Analysis of Algorithms

 1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).

 b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course). 

2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for

 a. lists represented as arrays.

 b. lists represented as linked lists.

 3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop

 b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue 

Network Protocol

 What is your favorite protocol?  What port does it use?  Does it use TCP or UDP?  Are there any sibling/parent protocols for it?  Please give a detailed explanation of the protocol you have chosen.  Responses should be 3-4 paragraphs in length and include a minimum of two sources cited in the response and referenced in APA format the bottom of your post. 

cloud computing security and integrity

  

The research project will focus on research related to a cloud computing in financial industry ( capital one bank ) Pre-work on the project including the proposed Title and Outline should be emailed to the professor early for review and acceptance on Saturday afternoon.  The team should then begin to work on the project Saturday afternoon of the residency to be sure it can be completed during the Residency weekend. 

Hints :

Take capital one bank as a example case study.how they use aws to continue their business and what difficulties did they face etc…, how is their security with in cloud ?

Requirements for the research paper include… 

• Must be written in APA format and should be 20-25 pages long. 

• Contain at least 3-5 works cited (references)

• At least 2 of the works cited should be peer-reviewed articles ( not more than 5 years old)

• No Wikipedia citations

Database

Database
1.What is the Database transaction?
2.Define Database Lock and its types.
3.What is Data Warehousing?
4.What do you understand by Join?
5.What do you understand by Index hunting?
6.How to improve query performance using Index hunting?

The Center for Disease Control and Prevention (CDC) uses the social vulnerability index (SVI) to evaluate the impact of disasters on communities, weighting the damage with social factors in the states of South Dakota and Indiana (CDC, 2018a; CDC 2018b).X

Each community requires independent evaluation to identify the vulnerability of the area. Two of the contributing factors for this analysis are minority status and language limitations. The data may lack credibility due to the fear of reprisal for persons that fall into these categories. Exploring the social and physical characteristics, excluding these metrics can provide insight on the overall impact on the SVI.

Question 1: What impact does the exclusion of the metrics that represent minorities and language limited individuals have on the predictability of the CDC’s SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 2: Does the CDC’s SVI have key characteristics that impact the preclude potential exclusion without limiting the overall predictability of the SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 1: What impact does the exclusion of the metrics that represent minorities and language limited individuals have on the predictability of the CDC’s SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 2: Does the CDC’s SVI have key characteristics that impact the preclude potential exclusion without limiting the overall predictability of the SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Please refer file attached for more detail, looking for a paper of 800 words.

Internet of things

I need help with my project the title is Internet of things 

I need paper with 10 pages 2 for the front & End and 8 for the project 

also I need a paper for the outline.

Discussion Post-quantitative risk

 

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

IT and Organization Learning

Discussion: This week we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important.