Description of what the program does

  

Write a C program to display the duplicate values in an array.
 

Formulas Needed: None
 

Final submission along with Code
 

Documentation & Naming Style Sheet
 

1. Opening Documentation: the header block should include the following:
 

Program name/syntax
Description of what the program does
Summary of the problem’s specifications and assumptions
License info (optional)
References to sources of additional information used
Parameters
Class/Program Invariant (ensure these conditions are true)
Algorithm(s) used (including any special notes)
Output (any print statements, files created, etc.)
Return values (does it return any parameters?)
Name of the authors (plus contact info)
Creation & modification dates

PYTHON EXPERT NEEDED

 *I need an expert who can work on this and turn it back in 24hrs**
**I will also require some progress every 6hrs, just to be sure of the progress**
ANything you need for the job let me know

In this assignment, you will gain experience working with OpenAI Gym, which is a set of problems that can be explored with different reinforcement learning algorithms. This assignment is designed to help you apply the concepts you have been learning about Q-learning algorithms to the “cartpole” problem, a common reinforcement learning problem.

Note: The original code referenced in this assignment was written in Python 2.x. You have been given a zipped folder containing an updated Python 3 version of the code that will work in the Apporto environment. To make this code work, some lines have been commented out. Please leave these as comments.

Reference: Surma, G. (2018). Cartpole. Github repository. Retrieved from https://github.com/gsurma/cartpole.

Prompt

Access the Virtual Lab (Apporto) by using the link in the Virtual Lab Access module. It is recommended that you use the Chrome browser to access the Virtual Lab. If prompted to allow the Virtual Lab access to your clipboard, click “Yes”, as this will allow you to copy text from your desktop into applications in the Virtual Lab environment.

  1. Review the following reading: Cartpole: Introduction to Reinforcement Learning. In order to run the code, upload the Cartpole.zip folder into the Virtual Lab (Apporto). Unzip the folder, then upload the unzipped folder into your Documents folder in Apporto. Refer to the Jupyter Notebook in Apporto (Virtual Lab) Tutorial to help with these tasks.

    Note: The Cartpole folder contains the Cartpole.ipynb file (Jupyter Notebook) and a scores folder containing score_logger.py (Python file). It is very important to keep the score_logger.py file in the scores folder (directory).

  2. Open Jupyter Notebook and open up the Cartpole.ipynb and score_logger.py files. Be sure to review the code in both of these files. Rename the Cartpole.ipynb file using the following naming convention:

    __Assignment5.ipynb

    Thus, if your name is Jane Doe, please name the submission file “Doe_Jane_Assignment5.ipynb”.

  3. Next, run the code in Cartpole.ipynb. The code will take several minutes to run and you should see a stream of output while the file runs. When you see the following output, the program is complete:

    Solved in _ runs, _ total runs.

    Note: If you receive the error “NameError: name ‘exit’ is not defined” after the above line, you can ignore it.

  4. Modify the values for the exploration factor, discount factor, and learning rates in the code to understand how those values affect the performance of the algorithm. Be sure to place each experiment in a different code block so that your instructor can view all of your changes.

    Note: Discount factor = GAMMA, learning rate = LEARNING_RATE, exploration factor = combination of EXPLORATION_MAX, EXPLORATION_MIN, and EXPLORATION_DECAY.

  5. Create a Markdown cell in your Jupyter Notebook after the code and its outputs. In this cell, you will be asked to analyze the code and relate it to the concepts from your readings. You are expected to include resources to support your answers, and must include citations for those resources.

    Specifically, you must address the following rubric criteria:

    • Explain how reinforcement learning concepts apply to the cartpole problem.
      • What is the goal of the agent in this case?
      • What are the various state values?
      • What are the possible actions that can be performed?
      • What reinforcement algorithm is used for this problem?
    • Analyze how experience replay is applied to the cartpole problem.
      • How does experience replay work in this algorithm?
      • What is the effect of introducing a discount factor for calculating the future rewards?
    • Analyze how neural networks are used in deep Q-learning.
      • Explain the neural network architecture that is used in the cartpole problem.
      • How does the neural network make the Q-learning algorithm more efficient?
      • What difference do you see in the algorithm performance when you increase or decrease the learning rate?

Guidelines for Submission

Please submit your completed IPYNB file. Make sure that your file is named as specified above, and that you have addressed all rubric criteria in your response. Sources should be cited in APA style.

 

Week 6 Assignment – Network Engineer

 

Introduction

In this three-part assignment, you will design a secure network infrastructure. The specific course learning outcome associated with this assignment is: 

  • Plan a deployment of software and/or hardware, including implementation and testing considerations.

Instructions

Part 1

Use Microsoft Visio or an open-source alternative to: 

  • Create a network infrastructure diagram, incorporating the  following devices needed for a secure corporate network, placed where  they will work, and citing specific, credible sources that support the  design. Note: A web search will provide multiple examples of network infrastructure diagrams.     
    • Web server.
    • FTP server.
    • VPN server.
    • Authentication server.
    • Anti-virus server (client-based and server-based).
    • Edge firewall.
    • Firewall.
    • Vulnerability scanner.
    • Intrusion detection system (IDS).
    • Web proxy.
    • Edge router.
    • Core router.
    • Switch.
    • Distribution router.

Note All client- and server-based devices work where a client is installed on a workstation,  which has bi-directional communication with a corresponding server. 

Part 2

Write a 6–10 page paper in which you: 

  • Determine the specific devices you will use in the network, including the following information for each device:     
    • Make or vendor’s name (for example, Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com).
    • Model (for example, Windows 7, ASA 5500, Cisco 3500, Squid).
    • IP address assigned to all devices.
  • Determine the basic configuration of each network device, citing specific, credible sources that support the configuration.     
    • Research each of the devices you chose and provide a basic configuration you would use in your network.
    • Use IP addresses to describe your configuration.
    • Identify the operating system.
    • Highlight at least five security features and the administrative  controls incorporated into each device, including devices in the  network diagram.
    • Explain the impact that each of your configurations has on the security of the entire network.
  • Explain the elements that must be addressed for planning and  testing a network, citing specific, credible sources that support your  assertions and conclusions.     
    • Organizational requirements and expectations.
    • Budget.
    • Modularity for security and testing.
    • Naming conventions that facilitate layering and growth.
    • Determination of required network speed and data capacity.
    • Vendor support.
    • Determination of risk and redundancy.
    • Uptime requirements.
    • Continuous data monitoring for fault, failure, or security-induced changes.
    • Load balancing.
    • Testing for latency.
    • Bandwidth.
    • Throughput.
    • Specific software and tools.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
    • This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course. Check with your  professor for any additional instructions.
  • Write clearly and concisely in a manner that is  well-organized, grammatically correct, and free of spelling,  typographical, formatting, and/or punctuation errors.
Part 3

Use Microsoft Visio or an open-source alternative to: 

  • Update your initial diagram to create a final network diagram,  incorporating at least four-fifths of the devices needed for a secure corporate network and citing specific, credible sources that support the design. Be sure to include vendor information, model information, and  IP addresses. In addition, ensure that:     
    • VPN sessions (from a laptop) are only allowed to access the desktops in the IT department by IT department employees.
    • All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
    • Users from Engineering and Finance and Accounting cannot communicate.
    • Vulnerability scans occur daily, with all desktops scanned at least once per day.
Submission Requirements

All diagrams and charts you create for the assignment should be included in the paper. 

Exp19_Word_Ch03_ML2_Fresh

 Exp19_Word_Ch03_ML2_Fresh

  

Project Description:

You are preparing a one-page flyer promoting a meal planning service and app. The flyer includes information, some of which is shown in a table, describing the new service. You will merge the flyer with a data source to produce personalized copies of the flyer.

     

Start Word. Download and open   the file named Exp19_Word_Ch03_ML2_Fresh.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Ensure that nonprinting   characters are displayed. At the second blank paragraph that follows the   document logo, insert a 2×1 table. Type Meal Planning Series in the first cell of the table.   Type   Volume 24 in   the next cell and right-align it. Format all text in the table as italics,   with a font size of 10 pt.

 

Adjust the width of both columns   in the table to 2″. Center the   table horizontally on the page. Shade the table with Green, Accent 6, Lighter   60%.

 

Select text at the end of the   page, beginning with Citrus Salmon   Whole Grain Rice Bowl and ending in 490   (whether you select the paragraph mark that follows 490 is irrelevant). Convert the selected text to a table,   accepting all default dialog box selections.

 

Adjust the width of the second   column to 1”. Insert a row above the first row and type Meal   Selection in   the first cell. Type Calories in the second. Apply Align Center alignment to both   entries in row 1.

 

Insert a column at the right of   the second column. Type Remaining Calorie Count in row 1 of the new column. Text   will wrap in the cell.

 

Click in the third column on the   second row (below Remaining Calorie   Count). Include a formula to subtract Calories from 1200. You do not need to select a   Number format. Repeat the formula down the column, adjusting the cell   reference for each row.

 

Insert a column to the left of   the first column and adjust column width of the new column to 1”. Merge all   cells in the new column. Type FRESH! in the merged cell. Click Text Direction in the Alignment group   on the Table Tools Layout tab twice to rotate the text attractively. Click   Align Center. Change the font size of text in the first column to 26.

 

Modify all formulas in the last   column to adjust for the newly inserted column. You should change the letter   in each formula from b to c. Note that the formula will   change, but the results remain the same. Change the calorie count for Barbecue Chicken Pizza to 550. Update the formula field in   the next cell to reflect the new amount for calories remaining.

 

Apply a table style of Grid   Table 5 Dark – Accent 6 (row 5, column 7 under Grid Tables). Select text in   row 1 (but not the merged cell) and choose Align Center alignment. Apply   Align Center alignment to all numbers in the last two columns.

 

Center the table on the page horizontally. Select the first column.   Select the first double line style shown (click the Line Style dropdown   arrow, not Border Styles) and a line weight of ½ pt. Select a pen color of   Green Accent 6. Apply the border selection to all borders of the selected   column.

 

Place the insertion point at the   end of the document (after Download the   Fresh! app from your friends at). Press SPACEBAR. Click the Mailings tab   and begin a mail merge, choosing to create letters and selecting recipients   from an existing list. You will use the Access database, Fresh App Contacts.accdb. Note, Mac users will use the text file,   Fresh App Contacts.txt. Edit the   recipient list and sort by Grocery Name in ascending order.

 

Insert a merge field of Grocery_Name. Preview the results and   finish the merge of all records. Select and copy all text in the new   document. Display the original document, move to the end of the document   (after Download the Fresh! app from   your friends at Associated Grocers), and insert a page break. Paste the   copied text, resulting in a 6-page document.

 

Save and close Exp19_Word_Ch03_ML2_Fresh.docx. Close   all other open documents without saving. Submit Exp_Word_Ch03_ML2_Fresh.docx as directed.

Graduate Research & Critical Analysis jan 19

Assignment Content

  1. STOP: (1) Have you watched the HW video on APA 7 Basics and Cover Page? (2) IF you were absent, have you watched the class recording? Do not continue to the assignment until these things are complete

    ASSIGNMENT
    Step 1, Brainstorm: Think about your field of study as a master’s student. Use one of the two methods taught in class and find two news articles that report on relevant problems related to the industry associated with your master’s degree program (think about scandals within the last 5 years). Come up with two examples using the format below in a simple Word document, using APA 7 Basics and an APA 7 cover page learned through the HW video (see p. 20 in Foundations for a sample cover page)

    Step 2, Create your Word Document and Answer Questions (it should look similar to p. 5 in Foundations):

    FOR EXAMPLE: If my major is public health or even education, I would come up with something like Issue/Problem 1 below (MPH students, you cannot use this as your own). We have started one together in class, so you must complete what you started in class and find a second research problem proposal:

    Issue/Problem 1: Depression and anxiety among young adults 
    1) People Involved: College students, parents
    2) Link to Article: https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression
    3) My Research Question: What have researchers learned about the impact of COVID 19 on depression and anxiety among young adult students?

    I would then fill out my second Problem proposal below: 

    Issue/Problem 2:
    1) People Involved: 
    2) Link to Article: 
    3) My Research Question: What have researchers learned about

    Grading:
    Cover/Title Page = 40 pts
    Issue/Problem 1 = 30 pts
    Issue/Problem 2 = 30 pts

Architecture

Please view the 2020 documentary “The Soul of a New Machine” (Cantrill) and write an at least 1,200 

word response to content of the film. Please address as many of the technological issues as related to 

computer architecture and WSC issues addressed in this class. Pleas dropin the drop box by 

November 26th, 2021. 

Please be sure to include a “Works Cited” section which includes at least an entry for the film. 

Works Cited 

Cantrill, Bryan. Soul of a New Machine. 4 Mar 2020. Stanford Online. 

.

Gausse's Law Question

 A very long charged conducting wire, of radius a = 12.0 cm, is enclosed by a concentric, conducting neutral hollow cylinder, as shown in the diagram above. The electric field is E⃗ 1�→1 = 1.60×104 N/C at b = 18.0 cm from the center of the wire and in the direction shown. What is the magnitude of the electric field at point P, a distance of c= 42.0 cm from the center of the wire? 

Discussion 250 -300 words

  1. What things do you think make up the Web?
  2. When arriving at a crime scene, is it better to shut down the computer immediately or insure it stays on? What are the tradeoffs?

Create a network topology

    

Contoso is an Oshawa based startup company with 15 employees that sells custom digital artwork through their online store. The company was growing quickly and set up their infrastructure through Google searches and recommendations from friends. As their company gets bigger, they are looking to seek the advice of an expert to examine their current network infrastructure and suggest improvements. Contoso is expected to grow to 700 employees in the next 16 months. They also plan to open a second branch site in Toronto. The company is remarkably busy with their day-to-day operations and has offered you as much detail as they can about their operations. Every device on the network is part of the same IP subnet, 10.32.0.0/16. 

A company have two servers that host the services required to run the business. 

  1. Server A – Multiple virtual machines on it that host their Domain Controller, DNS, File share, and a licensing server for their design software. The owner of the company mentions that only the windows computers need access to this server.
  2. Server B – Hosts their website that is accessed by their customers and their database service for their catalog of artwork

    

Contoso currently has their servers and networking equipment in a far corner of their shared lunchroom space as it was easier for them to get access to the systems. They also only have one locked door to enter their office and the rest of the spaces are considered “open office” and they assumed that meant no locks, only open doors. All employees at the company simply get 5 minutes of IT orientation where     

a member of the IT team simply logs the user into the network and changes their password. There are no other policies or training offered to staff related to IT. 

They also mentioned that currently nobody can work from home because they need access to the file share, and it does not work when they leave the building. 

The owner of the company lets you know they understand security is important but have been too busy to consider implementing any services, programs, or procedures for their company. The owner of the company advises you to assume an unlimited budget in your proposals. They also will not have time to answer any investigative questions you may have before you present your final pitch, and they ask you to write all assumptions down with your report. 

I need help on creating diagram of network topology for the Company by keeping those server into the consideration and another diagram if the company opens 2nd branch in other area. The diagram includes the devices in the network, connection types between devices, the IP addressing scheme, and additional network devices you are proposing. This diagram can be created Visio, Packet Tracer, http://draw.io/.

also please Provide reasoning for the changes to the network topology. Categorize the changes into the four basic characteristics of a network (reliability, scalability, quality of service, and security) 

    

Provide the IPv4 addressing details for the table below. The initial address space provided to you is 10.xx.0.0/16 where “xx” is your group number. Provide a brief explanation for why you chose these subnet sizes