CSAS 2126 Data Structures and Algorithms Priority Queues, Tree, and Disjoint Sets Questions 1. Priority queue [20 points] Complete

CSAS 2126 Data Structures and Algorithms Priority Queues, Tree, and Disjoint Sets Questions 1. Priority queue [20 points] Complete. CSAS 2126 Data Structures and Algorithms
Priority Queues, Tree, and Disjoint Sets

Questions
1. Priority queue [20 points]
Complete the exercise from textbook 6.18 (page 285)

2. Tree [10 points]
Complete the exercise from textbook 4.15 (page 184)

3. Disjoint Sets [20 points]

Consider the set of vertices A-P, and the relationships {(D, A), (B, E), (C, P), (I, J), (L, N), (O, D), (K, L), (L, A), (F, M), (G, M), (H, P), (L, G), (E, K)}. Show the final forest if
a) The tree for the right element is always pointed at the left element.
b) The smaller tree is always pointed at the larger tree, pointing right at left if of equal rank.
c) The smaller tree is always pointed at the larger tree, and path compression is used.
In each case, give the total number of pointers followed in searching and the number of pointers added or changed during the algorithm. Then, for each forest, give (1) the maximum depth of a node, and (2) the cost of searching, averaged over the 16 nodes. [Remember that a search starts at the node and runs to the root. Do not use path compression on those searches.]

Instructions
• For all the questions, either you can write a clear pseudocode/Algorithm or C programming language.
• There are 3 questions and try to complete the first 2. For problem statement 3 –after the Monday session (April 11’ 2022), you can start doing the assignment

CSAS 2126 Data Structures and Algorithms Priority Queues, Tree, and Disjoint Sets Questions 1. Priority queue [20 points] Complete

In this lab, you will creating an API that will be used by another application. Because this API is

In this lab, you will creating an API that will be used by another application. Because this API is. In this lab, you will creating an API that will be used by another application. Because this API is used by another application, is important that you create it exactly according to the specification that the consuming app is expecting. In this case, you will be building a “backend” to a privacy-focused note management web application. You can access the application by going to https://spy-notes.rk0.xyz/. The way this web application works is that there is some code that runs on the browser (the “frontend”) and code that runs on a server (the “backend”). That frontend code will be in charge of presenting information to the user, as well as handling animations, input validations, and some other UI responsibilities. The backend code is often responsible for things like centralized data storage and authentication. Intuitively, having data stored in a central location is what lets you log into an app on your phone, create some content, and then be able to log in with a totally different computer and continue working.

In this lab, you will be writing the backend data-storage code for the note-taking web application mentioned above. Unlike most web applications, the frontend lets the user provide a URL for the backend server they want handling their request. When your assignment is done, you should be able to plug in your own server’s URL, and have the app work exactly as it did with the default built-in backend.

When this project is done, you will have written a new working backend, in a different language than I used to write the original backend, with different data-storage technology and no specific knowledge of how my app is coded.

Part 1: The REST API
There are a number of features in the web application that rely on a backend server. Each of those features is associated with a REST-ish endpoint. The endpoints are listed below.

Note: Browsers have a security mechanism that by default prevents requests to servers at URLs other than the domain your are currently browsing unless the server allows it explicitly. This prevents a site like www.evil.com from making unsafe requests to www.yourbank.com. To opt out of this protection for a specific API, annotate your RestController classes with @CrossOrigin (or follow another config pattern here: https://spring.io/blog/2015/06/08/cors-support-in-spring-framework)

Create a User
Users are able to register for the secure-notes site. When they do, they will be given a long random string that they need to keep safe. It will act as their anonymized username and password. The string is a UUID. When a user clicks the button to register themselves a user, the browser will make a request to the server and the server will generate one of those UUIDs. You should store that key and the date the key was created. There is a built-in way to generate UUIDs in Java. Check out an article for how to use that here

Sample Request

POST /users

Sample Response

{
“userId”: “abc-123-def-456”,
“createdDate”: 1614055067895
}
Fetch Users
This endpoint should return a list of all users in a JSON array. The response should include their IDs and a timestamp for when they were created. A real privacy-focused app either wouldn’t have this endpoint. In this case, it’ll be helpful for debugging though.

Sample Request

GET /users

Sample Response

[
{
“userId”: “abc-123-…”,
“createdDate”: 1614055067895
},
{
“userId”: “def-456…”,
“createdDate”: 1614055067896
}
]
Fetch User QR Code
Each user’s UUID can be encoded as a QR code. The job of this request handler is to return a QR code image that represents that UUID. In this case, the browser will pass the UUID for a user in the request. ZXing is a good potential library for generating QR codes. The documentation is not the best IMO but this article gives a pretty complete descriiption of how to make a Spring Server respond to a request with a QR code.

Note: There are different formats of QR code and different image that can scan. As long as it shows something in the browser and it’s scannable by a reasonable app / tool, I don’t care what format you choose.

Sample Request:

GET /users/abc-123-def-456/qr

Sample Response:

qr-sample.png

Create a Note:
Users should have the ability to create notes through your API that will be associated with their particular user. Each note has a title and some content as well as a UUID and a creation date. The UUID will be unique for each note and separate from the UUID of the user.

Sample Request

POST /users/abc-123-def-456/notes

{
“title”: “Note title”,
“content”: “This is the body of my note”
}
Sample Response

{
“noteId”: “asd-098-fgh-765”
“title”: “Note title”,
“content”: “This is the body of my note”,
“createdDate”: 123412414
}
Fetch Notes
This API return the list of all notes for a specific user. The web application will call this when it wants to load or refresh the list of notes. It might happen more often than you would think.

Sample Request

GET /users/abc-123-def-456/notes

Response

A JSON Array of all the note objects for that particular user, in the format specified for the previous request

Delete Note
This API deletes a specific note for a specific user

Sample Request

DELETE /users/abc-123-def-456/notes/asd-098-fgh-765

Response

The JSON form of the note that was just deleted

Part 2: Storage
All of the notes and users in this API should be stored in DynamoDB. You should use one table for notes and one table for users. The requests to fetch and create users should all correspond to appropriate Dynamo queries to fetch and insert data. Please set up your Dynamo tables so that all queries that return multiple items (users or notes) use a Query against an index.

Note that QR codes don’t need to be stored anywhere. It is possible to generate them on the fly when users make requests so you should not need to upload them to S3 or something. If you want to do that though, that is fine.

Part 3: Hosting
Like the past few assignments, this project should be hosted on at least one EC2 instance on AWS. You should use an IAM role to make sure that EC2 instance is able to make requests to your DynamoDB tables (and any other infrastructure you may create). Remember when running your server to use nohup or something similar to make sure the app stays running when you are not connected to your EC2

Testing
To test your server, please navigate to https://spy-notes.rk0.xyz and use the input box in the bottom right of the UI to paste in the URL for your server. In development, you will all just be pasting in http://localhost:8080 when your server is running. If your server is working, you should be able to use the site properly. If your server is not working and you want to try using the app with my pre-made backend server again, you can blank out this input field or reset the server back to the original value of https://spy-notes-api.rk0.xyz

It might also help to use Postman to test your requests and responses outside of all the other stuff going on in the browser

In this lab, you will creating an API that will be used by another application. Because this API is

Please refer to Chapter 8 of the PDF file provided. Developing an Email and Malware Training Program (Chapter 8)

Please refer to Chapter 8 of the PDF file provided. Developing an Email and Malware Training Program (Chapter 8). Please refer to Chapter 8 of the PDF file provided.

Developing an Email and Malware Training Program (Chapter 8)
You are working as an information security intern for Best Regional Bank, who has asked you to develop a PowerPoint training module that explains the risks (including malware) associated with email. The target audience is all employees.
Create an outline of the training to present to the training manager.
The training manager likes your outline. She just learned that the company would be monitoring email to make sure that data classified as “protected” is not being sent insecurely and that access to personal web-based email is going to be restricted. You need to add these topics to your outline.
Working from your outline, develop a PowerPoint training module.
Be sure to include email “best practices.”
Be prepared to present the training to your peers.
Deliverables:
Word document for the outline (min 1 introduction paragraph and 6 bullet points)
PowerPoint presentation with slides that are visually stimulating (one slide per bullet) (at least 6 slides)

Please refer to Chapter 8 of the PDF file provided. Developing an Email and Malware Training Program (Chapter 8)

The recent pandemic has highlighted the need to review a globalization strategy. It is without question that politicians, government

The recent pandemic has highlighted the need to review a globalization strategy. It is without question that politicians, government. The recent pandemic has highlighted the need to review a globalization strategy. It is without question that politicians, government officials, and business leaders among others will be conducting a deep assessment of business continuity and a means to protect the commerce of the nation going forward.

Based on your readings and insight during this semester how may information systems be better utilized to perhaps help us as a nation toward proactive measures (without global isolation) to maintain our global standing in trade and commerce?

The recent pandemic has highlighted the need to review a globalization strategy. It is without question that politicians, government

Project management

Project management. Q2. Use your own words to describe four different ways used to develop a project WBS briefly. Then, explain why it is often so difficult to create a good WBS?
Q3. What are the “Reserves” and compare between Contingency reserves and Management reserves? Cite an example for each type.
Q4. What is a histogram? Write a scenario for a problem/situation, then draw a histogram which depicts an attribute or characteristic of this problem/situation.first
Note: attached is related to question #2 and #3 , pleaseI need unique answer don’t copy from another source .

Project management

INFO-342 Lab #11

INFO-342 Lab #11. INFO 342Lab Assignment #111. Use the diagram depicted in Figure 11-3 (shown below) to create a relational database schema. 2. Use Microsoft Access to define the tables and their relationships. Be sure to enforce referential integrity. Just set up the file structure. You do not need to enter in the actual data shown.3. Print the Access relationship report and submit it.

PLEASE REFER TO THE ATTACHED DOCUMENT

INFO-342 Lab #11

Agile development and methodology

Agile development and methodology. Scenario: You have submitted your resume to a company that is looking for an agile leader to lead one of their agile teams. They must have found your resume and cover letter interesting because they have contacted you as a candidate for the position. Without knowing much about the job or the team or the company, they want you submit a video before they have you come in to meet in-person.
Your video must convince them that you have the knowledge to lead an agile team successfully. Think strategically and prepare a presentation that shows you are thinking about accommodations for their company even though you are unfamiliar with it.
Your goal is to secure an in-person interview.

Agile development and methodology

Agile development and methodology

Agile development and methodology. Scenario: You have submitted your resume to a company that is looking for an agile leader to lead one of their agile teams. They must have found your resume and cover letter interesting because they have contacted you as a candidate for the position. Without knowing much about the job or the team or the company, they want you submit a video before they have you come in to meet in-person.
Your video must convince them that you have the knowledge to lead an agile team successfully. Think strategically and prepare a presentation that shows you are thinking about accommodations for their company even though you are unfamiliar with it.
Your goal is to secure an in-person interview.

Agile development and methodology

cybersecurity project

cybersecurity project. Question: Research a current social media hack and consider it through the lens of Europe’s General Data Protection Regulation – GDPR. You will consider specifically who’s affected, what’s at stake, fines that may be applicable, and conclude with your own thoughts on the topic.
Please find the below format on how the project needs to be submitted:
Here are my Research Paper Requirements and Grading. Please read carefully. I encourage ALL of you to Google additional APA Paper Format websites in addition to what I am providing you.
GDPR

cybersecurity project

Cyber Security Project

Cyber Security Project. Question: Research a current social media hack and consider it through the lens of Europe’s General Data Protection Regulation – GDPR. You will consider specifically who’s affected, what’s at stake, fines that may be applicable, and conclude with your own thoughts on the topic.
Please find the below format on how the project needs to be submitted:
Here are my Research Paper Requirements and Grading. Please read carefully. I encourage ALL of you to Google additional APA Paper Format websites in addition to what I am providing you.
GDPR

Cyber Security Project