On the internet or your phone, listen to TWO of the following songs from the funk genre in the list below: o Wild Cherry, “Play that Funky Music” o Lyn Collins, “Think (About It)” o Isley Brothers, “It’s Your Thing” o War, “Lowrider” o Marvin Gaye, “Got to Give It Up” o James Brown, “Papas Got A Brand New Bag” o Funkadelic, “One Nation Under a Groove” o Sly and the Family Stone, “Thank You” o Rufus and Chaka Khan, “Tell Me Something Good” o Kool and the Gang, “Jungle Boogie” o Kool and the Gabg, “Get Down on It” o The Commodores, “Brick House” o Rick James, “Super Freak” o Zapp, “Bounce to the Ounce” MUS 121 – Rhythm Blues and Hip Hop Unit 5 – Funk – Music as a Cultural Artifact – Guided Listening Assignment After listening to your TWO selections, answer the following questions in a word document: o Define the musical term: Funk o Share a brief biography of each of the two bands you chose. o, Name the members of each of these bands. o Examine the lyrics and share the lines of each song which are your favorite and/or made an impression on you. o What are the ideas being addressed in each of these songs? o What is the date that the original music was written? What is the date that this original recording was made/released ? o Has anyone else recorded the two songs you have chosen? If so, find one YouTube recording of “covers” of each the two songs you have chosen if they are available. If nothing is available, please indicate that as well. o List the instruments you hear in these recordings. Are each of these songs the same or different instrumentation? o How would you describe the rhythm? 1950s shuffle rhythm, ska, rock steady, reggae? o What was your favorite thing about the performances/recordings? o What emotions did the performances/recordings make you feel when you heard it? Requirements: Three to four pages in length, excluding the Reference page. APA format, including an in-text citation for referenced works. At least four resources
Risk
1.Think carefully about how you live your life and how you go about planning for the future. How do you manage risks? What threats might you face? How do you think about them? There are health, economic, physical security, home security, and other types of risks. You will also face rewards. What is the relationship between risk and reward? You probably do not have a written plan, but there may be things you do every day with realizing it that mitigate or eliminate those risks. Discuss these and how they relate and are different from the risks businesses and other organizations may face.
2.Discuss the characteristics of security policy acceptance and enforcement and the factors that may make those processes difficult. Discuss how security policies are different from other (non-security) policies business generally have. Are they inherently more difficult to design and implement? Why or why not?
Write a program that generates n random integers between 0 and 9 and displays the count for each number. (Hint: Use an array of ten integers, say count, to store the counts for the number of 0s, 1s, . . . , 9s.)
Write a program that generates n random integers between 0 and 9 and displays the count for each number. (Hint: Use an array of ten integers, say count, to store the counts for the number of 0s, 1s, . . . , 9s.)
A modular program is expected – use Methods. The program specifications are as below.
- In the main() method, declare an int array of size 10, named count.
- Implement a method populateCount(int[] cnt) that initializes the array to zero.
- Implement a method countNums(int[] cnt, int n) that accepts the count array and an integer n. The method should generate n random numbers in the range of 0 to 9. It should keep a count of how many times each number, 0 to 9; is generated in the array count.
- Implement a method printNums(int[] cnt) to print the count array. Note, print “time” or “times” – which ever is appropriate.
- Use basic structured programming and procedural programming.
- Write a main() method that declares the count array. Invokes the countNums() method with n = 10 followed by invoking the printNums(). Then invokes the countNums() method with n = 100 followed by printNums(). And again, invokes the countNums() method with n = 1000 followed by printNums().
- Make sure you invoke the populateCount(int[] cnt) method at appropriate times. And write out the heading for each set, n = 10, 100, and 1000.
- Documentation. Includes your name, create date and purpose of lab.
Module 06 Course Project – Analyze Malware Behavior
the assignment is in the attachment. please follow the instructions carefully.
PHP, CSS
Only who can able to help me withing 24 hours please for my assignment about PHP and CSS files . I need all answer please . attached document below.
Electronica
For each week in our course, you will consider music as a cultural artifact and be assigned either a piece of music or a specific musical artist to explore and analyze for the week. This week, you will be listening to music that is considered “electronica.” As you have read this week, technology moved at a fast pace from the 70s all the way through to the present day. For our guided listening this week, we will be exploring these new technologies. Be sure to read through the entire page, as this particular assignment is formatted slightly different compared to our previous guided listening assignments. In addition to your etextbook, you should expect to complete some research online to respond to these questions. Be sure to use vetted resources—if you aren’t sure what a reliable source is, remember, you can use the CRAP test to determine if your source is reliable! Resources that might help you: What is electronica music?. (2019). worldatlas. Instructions: Part 1: Electronica Answer the following question: o Define Electronica. Part 2: Chance Music On the internet or your phone, listen to ONE the following examples of antecedents of electronica. Those composers used totally electronic sounds, taped small segments of sounds and wrote music in fragments. They would often leave the order of performance up to the performer, and this would change from performance to performance. This is known as chance music. o Karlheniz Stockhausen, “Mikrophonie” o Milton Babbitt, “Ensembles for Synthesizer” o John Cage, “Imaginary Landscape No. 1” o Edgar Varese, “Poeme electronique” After listening to your selection, answer the following questions in a word document: o Define the musical term: Chance Music. MUS 121 – Rhythm Blues and Hip Hop Unit 6 – Electronica – Music as a Cultural Artifact – Guided Listening Assignment o Share a brief biography of the composer that you chose. o What is the date that the original music was written? What is the date that this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings? o What emotions did the performances/recordings make you feel when you heard it? Part 3: Ambient Music Ambient music goes back to the 1970s, is considered “atmospheric music.” On the internet or your phone, listen to ONE of these artists: o Brian Eno, “Music for Airports” o Pink Floyd, “Astronomy Domine” o Kraftwerk, “Roberter” o Tangerine Dream, “Stratosfear” After listening to your selection, answer the following questions in a word document: o Define the musical term: Ambient. o Share a brief biography of the artist/ensemble that you chose. o What is the date that the original music was written? What is the date that this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings? o What emotions did the performances/recordings make you feel when you heard it? Part 4: More Mainstream Electronica By the mid-1990s, electronica began to “chart” and electronic elements began to merge with tock, tap and other pop elements to create a new fusion. On the internet or your phone, listen to ONE of these artists: o Nine Inch Nails, “Ghosts IV” o Moby, “South Side” o Bjork, “Bachelorette” o Chemical Brothers, “Block Rockin’ Beats” o Trent Reznor After listening to your selection, answer the following questions in a word document: o Share a brief biography of the artist you chose. o What is the date that the original music was written? What is the date that this original recording was made/released ? o Are sequencers and loops used in these recordings? If so, how? o What was your favorite thing about the performances/recordings? o What emotions did the performances/recordings make you feel when you heard it? Requirements: Three to four pages in length, excluding the Reference page. APA format, including an in-text citation for referenced works. At least four resources.
assignment
Prior to beginning work on this assignment, read the following article:
Also, be sure you have completed the Academic Integrity Interactive learning activity and read the following previously assigned readings:
- Chapters 1 and 2 in your course textbook
- Google Goes Back to School and Takes Aim at Plagiarism
download
- Plagiarism: Facts & Stats (Links to an external site.)
There are websites that facilitate academic dishonesty and provide multiple ways for students to engage in unethical academic behavior. Conversely, there are tools that help students to properly complete work in a manner that is aligned with academic integrity. Additionally, there is an arsenal of tools that assist professors and organizations to verify the authenticity, validity, and academic rigor utilized in a paper. When a violation occurs, pejorative repercussions can occur.
In your paper,
- Identify at least two repercussions for violations.
- Describe how repercussions of academic dishonesty can affect one’s professional career.
- Explain how a student can prevent academic dishonesty, thus preventing negative effects on one’s academic journey and professional career.
For additional guidance on avoiding plagiarism, see the Writing Center resources Plagiarism Guide (Links to an external site.) and Steps to Avoiding Plagiarism (Links to an external site.).
The How Technology Allows Academic Dishonesty to Follow You paper,
- Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to APA Style (Links to an external site.) as outlined in the Writing Center’s APA Formatting for Microsoft Word (Links to an external site.)
- Must include a separate title page with the following:
- Title of paper in bold font
- Space should appear between the title and the rest of the information on the title page.
- Student’s name
- Name of institution (University of Arizona Global Campus)
- Course name and number
- Instructor’s name
- Due date
- Title of paper in bold font
- Must utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.
- Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
- For assistance on writing Introductions & Conclusions (Links to an external site.) as well as Writing a Thesis Statement (Links to an external site.), refer to the Writing Center resources.
- Must use at least three credible sources in addition to the course text.
- The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for this assignment.
- To assist you in completing the research required for this assignment, view The University of Arizona Global Campus Library Quick ‘n’ Dirty (Links to an external site.) tutorial, which introduces the University of Arizona Global Campus Library and the research process, and provides some library search tips.
- Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your Paper (Links to an external site.)
- Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References List (Links to an external site.) resource in the Writing Center for specifications.
Python Assign Code H/W
Start with the following Python code.
alphabet = “abcdefghijklmnopqrstuvwxyz”
test_dups = [“zzz”,”dog”,”bookkeeper”,”subdermatoglyphic”,”subdermatoglyphics”]
test_miss = [“zzz”,”subdermatoglyphic”,”the quick brown fox jumps over the lazy dog”]
# From Section 11.2 of:
# Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d
Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source.
Part 1
Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.
Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates.
Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for “aaa” and “abc” would be the following.
aaa has duplicates
abc has no duplicates
Print a line like one of the above for each of the strings in test_dups.
Part 2
Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order.
Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.
The function missing_letters should combine the list of missing letters into a string and return that string.
Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string “aaa”, the output should be the following.
aaa is missing letters bcdefghijklmnopqrstuvwxyz
If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following.
abcdefghijklmnopqrstuvwxyz uses all the letters
Print a line like one of the above for each of the strings in test_miss.
Submit your Python program. It should include the following.
- The provided code for alphabet, test_dups, test_miss, and histogram.
- Your implementation of the has_duplicates function.
- A loop that outputs duplicate information for each string in test_dups.
- Your implementation of the missing_letters function.
- A loop that outputs missing letters for each string in test_miss.
Also submit the output from running your program.
Your submission will be assessed using the following Aspects.
- Does the program include a function called has_duplicates that takes a string parameter and returns a boolean?
- Does the has_duplicates function call the histogram function?
- Does the program include a loop over the strings in test_dups that calls has_duplicate on each string?
- Does the program correctly identify whether each string in test_dups has duplicates?
- Does the program include a function called missing_letters that takes a string parameter and returns a string?
- Does the missing_letters function call the histogram function?
- Does the missing_letters function use the alphabet global variable directly?
- Does the program include a loop over the strings in test_miss that calls missing_letters on each string?
- Does the program correctly identify the missing letters for each string in test_miss, including each string that “uses all the letters”?
discussion
Pick two web development technologies and discuss why they are important for cloud computing. 300words and reply
EX05 – Extrusion 2
EX05 – Extrusions 2
NOTE : For this assignment refer to the recorded lecture titled “CSC131_LEC05_Extrusion2” in the old videos folder.
Hand in a .png image created in Blender.
Your image must depict a horse modeled from the guide pictures provided
Alternately, you may use a picture of your own choosing. If you choose a different model you must hand in the associated guide pictures. You will not receive full credit for an image without guide pictures.
Use extrusion in Blender’s ‘Edit Mode’ to shape your objects.
Use filename format CSC131_EX05_XXX.png Where XXX represents your initials.
Alternately, you can provide a link to the video in your youtube channel.