Requirements:
For this assignment, you are tasked to develop a game called Guess the Word, which allows two players to participate in turn. The game should contain the following key elements of play:
1. The game should start by prompting Player 1 to enter a word of their choice via the Python console screen for Player 2 to guess (assume that Player 2 looks away and does not see).
2. The Python console should then be cleared so as to hide the word from Player 2.
3. Player 2 must now guess the word by typing one letter into the Python console following a suitable prompt.
4. For each guess, the game needs to determine if the guessed letter is present in the word that has been set by Player 1. If the guess is incorrect, one element of an ambulance should be drawn onto the game/Turtle screen (see video for example of how elements may be drawn and further detail below).
5.
I need help doing two of my data structures assignments. Attached are the assignment, textbook, source codes, and mock assignment. The textbook is included is the 2nd edition while the course uses the 4th edition so chapter and question numbers will be different. Assignment should be done in java.
In this assignment, you will practice using recursion, as well as file operations. Submit a single ZIP file called assignment6.zip containing your IntelliJ project. This assignment has 50 marks see the marking scheme posted on cuLearn for details.
Assume that we have an assembly line that can take a picture of a machine part which moves along a conveyor belt. The picture (or image) is represented as a 2D grid of pixels which are either black or white. The pixels can be accessed by specifying the row and column of the pixel where rows and columns are specified by an integer value. The machine examines the images and attempts to determine whether or not the parts are broken. A broken part will appear as a set of black pixels which are not all connected together (i.e., there is a separation between one or more sets of black pixel groups. Here are some examples of four possible images. Note that (c) and (d) represent images of broken parts. The red border represents the perimeter of a
Modelling a management system for a depo
The model needs to have classes for:
Drivers (Driver extension for managers)
Vehicles (Vehicle extension for Tankers and Trucks)
Work Schedule (to be assigned) to the drivers and vehicles.
The system must:
Enable the reading, and writing of existing and new drivers
Enable the reading and writing of existing and new work
Enable managers to assign work to drivers and trucks
Enable drivers to see their assigned work
Have a log in system for drivers to see work, and managers to see and assign work.
There must be examples of Object Orientated code, so classes for most things, use of linked lists containing objects and etc
Note:
I have included a PDF of the options. He gave us 4 options for the assignments which are all Linux/Unix based and then we have to write a paper regarding the assignment and create a presentation. I am looking for help with only the first two aspects, creating the project and writing the paper. The professor is giving us 4 options for a final project, only 1 is required so whichever you feel you are more comfortable doing and since this is basically Linux 101 I would imagine it wouldn't take all that long time do as well. I can write the majority of the paper as well if I can get some notes, I am a bit behind in this class due to Covid issues and my grandmother passing so as long as I get some notes surrounding the process of setting up the project I can write the paper. However, if you want to write the paper I am willing to pay for that portion as well just let me know price.
Task 1 1000 to 1400 words
You are required to write a report for T1 Electros Chief Information Officer, the report should contain the following sections:
Explain in your own words what a VPN is and in general terms how they work.
Research the various VPN technologies that could be used to secure a site-to-site connection. Compare and contrast these VPN technologies looking at speed, ease of configuration and security. Hint: PPTP, L2TP and IPSec are the main types to focus on.
VPNs make use of symmetric and asymmetric encryption for critical phases of their operation. Explain using clear, concise and technically accurate descriptions the difference between symmetric and asymmetric encryption. Explain which phase of the VPN establishment uses symmetric encryption and which phase use asymmetric encryption and crucially why VPNs operate this way. Ensure that you provide an example of each form of encr
Requirements:
You will need to study the network diagram on the previous page in order to understand and interpret the physical topology. This physical topology has not been created by you, so you will need to ask questions in order to fully understand what is required from you. A list of meaningful questions will need to be written and submitted with the written part of the assignment. The questions will be answered in a 15-minutes one-to-one meeting with the client representative (your tutor).
You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of PPP, eBGP and the remote access VPN. This last task is quite a challenging configuration that makes use of AAA, encryption and hashing technologies and will require good research skills
C coding project that needs a rework. Works up to part 3 but i included parts 1,2,3 for context. There are bugs that need to be fixed for part 3 and comments on how the code works need to be added. PLEASE ONLY QUOTE FOR coding part 4! Communicate further if you want to do it.
To compile in terminal, go into directory and hit 'make'/make clean to run/clean makefile.
only this function is given in solution file
def pq(data, P, init_centroids, max_iter):
pass
please read the attached doc file for exact question and instructions!
doc file is the question
(lx_pq is a slide to help)
A barrier is a thread-synchronization mechanism that forces the threads to wait until all have reached a certain point (the barrier). Once all threads have reached this point, they may all continue. An interface for a barrier appears as follows:
public interface Barrier{
/**Each thread calls this method when it reaches the barrier. All threads are released to continue processing when the last thread calls this method.*/
public void waitForOthers();
/** Release all threads from waiting for the barrier. Any future calls to waitForOthers() will not wait until the Barrier is set again with a call to the constructor.*/
public void freeAll(); }
The following code segment of the Factory class establishes a barrier and creates 10 Worker threads that will synchronize according to the barrier:
final int THREADCOUNT = 10;
Barrier barrier = new BarrierImpl(THREAD COUNT); for (int i = 0; i < THREAD COUNT; i++)
(new Worker(barrier)).start();
Note that the barrier mus