I will sent the instructions once i accept your bid
Study this section on textbook chapter
Game of 21
Study this section on textbook chapter 13:13.14 Focus on Object-Oriented Programming: Simulating Dice with Objects. (9th edition)Note that if you have a different edition of the textbook, you may find that the section number within the chapter is different, although the content is the same. Under Programming Challenges for Chapter 13 (page 808 on 9th edition), find the exercise that says: A Game of 21.You can use the class implemented in the book to write your game. Make sure you don’t copy the book’s implementation blindly, because you will eventually be tested on your understanding of it. Writing line by line what you have in the book may sound tedious, but will help you understand. Your project will have three files: Die.cpp, Die.h and main.cpp (with your game implementation). You only need to turn in your main.cpp file. Your main.cpp should #include “Die.h”. Don’t worry about turning in Die.cpp and Die.h since I have my own. Just make sure to not change any of the function names, otherwise I won’t be able to compile your program. Your main.cpp MUST work with that version of Die.h and Die.cpp that is implemented in the book. This is mandatory. No changes to that class will be accepted.
Operational Excellence
How do you define operational excellence? What factors are involved in achieving operational excellence? Who (within an organization) is responsible for operational excellence, and why is this important?
Please answer in 300 words or one full page without extra spacing.
Please refer to the attached textbooks.
Network Design Paper UMUC
Network Design Paper UMUC has recently acquired a building in Frederick, Maryland. This new building will house some administrative offices, lecture rooms, library, and computer labs. Building dimensions: Length: 240 Feet Width: 95 Feet Height: 30 Feet The 40-year-old two-story building has the following existing layout: There will be six computer labs that will be used for instruction. Each of these labs will have 21 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library staff. There are five lecture classrooms in the building. Each of this room will have a computer for instructor’s use. Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use. Equipment Inventory Workstation Placement Number of Workstations Users Total WS 6 Instructional Computer labs 21 WS Student and Instructor 132 WS (based on 20 WS for students and 1 WS for instructor on each lab) Student Computer Lab 30 WS Student 30 WS 5 various offices 5 WS Staff 5 WS Admission office 5 WS Staff 5 WS Library 10 WS Student 10 WS Library 5 WS Staff 5 WS Server Staff To be determined by students Network Connecting Devices IT Staff To be determined by students Printers To be determined by student Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: • Student-accessed computers should be on separate network from the staff-accessed computers. • The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor. • Security is very important for UMUC as we have to protect students and employees data as well as any intellectual property that UMUC has on the servers and computers. • The network has been assigned the 10.15.0.0 network address for all computers and devices. For Internet routing use 191.1.1 network address. • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area. Submission should include (in no more than three pages, excluding diagrams and references): Network Addressing: 1. Define the subnet (based on: rooms, floor, department, or other criteria). 2. For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. Physical Network Design: 1. Define the topology that will be used. 2. Select the appropriate network media to use. 3. Select the appropriate network connecting devices to use. 4. Physical layout of the computers on the floor plan. 5. List of additional servers or network devices needed to implement the network. 6. Justifications for your network design (number 1 – 5 above) You will be evaluated on your ability to o Implement appropriate IP addressing scheme o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment o select and justify appropriate topology such as star, bus, or ring for your network o select and justify of your selected network equipments o select and justify appropriate network services to meet network requirements o select and justify security implementation for the network o use proper grammar, formatting, network terminology, and reference citations Feel free to use any drawings or attachments, and assume any number of computers or users (not when provided here). You will be graded on the basis of right media, topology and knowledge of network concepts. Grading Rubric Criteria 0-59% 60-79% 80-89% 90-100% IP Addressing 30% Student fails to demonstrate adequate subnetting knowledge Student demonstrates some knowledge of subnetting Student demonstrates proper subnetting for the network but failed to provide all IP addressing information needed Student demonstrates proper subnetting for the network and provide all IP addressing information needed Network Requirement 40% Student fails to design proper network to address the given scenario Student misses some critical network design and/or misses on the justifications Student designs a network that address most of the requirement and are able to justify some of the design Student designs a network that met all requirements and are able to justify the design Network Technical Knowledge 20% Student does not have grade
MOBILE -8
Review the research paper on Methods for Evaluating Mobile Health Apps in this website,
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5748471/
And, answer the following questions
Question 1: What are methods for evaluating health mobile apps?
Question 2 : Download and compare the following two Mobile Health Apps based on Content .
Spok Mobile App vs PatientTouch System Mobile App. Both apps are available for free download
To determine the exact name
To determine the exact name of fields used in the tables for these exercises, refer to the tables in the Just Lee Books database, or use the DESCRIBE table name command to view the table’s structure.
4. List the customer number for each customer in the CUSTOMERS table, along with the city
and state in which they reside.
5. Create a list containing the name of each publisher, the person usually contacted, and the
telephone number of the publisher. Rename the contact column Contact Person in the displayed
results. (Hint: Use the PUBLISHER table.)
6. Determine which categories are represented by the current book inventory. List each category
only once.
7. List the customer number from the ORDERS table for each customer who has placed an
order with the bookstore. List each customer number only once.
8. Create a list of each book title stored in the BOOKS table and the category in which each
book belongs. Reverse the sequence of the columns so the category of each book is
listed first.
9. List the first and last name of each author in the AUTHORS table.
10. Create a list of authors that displays the last name followed by the first name for each author.
The last names and first names should be separated by a comma and a blank space.
tables are the following:
Change Management
- Explain the purpose of change management and how it applies to infrastructure protection.
- Describe the methods organizations use to determine whether changes have been made to the infrastructure.
- Outline the process to be followed prior to integrating any changes into a production environment.
Legislated Privacy Concerns
Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
- Summarize the case
- Give your opinion of the decision.
- Describe how the case deals with the material in this chapter
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more
Markov chains
I need a python programmer who understands how markov chain works and can make a model to predict the most probable outcome based on previous observations
IT491 week 3
1. What are the common mistakes to avoid in your program when using loops? Use examples to explain.
Please response for 2 students