Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Project 3 Project 3: Data Analytics Assignment Overview This Assignment Focuses On The Design,

Project 3 Project 3: Data Analytics Assignment Overview This assignment focuses on the design, implementation and testing of Python programs to process data files using lists and tuples, as described below. Assignment Specifications 1. You will develop a Python program to manage information about baseball players. The program will maintain the following information for each player in the data set: player’s name (string) team identifier (string) games played (integer) at bats (integer) runs scored (integer) hits (integer) doubles (integer) triples (integer) homeruns (integer) 2. The program will recognize the following commands: QUIT HELP INPUT filename TEAM identifier REPORT n PLAYERS   The program will be operated interactively: it will prompt the user and accept commands from the keyboard. If the user enters an invalid command, the program will display an appropriate message and prompt the user to enter another command. 3. The “QUIT” command will halt execution. 4. The “HELP” command will display information to the user about the commands recognized by the program. 5. The “INPUT” command will be followed by a string representing the name of an input file. The program will discard the current data set stored in memory, and then process the input file as the source for a new data set (open the file, read the file once and store the records, then close the file). An input file contains zero or more player records, where each record consists of the nine fields listed above. The records are separated by newlines, and the fields are separated by semicolons. If the user enters an invalid file name, the program will display an appropriate message and prompt the user to enter another file name. The program will halt after the user enters an invalid file name three consecutive times. 6. The “TEAM” command will be followed by a string representing a team identifier. The program will display all information about all players on that team. If the user enters an invalid team identifier, the program will display an appropriate message and prompt the user to enter another command; the program will not display an empty table. 7. The “REPORT” command will be followed by an integer number and a string (one of “HITS”, “BATTING” or “SLUGGING”). If the user enters an invalid command, the program will display an appropriate message and prompt the user to enter another command; the program will not display an empty report. For each report, the program will display all information about the top “n” players in a given category: HITS — number of hits BATTING — batting average SLUGGING — slugging percentage 8. The program will display appropriate messages to inform the user about any unusual circumstances. Assignment Note 1. The file named “mlb.2013.txt” contains information about players on the teams in Major League Baseball in 2013. 2. The file named “mlb.part.txt” contains information about 20 players on teams in Major League Baseball in 2013; that file will be useful for your initial development. The first few lines of that file are shown below: De Aza, Alejandro; CWS; 153; 607; 84; 160; 27; 4; 17 Hunter, Torii; DET; 144; 606; 90; 184; 37; 5; 17 Hamilton, Josh; LAA; 151; 576; 73; 144; 32; 5; 21 Choo, Shin-Soo; CIN; 154; 569; 107; 162; 34; 2; 21 Upton, Justin; ATL; 149; 558; 94; 147; 27; 2; 27 Cabrera, Miguel; DET; 148; 555; 103; 193; 26; 1; 44 Posey, Buster; SF; 148; 520; 61; 153; 34; 1; 15 Suzuki, Ichiro; NYY; 150; 520; 57; 136; 15; 3; 7 Holliday, Matt; STL; 141; 520; 103; 156; 31; 1; 22 Headley, Chase; SD; 141; 520; 59; 130; 35; 2; 13 Assignment Deliverable You must turn in a file called proj03.py – this is your source code solution; be sure to include your names, the project number and comments describing your code.   Reminders Solve the problem using pencil and paper first. Develop a simple version of the program, then add functionality incrementally, testing your program thoroughly after each addition. Optional Create tables and have output for the “REPORT” command be delivered in a tabular format.

A Cyber-incident Response Team Is Responding To A Network Intrusion Incident On A Hospital

A cyber-incident response team is responding to a network intrusion incident on a hospital network. Which of the following must the team prepare to allow the data to be used in court as evidence? A. Computer forensics form B. HIPAA response form C. Chain of custody form D. Incident form Please give explanation, for thumbs up.

In Java, C , Or In C, *** ONLY NEED TO DO THE PROGRAMMING PART**

In Java, c , or in C, *** ONLY NEED TO DO THE PROGRAMMING PART** TEXTS AFTER THE PICTURE IS ONLY FOR REFERENCE TO THE QUESTIONS IN THE PROGRAMMING PART *** REFER TO THE FOLLOWING FOR THE QUESTIONS ABOVE DO NOT SOLVE THE FOLLOWING ITS JUST FOR REFERENCE, ONLY COMPLETE THE PROGRAMMING PART ABOVE*** 1 Written Part [40pts] Note: pages refer to the 2nd edition of the textbook. Exercise 1: exercise 7.41 page 310 [8pts] 1. Prove that any comparison-based algorithm to sort 4 elements requires 5 comparisons. 2. Give an algorithm to sort 4 elements in 5 comparisons. Exercise 2: exercise 7.42 page 310 [8pts] 1. Prove that 7 comparisons are required to sort 5 elements using any comparison-based algorithm. 2. Give an algorithm to sort 5 elements with 7 comparisons. Exercise 3: exercise 7.48 page 310 (first 2 questions) [8pts] We are given an array that contains N numbers. We want to determine if there are two numbers whose sum equals a given number K. For instance, if the input is 8, 4, 1, 6 and K is 10, then the answer is yes (4 and 6). A number may be used twice. Do the following: 1. Give an O( ) algorithm to solve this problem. 2. Give an O(N logN) algorithm to solve this problem. (Hint: Sort the items first. After that is done, you can solve the problem in linear time.) Exercise 4 : [8pts] Suppose that the splits at every level of quicksort are in the proportion 1- a to a, where 0 < a < 1/2 is a constant. Show that the minimum depth of a leaf in the recursion tree is approximately: -log(n) / log(a) and the maximum depth is approximately -log(n)/log(1-a) (don't worry about integer round-off). Exercise 5 : [8pts] The running time of quicksort can be improved in practice by taking advantage of the fast running time of insertion sort when its input is "nearly" sorted. When quicksort is called on a subarray with fewer than k elements, let it simply return without sorting the subarray. After the top-level call to quicksort returns, run insertion sort on the entire array to finish the sorting process. Argue that this sorting algorithm runs in O(nk n log(n/k)) expected time. How should k be picked, both in theory and in practice?

FOUR FUNCTIONS OUTSIDE OF INT MAIN() LAST FUNCTION MUST BE USED FOR OUTPUT

FOUR FUNCTIONS OUTSIDE OF INT MAIN() LAST FUNCTION MUST BE USED FOR OUTPUT

A SIEM Analyst Noticed A Spike In Activities From The Guest Wireless Network To

A SIEM analyst noticed a spike in activities from the guest wireless network to several electronic health record (EHR) systems. After further analysis, the analyst discovered that a large volume of data has been uploaded to a cloud provider in the last six months. Which of the following actions should the analyst do FIRST? A. Contact the Office of Civil Rights (OCR) to report the breach B. Notify the Chief Privacy Officer (CPO) C. Activate the incident response plan D. Put an ACL on the gateway router

During A Routine Network Scan, A Security Administrator Discovered An Unidentified Service Running On

During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company’s datacenter: The enterprise monitoring service requires SNMP and SNMPTRAP connectivity to operate. Which of the following should the security administrator implement to harden the system? A. Patch and restart the unknown service. B. Segment and firewall the controller’s network. C. Disable the unidentified service on the controller. D. Implement SNMPv3 to secure communication. E. Disable TCP/UDP ports 161 through 163.

This Task Does Not Allow Any Loops And So I Am Stuck. Can Someone

This task does not allow any loops and so I am stuck. Can someone help out in completing this function to produce the expected outputs? Python Language.

C# A. In Liskov’s Substitution Principle, Derived Types Should Be Substitutable For Their ___________?

C# a. In Liskov’s Substitution Principle, derived types should be substitutable for their ___________? b. Which principle suggests that specific single responsibility interfaces are better than one general purpose interface? c. Name two common methods for performing dependency injection.

C# A. How Do IoC Containers Help With Working With Loosely Coupled Classes? B.

C# a. How do IoC containers help with working with loosely coupled classes? b. What is the Explicit Dependencies Principle? Explain why explicit dependencies are better than implicit dependencies. c. How does violating the SOLID principles make code hard to test?

C# A. Why Are Design Patterns Generally Discovered And Are Not Created? B. What

C# a. Why are design patterns generally discovered and are not created? b. What is “GoF” and how does it relate to design patterns? c. Why do we generally favor composition over inheritance?

Using C#: Create An Application Class Named BillDemo That Instantiates Objects Of Two Classes

Using C#: Create an application class named BillDemo that instantiates objects of two classes named Bill and OverdueBill, and that demonstrates all their methods. The Bill class includes auto-implemented properties for the name of the company or person to whom the bill is owed and for the amount due. Also, include a ToString() method and returns a string that contains the name of the class (using GetType()) and the Bill’s data fields values. Create a child class named OverdueBill that includes an auto-implemented property that holds the number of days the bill is overdue.

C# A. Why Should We Favor Programming To Interfaces Over Implementations? B. What Does

C# a. Why should we favor programming to interfaces over implementations? b. What does it mean for an object to have invariants, and why does one need to worry about them? c. Where might the Null Object pattern be useful?

Host IP Address: 10.101.99.228 Original Subnet Mask 255.0.0.0 New Subnet Mask: 255.255.128.0 Find: Number

Host IP Address: 10.101.99.228 Original Subnet Mask 255.0.0.0 New Subnet Mask: 255.255.128.0 Find: Number of Subnet Bits = Number of Subnets Created = Number of Host Bits per Subnet = Number of Hosts per Subnet = Network Address of this Subnet = IPv4 Address of First Host on this Subnet = IPv4 Address of Last Host on this Subnet = IPv4 Broadcast Address on this Subnet =

List The Layers Of The OSI Model And Explain The Following: What Are The

List the layers of the OSI model and explain the following: What are the functions of each layer List all of the hardware that is associated with each OSI layer – name the hardware and any protocol or programs that interface with it List all of the protocols associated with the individual layers, and where they are found in the OSI layer Additionally list any hardware that crosses more than one layer of the OSI model

Discuss Basic Components Of Securing A Wireless AP. Explain The Various Configurations And How

Discuss basic components of securing a wireless AP. Explain the various configurations and how that effects security of the wireless device specifically. Some examples include MAC address filtering, changes to SSID, and the security mode related to encryption.

This Is A Hill Cipher, Anyone Can Help Me To Decrypt It? It Would

This is a Hill Cipher, anyone can help me to decrypt it? It would be great if you can tell me the key as well thanks! isw K oeupubycwxn xzomkuw hyh c lshtdc xilryzoetik HMTKFIN ANP ZFO YSAUH TFO Ysaun oj zusy kp yyzm byeuycrv Zmtkfin xg gfanp rcq jcjxy xcsicuw kf eqi g gfwkz ahqyr xg reg po qia ehfoj klgoerc dijxuofol ykfh ityp re zwz dev Zmtkfin dex ghfo lyrissj rew tyzpu hyn kzornsj reu wmdk ajcbv lkr zuo lkgbuor euzyzpelgbu To cuosfy lkx utyv ms jm jeh zqsj qg oew noqk utyv mw kblwkrg tyrk PRG GCAN AJZ FOT GEHFOB VFO Eimj mjki cuccf din Eiprin xg oecc foj k noznby owsl prsl uuadz vkf fox uqpx Xag vafxekp zfo Eiprin ysl G oecc g ifmeo xg tmb uuy mfwx dey iuy mdw k Zqo Mcan ajz prwx c Hadz Ecan ajz prwx syygn nuqprin prm ozq deb vfo ehfob VFO JCLEW KJZ PRY EHCU C JCLEM otie zwz prk ujcby jkfym ov g auwzag xg reqyqpl xyj mfwx c Uhca kkww kjz prvaslwxsj xg xooegs prc fcupeva pre Zyzuw cuccx o Oef lm wkauop rcq sh hqtnshc rcq od pry Ehcs I cwjn igot prg Gan ub smu imzj nov au tuh c xcf ih suyt guypr anp mov mtmj smsb zwcg yk cu xg kg anz vshl ywkbwpu Pre Zyzuw owpuwxtsx ojz prg Gan g V the most difficult part is the key otherwise I can decrypt it myself

C# A. What Is The Difference Between A Design Pattern And A DLL? B.

C# a. What is the difference between a design pattern and a DLL? b. Name three techniques that can be used to make a class extensible. c. In C#, how might one write a method that extends a sealed class that cannot be modified?

C# A. What Is “double Checked Locking”? How Do You Implement It? What Does

C# a. What is “double checked locking”? How do you implement it? What does it accomplish? b. How are parameters provided to the Command pattern’s Execute() method? c. Why is the Singleton pattern commonly referred to as an “anti-pattern”?

A. What Is An “anti-pattern”? Give An Example Of An Anti-pattern And A Brief

a. What is an “anti-pattern”? Give an example of an anti-pattern and a brief summary of what it is. (Do not use Singleton as an example). b. An Event delegate is an example of what kind of design pattern? c. How does the MVVM pattern relate to the Command pattern?

C# A. What Type Of Relationship Does Farmer Have With Barn? B. Does Farmer

C# a. What type of relationship does Farmer have with Barn? b. Does farmer use multiple inheritance? Why or why not?

Please Plot The Lennard-Jones Potential Energy In This Problem Using MATLAB And Show The

Please plot the Lennard-Jones potential energy in this problem using MATLAB and show the code that you used:

The post Project 3 Project 3: Data Analytics Assignment Overview This Assignment Focuses On The Design, appeared first on Smashing Essays.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"