Categories
Computer Science

My name is keryna collazo

Make up anything you want about me,
my interest are skateboarding, reading and instruments , im 27 year old female,
My name is Keryna Collazo

Categories
Computer Science

Once you have completed your three tables, create a “join” statement that joins data from all three tables.

Prior to beginning this assignment, review Chapter 7: Introduction to Structure Query Language (SQL) from the course text and the 8.1 Visual SQL Editor (Links to an external site.) web page. In addition, you may also want to complete problems 1 to 8 in Chapter 7. These problems will assist you in completing this interactive assignment.
For this interactive assignment, you will create three MySQL database tables and write SQL scriipts to read, insert, and delete data. The first database table will contain the names of at least four of your favorite movies. The second table will be a list of actors who appear in the movies. The third table will be an associative table that describes the relationship between the actors and their movies (which actors appear in which movies). Actors and movies have a “many-to-many relationship,” meaning an actor can be in multiple movies and a movie can have multiple actors.
Use the MySQL Database Instructions Download MySQL Database Instructions to create the three tables.
Once you have completed your three tables, create a “join” statement that joins data from all three tables. Remember that field names used in more than one table (ASIN, ActorID) must be fully qualified (i.e., dvdtitle, ASIN).
The previous SQL query returns a separate record for each actor. Provide a way to group results from several records into a single row.
General guidelines for this interactive assignment:
String values in SQL statements are always enclosed within single quotes. ASIN and Title are both strings and require single quotes. For instance, your insert statement will look something like this:
$sql = “Insert into dvdtitles (asin, title, price) VALUES (‘$asin’, ‘$title’, $price)”;
SQL debugging tip: check your SQL statement before you execute it. Put the following line of code immediately before the mysql_query($strSQL) statement.
When retrieving ASIN from the querystring, remember that ASIN is a string, not a number.
Once you have completed the assignment, include the following in your initial post:
A Word document with screenshots of the tables you created.
A Word document with the SQL statements that you used to create the tables and populate them with data.
Explain how you grouped results from several records into a single row.

Categories
Computer Science

You will be including revised content from this interactive assignment in your os theory concept map final assignment.

You will be including revised content from this interactive assignment in your OS Theory Concept Map final assignment. Prior to completing work on this interactive assignment, you may wish to review the instructions included for the OS Theory Concept Map final assignment in Week 5 to see how it fits into your overall final project.
To complete this week’s interactive assignment, you will continue building the OS Theory Concept Map by addressing the following topics concerning how operating systems enable processes to share and exchange information:
Describe process, process state, and process control block.
Compare single- and multi-threaded motivations and models.
Describe the critical-section problem and explain a software solution that resolves this problem.
Logically arrange the essential concepts about threads and process synchronization into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship between topics that connect. Section 2 must have at least three nodes and four connecting nodes.
After completing Section 2 of the concept map, post a link to your OS Theory Concept Map in the discussion forum for your peers to review.

Categories
Computer Science

Title of paper

Part One:
To complete this assignment, review the programming scenarios given below, and explain why a multi-threaded or single-threaded solution is more effective for each. Support your statements with evidence from your sources.
A printer that is performing the job of printing a set of documents
An application that allows the graphical user interface (GUI) to remain responsive while processing a large number of files
A Python webserver that listens for requests, reads them, and pushes the data in the database
A shell program that closely monitors its own working space, such as open files, environment variables, and current working directory
A program that calculates a large number of payments where each calculation is independent of other payment calculations
Part Two:
Use the following guidelines to create three additional programming scenarios similar to the ones given in Part One.
Write Scenario One such that the most effective solution is a single-threaded process.
Write Scenario Two such that the most effective solution is a multi-threaded process.
Write Scenario Three such that the most effective solution is either a single-threaded or multi-threaded process.
Explain why a multi-threaded or single-threaded solution is more effective for each scenario. Support your statements with evidence from your sources.
The Single- vs. Multi-Threading paper
Must be two to three double-spaced pages (400 to 750 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must document all sources in APA style as outlined in the Writing Center (Links to an external site.).
Must include a separate references page that is formatted according to APA style as outlined in the Writing Center (Links to an external site.).

Categories
Computer Science

Directions to complete this learning activity:

Directions to complete this learning activity:
talk about the key-value storage system you selected (200-400 words).
All references should be in APA format.

Categories
Computer Science

An example is provided below.

For your initial post, compose a real-world analogy to illustrate the concept of different process states (new, running, waiting, ready, and terminated). Considering the diagram of process state in Figure 3.2 of the textbook, describe what happens in your scenario at each of the five oval nodes as well as the six arrows between the nodes.
An example is provided below.
Scenario: Hospital
New: The process is being created. (New patient enters hospital)
Running: Instructions are being executed. (Tests are being conducted for the patient)
Waiting: The process is waiting for some event to occur (such as an I/O completion or reception of a signal). (Waiting for the test reports)
Ready: The process is waiting to be assigned to a processor. (The patient should be assigned to a particular specialist depending on the test result)
Terminated: The process has finished execution. (The specialist has treated the patient)

New → Ready: The patient is admitted
Ready → Running: The patient is sent for tests or for surgery
Running → Terminate: Operation/treatment completed
Running → Ready: Second opinion from senior specialist
Running → Waiting: Waiting for the test reports
Waiting → Ready: Reports given to the specialist

Categories
Computer Science

Make sure to include a conclusion.

Submit project plan for Joe’s Barber Shop Web Site.The project plan is a Word document that is a combination of a written explanation of the project plan and the explanation of the control plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation. Make sure to include a conclusion.

Categories
Computer Science

If you cannot do voiceover, provide detailed talking points within notes section for each slide.

Imagine you are supporting a major security company and the company Chief Information Security Officer (CISO) asks you to create training covering cybersecurity foundational topics. Since you have experience and knowledge gained from this course, you tell the CISO you will create a PowerPoint presentation covering foundational cyber topics. To create the presentation per the CISO request, use course content (ex: textbook, PowerPoint slides, labs, etc.), covering minimum 3 topics from each module. Submit completed presentation before due date (by 930pm Monday September 19). The presentation should only include content from modules 1-6. Minimum requirements below.
1. Presentation topics should directly align with and minimum 3 topics should be covered from each module.
2. Presentation should include text and pictures where appropriate. This is not an essay, balance text with graphics.
3. Your presentation brief should have a title slide including course information, your name, presentation title and professors name and date
4. The presentation should include a references slide at the end with citations for the content used within the brief.
5. The presentation should include an agenda slide highlighting main topics.
6. Format, text, font, visualization should be easy to see/read.
7. Topics from each module should be clearly defined and explained. Describe topics in your own words, avoid copy and paste.
8. Include voiceover PowerPoint verbally explaining topics within each PowerPoint slide. If you cannot do voiceover, provide detailed talking points within notes section for each slide.

Categories
Computer Science

You’ll need to implement both the merge sort and quicksort sorting algorithms.

Using C++, Java, or Python, design a program that creates an array of Card objects, shuffles them, then
sorts them in the following ways:
1. By value
2. By suit and value
You’ll need to implement both the merge sort and quicksort sorting algorithms. For example, you could
use merge sort to sort by value and a quicksort to sort by suit and value.
Your Card class must contain the following two fields:
• value (a String)
• suit (a String)
You may include any additional fields, constructors, or methods in your Card class as you see fit for
your design.
Your array will need to contain 52 Card objects, one for each value of each suit. The values to use are 2
through 10, J, Q, K, and A, with A being the card with the highest value. The suit values to use are H (for
Hearts), D (for Diamonds), C (for Clubs), and S (for Spades).
After building the array, shuffle the array using the Fisher-Yates Algorithm. You must implement this
algorithm yourself.
After shuffling, print each object’s value and suit to show the array was shuffled. The output for each
object printed should be VALUE – SUIT. For example: 2 – H or Q – C
Then, you’ll need to sort the array based on the values. All 2 cards should be at the beginning and all A
cards should be at the end; The suit is irrelevant here. After sorting, print each object’s value and suit
again to show the array was sorted based on the cards’ values.
Finally, you’ll sort the same array based on the suit and value. Clubs should be first, then Diamonds,
then Hearts, then Spades. Each suit should be sorted from 2 through A. After sorting, print each object’s
value and suit again to show the array was sorted based on the cards’ values and suits.

Categories
Computer Science

Set the account name and your name as desired, then tap next.

For this discussion, use your own Android device or an emulated Android device. If you’ve not already set up Android Studio’s phone emulator, complete Real Problem 9-1 before completing this project. This project requires you to use a legitimate email account. If you don’t already have one you can use, you can create a free email account of your choice using email providers such as Gmail, Outlook, or Yahoo.
Follow these steps to manually configure the email client on a mobile device:
Open the Gmail app and then tap Add another email address. Gmail can automatically configure email from many providers. Because it’s essential that you know how to manually configure email on a mobile device, tap Other.
Add your email address and tap MANUAL SETUP. Check with your email provider to determine whether to use POP3 or IMAP. What’s the main difference between these two protocols? What are the ports for these two protocols? What are the secure ports for these protocols?
Enter the password, check Keep me signed in, and tap Sign in. On the next screen, tap Yes to agree to the needed permissions.
Add the incoming server settings for your email provider, or check the server suggested by the Gmail app. Which incoming email server are you required to use? When you’re ready, tap NEXT.
Add the outgoing server settings for your email provider, or check the server suggested by the Gmail app. Which outgoing email server are you required to use? When you’re ready, tap NEXT.
Set your account options as desired, then tap NEXT.
If you were successful, you’ll get a notice confirming that your account is set up. Set the account name and your name as desired, then tap NEXT. If you weren’t successful, backtrack and troubleshoot to solve the problem.
When you’re finished, send an email to a classmate, and check an email sent from someone else to confirm that your email account is working on your smartphone.
It is important to know how to change the settings on an account. What steps are required to change the server settings for the account you just added?
You should also know how to remove an email account from a mobile device. What steps are required to remove the email account you just added?
Write a response in a minimum of 175 words summarizing your experience and answering the questions above. Why do you think it is important to practice these steps? How will this experience and other practice experiences help you in your career?