Computer Science

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable. Write a paper describing the project in terms of its scope, time, and cost goals. Also, describe other impacts on a project, such as quality, resources, and risks. Discuss what went right and wrong on the project and the role of the project manager and sponsor. Also describe whether the project was a success, and why. Include at least one reference and cite it on the last page.

EXPERT ANSWER Project: Let’s consider the Beijing Capital Airport Terminal Area Expansion Project as an example. The main objective of the project is to increase the capability of the airport both by increasing the number of Runway terminals and by increasing the number of the planes in the airport and to increase the volume of …

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable. Write a paper describing the project in terms of its scope, time, and cost goals. Also, describe other impacts on a project, such as quality, resources, and risks. Discuss what went right and wrong on the project and the role of the project manager and sponsor. Also describe whether the project was a success, and why. Include at least one reference and cite it on the last page. Read More »

Assignment 1 Given the attached knowledge base “Below” containing students’ grades in some courses and courses’ prerequisites, you are required to write a Prolog program that solves the tasks explained below % student(stud01, ‘Programming 1’, 90). student(stud01, ‘Math 1’, 78). student(stud01, ‘Statistics 1’, 94). student(stud01, ‘Electronics 1’, 81). student(stud01, ‘Management’, 66). student(stud01, ‘English’, 83). student(stud02, ‘OS 1’, 65). student(stud02, ‘Math 1’, 50). student(stud02, ‘Data Communication’, 76). student(stud03, ‘OOP’, 68). student(stud03, ‘Math 1’, 63). student(stud03, ‘Statistics 1’, 98). student(stud03, ‘Electronics 2’, 72). student(stud04, ‘Database’, 59). student(stud04, ‘Math 3’, 67). student(stud04, ‘Data Structures’, 79). student(stud05, ‘Programming 1’, 88). student(stud05, ‘Math 1’, 75). student(stud05, ‘Statistics 1’, 96). student(stud05, ‘Electronics 1’, 89). student(stud05, ‘Management’, 84). student(stud06, ‘Robotics’, 62). student(stud07, ‘Programming 1’, 50). student(stud07, ‘Math 2’, 8). student(stud07, ‘Statistics 2’, 70). student(stud07, ‘Electronics 1’, 47). student(stud08, ‘OS 1’, 71). student(stud09, ‘Robotics’, 29). student(stud09, ‘Database’, 57). student(stud10, ‘Data Structures’, 82). student(stud10, ‘Math 2’, 64). student(stud10, ‘Data Communication’, 85). student(stud10, ‘Database’, 46). student(stud10, ‘Electronics 2’, 58). student(stud10, ‘Statistics 2’, 97). % prerequisite(‘Programming 1’, ‘OOP’). prerequisite(‘OOP’, ‘OS 1’). prerequisite(‘OS 1’, ‘OS 2’). prerequisite(‘OOP’, ‘Data Structures’). prerequisite(‘Data Structures’, ‘Algorithms’). prerequisite(‘Algorithms’, ‘Advanced Algorithms’). prerequisite(‘Math 1’, ‘Math 2’). prerequisite(‘Math 2’, ‘Math 3’). prerequisite(‘Math 3’, ‘Math 4’). prerequisite(‘Statistics 1’, ‘Statistics 2’). prerequisite(‘Electronics 1’, ‘Electronics 2’). prerequisite(‘Electronics 2’, ‘Computer Architecture’). prerequisite(‘Computer Architecture’, ‘Microprocessors’). prerequisite(‘Data Communication’, ‘Networks’). prerequisite(‘Database’, ‘Data Warehouses’)

EXPERT ANSWER so the program in prolog is:- and output is:-

3 Two dimensional parity and CRC are two well-known techniques for error handling. There are few differences in the capability/strength of the each of the technique.- Explain with detail example.

EXPERT ANSWER Step 1 3. Two dimensional parity:- For each row, parity check bits are calculated, which is identical to a basic parity check bit. For each column, parity check bits are computed and delivered together with the data. These are compared with the parity bits calculated on the received data at the receiving end. …

3 Two dimensional parity and CRC are two well-known techniques for error handling. There are few differences in the capability/strength of the each of the technique.- Explain with detail example. Read More »

Question 1 Let A = {1, {2, 3), 4), define each of the following statements either true or false. (a) 3 EA (b) {1, 4) CA (c) (2, 3) CA (d) {2,3}E A (e) {4} EA (1) {1, 2, 3} CA Question 2 Given B = {1, 2, 5, 8, 11}, determine whether each of the following statements true or false. (a) {5, 1} CB (b) {8, 1} EB (c) {1, 8, 2, 11,5} & B (d) OCB (e) {1, 6c B (1) {2} CB (g) {3} EB (h) BC{11, 2, 5, 1, 8,4} Question 3 If X = {1, 3, 6, 7, 9), determine the values of: (a) X (b) Proper subset for X (c) P(X) (d) P(X)

EXPERT ANSWER

Express in predicate logic No triangle is a square triangle) square Alternative representation triangle(x) squaret For your convenience, the following list of symbols is provided if you need to copy from it:

EXPERT ANSWER In order to solve this problem, one should need to know about symbols and quantifiers that used to solve predicate logic problems. The following is the list of symbols and quantifiers that used to solve problems related to predicate logic: Note: If one is using there exist quantifier (), then a conjunction symbol …

Express in predicate logic No triangle is a square triangle) square Alternative representation triangle(x) squaret For your convenience, the following list of symbols is provided if you need to copy from it: Read More »

You are given a list of n jobs. Each job is executed in two steps: a preprocessing step followed by a production step. All the preprocessing is done sequentially on the same computer whereas the production steps of each job is done independently on a separate computer. Job i is represented by a pair (pi,fi) denoting the duration of the preprocessing and production steps, respectively. Devise a greedy algorithm to schedule the jobs on the common computer such that the completion time is minimum.

Example: Consider the jobs { (2,13),(4,2),(5,3)} and suppose we schedule them as they come: The first job finishes preprocessing at 2s, runs on a separate computer for 13 s and finishes at time=15s The second job finishes preprocessing at (2+4)s, runs on a separate computer for 2s and finishes at time=8s The third job finishes …

You are given a list of n jobs. Each job is executed in two steps: a preprocessing step followed by a production step. All the preprocessing is done sequentially on the same computer whereas the production steps of each job is done independently on a separate computer. Job i is represented by a pair (pi,fi) denoting the duration of the preprocessing and production steps, respectively. Devise a greedy algorithm to schedule the jobs on the common computer such that the completion time is minimum. Read More »

You are required to access any 5 HTTP objects (among them at least one should be an html, image, video and pdf objects). You are required to capture the HTTP request messages and their corresponding HTTP response messages through Wireshark or any other sniffing tool. With reference to corresponding HTTP RFCs, explain each header line of both the HTTP request and response messages.

EXPERT ANSWER Step 1 Following are the 5 HTTP objects request messages captured and their response through Wireshark. HTML (Request Message) GET / HTTP/1.1Host: www.mywebsite.toUser-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050414 Firefox/1.0.3Accept: text/xml,application/xml,application/xhtml+xml,text/htmlAccept-Language: en-us,en;q=0.5Accept-Encoding: gzip,deflateAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Keep-Alive: 300Connection: keep-aliveIf-Modified-Since: Sun, 20 March 2022 21:01:30 GMTIf-None-Match: “26f731-8287-427fcfaa” HTML (Response Message) HTTP/1.1 200 OKDate: Sun, …

You are required to access any 5 HTTP objects (among them at least one should be an html, image, video and pdf objects). You are required to capture the HTTP request messages and their corresponding HTTP response messages through Wireshark or any other sniffing tool. With reference to corresponding HTTP RFCs, explain each header line of both the HTTP request and response messages. Read More »