Answer for HW11 and HW12
C coding
For this assignment, you will create the following files. You will submit them by pushing it to your Github repository for class.
0. **readme.md** a readme markdown file (provided)
1. **code/vector3D.c** where you will put your function definition
2. **code/vector3D.h** where you will put your function prototype and struct definition
3. **code/Makefile**
4. **code/main.c** where you will define a main program that runs some tests of your functions
5. **writeup/writeup.pdf** where you will write up your results
6. **writeup/references.pdf** where you will write a list of your collaborators and any references you used.
2. **Define a 3D vector struct:** Define a struct called vector3D in code/vector3D.h. The struct should have 3 float values (called x, y, and z).
2.5. Reminder: commit your changes.
3. **Define prototype in header file:** In code/vector3D.h, define the prototype of a function called norm that calculates the Euclidean norm $$sqrt{x^2 + y^2 + z^2}$$ of any vector with 3 entries. The output should be a float, and the function should take one input: a vector3D struct.
4. **Implement the norm:** In code/vector3D.c, implement the function called norm, using the same input and output types as specified in the corresponding prototype. Note that you’ll need to use the standard math library and include the math header file to call the function that calculates a square root.
4.5. Reminder: commit your changes.
5. **Write a test:** In code/main.c, write a main program to:
* Create a vector3D struct called aVec which has (1, -4/3, 0) as its (x,y,z) components.
* Calculate n, the Euclidean norm of aVec. Print out “Output of norm function, n is ” followed by the n value you calculated. We know from pencil-and-paper math that $$sqrt{(1)^2 + (-4/3)^2 + (0)^2} = 2$$. (Writeup question #1: What does it output?)
* Print out “Is n exactly equal to 5/3?” followed by the boolean result of checking exact equality of 5.0/3.0 and n. (Writeup question #2: What is the result? Why might that be?)
* Print out “Difference between n and 5/3 is ” followed by the difference between 5.0/3.0 and n, being sure to use scientific notation with %.10e formatting when you print it out. (Writeup question #3: How large is the difference between 5.0/3.0 and n? Explain why this does or doesn’t make sense.)
5.5. Reminder: commit your changes.
6. **Makefile rule to compile:** In code/Makefile, write a rule called **buildMain** to compile the code using the gcc compiler with no optimizations and output a binary called main. You’ll need to include the flag for the math library. (Writeup question #4: Draw a diagram on less than half a page illustrating what the compiler does with main.c, vector3D.c and vector3D.h) Before moving on to step 7, first make sure that your code compiles.
7. **Makefile rule to run tests:** In code/Makefile, write a rule called **run** to run the main test and print out results to the command line.
7.5. Reminder: commit your changes.
8. **References:** In writeup/references.pdf make a list of any references you use and any collaborators you worked with (no matter if you helped them or they helped you). Note that you must also include a comment on any line of code that is based on code from class or a reference.
Hint: on the writeup and references documents, don’t just make a .txt file then rename it to .pdf. Literally make a pdf on your computer that can be opened with a pdf viewer, then add those to your repo.
9. **Writeup:** In writeup/writeup.pdf answer the 4 writeup questions using complete sentences.
9.5. Reminder: commit your changes and **don’t forget to push**! Delete all executable files.
10. **Submit:** You should have been committing code changes regularly. Go to the GitHub website those changes are pushed to GitHub and that your repository is linked to the course’s GitHub Classroom.
Cgs1000
I have online work to do in excel it’s easy but time consuming please help simnet assingments I’m through blackboard
Discrete structures
Chapter 1
1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)
1.3 (1, 2, 3, 13, 14)
Chapter 2
2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)
2.2 (1, 2, 3, 4, 5, 6, 9, 10)
2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)
Research
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!
Kaggle Website:
https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge
Assignment Length (word count): at least 15 pages.
References: At least 10 peer-reviewed, scholarly journal references.
Access Control- Crime Prevention Through Environmental Design (CPTED)
Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.
Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).
For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.
Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.
Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course
Assignment 1 Vulnerability Assessment Template.docx
Also review the additional files attached for detailed information on Vulnerability Assessments.
POST1
Please check attachment!!
Lake Point Security Consulting
“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.
Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides” (Ciampa 368-369).
You will create a PowerPoint presentation for a fictitious company regarding wireless security. Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to Tech Republic Article about Powerpoint (Links to an external site.) for proper use of developing presentations in PowerPoint. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.
IA week5 DB
Hello,
i need this paper by 09/23 afternoon.
Strictly No plagiarism please use your own words.
Describe three authentication types and give an example of each.
Your post should be at least 350 words.
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
Web application using ReactJS
You are a graduating software engineer who is looking to apply to a few software engineering positions at various Fortune 500 companies. You decide to make a personal portfolio website that showcases some of your work so that you stand apart from the other applicants.
Using React, create a web application that has the following:
- A home page with a short description of yourself, what you are looking for in a position, and one project that you’ve worked on.
- A contact page with a text box and a submit button that shows a success message when the user submits a query.
- A navigation bar and footer.
You must use client side routing to handle page navigation.