Let L be the language of all strings over alphabet Σ = {a}, such that the length of each string is either divisble by 2 or by 3, but not divisible by 6. Prove that this language is regular.

Assignment

  1. Construct NFAs that recognize the specified languages

For this question use the automaton simulator shown in class, which is located at  https:automatonsimulator.com to create NFAs to recognize the following languages.

Use the save button to save the text representation of the NFAs.

(a) The language specified by where the alphabet is Σ = {x, y, z}.

(b) The language specified by (aaa|bbb|ccc)* where the alphabet is Σ ={a, b, c}.

(c) The language of all strings over Σ = {0, 1} where the sum of the digits isdivisible by4 or by 5.

  1. Let L be the language of all strings over alphabet Σ = {a}, such that the length of each string is either divisble by 2 or by 3, but not divisible by 6. Prove that this language is regular.
  1. Let L be the language of all strings over the alphabet Σ = {0, 1}, such that the number of 0s is less than 5 or greater than 10. Prove that this language is regular.

 

What did you learn that has helped your professional and academic skills? What was something you wish the class has dedicated more time to? Is there an aspect of your academics and/or professionalism that you are more confident about? Why or why not?

Your time in GPS

As this semester comes to an end it is a good time to reflect on the work you have done here. For this final discussion board, share your thoughts on the class. Refer below for the guidelines of the assignment:

1) In at least one paragraph (minimum 250 words), respond to your time in GPS. You may use the following questions to guide you: what did you learn that has helped your professional and academic skills? What was something you wish the class has dedicated more time to? Is there an aspect of your academics and/or professionalism that you are more confident about? Why or why not?

2) After you post your introduction, make sure to comment on at least 3 of your peers’ posts.

 

Evaluate two current issues, trends, or problems in cybercrime and cyberterrorism. Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups.

Intercepted digital communiqué

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives believed to be spies. They have recruited your company to assist with the decryption of these messages.

INSTRUCTIONS

Before you start on this mission, both national organizations want to verify your ability to identify the motivation and capabilities behind cyberterrorism and information warfare. In a 4–5 page report to both organizations, answer the following questions, providing specific details for each topic

  1. Explain the developmental perspective on the problem of and changes to cybervictimization.
  2. Evaluate two current issues, trends, or problems in cybercrime and cyberterrorism.
  3. Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups.
  4. Explain why interconnectivity is important in today’s connected environment.
  5. Evaluate the two biggest threats against the national interests of the United States, including critical infrastructure.
  6. Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

 

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Distinguish between different types of bad actors in cyberspace, including their resources, capabilities/techniques, motivations and aversion to risk.

 

Develop a Java program that tracks customers and order data. The company wants to determine the purchasing behavior of its customers.

Final Project

Project
Before attempting this project, be sure you have completed all of the reading assignments, nongraded  exercises, discussions, and assignments to date.

You have been tasked with developing a Java program that tracks customers and order data. The company wants to determine the purchasing behavior of its customers. All order data is based on the
total sales amounts (revenue) for each customer.

Write a Java program that displays a menu to allow the user the following functionality:
1. Add multiple new customers prompt user for the number of customers to be loaded and then prompts for each customer’s name, customer id (5 digit number), and total sales

2. Add single new customer prompts the user for customer data: customer name, customer id, and total sales

3. Display all customers displays each customer’s data to the console, one customer per line

4. Retrieve specific customer’s data prompts the user for the customer id and displays the corresponding customer’s data: customer id, customer name, and total sales

5. Retrieve customers with total sales based on the range prompts the user for the lowest and highest total sales and displays all customers with total sales in that range. Display each customer on a separate line with all information Customer Name, Customer ID, and Total Sales

6. Exit

Write a thread that identifies 2 aspects of an operating system. Compare and contrast these 2 aspects to the behavior, character, or workings of God.

Assignment Details CSIS443: Operating Systems (B01)

Description
Perhaps no better example in computing exists of mankind’s attempt to model the creativity of God than in the creation of operating systems. God, the Creator, made mankind in his own image. Within man resides an innate capacity to simulate the order and synchronicity of creation in the development of technology. From process scheduling to memory management to the protection and security of the entire computer system, there are countless aspects of operating systems that reflect the workings and wonders of our Heavenly Father.

In this Discussion, write a thread that identifies 2 aspects of an operating system. Compare and contrast these 2 aspects to the behavior, character, or workings of God.

Review the Discussion Assignment Instructions prior to posting. You may also click the three dots in the upper corner to Show Rubric.
Post-First: This course utilizes the Post-First feature in all Discussions. This means you will only be able to read and interact with your classmates’ threads after you have submitted your thread in response to the provided prompt.

Learn how to prevent injuries and illness while working in the hospital. Review guidelines for reporting injuries or safety concerns. Identify first aid centers and employees authorized to provide first aid.

Safe workplace for hospital employees

The workshops cover the following topics and practices to maintain a safe workplace for hospital employees:

  • Working safely: Learn how to prevent injuries and illness while working in the hospital.
  • Reporting procedures: Review guidelines for reporting injuries or safety concerns.
  • Providing first aid: Identify first aid centers and employees authorized to provide first aid.

Wearing protective equipment: Examine the legal standards for wearing personal protective equipment

 

Derive the formula to calculate the AMAT for this multilevel cache design. Using the information in the table and the derived formula, calculate the average memory access time for this memory hierarchy.

State all equations or formulas used and show all work done in the calculations.  Submit only your work and answers.

Question 1

A non-pipelined CPU with a clock frequency of 2 GHz has instruction latencies with relative frequencies of instructions as shown in the following table.

 

Instruction Type Instruction Latency Relative Frequency
Loads 5 30%
Stores 4 15%
Branches 3 10%
Jumps 2 5%
ALU/Logic 4 40%

 

  1. Calculate the average CPI.
  2. Calculate the average instruction execution time (IET).

A pipelined version of the CPU adds 0.1 ns overhead.

  1. Calculate the average instruction execution time of the pipelined CPU.
  2. Calculate the speedup obtained with the pipelined CPU.

Question 2

Consider the code sequence shown in the box on the right. Each instruction is numbered for reference (I1 – I7).  Assume execution on a 5-stage pipeline.

a.Make a list of the RAW (read after write) data hazards in the code sequence.Using the reference numbers, your list should state the two instructions associated with the hazard and the register on which the hazard exists.

  1. In your list of hazards, place an asterisk (*) in front of those that are resolved by data forwarding.
  2. Place a hash (#) mark in front of any hazards not resolved by data forwarding. If any exist, determine if the hazards can be resolved by reordering the code sequence and show the new sequence.

 

Question 3

The basic formula for calculating AMAT is

The time for a hit is equal to the hit rate * cache access (hit) time.  Recall the miss rate is 1 – hit rate.

For a 2-level cache, the AMAT formula is expanded to

 

The following table defines the profile for a multilevel cache hierarchy with main memory.

 

Memory Level Hit Time Hit Rate
L1 Cache 0.5 ns 80%
L2 Cache 1.8 ns 95%
L3 Cache 4.2 ns 98.5%
Main Memory 70 ns 100%

Misses in all three levels of cache will eventually hit in the main memory.

  1. Derive the formula to calculate the AMAT for this multilevel cache design.
  2. Using the information in the table and the derived formula, calculate the average memory access time for this memory hierarchy.

 

Question 4

 Using the code sequence in Question 2, create a pipeline diagram that shows the execution of the instructions by cycle.  Example:

Be sure to indicate any stalls due to unresolved hazards if any exist.

How many cycles are required for the code to execute in the pipeline?

 

Discuss, in your own words, which layer of the seven layers of the OSI model is the most important, and explain why. Support your position by conducting research on the Internet.

Important OSI model

As a reinforcement to Module 1’s lesson regarding the OSI model:

Discuss, in your own words, which layer of the seven layers of the OSI model is the most important, and explain why. Support your position by conducting research on the Internet. Share your research by summarizing your findings, and provide links to at least two of your sources (100 word minimum). You may type the answer in the space provided, but DO NOT attach a document with your posting.

What makes neural networks good for modeling PUFs? Why is it important to split the data into separate training, validation and testing sets?

Modeling PUFs

What makes neural networks good for modeling PUFs?

Why is it important to split the data into separate training, validation and testing sets?

What features/data are used by the neural network to model the PUF?

 

Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes. Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.

Question One

Your first task is to select a case study (from real-world or using internet). It can be related to enterprise systems or related to an organization/store or on any relevant topic.

After selecting the case study describe it in your own words using following points.

Clear headline: It should give the most important information.

Snapshot: Provide the main points, including the client’s name/industry, the product/service used, and quick result stats.

Client introduction: One or two sentences describing the customer and a highlight about them.

Problem: State the problem/goal, consequences, and any hesitations the customer had. Include quotes.

Solution: Share how they found you, why they chose you, what solution they chose, and how it was implemented. Include quotes.

Results: Describe the results and the benefits, as well as any bonus benefits that came of it. Include quotes.

Conclusion: Share additional praise from the customer and words of advice they have for other people/businesses like them.