Python,R

Write R code to load the following data.

To download the data.

Submit the screenshot and codes in MS word

Virtual Business in Global Marketing

  1. Locate two sources concerning managing currency risks or inflation and devaluation in global supply chains to provide you with background information to answer the key questions below. Cite sources as applicable.
  2. Write an initial response to the following key question(s) or prompt(s):
    1. From your readings, what are the two key currency risk factors of global supply chain
  3. For by the grace given me I say to every one of you: Do not think of yourself more highly than you ought, but rather think of yourself with sober judgment, in accordance with the faith God has distributed to each of you (Romans 12:3). (elaborate this point and discuss more on this)

Need 3 reference for each point with inline references with atleast 500 words

CS 3377 Project

The goal: create several versions of a process that updates and saves a binary file as a new file.

The Setup

This project will be done in 4 parts. To keep them separate, I implemented a factory pattern so

that you (and the autograder) can test each copying method separately. It will look like this:

FileModifierFactory: creates

1. Part1SimpleFileModifier: fill in during part 1

2. Part2MultiProcessModifier: fill in during part 2

3. Part3ThreadedModifier: fill in during part 3

4. Part4SocketModifier: fill in during part 4

You will be given (and not need to modify):

1. main.cpp. Launches the appropriate test based on the arguments

2. Util.cpp/h. Includes some useful attributes.

3. FileModifierFactory.cpp & .h. These build the proper PartXModifier based on

the argument.

4. PipeCopier.cpp & .h. Helps you with the pipe for part 2.

While each part will be tested separately, you are encouraged to reuse code as much of it will

be useful for multiple parts.

The File

The file you are to read, modify, and save is a binary file that contains a sales list. A binary file is

a non-text file, meaning some things (like numbers) aren’t stored as digits but as the ints/floats

you use as variables. The name of the files to read and write will be in Util.h.

The file will be structured like this:

Field

Size

HEADER

NumEntries

4 bytes

Type Purpose

Integer Tells you how many

entries you need to

read

Timestamp (#

seconds since

1/1/1970)

Item’s code

Name of the item

sold

ENTRY (repeated

NumEntries times)

Date/Time sizeof(time_t) Time

Item ID

Item Name Sizeof(int)

50 bytes Integer

char*Item Quantity

Item Price

Sizeof(int)

Sizeof(float)

Integer

Float

Number sold

Price of the

products

What You’ll Do

In each part, the goal is to copy the file, adding two additional sales:

1. The Sobell book:

a. Time 1612195200 (2/1/2020 4 PM GMT)

b. ID 4636152

c. Name “A Programming Guide to Linux Commands, Editors, and Shell

Programming by Sobell” [warning: this is more than 49 characters, so you have

to truncate it—I say 49 because you need a null terminator]

d. Quantity: 70

e. Price: 70.99

2. The Advanced Programming book

a. Time 1613412000 (2/15/2020 6 PM GMT)

b. ID 6530927

c. Name “Advanced Programming in the UNIX Environment by Stevens and Rago”

[warning: more than 49 characters again]

d. Quantity: 68

e. Price: 89.99

Be sure to update the total number of entries to account for these new ones.

Part 1 (Due 3/29)

You will read in the file (Util::inputFileName), add the two entries, and save the file

(Util::outputFileName) using open(), close(), read(), and write().

You must use the low-level functions we will talk about in APUE chapter 3 (open, close, read,

write). Failure to do so will result in 0 points for this part of the project.

It is highly recommended that you do the file reading and writing in class(es) outside

Part1SimpleFileModifier, as that code will be useful later.

Part 2 (Due 4/12)

In this case you will spawn a new process using fork() and exec(), and split the responsibilities

like this:

1. The original process will read the file (2 nd argument=2) and then write the data over a

pipe to the child process.

2. The child process will read the file from the pipe (which will be set to standard input)

and write the data to the output file.

3. PipeMaker will take care of the pipe setup for you:a. Create PipeMaker before the fork.

b. In the parent process, call setUpToWrite() to ready this process for writing. You’ll

get back the file descriptor to write to. Write the file data to that file descriptor

(hint: it’s just like writing to a file).

c. In the child process, before execing, call setUpToRead() to dup the pipe output

to standard input. You can then exec the process (21S_CS3377_Project) with the

write option (2 nd argument=3), read the data from standard input (just a file

descriptor, remember!), and write to the output file.

d. Either the parent or the child process can do the update (but not both,

obviously).

When calling exec, use the command 21S_CS3377_Project 2 3. This will trigger main to

give you the proper setup for the child process. You will be responsible for spotting the

Util::IOType of WRITE (3), and read from standard input rather than the input file.

Part 3 (Due 4/26)

In this part you will create a thread and pass the file data from one thread to the other. The

threads will be like this:

1. Main thread: read the data, create the thread, and pass the data along

2. Created thread: receive the data and output it to the file

I did all of this inside of Part3ThreadedModifier. Create a mutex and condition for both threads

to share, and pass a pointer to the Part3ThreadedModifier object to pthread_create (and read

it in the other thread). Then you can use the shared mutex and condition to coordinate passing

the data.

The easiest way to pass the data is to use a variable inside Part3ThreadedModifier (type

EntryInfo). The main thread should lock the mutex before creating the receiving thread (and the

receiving thread should attempt to lock the mutex right after it starts up) to ensure the proper

ordering. Then do a loop in each thread like this:

Main (sending) thread

Wait on shared condition (for writing

thread to be ready)

Receiving thread

Signal condition to say we’re ready

Wait on condition (for an entry to be

ready)

Update the variable with the next entry

Signal the condition

Loop around and wait on the condition

again

Retrieve the info, save it for later writingLoop around and signal the condition

again

Once you’ve passed all the entries (5 or 7 depending on where you want to add the new ones),

unlock the mutex on both sides.

Part 4 (Due 5/10)

Here you will use two processes again, this time with a socket connecting them.

A port number to use (12345) is at Util::portNumber.

• Note: if you get an error that the port is already in use, it’s likely because you just ran

the project and the operating system hasn’t released the port yet. You can either wait a

bit (a few minutes at most) or change the port number (12346, etc.).

When I did this step, I reversed the setup from part 2: the main process here reads from the

socket (writing to the output file) and the spawned process writes to the socket (reading from

the input file). Again, it is up to you where you want to add the two new entries.

When you spawn the 2 nd process, use 21S_CS3377_Project 4 3.

After the fork, the socket reading process (parent process for me) creates a socket and listens

on that socket using the port number above. The socket writing process (child process for me)

creates a socket and connects to the listen socket. Depending on the timing of things the listen

socket may not be ready the first time; here is code to repeatedly wait for the listen socket to

be available:

int amountToWait = 1;

while ( connect(fileDescriptor, (struct sockaddr*) &serverAddress,

sizeof(serverAddress))) {

if ( errno != ECONNREFUSED) {

// Something unexpected happened

throw FileModifyException(“Error connecting”);

}

std::cout << "Not ready to connect yet...n";

// Exponential backoff

sleep(amountToWait);

amountToWait = amountToWait * 2;

}

Once the connection is made (reader gets back a file descriptor from accept() and the writer

gets out of the loop above) you can transfer the data. Remember that a socket is just a file

descriptor, so your code to write/read from earlier parts will work here, too.

Research Paper on Security Issues and solutions for E commerce Websites

To write a proposal and Research paper, you need to attention to the following points: Generally, start with an overview or a background about the problem that you want to solve. But before writing a background, you need to understand the problem then try to find an answer or a solution for that.

Background: Security issues in eCommerce are causing a lot of damage to businesses such as financial and their reputation. the attacks on e-commerce website are gowning gradually for more that 30% of the total e-commerce websites from small to large businesses.So, the first step would be:  

Step-1: Finding a problem (what is the function of the writing the proposal)

We need to have a problem then we can suggest various ways to answers it or suggest a method to resolve the issue. In this case, you need to answer, that means for example, we have a security problem on client-server architecture based on E-commerce structure, such as the security and privacy of online transactions, including

  • Denial of Service, (DoS) 
  • Unauthorized access,
  • Malicious Alterations to websites,
  • Theft of customer information, 
  • Damage to computer networks,
  • Creation of counterfeit sites. 

Step-2: Method and Solution

We need to focus on the problem and find a solution or a way to answer to the problem, that means for example, my method is to design a secure client and server architecture, so we can create or use an exiting model then find a solution for the above problems and how to minimize the vulnerability of this structure. That means to find a solution for each part of the problem.for example, in terms of DoS, the attackers stop authorized users from accessing a website, resulting in reduced functioning of the website.How the attackers doing DoS, or what’s the type of DoS attacks? the DoS attacks are based on Network, Protocol, Storage, Processor,…. We can consider using a password management, password encryption techniques, using multi-factor authentication, using security questions, creating a uniquid accessing for each device.In case of secure network, all we want to stop or to access or make a requests to a service. then, we need to think about each DoS simulation and the method (for example in the network layer) that we want to work on it. 

Step-3: Result and Analysis and outcome expectation

At this stage, we want to know , and ? So I expect to see your proposal that can present a problem and be able to write the answer to above questions and above steps in any format. You can write or make a flowchart and/or demonstrate step-by-step work actions, also creating a job duties for each member (optional).Let me know if you have any other questions,

Report on cloud computing

 Students will individually review one recent peer-reviewed published paper/article and also thoughtfully discuss the research papers content on the developments and technologies in Cloud Computing. Choose one topic that you are interested in, or discuss with the instructor if you have any questions.The assessment is based on the presentation and report rubrics. 

  • 30 points for report paper assessed
  • 20 points for the slides and presentation

I. Report paper (30 points): The main body of the paper should not exceed 5 pages.

  • Submit a 5-page report (double spaced, font size 10, single column, excluding cover and references) in a single PDF file.
  • Also submit a PDF file of the reference reviewed. 
  • The cover page includes assignment title on the particular reference, author info. For example,
    • Title: Review on (reference title here)
    • Author: student information
  • Introduce the topic/problem and related background knowledge, review the solution/approach/algorithm/example, and discuss your learning, analyses and conclusions.
  • May use additional references while discuss the topic
  • Use appropriate references and citations. Refer to the following links: https://pitt.libguides.com/citationhelp/ieee or https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf
  • This will not only review the reference, but also be a thoughtful discussion of the research paper content pertaining to cloud computing. 
  • Paper and article from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 
  • Avoid review/survey paper/article.

One example of reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.

 This article covers many subjects and expands more. II. Presentation (20 points)

  • The presentation will be scheduled at the class time in October.
  • The presentation content should align with the report.
  • Prepare a 8 minutes presentation, which will be followed by 4 minutes in class Q/A.
  • Make sure to rehearse presentation and prepare well so you can clearly communicate the topic and answer questions.

Number to text translator You are asked to implement

  

Number-to-text translator You are asked to implement an automated number-to-text translation
system for a phone company. Write a C program that receives as an input an integer number and converts each  digit to the appropriate text word. The integer number can be of variable length, but no larger than 10 digits.
Assume that no phone number starts with a zero.
Sample program execution:
Please enter your phone number: XXXXXXXXXX
two three four ve seven six nine eight ve four
Test cases: XXXXXXXXXX 10004, 20030040
Hint: Use the loop structure of problem 2 to count the number of digits in the number given by the user. Isolate
each digit from left to right (think of dividing the given number by a power of 10). Use a switch statement or an
if-else-if statement to convert a digit to a word.

discusion-4

Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats?

Woocommerce

 WooCommerce Butcher Plugin if you’re searching for a smart, simple tool that allows you to create price estimation of your animal butchery easily, to enable your clients to get information about your services and product costs, you are in the right place : https://codecanyon.net/item/woocommerce-butcher-calculator/27035279