Syntax analyzer. You may use any top-down parser such as a RDP. Programming Assignment Help. Syntax analyzer. You may use any top-down parser such as a RDP. Programming Assignment Help.
(/0x4*br />
The assignment is to write a syntax analyzer.(base on project#1)
You may use any top-down parser such as a RDP,
a predictive recursive descent parser or a table driven predictive parser.
Hence, your assignment consists of the following tasks:
- Rewrite the grammar Rat20SU to remove any left recursion
(Also, use left factorization if necessary)
2. Use the lexer() generated in the assignment 1 to get the tokens
3. The parser should print to an output file the tokens, lexemes and
the production rulesused;
That is, first, write the token and lexeme found
Then, print out all productions rules used for analyzing this token
Note:- a simple way to do it is to have a “print statement” at the beginning of each function that will print
the production rule.
– It would be a good idea to have a “switch” with the “print statement” so that you can turn it on or off.
4. Error handling: if a syntax error occurs, your parser should generate a meaningful error message, such as token, lexeme, line number, and error type etc.
Then, your program may exit or you may continue for further analysis.
The bottom line is that your program must be able to parse the entire program if it is syntactically correct.
5. Turn in your assignment according to the specifications given in the project outline
Example
Assume we have the following statement
….more ….
a = b + c;
…. more ….
One possible output would be as follows:
…. more….
Token: IdentifierLexeme: a
<Statement> -> <Assign>
<Assign> -><Identifier>= <Expression> ;
Token: OperatorLexeme: =
Token: IdentifierLexeme: b
<Expression> -> <Term> <Expression Prime>
<Term> -> <Factor> <Term Prime>
<Factor> -> <Identifier>
Token:OperatorLexeme: +
<Term Prime> -> e
<Expression Prime> -> + <Term> <Expression Prime>
Token:IdentifierLexeme: c
<Term>-> <Factor> <Term Prime>
<Factor> -> <Identifier>
Token: SeparatorLexeme: ;
<Term Prime> -> e
<Expression Prime> -> e
…. more…..
Syntax analyzer. You may use any top-down parser such as a RDP. Programming Assignment Help[supanova_question]
Transformational Leader with Vision Business Finance Assignment Help
Transformation leaders are viewed as change agents in their organization. They develop, build, model and encourage the vision for the organization. Choose a leader and evaluate how he or she supports the elements of vision in his or her organization. You must identify the leader and his or her organization, and provide a URL to the leader’s website and to the organization.
Instructions:
- Evaluate how this leader communicates the vision.
- What does this leader do to encourage experimentation?
- How does this leader model the vision?
- Evaluate how this leader builds commitment to the vision.
Paper Requirements:
- Your paper should include an introduction and a conclusion and should be 6 pages long, not including the title or reference pages, which you must include.
- Incorporate six scholarly references. please Exclude below refernces when searching scholarly references
- Lyubovnikova, J., Legood, A., Turner, N., & Mamakouka, A. (2017). How authentic leadership influences team performance: The mediating role of team reflexivity.
- Sinek, S. (2014, May 19). Why good leaders make you feel safe [Video file]. Retrieved from https://www.youtube.com/watch?v=lmyZMtPVodo
- Sousa, M., & van Dierendonck, D. (2017). Servant leadership and the effect of the interaction between humility, action, and hierarchical power on follower engagement. Journal of Business Ethics, 141(1), 13-25. doi:http://dx.doi.org.csuglobal.idm.oclc.org/10.1007/s…
——
[supanova_question]
Assignment 6 Computer Science Assignment Help
Question:
For all of the following questions show your sage input/output.
- Compute the order of the curve defined by y^2 = x^3 + 7*x + 25 over the finite field with 47 elements
- On the curve defined by y^2 + x*y = x^3 + x over GF(2^8) compute the inverse of the point (1,1)
- On the curve defined by y^2 + y = x^3 + x^2 + x + 1 over the finite field with 701 elements, find a generator and show its order.
- On the curve defined by y^2 = x^3 + 4187*x + 3814 over finite field of size 6421 compute the sum of the points (3711,373) and (4376,2463).
- On the elliptic curve defined by y^2 = x^3 + 3361*x + 6370 over finite field of size 8461 compute 1001 times the point (1735, 3464).
- On the elliptic curve defined by y^2 = x^3 + 1800*x + 1357 over finite field of size 8191, let P1 = (1794, 1318) and P2 = (3514, 409), compute the sum of 13 times P1 plus 28 times P2.
[supanova_question]
Assignment: Writing Plan Writing Assignment Help
This topic is already picked and it is attached under the writing notes.
For 2-2 Assignment: Writing Notes, you created Writing Notes that helped you to consider how the following critical elements related to your persuasive essay topic:
Now it’s time to revisit your Writing Notes and revise your responses to produce a complete, polished document that addresses all of the above elements. By reconsidering your responses from your Writing Notes, you will construct a Writing Plan. This process will allow you to develop a potential structure for effectively persuading readers to agree with your argument. This plan will be helpful in keeping your thought process on track when you begin writing and revising your essay.
As you work on the Writing Plan, remember to refer to the assignment guidelines and rubric below to make sure you’re fulfilling each aspect of the assignment.
Assignment Guidelines and Rubric
[supanova_question]
Kotter 8 Steps & Final writing assignments Business Finance Assignment Help
Hello Tutor,
Attached please find a word doc which the following two assignments. In addition, I have attached a sample power point project which
1) Kotter 8 Step Complete Step 2 & 3 Only (See instructions on word doc)
2)Final Paper see instructions of word doc.
In addition, I have attached a sample power point project which will assist you on completing step 2 &3 Only. Since Assignment 1 is a group project you are only resposible for doing Step 2 &3
Thanks,
Feel free to contact me if you have any questions.
Raul
[supanova_question]
[supanova_question]
develop a 12-page written security assessment report Programming Assignment Help
Many companies and agencies conduct IT audits to test and assess the rigor of IT security controls in order to mitigate risks to IT networks. Such audits meet compliance mandates by regulatory organizations.
Federal IT systems follow Federal Information System Management Act (FISMA) guidelines and report security compliance to US-CERT, the United States Computer Emergency Readiness Team, which handles defense and response to cyberattacks as part of the Department of Homeland Security. In addition, the Control Objective for Information Technology (COBIT) is a set of IT security guidelines that provides a framework for IT system security in the commercial sector.
These audits are comprehensive and rigorous, and negative findings can lead to significant fines and other penalties. Therefore, industry and federal entities conduct internal self-audits in preparation for actual external IT audits, and compile security assessment reports.
In this project, you will develop a 12-page written security assessment report and lab report for a company and submit both reports to the leadership of that company.
There are six steps to complete the project. Most steps in this project should take no more than two hours to complete. Begin with the workplace scenario and then continue to Step 1.
Step 1: Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
You will get your information from this data-flow diagram and report (Check attachment), which is generated by the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization.
Include the following areas in this portion of the SAR:
- Security requirements and goals for the preliminary security baseline activity.
- Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.
- Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: local area network (LAN), metropolitan area network (MAN), wide area network (WAN), enterprise. Use these questions to guide you:
- What are the security risks and concerns?
- What are ways to get real-time understanding of the security posture at any time?
- How regularly should the security of the enterprise network be tested, and what type of tests should be used?
- What are the processes in play, or to be established to respond to an incident?
- Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?
- Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?
- Describe the ways to detect these malicious codes and what tactics bad actors use for evading detection.
- Public and private access areas, web access points. Include in the network diagram the delineation between open and closed networks, where they coexist, and show the connections to the internet.
- Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?
- Operating systems, servers, network management systems as they relate to data in transit vulnerabilities:
- endpoint access vulnerabilities
- external storage vulnerabilities
- media access control and Ethernet vulnerabilities
- virtual private network vulnerabilities
- Possible applications. This network will incorporate a BYOD (bring your own device) policy in the future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations. You will use some of this information in Project 2 and also in Project 5.
The overall SAR should detail the security measures needed, or implementation status of those in progress, to address the identified vulnerabilities. Include:
Through your research, provide the methods used to provide the protections and defenses.
From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified.
The baseline should make up at least three of the 12 pages of the overall report.
When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company’s overall network defense strategy.
Step 2: Determine a Network Defense Strategy
You’ve completed your initial assessment of the company’s security with your baseline analysis. Now it’s time to determine the best defenses for your network.
Start by reading a publication by the National Institute of Standards and Technology, Special Publication 800-115, Technical Guide to Information Security Testing and Assessment, and outline how you would test violations. Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness. Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation. Within this portion of the SAR, explain the different testing types (black, white, and gray box testing).
Include these test plans in the SAR. The strategy should take up at least two of the 12 pages of the overall report.
After you’ve completed this step, it’s time to define the process of penetration testing. In the next step, you’ll develop rules of engagement (ROE).
Step 3: Plan the Penetration Testing Engagement
Now that you’ve completed your test plans, it’s time to define your penetration testing process. Include all involved processes, people, and time frame. Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE). The process and any documents can be notional or can refer to actual use cases. If actual use cases are included, cite them using APA format.
This portion should be about two pages of the overall 12-page report.
After you have outlined the steps of a penetration testing process, in the next step you will perform penetration testing. During the testing, you will determine if the security components are updated and if the latest patches are implemented, and if not, determine where the security gaps are.
Step 4: Conduct a Network Penetration Test
You’ve defined the penetration testing process, and in this step, you will scan the network for vulnerabilities. Though you have some preliminary information about the network, you will perform a black box test to assess the current security posture. Black box testing is performed with little or no information about the network and organization.
After finding the security issues within the network, define which control families from NIST SP 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations, are violated by these issues. Explain in the SAR why each is a violation, support your arguments with a copy of your evidence, and then provide suggestions on improving the security posture of these violations.
This section should make up at least four of the 12 pages in the overall report.
After you’ve completed the penetration testing, move to the next step, where you will compile a risk management cost benefit analysis.
Step 5: Complete a Risk Management Cost Benefit Analysis
You’ve completed the penetration testing, and now it’s time to complete your SAR with a risk management cost benefit analysis. Within this analysis, think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls.
When you have finished with the cost benefit analysis, which should be at least one page of your overall report, move to the final step, which is the completed SAR.
Step 6: Compile and Submit the SAR and Lab Report
You have completed comprehensive testing in preparation for this audit, provided recommended remediations, and developed a set of recommendations. Now you are ready to submit your SAR.
The requirements for Project 1 are as follows:
Security assessment report (SAR): Your report should be 12 pages minimum, double-spaced with citations in APA format. The page count doe
develop a 12-page written security assessment report Programming Assignment Help[supanova_question]
Module 24 – ANOVA (12 of 14 discussion 1) AND Module 25 – Chi-Square Test of Independence (6 of 8 discussion 1) Mathematics Assignment Help
Module 24 – ANOVA (12 of 14 discussion 1)
Prompt
We will conduct an ANOVA F-test for the variables Color and CFF. The flicker datafile is available in the Data section below. Also, the StatCrunch directions are provided in the list a the bottom of this page.
- What are the hypotheses for the ANOVA test? Be sure that you define clearly the parameters.
- Are the conditions that allow us to safely use the ANOVA F-test met? Explain.
Note: To verify conditions, you will need to examine the distribution of CFF scores for each sample (because the samples are small). - Use StatCrunch to create side-by-side dotplots, histograms or boxplots (your choice) to examine the distribution of CFF scores for each sample. You can use either data format; choose one (stacked data in the first two columns; or unstacked data in the the last three columns). To create the side-by-side graphs (for either data format) see the list of StatCrunch directions below. Download the StatCrunch output window (your graph), upload it to your Stats-Class folder, and then embed the .png file (your graph) in your initial post. To recall how to complete these tasks, see the list of StatCrunch directions below.
- You will also need to compare the sample standard deviations. Use StatCrunch to find the summary statistics, means and standard deviations for the comparison groups (select the the appropriate Descriptive Statistics StatCrunch directions from the list below). Then copy and paste the table into your initial post and explain how the rule of thumb for comparing standard deviations is met.
- Use StatCrunch to carry out the ANOVA F-test (select the appropriate ANOVA StatCrunch directions from the following two options).
Anova F-test Stacked Data Format OR
Anova F-test Unstacked Data FormatCopy and paste the output table into your initial post.
- State your conclusion in context of eye color and mean CFF.
Module 25 – Chi-Square Test of Independence (6 of 8 discussion 1)
Prompt
- A test of independence may be appropriate if we are examining the relationship between two categorical variables in one population. For this situation what is the population? What is the explanatory variable? What is the response variable?
- What are the hypotheses for the Test of Independence? State hypotheses with reference to the context of the scenario.
- The spreadsheet of the data looked like this:
Roadside survey data Driver Gender Alcohol in last
two hours?Driver 1 M Yes Driver 2 F No Driver 3 F Yes .
.
..
.
..
.
.Driver 619 M No We will not use the raw data. Instead we will use the summarized data shown in the table below.
Roadside survey summary Drank alcohol in last 2 hours? Yes No Totals Male 77 404 481 Female 16 122 138 Totals 93 526 619 Use StatCrunch to find expected counts, the Chi-square test statistic and the P-value. (directions)
Copy and paste your StatCrunch table into your post. - How many males in the sample are expected to answer yes to question about alcohol consumption in the last two hours? Show how to calculate this expected count and explain what it means relative to the hypotheses.
- Explain how we know that this data meets the conditions for use of a chi-square distribution.
- State a conclusion at a 5% level of significance. Do you think that the data supports the Oklahoma law that forbids sale of 3.2% beer to males and permits it to females?
[supanova_question]
Dhanu paper 6, 7 AND 8 – I need a thesis paper on the BELOW topic Writing Assignment Help
Paper 6 requirements: I need min of 8 pages, you will have to do 1,4 5,6 and 9 portions from the attached pic under SEQUENTIAL ORDER. Literary references are required for the literature review in this paper.At least 10 literary references are required for the literature references alone. where ever it is, please include your references or citations APA style 6 or 7.
Paper 7 requirements: I need min of 10 to 12 pages and it should be rest of the contents under SEQUENTIAL ORDER.
Paper 8: This paper has to be the combination of paper 6 and 7 plus more information under each section (IN TOTAL 20 PAGES). (You can refer to the PDF paper). PLEASE DO NOT COPY PASTE ANYTHING FROM THAT PAPER BUT YOU CAN USE FEW CITATIONS FROM THAT. DIAGRAMS AND CHARTS ARE IMPORTANT
TOPIC: Inculcating Agile-Leanmethodologies into compliance and Dossier management for regulatory projects.
NOTE: CITATIONS ARE IMPORTANT
you can take some citations and references from the attachments I sent you or where ever you feel you will find peer-reviewed citations. Let me know if you have any questions.
NOTE: I NEED 3 SEPARATE PAPERS. PLEASE LET ME KNOW IN CASE OF ANY QUESTIONS
[supanova_question]
Observations of Special Situations in Education Business Finance Assignment Help
In this Module 4 Application, you will analyze data from the Lacy Elementary School cafeteria and how special situations impact the overall environment. You will then develop a plan of action to address your observations and design a professional development session using a digital format with audio.
- Choose digital format that allows for a visual presentation with audio.
- Create a reference list in APA format.
- Follow the directions to complete Parts 1, 2, and 3 of the assignment.
- Follow the directions to submit your final digital presentation.
Part 1: Profile of a Special Situation
Follow these steps as preparation for Part 3, a presentation for your staff:
Step 1: Read the Lacy Elementary School’s Profile: Special Situations Analysis of the School Cafeteria, available in this document below.
Step 2: Identify those elements that help keep the cafeteria calm, orderly, safe, and well managed, along with those actions that contribute to different management or behavioral problems.
Step 3: Classify the observations into the following five areas.
- Student Characteristics, Issues, and Factors
Conduct assessments of the students in the cafeteria who are demonstrating appropriate and inappropriate behavior. Note where this behavior is occurring (e.g., in the line, at the tables, during the clearing process, when exiting). Note how students are responding to others’ inappropriate behavior, as well as how the on-site staff is responding to different groups of students.
- Teacher/Staff Characteristics, Issues, and Factors
Assess what the teachers and staff in the cafeteria are doing, what they are supposed to be doing, and how they are influencing and/or responding to appropriate versus inappropriate student behavior.
- Environmental Characteristics, Issues, and Factors—Physical Plant and Logistics
Conduct assessments of the physical characteristics and conditions of the cafeteria, and how students and staff are physically/logistically moving in and around the cafeteria (e.g., in the line, through the serving area, when clearing their tables, upon exiting). Note how these physical and logistical factors are contributing to a safe and orderly environment, or a chaotic, problematic one.
- Incentives and Consequences
Assess the incentives and consequences for the students relative to their appropriate and inappropriate behavior, respectively, in the cafeteria. Note who gives these incentives and consequences, and how they contribute to the climate of the setting and the interactions of the students.
- Resources
Assess the resources in the cafeteria (e.g., the people, materials, space, technology) and how they are being used. Note how these resources are making the cafeteria experience successful for the students and staff, or how they could improve the success of the experience if they were used more or more effectively.
Step 4: Summarize the most pressing or significant issues, identifying priorities by ranking each according to importance.
Part 2: The Action Plan
Follow these steps as preparation for Part 3, a presentation for your staff:
Step 1: Using the significant issues and their ranking from Part 1, Step 4, develop an action plan for resolving these concerns. Begin by identifying 3-5 professionals you would select to be on an intervention team, those who would be willing to support and lead the needed changes.
Step 2: Define the mission of the team.
Step 3: Create 1 – 2 research questions to identify hidden needs (such as “Which group should be targeted first for intervention/training development (teacher, administration, student, paraprofessional, other)?”).
Step 4: As you prepare your presentation for the staff, put the significant issues in order of importance and find corresponding quotations from the research which address the needs (such as presence of bullying ~ Smith (2010) says…).
Part 3: Building Community Actions Professional Development
Design a professional development session for the staff of the school using a digital format with audio. In the session, address practical ways of bringing consistent responses to common areas in the school.
NOTE: There are software and free online screen share programs that allow for voice speech combined with visual presentation, such as PowerPoint, Prezi, Powtoon, etc.
The audio-visual presentation should include these elements (not necessarily in this order):
- Introduction to the issue or problem (what students should do versus what they are actually doing – expectations).
- Specific observed inappropriate behaviors, actions, etc.
- Specific Location area of problem(s)
- Current staff (student) handling of situation.
- Desired staff (student) handling of situation.
- How to get staff and students from current to desired actions.
- Identification of the intervention team members.
- Description of the intervention team’s role in the improvement process.
- Supporting References.
NOTE: While the mock data may focus on the elementary level, feel free to adjust your presentation for any instructional situation (i.e. K-12, Higher Ed, etc.).
[supanova_question]
Dhanu paper 6, 7 AND 8 – I need a thesis paper on the BELOW topic Computer Science Assignment Help
Paper 6 requirements: I need min of 8 pages, you will have to do 1,4 5,6 and 9 portions from the attached pic under SEQUENTIAL ORDER. Literary references are required for the literature review in this paper.At least 10 literary references are required for the literature references alone. where ever it is, please include your references or citations APA style 6 or 7.
Paper 7 requirements: I need min of 10 to 12 pages and it should be rest of the contents under SEQUENTIAL ORDER.
Paper 8: This paper has to be the combination of paper 6 and 7 plus more information under each section (IN TOTAL 20 PAGES). (You can refer to the PDF paper). PLEASE DO NOT COPY PASTE ANYTHING FROM THAT PAPER BUT YOU CAN USE FEW CITATIONS FROM THAT. DIAGRAMS AND CHARTS ARE IMPORTANT
TOPIC: Inculcating Agile-Leanmethodologies into compliance and Dossier management for regulatory projects.
NOTE: CITATIONS ARE IMPORTANT
you can take some citations and references from the attachments I sent you or where ever you feel you will find peer-reviewed citations. Let me know if you have any questions.
NOTE: I NEED 3 SEPARATE PAPERS. PLEASE LET ME KNOW IN CASE OF ANY QUESTIONS
[supanova_question]
https://anyessayhelp.com/)
Copy and paste your StatCrunch table into your post.