Develop an ADT specification for

 1. Develop an ADT specification for a priority queue. A priority queue is like a FIFO queue except that items are ordered by some priority setting instead of time. In fact, you may think of a FIFO queue as a priority queue in which the time stamp is used to define priority.
 

2. Write an algorithm to reverse a singly linked list, so that the last element become the first and so on. Do NOT use Deletion – rearrange the pointers.
 

3. What is the average number of nodes accessed in search for a particular element in an unordered list? In an ordered list? In an unordered array? In an ordered array? Note that a list could be implemented as a linked structure or with an array.
 

4. Write a routine to interchange the mth and nth elements of a singly-linked list. You must rearrange the pointers, not simply swap the contents.
 

5. Given the following interface for a list, comment on it from the perspective of an ADT.
 

public interface ArrayList {
public ArrayList(void) { List = 0 }; //constructor – initializes list to be empty
public Insert(itemtype item, int index); //verifies index & inserts itemat position index in list
public int Search (itemtype item); //searches list & returns position of item. Returns -1 if not found
public int CountItem ( itemtype Item);
private boolean VerifyIndex (int index); //validates that index is position within list

 

Project 1: Job Interview Presentation

This week, you will submit your answers to the interview questions.

If you didn’t download the Job Interview Presentation Template from Week 3, do so now and follow the instructions to record your work.

The questions are based on fundamental networking concepts that are likely to be asked at an entry-level networking job interview. The following topics are covered:

LAN topologies
OSI model and layers
networking devices
common protocols
IP ranges
class of network and default subnet mask
autonomous system
You will also need to include either an audio file along with your presentation or record a screen-capture video of the presentation. These presentation resources can help you prepare and record your presentation. Your presentation should be done as if you were in an actual interview. The presentation should be about five to 10 minutes.

How Will My Work Be Evaluated?

As you progress in your networking career, you will interview for positions and may even find yourself making presentations to customers, client audiences, and management. Effective interviewing includes a systematic, purposeful conversation. Your goal is to demonstrate your knowledge, skills, and/or experience; and ability to do the job successfully. You can achieve this by explicitly and confidently answering the questions posed.

The interview questions selected are likely to be asked during an interview for an entry-level networking position. Successfully answering these questions conveys a foundational networking knowledge that will help you land the position! Use the provided PowerPoint template to document your answer, then record yourself answering each question. Submit to the Assignment folder when complete.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.2: Support the main idea and purpose of a communication.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder

Cryptography History

Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history. 

questions

 

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

Complete your answers on a WORD Document

ISM – Analysis and Proposed Solution

This question describes a situation where software is required to support the operation of a new product developed by a start-up. The start-up is developing equipment that it will sell to households. This equipment will enable people who do repair or installation work in and around their homes, to be more effective. The start-up has just been granted a patent for their first product. This will be a replacement for both short and tall ladders. Their first product will be a drone, light enough to worn as a back-pack, with computer control for navigation and stability. This will be used as a ladder replacement, for access inside houses and buildings. 

The control software for the drone will need to:

maintain stability, 

support navigation 

and avoid collisions.

In Chapter 2 we learned about sourcing software. Propose sourcing for the software to control this drone. You can consider the sourcing alternatives as sourcing the entire control system or acquiring the three components: stability maintenance, navigation, collision avoidance separately and having these integrated, either in-house or by a supplier.

Note that this device will be controlled by the wearer, so there is need for automation to detect and avoid obstacles. 

Analysis:

What are the lowest cost and lowest risk alternatives that should be considered? You can consider sourcing by operating function (stability, navigation and collision avoidance) or for the total operating system. Discuss these alternatives.

Proposed Solution

Identify proposed software sourcing, either by operating function (stability, navigation and collision avoidance) or for the total operating range, with explanations. You should search the Web for COTS or Open Source opportunities for software acquisition and identify potential software that could be used.

Remember acquisition is lower cost than new development.

IT Concept Research Paper Analysis and explanation

  Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions:

  • What is an Information Technology Project?  
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer-Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in your writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism?

Your assignment must follow these formatting requirements:

  • Assignment should be 3 – 5 pages (not including cover & reference page)
  • Use at least three – five (3 – 5 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page do not count toward the page count.

Gathering information

  

In 2–3 paragraphs for each technique, explain the reasons for using the method and describe effective ways to gather information with the method. Be sure to incorporate the research you conducted to support your ideas.

Intro Comp

In this discussion, you are going to explore how digital computing has changed the world. You will select a specific area to research the impacts of digital computing. Feel free to choose something that you find particularly interesting or that relates to your future career goals. Since digital computing has now impacted just about every field, you have a lot of options! Some examples include robotics, agriculture, communication devices, medicine, sports, entertainment, journalism, and criminal justice. Create and share a timeline of milestones and how these milestones have changed the world. Include at least 6 milestones. For each milestone include:

  • a date (might be just a year or might be a specific day)
  • a brief description of the milestone
  • a brief description of the impact it had on society

 Should be a minimum of 300 words and all citations should be in MLA style with a link to allow for easy verification.  You must include at least 2 references. Read the timelines of at least 2 classmates. Research and comment with an additional milestone (date, milestone, impact) for the area they chose.  Include at least 1 reference with MLA citation. Write 2-3 sentences speculating about what the future might hold in the area they chose or share a personal story that relates to the area they chose.

IEEE format paper

For this assignment, you need to write a paper (min 3 pages or longer) that is on any topic related to bioinformatics, computational biology, systems biology, biomedical engineering, etc. The paper has to have original material and cannot be copied. You cannot copy text and cannot copy figures.  If you are seen copying text or figures from other papers, you will be penalized.  Instead your paper should have figures showing a protein’s primary structure (protein sequence), secondary structure (3D ribbon diagram showing motifs like alpha helixes and beta strands of a protein sequence folded into a 3D structure), and tertiary structure (3D space fill model showing all the atoms of the 3D protein shape and structure). The paper has to be structured like a conference or journal paper. You can use a sample Springer or IEEE conference paper template (but that is not necessary). It has to have a structure like Title, Authors, Abstract, Keywords, Introduction, Methodology, Results, Discussion, Conclusion, Acknowledgements, References.