GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

When Emory does research, she likes doing interviews of larg…

When Emory does research, she likes doing interviews of large populations because it allows her to perform numerical summaries of large amounts of data. Emory is conducting _______ research.                  

Read Details

Which lines will be printed when the following Python code i…

Which lines will be printed when the following Python code is executed? [Negative points for wrong answers] x = 20y = 10z = 30if x == 10: print(“Hi 10”) if y == 20: print(“Hi 20”) else: print(“Hi 30”)elif y == 20: print(“Hi 40”)else: print(“Hi 50”) if z == 30: print(“Hi 60”) else: print(“Hi 70”)  

Read Details

Why would you need foreign key:

Why would you need foreign key:

Read Details

Upload your solution as a .py file. Write a Python program (…

Upload your solution as a .py file. Write a Python program (no need to write any function) that creates a named tuple defined as follows:  The name of the variable holding the named tuple object is Employee, the name of the named tuple is also Employee The name of the fields inside the named tuple are (in order) the names in the column headers of the table below You will then create one object of that named tuple data type per row of the following table last_name first_name salary last_evaluation_rating Smith John 30000 5 Smith Jack 40000 3 Smith Jill 50000 5 You will then display the information about each of these objects on the screen.   Sample Program Execution (no user input):  Employee(last_name=’Smith’, first_name=’John’, salary=30000, last_evaluation_rating=5)Employee(last_name=’Smith’, first_name=’Jack’, salary=40000, last_evaluation_rating=3)Employee(last_name=’Smith’, first_name=’Jill’, salary=50000, last_evaluation_rating=5) Grading Rubric 1 point for defining the named tuple 1.5 points for creating the three named tuples objects 1.5 points for displaying the three named tuples as illustrated above

Read Details

Upload your solution as a .py file. Write a Python program (…

Upload your solution as a .py file. Write a Python program (no need to write any function) that will read a bunch (how many is not specified) of numbers each separated by a space from the previous one. Your program will assign these numbers to a list. The way to do so is illustrated in the following code sample that you will have to adapt to your needs: numbers = []numbers = input().split()print(f’Your input, as a list, is: {numbers}’) Now that you have a list containing each of the numbers that were entered by the user, we want to keep only one of each of the numbers. For example, if the user entered ’42 23 99 12 23 23 99 42′ we would want the list to only contain [’42’ , ’23’ , ’99’ , ’12’]. You will then display that new version of the list of numbers.  Finally, your program will display the sum of the largest and smallest integer values in your list of numbers. HINT – you must NOT sort the list to do this. You can simply use functions that we already studied when learning about lists. Sample program execution (user input is in red):Enter a bunch of numbers separated by spaces: 12 42 23 42 42 12 23 You typed: [’12’, ’42’, ’23’, ’42’, ’42’, ’12’, ’23’]Your input contains the numbers: [’12’, ’42’, ’23’]The sum of the largest and smallest values is: 54 Grading Rubric:  Reading the values into a list correctly and according to the above example (1 point) Keeping only one copy of each number in the list (1 point) Computing and displaying the sum correctly (1 point)

Read Details

100,000 bacteria live on every square centimeter of your ski…

100,000 bacteria live on every square centimeter of your skin.

Read Details

Which of the following is NOT true regarding mitochondria?

Which of the following is NOT true regarding mitochondria?

Read Details

HIV attacks T-helper cells. Explain how does that impact the…

HIV attacks T-helper cells. Explain how does that impact the immune system?

Read Details

There are three parts to this question: 1. Why is the trache…

There are three parts to this question: 1. Why is the trachea composed of cartilage instead of bone? 2. Why is the trachea composed of cartilage instead of muscle? 2. Why is it not a complete ring of cartilage?

Read Details

These questions are from the discretionary and mandatory acc…

These questions are from the discretionary and mandatory access control modules. All students in a class belong to a group G and are able to access class resources because G is granted the necessary permissions. Assume Alice has tested out of a topic and does not need to take the quiz Q on this topic. The professor does not want Alice to have access to Q but wants Alice to remain in group G so she can access other resources. Also, the professor wants to grant access to Q to all other students by granting the desired access to G. The mechanisms provided by various operating systems can be used to meet this access control requirement. Explain how this can be achieved most efficiently and correctly in Linux with extended access control lists (EACLs) and in Windows. First, provide the access control entries (ACEs) for Alice and G with their types and permissions for the quiz Q in each system. After this, discuss which of these ACEs will be checked if Alice tries to gain access to  the quiz Q. (2+2+2+2  pts.) The Bell and La Padula (BLP) and Biba models address confidentiality and integrity of data in a system that supports mandatory access control. A system allows read-down as is done by BLP, and writes by a user are only allowed at the user’s level (no writes to higher levels are allowed). Does this system satisfy the confidentiality and integrity goals of the BLP and Biba models? First, describe the BLP and Biba requirements and then explain if the requirements of each model are satisfied. (2+2+2+2 pts.) If both models are used simultaneously by a system and object O has the highest sensitivity level (e.g., top secret), what level of integrity should be assigned to O in the Biba model? Is there a drawback to using both of these models at the same time? Provide a brief explanation. (1+2 pts.) A certain company has many customers and some of them have conflict-of-interest (CoI) relationships. Also, employees can only access company data by executing applications approved by the company based on the functions they perform in the company. The people responsible for access provisioning in this company came up with the following scheme.  All files of a given customer must be stored in a single directory (it could be a container-like unit when using cloud storage). Initially, users are allowed to execute applications based on their needs and each application can access files needed by it. Access could be removed when applications execute. In particular,  when user U executes application A which accesses files from customer C’s directory, access to all files in directories of customers who have a CoI relationship with C is turned off for application A when it is executed by U.   Give two examples of policies discussed in the mandatory access control module of the course that could be used to control access to documents by this company. Explain your answer by discussing the specific data access requirements of the company that are satisfied by each policy. (2+2 pts.)  Does the suggested implementation correctly enforce each policy that you recommend for the company? Provide a brief justification for your answer. (2+4 pts.)

Read Details

Posts pagination

Newer posts 1 … 37,693 37,694 37,695 37,696 37,697 … 84,744 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top