2-3-4 tree code with insertion and deletion in JAVA

1. Task

Trace the operation of a 2-3-4 Tree (The instructor’s correct way) given the following operations:
insert(47)
insert(43)
insert(23)
insert(90)
insert(95)
insert(27)
insert(67)
insert(80)
insert(88)
insert(29)
insert(59)
insert(24)
insert(69)
insert(44)
insert(71)
insert(61)
insert(99)
insert(42)
insert(38)
Next, Delete the following items sequentially.
delete(27)
delete(38)
delete(44)
delete(95)
delete(88)
delete(59)

Starting with an empty tree, perform the following insertion operations:
insert(17)
insert(15)
insert(49)
insert(34)
insert(76)
insert(59)
insert(97)
insert(69)
insert(46)
insert(86)
insert(20)
insert(99)
insert(22)
insert(52)
insert(89)
insert(57)

insert(10)
insert(41)
insert(75)
insert(37)
And then do the following deletions:
delete(99)
delete(22)
delete(69)
delete(15)
delete(10)
delete(75)

2 Deliverables
Java Program (source code) file, and an output file of a tree with nodes and values.

Exp22_Excel_Ch10_Cumulative – Student Enrollment

#Exp22_Excel_Ch10_Cumulative – Student Enrollment 

#Exp22 Excel Ch10 Cumulative Student Enrollment 

#exp22_excel_ch10_cumulative – student enrollment 

#Excel Chapter 10 Cumulative – Enrollment Report 

#Exp22_Excel_Ch10_Cumulative_EnrollmentReport 

  

Project Description:

You are a student enrollment analyst at a local university. Currently your data management systems contain student information, course offerings, and student grades. You want to create a report to examine total enrollment and student performance. You will use Power Query to import data, Power Pivot to analyze grades, and Power Maps to visualize student demographic information.

     

Start Excel. Download and open   the file named Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Use Get & Transform to   import the file e10c1StudentEnrollment.csv   into a new worksheet. Be sure   to load the table to the data model during import.

 

Rename the worksheet StudentEnrollment.

 

Use Get & Transform to   import the ClassesOffered table located in the database e10c1ClassOfferings.accdb into a new worksheet. Be sure to load   the table to the data model during import.

 

Import the GradeReport table   from the e10c1Grades.accdb database   into a new worksheet. Be sure to load the table to the data model during   import.

 

Open the StudentEnrollment query   in the Power Query Editor. Split the Name column using space as a delimiter.   Rename the split columns Last Name and First Name respectively. Close and load the query.

 

Use Get & Transform to   import the file e10c1StudentEnrollment2024.txt   into a new worksheet. Prior to loading the data into the worksheet, use   the Power Query Editor to split the Name column using space as a delimiter.   Rename the split columns Last Name and First Name respectively.

 

Append the   e10c1StudentEnrollment table with the data from the   e10c1StudentEnrollment2024 table. Close and Load the table.

 

Define the following   relationship between the Grade Report table and Classes Offered table:
 

  Table:
  GradeReport
  Field:
  ClassNumber
  Table:
  ClassesOffered
  Field:
  ClassNumber

 

Define the following   relationship between the Grade Report table and the e10c1StudentEnrollment   table:
 

  Table:
  GradeReport
  Field:
  StudentID
  Table:
  e10c1StudentEnrollment
  Field:
  StudentID

 

Use Power Pivot to create a   PivotTable on Sheet1 starting in cell A1. Add ClassName from the   ClassesOffered table to the Rows area, Grade from the GradeReport table to   the Values area, and ClassNumber from the ClassesOffered table to the Filters   area.

 

Change the Implicit measure of   GPA created in the previous step from Sum to Average.

 

Rename the worksheet GradeAnalysis.

 

Format the grades in the range   B4:B19 to display 2 decimal places.

 

Insert a Clustered Column   PivotChart. Add the chart title Grade Analysis. Move and resize the chart so that the upper-left   corner is inside cell D4 and lower-right corner is inside cell K18.

 

Create a 3D Map based on student   addresses in the enrollment table. Add Address as the Location dimension. Add   Grade as the Height dimension and change the aggregation from Sum to Average.

 

Add Grade as the Height   dimension and change the aggregation from Sum to Average. Zoom and tilt the   map so the entire US is visible. Edit Scene 1 by changing the name to Over View, setting the Scene duration to   6 seconds, and then setting the Transition Effect to Dolly.

 

Add a new scene called East Coast. Zoom out and reposition the   map to view the Eastern seaboard. Set the Scene duration to 6 seconds and set   the Transition Effect to Dolly.

 

Edit the connection properties   so all queries do not refresh in the background and do not refresh on Refresh   All.

 

Save and close Exp22_Excel_Ch10_Cumulative_EnrollmentReport.xlsx.   Exit Excel. Submit the file as directed.

SQL Common Security Expressions

 

Bike Stores is implementing a new website to allow online bike purchases. In support of this, a stored procedure called GetUser has been created to retrieve a customer record using the customer’s first name, last name, and password supplied from a website form. From your research on database security, you notice that there is a serious security concern with the GetUser procedure. You have established a series of SQL statements to test for GetUser security flaws. These statements will be used with two temporary tables called staffs_temp and order_items_temp, which are copies of the staffs and order_items tables, respectively.

Assessment Instructions

You must have SQL Server Express and SQL Server Management Studio (SSMS) installed to perform this assessment task. The sample database for this module is called BikeStores. Download the Database Design Diagram below.

Use the BikeStores database design diagram for your stored procedure assessment..

Please copy each SQL statement into a Microsoft® Word® document. Below that, enter a screenshot of the execution of the SQL showing the code and the resulting output. Below that, enter text explaining the SQL statement and outcome. What has occurred? Was there an adverse impact from the SQL statement execution?

Task 2.1 – Dynamic SQL Statements Without Binding

Execute the individual SQL statements contained within the following text file in a Microsoft SSMS query window:

After executing these statements, explain why the GetUser stored procedure is problematic. Did any unauthorized data modifications occur? Did data corruption occur? Were any tables improperly dropped from the database?

Task 2.2 – Dynamic SQL Statements With Binding

Based on the Task 2.1 results, the GetUser stored procedure has been revised and replaced with a stored procedure called GetUserWithBind. Execute the individual SQL statements contained within the following text file in a Microsoft SSMS query window:

After executing these statements, explain whether the GetUserWithBin

Discussion 11- Org Behavior

Assigned Readings: Chapter 11. CommunicationInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. You have recently been promoted to district manager of a large scale restaurant chain which specializes in affordable meals in a pleasant environment. In accordance with management objectives, you are responsible for increasing sales of appetizers by 20 percent by the next quarter for the 15 locations in your area. Keeping channel richness in mind, how will you make contact with the restaurant employees to facilitate the sales increase?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]Submitting the Initial Posting:Your initial posting should be completed by Thursday, 11:59 p.m. EST. 

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

cloud security

 

  • Research a cloud security service. Some examples include: 
  • CloudFlare
  • Sophos Central
  • Trend Micro Deep Security
  • CipherCloud
  • Fortinet
  • Palo Alto
  • SiteLock
  • Proofpoint
  • In a Word document, identify the following and write a brief summary of what you learned in your research:
     
  • The features and functionality of the cloud security service
  • Who provides the service and billing/pricing options

Assignment

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Python – Write code to open a txt file and get outputs for Parts A, B, C

   

Instructions

Several data files are also present: Patients.txt, Diagnoses.txt, Labs.txt, and Admissions.txt.

Please note that each data file has a columns descriptor line as the first line of the file.  When processing, we must IGNORE that line as it is obviously not valid data. The following code preceding the actual loop that reads the file does just that. Each time you read a file containing that header line you must include this code.

fhand = open('Diagnoses.txt')    # open the file, establish the file handle

fhand.readline()                 # read the first line and ignore it
# declare and set any initialization variables here, such as counters, lists, dictionaries

for line in fhand:         # loop through the file line by line 

Part A

What patient (by ID) has the most admissions? 

1. Open Hwk12a_STARTER.py, rename it, and run it. It should display the ID field from all the lines in the file Admissions.txt. Comments included therein guide your code development.

2. Run and study the code in Ch 9 code sample 13. It provides most of what you need for this task. (PLEASE ATTACHED FILE PART A.JPG FOR CODE SAMPLE)

Part B 

What are the 10 patients (by ID) having the most labs? 

1. To tackle this task, repeat the code you wrote in 12a to create a dictionary containing IDs and the count of those IDs, this time on the Labs.txt file.

2. Then employ the strategies used in Ch 10 code sample 10 (ten most common words) to create a list of tuples, sort the list, and then print the first ten.

  

Part C 

Of the top 10 patients with the most labs, how many are male? Print their IDs and print the number of males in the top 10.

1. Repeat the code you wrote in 12b to create a dictionary containing IDs and the count of those IDs, create the list, and sort the list in reverse.

2. Now you have to find out which of the top 10 in the list of most Labs are male. To do that, you have to loop through the Patients.txt file, checking to see if the ID is present in the same line as the word ‘Male’.

3. Follow the comments in the code to add the statements necessary to achieve the tasks. Don’t be afraid to add print statements to help you write the code; remove them when you’re finished. The output is shown below.

End-term portfolio

Here are the few documents that I have attached. Please kindly refer those.

There are four different files. we need to work on End-term portfolio using the graduate-level project2. And the rest two of them are reference

BYOD Registration Form

  

In Section 1, you will provide the specifications of your personal BYOD computing device. In Section 2, you will provide a brief description/explanation of the specifications of your device. You will learn about the specifications and capabilities of your machine in the process.

This task will require you to investigate your machine’s internals. How you locate your system information will vary by operating system.

Include a screenshot showing key system information.

How Will My Work Be Evaluated? 

For this assignment, you are asked to complete the Hudson Fisher Associates (HFA) Bring Your Own Device (BYOD) Registration Form to ensure your device meets the organization’s minimum information technology (IT) baseline specifications and security requirements. The first part of the assignment requires you to access and document your machine’s specifications. In the second part, you will provide explanatory details on the specifications.

By documenting your specifications and explaining your results in an effective narrative format, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 2.3.2: Incorporate relevant evidence to support the position.
  • 3.1.1: Identify quantitative information that is relevant to a problem or situation.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.

This week, you will submit your first project, the BYOD Registration Form.

  • Two to three pages (including registration form)
  • Features a fillable template

To get started, download the BYOD Registration Form Template and follow the instructions in the document. 

 Delete the instructional text from the template before you submit.  

 When you are finished, click “add a file” to upload your work, then click the Submit button.

Research Paper

  

Scenario

On Thursday morning, John, an XYZ university employee, noticed a warning message on his computer saying that the system has been attacked by a worm Win32.VB. Even though the antivirus software was present in the system, the software failed to detect the new worm because it was not updated to the latest version. When John tried to open his e-mail, he experienced a slow internet connection. He noticed there were some unusual file names in the disk. John immediately informed his friend Bob, who was also an XYZ employee, of the problem. Bob checked his computer in his office and experienced the same problem as John. John and Bob checked several computers in the laboratories, and found that Win32.VB worm had infected many other computers in the laboratory. They contacted the system administrator of the XYZ University. The system administrator checked the computers in the laboratory and reported the incident to the incident response team. The system administrator also checked the computers in other laboratories. As a result of the worm attack the activities in the XYZ University laboratory were suspended for a day, which caused a great inconvenience.

 

Case Objectives:

  • Create an incident response plan which      is accompanied by a forensic plan please refer to NIST specifications.
  • Must include penetration testing and      forensics procedures etc.
  • Diagram of the attack
  • Identify the vulnerabilities

     

Requirements:

• Minimum of 1,250 words / Maximum 1,800 words (Double spaced)

• APA style

• At least 7 works cited 

• At least 5 of your references have to be scholarly peer-reviewed articles

• Research paper will be checked for plagiarism so be sure to correctly cite your sources!

80/20 rule for all submissions