overtime pay factor.
————————————————————————–
Clock# Wage Hours OT Gross
————————————————————————–
098401 10.60 51.0 11.0 598.90
526488 9.75 42.5 2.5 426.56
765349 10.50 37.0 0.0 388.50
034645 12.25 45.0 5.0 581.88
127615 8.35 0.0 0.0 0.00
You should implement this program using the following structure to store the information for each employee.
/* This is the structure you will need, feel free to modify as needed */
struct employee
{
long int id_number;
float wage;
float hours;
float overtime;
float gross;
};
In your main function, define an array of structures, and feel free to initialize the clock and wage values in
your array declaration.
Use the following information to initialize your data.
98401 10.60
526488 9.75
765349 10.50
34645 12.25
127615 8.35
Create an array of structures with 5 elements, each being of type struct employee. Initialize the array with the data provided and reference the elements of the array with the appropriate subscripts. Like the previous homework, use multiple functions in your answer and continue to use constants as needed. The only array you need is the array of structures, you don’t need to create a separate array for clock, wage, hours, ot, and gross. You can either pass the entire array of structures to each function, or pass values that work on one array element (and its associated structure members) at a time … either will work.
CSE about AI
This assignment is based primarily on the material covered in lecture “Minimax”.
We will work with “Tic-Tac-Toe” as a simple game to help us work through various algorithms.
Part 1: (Multi-agent) State Spaces
1.1) [1pt] Similar to Homework 1, we will first need to create a starting state for you to work from. Starting from the beginning of the game is too much work to do by hand, so we will have you work from a game in progress.
So, to start play a game of tic-tac-toe with yourself. Make sure you don’t win (or lose), forcing the game to a draw will make the rest of the homework assignment much easier (fewer states to consider).
Now, roll the game back to the 3rd-to-last move (last move->next-to-last move->2nd-to-last move->3rd-to-last move). This will be the initial state you use for the rest of the assignment. (Equivalently, choose as your initial state the game board that had 4 blank spaces.)
Note, this means that you (the agent/Max) will be playing “O” and the opponent (Min) will be playing “X”.
1.2) [2pts] Now draw out the search tree starting from the initial state you created in (1.1). Draw out the full search (which should be fairly small since we are starting from near the end of the game).
When considering successor states (i.e., possible game moves), evaluate moves starting with the top-left, then left-to-right and finally top-down. That is, use the following order:
#1#2#3#4#5#6#7#8#9
Draw the states in your tree from left to right when following the above order.
Hint: Make sure to leave some space in your diagram, you will be adding information to it in the following sections. In fact, I recommend reading the rest of the assignment first, so you know what you need to leave space for.
Hint 2: It may be a good idea to clearly mark which level of the tree represents states Max is considering and which Min is considering. Just as on the slides, you would start with Max on the root level of the tree.
Part 2: Minimax
Now we move on to some actual algorithms.
2.1) [2pts] Now, go back to your search tree in Part one and add utility scores to all the terminal states (those with no children, i.e., where the game ended). Rather than simple win lose, we will use a more complicated utility function (to help avoid ties). This utility function is positive for wins, negative for losses, and closer to zero the longer a game took to finish. Specifically:
Number of moves playedNumber of moves leftScore if O (agent, Max) wonScore if X (opponent, Min) wonScore if draw545-5634-4723-3812-2901-10
2.2) [5pts] Now, perform the minimax algorithm to determine “Minimax scores” for each of the states in the tree all the way back to the root (initial state).
Using these scores, which move would Max choose to make?
Part 3: Alpha-Beta Pruning
3.1) [6pts] Now go back and repeat the search from part 2, only this time perform alpha-beta pruning as well. Make sure to show what alpha and beta values are considered (and how they change) for each state in the search tree. Use alpha > beta as the pruning check (do not use greater than or equal to). Also be sure to clearly mark which parts of the tree would be pruned off.
Hint: Remember, at the root of the tree (initial state) alpha, beta start off as: alpha=-infinity and beta=infinity.
Part 4: Extra Credit
4.1) [+1pts]
Go back and redo 3.1, only this time use alpha >= beta as the pruning check. Remember you will have to be careful about what you do with tie in this case. To resolve this use a pruning flag to indicate a branch that higher levels should ignore (e.g., if you decide a branch should be pruned, set it’s minimax value to “X” instead of a number).
Discuss the differences that you see. (Warning, both the new search results/tree and discussion are required to receive credit.)
You may work electronically (word processor, etc) and submit a final pdf of your work.
The network restrictions surrounding the web authentication service. As was noted, this component is too valuable to trust to a single defense. Furthermore, authentication requests are tendered by the least-trusted component in the architecture.
The network restrictions surrounding the web authentication service is one layer of defense. As was noted, this component is too valuable to trust to a single defense. Furthermore, authentication requests are tendered by the least-trusted component in the architecture. That component, HTTP termination, resides on the least-trusted network. What additional steps can be taken?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.
A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.
Your paper must be submitted to SafeAssign. Resulting score should not exceed 35%.
research paper 20 pages as mention in document attached
Topic: Write a scholarly research report on a narrowed focus related to Computer Networking based on one of the following main topics:
Step 1: Select one of these topics:
1) Computer Networking and Machine Learning
2) Computer Networking and 3D Printing
3) Computer Networking and Medical Technology
4) Computer Networking and Serverless Computing
5) Computer Networking and Disaster Recovery Methodologies
6) Computer Networking and Video Gaming Algorithms
7) Computer Networking and Search Engine Optimization
Create a research paper based on the attached project
Do research on one-or-two large software systems that were implemented successfully and on one-or-two large software systems that failed in their implementation. Write at least a 3-page Word document, double-spaced, detailing each system. Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of the system, a section to discuss the D.-Development of the system, a section to discuss the I.- Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of the system (successful or failed). Provide the following: 1. An Introduction paragraph describing the assignment and a short description of the systems selected. 2. A section that describes the first Software System (with an appropriate section Heading) and a description of that Software System to include: a. What is its purpose? b. What operations it performs? c. What are its inputs (resources, interfaces, when used)? d. What are its outputs (interfaces, data)? e. The system’s complexity/cost/feasibility. f. Any constraints or risks found during the research. 3. Sections with details for each component of A.D.D.I.E. (with an appropriate section Heading) to include: a. Success or failures identified. b. Issues or findings identified. c. Recommendations or lessons learned. Your paper should then conclude with a Findings section the compares the two systems. Provide the following: 1. What made one system successful but make the other system fail. 2. What could have been done to make the failed system more successful. 3. What could have been done to make the successful system even more successful. You must include at least 3 scholarly references with citations.
