Category Archives: Computer Science


CSE6242 / CX4242: Data and Visual Analytics | Georgia Tech | Fall 2016 Homework 1: Analyzing Twitter dataset; SQLite; D3 Warmup; Gephi; OpenRefine

Due: Friday, September 16, 2016, 11:55PM EST

Prepared by Nilaksh Das, Pradeep Vairamani, Vishakha Singh, Yanwei Zhang, Bhanu Verma, Meghna Natraj, Polo Chau

Submission Instructions and Important Notes: It is important that you read the following instructions carefully and also those about the deliverables at the end of each question or you may lose points.

❏ Submit a single zipped file, called “HW1­{YOUR_LAST_NAME}­{YOUR_FIRST_NAME}.zip”, containing all the deliverables including source code/scripts, data files, and readme. Example: ‘HW1­Doe­John.zip’ if your name is John Doe. Only .zip is allowed (no .rar, etc.)

❏ You may collaborate with other students on this assignment, but you must write your own code and give the explanations in your own words, and also mention the collaborators’ names on T­Square’s submission page. All GT students must observe the honor code. Suspected plagiarism and academic misconduct will be reported to and directly handled by the Office of Student Integrity (OSI). Here are some examples similar to Prof. Jacob Eisenstein’s NLP course page (grading policy):

❏ OK: discuss concepts (e.g., how cross­validation works) and strategies (e.g., use hashmap instead of array)

❏ Not OK: several students work on one master copy together (e.g., by dividing it up), sharing solutions, or using solution from previous years or from the web.

❏ If you use any “slip days”, you must write down the number of days used  in the T­square submission page. For example, “Slip days used: 1”. Each slip day equals 24 hours. E.g., if a submission is late for 30 hours, that counts as 2 slip days.

❏ At the end of this assignment, we have specified a folder structure about how to organize your files in a single zipped file. 5 points will be deducted for not following this strictly. ❏ We will use auto­grading scripts to grade some of your deliverables (there are hundreds of students), so it is extremely important that you strictly follow our requirements. Marks may be deducted if our grading scripts cannot execute on your deliverables.

❏ Wherever you are asked to write down an explanation for the task you perform, stay within the word limit or you may lose points.

❏ In your final zip file, please do not include any intermediate files you may have generated to work on the task, unless your script is absolutely dependent on it to get the final result (which it ideally should not be).

❏ After all slip days are used up, 5% deduction for every 24 hours of delay. (e.g., 5 points for a 100­point homework)

❏ We will not consider late submission of any missing parts of a homework assignment or project deliverable. To make sure you have submitted everything, download your submitted files to double check. 1 Part 1: Collecting and visualizing Twitter data [45 pt] 1. [30 pt] You will use the Twitter REST API to retrieve (1) followers, (2) followers of followers, (3) friends and (4) friends of friends of a user on Twitter (a Twitter friend is someone you follow and a Twitter follower is someone who follows you). a. The Twitter REST API allows developers to retrieve data from Twitter. It uses the OAuth mechanism to authenticate developers who request access to data. Here’s how you can set up your own developer account to get started: ● Create a Twitter account, if you don’t already have one. ● Now you need to get API keys and access tokens that uniquely authenticate you. Sign into Twitter Apps with your Twitter account credentials. Click ‘Create New App’. While requesting access keys and tokens, enter: Name dva_hw1_<your­student­id> (eg: dva_hw1_jdoe3) Description “For CSE 6242 @ GaTech” Website http://poloclub.gatech.edu/cse6242/2016fall/ Callback URL field should be left empty as we won’t be needing it Check the developer agreement checkbox and click on ‘Create your Twitter application’. Once your request is approved, you can click ‘Keys and Access Tokens’ to view your ‘API key’ and ‘API secret’. You will also need to generate your access token by clicking the ‘Create my access token’ button. After this step, you are ready to make authenticated API calls to fetch data. Store the credentials that you just created in a keys.json file which you will use later. The file should have the following contents: { “api_key”: “your api key here”, “api_secret”: “your api secret here”, “token”: “your access token here”, “token_secret”: “your access token secret here” } Important notes and hints: ­ Twitter limits how fast you can make API calls. For example, the limit while making GET calls for friends is 15 requests per 15 minutes. ­ Refer to the rate limits chart for different API calls. ­ Set appropriate timeout intervals in the code while making requests. ­ An API endpoint may return different results for the same request. You will use Python 3.0+ and the tweepy library to accomplish the following tasks. We have created a boilerplate script to help you get started and to reduce the amount of code you may need to write. You will modify parts of this script for the tasks below.

Download 2 the boilerplate code from this link. If you are new to Python, here are few useful links to help you get started: ● http://www.tutorialspoint.com/python3/https://en.wikibooks.org/wiki/Non­Programmer%27s_Tutorial_for_Python_3/File_IO b. [15 pt] Search for followers of the Twitter screen name “PoloChau”. Use the API to retrieve the first 10 followers. Further, for each of them, use the API to find their 10 followers. ● Read the documentation for getting followers of a Twitter user. ● You code will write the results to followers.csv. Each line in the file should describe one relationship in the format: follower­screen­name, user­name ● Grading distribution is given in the boilerplate code.

Note: follower­screen­name represents the source and user­name represents the target for an edge in a directed graph. You will be adding these column headers to the CSV file in a later question. c. [15 pt] Search for friends of the Twitter screen name “PoloChau”. Use the API to retrieve the first 10 friends. Further, for each of the 10 friends, use the API to find their 10 friends. ● Read the documentation for getting friends of a Twitter user. ● You code will write the results to friends.csv. Each line in the file should describe one pair of relationship in the format: user­name, friend­screen­name ● Grading distribution is given in the boilerplate code. Note: user­name represents the source and friend­screen­name represents the target for an edge in a directed graph. You will be adding these column headers to the CSV file in a later question. If a user has fewer than 10 followers or friends, the API will return as many as it can find. Your code should be flexible to work with whatever data the API endpoint returns.       Deliverables: Create a directory called Q1 to store all the files listed below. ● script.py: The boilerplate code modified by you. The submitted code should run as is. That is, no extra installation or configuration should be required other than the specified libraries. Also specify the python version in the code. ● followers.csv and friends.csv produced in step b and c respectively. Please note that these files will be modified in task 2b shortly. Note: Do NOT submit your API credentials (keys.json). They should not be shared. We will use our own keys and tokens to grade your work. 2. [15 pt] Visualize the network of friends and followers obtained previously using Gephi, 3 which you can download for free. Note: Make sure your system fulfils all requirements for running Gephi. a. Go through the Gephi quick­start guide. b. [2 pt] Insert Source, Target as the first line in both followers.csv and friends.csv. Each line in both files now represents a directed edge with the format source, target. Import all the edges contained in these files using Data Laboratory. Note: Remember to check the “create missing nodes” option while importing since we don’t have an explicit nodes file. c. [8 pt] Visualize the graph and submit a snapshot of a visually meaningful view of this graph. Here are some general guidelines for a visually meaningful graph: ● Keep edge crossing to a minimum, and avoid as much node overlap as possible. ● Keep the graph compact and symmetric if possible. ● Whenever possible, show node labels. If showing all node labels create too much visual complexity, try showing those for the “important” nodes. ● Using colors, sizes, thicknesses, etc. to convey information. ● Using nodes’ spatial positions to convey information (e.g., “clusters” or groups). Experiment with Gephi’s features, such as graph layouts, changing node size and color, edge thickness, etc. The objective of this task is to familiarize yourself with Gephi and hence is a fairly open ended task. d. [5 pt] Using Gephi’s built­in functions, compute and report the following metrics for your graph: ● Average node degree ● Diameter of the graph ● Average path length Briefly explain the intuitive meaning of each metric in your own words. You will learn about these metrics in the “graphs” lectures.       Deliverables: Place all the files listed below in the Q1 folder. ● Result for part b: followers.csv and friends.csv (with Source, Target as their first lines). ● Result for part c: An image file named “graph.png” (or “graph.svg”) containing your visualization and a text file named “graph_explanation.txt” describing your design choices, using no more than 50 words. ● Result for part d: A text file named “metrics.txt” containing the three metrics and your intuitive explanation for each of them, using no more than 100 words. Part 2: Using SQLite [35 pt] 4 The following questions help refresh your memory about SQL or get you started with SQLite, which is a lightweight, serverless embedded database that can easily handle up to multiple GBs of data. SQLite is great for building prototypes and sharing data (all data stored in a single cross­platform file). a. [2 pt] Import data: Create an SQLite database called rt.db. Import the movie data from http://poloclub.gatech.edu/cse6242/2016fall/hw1/data/movies.txt into a new table (in rt.db) called movies with the schema: movies(movie_id integer, name text, genre text) Import the movie rating data from http://poloclub.gatech.edu/cse6242/2016fall/hw1/data/ratings.txt into a new table (in rt.db) called movieratings w ith the schema: ratings (user_id integer, movie_id integer, rating real, timestamp integer) Provide the SQL code (and SQLite commands used). Data source: http://grouplens.org/datasets/movielens Note: You can use SQLite’s built in feature to import data from files (https://www.sqlite.org/cli.html#section_3: .separator STRING and .import FILE TABLE) b. [2 pt] Build indexes: Create two indexes that will speed up subsequent join operations: An index called movies_primary_index in the movies table for the movie_id attribute An index called movies_secondary_index in ratings table for the movie_id attribute c. [2 pt] Find the total number of movies that are reviewed by at least 500 reviewers and with average ratings >= 3.5. Output format: movie_count d. [4 pt] Finding most reviewed movies: List all the movies with at least 2500 reviews. Sort the movies by the review count (high to low) then by their names (alphabetical order) for those who may have the same review counts. Output format: movie_id, movie_name, review_count e. [4 pt] Finding best films: Find the top 10 movies (highest average ratings). Sort the movies by their average ratings (high to low) then by their names (alphabetical order). 5 Output format: movie_id, movie_name, avg_rating f. [5 pt] Finding the best movies with the most reviews: Find the top 8 movies with the highest average ratings that are rated by at least 1000 users. Sort the results by the movies’ average rating (from high to low), then by the movies’ names (alphabetical order), and then genres (alphabetical order). Output format: movie_name, avg_rating, review_count, movie_genre g. [7 pt] Creating views: Create a view (virtual table) called common_interests from the data, such that: for each movie with exactly 10 reviews, show its reviewers in pairs, for all unique reviewer combinations. User IDs should be ranked in ascending order, and within a pair, the first user ID should be strictly smaller than the second ID. For example, movie M has 10 reviews, rated by reviewers 1,2,3,4,5,6,7,8,9,10. You would show “(1, 2, M)”, “(1, 3, M)”, …, “(1, 10, M)”, “(2, 3, M)”, … , “(2, 10, M)”, etc. This example has 45 such pairs. The view should have the format: common_interests(user_id1, user_id2, movie_name) Full points will only be awarded for queries that use joins. Note: Remember that creating a view will produce no output, so you should test your view with a few simple select statements during development. h. [2 pt] Calculate the total number of such pairs created from the view made in part g. Output format: common_interest_count i. [4 pt] SQLite supports simple but powerful Full Text Search (FTS) for fast text­based querying (FTS documentation). Import the movie overview data from movie­overview.txt into a new FTS table (in rt.db) called movie_overview with the schema: movie_overview(id integer, name text, year integer, overview text, popularity decimal) 1. Count the number of movies whose overview fields contain the word “death” or “life”. 2. List the ids of the movies that contain the terms “life” and “about” in their overview fields with no fewer than 6 intervening terms in between. j. [3 pt] Explain your understanding of FTS performance in comparison with a SQL ‘like’ 6 query and why FTS may perform better (hint: try SQLite’s EXPLAIN command). Write down your explanation in fewer than 50 words in “fts.txt”. Deliverables: Place all the files listed below in the Q2 folder ● Code: A text file named “Q2.SQL.txt’’ containing all the SQL commands and queries you have used to answer questions a­j in the appropriate sequence. We will test its correctness in the following way: $ sqlite3 rt.db < Q2.SQL.txt Assume that the data files are present in the current directory. Note: We will use auto­grading scripts to grade your code (there are hundreds of students), so it is extremely important that your code strictly follow the requirements below. Marks may be deducted if our grading scripts cannot execute on your code. 1. You should set up the separator for your output format as: .separator ‘, ’ 2. After each question’s query, append the following command to the txt file (which prints a blank line): select ‘’; or select nul l; Here’s an example txt file: Query for question a select ‘’; Query for question b select ‘’; Query for question c… ● Answers: A text file named “Q2.OUT.txt’’ containing the answers of the questions a ­ j. This file should be created in the following manner: $ sqlite3 rt.db < Q2.SQL.txt > Q2.OUT.txt Note: We will compare your submitted text file to the text created in the above manner. Please follow the output format. We will strictly follow the requirements when grading. Part 3: D3 Warmup and Tutorial [10 pt] ● Go through the D3 tutorial here. ● Complete steps 01­09 (Complete through “09. The power of data()”). ● This is a simple and important tutorial which lays the groundwork for Homework 2. Note:  We recommend using Mozilla Firefox or Google Chrome, since they have relatively robust built­in developer tools. Deliverables: Place all the files/folders listed below in the Q3 folder ● A folder named d3 containing file d3.v3.min.js (download) ● index.html : When run in a browser, it should display: 7 ○ 25 bars (as in step 9) with different color for each block of 5 bars (the first 5 bars will be of one color, the next 5 bars will be of some other random color); where each bar should have a black solid border, width=30px and margin between two bars=2px. ○ Your name which can appear above or below the bar chart. Note: No external libraries should be used. The index.html file can only refer to d3.v3.min.js within the d3 folder. Part 4: OpenRefine [10 pt] a. Watch the videos on the OpenRefine’s homepage for an overview of its features. Download OpenRefine (latest release : 2.6 r.c2) b. Import Dataset: ● Launch OpenRefine. It opens in a browser (127.0.0.1:3333). ● Download the dataset ● Choose “Create Project” ­> This Computer ­> “menu.csv”. Click “Next”. ● You will now see a preview of the dataset. Click “Create Project” in the upper right corner. c. Clean/Refine the data: Note: OpenRefine maintains a log of all changes. You can undo changes. See the “Undo/Redo” button on the upper left corner. i.  [3 pt] Clean the “Event” column (Select the column to be a Text Facet, and cluster the data. Note: You can choose different “methods” and “keying functions” while clustering) 1. [2 pt] Observe the differences in the 2 methods (key collision and nearest neighbour) and cluster the data using the method that you think is better. State 2 reasons why you used this method. Describe your observations in fewer than 50 words. 2. [1 pt] Using the method “key collision”, observe the differences while using the keying functions (a) fingerprint, and (b) ”n­gram fingerprint” with n­gram size=2 . Describe a main difference you observed, in fewer than 30 words. ii. [2 pt] Use the General Refine Evaluation Language (under Edit Cells → Transform) to represent the dates in column (“date”) in a format such that “1900­04­15“ is converted to “Sunday, April 15, 1900” iii. [1 pt] List a column in the dataset that contains only nominal data, and another column that contains only ordinal data. (Refer to their definitions here) 8 iv. [1 pt] Create a new column called URL that contains links to the dishes of a particular menu. The values in that column should follow the following format (without the quotes) “https://api.menu.nylp.org/dishes/139476 ” where 139476 is the “id”. v. [3 pt] Experiment with Open Refine, and list a feature (apart from the ones used above) you could additionally use to clean/refine the data, and comment on how it would be beneficial in fewer than 50 words. (Basic operations like editing a cell or deleting a row do not count.) Deliverables: Place all the files listed below in the Q4 folder ● Q4Menu.csv : Export the final table. ● changes.json : Submit a list of changes made to file in json format. Use the “Extract Operation History” option under the Undo/Redo tab to create this file. ● Q4Observations.txt : A text file with answers to parts c (i) and c (iii) and c (v) 9 Important Instructions on Folder structure The directory structure must be: HW1­LastName­FirstName/       |­­­ Q1/ |­­­­ followers.csv |­­­­ friends.csv |­­­­ graph.png / graph.svg |­­­­ graph_explanation.txt |­­­­ metrics.txt |­­­­ script.py       |­­­ Q2/ |­­­­ fts.txt |­­­­ Q2.OUT.txt |­­­­ Q2.SQL.txt       |­­­ Q3/ |­­­­  index.html |­­­­  d3/ |­­­­  d3.v3.min.js       |­­­ Q4/ |­­­­ changes.json |­­­­ Q4Menu.csv |­­­­ Q4Observations.txt 10

Advertisements

Windows Server 2012 R2 Deployment Proposal


Windows Server 2012 R2 Deployment Proposal

Buy Research paper about this assignment here (Email us: support@customwritings-us.com)

Overview

Each student will create a detailed, organized, unified technical solution given the scenario described. The submission will be in a written format (not simply answering the questions). The purpose of this paper is to demonstrate the material you learned in this class. This is a challenging assignment; if you did not learn the course material, it will be much more difficult for you.

There is some flexibility on the content. Use the knowledge you learned in this class to create the proposal and solution. You can make assumptions as you wish, unless it contradicts something in this document.

Scenario

Contoso has hired you as an IT consultant for implementing their Windows network infrastructure. Contoso is a new advertising firm, and they are currently hiring staff and establishing two locations in Pensacola, Florida and Casper, Wyoming. They need to get their internal Windows infrastructure installed and configured quickly. The IT staff will take over all aspects of IT administration.

You need to provide Contoso a solution that describes the implementation and configuration of their Windows Infrastructure.

Cost is a concern, but there are greater priorities. Contoso wishes to implement the “right” solution to fit their needs now and for the next 2-3 years. However, the WAN link between the two sites is very slow and unreliable. Management realizes that the link will often go down, resulting in loss of connectivity between the sites. In these periods of downtime, all users will still need to logon and work. The link cannot be upgraded or improved.

Here are several details about Contoso:

  • Contoso will start with 90 employees, in the following departments:
  • Executives (9 employees) – manage and run the company
  • Accounts and Sales Department (15 employees) – perform market research and maintain accounts
  • Creative, Media and Production Department (49 employees) – advertising
  • Human Resources and Finances (12 employees) – perform HR and financial duties
  • IT (5 employees) – manage IT for the company
  • Contoso will have two sites, one in Pensacola and one in Casper. Most staff will be located in Pensacola, with at least one person from each of the departments located in Casper.
  • Networking equipment is already in place for both sites. An IPsec tunnel runs between the two sites so that secure network traffic tunnels over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.

 

  • There is no need to describe security mechanisms, such as hardware firewalls and intrusion detection devices, as the contractors already have them in-place.

 

  • Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want the Media staff to see the company’s financial details). You can make data assumptions, as you wish. Is data freely-shared or protected? Will you use Work Folders?

Please identify all assumptions you make.

Topics to Cover

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

Use Windows Server 2012 R2 for all aspects of the solution.

The seven topics include:

  1. New Features of Windows Server 2012 and 2012 R2
  • Describe new features of Windows Server 2012 and 2012 R2 of which Contoso can take advantage.

 

  1. Deployment and Server Editions
  • How many total servers will you need? Which server roles will you combine?
  • Which edition of Windows will you use for each server (e.g., Standard? Datacenter? Cost is not the biggest concern but Standard licenses cost $1500 per server, and Datacenter licenses cost $8000 per server)
  • Will you use Server Core on any servers?
  • Where are each of the servers located (which of the two sites)?
  • How will you deploy these servers? Manually? Automatically?

 

  1. Active Directory
  • Number of AD forests?
  • Number of AD domains?
  • Will there be any Read-Only Domain Controllers?
  • How will the second site factor into domain controller placement? How will AD sites be configured?
  • How will AD organizational units be organized (considering how group policy will be used and users will be organized)?
  • Will you use a global catalog? Where and why?

 

  1. DNS and DHCP
  • DHCP scope design (e.g., lease times, number of scopes, address range)
  • IPv4 or IPv6? Why?
  • Will you use a form of DHCP fault tolerance?
  • Will servers have DHCP reservations?
  • DNS namespace design (e.g., domain name(s) chosen, split DNS for Internet/Intranet, zones)
  • How will you design DNS?
  • Are you going to secure DNS? How?
  • What type of DNS zones will you have?

 

  1. File and Printer Sharing
  • What shares will you need?
  • Will you use DFS?
  • How will quotas/FSRM be configured?

 

  1. Group Policy
  • How will you deploy applications? If using GPOs, what are the details on application deployment? Will you use AppLocker or Software Restriction Policies? Which software applications will you deploy on the servers and clients?
  • Will you use Windows firewalls or simply rely on the firewalls already in-place?

 

  1. Hyper-V
  • Will you use VMs?
  • Which features and settings would you use?

Specific Requirements:

  • Use IEEE or APA style when writing your paper. Every part of your paper must meet IEEE or APA standards—not just the references section. Use IEEE or APA, but be consistent with the style you choose. CMIT classes at UMUC used APA style in the past, but CMIT is migrating to IEEE style.

 

  • Submit your paper in .docx or .pdf format, or significant points will be deducted. Please do not submit in .odt, .doc or any other format, or significant points will be deducted. I highly encourage you to use Microsoft Word 365 to create your paper in .docx format. (Microsoft Word 2007 or greater, will meet the minimum requirement, if created in .docx format).

 

  • Make this proposal professional—something that would entice Contoso to buy your solution and services.

 

  • The final submission will be 7 to 10 pages worth of text written by the student (not counting the title page, images, diagrams, chart, tables or quotations that may be used). It must be double-spaced, have 1-inch margins and use 12-point Times New Roman. A title page is required. Again, use IEEE or APA style. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 printed pages in length.)

 

  • Include a chart. In Word, click Chart on the Insert tab. Note: Pictures, graphics, tables, diagrams, etc. are not charts. Chart whatever you wish—the server types, implementation plan, etc.–be creative.

 

  • You must use at least one diagram. Note: A diagram is not a chart, table, etc. Google defines “diagram” as, “a simplified drawing showing the appearance, structure, or workings of something; a schematic representation.” (This diagram could describe Active Directory components, DHCP/DNS design, file share hierarchy or anything you wish to display graphically to enhance the reader’s understanding of the proposal). Feel free to find and use a relative diagram, but be sure to cite properly.

 

  • You must use at least six references. At least two of the references will be a non-textbook, non-LabSim, non-Wikipedia resource reference. Follow the IEEE or APA format for citations. (Preferably, sources would be a “best practice” guide or similar content from Microsoft or another experienced Windows professional).

 

  • You must submit this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website.

 

  • The submission must cover all of the major topics outlined earlier in this document. Explain each choice with technical and business reasoning. Use enough detail to demonstrate what you learned this semester. You may cover additional topics, as desired.

 

  • The final submission should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the topics required, as well as a summary.

 

  • Cite sources so that they can be quickly verified. IEEE or APA format is required.

 

  • In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty. PLEASE create your paper from scratch and use your own work.

Buy Research paper about this assignment here (Email us: support@customwritings-us.com)

Network LAN Design with VoIP and Wireless Services


Buy paper about this assignment here (Email us: writersestate@gmail.com)

Network LAN Design with VoIP and Wireless Services

Design Requirements

 

This section will specify the scope of the work, which will address the concerns of stakeholders while meeting overall business needs.

 

You are required to submit business need and Design Requirements of Entire WWTC Project. The requirements include but are not limited to

 

  • Design Requirements of LAN, VOIP and Wireless
  • Design Requirements of Security
  • Design Requirements of Active Directory

 

Network LAN Design with VoIP and Wireless Services

 

This section will provide a detailed LANdesign of network with VoIP services, Wireless services, protocols, devices, and interconnectivity, with WAN.

 

This section must include but is not limited to

 

  • Equipment List
  • Hierarchical IP scheme and VLAN
  • Link IP addresses
  • High Level Diagram
  • Voice and Wireless Design

 

Security Policies and Network Security Design

 

This section will specify organizational security policies, standards, procedures, and guidelines in compliance with the appropriate laws and regulations. This section will lay out network security design implementing organizational security policies in compliance with the appropriate laws and regulations

 

Deliverables

  • Determine the most important assets of the company, which must be protected
  • Determine general security architecture for the company
  • Develop a list of 12specific policies that could be applied.
  • Write specific details along with the rationale for each policy
  • Review the written policies and select the 12 most important policies for inclusion in the Security Policy Document
  • Integrate and write up the final version of the Security Policy Document for submittal
  • Develop a High availability secure design for this locations addressing above considerations and mitigating 4 primary networks attacks categories mentioned below.
  • Write up specific role of devices will play in securing
  • Develop high level security diagram.

 

Active Directory Design and Active Directory Implementation

 

This section will specify organizational Active Directory design, and develop and implement Active Directory as per organizational standards and policies.

 

Deliverables

  • Create Active directory policies to include recommended features
  • Create and implement forest named WWTC.com
  • Create OU for each Department under forest WWTC.com.
  • Link WWTC.com to headquarters.
  • Create Global, Universal, Local groups for each domain. Each global group will contain all users in the corresponding department. Membership in the universal group is restrictive and membership can be assigned on the basis of least privileged principle. (For design purpose, you can assume that WTC as a Single Forest with multiple domains).
  • Create GPO and GPO policies (All domains will be serviced and managed by IT staff at World-Wide Trading Company

 

 

Project Implementation Plan

 

This section will lay out the implementation plan of the entire AAP design, which include configuration of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a deliverables schedule.

 

 

PowerPoint Presentation

 

This section will include an online presentation in PowerPoint. Presentations should include the information in parts 1 through 4 of the AAP. You will be evaluated on the content and design of your presentation.

 

The purpose of this presentation is to get approval from upper level management. This presentation is geared towards upper management level. In this presentation two much details, or by providing too much technical content you could lose your audience. You need a balance approach. That means keep your focus on key business goals and explain them in simple language how this project will help in meeting those goals. There is no minimum or maximum numbers of slides for this presentation.

 

 

Comprehensive Authentic Assessment Plan Deliverables

 

For this course AAP is a response for customer’s RFP or customer’s design requirements and type of solution used in network design. Typically a customer’s RFP includes following topics.

 

  • Business goals for the project
  • Scope of the project
  • Information on existing network
  • Information on new applications
  • Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability
  • Warranty requirements for products
  • Environmental or architectural constraints
  • Training and support requirements
  • Preliminary schedule with milestones and deliverables
  • Legal contractual terms and conditions

 

Your AAP should include responses to all of customer’s RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design. The following sections describe the format of AAP:

 

A: Executive Summary (ES)

The executive summary briefly states and emphasizes the major points of the customer’s requirements. The ES should be no more than one page and should be directed at key decision maker of the project who will decide whether to accept your design. The ES can have minimum technical information but NO technical details. The technical information should be summarized and organized in order of the customer’s highest-priority objectives for the design project. The ES should be organized customer top requirements.

 

B: Project Goal

This section should state the primary goal for the network design. The goal should be business oriented and related to an overall objective that organization has to become more successful in core business. Your objective is to make it clear to decision maker that you understand the primary purpose and importance of the network design project. Below is an example of project goal was written for an actual design.

 

“The goal of this project is to develop a wide area network (WAN) that will support new high bandwidth and low-delay multimedia applications. The new applications are key to the successful implementation of new training programs for the sales force. The new WAN facilitate of increasing sales in the USA by 50% in the next fiscal year.”

 

C: Project Scope

The project scope section provides information on extent of the project, including a summary of departments, field offices networks that will be affected by the project. The project scope section specifies whether the project is new network or modifications to an existing network. It indicates whether the design is for a single network segment, a set of LANs, a building or campus network, or a set of WAN or remote access network, VoIP, or enhancing security

 

D: Design Requirements

In this section, you provide major business and technical requirements of the network in priority order. In business goal explain the role network design will play in helping an organization provide better products and services.

 

The technical requirement sections explain in general term how propose technical improvement is better than or meet the customer requirement.

 

Network Application: This section lists and characterizes the new and existing network applications.

 

E: Current State of the Network:

This section briefly describes the structure and performance of the network. It should include a high-level network map that identifies the location of connecting devices, server farm, storage systems, and network segment

 

F: Design Solution:

This section includes:

  • Logical Network topology which include high level one or more drawings to illustrate logical architecture of the proposed network
  • Recommended LAN design to implement Client’s key requirements.
  • Recommended Voice over IP solution,
  • Recommend solution to implement client’s key security requirements.
  • Recommend solution to implement client’s key Active Directory requirements
  • Recommend network management processes and products

 

 

 

 

 

 

 

G: Implementation Plan:

The implementation plan includes your recommendations for deploying the network design. The design implementation description should be detailed as possible. Implementation of a network design consists of several phases (buy and install hardware, configure system, test system and so forth). Each phase consists of several steps, and documentation for each step should contain the following:

 

  • A project schedule
  • Plans with vendors or service providers for installation of links, equipment or services
  • Plan or recommendations for outsourcing the implementation or management of the network
  • A plan for communicating the design to end users, network administrators, and management
  • A training plan for network administrators and end users
  • A plan for measuring the effectiveness of the design after it has been implemented
  • A list of known risks that could delay the project
  • A fallback plan if the network implementation fails
  • A pan for evolving the network design as new application requirements goals arise

 

 

 

 

Sample Project Schedule Template

Date of Completion Project Milestone
August 1 Design completed and a beta version of the design document distributed to key executives, managers, network administrators, and end users (end users depends on management)
August 15 Comments on the design document due
August 22 Final design document distributed
August 25 Installation of leased lines between all buildings completed by WAN service provider
August 28-29 Network administrators trained on new system
August 30-31 End users trained on new system
September 6 Pilot implementation completed in Building 1 or head office or branch office
September 20 Feedback received on pilot from network administrators and users
September 27 Implementation completed on Buildings 2-5 or floors 1-6
October 10 Feedback received from buildings 2-5 from network administrators and users
October 17 Implementation completed in the rest of buildings or floors
Ongoing or December 31 New system monitored to verify that it meets goals

 

H: Project Budget

This section should contain the funds the customer needs for equipment purchases, maintenance, and support agreements, service contracts, software licenses, training, and staffing. The budget can also include consulting fees and outsourcing expenses.

 

I: Design Document Appendix

Most design documents include one or more appendixes that present supplemental information about the design and implementation. Supplemental information can include detailed topology drawings, device configurations, network addressing and naming details and comprehensive results from the testing of the network design. You can include business information such as list of contact name, numbers and e-mail addresses. The appendix can include warranty on devices, legal agreement, and any information which is not critical for design, but you have noted in your gathering information process.

 

Writing Instructions

Paper must have a minimum of 25 pages and a maximum of 35 pages of text excluding the required title page and bibliography and optional tables. Text must be Times New Roman, 12 font, 1″ margin on all sides, and double spaced.

 

Students must follow “Publication Manual of the American Psychological Association, Fifth Edition (APA- 5)”, also known as APA style or format. Only a Microsoft Word file will be accepted as the final submission; no HTML or PDF files allowed.

 

All sources must be properly cited and must be credible. At least two sources must be Internet sources (for help in evaluating the credibility of web sources, go tohttp://www.umuc.edu/library/guides/evaluate.shtml). Once you have completed a good draft, it is strongly advised that you submit it to UMUC’s Effective Writing Center (EWC). In order to allow sufficient time for their review, you need to submit the draft to EWC two weeks prior to the paper’s due date.

Buy paper about this assignment here (Email us: writersestate@gmail.com)

SEC 4320 – Unit 4 Assessment


Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

SEC 4320 – Unit 4 Assessment

Question 1

What will you review within the System/Applications Domain as part of your security assessment?

(Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)

 

 

 

Input Answer for question 1 here

 

 

 

Question 2

What will you review and assess in the User Domain as part of this security assessment?

 (Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.)

 

Input Answer for question 2 here

 

Please follow the instructions that I provided on the attached documents to complete the order and avoid any revisions     (See attachment for more information)

 

  • No textbook used for this course. Various articles, Power points, and documents will be used instead
  • Answer questions in the same order as the outline provided on the attachment. Treat them as mini essays. If there are 4 questions I need 4 separate answers.
  • Unless otherwise indicated, there is a 200 word minimum response required per question. (The other document will have actual word requirement per question)
  • All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
  • NOT REQUIRED: title page, margins, header, double spacing, and hanging indentation, introduction and conclusion

 

Buy Research paper about this assignment here (Email us: writersestate@gmail.com)

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report


Buy Order Now for the complete paper here.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Description 

Due date: 26th August 2016

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report

Assignment 2 – SAP Practical Written Report

Marks : 100

Weighting: 15%

The key concepts and frameworks covered in modules 1–4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2. Assignment 2 consists of three specific tasks regarding SAP R/3 System Security.

Your Assignment 2 report must be structured as follows:

● Cover page for your assignment 2

● Table of contents

● Body of report – main section for each task with appropriate use of subsections for each task sub report

● Task 1 Login to SAP System Student Account and Complete and Save System/User Profile/Own Data Fields

● Task 2 – Eight reports as specified (include an Excel spreadsheet or Access database) with your submission of Assignment 2 report

● Task 3 – SAP System Security Settings

● List of References

Task 1 Specifications – Login to SAP R/3 System using your student SAP userid and password and Complete System/User Profile/Own Data fields that are currently blank as per Screenshot below

Task 1 Requirements – Complete and save following fields in your SAP R/3 Student Account User Profile Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data Screen in your SAP R/3 Student Account for Task 1 in your Assignment 2 Report 2

Task 2 Specifications – Analyze SAP Security Audit Log Data.

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields:

Field Description

USERID USERID identifies an unique user

YYYYMM YYYYMM describes when the user action took place.

YYYYMM is useful for summarising user activity by month.

TCODE TCODE refers to the transaction (option on the menu) performed by the user.

TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.

TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).

TCD TCD is the same as TCODESTAT, except there is no -0 or -1.

TSTATUS TSTATUS indicates whether the action was successful or not (0/1).

TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month

YYYYMM. TTEXT TTEXT is the narrative description of the TCODE.

Task 2 Requirements Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reportslisted below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are: 1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040. 2. List of users performing unsuccessful activities. 3. List of transaction codes performed, with their frequency by each user. 4. List of users engaging in security-related actions. 5. Top 10 users in terms of frequency of activity. 6. List of users who are dormant – in the range USER-001 to USER-050. 7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format. 3 TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings. You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting. Task 3 Requirements complete the following sub tasks: Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature. GLOBAL BIKE COMPANY Table 1 SAP System-Wide Security Settings Date: Prepared by: SAP System Security Settings User-Defined Value System Default Value Recommended Value No auto user SAP* Failed logins to end Failed logins to lock Auto failed unlock Min password length Password expiry (days) Idle Screen logout (seconds) No check on Tcodes Login client No Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum. Note: Submission of your assignment 2 report documents will be via the Assignment 2 submission link on the course studydesk. Assignment 2 submission consists of two documents (1) a word document for the Assignment 2 report and (2) an accompanying spreadsheet or an Access database for task 2 of Assignment 2. Note carefully University policy on Academic Misconduct such as plagiarism, collusion and cheating. If any of these occur they will be found and dealt with by the USQ Academic Integrity Procedures. If proven Academic Misconduct may result in failure of an individual assessment, the entire course or exclusion from a University program or programs.

Order Now for the complete paper here.

Buy paper on this assignment here (Email us: writersestate@gmail.com)

Virtual Systematics Lab: Introduction to Systematics Worksheet


ORDER NOW your custom paper to have it completed successfully on time.

Buy paper for this assignment here

Simply Click ORDER NOW and  enter  your paper details. Our support team will review the assignment(s) and assign the right expert whose specialization is same to yours to complete it within your deadline. Our Editor(s) will then review the completed paper (to ensure that it is answered accordingly) before we email you a complete paper 

Email Us for help in writing this paper for you at: support@customwritings-us.com

Virtual Systematics Lab: Introduction to Systematics Worksheet

Virtual Systematics Lab: Introduction to Systematics Worksheet

 

Learning Goal: To learn how biologists classify species based on their evolutionary relationships.

Prerequisite Knowledge: Before beginning this lab, you should be familiar with these concepts:

  • why biologists today use the three-domain system of classification
  • how evolutionary trees depict biologists’ understandings about the evolutionary relationships among groups of organisms

Introduction: Almost every place on Earth, from the surface of your skin to the bottom of the ocean, is teeming with living things. To keep track of the vast diversity of life, biologists historically named and classified organisms according to their appearance. The system of categorizing organisms is known as taxonomy. Today, scientists classify organisms into taxonomic groups (taxa) according to their evolutionary history. This discipline is known as systematics.

The Virtual Systematics Lab features a collection of pictures and descriptions of diverse species that represent major evolutionary pathways. In the Systematics Lab, you can explore five different taxonomic classification schemes that biologists have used–from the traditional Linnaean scheme to the current three-domain system.

In this activity, you will learn how to use the Virtual Systematics Lab to identify the characteristics that various organisms share and to determine the relatedness of different taxa.

 

Part A

Enter the Systematics Lab Room by clicking the button. Then, follow the lab procedure.

Lab Procedure1.     Locate the main window of the Systematics Lab Room–it is the large white box that shows taxonomic pathways, commonly known as evolutionary trees.

What three taxa appear in the main window when you first enter the Systematics Lab Room? At what level of classification are these three taxa?

 

ANSWER:

 

 

Part B

2.     Locate the Traits box at the lower left of your computer screen. Then, roll over the nameArchaea on the main window and notice that information about that selected group appears in the Traits box.3.     Click on the term peptidoglycan in the Traits box, and notice that its definition appears in the Glossary box directly above the Traits box.

4.     Roll over the other two names in the main window to find out about their traits. Click on any unfamiliar terms to learn their definitions.

List one trait for each of these three taxa that distinguishes it from the others.

 

ANSWER:

 

 

Part C

5.     Click on the name Eukarya in the main window. Notice the two boxes below the main window that are titled “Included” and “Excluded.” The information in these boxes indicates which species are included and which are excluded from the group you selected. You can select eitherPictures or Text as a way to view the included and excluded species.

Which of these organisms are included in Eukarya? Select all that apply.

 

ANSWER:

 

____ Yeast

 

____ C. elegans

 

____ Ponderosa pine

 

____ E. coli

   ORDER NOW your custom paper to have it completed successfully on time.

 

Part D

6.     When you clicked on Eukarya in the main window, the names of the five supergroups of eukaryotes appeared, reflecting one current hypothesis of eukaryote evolution. Click onUnikonta, which is the supergroup that includes animals.7.     Continue to click on the groups in this sequence until you get to the phylum Chordata:
Opisthokonta > Metazoa > Eumetazoa > Bilateria > Deuterostomia > Chordata8.     Using the Included and Excluded boxes beneath the main window, use a trial-and-error approach to click through the groups under phylum Chordata until you’ve found classes Mammalia and Reptilia.

What groups did you click through to get to classes Mammalia and Reptilia?

 

ANSWER:

 

 

Part E

9.     Click on Mammalia. Use the Included box to identify some animals included in this class.10.   Now, click on Reptilia and use the Included box to identify some animals included in this class.

Which two of the following species are more closely related: red-eared slider, vampire bat, American alligator?

 

ANSWER:

 

 

Part F

11.   Click on class Reptilia, and continue to click on the groups in this sequence until you get to the order Saurischia:
Diapsida > Archosauria > Dinosauria > Saurischia12.   Now, click through the different branches contained within Saurischia.

Are all of the saurischians extinct? Explain.

 

ANSWER:

 

 

Part G

Here’s how you can use the Lab Book to examine multiple branches of a tree at the same time.

13.   Drag the tree in the main window to the right until you get back to where you had selected Deuterostomia in step 7.14.   Now, instead of Deuterostomia, click on Ecdysozoa. Then, click on these taxa in this sequence:
Arthropoda > Hexapoda > Insecta > Isoptera > Rhinotermitidae > Reticulitermes

What is the common name of the species you have arrived at?

 

ANSWER:

 

 

Part H

15.   Click the Save button located above the left side of the main window. This will save this view of this particular branch of this tree to the Lab Book. You can save as many opened branches to the Lab Book as you like, and they will remain saved until you exit the lab room or close your Internet browser window.16.   Now, drag the tree window back to where you had selected Arthropoda in step 14. This time, click through these taxa in this sequence:
Arthropoda > Crustacea > Malacostraca > Decapoda > Nephropidae > Homarus

What is the common name of the species you have arrived at?

 

ANSWER:

 

 

Part I

17.   Click the Save button to save this branch to the Lab Book.18.   Now, click on the red Lab Book next to the clipboard on the lab bench. Open either of the trees you saved by clicking on the tree icon in front of its title.

19.   On the left-hand page where the opened tree appears, right-click (or Ctrl-click) on the tree, and select Copy Data.

20.   Next, open the other tree, and then right-click (or Ctrl-click) on the left-hand page. Select Paste Data. Using the scroll bar, you should see the two trees, one above the other.

21.   Select both trees by command- or Ctrl-clicking on both. Then, click Combine Trees in the upper left corner of the Lab Book. The two trees will merge so that the point at which their lineages diverged is more obvious.

What is the name and level of the taxon where the two species’ lineages diverge?

 

ANSWER:

 

 

Part J

Think It Over

In one sentence, summarize how these two species are related and what distinguishes them taxonomically.

 

ANSWER:

 

ORDER NOW your custom paper to have it completed successfully on time.

Assignment 1 and 2


Buy answers to the Assignment 1 and 2 (Email us: writersestate@gmail.com)

Considering all the course work to date, revisit the assignment from Week 1 and respond to the following in your original post.

 

  • What is the future of cloud computing? 60wods
  • Create a forecast for cloud computing adoption in the next five years. 60 words
  • Will everything eventually move to the cloud? 60 words
  • Will the concept be obsolete? 60 words

 

  • What do the experts say? 60 words

Assignment 2

 

Complete the ending journal entry for this course located in the journal you filled out for week 1. This is the section entitled “Journal Entry at End of Course,” save it to a file, and attach the file to this assignment (250+ words).

OOP244 Final Project (v. 3.0) Seneca Course Management Tool (SCM)


1 Summer 2016

OOP244 Final Project (v. 3.0)

Seneca Course Management Tool (SCM)

You are asked to develop a C++ application that manages Seneca courses taken by the students at the School of Information and Communications Technology (ICT). In this proof of concept application, the ICT students can take two types of courses, namely ICT-related courses (e.g. OOP244, BTP200) and general education courses (e.g. EAC150, BTC140). The application will provide a console-based menu system to manage these courses. You will develop this application incrementally as new user requirements emerge during the project development process. As you work on the project, you will build up your conceptual and practical knowledge of object-oriented programming in C++. You will learn to apply three principles of object-oriented programming (i.e. encapsulation, inheritance and polymorphism). In particular, you will create five classes as new user requirements emerge. The application class will be the point of integrating four classes. A. THE USER INTERFACE Seneca Course Management Tool 1- List courses. 2- Display the details of a course. 3- Add a course. 4- Change the study load of a course. 5- Load courses from a file. 6- Save courses to a file. 0- Exit program. > _ 2 B. CLASSES TO BE DEVELOPED You will develop the following five classes for this application: Streamable This interface (a class with “only” pure virtual functions) enforces that the classes inherited from it are to be “streamable”. In the first half of the course we define streams to be sequence of characters. IO streams allow program data to be exchanged with peripherals such as computer consoles or keyboards. Any class derived from “Streamable” can read from or write to streams. Using this class, a list of courses can be saved to and retrieved from a file. Individual course details can be displayed on screen or read from keyboard. Course A class that encapsulates information about courses. As the project develops, this class will acquire streamable characteristics as new user requirements emerge. ICTCourse A class that encapsulates information about ICT-related courses (e.g. OOP244, BTP200). It is derived from the Course class. GenEdCourse A class that encapsulates information about general education courses (e.g. EAC150, BTC140). It is derived the Course class. ScmApp An application class that provides a console-based menu system to manage The courses. It will use the other four classes in order to provide the system’s functionality. You will develop this application incrementally as new user requirements emerge. C. CLASS DIAGRAM 3 D. PROJECT DEVELOPMENT PROCESS You have approximately four weeks to complete the project. The project is divided into 4 milestones and thus four deliverables. Each milestone has a clear learning focus and specific learning tasks. The approximate schedule for the deliverables is as follows: • Final Project Due date: Friday August 12, 2016 by 11:59:00pm. • MS1: The Course and ScmApp classes. Due: July 27, 2016 (30% of grade) • MS2: The ICTCourse, GenEdCourse and Due: August 5, 2016 (30% of grade) ScmApp classes. • MS3: The Streamable, Course, ITCourse Due: August 9, 2016 (30% of grade) and GenEdCourse classes. • MS4: Completion of the ScmApp class. Due: August 12, 2016 (10% of grade) You must submit each milestone by the due date indicated. A 10% penalty (for the particular milestone missed) will be assessed for each day late. E. FILE STRUCTURE OF THE PROJECT Each class will have its own header file and .cpp file. The names of these files should be the same as the class names. Example: Class Course has two files: Course.h and Course.cpp In addition to header files for each class, create a header file called “general.h” that will hold the general defined values for the project, such as: MAX_COURSECODE_LEN (6) The maximum length of a course code. DISPLAY_LINES (10) The maximum number of lines used to display course details before each pause. MAX_NO_RECS (2000) The maximum number of records in the data file. This header file should get included where these values are used. Notes 1. All the code developed for this application should be in the sict namespace. 2. All the code must be properly documented and indented. Ask your instructor for details. 4 MILESTONE 1: TWO CLASSES (Course and ScmApp). Learning Focus: Dynamic Memory Allocation; Operator Overloading. Learning Tasks: 1. Create the Course and ScmApp classes according to user requirements. 2. Test the Course and ScmApp classes. A. User Requirements Create a class called Course. The class Course is responsible for encapsulating information about general courses at Seneca College. At Milestone 1, this class is a concrete class. It will become an abstract base class at Milestone 3. The class is implemented under the sict namespace. Code the Course class in Course.h and Course.cpp. 1. The Course Class Specs. Private Member Variables. courseCode_: Character array, MAX_COURSECODE_LEN + 1 characterslong. This character array holds the course code as a string. courseTitle_: Character pointer This character pointer points to a dynamic string that holds the title of the course. credits_: Integer It holds the number of credits of the course. studyLoad_: Integer It hold the amount of study load, defined by the number of assignments. Public Member Functions and Constructors No Argument Constructor This constructor sets the Course object to a safe recognizable empty state. All number values are set to zero in this state. 5 Four Argument Constructor The Course object is constructed by passing 4 values to the constructor: the course code, the course title, the number of credits and the amount of study load. The constructor: • Copy the course code into the corresponding member variable up to MAX_COURSECODE_LEN characters. • Allocate enough memory to hold the name as pointed by the pointer courseTitle_. Then copy the name into the allocated memory pointed to by the member variable courseTitle_. • Set the rest of the member variables to the corresponding values received by the arguments. You should ensure that the data passed in is valid. If any of the data is invalid, you should set the object to the empty state. Validation criteria – course code – must be non-empty and must not be long than MAX_COURSECODE_LEN characters – course title – must be non-empty – the number of credits – non-negative (greater than 0) – study load – non-negative (greater than 0) Copy Constructor See below. Dynamic Memory Allocation Requirements Implement the copy constructor and the operator= so the Course object is copied from and assigned to another Course object safely and without any memory leak. (Also implement a destructor to make sure that the memory allocated by the pointer courseTitle_ is freed when the Course object is destroyed 6 Setters: Create the following setter functions to set the corresponding member variables: void setCourseCode(const* char cc) void setCourseTitle(const* char ct) void setCredits(int c) void setStudyLoad(int sl) Validate the input to ensure that the setter function cannot invalidate the object. Use the validation rules stated in the constructor section. If the input is invalid, do not allow the member to be modified. No other action is required. All the above setters return void. Getters (Queries): Create the following constant getter functions to return the values or addresses of the corresponding member variables: (these getter functions do not receive any arguments) – getCourseCode(), returns constant character pointer – getCourseTitle(), returns constant character pointer – getCredits(), returns integer – getStudyLoad(), returns integer Also: – isEmpty returns bool isEmpty returns true if the Course object is in a safe empty state, false otherwise All the above getters are constant functions, which means that they CANNOT modify the current object. Overload Member Operators. Operator== : receives a constant character pointer and returns a boolean. This operator will compare the received constant character pointer to the course code of the course, if they are the same, it will return true. Otherwise it will return false. Operator+= : receives an integer and returns an integer. This operator will change the received integer value to the study load of the course, returning the sum. Note: A negative integer is used to reduce the study load. 7 Overload the ostream operator << (a free helper function). After implementing the Course class, overload the ostream operator<< as a free helper function. Hint: You should implement a public member function called display( ). It displays the data values of a Course object in the following format (separated by Bar “|” characters ) : OOP244 | OOP In C++ | 1 | 3 | course code: left justified, MAX_COURSECODE_LEN characters course title: left justified, 20 characters wide (truncated if longer than 20 chars) credits: right justified, 6 characters wide study load: right justified, 4 characters wide NO NEW LINE CHARACTER Note: Each Bar “|” character is surrounded by two blank spaces Make sure that the prototypes of the functions are in Course.h. 8 2. The ScmApp Class Specs. The ScmApp class provides a console-based menu system to manage the courses. Code the class in ScmApp.h and ScmApp.cpp. Private member variables. Course* courseList_[MAX_NO_RECS]; An array of Course pointers. The size of this static array is MAX_NO_RECS. Note: Each element of this array is a Course pointer. Reminder: MAX_NO_RECS is defined in in the header file general.h. int noOfCourses_; The number of courses (ICTCourse or GenEdCourse) that are currently pointed by the array courseList_. 9 The Constructor. The no-argument ScmApp constructor does the following initialization: 1- Set all the courseList_ elements to nullptr. 2- Set noOfCourses_ to zero. Private member functions. The Copy Constructor and Assignment Operator. Make sure that an ScmApp object cannot get copied or assigned to another ScmApp object. void pause() const; It prints: “Press Enter to continue…” and then waits for the user to hit enter. If user hits any other key, the key in ignored. Only ENTER will terminate this function. int menu(); It displays the menu as follows and waits for the user to select an option. Seneca Course Management Tool 1- List courses. 2- Display the details of a course. 3- Add a course. 4- Change the study load of a course. 0- Exit program > _ ^ here is where the cursor stands when menu is printed – If the selection number is valid, the member function menu( ) will return the selection. Otherwise it will return -1. – This function makes sure that there are no characters left in the keyboard buffer and wipes it clean before exit. void listCourses()const; – It displays the details of all courses. First, it displays the following title : Row | Code | Course Title | Credits | Study Load | —–|——|————————|———-|———–| – Then it iterates through the array courseList_ up to noOfCourses_ and displays the following for each course • Row number in four spaces right justified • a Bar character (|) surrounded by two spaces. 10 Then it displays the current Course in the iteration followed by a newline – If the Row number reaches to 10, the program will pause. – At the end of the iteration, it will close the list with the following dotted line: ————————————————————————— int searchForACourse(const char* courseCode)const; Iterates through the array courseList_ up to noOfProducts_ and checks each array element for the same course code as the incoming argument using the operator== implemented for the Course class. If a match is found, it will return the index of the found Course in the array courseList_. Otherwise it will return -1. void changeStudyLoad(const char* courseCode); It changes the study load of a course whose course code matches courseCode as the incoming argument. If not found it will display: “Not found!” If found, it will ask for an integer for the amount of study load: “Please enter the amount of the study load: ” It uses the operator += (overloaded in the Course class) to change the study load of the course. Make sure that the keyboard is flushed after the data entry. void addACourse(); It gets the data values from the user to initialize the object. Finally it adds the object address to the end of the array courseList_. 11 Public member functions int run(); It displays the menu and processes user requests. Depending on the user’s selection number, it performs the action as requested and pauses. (Use the pause function.) Then it redisplays the menu until the user selects zero to exit. 1- List courses. List all the courses. 2- Display the details of a course. Ask for a course code using this prompt “Please enter the course code: ” and get it from the console. Then search for it. If found, display the course details. Otherwise display: “Not found!” 3- Add a course. It calls the addACourse() function. 4- Change the study load of a course. Ask for a course code using this prompt “Please enter the course code: ” and get it from the console. Then call the changeStudyLoad() function. 0- Exit program The program will terminate printing: “Goodbye!!” In case of an invalid menu selection the program will print: “===Invalid Selection, try again.===”. Then it will pause before redisplaying the menu. The function run( ) returns 0 at the end. 12 MILESTONE 2: TWO NEW CLASSES (ICTCourse, GenEdCourse). Learning Focus: Inheritance and Polymorphism. Learning Tasks 1. Create two classes (ICTCourse, GenEdCourse) that are derived from the class Course. 2. Modify the class Course in order to implement the inheritance hierarchy successfully. 3. Modify the application class ScmClass with the following functionality: – List courses. – Display the details of a course. – Add a course. (Note: Add an ICT course or a GenEdCourse.) – Change the study load of a course. A. User Requirements. 1. Course Class Modify the Course class so it becomes an abstract base class. Make Course::display() a pure virtual function. 2. General.h file Add the following constants TYPE_GEN = ‘G’ TYPE_ICT = ‘I’ 3. The ICTCourse Class Specs. Implement the ICTCourse class in ICTCourse.h and ICTCourse.cpp as a class derived from the Course class. Private member variables char computerSystem_[6+1]; It holds the type of computer system that will be used in an ICT course (e.g. matrix, oracle, as400, win and linux). 13 Public Constructors The ICTCourse class has two constructors. The no-argument constructor sets the object to the safe empty state defined for Course in milestone 1. The five-argument constructor receives four arguments for the course code, the course title, the number of credits and the amount of study load (i.e. the data members of the base class). It receives a string as the fifth argument to initialize the member variable computerSystem_. Truncate the fifth argument to 6 characters if necessary. The default value for the fifth argument is “matrix.” 14 Public Member Functions const char* getComputerSystem() const; It returns a constant pointer to the computerSystem_ member variable. void setComputerSystem (const char* value); It copies the incoming value string into the member variable computerSystem_ . Make sure that the copying does not pass the size of the array computerSystem_. This implies that truncation is used if necessary. Overload the ostreram operator << (a FREE helper function): Reuse the ostream operator<< from Milestone 1. Hint: In order to have polymorphic behavior, you should implement a virtual function called display(std::ostream) and reuse the function display(std::ostream) in the base class. The function displays the data values an ICTCourse object in the following format (separated by the bar “|” character and two padding spaces on each side, except for the last one): OOP244 | OOP | 1 | 4 | matrix | | 123456__|__12345678901234567890__|__123456__|__1234__|__123456__|__1234__| course code: as specified in Milestone 1 course title: as specified in Milestone 1 credits: as specified in Milestone 1 study load: as specified in Milestone 1 system: left-justified, 6 characters wide (truncated if longer than 6 characters) empty field: 4 characters wide NO NEW LINE CHARACTER 4. The GenEdCourse Class Specs. Implement the GenEdCourse class in GenEdCourse .h and GenEdCourse.cpp as a class derived from the Course class. Private Member Variables. The GenEdCourse class has one private member variable: • langLevel_ : Integer It holds the English language requirement. This must be a value between 0 and 5. Constructor. GenEdCourse has two constructors. 15 The five-argument constructor receives four arguments for the course code, the course title, the number of credits and the amount of study load (i.e. the data members of the base class). It receives a integer as the fifth argument to initialize the member variable langLevel_. The default value for the fifth argument is 0. Public Member Functions. int getLangLevel() const; It returns the value of the member variable langLevel_. void setLangLevel (int value); It copies the incoming integer value into the member variable langLevel_ if the value is between 0 and 5. If the value is not within the range, do NOT update the variable. No other action is required. Overload the ostream operator << (a FREE helper function). After implementing the GenEdCourse class, overload the ostream operator << as a free helper function. Hints: You should implement a public member function called display( ) and reuse the function display( ) in the base class. The function displays the data values of an GenEdCourse object as shown below (separated by the bar “|” character and two padding spaces on each side, except for the last one): EAC150 | College English | 1 | 4 | | 0 | 123456__|__12345678901234567890__|__123456__|__1234__|__123456__|__1234__| course code: as specified in Milestone 1 course title: as specified in Milestone 1 credits: as specified in Milestone 1 study load: as specified in Milestone 1 a field with 6 blank spaces language requirement: right justified, 4 characters wide NO NEW LINE CHARACTER 3. Modify the application class (ScmApp). a) Modify the application class such that the menu system can be used to add two types of courses, namely ICT-related courses and general education courses. 3- Add a course. Ask the user for a course type. Ask for a course type using this prompt : “Please enter the course type (I-ICT or G-GenEd): ” 16 and get it from the console. Then call the addACourse() function. b) Modify the addACourse( ) function such that it receives an character as a parameter. Use the constant chars TYPE_GEN and TYPE_ICT defined in the general.h file. TYPE_ICT means that an ICTCourse object will be added. TYPE_GEN means that a GenEdCourse object will be added. It gets the data values from the user to initialize an ICTCourse or GenEdCourse object. You should use the following order to get input values for an ICTCourse object. Course Code: OOP244 Course Title: OOP in C++ Credits: 1 Study Load: 4 Computer System: oracle You should also use the following order to get input values for a GenEdCourse object. Course Code: EAC150 Course Title: College English Credits: 1 Study Load: 4 Language Requirement: 12 MILESTONE 3: THE STREAMABLE INTERFACE , ABSTRACT BASE CLASS AND OBJECT SERIALIZATION. In this milestone, the Course class and its derived classes will acquire streamable characteristics. As a result, the Streamable interface is provided to enforce that all concrete classes on the inheritance hierarchy will implement functions that work with fstream and iostream objects. In other words, the ICTCourse and GenEdCourse classes have the capability of doing object serialization (i.e. writing an object to a file and reading an object from a file). Code the Streamable interface in the Streamable.h file. It does not have an implementation file. A. User Requirements 1. Pure virtual member functions. The Streamable interface has four pure virtual member functions: 1- fstream& store(fstream& file, bool addNewLine = true) const It is a constant member function (does not modify the owner) and receives and returns references of std::fstream. 2- fstream& load(std::fstream& file) It receives and returns references of std::fstream. 3- ostream& display(ostream& os) const It is a constant member function and returns a reference of std::ostream. It receives one argument: a reference of std::ostream. 4- istream& read(istream& is) It returns and receives references of std::istream. 2. Modify the Course Class. Derive the Course class from the Streamable interface. 3. Modify the ICTCourse Class. ICTCourse implements all four pure virtual functions of the Streamable interface. (Note: The signatures of the functions are identical to those of Streamable.) fstream& ICTCourse::store(fstream& fileStream, bool addNewLine) const Using the ostream operator << , this function first writes the ‘I’ character (defined by TYPE_ICT) and a comma into the argument fileStream. Then, without any formatting or spaces, it writes all the member variables of an ICTCourse object, separated by commas, in the following order: course code, course title, credits, study load, system and a new line character if addNewLine is true. Finally it returns the argument file. Example: I,OOP244,OOP in C++,1,4,matrix fstream& ICTCourse::load(fstream& fileStream) Using the istream operator >>, the ignore( ) and getline( ) functions of istream, this function reads a record from the argument fileStream. It uses setters to set the member variables of the current object. When reading a record, the function assumes that the record does not have the character ‘I’ (defined by TYPE_ICT) at the beginning. Thus it starts reading from the field that has the course code. No error detection is done. At the end the argument fileStream is returned. Hint: Create temporary variables of primitive data types to read the fields one by one, skipping the commas. After reading a field, use a setter to set a member variable of the current object. ostream& ICTCourse::display(ostream& os) const Reuse the function display( ) that has been implemented in this class. istream& ICTCourse::read(istream& istr): It receives data values from an istream object (the argument istr) in the following order: Course Code: OOP244 Course Title: OOP in C++ Credits: 1 Study Load: 4 Computer System: oracle It uses the setters to set the member variables of the current object. Finally it returns the arguments istr. 4. Modify the GenEdCourse Class. GenEdCourse implements all four pure virtual functions of the Streamable interface. (Note: The signatures of the functions are identical to those of Streamable.) fstream& GenEdCourse::store(fstream& fileStream, bool addNewLine) const Using the ostream operator << , this function first writes the ‘G’ character (defined by TYPE_GEN) and a comma into the argument fileStream. Then, without any formatting or spaces, it writes all the member variables of an GenEdCourse object, separated by commas, in the following order: course code, course title, credits, study load, language requirement and a new line character if addNewLine is true. Finally it returns the argument fileStream. Example: I,EAC150,College English,1,4,12 fstream& GenEdCourse::load(fstream& fileStream) Using the istream operator >>, the ignore( ) and getline( ) functions of istream, this function reads a record from the argument fileStream. It uses setters to set the member variables of the current object. When reading a record, the function assumes that the record does not have the character ‘G’ (defined by TYPE_GEN) at the beginning. Thus it starts reading from the field that has the course code. No error detection is done. At the end the argument fileStream is returned. Hint: Create temporary variables of primitive data types to read the fields one by one, skipping the commas. After reading a field, use a setter to set a member variable of the current object. ostream& GenEdCourse::display(ostream& os) const Reuse the function display( ) that has been implemented in this class. istream& GenEdCourse::read(istream& istr): It receives data values from an istream object (the argument istr ) in the following order: Course Code: EAC150 Course Title: College English Credits: 1 Study Load: 4 Language Requirement: 12 It uses the setters to set the member variables of the current object. Finally it returns the argument istr. B. Testing and Submission Requirements (MILESTONE 3). 1. In order for you class to be tested, the following must be done in order for the ScmAppTester class to access the ScmApp class that you have built. a. A forward declaration of the class ScmAppTester must be placed INSIDE the sict namespace AND before the ScmApp definition. b. The ScmTester class must be declared to be a friend of the ScmApp class Your ScmApp.h file should look something like the following. namespace sict{ class ScmAppTester; class ScmApp { private members public: public members friend class ScmAppTester; }; } c. The main() function that you used to test your application must be commented out. 2. If not on matrix already, upload general.h, Course.h, ScmApp.h, ICTCourse.h, GenEdCourse.h, Coures.cpp, ICTCourse.cpp, GenEdCourse.cpp, ScmApp.cpp, Streamable.h to your matrix account. Compile and run your code and make sure everything works properly. Then run the following script from your account: ~eden.burton/submit ms3 and follow the instructions. If your submission is not successful, you can check the output.txt file generated to see which tests fail. 2. If you cannot get your code to pass all tests, you can submit your code for partial marks using the open submitter. This submitter will not be available until after the due date ~eden.burton/submit ms3open

THE END OF MILESTONE

Artificial Intelligence


 Artificial Intelligence 

Non-Resit Coursework Assignment Brief 

Module Title: Artificial Intelligence
Level: Level 5
Format: Report
Presentation: No
Min word count: There is a limit of 1200 words for task 1 (with +/- 10% leeway).

Word limit is not Applicable for task 2.

 

Assignment Tasks:

Your assignment consists of two tasks:

  1. Task One is a report (worth 40% of the total marks for the assignment).
  2. Task Two is an implementation of an algorithm including critical analysis on the performance (worth 60% of the total marks for the assignment),

The output of BOTH tasks should be documented in a single report, and submitted to Turnitin.

 

Assignment Task 1: Report                                                                         [40 Marks]

Discuss in details the applicability of Artificial Intelligence (AI) in different fields of life, showing the advantages and disadvantages of AI in real-world.

Your report should cover and address the following main points:

  1. Investigate an application for the artificial intelligence:
    • Describe this application and its importance.
    • Highlight the advantages and disadvantages of the chosen application.
  2. How can artificial intelligence serve the humanity? You may support your answer with examples.

 

Note: Please investigate and research any selected application of your choice in any chosen field (e.g. hospitals and medicine, finance, aviation, business…etc.). 

 

Deliverables:

 

  • You will provide a report for this task covering all the above main points.
  • You will reference all sources.
  • Elaborate with examples.
  • Evaluate the limitations of AI for the chosen application; if any.
  • Your word count will include all quotes or citations. The word count does not include titles, headers, bibliographies/reference lists, diagrams and appendix.
  • Your report should be laid out using title page, contents page, headlines, sub headings, bullet points, appendix etc.

 

 

 

 

 

Assignment Task 2: Implementation of Algorithms                  [60 Marks] In this task you need to address the following two main points:

  • Apply ID3 Decision Tree algorithm to build a decision tree from the given tennis dataset. You should build a tree to predict play tennis, based on the weather (Outlook, Temperature, Humidity, and Wind). Show all of your work, calculations, and decisions as you build the tree on the table below.
  • Choose another AI approach, which can be used for prediction problem; evaluate the chosen approach and compare it with the proposed decision tree approach.

 

Day Outlook Temp. Humidity Wind Play Tennis
D1 Sunny Hot High Weak No
D2 Sunny Hot High Strong No
D3 Overcast Hot High Weak Yes
D4  Rain  Mild High Weak Yes
D5 Rain Cool Normal Weak Yes
D6 Rain Cool Normal Strong No
D7 Overcast Cool Normal Weak Yes
D8 Sunny Mild High Weak No
D9 Sunny Cold Normal Weak Yes
D10 Rain Mild Normal Strong Yes
D11 Sunny Mild Normal Strong Yes
D12 Overcast Mild High Strong Yes
D13 Overcast Hot Normal Weak Yes
D14 Rain Mild High Strong No

                                     Table 1: Tennis data set

Deliverables:

 

  • You will provide a complete evaluation and implementation of the ID3 algorithm.
  • Please make sure that you provide a clear detailed analysis for each step of the proposed algorithm.
  • Provide evidence of the output of the algorithm implementation.
  • A critical analysis and comparison between the proposed algorithm and your chosen algorithm. NOTE:

 

  • Please submit your work as a word document,
  • Please insert a screen shot of your algorithm outputs.
  • Please insert the source code with the comments as a Zipped File within the Word Document in the Appendix.

 

Guidance notes and considerations for the task

 

Remember to support your answers with the relevant theories/studies; please highlight in a clear way any necessary and reasonable assumptions you make at the start of the report.

You must focus on the reasoning behind the concepts discussed in your report.

Use diagrams where necessary to elaborate concepts. The correct use of diagrams and tables could help enormously in conveying the message across in simple and comprehensive way.

All the discussions and arguments should be backed up with relevant evidence grounded in sound research.

The word count is deliberately concise to encourage application of academic writing techniques.

Marking Criteria

First: In order to achieve a first class mark, your report should confidently show a critical discussion of a wide range of research covering practical and theoretical, critical literature; critical self-reflection and an understanding of artificial intelligence techniques and related applications in different fields of life showing how it could serve humanity. It would be fully referenced and also demonstrate critical self-reflection and awareness. The report includes critical investigation for the chosen artificial intelligence application, highlighting its advantages and disadvantages. Your report should provide very good comments on the implementation and evaluation of the ID3 algorithm, along with clear evidence of a successful output for the execution of this algorithm as well as a very good analysis and evaluation of the chosen algorithm. It should provide clear evidence of building a decision tree from the given tennis dataset and evaluate the chosen algorithm. You will show excellent analysis and synthesis, critical engagement with a range of reading, knowledge of researchinformed literature embedded in the work, consistently accurate use of academic conventions and strong valid conclusions.

2:1: In order to achieve a 2:1 grade, your report should show evidence of a wide range of appropriate research and an awareness of artificial intelligence techniques and applications in different fields of the life to solve a specific problem and how it could serve humanity. It would show a degree of self-reflection and understanding of the process of practice-research. It would be fully referenced and also demonstrate self-reflection and awareness. Your report should provide good comments on the implementation and evaluation of the ID3 algorithm, along with evidence of a successful output for the execution of the algorithms as well as a clear analysis and evaluation of the chosen algorithms. Clear evidence provided to build a decision tree from the given tennis dataset to support findings. You need to show a clear understanding of the proposed ID3 algorithm and your chosen algorithm. The report shows good knowledge, analysis and evaluation of a range of literature beyond core text(s) as well as the proposed algorithms.  It should have a very good use of academic conventions with good valid conclusions. The report should have knowledge of the field of literature used consistently to support findings, and the ability to apply concepts/ principles effectively beyond context of study.

2:2: In order to achieve a 2:2 grade, your report should show evidence of basic research and understanding of artificial intelligence techniques and related applications in different fields of life to solve specific problem. It would show a degree of self-reflection. It would be fully referenced and also demonstrate critical self-reflection and awareness. The report includes just mention to the artificial intelligence applications. Your report should provide relevant comments on the implementation and evaluation of the ID3 algorithm, along with evidence of a successful output for the execution of the algorithms. Some evidence provided to build a decision tree from the given tennis dataset to support findings. You need to show an understanding of the proposed ID3 algorithm and your chosen algorithm. You should show the ability to apply concepts and principles outside the context of study, including the applications of those principles. The report shows acceptable knowledge and analysis of a range of literature beyond core text(s).  Literatures are used accurately and analytically. Academic skills and conclusions are generally sound.

Pass: In order to achieve a pass, your report should show limited research and understanding of artificial intelligence techniques and related applications in different fields of life. It would demonstrate an attempt at a self-reflection on the AI application. It would be fully referenced. Some evidence provided to build a decision tree from the given tennis dataset to support the findings, but not always consistent. Provide some of the relevant conclusions. The report shows an acceptable awareness of the main issues, but it is not fully consistent.

Fail: A fail grade will be given due to demonstrating gaps in knowledge and understanding of the material at this level. The report is containing significant inaccuracies and/or unsubstantiated generalisations.

 

Health Systems, Inc. using Visio


Health Systems, Inc. using Visio

Assignment Overview
Health Systems, Inc., the regional hospital that you worked with in the Unit 1 assignment, has hired you to create a design document about how to build remote access to their organization. For this assignment, you will explain how to design the LAN at a remote branch site and discuss how it will interconnect through a WAN to the main Health Systems hospital site.

Assignment Instructions
Use Visio to create a diagram for your project. You may access Visio via the Toolwire Resources in this unit. Include the following in your diagram:

Display the basic LAN and WAN topology for your remote sites.
Display router and switch placement.
Display computers and workstations.
After creating your diagram, write a paper in which you complete the following:

Describe your diagram. Include specifications about the topologies, cabling, routers, and switches.
Provide an analysis of your diagram. Explain the role that the devices on your network play in network communication.
Support your diagram. Provide reasoning for choosing the switching and routing, transmission media, and topology.
Submission Requirements
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.
Font and font size: Times New Roman, 12 point.
Refer to the Network Design Scoring Guide to ensure that you meet the grading criteria for this Assignment.

%d bloggers like this: