use j-k flip-flop and d flip-flop to design an asynchronous
Question use j-k flip-flop and d flip-flop to design an asynchronous down counter as follows ATTACHMENT PREVIEW Download attachment qt2.JPG
Discuss the importance of the delivery system in understanding “how”
Question Discuss the importance of the delivery system in understanding “how” a comprehensive school counseling program is implemented. (American School Counseling Association)
This is in python and I have everything working correctly.
Question This is in python and I have everything working correctly. I just can not figure out how to get rid of the new line in my output. #Define the dictionary containing the movie details.movies = { 2005: [[“Munich”, “Steven Spielberg”]], 2006: [[“The Prestige”, “Christopher Nolan”],[“The Departed”, “Martin Scorsese”]], 2007: [[“Into the Wild”, “Sean Penn”]], 2008: [[“The Dark Knight”, “Christopher Nolan”]], 2009: [[“Mary and Max”, “Adam Elliot”]], 2010: [[“The King’s Speech”, “Tom Hooper”]], 2011: [[“The Artist”, “Michel Hazanavicius”], [“The Help”, “Tate Taylor”]], 2012: [[“Argo”, “Ben Affleck”]], 2013: [[“12 Years a Slave”, “Steve McQueen”]], 2014: [[“Birdman”, “Alejandro G. Inarritu”]], 2015: [[“Spotlight”, “Tom McCarthy”]], 2016: [[“The BFG”, “Steven Spielberg”]]}#Prompt the user to enter the year to search.year = int(input(“Enter a year between 2005 and 2016:n”))#Check year prompt.if year in movies.keys(): #Start the loop to print the movie details of prompt. for movie in movies[year]: print(movie[0] “, ” movie[1]) #Print N/A if the year is not found.else: print(“N/A”)prompt = ” “#Start the loop until user enters q.while prompt != ‘q’: #Display the menu. print(“nMENU”) print(“Sort by:ny – Yearnd – Directornt – Movie title”) print(“q – Quitn”) #Prompt the user to enter the choice. prompt = input(“Choose an option:n”) #Quit if the prompt is q. if prompt == ‘q’: break #If the promt is y elif prompt == ‘y’: #Pick the years in sorted order. for year in sorted(movies.keys()): #Print the year. print(“n” str(year) “:”) #Start a loop to print the movie title and director. for movie in movies[year]: print(“t” movie[0] “, ” movie[1]) #If the choice is d, do the following: elif prompt == ‘d’: director = [] #Create a list of directors. for year in movies.keys(): for movie in movies[year]: if movie[1] not in director: director.append(movie[1]) #Pick the name of the director and sorte. for d in sorted(director): #Print the director name. print(“n” d “:”) #Start a loop to print title and year. for year in movies.keys(): for mov in movies[year]: if mov[1] == d: print(“t” mov[0] “, ” str(year)) #If the prompt is t, elif prompt == ‘t’: title = [] #Create a list of movie titles. for year in movies.keys(): for movie in movies[year]: if movie[0] not in title: title.append(movie[0]) #Pick the movie titles in sorted order. for t in sorted(title): #Print the movie title. print(“n” t “:”) #Start a loop to print the director and the year. for year in movies.keys(): for mov in movies[year]: if mov[0] == t: print(“t” mov[1] “, ” str(year)) #Otherwise, display the error message. else: print(“Error: Invalid choice! Enter again.”) ATTACHMENT PREVIEW Download attachment problem.PNG
I struggle with the 3rd question. please help me to
Question I struggle with the 3rd question. please help me to find the keywords. class=”ql-cursor”> Attachment 1 Attachment 2 Attachment 3 ATTACHMENT PREVIEW Download attachment image.png SIT282- Computer Crime and Digital Forensics T2 2019 Assessment Task 1 Investigation Report Due: Sunday August 11th at 11.59pm (end of week 5). Total Available Marks: 20, Weighting 20% NOTE: IF YOU HAVE NOT SIGNED AND SUBMITTED YOUR ETHICS AGREEMENT, YOUR ASSIGNMENT WILL NOT BE MARKED AND YOU WILL BE DIS-ENROLLED FROM THE UNIT. General Requirements Please use the “Assessment_Task_1_TEMPLATE” file provided in the assessments folder on the Unit Site to complete this assessment. – NO EXTENSIONS allowed without medical or other certification. – LATE ASSIGNMENTS will automatically lose 5% per day up to a maximum of five days, including weekends and holidays. Assignments submitted 6 or more days late will not be marked and are given zero. 0 The virtual machine used for the practicals contains all the tools required to complete this assessment task. 0 Ensure you take screenshots of your work for evidence and that these are legible in your report. 0 To complete this assessment you will need to have followed the theoretical material and completed the practicals for weeks 1-5. This assessment covers material up to the week ending August 9. 0 Your submission must be in a form readable by Microsoft Word. . Maximum size of your submission should be 15 pages excluding the cover page but including screenshots. The font size should be no less than llpt. . No mark will be given if you fail to show the evidence of your work-out. i.e. the process carried out to produce your solution. The report should be written so the steps performed are reproducible. 0 Ensure you keep a backup copy of your work. 0 Plagiarism is not tolerated. For information on Plagiarism and Collusion including penalties please refer to the link: http://wwwdeakin.edu.aufstudents/clouddeakin/help— guides/assessment/plagiarism o The APA Referencing Style is to be used for this assignment where appropriate. htt s://www.deakin.edu.au/students/stud in stud -su ortfreferencin a a—6 Help with the assessment If you require assistance please ask your instructors (Burwood students ask your practical demonstrator; Geelong and Cloud students ask Damien Hutchinson). We will NOT answer questions that are requesting answers or solutions. A question MUST be substantiated with evidence that work has been attempted relating to the question being asked. ATTACHMENT PREVIEW Download attachment Screen Shot 2019-08-10 at 12.48.28 PM.png SIT282- Computer Crime and Digital Forensics T2 2019 Assessment Task 1 Investigation Report Due: Sunday August 11th at 11.59pm (end of week 5). Total Available Marks: 20, Weighting 20% NOTE: IF YOU HAVE NOT SIGNED AND SUBMITTED YOUR ETHICS AGREEMENT, YOUR ASSIGNMENT WILL NOT BE MARKED AND YOU WILL BE DIS-ENROLLED FROM THE UNIT. General Requirements Please use the “Assessment_Task_1_TEMPLATE” file provided in the assessments folder on the Unit Site to complete this assessment. – NO EXTENSIONS allowed without medical or other certification. – LATE ASSIGNMENTS will automatically lose 5% per day up to a maximum of five days, including weekends and holidays. Assignments submitted 6 or more days late will not be marked and are given zero. 0 The virtual machine used for the practicals contains all the tools required to complete this assessment task. 0 Ensure you take screenshots of your work for evidence and that these are legible in your report. 0 To complete this assessment you will need to have followed the theoretical material and completed the practicals for weeks 1-5. This assessment covers material up to the week ending August 9. 0 Your submission must be in a form readable by Microsoft Word. . Maximum size of your submission should be 15 pages excluding the cover page but including screenshots. The font size should be no less than llpt. . No mark will be given if you fail to show the evidence of your work-out. i.e. the process carried out to produce your solution. The report should be written so the steps performed are reproducible. 0 Ensure you keep a backup copy of your work. 0 Plagiarism is not tolerated. For information on Plagiarism and Collusion including penalties please refer to the link: http://wwwdeakin.edu.aufstudents/clouddeakin/help— guides/assessment/plagiarism o The APA Referencing Style is to be used for this assignment where appropriate. htt s://www.deakin.edu.au/students/stud in stud -su ortfreferencin a a—6 Help with the assessment If you require assistance please ask your instructors (Burwood students ask your practical demonstrator; Geelong and Cloud students ask Damien Hutchinson). We will NOT answer questions that are requesting answers or solutions. A question MUST be substantiated with evidence that work has been attempted relating to the question being asked. ATTACHMENT PREVIEW Download attachment Screen Shot 2019-08-10 at 12.48.34 PM.png THE CASE: 2. BINARY DETAILS 2.1 Use a table to document the detailed information of the files found in the root Donald Price is an employee from Joachim’s Art Gallery based in Melbourne, directory of the ISO image-file names, file actual sizes and their MD5 hash Australia. Mr. Price had been suspended from the gallery when an audit discovered values that one of the pieces he was responsible for had disappeared. (This was a small (1) watercolour of two boats.) Unfortunately, Mr. Price wiped the hard disk of his office PC before investigators could be deployed. However, a CD-ROM was found in the PC’s CD-ROM drive. Although Mr. Price subsequently denied that the CD-ROM 2.2 Provide a description of any programs you would like to use based on the belonged to him, it was seized and entered into evidence. files identified on the ISO image. (1) A forensic image in raw format of the CD-ROM can be found here: https://www.dropbox.com/s/ov5ksmtn 7afurqw/2019Greenbook.ISO?d1=0 And its MD5 hash value can be found here: 3. FORENSIC DETAILS https://www.dropbox.com/s/gu7wjpkvymhrlu0/2019Greenbook. ISO.md5?di=0 3.1 Describe the key words you used to search the ISO image and explain why you chose them. Detail your search result and give your conclusions. (Document You, an IT officer employed by Joachim’s Art Gallery, are assigned to examine the your procedure including commands and screenshots.) image for any information relating to the case. You should keep in mind malicious (9 in total) codes and other means which may potentially alter the evidence. YOU MUST CITE ALL REFERENCES INCLUDING TECHNICAL MANUALS AND LAW PARAGRAPHS. 4. LEGAL IMPLICATIONS 4.1 List one violation conducted by Mr. Price against Cybercrime Act 2001, and Your analysis should be conducted on a virtual machine (Virtual Box) and include the one violation conducted by Mr. Price against the Crimes Act 1958. Back up your following information: answers with definitions. (2) 1. PROCEEDURE 1.1 Use an evidence form to document the evidence given to you. 4.2 Is this case best pursued as a corporate or criminal investigation? Why? (1) (2) 1.2 Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory. (1) 1.3 Give at least two SHA-based hash function values of the ISO image. (1) 1.4 Explain why multiple hash values are necessary to verify the validity of the image file. (1) Explain the procedure that you used before you could access the image file inside the virtual machine. (1) 2Read more
When It comes to IT Project Management variables, “time, cost,
Question When It comes to IT Project Management variables, “time, cost, Scope” why is scope of the project important to analyze prior to starting a project? Can you please provide the reference you used so I can conduct further research?
Why is Python a great starter language? Historically, one of
Question Why is Python a great starter language? Historically, one of the first programming languages we learn has been some variant of BASIC. This is no longer the case. Why was BASIC good in the past? Why have we moved to Python? Feature-by-feature, how powerful is BASIC vs. Python? Which language of the two do you feel would be more valuable in your career?If there were another language you would choose as your first, what would it be? Why? Be sure to cite your research according to the guidelines found in the GCU Style Guide, located in the Student Success Center.
The Principle of Incident Response and Disaster RecoveryDaily business management entails taking
The Principle of Incident Response and Disaster RecoveryDaily business management entails taking several risks in decision-making, which may at times, pose serious threats to the business or turn out to be a blessing in disguise. Threats negatively affect business operations, thus creating the need for any operational manager to come up with a recovery plan in the event of disaster. One business principle that creates better grounds for recovery from a disaster is the incident response and disaster recovery principle.Incident response and disaster recovery plan comprises of relayed information to members of the staff on how to deal with a disaster after it has occurred. This principle majorly focuses on damage limitation to the business assets as prompt corrective measures are usually sought. Protection of business assets is paramount, and damage limitation becomes increasingly critical to the business mission and recovery success from the disaster (Mische
How was the Golden State Killer identified?
Question How was the Golden State Killer identified?
Basically, how do I go about debugging when I receive
Question Basically, how do I go about debugging when I receive “NoSuchElementException”? I know the first line that mentions my program will be the line that is having the issue. However, the line it has highlighted is inside a while loop that, at the time in running the program that the error pops up, should have already finished running, because the condition for the while loop is no longer met. The line reads “String word = input.next();” and it worked all the way up until the condition for the while loop was no longer met. I would assume the program would then exit the loop and move on down executing the following statements, but suddenly it says there is an issue with this line that to my understanding it should no longer be concerned with, and that up until this point it did not have a problem with.
Multiple Choice:1.Which question can best be answered by the processes
Question Multiple Choice:1.Which question can best be answered by the processes of science? A:which band plays the best music B:why different people like different types of music C:which type of music sounds the best D:how different people’s heart rates are affected by different types of music2.What should you right after you finish an investigation in the lab or the field? A: leave glassware piled up to be washed later B:dispose of all materials, even recyclable glass and plastic C:wash your hands with soap and water D:smell all the chemicals to make sure they are still fresh3.Earth’s crust is made mostly of A:silicate minerals B:iron C:water D:nickel4.Which of Earth’s systems is responsible for creating the Grand Canyon? A:hydrologic B:tectonic C:atmospheric D:all of the above
Case Scenario 1:Dr. Druggemup is widely regarded as little better
Question Case Scenario 1:Dr. Druggemup is widely regarded as little better than a drug pusher. He will prescribe anyone a prescription for anything at just about any time-provided the patient hands over the payment. Repeated denunciation to the State Board of Medical Examiners has done little good. Dr. Druggemup is a member of the board of directors of the hospital, and his group practice is a major supplier of patients to the hospital.Question 1: Based upon the reading for this lesson, is public denunciation (whistle-blowing) warranted in this case?Case Scenario 2: Top-Notch Hospital has decided to hire medical assistants and patient-care technicians on its labor and delivery unit to reduce salary expenditures.Question 2: Use the reading for this lesson to analyze the ethical aspects of market competition in this scenario.
You are tasked to improve IT system for the Hospital. The Hospital
You are tasked to improve IT system for the Hospital. The Hospital information system has been in use to furthering the Best Memorial Hospital Network’s efforts for a more effective, competitive and sustainability. The information system is the comprehensive, integrated information system designed to manage all the aspects of a Hospital’s operation, such as administrative, financial, and legal issues and the corresponding processing of services.
Word Questions:1.Give an example of a circumstance for which the
Question Word Questions:1.Give an example of a circumstance for which the use of a scientific model would be practical. State and describe the type of model you would choose to use for the circumstance you give2.Describe three ways you can practice conservation of resources when conducting investigations3.State and describe three examples of patterns in nature
Word Questions:1.Explain the characteristics that make a hypothesis valid and
Question Word Questions:1.Explain the characteristics that make a hypothesis valid and give an example of a valid hypothesis.2.State and describe three features that make Earth unique among the planets.
how the knowledge, skills, or theories of this emerging threats
Question how the knowledge, skills, or theories of this emerging threats and countermeasure have been applied, or could be applied, in a practical manner to the work environment
/>earth science 220 the physical world Attachment 1 Attachment 2
Question />earth science 220 the physical world Attachment 1 Attachment 2 Attachment 3 ATTACHMENT PREVIEW Download attachment IMG_0879.jpg ATTACHMENT PREVIEW Download attachment IMG_0880.jpg ATTACHMENT PREVIEW Download attachment IMG_0881.jpg Cerany and Canpig THOSE 3 POST LAB QUESTIONS metwomusty offfeats quubly and afa matt in creating met then the ambal wil tube hequit The fertilize test tube would have
If a 16-year-old girl addicted on alcohol, every weekend she
Question If a 16-year-old girl addicted on alcohol, every weekend she drunk with her friends. What recommendations should be provided to her? Depending on what evidence/theory support that which will be effective? Thank you
How to motivate a 16-year-old girl be more active in
Question How to motivate a 16-year-old girl be more active in sport and get rid of alcohol with her best friends? Any academic articles I should read for more details. Thanks
As a health practitioner, what will be the effective ways
Question As a health practitioner, what will be the effective ways to build rapport/trust with a16-year-old girl who had asthma but doesn’t use medication, and also drink a lot in every weekend with her friends. How to help her to follow medication instruction to improve her health conditions.
Chapter 10 discussed about avoiding false discoveries. It explained a
Question Chapter 10 discussed about avoiding false discoveries. It explained a null hypothesis as a general statememt that the desired interest is not true.The null hypothesis is assumed to be true until there is sufficient evidence to indicate otherwise. Thus, declaring the null hypothesis is the first step in the framework of significance testing.(1) Explain the following six types of significance testing by giving examples:- Test Statistic- Null distribution- Critical Region- Type I an Type II Errors- False Discovery rate (FDR)- Chi-Squared Test(2) List and explain the four challenges of statistical testing.
draw the diagram to show how to realize the function
Question draw the diagram to show how to realize the function f(a,b,c,d) = sum(2,4,6,14) using only one 74LS138 and one NAND gates ATTACHMENT PREVIEW Download attachment ass.jpg dee Decoder Example (2 . Draw the diagram to show how to realize the functions F(A,B,C.D) = _(2,4,6,14) using only one 74LS138 and one NAND gates.
The post use j-k flip-flop and d flip-flop to design an asynchronous appeared first on Smashing Essays.
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"
