after the 70s

 On the internet or your phone, listen to TWO of the following songs from the funk genre in the list below: o Wild Cherry, “Play that Funky Music”  o Lyn Collins, “Think (About It)”  o Isley Brothers, “It’s Your Thing”  o War, “Lowrider”  o Marvin Gaye, “Got to Give It Up”  o James Brown, “Papas Got A Brand New Bag”  o Funkadelic, “One Nation Under a Groove”  o Sly and the Family Stone, “Thank You”  o Rufus and Chaka Khan, “Tell Me Something Good”  o Kool and the Gang, “Jungle Boogie”  o Kool and the Gabg, “Get Down on It”  o The Commodores, “Brick House”  o Rick James, “Super Freak” o Zapp, “Bounce to the Ounce” MUS 121 – Rhythm Blues and Hip Hop Unit 5 – Funk – Music as a Cultural Artifact – Guided Listening Assignment  After listening to your TWO selections, answer the following questions in a word document: o Define the musical term: Funk o Share a brief biography of each of the two bands you chose. o, Name the members of each of these bands. o Examine the lyrics and share the lines of each song which are your  favorite and/or made an impression on you. o What are the ideas being addressed in each of these songs?  o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Has anyone else recorded the two songs you have chosen? If so, find one  YouTube recording of “covers” of each the two songs you have chosen if  they are available. If nothing is available, please indicate that as well. o List the instruments you hear in these recordings. Are each of these songs  the same or different instrumentation?  o How would you describe the rhythm? 1950s shuffle rhythm, ska, rock  steady, reggae?  o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Requirements:  Three to four pages in length, excluding the Reference page.  APA format, including an in-text citation for referenced works.  At least four resources 

Risk

1.Think carefully about how you live your life and how you go about planning for the future. How do you manage risks? What threats might you face? How do you think about them? There are health, economic, physical security, home security, and other types of risks. You will also face rewards. What is the relationship between risk and reward? You probably do not have a written plan, but there may be things you do every day with realizing it that mitigate or eliminate those risks. Discuss these and how they relate and are different from the risks businesses and other organizations may face.

2.Discuss the characteristics of security policy acceptance and enforcement and the factors that may make those processes difficult. Discuss how security policies are different from other (non-security) policies business generally have. Are they inherently more difficult to design and implement? Why or why not?

Write a program that generates n random integers between 0 and 9 and displays the count for each number. (Hint: Use an array of ten integers, say count, to store the counts for the number of 0s, 1s, . . . , 9s.)

 

Write a program that generates n random  integers between 0 and 9 and displays the count for each number. (Hint:  Use an array of ten integers, say count, to store the counts for the  number of 0s, 1s, . . . , 9s.)

A modular program is expected – use Methods. The program specifications are as below. 

  1. In the main() method, declare an int array of size 10, named count.
  2. Implement a method populateCount(int[] cnt) that initializes the array to zero.
  3.  Implement a method countNums(int[] cnt, int n) that accepts  the count array and an integer n. The method should generate n random  numbers in the range of 0 to 9. It should keep a count of how many times  each number, 0 to 9; is generated in the array count. 
  4. Implement a method printNums(int[] cnt) to print the count  array.  Note, print “time” or “times” – which ever is appropriate. 
  5. Use basic structured programming and procedural programming.
  6.  Write a main() method that declares the count array. Invokes  the countNums() method with n = 10 followed by invoking the printNums().  Then invokes the countNums() method with n = 100 followed  by printNums(). And again, invokes the countNums() method with n =  1000 followed by printNums(). 
  7. Make sure you invoke  the populateCount(int[] cnt) method at appropriate times. And write out  the heading for each set, n = 10, 100, and 1000.
  8. Documentation. Includes your name, create date and purpose of lab.

PHP, CSS

Only who can able to help me withing 24 hours please for my assignment about PHP and CSS files . I need all answer please . attached document below. 

Electronica

 For each week in our course, you will consider music as a cultural artifact and be  assigned either a piece of music or a specific musical artist to explore and analyze for  the week. This week, you will be listening to music that is considered “electronica.” As  you have read this week, technology moved at a fast pace from the 70s all the way  through to the present day. For our guided listening this week, we will be exploring  these new technologies. Be sure to read through the entire page, as this particular  assignment is formatted slightly different compared to our previous guided listening  assignments. In addition to your etextbook, you should expect to complete some research online to  respond to these questions. Be sure to use vetted resources—if you aren’t sure what a  reliable source is, remember, you can use the CRAP test to determine if your source is  reliable! Resources that might help you:  What is electronica music?. (2019). worldatlas. Instructions: Part 1: Electronica  Answer the following question: o Define Electronica. Part 2: Chance Music  On the internet or your phone, listen to ONE the following examples of  antecedents of electronica. Those composers used totally electronic sounds,  taped small segments of sounds and wrote music in fragments. They would often  leave the order of performance up to the performer, and this would change from  performance to performance. This is known as chance music. o Karlheniz Stockhausen, “Mikrophonie”  o Milton Babbitt, “Ensembles for Synthesizer”  o John Cage, “Imaginary Landscape No. 1”  o Edgar Varese, “Poeme electronique”  After listening to your selection, answer the following questions in a word  document: o Define the musical term: Chance Music. MUS 121 – Rhythm Blues and Hip Hop Unit 6 – Electronica – Music as a Cultural Artifact – Guided Listening Assignment o Share a brief biography of the composer that you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Part 3: Ambient Music  Ambient music goes back to the 1970s, is considered “atmospheric music.” On  the internet or your phone, listen to ONE of these artists:  o Brian Eno, “Music for Airports”  o Pink Floyd, “Astronomy Domine”  o Kraftwerk, “Roberter”  o Tangerine Dream, “Stratosfear”   After listening to your selection, answer the following questions in a word  document: o Define the musical term: Ambient. o Share a brief biography of the artist/ensemble that you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Part 4: More Mainstream Electronica  By the mid-1990s, electronica began to “chart” and electronic elements began to  merge with tock, tap and other pop elements to create a new fusion. On the  internet or your phone, listen to ONE of these artists:  o Nine Inch Nails, “Ghosts IV”  o Moby, “South Side”  o Bjork, “Bachelorette”  o Chemical Brothers, “Block Rockin’ Beats”  o Trent Reznor  After listening to your selection, answer the following questions in a word  document: o Share a brief biography of the artist you chose. o What is the date that the original music was written? What is the date that  this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings?  o What emotions did the performances/recordings make you feel when you  heard it? Requirements:  Three to four pages in length, excluding the Reference page.  APA format, including an in-text citation for referenced works.  At least four resources. 

assignment

 

Prior to beginning work on this assignment, read the following article:

Also, be sure you have completed the Academic Integrity Interactive learning activity and read the following previously assigned readings:

There are websites that facilitate academic dishonesty and provide multiple ways for students to engage in unethical academic behavior. Conversely, there are tools that help students to properly complete work in a manner that is aligned with academic integrity. Additionally, there is an arsenal of tools that assist professors and organizations to verify the authenticity, validity, and academic rigor utilized in a paper. When a violation occurs, pejorative repercussions can occur. 

In your paper,

  • Identify at least two repercussions for violations. 
  • Describe how repercussions of academic dishonesty can affect one’s professional career. 
  • Explain how a student can prevent academic dishonesty, thus preventing negative effects on one’s academic journey and professional career. 

For additional guidance on avoiding plagiarism, see the Writing Center resources Plagiarism Guide (Links to an external site.) and Steps to Avoiding Plagiarism (Links to an external site.).

The How Technology Allows Academic Dishonesty to Follow You paper,

Python Assign Code H/W

 

Start with the following Python code.  

alphabet = “abcdefghijklmnopqrstuvwxyz”   

test_dups = [“zzz”,”dog”,”bookkeeper”,”subdermatoglyphic”,”subdermatoglyphics”] 

test_miss = [“zzz”,”subdermatoglyphic”,”the quick brown fox jumps over the lazy dog”] 

# From Section 11.2 of: 

# Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. 

def histogram(s):
     d = dict()
     for c in s:
          if c not in d:
               d[c] = 1
          else:
               d[c] += 1
     return d 

Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. 

Part 1 

Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.  

Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. 

Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for “aaa” and “abc” would be the following. 

aaa has duplicates
abc has no duplicates 

Print a line like one of the above for each of the strings in test_dups. 

Part 2 

Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. 

Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. 

The function missing_letters should combine the list of missing letters into a string and return that string. 

Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string “aaa”, the output should be the following. 

aaa is missing letters bcdefghijklmnopqrstuvwxyz 

If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. 

abcdefghijklmnopqrstuvwxyz uses all the letters 

Print a line like one of the above for each of the strings in test_miss. 

Submit your Python program. It should include the following. 

  • The provided code for alphabet, test_dups, test_miss, and histogram. 
  • Your implementation of the has_duplicates function. 
  • A loop that outputs duplicate information for each string in test_dups. 
  • Your implementation of the missing_letters function. 
  • A loop that outputs missing letters for each string in test_miss. 

Also submit the output from running your program. 

Your submission will be assessed using the following Aspects.

  1. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean?
  2. Does the has_duplicates function call the histogram function? 
  3. Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? 
  4. Does the program correctly identify whether each string in test_dups has duplicates? 
  5. Does the program include a function called missing_letters that takes a string parameter and returns a string? 
  6. Does the missing_letters function call the histogram function?
  7. Does the missing_letters function use the alphabet global variable directly?
  8. Does the program include a loop over the strings in test_miss that calls missing_letters on each string?
  9. Does the program correctly identify the missing letters for each string in test_miss, including each string that “uses all the letters”?

discussion

Pick two web development technologies and discuss why they are important for cloud computing. 300words and reply

EX05 – Extrusion 2

 

EX05 – Extrusions 2

NOTE : For this assignment refer to the recorded lecture titled “CSC131_LEC05_Extrusion2” in the old videos folder.

Hand in a  .png image  created in Blender.

Your image must depict a horse modeled from the guide pictures provided

Alternately, you may use a picture of your own choosing. If you choose a different model you must hand in the associated guide pictures. You will not receive full credit for an image without guide pictures.

Use extrusion in Blender’s ‘Edit Mode’ to shape your objects. 

Use filename format CSC131_EX05_XXX.png   Where XXX represents your initials.

Alternately, you can provide a link to the video in your youtube channel.