Categories
Biology

Sponges and all filter feeders use the following as a food source a. plankton only b. all particulate matter suspended in water c….

Sponges and all filter feeders use the following as a food source a. plankton only b. all particulate matter suspended in water c. particulate matter that deposits on the bottom d. dead plankton only e. they photosynthesize

Categories
computer

Information technology in Global economy

 

Q1: In the chapters, both the authors, (Ahrweiler, P., and Gilbert, N.) suggested that there was a need for quality simulation modeling education.  In addition, the authors identified two types of public servants that need this education.  Name the two types of public servants, and briefly explain why it’s important for these two types of servants to receive this education?

**************************************************************************************************************************************************************************************************

Chapter three deals with the assessment of the quality of the simulation.  The first section of the chapter pointed out the problems of the standard view and the constructivist view in evaluating social simulations. Simulation is good when we get from it what we originally would have liked to get from the target; in this, the evaluation of the simulation is guided by the expectations, anticipations, and experience of the community that uses it. This makes the user community view the most promising mechanism to assess the quality of a policy-modeling exercise. The second section looks at a concrete policy-modeling example to test this idea. 

Chapter 3. Q1: Based on the author’s assessment on the quality of social simulation modeling, why did they think that the user community needed to be enabled to understand the model?  Briefly provide your narrative with examples. 

**************************************************************************************************************************************************************************************************

When looking at complexity in policy-making, chapter 4 has provided an illustration to offer insights to future business leaders to understand that, despite the inherent unpredictability of environments, organisms survive and develop intricate webs of interdependence in terms of their ecologies due to the adaptive capacities of organisms that allow them to self-organize. 

Chapter 4: Q1: According to the author’s assessment, what’s the importance of this scenario to the policy-making process?  Briefly explain.

Categories
computer

Assignment 2 CS

 

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following  websites helpful: www.allaboutcookies.org/ www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 400 words or more describing cookies and the way they can invade privacy.

Please watch for reference:  https://www.youtube.com/watch?v=96VDo2yv3-g 

Add citations, No plagiarism or copy paste..

Categories
computer

Web Development/Design/PHP Assignment Help

Hello,

I am seeking assistance with the attached web assignment.  Please be expert in Web Development, Design, PHP, and content management through MySql.  I have taken web development however it has been quite some time ago and am now in need of contant assistance from expert tutor in this field.  I have attached the assignment.  There are two seperate parts.  I have already obtained a web host and domain name.  

 

Part I has been started but cannot figure how to resolve the error messages I get when I run W3 validator (have to do this for all pages and print validation at bottom of web page).  Part II has not been started yet.  I would love to find a tutor who can actually tutor me on the subject at least 1-2 times a week however these assignments are approaching deadline and I need to have these completed ASAP.  If job is well done I would be willing to pay for tutoring sessions.  Please explain details of work completed (can be commented in code) so that I can understand as well as any errors I have done in this assignment.  Again, please be expert in subject as much work will be needed.  Please see attached for detailed instructions.

 

Thanks

Categories
computer

Discuss in 500 words or more the best practices for incident response in the cloud.

Discuss in 500 words or more the best practices for incident response in the cloud.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

https://player.fm/series/1527787

Categories
computer

At this point, you want to put together the work that has been completed Solution

At this point, you want to put together the work that has been completed to deliver a working program for alpha testing. You will combine the elements you have written to this point and deliver a working solution. You will read the contributor information from a file similar to this table below; it is a comma delimited (CSV) file. 

•First Name in first column
•Last Name in second column
City in third column
•Country in fourth column
•Phone # in fifth column
•Donation amount in sixth column
•Contributor ID in seventh column 

As each record is read, create a sorted Linked list of the contributors using the Insertion sort method. You also need to maintain your table, with one modification. You need to add an object to the Hash Collision Object that is a pointer to the data in the Linked list. In addition, you need to implement Contributor search functionality based on a Contributor Name. Your design should include the following:

High Level Implementation Instructions:
•Sorted Linked list
•Sorted using Insertion sort
•Hash bucket of size 5 with a collision solution using a linked list (no need to order)
•A Search Algorithm based on ID and Contributor Name. ?The Contributor Name Algorithm needs to be implemented using the Sequential Search 

Each contributor will have the following information:
•Name: String; //first name of the contributor
Name2: String://last name of the contributor
•City: String; //the city in which the contributor lives
•Country: String; //the country in which the contributor lives
•Phone: String; //the phone number for the contributor
•Contribution: Double; //the amount of the contribution given by the contributor to the zoo
•ID: Integer; //identifier key for future needs 

Contributor functions/methods:
•Input constructor: //to accept a string for the name and additional information for each contributor (this should call the Add constructor to implement the sorted list)
•Print constructor: //to print out the contributor data
•Print All constructor: //to print the entire list of contributor names
•Add constructor: //to traverse the Linked list and find the proper location for adding the instance
•Search constructor: //the Search algorithm to implement is Sequential Search 

Each hash bucket collision item will have the following information:
•ID: Integer; //identifier key for future needs
•Contributor Address: Pointer; //a pointer to the address of the contributor instance in the sorted linked list 

Hash bucket functions/methods:
•Input constructor: //to accept a string for the name and additional information for each contributor (you will only need the ID portion of the input data)
•Hash Function constructor: //Hint: You only have 5 Hash buckets so the function can be very a simple calculation
•Pop constructor
•Push constructor
•Print constructor: //to show the information of the contributor based on a given ID 

Deliverables:
•The design saved in a Key Assignment Draft that does not include any actual code and will be submitted as the deliverable in the next discussion board.
•A fully documented program to load the data creating a sorted linked list.
•A test plan to show how the program runs and can be executed.
•A screenshot showing that the program loaded the data, and after all data is loaded perform the following: ?Print All showing the sorted list.
?Contributor information for George Pipps
?Contributor information for ID 25

Categories
computer

Implementation Phase

 

Resource: The module “Getting the Most From Your Sprints” of the Pluralsight course “Scrum Master Fundamentals – Foundations” with Jeremy Jarrell

Continue your work using the scenario presented in Week One. 

The Director of Software Engineering for the company has determined that you will use an Agile approach for development of the program, including the implementation phase of the program. The Director has asked you to present to the rest of the team, including your intern, the implementation phase for the program development.

Create a PowerPoint® presentation containing 14 to 16 slides, including an introduction and conclusion slide and detailed speaker notes, that includes the following: A brief explanation of the Agile model and how an implementation phase works within the model An example of a software management tool that can be used as you implement the design A description of at least three user stories that will be critical to the design process At least three technical design specifications for the program A brief description of what a Scrum Master does in the implementation phase A simple illustration of a sprint used in the implementation phase

Cite all sources using APA guidelines.

Categories
computer

Cyber Security Project Paper

 

Upload your Term Project Paper here. You may write on any topic related to technology security.

You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references, citing the references where you used the material within the paper itself.

– Assure you are citing in APA format

-You must use a minimum of one graphic or image (may use a table)

– Double space the paper

– You must use APA formatting (6th Edition)

Categories
Architecture and design

Degelman Company uses a job order cost system and applies overhead to production on the basis of direct labor costs.

  

Degelman Company uses a job order cost system and applies overhead to production on the basis of direct labor costs. On January 1, 2014, Job No. 50 was the only job in process. The costs incurred prior to January 1 on this job were as follows: direct materials $22,600, direct labor $13,560, and manufacturing overhead $18,080. As of January 1, Job No. 49 had been completed at a cost of $101,700 and was part of finished goods inventory. There was a $16,950 balance in the Raw Materials Inventory account.
 

During the month of January, Deglman Manufacturing began production on Jobs 51 and 52, and completed Jobs 50 and 51. Jobs 49 and 50 were also sold on account during the month for $137,860 and $178,540, respectively. The following additional events occurred during the month.

           

1.

Purchased         additional raw materials of $101,700 on account.

 

2.

Incurred         factory labor costs of $79,100. Of this amount $18,080 related to         employer payroll taxes.

 

3.

Incurred         manufacturing overhead costs as follows: indirect materials $19,210;         indirect labor $22,600; depreciation expense on equipment $21,470; and         various other manufacturing overhead costs on account $18,080.

 

4.

Assigned         direct materials and direct labor to jobs as follows.

  

Job No.

Direct Materials

Direct Labor

 

50

$11,300

$5,650

 

51

44,070

28,250

 

52

33,900

22,600

            

     

Calculate   the predetermined overhead rate for 2014, assuming Degelman Company estimates   total manufacturing overhead costs of $1,107,400, direct labor costs of $791,000,   and direct labor hours of 22,600 for the year. (Round answer to the nearest whole percent, e.g. 25.)

  

Predetermined     overhead rate

%

    

  

SHOW     LIST OF ACCOUNTS

  

Open job cost sheets for Jobs 50, 51, and 52. Enter the January 1 balances on the job cost sheet for Job No. 50.

  

Prepare the journal entries to record the purchase of raw materials, the factory labor costs incurred, and the manufacturing overhead costs incurred during the month of January. (Credit account titles are automatically indented when amount is entered. Do not indent manually.)

  

Prepare the journal entries to record the assignment of direct materials, direct labor, and manufacturing overhead costs to production. In assigning manufacturing overhead costs, use the overhead rate calculated in (a). (Credit account titles are automatically indented when amount is entered. Do not indent manually.)

  

What is the balance in the Finished Goods Inventory account at the end of the month? What does this balance consist of?

Categories
computer

Understanding Operating Systems Questions

Given that it takes 1.75 ms to travel from one track to the next of a hard

drive; that the arm is originally positioned at Track 15 moving toward the

low- numbered tracks; and that you are using the LOOK scheduling policy:

Compute the total seek time to satisfy the following requests—4, 40, 35, 11,

14, and 7. Assume all requests are initially present in the wait queue. (Ignore

rotational time and transfer time; just consider seek time.)

 

Describe how implementation of a RAID Level 2 system would be beneficial

to a university payroll system. In your own words, describe the disadvantages

of such a system, if any, in that environment, and if appropriate, suggest an

 alternative RAID system and explain your reasoning.

 

Imagine one real-life example of each: a multi-file volume and a multi- volume

file. Include a description of the media used for storage and a general description

of the data in the file.

 

The following is an access verification technique, listing several files and the

access allowed for a single user. Identify the control technique used here, and

for each, explain the type of access allowed.

 a. File_1 R-E-

 b. File_12 RWE-

 c. File_13 RW–

 d. File_14 –E-

 

Devise a way to compress the following list of last names using a lossless

 technique similar to that shown in Table 8.6 for repeated terms. Describe your

method and show the compressed list. Explain the characteristics that make

your technique lossless (and not lossy).

 McConnor, Nelson

 McDavid, Nelson

 McDavid, Patricia

 McDonald, Mary

 McDonald, Marie

 McDonnell, Mike