Saturday, July 13, 2013

Veterinary Computer Software


Research 3 different brands of veterinary management software. Compare and contrast these brands that includes the following: Names of each brand and brief description of each; information about the companies who make the software; pros and cons of each software package;how are technical support issues handled; is installation of the server and other hardware provided;is system able to import lab results directly from lab into the medical record; include office functions, like reminders, accounting, billing, inventory control; are updates to software automatic CLICK HERE TO ORDER THIS ESSAY!!!!

Programing 1


explain and extend a python program that manipulates some data involving flight schedule system to and from various locations in Australia.This is an extension of assignment one. The main focus of your extension is to provide a facility to sort the flights and save the sorted list of flights into a new file.
You are provided with 3 files:
• this document
• a data file, “flights.txt”
• a Python file, “flightsystem-sorting.py”
1) Answer specific questions throughout the assignment in a separate Word document. Marks are awarded according to how well your answers reflect an understanding of the concepts involved.
2) Make and document changes to the python code as required. Save your changes. Comment the code.
The data file,“flights.txt”, consists of a number of lines (records) each of which have seven values (fields) separated by spaces:
• A Flight code (e.g. QF345, VB123)
• A code number (1-7) representing the weekday for departure of the flight 1=Sunday, 2=Monday…
• The Departure city (e.g. MEL, SYD, BNE, ADE, PER, TSV)
• The Destination city (e.g. MEL, SYD, BNE, ADE, PER, TSV)
• The Departure Time in 24hr format (e.g. 0800, 1230, 2115)
• A number representing the departure gate (expected to be between 1 and 15)
• The ticket price for the flight
ITECH1000 students should respond to sections A, B, and C.
ITECH5000 students should respond to sections A, B, C and D.
answer the following questions relating to the .
1) If someone were to sabotage your flight system code and change the constant DATA_FILE to equal test.txt, what impact would this have on the system? Explain why and in what circumstances the system would be unreliable/incorrect.CLICK HERE TO ORDER THIS ESSAY!!!!
2) Explain in detail what the following code does in addflight function:
outfile = open(DATA_file, ‘a”)
3) What is the purpose of the isGT(flightslist, skey, posn1, posn2) function?
4) Examine the convertNumbers(inf), how could you make the code more readable?
5) Explain the use of result in isGT.
6) Examine writeout function definition, explain what arguments does it take? What does the following line do:
str(keyposn + 1)
7) Explain the line ‘sortkeyval = eval(sortkey) -1′ that occurs in the elif choice ==13 block.
8) Examine bubblesort function. Explain in words how it works. Why do we use two for loops?
9) Have a look at the function convertNumbers, particularly the line:
convertedFlightlist.append([element[0], element[1], element[2], element[3], element[4], eval[element[5], eval(element[6])])
What would this line do? Why eval function is used for element[5] and element[6]? What happens if the eval function is not used? Will the program still work?
Section B
Make the following modifications to the existing programming in addition to written answers. Document each change with a comment in your code. The content of this section is supported by your lab work.
1) Before making any modifications, test the working of the existing file by choosing option 1 followed by option 20. If there is any problem, consult your lecturer or lab tutor.
2) Write the code for function isGT(). You have the flights in a list of lists, so first, extract each of the 2 flight details lists into 2 lists list1 and list2. Then you need to compare the values in each of these lists at the key position. Save the Boolean result of the comparison in result and return result as the return value for this function.CLICK HERE TO ORDER THIS ESSAY!!!!
3) Complete the code for function swap(sList, posn1, posn2) This function takes the list sList and swaps the items at posn1 and posn2.Explain how it is used in bubblesort function.
4) Examine the mysort() function. Explain what it is doing. Which inbuilt python function is used to sort?Explain the arguments that are given to sorted. Explain in detail the algorithm for mysort().
5) The function bubbleSort() is incomplete. All the code is there, but comments to explain the code are missing. Insert the comments in the python code to appropriately explain how it works.
Section C
You are to completely write a new sort function, using the algorithm: insertionSort. Before you write the code, you should design your logic, write your algorithms, and document your design.
In this section, you are required to document, for all functions to be written:
• all parameters, describing each data type and what each represents;
• all outputs according to the return statements; if there is no data returned then what effect has been achieved by the processing within the function;
• pseudocode representing the processing required within the function.
1) Examine the code of function insertionSort that is provided in comments BGT58
def insertionSort (tList):
sList = list (tList)
for index1 in range(1,len(sList)):
index2 = index1 # first element of unsorted part
currNum = sList[index1] # value at this position
while (currNum < sList[index2 - 1] and index2 != 0):
index2 = index2 – 1
sList.insert (index2, sList.pop(index1)) #insert at the correct spot
return sList
The function insertionSort for theflights can be modelled on this and aspects of mysort() and bubbleSort(). Use the functions convertNumbers(), isGT(), swap() and writeout() in your code.
2. Write the algorithm pseudocode, describe your inputs (parameters) and outputs for insertionSort of the flights schedule list
3. Write your code to implement insertionSort, making sure you modify the above provided code to work for your flights lists to get the value at a given key position.
4. Explain what the following code does in the function insertionSort:
sortedList.insert (index2, sortedList.pop(index1))
5. Test by adding another two flights and then displaying the updated file with option 1 then sorting with option 13. Explain how you chose the flight details and the results of your tests.

Unrestricted free speech on the Internet

Be for or against unrestricted free speech on the Internet. You should give your own opinions, and there are no right or wrong answers. Essay based on free speech on the Internet: CLICK HERE TO ORDER THIS ESSAY!!!!

Develop a pair of Web Services, complete with matching WSDLs and client software, which implement the functions of a Local Time Converter (LTC) service


You are to develop a pair of Web Services, complete with matching WSDLs and client software, which
implement the functions of a Local Time Converter (LTC) service. A Local Time Converter service
allows users to provide the Local Time (e.g. 13:30) at one location (e.g. SYDNEY) and be provided the time at another (e.g. AMSTERDAM – in which case the time would be 05:30). It is usual for such
services to keep information relating the difference (e.g. SYDNEY is +10, AMSTERDAM is +2) at
each time location relative to the time at Greenwich (which is called Greenwich Mean Time or GMT
(or UTC)).CLICK HERE TO ORDER THIS ESSAY!!!!
The first Web Service (called MyLTCServer) presents an API for the service’s users. This API
allows the following unauthenticated functions:
??Retrieve the time offset (relative to GMT) for a specific location
(double currentOffset(String location))
Returns a double representing the time offset relative to GMT for the provided location.
??Retrieve a list of currently supported locations (String listLocations())
Returns a String containing each of the currently supported locations, separated by “\n”.
??Convert a time in one location to the time in another
(String convert(String from, String to, String time))
Returns a String representing what time it is in the location to when it is time in the
location from. The String representing time, and the return String, will be in the format
HH:MM (with leading zero on the HH if necessary).
The second Web Service (called MyLTCAdmin) presents an API for the service administrator. This API allows the following authenticated functions:
??Add a new location to the system with its current time offset relative to GMT
(boolean addLocation(String user, String pwd,
String location, double offset))
Returns false if the location already existed or the user credentials are invalid, true if the
new location has been added.
??Update the time offset for a specific location (for example when Daylight Saving Time
commences or ceases for the location)
(boolean setOffset(String user, String pwd,
String location, double offset))
Returns false if the location does not exist or the user credentials are invalid, true if the
location exists and has been updated.
??Retrieve the number of client web service calls performed on either interface since the server
started
(int callCount(String user, String pwd))
Returns -1 if the user credentials are invalid, otherwise returns the total number of calls
(including this one) on either of the server interfaces.
Note that, as reflected above, the administrator web service requires a username (user) and password (pwd) to be passed with each web service call. The server should validate this username and password before performing any requests. You should hard-code an administrator username of ‘admin’ and a matching password of ‘converter’.
To match these two web services, you will generate matching WSDL files and implement two sample
command-line based clients – one for the standard user (MyUserClient) and one for the
administrator (MyUserAdmin).
The command-line clients will allow each of the above-listed functions to be performed, passing in the
required parameters from the command line. For example, you may implement the “Retrieve the
current time offset for a specific location” function call by executing the command:
java MyUserClient currentOffset SYDNEY
The server’s starting set of time offsets may be hard-coded as follows:
Offset relative to Greenwich = +10 (SYDNEY)
= +2 (AMSTERDAM)
= -7 (LOS ANGELES)
= +8 (BEIJING)
The server stores the list of supported locations, their corresponding time offsets relative to GMT, and
the number of user web service calls performed in memory. It does not need to render them persistent
by storing them to disk. CLICK HERE TO ORDER THIS ESSAY!!!!

Technology Acceptance factors of Cloud Computing


Technology Acceptance factors of Cloud Computing
Assignment’s Questions:
1.What are the factors that affect the use of technology in teaching/learning environments?
2.Investigate existing models used in evaluating technology use. Focus on how they produce them, what methodologies are used to test them and prove the effectiveness of the models and the limitations of every model.
3.Can the existing models be used in today’s context? In online/blended teaching/learning environments? If not, what changes/factors need to be considered for using previous models in the current context? How can you verify the reliability of your suggestions?
——————————————————
1) Write one paragraph for every factor. If there are any similarities among the factors, mention them. The factors are:
From Technology Acceptance Model 1 (TAM1), two factors:
o Perceived Usefulness.
o Perceived Ease of use.

Explore this and other web sites and answer the following ten questions on Mars – http://mars.jpl.nasa.gov/

Answer the following ten questions.
1. Are geologic processes, as we know them on Earth, occurring on Mars at the present time? Review the most recent Mars images from the orbiting cameras. and find three examples that support your answer.
2. Explore the “Spirit and Opportunity” mission which is still under way on Mars. Briefly describe the purpose of the mission and three things learned about the planets surface.
3. Explore the most recent mission to Mars. Briefly describe the purpose of the mission the equipment used and the success of the mission. What does the sucess of the mission mean in terms of maned exploration to Mars.
4. Explore the MOLA or any other shaded relief map of Mars. Locate and identify the highest mountain. Determine the height of this mountain and its origin. Why do you think the mountain was able to reach this remarkable height.
5. Review the web site and find and interesting image of the planet’s surface and describe the area of the image in detail.
6. Review the recent images on the finding of water on Mars. Describe the location on Mars and the evidence used by scientists to determine that water was present.
7. Describe the polar Martian terrain based the orbiting camera image of your selection (Note these images are relatively new to all) . Include what you believe are the geologic or atmospheric processes involved your terrain’s formation.
8. Search the web site and discover how scientists determine that a meteorite found on Earth is from Mars?
9. Find on the web, a virtual tour of the Valles Marineris. Describe your tour and the topography seen and as well the geologic events that possibly created this amazing feature.
10. Review the information presented concerning manned space missions to Mars. Based on your review do believe that this mission will occur. Discuss your reasons for CLICK HERE TO ORDER THIS ESSAY!!!!

Emerging Technologies


You are a junior staff member assigned to the chief information security officer’s (CISO) team in a major medical center. The medical center’s senior leadership recently reviewed plans for changes to the center’s facilities and found that risks associated with the adoption of several new or emerging technologies had not been addressed. To address this planning gap, the hospital’s chief operating officer (COO) has given the CISO two weeks to provide a quick-look evaluation of the risks associated with two of the planned expansion areas that may pose technology problems:
moving one or more clinical IT support functions (including both fixed and mobile devices for end users) into a grid and/or cloud computing environment
including intelligent building capabilities (sensors, tracking devices, and the associated IT systems) in a new medical office building housing doctor’s offices, clinics, and outpatient services (e.g., labs for blood tests, physical therapy facilities)
For this assignment, research and write a short case study (three pages) using one or more articles from the CISO’s emerging technologies reading list. In your case study, you must discuss one of the listed technology problems (a or b above) and include a discussion of the potential risks associated with the technologies discussed in your chosen article. Your case study must also answer the question, how can these technologies be secured? You have one week to complete your paper.
Remember to cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.CLICK HERE TO ORDER THIS ESSAY!!!!
CISO’s Emerging Technologies Reading List*
Hlousek, M. (2008). Problem frames for intelligent building services: A suitability study. Proceedings of the 3rd International Workshop on Applications and Advances of Problem Frames 2008 (IWAAPF 08), 40–43. doi: 10.1145/1370811.1370819
Jackson, B. A., & Frelinger, D. R. (2009). Emerging threats and security planning: How should we decide what hypothetical threats to worry about? Retrieved from http://www.rand.org/pubs/occasional_papers/2009/RAND_OP256.pdf
Klingbeil, L., & Wark, T. (2008). A wireless sensor network for real-time indoor localisation and motion monitoring. Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, 39–50. doi: 10.1109/IPSN.2008.15
Michael, K., McNamee, A., & Michael, M. G. (2006). The emerging ethics of humancentric GPS tracking and monitoring. Proceedings of the International Conference on Mobile Business (ICMB’06), 1–10. doi: 10.1109/ICMB.2006.43
Moran, S., & Nakata, K. (2010). Ubiquitous monitoring in the office: Salient perceptions of data collection devices. Proceedings of the IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 494–499. doi: 10.1109/SocialCom.2010.78
Stell, A., Sinnott, R., & Jiang, J. (2009). A clinical grid infrastructure supporting adverse hypotensive event prediction. Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 508–513. doi: 10.1109/CCGRID.2009.43
Varandas, L. C., Vaidya, B., & Rodrigues, J. J. (2010). mTracker: A mobile tracking application for pervasive environment. Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 962–967. doi: 10.1109/WAINA.2010.164
Yusof, A. M., Rusli, M. E., & Yusof, Y. (2006). Kids finder through Bluetooth technology. Proceedings of the 2006 International Conference on Digital Telecommunications (ICDT ’06), 1–6. doi: 10.1109/ICDT.2006.46
* Unless otherwise noted, the articles in the CISO’s Reading List are available from the IEEE Computer Society Digital Library via UMUC’s online library.