Q1

Research, identify, and briefly describe the evolution of information systems infrastructure.

No plagiarism only 25% allowed, Need turn it in report 

Coding

PROGRAM REQUIREMENTS

In this assignment you will implement three basic graph algorithms: breadth-first search, depth-

first traversal, and topological sort. We are not providing any code template, but you must follow 

the input and output formats specified below. Read carefully what you are required to do to 

receive full credit and attempt the extra credit tasks only after you are done with the 

requirements. 

First, implement a graph data structure using adjacency lists. Your code must read graphs of 

arbitrary size from a file (as long as there is enough memory available, your code must work: do 

not assume a maximum number of vertices). The input format is as follows: one line per vertex, 

the first element is the vertex id and the following numbers are the adjacent vertices. The input 

file will always be a bunch of integers and white space. For example,

1 3 4 

3 1 4 

4 1 3

is a graph with four vertices, and three undirected edges: (1, 3), (1,4) and (3,4). 

Then, implement three algorithms: 

• Breadth-first search. Calculate the distance from vertex 1 to all other vertices using BFS. 

Then, print all the vertices sorted by distance from vertex 1. Note that if the graph is 

unconnected, some nodes may have distance ∞.

• Depth-first traversal. Calculate discovery and finish times using DFT. Then, print all the vertices sorted by discovery time.

Topological sort. Print the topological sort of the graph. 

A few comments:

• Look carefully at the sample input and output files and follow the same format. 

• When you look through vertices, visit them in increasing order.

Extra credit: 

• Use BFS to determine whether a graph is connected. The input is a graph, and the output 

is yes or no.

• Implement an algorithm to detect whether a graph has a cycle. The input is a graph, and 

the output is yes or no.

• Design and implement an algorithm that takes as its input a graph ???? = (????, ????) and a 

permutation of ????, and outputs whether the permutation of ???? is a topological sort of ????.

Your algorithm must run in Θ(|????| + |????|).

Unix language

 

  1. Suppose that you wished to copy all of the text files from your fileAsst directory into your current directory (without typing out the name of each individual file). What command would you give to make that copy?
  2. Suppose that you wished to copy all of the text files from your fileAsst directory and all of the files from your fileAsst/Planes directory into your current directory (without typing out the name of each individual file). What command would you give to make that copy?

I need the solution in Unix language 

please, I don’t wanna waste my time if you do not know how to solve it, say it early. 

CC Week15 DB

Hello,

i need this paper by 08/19 afternoon.

Strictly No plagiarism please use your own words.

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism

Discussion

1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2. What are the privacy issues with data mining? Do you think they are substantiated?

COM303 Week 3 Discussion 8

  

Put the word family into an internet browser search engine and then select “images” to look at the photos, cartoons, etc. that pop up when we look up the word family. What do you notice about those ‘families’ that the internet determines are families? Are there any disturbing trends? Any reassuring trends? Choose one photo that came up in your search and analyze it based on the elements and qualities your book uses to explain the family unit. (Be sure to include a link to the photo or upload it directly in your post.)

I need a essay on moodle, isims and their integration

I need a essay on moodle, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of moodle.

This essay is also based on isims, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of Isims.

The essay should include how these systems are integrated.

Benchmark Comprehensive Corporate Project ……..(please read before you message)

For this assignment, students will obtain a thorough understanding of how networks work at the infrastructure, network, and applications layers; how they transfer data; how network protocols work to enable communication; and how the lower-level network layers support the upper ones. In addition, students will have a thorough knowledge of the major network protocols that enable communications and data transfer.

Students will be compiling components from all their assignments to create an Internetwork Implementation Proposal, with full script configuration and diagrams. The audience for the proposal will be mid- to high-level business executives who are somewhat familiar with technology.

The Internetwork Implementation Proposal should consist of the following headings:

  1. Table of Contents 
  2. Overview: Provide a basic description of the organizations current network system, as well as a basic description of the internetwork implementations being proposed.
  3. Network Infrastructure: Provide a complete network topology diagram, including all elements of the network infrastructure, addressing, and applicable configurations. It should include the following: IPv4 device addressing, IPv4 subnets, IPv6 device addressing, and IPv6 subnets.
  4. Network Functionality: Explain the functionalities covered in each course assignment and why the functionality covered in each assignment may or may not be necessary for your company. Reference your topology as appropriate for each function placement. Create relevant subtopics as needed.
  5. Network Protocols: Include how the organizations current and proposed network protocols work to enable communication and data transfer, and specifically address major network protocols.
  6. Network and Applications Layers: Include a description of the organization’s current and proposed network and applications layers, as well as how the lower-level network layers will support the upper ones.
  7. Recommended Infrastructure: Include recommendations for appropriate hardware, quantity, and cost for the proposed networking infrastructure implementations. Make sure to address the nature, scope, and significance of the proposed implementations.
  8. Network Management: Include research issues related to network management, and then choose at least two issues that might occur in your corporation. Then, provide possible solutions for the issues.
  9. Appendix A: Configuration Scripts: Include the configuration scripts required to implement the proposal for each network element and function covered in the proposal.
  10. Appendix B: Configuration Script Instructions: Include detailing instructions on how to implement the scripts in Appendix A.
  11. References: Include two or more scholarly resources.

Objectives:

  1. Create a proposal for an internetwork configuration with detailed instructions for a company.
  2. Apply skills necessary to install, operate, maintain, and troubleshoot networks of all sizes within a business context.
  3. Examine network functions at the infrastructure and applications layers.
  4. Examine network processes for data transmission and communication.
  5. Analyze the relationship between lower-level network layers and upper ones.
  6. Examine major network protocols.