CSCI 457 Assignment 3 – Biography Viewer

Choose one of your favorite games, and implement an app that shows the biography of each character of the game.

Requirements:

  • Your app should show a list of characters in the main view using a table view.
  • A small icon and some brief information of each character should be displayed in the table
    view.
  • The user can scroll up and down to see the full list.
  • The user can swipe right to reveal two buttons to favorite a character or unfavorite a
    character.
  • A checkmark is displayed for each favorite character, and the checkmark is removed if the
    character is unfavored.
  • The user can touch a character to open a detail view to see the character’s large portrait and
    full biography.
  • Do not use parallel arrays. Use a class for the characters.

Cyber Security planning&mgmt week 5

 

Writing Assignment – WK 5

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words

portfolio

 

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

EH week 13

 

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Heaps and prority queus In python

You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide:

Develop a heap data structure using a linked structure (Nodes and Pointers)

The heap must support add and remove from the heap

All operations most abide by the rules that govern a heap (see lecture slides for reference)

Once you have your heap structure created, next you must use it as a backing structure to a priority queue.

Develop a priority queue data structure that is backed by a heap (linked structure NOT A LIST)

Implement the normal methods that accompany a priority queue structure

Enqueue, dequeue, and peek by priority not position

Also length and whether or not the structure is empty (is_empty)

Perform the following operations to showcase your working structure

Enqueue the following items: 4, 7, 5, 11, 8, 6, 9

Dequeue 3 items by priority, they should be 4, 5, & 6.

related heap.py file code is below

class Heap:

    def __init__(self):

        self.heap = [0]

        self.size = 0

    def float(self, k):

        while k // 2 > 0:

            if self.heap[k] < self.heap[k//2]:

                self.heap[k], self.heap[k//2] = self.heap[k//2], self.heap[k]

            k //= 2

    def insert(self, item):

        self.heap.append(item)

        self.size += 1

        self.float(self.size)

    def sink(self, k):

        while k * 2 <= self.size:

            mc = self.minchild(k)

            if self.heap[k] > self.heap[mc]:

                self.heap[k], self.heap[mc] = self.heap[mc], self.heap[k]

            k = mc

    def minchild(self, k):

        if k * 2 + 1 > self.size:

            return k * 2

        elif self.heap[k*2] < self.heap[k*2+1]:

            return k * 2

        else:

            return k * 2 + 1

    def pop(self):

        item = self.heap[1]

        self.heap[1] = self.heap[self.size]

        self.size -= 1

        self.heap.pop()

        self.sink(1)

        return item

h = Heap()

for i in (4, 8, 7, 2, 9, 10, 5, 1, 3, 6):

    h.insert(i)

print(h.heap)

for i in range(10):

    n = h.pop()

    print(n)

    print(h.heap)

Practical Connection Assignment: Operational Excellence

  

Practical Connection Assignment: Operational Excellence

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Discussion 1

As stated in the text, “people and organizations are responsible for the results, good or bad, of the use of IT” (p. 576). For this discussion you will analyze the role of ethics in IT and business.  In your initial post, using an example of your choice, explain the differences between law and ethics.

Analyze the impact of ethical issues on IT, and provide an example of an ethical issue that has impacted an organization as well as an ethical issue that might impact you personally.  Explain the potential legal and ethical challenges associated with advancing technology, using at least one example from your research. Explain whether or not you believe the laws have caught up with technology. Support your position with examples from credible sources. 

Your initial post must be a minimum of 300 words.

Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. Fo

 

Financial engineering problem…

Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. For the first option the stock price is 50, the strike price is 51, the volatility is 28% per annum, and the time to maturity is 9 months. For the second option the stock price is 20, the strike price is 19, and the volatility is 25% per annum, and the time to maturity is 1 year. Neither stock pays a dividend. The risk-free rate is 6% per annum, and the correlation between stock price returns is 0.4.

1. Using C/C++ or Java or Matlab to calculate the 10-day 99% Monte Carlo Simulation based VaR for the portfolio. Set the number of simulation to 5000.

2. What else data is required to calculate the 10-day 99% Historical based VaR for the portfolio?

700 word discussion: e are five (5) most important value systems identified and are associated with, and play a major role in the development of smart meters.

  

Chapter Eight (8) – Value Sensitive Design of Complex Product Systems: According to Ligtvoet, van de Kaa, Fens, van Beers, Herder, and van den Hoven, (in press), full and comprehensive overview of all relevant components of a system increasingly continue to become difficult. The natural response to complex problems is to delve into details. The suggestion is that an opposite move towards a more abstract approach will gain fruition. The authors have also used the development of smart meters in the Netherlands for illustration. A more explicit focus on the values that play a role for different stakeholders avoids fruitless detours in the development of technologies. These authors continue to state that, policy-makers would do well by not only addressing functional requirements but also taking individual and social values into consideration.

  

According to research by Ligtvoet et al. (in press), Chapter 8, there are five (5) most important value systems identified and are associated with, and play a major role in the development of smart meters. Please name them, and briefly state their functions? provide a clear narrative to support your responses

Unit 4 Case Study

 

Please read “R3: Putting the ‘Fin’ Back into Fintech” case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length EXCLUDING TITLE AND REFERENCES. Use proper grammar, spelling, citations, etc.

1.How does Fintech compare to regular banking?

2. Discuss R3 and its distributed ledger technology mission.

3. What are some of the applications of cords and strategies of growing and expanding?

4. What are some of the emerging markets that Fintech has impacted?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page.