Software -8

 What is Risk Management? And provide at least one example of project, product, and business risks. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python GUI, Tkinter

This is task to create a maze runner game using Tkinter. As I will be running it in auto grader I want the code’s to be as it is said in the a3.pdf following every guideline with Inline comments that all significant blocks of code should have a comment to explain how the logic works, and informative docstrings that every class, method and function should have a docstring that summarises its purpose.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need Answes for pre- test

 

1. When developing a naming convention, what is the most important quality to keep in mind? 

A. Logic 

B. Consistency 

C. Tradition 

D. Filename length

2. What Microsoft program is frequently used to develop pictorial representations of a database’s logical relationships? 

A. Excel 

B. Word 

C. Access 

D.Visio

3. _refers to a set of tools for analyzing trends and patterns in business data.

A. MIS

B. Transaction

C. Business intelligence 

D. Database management 

4. What are the two main advantages to a well-designed relational database over other types? 

A. Speed and data protection 

B. Flexibility and data protection

C. Data integrity and speed 

D. Data integrity and flexibility

5. What relationship does a data warehouse have to an organization’s data?

A. A data warehouse holds only the live version of the data. 

B. A data warehouse holds all of the data. 

C. A data warehouse holds only customer-related data. 

D. A data warehouse holds only backup copies of the data.

6. When using a surrogate key, what form does the key most usually take? 

A. Database owner name with incrementing numbers

B. Auto-incremented numbers

C. Random string of letters

D. Random characters beginning with 

7. Which type of documentation should go inside your data dictionary? 

A. List of software applications used 

B. List of columns and data types

C. List of personnel working on the project

D. List of budget committee members

8. Which commercial RDBMS product was the first to hit the market and is the biggest? 

A. Access

B. SQL Server 

C. Oracle

D. MySQL

9. After an informative session, you find yourself with several pages of notes. For maximum retention and unde notes within _ hours. 

A. 8 

B. 48 

C.24 

D.12

10. When gathering the information needed to create a database, the attributes organization needs for its activities are _ requirements. 

A. data 

B. general 

C. access and security

D. report 

11. In a relational database, entities are defined by 

A. rows. 

B. columns.

C. values.

D. attributes.

12. You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records for every record created in the parent entity. What type of relationship do these tables have? 

A. One to many

B. One-to-one 

C. Many-to-many

D. Pair of one-to-many relationships

13. If a user can make modifications to database objects, what permission has that user been assigned? 

A. Select 

B. Create 

C. Update

D. Alter

14. The basic idea for relational databases was developed by Edgar Codd, who was a researcher for what company?

A.AT&T

B. IBM

C. Bell Labs

D. Siemens

15. During the information-gathering process, you want the system already in place. Which method would be best to us 

A. Interviews 

B. Review of business documents

C. Work shadowing

D. Questionnaires

16. Keys based on attributes that arise organically from the entity itself are referred to as what type of key? 

A. Surrogate

B. Primary

C. Natural 

D. Composite

17. Your project specifications call for a business rule that the database design can’t enforce. What tool should you use to enforce this busi 

A. Exception

B. Weak entityty 

C. Lookup entity 

D. Trigger

18. Which type of entity describes a fundamental business aspect of a database? 

A. Lookup 

B. Domain 

C. Weak 

D. Linking 

19. What visual practice provides more information about logical relations when creating an ERD? 

A. Arrow notation

B. Referential actions

C. Crow’s feet notation

D. Color-coded boxes

20. Which type of relationship is logically supported but can’t be represented by Visio or any database modeling process

A. One-to-one 

B. Many-to-many

C. Pair of one-to-many relationships

D. One-to-many

1. Which of the following functions is a scalar function? 

A. COUNT 

B. MAX 

C.SUM 

D. MONTH

2. What term is used to describe any action a database takes? 

A. Function 

B. Attribute 

C. Transaction 

D. Dependency a

3. Why should you perform the denormalization process on a database? 

A. Increase data protection 

B. Correct incorrect linkages 

C. Correct attribute names 

D. Improve performance

4. In testing, you find that one of the tables in your database has multiple versions of one of the columns, and updating the information requires the user to go to several different places to make sure the update completes. What process should you use to fix this kind of issue? 

A. Denormalization 

B. Normalization 

C. Compiling 

D. Insertion

5. Which operator signifies both the modulus operation and the wildcard in a WHERE clause? 

A. % 

0 B./ 

0 C.* 

0 D.+ 

6. You’re looking for a DBMS to purchase and install for use with the database you’re designing. Because of future expansions, yi away from systems that have file size limits. Which of the following DBMSs should you likely avoid? 

A. Access 

B. Oracle Express 

C.MySQL 

D. PostGres 

7. Which SQL functional area language contains all the commands for selecting and manipulating database data? 

A. HTML 

B.XML 

C.DML 

D.DDL 

8. Which language is used to manipulate data and data objects in a relational database? 

A. SQL 

B.C++ 

C. XML 

D.XQuery

9. You’re looking over the tables in the database you’re creating, and you another table. What type of Join are you seeing? 

A. Cross join 

B. Equi join 

C.Outer join 

D. Inner join 

10. When users enter data into the database, they find they have to enter a value for every column, as the database won’t, otherwise. What type of value has been disallowed for this database? 

A.O 

B. Duplicate 

C. Tab key 

D. Null 

11. What type of clause must you always use with DELETE or UPDATE to avoid Inadvertently changing data elsewhere in the data! 

A. WHERE 

B.ORDER 

C.SET 

D. FROM 

12. Which keyword yields the same results as using the >= and <= operators? 

A. IS 

B. BETWEEN 

C. LIKE 

D. WHERE 

13. _ are rules about how to do things. 

A. Logs 

B. Policies 

C. Procedures 

D. Reports

14. When a database system requests a login 

A. Mapping 

B. Authorization 

C. Authentication 

D. Permission 

15. If you remove all the repeating groups or arrays from a database, which form is the database now in? 0 

A. Fourth normal 

B. Second normal 

C. First normal 

D. Third normal 

16. Of the seven types of normal forms, how many are considered the most critical for creating a working database? 

A. 3 

B.5 

C.2 

D.4 

17. A role is a collection of permissions, while a schema is a collection of 

A. procedures 

B. objects 

C. attributes 

D. reports 

18. Which keyword should you use to Ffrovide a substitute name for a column? 

A. AS 

B.UPDATE 

C. ORDER 

D. SELECT

19. When checking the database, you confirm that the “Enforce Foreign Key Constraint” property is set to “Yes,” as expected. What property this constraint create for the database? 

A. Referential integrity 

B. Data redundancy 

C. Third normal form 

D. Functional dependency

20. If you wanted to assign a user the permission to create set 

A. db_backupoperator 

B. db_securityadmin 

C. db datawriter 

D.db accessadmin 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

urgent 1

 

Assignment 3 – Improving a Shell

In this assignment you shall take an existing implementation of a shell program and add some small improvements to it.

Preparation – Downloading, Compiling and Testing a simple Shell Implementation

Download and un-compress the following file: shell.tgz

The contents of the file are C sources that implement a simple shell. The contents are:

  • smsh.c – an implementation of a very simple shell program
  • smsh.h – a header file with function prototypes
  • execute.c – a set of helper functions for running processes within the program
  • splitline.c – some text processing utilities

To compile these sources run:

gcc -o smsh1 smsh1.c splitline.c execute.c

To run the shell type:

./smsh1

A prompt of the form “>” will appear and then you can type commands like:

> ls

execute.c  shell.tgz  smsh.h  smsh1  smsh1.c  splitline.c

> wc execute.c

      37    113      725  execute.c

The shell is terminated by typing the Control-D key (which signals end of input).

In this assignment you shall add functionality to this shell command. Each part builds upon the last. 

Part 1 – Adding the ability to pipe commands to your shell (30 marks)

At the moment smsh1 doesn’t support piping of commands. So, for example, if you type:

ls | wc

at the prompt you get:

ls: wc: No such file or directory ls: |: No such file or directory

Write a new program called smsh2.c that is based on smsh1.c which performs all of the shell operations of smsh1.c but also allows commands to be piped as above so that if you type:

ls | wc

You get output like: 

6       6      53

instead. You are free to add and modify files as required to accomplish this task. You must add a Makefile to your submission so that you can compile all the files for part1 by typing:

make part1

and the solution for part 1 can be run by typing:

./smsh2

Note, your program must still cater for all the behaviours that were correct in the original version of smsh1. You may find the lectures on piping useful in completing this part. 

Part 2 – redirecton of stdin and stdout (30 Marks)

Your version of smsh2 currently doesn’t support redirection of output and input of commands such as:

ls > tmp.txt cat < tmp.txt | wc > out.txt

Copy your smsh2.c program from part 1 to smsh3.c so that it can handle redirection of standard input and standard output (don’t worry about stderr) using the “>” and “<” symbols.  Again, you are free to add and modify files as required to accomplish this task (without affecting the ability of your code to correctly execute the behaviour required for part 1). You must add a Makefile to your submission so that you can compile all the files for part 2 by typing:

make part2

and the solution for part 2 can be run by typing:

./smsh3

Note, your program must still cater for all the behaviours that were correct in the original version of smsh2.

Part 3 – Adding Globbing – (20 marks)

Your version of smsh3 currently doesn’t support wildcards in command lines such as:

ls *.c cat *.h

Copy your smsh3.c program from part 2 to smsh4.c so that it can handle wilcard symbols in the command line. This expansion of wildcards is called globbing

Note, you can use the glob system call (type “man -s3 glob” to find out more) that helps you to expand the wildcards to a list of actual filenames. 

Again, you are free to add and modify files as required to accomplish this task (without affecting the ability of your code to correctly execute the behaviour required for previous parts). You must add a Makefile to your submission so that you can compile all the files for part3 by typing:

make part3

and the solution for part 3 can be run by typing:

./smsh4

Note, your program must still cater for all the behaviours that were correct in the original version of smsh3.

Detailed Submission Instructions

This assignment is basically like every other assignment you’ve ever done in CS… but just as a reminder:

The handin key for this exercise is: prac3. The following SVN commands will enable you to make a repository for this assignment. Please note the following:

  • Perform these steps in the order written once only!
  • Replace aaaaaa, where it appears in the commands, with YOUR student id.
  • Some commands are long — they must be typed on one line.

Use the Unix “cd” command to change to the place where you want your exercise directory to be stored, then type these commands:

svn mkdir  –parents -m “spc prac3 start” https://versioncontrol.adelaide.edu.au/svn/a1aaaaaa/2018/s1/spc/prac3

(creates this directory in your svn tree) svn co https://version-control.adelaide.edu.au/svn/a1aaaaaa/2018/s1/spc/prac3 .

(checks out a working copy in your directory) You can now begin work.

You can add a file to the repository by typing the commands:

svn add NAME-OF-FILE svn commit -m “REASON-FOR-THE-COMMIT”

where “reason-for-the-commit” should be some brief text that explains why you changed the code since the last commit. Note that you only need to add a file once — after that, SVN will “know” it is in the repository. You are now ready to commence working on the exercise.

The files you handin must include:

  1. Your C source files as specified above.
  2. A Makefile that will compile your C sources as specified above.

You do not have to include any of the add_one.c files or their variants… that you used for testing we will supply those. 

Make sure you commit your files frequently, in case you have an accident. The University’s SVN repository is very reliable, and is backed up regularly — your computer probably is not… Regular submission is also a good defence against plagiarism by others, since the submissions are dated. We will test the behaviour of your scripts using an automated tester. The tester is thorough, and will find places where your scripts do not work correctly. If it finds an error, it will offer a (vaguish) hint. To encourage you to test your own work, the tester will not be fully available in the first few days before the exercise deadline. 

The websubmission system will award up to 6 marks automatically. We will manually check the code for style and commenting and for code associated with the optional bonus exercise. Note that we reserve the right to deduct marks if your code does anything egregious or games the system to obtain marks.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion( Professional Writing and Proposal Development) DSRT

 

Overview: To avoid issues with self-plagiarism, you will focus on a “mock” dissertation topic to guide your work in professional writing. This “mock” dissertation topic CANNOT be used as your exact dissertation topic. However, it should be viewed as your practice round of setting up a study and learning the steps involved in building a high-quality dissertation.  In the discussion this week, you will indicate the topic you have chosen, the research question(s) you will use to explore the topic, and provide coaching to other classmates on their research questions.

As a reminder, here are the choices for your “mock” dissertation topic.

Students must choose from the listed topics of their school/program:

  • IT Students:
    • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
    • Using Data Science Techniques To Enhance Data Security

Directions:

  1. A brief discussion of the “mock” dissertation topic you chose and why.
  2. The research question(s) you will use to employ to explore the topic.
  3. A brief discussion of how you plan to design your study to answer the research questions from #3.

At least 500 words******

No Plagiarism***************

References****** 

APA Format *********

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Base Tips

I have to write a summary on Data Base tips by tonight @ 11pm . Please look at the png file for further information. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

110p2

Project Deliverable 2: Risk Assessment Outline and Certification Test Matrix Plan

For this deliverable you will generate the Risk Assessment Outline and the Certification Test Matrix Plan based on the results of the Potential Vulnerabilities Report created in Module 1.

Risk Assessment
Using the format in the Howard text on page 279, develop the Risk Assessment Outline. Insert this document as Appendix 2 in the SSP submitted in Module 1. 

Certification Text Matrix
Using the format in the Howard text on page 285, create a certification test matrix. Insert this as Appendix 3 in the SSP.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Basic Level AI

  

Exercise 1

In your local nuclear power station, there is an alarm that senses when a temperature gauge exceeds a given threshold. The gauge measures the temperature of the core. Consider the Boolean variables A (alarm sounds), FA (alarm is faulty), and FG (gauge is faulty) and the multivalued nodes G (gauge reading) and T (actual core temperature). 

a. Draw a Bayesian network for this domain, given that the gauge is more likely to fail when the core temperature gets too high. 

b. Is your network a polytree? Why or why not? 

c. Suppose there are just two possible actual and measured temperatures, normal and high; the probability that the gauge gives the correct temperature is x when it is working, but y when it is faulty. Give the conditional probability table associated with G. 

d. Suppose the alarm works correctly unless it is faulty, in which case it never sounds. Give the conditional probability table associated with A. 

e. Suppose the alarm and gauge are working and the alarm sounds. Calculate an expression for the probability that the temperature of the core is too high, in terms of the various conditional probabilities in the network.

Exercise 2

Consider the problem faced by an infant learning to speak and understand a language. Explain how this process fits into the general learning model. Describe the percepts and actions of the infant, and the types of learning the infant must do. Describe the subfunctions the infant is trying to learn in terms of inputs and outputs, and available example data.

Exercise 3

Complete the missing step in the derivation of Equation (15.19) on page 586 of the textbook, the first update step for the one-dimensional Kalman filter.

Exercise 4

Consider an arbitrary Bayesian network, a complete data set for that network, and the likelihood for the data set according to the network. Give a simple proof that the likelihood of the data cannot decrease if we add a new link to the network and recompute the maximumlikelihood parameter values.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Boards

11 Discussion Boards 

Each on is 400 to 600 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CSS HTML

 Please provide an elaborate answer on each of the following questions

1. What are the advantages of using CSS? 

2. How to include CSS in the webpage? 

3. What are the different types of Selectors in CSS? 

4. Difference between reset vs normalize CSS. How do they differ? 

5. What are the validation controls explain the use of validation controls? 

6. What are types of validation controls? 

7. What are the important features of Web services? 

8. What is WSDL? 

Your work needs to be well written and have quality information. Your
work must be clear and must be able to educate someone with no prior
knowledge in the field of web technology. Assignment Evaluation Rules: 

 Overall presentation 10% 

 Structure 10% 

 Introduction 10% 

Main body 1o 

Critical analysis/evaluation 50% 

Recommendations 10% 

Conclusion 10%

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now