block chain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

Need 3 answers for each question.  1 APA reference MUST. APA 7th edition

Question 1:

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

Question 2:

What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Yes/No Why?

Programming project in Java or C++

The city council in the town of Durburn has decided to improve road sign placement, especially for the numerous dead ends that are currently unmarked in various parts of the city. They have given you a road map, and you must determine where to put up signs to mark all the dead ends. They want you to use as few signs as possible.

The road map is a collection of locations connected by two-way streets.

The following rule describes how to obtain a complete placement of dead-end signs:

Consider a street S connecting a location x with another location. The x-entrance of S gets a dead-end sign if, after entering S from x, it is not possible to come back to x without making a U-turn. A U-turn is a 180- degree turn immediately reversing the direction.

To save costs, you have decided that you won’t install redundant dead-end signs, as specified by the following rule:

Consider a street S with a dead-end sign at its x-entrance and another street T with a dead-end sign at its y-entrance. If, after entering S from x, it is possible to go to y and enter T without making a U-turn, the dead-end sign at the y-entrance of T is redundant. INPUT

The first line of input contains two integers n and m, where n (1 ≤ n ≤ 5*105) is the number of locations and m (0 ≤ m ≤5 * 105) is the number of streets. Each of the following m lines contains two integers v and w (1 ≤ v < w ≤ n) indicating that there is a two-way street connecting locations v and w. All location pairs in the input are distinct.

OUTPUT

On the first line, output k, the number of dead-end signs installed. On each of the next k lines, output two integers v and w marking that a dead-end sign should be installed at the v-entrance of a street connecting locations v and

w. The lines describing dead-end signs must be sorted in ascending order of v-locations, breaking ties in ascending order of w-locations

Articlee writing

Write a 3-page paper (1000 words):  defining “what is artificial intelligence?” What is the history behind it and how can it benefit our society in the future? Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.

case study

In a 3-5 page APA formatted paper, examine the requirements for the system engineering program you were working on during your internship. The following should be addressed in your paper

  • Identify and describe the importance of the system engineering management plan (SEMP along with the risk management plan.
  • Apply system engineering processes and disciplines to decompose a complex engineering problem your team has been struggling with.
  • Investigate the use of model-based system engineering tool(s) to simplify the business process and find an optimal solution to the problem at hand. Be sure to include the name of the tool you are recommending and how it can help solve the problem compared to any other competitive tool.

Your paper should be formatted in the 7th edition APA style and include references as required.

Week 12 Research Paper ERM

Please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

new tech bus leaders

 What role do you feel that VR/AR will play in the future for managing products within an enterprise supply chain system? 

augmented reality (AR) and virtual reality (VR) 

Computer Science Project Documentation

 Document a banking Application is a software majorly for controlling and managing financial transaction and a group activities ?

 It will focus on the major operation of the group that is; adding members, updating the group information, facilitate borrowing and returning of loans. 

Discussion 5 Cryptography

 

Question: Analyze the structure of advanced encryption standards and why it makes it so strong.  

  -You must use at least one scholarly resource.

  -Every discussion posting must be properly APA formatted.

– No Plagiarism

– 400 Words

-References