Category: Programming

  • Poster with code for ( introductory programming) assignment

    This assignment requires you to design and implement a working Python program based on your allocated scenario (for me, Scenario 5C), ensuring it meets all functional requirements such as correct data handling, validation, persistence, and reporting. You must structure your solution using appropriate data structures and clear program logic, handle edge cases (e.g., invalid input or overspending), and ensure the program runs correctly. In addition to the code, you must create a one-page poster explaining your problem context, inputs, program behaviour (pseudocode or flowchart), chosen data structures with justification, persistence approach, constraints, and a short evaluation. Both the Python file and the poster must be submitted on Blackboard before the deadline, and I will attend a viva where I explain and justify my design decisions so I would like a small brief in another page explaining .

    Attached Files (PDF/DOCX): Assessment 2 Brief – DG1IPE.pdf, DG1IPE_A Poster Scenarios.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Review Questions

    1. What is a relation on a set?
    2. How many relations are there on a set with n elements?
    3. What is a reflexive relation?
    4. What is a symmetric relation?
    5. What is an antisymmetric relation?
    6. What is a transitive relation?
    7. Give an example of a relation on the set {1, 2, 3, 4} that is reflexive, symmetric, and not transitive.
    8. Give an example of a relation on the set {1, 2, 3, 4} that is not reflexive, symmetric, and transitive.
    9. Give an example of a relation on the set {1, 2, 3, 4} that is reflexive, antisymmetric, and not transitive.
    10. Give an example of a relation on the set {1, 2, 3, 4} that is reflexive, symmetric, and transitive.
    11. Give an example of a relation on the set {1, 2, 3, 4} that is reflexive, antisymmetric, and transitive.
    12. How many reflexive relations are there on a set with n elements?
    13. How many symmetric relations are there on a set with n elements?
    14. How many antisymmetric relations are there on a set with n elements?
    15. Explain how an n-ary relation can be used to represent information about students at a university.
    16. How can the 5-ary relation containing names of students, their addresses, telephone numbers, majors, and grade point averages be used to form a 3-ary relation containing the names of students, their majors, and their grade point averages?
    17. How can the 4-ary relation containing names of students, their addresses, telephone numbers, and majors, and the 4-ary relation containing names of students, their student numbers, majors, and numbers of credit hours be combined into a single n-ary relation?
    18. Explain how to use a zero-one matrix to represent a relation on a finite set.
    19. Explain how to use the zero-one matrix representing a relation to determine whether the relation is reflexive, symmetric, and/or antisymmetric.
    20. Explain how to use a directed graph to represent a relation on a finite set.
    21. Explain how to use the directed graph representing a relation to determine whether a relation is reflexive, symmetric, and/or antisymmetric.
    22. Define the reflexive closure and the symmetric closure of a relation.
    23. How can you construct the reflexive closure of a relation?
    24. How can you construct the symmetric closure of a relation?
    25. Find the reflexive closure and the symmetric closure of the relation {(1,2), (2,3), (2,4), (3,1)} on the set {1,2,3,4}.
    26. Define the transitive closure of a relation.
    27. Can the transitive closure of a relation be obtained by including all pairs (a, c) such that (a, b) and (b, c) belong to the relation?
    28. Describe two algorithms for finding the transitive closure of a relation.
    29. Find the transitive closure of the relation {(1, 1), (1, 3), (2, 1), (2, 3), (2, 4), (3, 2), (3, 4), (4, 1)}.
    30. Define an equivalence relation.
    31. Which relations on the set {a, b, c, d} are equivalence relations and contain (a, b) and (b, d)?

    Requirements: complete

  • My Unforgettable Memory

    What is your most unforgettable memory?

    When and where did it happen?

    Who were with you during that time?

    Why is this memory special to you?

    How did this experience change or inspire you?

    Requirements:

  • STAT-1050 Statistical Methods for Time Series

    Learning Goal: I’m working on a computer science project and need the explanation and answer to help me learn.

    Requirements: complete

  • The Landscape of Software Tools and Languages

    Overview:

    Exploring Analytics Tools and Their Impact on Data Science

    In Chapter 9, we explore the growing diversity of software tools and languages available to data scientists, highlighting the importance of selecting the right tool for the task. The chapter covers both open-source and commercial analytics tools, the rise of workflow-based tools like KNIME and Orange, and the increasing adoption of Python and R for data analysis. It also emphasizes the importance of understanding the strengths and limitations of these tools, as well as their accessibility and scalability in real-world applications.

    Discussion Prompt:

    With the plethora of analytics tools and platforms available today, how do you decide which one to use for a given data science project? Discuss the key factors that influence this decision, including the project requirements, team expertise, cost considerations, and the need for scalability or real-time processing. Additionally, how do open-source tools like Python and R compare with commercial tools in terms of accessibility, functionality, and support?

    Post Instructions:

    Create a short video demonstrating how to perform a basic data analysis task using both a commercial tool (e.g., SAS or Tableau) and an open-source tool (e.g., Python or R). Highlight the differences in ease of use, capabilities, and the learning curve associated with each tool. Discuss when one might be preferred over the other based on the project needs.

    ScreenPal Instructions for Students.pdf

    Requirements: follow all instection carefill

  • Programming Question

    Assignment due Friday, February 20, 2026 by 11:59pm

    Assignment 1: Cyber ThreatRiskAttack Landscape Survey

    Weight: 20%

    Assessment Type: Survey

    Format: Individual Assignment

    Description:

    In this assignment, you are required to research and analyze and conduct in-depth survey of the current cyber threatriskattack landscape, exploring the evolving nature of cybersecurity challenges faced by organizations today. You need to focus on cyber threat landscape from a global, GCC and UAE perspective that

    changes both over time and has significant impact on the organization and the internetworked users (IU).

    The objective is to examine and critically assess how risks, threats, and attacks interrelate, and how they shape business vulnerabilities in various industries and what organizations are doing to protect themselves.

    You are expected to:

    Part A: Identify at least 10 real-world examples of cyber incidents from recent years, analyze their causes and impacts, and evaluate the broader trends these cases reveal. The analysis should include specific discussion of:

    Risk: The potential for loss or damage to assets, systems, or data.

    Threat: The actors, vectors, and conditions that could exploit vulnerabilities.

    Attack: Specific incidents or actions taken to compromise confidentiality, integrity, or availability.

    Identify and analyze the emergence and discovery of threats and the associated vulnerabilities that

    provide cybercriminals with new attack opportunities (pre covid and post covid).

    Part B: Review and comment on current best practices and strategies organizations employ for risk mitigation, including frameworks, technologies, and governance approaches. Identify the global events such as the COVID-19 pandemic compelling organizations to make major changes to their IT infrastructure.

    Deliverable:

    A comprehensive written report (~2,000 words) that:

    (Use this report template)

    1. Explains the relationship between risk, threat, and attack in the cybersecurity context.
    2. Provides at least three detailed case studies from recent real-world incidents.
    3. Identifies patterns and trends in the current cyber landscape.
    4. Discusses the effectiveness of current industry/business best practices for risk mitigation.

    Assignment Evaluation Criteria:

    Depth and clarity of analysis.

    Relevance and credibility of cited examples.

    Integration of theory with real-world evidence.

    Critical evaluation of mitigation strategies.

    Report structure, writing quality, and citation of sources (APA format).

    Assignment Information

    Length:

    2000

    Weight:

    20%

    Learning Outcomes Added

    • : Assess information security vulnerabilities, threats, and risks, for developing an appropriate risk management strategy.

    Requirements: 2000 woords

  • Apa yang harus dikerjakan ibu rumah tangga?

    Seperti mencuci baju,mengepel,menyapu,menyetrika baju dan lain lain

    Requirements:

  • Programming Question

    I need these three done.

    Requirements: answer 3 assignments

  • Programming Question

    There are two steps to the assessment!!!

    Step 1.Take the Big Five Personality Test by clicking the link. It takes most people 3-8 minutes:

    1. Click “Link” above to begin assessment.

    Screen Shot 2024-08-27 at 9.05.11 AM.png

    2. On new page click “Begin Assessment” button to start.

    Screen Shot 2024-08-27 at 9.05.23 AM.png

    3. Select an answer for each of the 50 questions. After you answer a new question will appear.

    Screen Shot 2024-08-27 at 9.05.45 AM.png

    4. If you have difficulty answering a question, you can skip forward. Or, if you want to change an answer you can go back. There is also a numerical counter to let you know how many questions you have answered out of the 50 total, so 8/50 means you on question 8.

    Screen Shot 2024-08-27 at 9.06.46 AM.png

    5. When you get to the end of the assessment, select “No” and click the “Continue” button.

    Screen Shot 2024-08-27 at 9.06.13 AM.png

    Step 6. Take a screenshot that shows the graph with score percentile and save it as a .jpg, .png, or .pdf.

    Example:

    ——————————————–

    Results summary

    Your results from the IPIP Big Five Factor Markers are in the table below. The table contains a raw score and also a percentile, what percent of other people who have taken this test that you score higher than.

    ——————————————————

    7. Upload you file on the assignment page:

    Screen Shot 2024-08-27 at 9.45.10 AM.png

    8. You should now see the file uploaded in the choose file window. Then click the “Submit Assignment” button.

    Screen Shot 2024-08-27 at 9.45.51 AM.png

    Requirements:

  • what is photosynthesis?

    photosynthesis is a vital process that occurs in plants algae,and some bacteria where they light energy from tha sun into chemical energy in tha form of organic compounds,such as glucose

    Requirements: