lex programming

 Q.1. Write a Lex input file that will produce a scanner that capitalizes all comments in a C program. Moreover after replicating its input program in the terminal (or in a file), the scanner should append the total number of comments to its output. Your scanner should be able to accept optional command line arguments to indicate the input and output filenames. Please consider using toupper(char c) from  to convert to uppercase. 

 Q.2. Write a rule in Lex to print integer numbers that are multiple of five. The numbers are allowed to have an optional sign (+/-). You are not neither allowed to convert the matched strings into integers, nor to use the modulus operator (%) in your rule. And  Give only the rule section of a Lex input file for a scanner that prints only all the letters in its input on screen, and ignores everything else. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Malware Analysis & Mitigation

 install one of these tools of your choice and experiment.   Afterward, write a brief summary concerning this tool.  Since this is a Master’s level course, I will expect your submissions to be in APA Style.  Double Spaced in Times New Roman 12pt. font and if you use any references please cite them per APA guidelines.  I would also expect to see screenshots of your work. Please, include why did you choose the tool that you chose.   Also, describe the tool and what functions it performs.  Did you find it helpful?  Was it easy to use?  What is your opinion on the tool? Your summary should be 3-4 pages long not including a title page and reference page. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Panda challenge 1

After a lot of hard work in the data munging mines, you’ve landed a job as Lead Analyst for an independent gaming company. You’ve been assigned the task of analyzing the data for their most recent fantasy game Heroes of Pymoli.

Like many others in its genre, the game is free-to-play, but players are encouraged to purchase optional items that enhance their playing experience. As a first task, the company would like you to generate a report that breaks down the game’s purchasing data into meaningful insights.

Your final report should include each of the following:

Player Count

  • Total Number of Players

Purchasing Analysis (Total)

  • Number of Unique Items
  • Average Purchase Price
  • Total Number of Purchases
  • Total Revenue

Gender Demographics

  • Percentage and Count of Male Players
  • Percentage and Count of Female Players
  • Percentage and Count of Other / Non-Disclosed

Purchasing Analysis (Gender)

  • The below each broken by gender
    • Purchase Count
    • Average Purchase Price
    • Total Purchase Value
    • Average Purchase Total per Person by Gender

Age Demographics

  • The below each broken into bins of 4 years (i.e. <10, 10-14, 15-19, etc.)
    • Purchase Count
    • Average Purchase Price
    • Total Purchase Value
    • Average Purchase Total per Person by Age Group

Top Spenders

  • Identify the the top 5 spenders in the game by total purchase value, then list (in a table):
    • SN
    • Purchase Count
    • Average Purchase Price
    • Total Purchase Value

Most Popular Items

  • Identify the 5 most popular items by purchase count, then list (in a table):
    • Item ID
    • Item Name
    • Purchase Count
    • Item Price
    • Total Purchase Value

Most Profitable Items

  • Identify the 5 most profitable items by total purchase value, then list (in a table):
    • Item ID
    • Item Name
    • Purchase Count
    • Item Price
    • Total Purchase Value

As final considerations:

  • You must use the Pandas Library and the Jupyter Notebook.
  • You must submit a link to your Jupyter Notebook with the viewable Data Frames.
  • You must include a written description of three observable trends based on the data.
  • See Example Solution for a reference on expected format(attachment).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Design

Proper network design provides for layered security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network (pivoting).

  1. Using Microsoft Visio or online network diagraming tools, as identified in the required readings, diagram a secure network design for an enterprise network
  2. An enterprise network is defined as 1000+ clients for various corporate departments, 50-100 servers providing typical network services, network infrastructure using layer 3 switches, and layered routing to provide separation of subnets.
  3. Your diagram at a minimum should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
  4. In 250-500 words, describe your design and how it follows the concept of “Layered Security.” Include your diagram within the description for reference.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer architecture FEB 8

Assignment Content

  1. We are now in Week 4 so you all should be more familiar with the Architectural components and processes of a computer. To further enhance your knowledge on this topic, you will be answering the questions below.   Remember to format your work in an APA style (Cover Page is a Must) and provide proper citation and references for the paper. Plagiarism is not allowed and I will give you an automatic zero if I discover that any part of your work was plagiarized either from the internet or another student’s paper.   For this week’s assignment, Please provide a write-up as an answer to the question below;  
    • Compare the computer architecture of modern processors from two different vendors in terms of memory, speed and expansion bus.
    • Explain the concept of virtual memory and its role in memory management and in memory protection.
    • Provide any five differences between logical addressing and physical addressing in operating systems.
    • What are the benefits of using scripts to automate operating systems tasks?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…      

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 213 DB 5

1 page apa format

Using a project that you have experience with, that of a family member or friend, or one from your own research to clarify your answers, discuss:

  • Why estimating time and cost is important to the project.
  • What you think is difficult about estimating the project times.
  • What you think is difficult about estimating the project costs. Explain why you think this is difficult.

Cite all sources. Additionally, please respond to two other classmates’ posts. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 222 DB 5

 1 page apa format 

Unit 5 DB: Protection Manager

You have decided that the complexity of the corporate network facility and satellite offices warrants the hiring of a dedicated physical security and facilities protection manager. You are preparing to write the job requisition to get this critical function addressed and have solicited some ideas from the PCS working group members regarding physical and environmental security risks.Discuss the operational security functions that the physical security and facilities protection manager would be responsible for. Discuss how these functions would inform the development and implementation of system related incident response plans. Further discuss how these incident response plans fit into business continuity planning. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discuss how the concepts improve the security posture of PCS. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

topic: Challenges in utilizing Artificial Intelligence in Business Entities

Assignment Content

  1. At this point, you have found a research article exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class .

    For this assignment:  You will use your research article from Week 4’s HW to write your first objective summary. 
    Requirements:

    • 15 pts, Cover/Title Page 
    • 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS 
    • 15 pts, References Page (you will only have one reference listed — the research article you are using.) 
    • Resources to help you:
    • Re-watch the class recording
    • See pp. 17-22 to read about objective summaries
    • See pp. 23-28 to read more about avoiding plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Implementing Security Audits

 Discuss whether internal security audits are enough for an organization or do they need to perform external audits as well. Also discuss in which scenarios the external audits are mandatory to perform. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now