Learning Journal/Python 1

 

Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want. 

Design the dictionary so that it could be useful for something meaningful to you. Create at least three different items in it. Invent the dictionary yourself. Do not copy the design or items from some other source. 

Next consider the invert_dict function from Section 11.5 of your textbook. 

# From Section 11.5 of: 
# Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. 

def invert_dict(d):
     inverse = dict()
     for key in d:
          val = d[key]           if val not in inverse:
               inverse[val] = [key]           else:
               inverse[val].append(key)
     return inverse 

Modify this function so that it can invert your dictionary. In particular, the function will need to turn each of the list items into separate keys in the inverted dictionary. 

Run your modified invert_dict function on your dictionary. Print the original dictionary and the inverted one. 

Include your Python program and the output in your Learning Journal submission. 

Describe what is useful about your dictionary. Then describe whether the inverted dictionary is useful or meaningful, and why. 

PART 2 

 

Describe how tuples can be useful with loops over lists and dictionaries, and give Python code examples. Create your own code examples. Do not copy them from the textbook or any other source. 

Your descriptions and examples should include the following: the zip function, the enumerate function, and the items method. 

COMPUTER SCIENCE

Read the four detectives reports and the combined affidavit and warrant for the m57 patents case. Write a one -to -two-page paper describing the evidence the police found and explaining whether they had enough information for the search warrant. Did the information justify taking all the computers and USB drives? WHY or WHY NOT?

TWO PAGES AND NO PLAGIARIASM

cpsc 1050 networking data packets

 

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.
  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2.
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario.

Exp19_Access_Ch02_Capstone – International Foodies 1.0

Exp19_Access_Ch02_Capstone – International Foodies 1.0

Exp19 Access Ch02 Capstone – International Foodies 1.0

EX19_AC_CH02_GRADER_CAP_HW

Project Description

International Foodies is an importer of exotic foods from all over  the world. You landed a summer internship with the company and  discovered that their product lists and the suppliers they buy from are  stored in Excel workbooks. You offer to help by using your newly gained  knowledge of Access to create a relational database for them. You will  begin by importing the workbooks from Excel into a new Access database.  Your manager mentions that she would also like a table that specifies  food categories so that you can relate the products you sell to specific  categories in the database. You will create a table from scratch to  track categories, create relationships between the tables, and create  some baseline queries.

Start Access. Open the downloaded   Access file named Exp19_Access_Ch2_Cap_Foodies.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

You   will examine the data in the downloaded Excel worksheets to  determine which   fields will become the primary keys in each table and  which fields will   become the foreign keys so that you can join them in  the database.
 

  Open the Suppliers.xlsx Excel   workbook, examine the data, and close the workbook. Open the Products.xlsx Excel workbook, examine   the data, and close the workbook.
 

  You will import two Excel workbooks that contain supplier and product   information into the database.
 

  Click the External Data tab, click   New Data Source, point to From File in the Import & Link   group, and then select Excel.   Navigate to and select the Suppliers.xlsx   workbook to be imported as a new table in the current database. Select First Row Contains Column Headings.   Set the SupplierID field Indexed option to Yes (No Duplicates). Select SupplierID   as the primary key when prompted and accept the table name Suppliers. Do not save the import   steps.

Import   the Products.xlsx workbook, set the   ProductID Indexed option to Yes (No   Duplicates), and select ProductID   as the primary key. Accept the table name Products.

Change   the Field Size of the QuantityPerUnit field to 25   in Design view of the Products table. Set the Field Size of ProductID and   CategoryID to Long Integer.  Save   the changes and open the table in Datasheet view. Open the  Suppliers table in   Datasheet view to examine the data. Close the  tables.

You   will create a new table that will enable International Foodies  to associate   each product with a food category in the database.
 

  Create a new table in Design view. Add the following fields in Design view   and set the properties as specified:
 

  Add the primary key field as CategoryID   with the Number Data Type and Number assigned to a new category.   (type the period) as the Description. Set the Caption property to Category ID.
 

  Save the table as Categories.
 

   Add CategoryName with the Short Text Data Type and Name of food   category.   (type the period) as the Description. Change the field size to 15. Set the Caption property to Category Name and the Required property to Yes.

Add   CategoryDescription with the Long Text Data Type. Set the Caption property to Category Description. Switch to Datasheet view and save the   table when prompted. You will enter Category data into the table in the next step.

   You will add 8 records to the Categories table so that you have some sample   data to test in the database.
 

  Add the following records to the Categories table:

Category   ID Category Name   Category Description 

1 BEVERAGES SOFT DRINKS, COFFEES, TEAS 

2 CONDIMENTS SAUCES, RELISHES, SEASONINGS

3 CONFECTIONS DESSERTS,   CANDIES, SWEET BREADS

4 DAIRY   PRODUCTS CHEESES

5 GRAINS/CEREALS BREADS, PASTA, CEREAL

6 MEAT/POULTRY PREPARED   MEATS

7 PRODUCE DRIED FRUIT, BEAN CURD

8 SEAFOOD SEAWEED AND FISH
 

   Close the table.
 

You will create   the relationships between the tables using the Relationships window.
 

  Add all three tables to the Relationships window. Identify the  primary key   fields in the Categories table and the Suppliers table and  join them with   their foreign key counterparts in the related Products  table. Select the Enforce Referential Integrity and Cascade Update Related Fields check boxes.   Save and close the Relationships window.

You   will use the Simple Query Wizard to create a query of all products that you   import in the seafood category.
 

  Add the ProductName, SupplierID, and CategoryID fields from Products (in that order). Save the query   as Seafood Products.

Add   a criterion in Design view, to include only products with 8 as the CategoryID.

Sort   the query results in ascending order by ProductName. Run, save, and close the   query.

You   want to create a query that displays actual category names  rather than the   CategoryIDs. You are interested to know which meat and  poultry products are   imported. You will copy the Seafood Products  query and modify it to delete a   field, then add an additional table  and field.
 

  Copy the Seafood Products query   and paste it using Seafood Or Meat/Poultry   as the query name.

Open   the Seafood Or Meat/Poultry query   in Design view and delete the CategoryID   column.

Add   the Categories table to the top   pane of the query design window. Add the CategoryName   field to the last column of the design grid and set the criterion as “Seafood” Or “Meat/Poultry”.   Run, save, and close the query.

You   will create a query that identifies suppliers and their  associated products.   Because there is a relationship between the two  tables, you can now pull data   from each of them together as usable  information.
 

  Create a query in Design view that includes the Suppliers and Products    tables. The query should list the company name, contact name, phone  (in that   order), then the product name and the product cost (in that  order).

Sort   the query by company name in ascending order, then by product  cost in   descending order. Run, close, and save the query as Company by Product List.

You   determine that the data in the Company by Product List query  could be   summarized with a Total row. You will group the records by  company name, and   then count the number of products you buy from each  of them.
 

  Copy the Company by Product List query   and paste it using Summary of Company by   Product   as the query name.

Open   the Summary of Company by Product   query in Design view and delete the ContactName, Phone, and ProductCost columns.

Click   Totals in the Show/Hide group on   the Query Tools Design tab. Click in the Total   row of the ProductName field, click the arrow, and then select Count.   The records will be grouped by the company’s name and the products for each   company will be summarized.

Modify   the field name of the ProductName column as Product Count:   ProductName to make the field name more   identifiable. Click Run  in the   Results group (20 records display in the Datasheet). The  results display the   product count for each company that supplies your  organization. Save and   close the query.

Assignent

Answer the following three exercises taken from Ch3. Use your own words as much as possible (based on chapter information), as SafeAssign will be used to check for plagarism. Spelling and grammar count. Please give sufficient detail for each answer (think paragraphs, not short single sentences).

  • Explain how the principles underlying agile methods lead to the accelerated development and deployment of software. 
  • Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
  • Why is it necessary to introduce some methods and documentation from plan-based approaches when scaling agile methods to larger projects that are developed by distributed development teams? 

The link for the online slide version of the book is as follows : https://www.slideshare.net/software-engineering-book/ch3-agile-sw-dev

COSO

 

  1. The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 
    Your paper should meet the following requirements:
    • Be approximately four to six pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

Write a three-page paper on the Brave Browser. Be sure to include a References page. The Title page and References page do not count as part of the three-page requirement for this assignment.

Solved Exp19_Excel_Ch08_Cap_Golden_State_5K

  Exp19_Excel_Ch08_Cap_Golden_State_5K

Project Description:

You are a volunteer for the Golden State 5k, an annual 5k held across several cities in California to raise money for at risk youth. As part of your duties, you track donations, volunteer information, and race results. This year you have decided to use Excel to calculate frequency distribution by age and time, calculate various descriptive statistics, and forecast participation rate as well as donation rate for 2025.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch08_Cap_GoldenState5k.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Ensure the RaceResults worksheet   is active, then use the FREQUENCY function to calculate the frequency   distribution of the race results in column D. Place your results in the range   G4:G9.

 

Enter a function in cell F22 to   calculate the correlation between age (Columns C) and race time (Column D).

 

Enter a function in cell G22 to   calculate the covariance between age and race time. 

 

Enter a function in cell H22 to   calculate the variance of the ages in the data set. Note this is a sample of   data not a population.

 

Enter a function in cell I22 to   calculate the standard deviation of the ages in the data set.

 

Ensure the Data Analysis ToolPak   add-in is active. Use the Data Analysis ToolPak to create a histogram with   chart output starting in cell H12 based on the ages of the runners surveyed.   Use the range F13:F18 as the Bin Range. Ensure that Chart output and   Cumulative percentage is included in the results. Place the upper left hand   corner of the chart in cell L13.

 

Ensure the VolunteerInfo   worksheet is active. Use the Data Analysis ToolPak to perform a single factor   ANOVA on the range C5:E21 (Including column lables). Place the results   starting in cell G5. 

 

Create a Forecast Sheet that   depicts year over year growth in participation for the city of Los Angeles.   Set the Forecast end year as 2025 and place the results on a new worksheet named 2025Forecast.

 

Ensure the Participants   worksheet is active then create a scatter plot chart that places the   Participant observations on the X axis and the Donation dollars on the Y axis   (do not include column headings). Add the chart title Participant   Forecast and a   linear trendline to the chart that also shows the Equation and the R-square.

 

Enter a function in cell F6 to   calculate the intercept of the linear trendline created in the prior step.

 

Enter a function in cell G6 to   calculate the Slope of the linear trendline.

 

Enter a function in cell H6 to   calculate the R-square of the linear trendline.

 

Enter a function in cell I6 to   calculate the Standard Error. 

 

Use the FORECAST.LINEAR function   in cell F9 to forecast potential donations once the goal of 20,000   participants is reached. Format the results as Currency.

 

Complete your analysis by adding   formulas in the range G9:H9 to calculate the high and low thresholds of the   forecast.

m-discussion

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?