Golang Chat Server Using Go Rpc Package

Requirements of Chat Server Go program:

1.  The program must be written in Go.

2. The server should be able to read short messages from clients concurrently (at the same time) and enable other participants to respond quickly. The communication should be similar to that of a spoken conversation, unlike apps such as those for forums and email.

3. Let multiple people talk at the same time on the Chat server.

4. Anything said is seen by everyone unless the sender specifies that the message is a PM (private message) and names the receiver.

5. Make the chat app extensible. To add more features we should be able to implement and export a server-side method and write a client stub which calls the exported method over RPC.

6. Test your program to see that the Request and Reply, and the PM work. Use the Go Testing program for doing this.

7. User Requests should include a Request to join the Chat Room, get and display unseen messages including PM.

8. Use the Go RPC package for implementing remote procedure calls in Go including the implementation of a client-server interface with the server by the client.

9. Register the program with an HTTP handler in the RPC package and turn the terminal program into a Web Service that handles HTTP requests through a TCP Listener. See HandleHTTP and DialHTTP in Go RPC package. 

Submit the Go source code, a ReadME file with the compile and run options that you use, and submit a file containing the sequence of input strings that you use as client messages to the Chat server. Zip the files submitted into one .zip file using 7-zip.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

5-2 Information Technology Risk Analysis and Cyber Security Policy Assignment, Part 2

 Submit your creation of a cyber-security policy. (Please note: You must use the information that was identified in the risk analysis paper and create an organizational cyber-security policy.) The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. 

The paper is pertaining to the Twitter data breach that happened earlier this year. No need to go back over the breach but rather a policy to mitigate the security issues within the workplace as identified above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

domain model class diagram

  1. Read the narrative on Acme Electric, LLCPreview the document.
  2. Create a domain model class diagram for Acme Electric, LLC’s proposed Job Management Application.
  3. Using Lucidchart
  4. saved as PDF 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CAseStudy 5

Read Aggressive Sales Quotas or Unfair Business Practice? and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/aggressive-sales-quotas-or-unfair-bus-practice/

Discussion Questions:

  • Describe, specifically, the ethical dilemma that Peter faced.
  • What are virtues Peter needed to act as he did? What do you think motivated him?
  • What were the risks Peter faced in making this decision?
  • What factors do you think assist people in making moral decisions in the face of a great deal of pressure?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python Coding

 

Problem 1: Create a Python program to solve a simple pay calculation. Calculate the amount of pay, given employee name, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Display employee name, hourly rate, hours worked, and pay. (Do not add any rules such as overtime)

Problem 2: Create a Python program to calculate the average miles per gallon obtained on a trip. Input car name, the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Display car name, gas used, miles driven and MPG. Use your own values to test the. You can hard code the values or you can use the input() function. See announcement  for sample code.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.

 

Week 15 Discussion

After completing the reading this week, we reflect on a few key concepts this week:

Discuss Howell and Mendez’s three perspectives on follower-ship. Note how these behaviors influence work productivity.

What is the big five personality model?

What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Expand on the topic, by adding additional thoughtful information

Answer a question posted by another student in detail

Share an applicable personal experience

Provide an outside source

Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python coding (flowchart & Pseudo code)

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project management with make

 the question is 

 

The code in project2 is for a program that plays a simple game called Chomp.

The programmers of this project have opted to package some of their code in a “module” called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated.

The steps necessary to produce this program are:

  1. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx00 to cookie.h.
  2. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx01 to cookie.cpp.
  3. Compile cookie.cpp to produce cookie.o.
  4. Compile mainProg.cpp to produce mainProg.o.
  5. Link the the .o files to produce an executable program named playChomp

Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch.

_________________________________________________

I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile:

all: cookie.h cookie.cpp playChomp cookie.o mainProg.o

cookie.h: chomp.adt
csplit chomp.adt “/Split Here/”
cp xx00 cookie.h
cp xx01 cookie.cpp
 

playChomp: cookie.o mainProg.o
g++ -o playChomp cookie.o mainProg.o

cookie.o: cookie.cpp
g++ -c cookie.cpp

mainProg.o: mainProg.cpp
g++ -c mainProg.cpp

However, I am receiving this error code:

Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed:
csplit chomp.adt “/Split Here/”
1372
8632
cp xx00 cookie.h
cp xx01 cookie.cpp
g++ -c cookie.cpp
g++ -o playChomp cookie.o mainProg.o

is there anything that I can do to fix my makefile?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Flow Chart/Pseudocode

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 3 – User Management and Authentication

  

Part 1: Create Groups

The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted. 

1. Step 1 – Groups Screenshot

Part 2: Manage Role-Based Access Control (RBAC) Roles

The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted. 

1. Step 1 – Helpdesk Administrator – Michael Pattis

2. Step 2 – Global Administrator – Sudan Pandya

Part 3: Examine User Login Activity

The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted. 

1. Step 1 – User Sign-ins Activity

Part 4: Azure Active Directory Password Reset

The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted. 

1. Step 1 – Selected User Password Reset

Part 5: Azure Active Directory Banned Passwords

The recommended format is to provide screenshots incorporated within the written narrative. No external sources are required for this phase of the project; however, the screenshots must be your own. Screenshots from external sources are not permitted. 

1. Step 1 – Banned Password Policy

Part 6: Authentication

The Opportunity: Basic Authentication and Moden Authentication 

· Discuss in a few paragraphs the differences between basic authentication and modern authentication in the content of Microsoft 365 tenant. What authentication method should KCoder implement and why?

References

These sample citations use the IEEE style. Ensure you use in-text citations in the body of your paper as appropriate.

[1] “Microsoft 365 for enterprise overview.” 09, September 2020 [Online]. Available: https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-overview?view=o365-worldwide [Accessed January 1, 2020]. 

Resources

Azure Active Directory Groups: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-groups-create-azure-portal

Azure AD Roles: https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-manage-roles-portal

Azure Self Service Password Reset – https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment

Azure Active Directory Banned Passwords: https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-configure-custom-password-protection

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now