Internet Programming

Internet programming 

 

This is an open book exam. However, each student is expected to work on it alone. Students whose solutions are the same or similar will get a grade of zero!!!

Exam time is 7:30pm to 10:50pm. Read instruction in “CPSC8720FinalExam.pdf”. Submit entire solution in zip file on blackboard before 10:50pm! Exam link will close and you wont be able to submit after that. Wrap up, zip, submit at least 5 minutes before 10:50pm! Submission passed due time will not be accepted! No Exception!

Research paper

 In this assignment you are going to read the following research paper: “A Turing Test for Computer Game Bots”. Then, please answer the following questions: 1. Summarize the following paper. Your summary should be 1 to 2 pages long and should cover the following parts: a. The problem and its importance. b. General description of the proposed solution. c. The experiments conducted. d. The results achieved. e. Did you find this article interesting? Please justify your answer. f. What is your critique on this paper? 2. Using the web, read then write about: a. The Turing Test: what is its purpose, and its importance. Then, give a detailed description of this test. b. The ELIZA chatbot, then briefly explain how ELIZA is related to the Turing Test. c. The Chinese Room argument, then briefly explain how it is related to the Turing Test. Please be careful about plagiarism, and that you do not copy somebody else’s text. There are no constraints on the format of the paper, just make sure that each question can be uniquely identified. The maximum page limit is 4. What to hand in Submit your assignment electronically through D2L. Please make sure that the file that you submit is a word document.

must be on c code

 

A Command-Line Interpreter, or Shell

Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.

  1. Batch Mode

In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.

  1. Interactive Mode

No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.

You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ‘, “, , etc. You may assume that the command-line a user types is no longer than 512 bytes (including the ‘n’), but you should not assume that there is any restriction on the number of arguments to a given command.

Empowering leadership and effective collaboration in geographically dispersed teams

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. 

ERD Diagram, Project, Using MySQL

  

Build out the ERD diagrams for the entire solution based on the following questions (you must have at least 3 tables for full credit, there is no limit based on your simplification of the data. The simplification of the data should follow the in-class examples of data, with no duplication in tables)

Provide 

I. The MYSQL code (within the word document) to build the database and tables

II. The MYSQL code (within the word document) to answer each of the following questions

III. Provide screen shots answering each question along with any supporting text

The answers must be done in SQL, not table presentation and manual interpretation of the data

Questions :

1. What is the total revenue for the year? 

2. What is the gross profit for the year? (based only on what is in the tables)

3. How much revenue did each wine provide for the year?

4. What is the Average revenue per month per location for the year?

5. What is the final inventory of the Premium Red wine?

6. If the retail price of the wine increases by 10%, what is the gross profit margin ?

7. How many bottles of the different wines were ordered in July? 

8. What is the revenue per year per restaurant?

Business_Intelligence_week5

Discussion

 Carefully review and use either of the book options below as a reference for various aspects of analytics.

  • Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
  • Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
  • Important Note:  All students are welcome to use outside research in aspects of analytics.

After reading and analyzing content from book references and or from outside research, select “one” of the research options below and respond.

  • Go to www.IBM.com and find at least three customer case studies on Big Data and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.cloudera.com and find at least three customer case studies on Hadoop implementation, and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.google.com/scholar, and search for articles on stream analytics. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles on data stream mining. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles that talk about Big Data versus data warehousing. Find at least five articles. Read and summarize your findings.

Discussion Expectations

Please make sure to proofread your post prior to submission. They should be well written and free of grammatical or typographical errors.

Knowledge and skills paper:

 

Graded Assignment:  Knowledge and Skills Paper

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Survey and compare and possibly test some text mining tools and vendors. Start with clearforest.com and megaputer.com. Also consult with dmreview.com to further identify some text mining products to explore and even test?
  2. Survey and compare and possibly test some Web mining tools and vendors. Identify some Web mining products and service providers that could potentially be useful in a work environment you may want to be part of.
  3. Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
  4. Search online to find vendors of genetic algorithms and investigate the business applications of their products and even possibly test them where applicable. What kinds of applications are most prevalent and why?
  5. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!!

Important Reminder:  Assessment of discussion boards and other writing assignments account for 75% of overall grading and below are how grades will be assessed for this assignment:

Discussion 2

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Reference articles:

Textbook, Chapter 1 & 11: Bashir, I. (2017). Mastering Blockchain. Birmingham, UK: Packt Publishing. 

Norberg, H. (2019). Unblocking the Bottlenecks and Making the Global Supply Chain Transparent: How Blockchain Technology Can Update Global Trade. The School of Public Policy Publications, (9), 1.

Kshetri, N. (2017). Will blockchain emerge as a tool to break the poverty chain in the Global South? Third World Quarterly, 38(8), 1710–1732. https://doi.org/10.1080/01436597.2017.1298438

Varghese, J. J., Sharma, D., & Singh, N. K. (2019). Analysing the Impact of Blockchain Technology in India’s Digital Economy. Global Journal of Enterprise Information System, 10(3), 94–99. https://doi.org/10.18311/gjeis/2019

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (01/14/21).

3. Atleast 3 references in APA format

4. Min of 250 words (2-3 paragraphs)

Final Exam

 

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.