Simple Excel Homework

EX16_XL_VOL1_GRADER_CAP_AS – Travel Vacations 1.3

 

Project Description: You are considering several cities for a vacation. In particular, you are interested in Washington DC, Philadelphia, and Boston. You will format a list of memorials in DC, add Sparklines to compare the number of visitors over a 15-year period, and create a bar chart to illustrate annual visitors at each memorial. In addition, you will create a table of sightseeing locations, sort and filter the data, apply conditional formatting, and add a total row to display average time needed to spend at each memorial. Finally, you will complete a worksheet by adding formulas to compare estimated major expenses for each city.

 

Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Download and open the file named exploring_ecap_grader_a1.xlsx. 0.000 2 On the DC worksheet, select the range A4:G4, wrap the text, apply Center alignment, and apply Blue, Accent 5, Lighter 60% fill color. 6.000 3 On the DC worksheet, merge and center the title in the range A1:G1. Apply Accent5 cell style and bold to the title. 6.000 4 On the DC worksheet, change the width of column A to 34. 3.000 5 On the DC worksheet, select the range C5:F10 and insert Line Sparklines in the range G5:G10. 4.000 6 On the DC worksheet, select the range G5:G10, display the high point sparkline marker, and change the color of the high point markers to Dark Blue. 4.000 7 On the DC worksheet, select the range G5:G10, apply Same for All Sparklines for both the vertical axis minimum and maximum values. 2.000 8 On the DC worksheet, select the ranges A4:A10 and C4:F10 and create a clustered bar chart. Apply the Monochromatic color that is a blue gradient, light to dark. Apply the gradient fill to the plot area. Do not change the default gradient options. 5.000 9 Position the top-left corner of the chart in cell A13. Change the chart height to 6 inches and the chart width to 7 inches. 6.000 10 Change the chart title to Annual Visitors. Apply Blue, Accent 5, Darker 25% font color to the chart title and category axis labels. Change the value axis display units to Millions. 5.000 11 Apply data labels to the 2015 data series. Apply Number format with 1 decimal place to the data labels. 4.000 12 Click the Places sheet tab, convert the data to a table, and apply Table Style Medium 6. 5.000 13 On the Places worksheet, sort the data by City in alphabetical order and then within City, sort by Sightseeing Locations in alphabetical order. 4.000 14 On the Places worksheet, add a total row to display the average of the Time Needed column. Apply Number format with zero decimal places to the total. 4.000 15 On the Places worksheet, select the values in the Time Needed column and apply conditional formatting to highlight cells containing values greater than 60 with Green Fill with Dark Green Text. 4.000 16 On the Places worksheet, apply a filter to display only fees that are less than or equal to $10. 4.000 17 On the Cities worksheet, click cell F4 and enter a formula that will subtract the Departure Date (B1) from the Return Date (B2) and then multiply the result by the Rental Car per Day value (F3). 5.000 18 On the Cities worksheet, click cell E13. Depending on the city, you will either take a shuttle to/from the airport or rent a car. Insert an IF function that compares to see if Yes or No is located in the Rental Car? Column for a city. If the city contains No, display the value in cell F2. If the city contains Yes, display the value in the Rental Car Total (F4). Copy the function from cell E13 and use the Paste Formulas option to copy the function to the range E14:E18 without removing the border in cell E18. 7.000 19 On the Cities worksheet, click cell F13. The lodging is based on a multiplier by City Type. Some cities are more expensive than others. Insert a VLOOKUP function that looks up the City Type (B13), compares it to the City/COL range (A7:B10), and returns the COL percentage. Then multiply the result of the lookup function by the Total Base Lodging (B5) to get the estimated lodging for the first city. Copy the function from cell F13 and use the Paste Formulas option to copy the function to the range F14:F18 without removing the border in cell F18. 7.000 20 On the Cities worksheet, click cell H13 and enter the function that calculates the total costs for the first city. Copy the function in cell H13 and use the Paste Formulas option to copy the function to the range H14:H18 without removing the border in cell H18. 3.000 21 On the Cities worksheet, select the range E14:H18 and apply Comma Style with zero decimal places. Select the range E13:H13 and apply Accounting Number format with zero decimal places. 3.000 22 On the Cities worksheet, in cell I2, enter a function that will calculate the average total cost per city. In cell I3, enter a function that will identify the lowest total cost. In cell I4 enter a function that will return the highest total cost. 6.000 23 On the Cities worksheet, select Landscape orientation, set a 1-inch top margin, and center the worksheet data horizontally on the page. 3.000 24 Ensure that the worksheets are correctly named and placed in the following order in the workbook: DC, Places, Cities. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed. 0.000 Total Points 100.000

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Word SAM Capstone Project 1

Shelly Cashman Word 2016 | Modules 1–3: SAM Capstone Project 1a

C:\Users\akellerbee\Documents\SAM Development\Design\Pictures\g11731.png Shelly Cashman Word 2016 | Modules 1–3: SAM Capstone Project 1a

Used Book Sale

completing a flyer

 

GETTING STARTED

Open the file SC_WD16_CS1-3a_FirstLastName_1.docx, available for download from the SAM website.

Save the file as SC_WD16_CS1-3a_FirstLastName_2.docx by changing the “1” to a “2”.

· If you do not see the .docx file extension in the Save As dialog box, do not type it. The program will add the file extension for you automatically.

To complete this Project, you will also need to download and save the following support files from the SAM website:

· Support_SC_WD16_CS1-3a_Book_Tree.png

· Support_SC_WD16_CS1-3a_Bookshelves.png

With the file SC_WD16_CS1-3a_FirstLastName_2.docx still open, ensure that your first and last name is displayed in the footer.

· If the footer does not display your name, delete the file and download a new copy from the SAM website.

 

PROJECT STEPS

As the publicity manager for your local library’s used book sale, you need to format a one-page flyer announcing the event. Start by changing the document margins to Normal.

To make the text easier to read, modify the Normal style by changing the font size to 12 pt.

In the first paragraph, type the word Used so that the heading reads “Giant Used Book Sale!”

Format the heading “Giant Used Book Sale!” as follows:

a. Center the heading.

b. Increase the font size to 36 pt.

c. Change the font to Times New Roman.

d. Use the Text Effects and Typography button to apply the Fill–Gray-50%, Accent 1, Shadow text effect. (Hint: Depending on your version of Office, the text effect may display as Fill: Gray, Accent color 1; Shadow.)

 

Apply the default Bottom Border paragraph border to the heading “Giant Used Book Sale!”

Insert and format a picture as follows:

e. Move the insertion point to the left of the “G” in the heading “Giant Used Book Sale!”, and then insert the picture Support_SC_WD16_CS1-3a_Book_Tree.png, available for download from the SAM website.

f. Resize the picture so it has a height of 0.75″. The width should automatically adjust to approximately 0.75″.

g. Apply Square text wrapping.

h. Recolor the picture using the Gray-80%, Text color 2 Dark option in the Color gallery. (Hint: Depending on your version of Office, the text effect may display as Dark Gray, Text color 2 Dark.)

i. Add a Brown, Accent 6 border to the picture.

Find the two instances of the word “VHS” and replace them with DVD. (Hint: Do not type the period.)

Format the first body paragraph (which begins “It’s time for the annual…”) as follows:

j. Change the Before paragraph spacing to 12 pt.

k. Change the After paragraph spacing to 18 pt.

In the first sentence of the body paragraph, format the text “New Clintonville Public Library” with the Intense Emphasis style to make the library’s name stand out from the surrounding text.

After the period at the end of the first body paragraph, insert a footnote with the following sentence:

Show your library card for a free donut.

Format the paragraph “Thursday, May 19 through Monday, May 23” as follows:

l. Center the paragraph.

m. Change the font size to 16 pt.

n. Apply White, Background 1, Darker 50% paragraph shading (1st column, 6th row of the Shading palette).

o. Apply the White, Background 1 font color (1st column, 1st row of the Theme Colors palette).

Format the text beginning “Mass-market paperbacks” and ending “Romances” as a bulleted list.

 

Insert and format a second picture as follows:

p. Move the insertion point to the beginning of the first bulleted list item, to the left of the “M” in “Mass-market paperbacks”, and then insert the picture Support_SC_WD16_CS1-3a_Bookshelves.png, available for download from the SAM website.

q. Resize the picture so it has a height of 2.9″. The width will automatically adjust to 3.49″.

r. Apply Square text wrapping.

s. Apply the Simple Frame, White picture style.

Modify the table below the “WE’RE STILL ACCEPTING DONATIONS!” heading as follows:

t. Insert a new row below the “Books” row.

u. In the new row, enter the text shown in Table 1 below.

 

Table 1: Text for New Row

 

Format the table below the “WE’RE STILL ACCEPTING DONATIONS!” heading as follows:

v. Apply the Grid Table 4 – Accent 1 table style.

w. Resize the table using AutoFit Contents.

x. Center the table on the page.

In the last blank paragraph in the document, below the paragraph that reads “We especially need children’s picture books this year.”, insert a second table as follows:

y. Insert a table with two columns and four rows.

z. Merge the cells in row 1.

aa. Enter the text shown in Table 2 on the next page.

 

Table 2: Text for New Table

Format the table as follows:

ab. Apply the Grid Table 4 – Accent 1 table style.

ac. Right-align the text in column 2, rows 2–4.

Add a header to the document as follows:

ad. Insert a blank header at the top of the page.

ae. Center the header paragraph.

af. Enter Approved for posting in the library. as the header text. (Hint: Type the period.)

ag. Close Header & Footer Tools.

Finish the flyer by adding a page border as follows:

ah. Select a border style of your choosing. (Hint: To match the Final Figure on the following page, select the Box border from the border Setting list.)

ai. Change the border width to 2 ¼ pt.

aj. Change the border color to Olive Green, Accent 3, Darker 25% (7th column, 5th row of the Theme Colors palette).

Check the Spelling & Grammar in the document to identify and correct any spelling errors. (Hint: You should find and correct at least three spelling errors.)

Your document should look like the Final Figure on the following page. Save your changes, close the document, and then exit Word. Follow the directions on the SAM website to submit your completed project.

Final Figure

© Cienpies Design /Shutterstock.com; © donatas1205/Shutterstock.com

2
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Security

A program manager questions why information from a legacy technology system is still classified. You explain the technology system will be declassified when the program is supported is declassified. This is an example of which type of declassification system?

 

a. Systematic Declassification

b. Scheduled Declassification

c. Automatic Declassification

d. Petitioned Declassification

 

A new junior member of your security team wants to learn about physical security planning and implementation. Which of the following would you identify for her as components of physical security planning and implementation?

 

a. the risk management process

b. facility installation construction

c. physical security planning documents

d. oversight

 

C only

B, C and D only

B and C only

A, B, C, and D

 

You are working with a contractor and are reviewing the document that outlines in detail what be required to complete the contract. You are reviewing the _______________.

 

a. DD form 254: DD contract Security Classification Specification

b. DD form 441: DOD Security Agreement

c. Statement of Work (SOW)

 

As the newly-appointed physical security officer for a government facility you are informed that a register of the combination for all the various secured areas and storage containers that use combination locks are stored in a file cabinet in the executive assistants office. Is this compliant with combination control requirements?

 

a. No, No register combination should be created.

b. No. Combination should be posted on the exterior of their respective containers.

c. Yes. It is imperative that all employee can access the combination

d. No. Only a minimum number of authorized persons should know the combination to a given container

 

The physical security officer requests your assistance in conducting a Risk Management assessment. As part of the process, you note that increased physical security measures should be implemented. This is an example of which step in the Risk management process?

 

a. Assess vulnerabilities

b. Assess Assets

c. Determine countermeasures options

 

The contracting officer’s Representative (COR) sent a draft copy of a Statement of Work for contractor support to be performed on the installation. The project does not require access to classified information. He included a list of possible requirements to be followed by the contractor. Which of the following is required of contractor personnel working on a government installation?

 

a. Submit to a minimal background investigation for installation access.

b. Sign an SF 312 Classified Information Nondisclosure Agreement

c. Submit to a background investigation for access to government information systems.

 

A and C only

A,B, and C

A and B only

A only

 

An engineer at your facility questions the marking on classified diagram. Which of the following markings are required on classified diagrams?

 

a. The agency, officer of origin, and date of the diagram

b. Classification challenge procedures

c. The overall classification of the diagram

 

A, B, and C

B and C only

A and C only

C only

 

The installation commander has tasked you with evaluating the security measure implemented to protect a nuclear weapon storage facility on the installation. You find the facility uses a variety of security measures, including perimeter fencing and signage, continuous and emergency lighting, active barriers and the pedestrian and vehicle points of entry, guards, and manual and automated access control measures. The security measures employed at this facility are an example of ________________.

 

a. Enclaving

b. Operation security

c. Security in depth

d. Point security

 

You are reviewing classification requirements. In order to be classified, information must meet which of the following criteria?

 

a. The information must be owned by, produced by, produced for, or under the strict control of the U.S government.

b. The information must be determined that its unauthorized disclosure could cause damage to national security.

c. Disclosure of the information could cause undue stress to relations with friendly nations.

d. The classification level of the information must be designated.

 

You are conducting a Risk Management assessment. Which of the following activities are are required to support the Risk Management Process?

a. Conduct a cost analysis

b. Conduct a benefits analysis

c. Make Risk Management Decisions

 

A and C only

B and C only

A and B only

A, B, and C

 

As the newly appointed physical security officer for a government facility, you are informed that the keys for all the various secured areas and storage containers that use keyed locks are stored in a locked file cabinet in the security office along with the key and lock control register. Is this compliant with key control requirements?

 

a. Yes, all keys should be stored with the lock and key register.

b. No. All keys should be secured with the lock and key register.

c. Yes, It is imperative that access to keys be restricted to only security personnel.

d. No. Keys should be stored at the same level of protection as required for the material to which they provide access.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science : Algorithms

A L G O R I T H M S I N T R O D U C T I O N T O

T H I R D E D I T I O N

T H O M A S H.

C H A R L E S E.

R O N A L D L .

C L I F F O R D S T E I N

R I V E S T

L E I S E R S O N

C O R M E N

 

 

Introduction to Algorithms Third Edition

 

 

 

Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest Clifford Stein

Introduction to Algorithms Third Edition

The MIT Press Cambridge, Massachusetts London, England

 

 

c� 2009 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.

For information about special quantity discounts, please email special sales@mitpress.mit.edu.

This book was set in Times Roman and Mathtime Pro 2 by the authors.

Printed and bound in the United States of America.

Library of Congress Cataloging-in-Publication Data

Introduction to algorithms / Thomas H. Cormen . . . [et al.].—3rd ed. p. cm.

Includes bibliographical references and index. ISBN 978-0-262-03384-8 (hardcover : alk. paper)—ISBN 978-0-262-53305-8 (pbk. : alk. paper) 1. Computer programming. 2. Computer algorithms. I. Cormen, Thomas H.

QA76.6.I5858 2009 005.1—dc22

2009008593

10 9 8 7 6 5 4 3 2

 

 

Contents

Preface xiii

I Foundations

Introduction 3

1 The Role of Algorithms in Computing 5 1.1 Algorithms 5 1.2 Algorithms as a technology 11

2 Getting Started 16 2.1 Insertion sort 16 2.2 Analyzing algorithms 23 2.3 Designing algorithms 29

3 Growth of Functions 43 3.1 Asymptotic notation 43 3.2 Standard notations and common functions 53

4 Divide-and-Conquer 65 4.1 The maximum-subarray problem 68 4.2 Strassen’s algorithm for matrix multiplication 75 4.3 The substitution method for solving recurrences 83 4.4 The recursion-tree method for solving recurrences 88 4.5 The master method for solving recurrences 93

? 4.6 Proof of the master theorem 97

5 Probabilistic Analysis and Randomized Algorithms 114 5.1 The hiring problem 114 5.2 Indicator random variables 118 5.3 Randomized algorithms 122

? 5.4 Probabilistic analysis and further uses of indicator random variables 130

 

 

vi Contents

II Sorting and Order Statistics

Introduction 147

6 Heapsort 151 6.1 Heaps 151 6.2 Maintaining the heap property 154 6.3 Building a heap 156 6.4 The heapsort algorithm 159 6.5 Priority queues 162

7 Quicksort 170 7.1 Description of quicksort 170 7.2 Performance of quicksort 174 7.3 A randomized version of quicksort 179 7.4 Analysis of quicksort 180

8 Sorting in Linear Time 191 8.1 Lower bounds for sorting 191 8.2 Counting sort 194 8.3 Radix sort 197 8.4 Bucket sort 200

9 Medians and Order Statistics 213 9.1 Minimum and maximum 214 9.2 Selection in expected linear time 215 9.3 Selection in worst-case linear time 220

III Data Structures

Introduction 229

10 Elementary Data Structures 232 10.1 Stacks and queues 232 10.2 Linked lists 236 10.3 Implementing pointers and objects 241 10.4 Representing rooted trees 246

11 Hash Tables 253 11.1 Direct-address tables 254 11.2 Hash tables 256 11.3 Hash functions 262 11.4 Open addressing 269

? 11.5 Perfect hashing 277

 

 

Contents vii

12 Binary Search Trees 286 12.1 What is a binary search tree? 286 12.2 Querying a binary search tree 289 12.3 Insertion and deletion 294

? 12.4 Randomly built binary search trees 299

13 Red-Black Trees 308 13.1 Properties of red-black trees 308 13.2 Rotations 312 13.3 Insertion 315 13.4 Deletion 323

14 Augmenting Data Structures 339 14.1 Dynamic order statistics 339 14.2 How to augment a data structure 345 14.3 Interval trees 348

IV Advanced Design and Analysis Techniques

Introduction 357

15 Dynamic Programming 359 15.1 Rod cutting 360 15.2 Matrix-chain multiplication 370 15.3 Elements of dynamic programming 378 15.4 Longest common subsequence 390 15.5 Optimal binary search trees 397

16 Greedy Algorithms 414 16.1 An activity-selection problem 415 16.2 Elements of the greedy strategy 423 16.3 Huffman codes 428

? 16.4 Matroids and greedy methods 437 ? 16.5 A task-scheduling problem as a matroid 443

17 Amortized Analysis 451 17.1 Aggregate analysis 452 17.2 The accounting method 456 17.3 The potential method 459 17.4 Dynamic tables 463

 

 

viii Contents

V Advanced Data Structures

Introduction 481

18 B-Trees 484 18.1 Definition of B-trees 488 18.2 Basic operations on B-trees 491 18.3 Deleting a key from a B-tree 499

19 Fibonacci Heaps 505 19.1 Structure of Fibonacci heaps 507 19.2 Mergeable-heap operations 510 19.3 Decreasing a key and deleting a node 518 19.4 Bounding the maximum degree 523

20 van Emde Boas Trees 531 20.1 Preliminary approaches 532 20.2 A recursive structure 536 20.3 The van Emde Boas tree 545

21 Data Structures for Disjoint Sets 561 21.1 Disjoint-set operations 561 21.2 Linked-list representation of disjoint sets 564 21.3 Disjoint-set forests 568

? 21.4 Analysis of union by rank with path compression 573

VI Graph Algorithms

Introduction 587

22 Elementary Graph Algorithms 589 22.1 Representations of graphs 589 22.2 Breadth-first search 594 22.3 Depth-first search 603 22.4 Topological sort 612 22.5 Strongly connected components 615

23 Minimum Spanning Trees 624 23.1 Growing a minimum spanning tree 625 23.2 The algorithms of Kruskal and Prim 631

 

 

Contents ix

24 Single-Source Shortest Paths 643 24.1 The Bellman-Ford algorithm 651 24.2 Single-source shortest paths in directed acyclic graphs 655 24.3 Dijkstra’s algorithm 658 24.4 Difference constraints and shortest paths 664 24.5 Proofs of shortest-paths properties 671

25 All-Pairs Shortest Paths 684 25.1 Shortest paths and matrix multiplication 686 25.2 The Floyd-Warshall algorithm 693 25.3 Johnson’s algorithm for sparse graphs 700

26 Maximum Flow 708 26.1 Flow networks 709 26.2 The Ford-Fulkerson method 714 26.3 Maximum bipartite matching 732

? 26.4 Push-relabel algorithms 736 ? 26.5 The relabel-to-front algorithm 748

VII Selected Topics

Introduction 769

27 Multithreaded Algorithms 772 27.1 The basics of dynamic multithreading 774 27.2 Multithreaded matrix multiplication 792 27.3 Multithreaded merge sort 797

28 Matrix Operations 813 28.1 Solving systems of linear equations 813 28.2 Inverting matrices 827 28.3 Symmetric positive-definite matrices and least-squares approximation

832

29 Linear Programming 843 29.1 Standard and slack forms 850 29.2 Formulating problems as linear programs 859 29.3 The simplex algorithm 864 29.4 Duality 879 29.5 The initial basic feasible solution 886

 

 

x Contents

30 Polynomials and the FFT 898 30.1 Representing polynomials 900 30.2 The DFT and FFT 906 30.3 Efficient FFT implementations 915

31 Number-Theoretic Algorithms 926 31.1 Elementary number-theoretic notions 927 31.2 Greatest common divisor 933 31.3 Modular arithmetic 939 31.4 Solving modular linear equations 946 31.5 The Chinese remainder theorem 950 31.6 Powers of an element 954 31.7 The RSA public-key cryptosystem 958

? 31.8 Primality testing 965 ? 31.9 Integer factorization 975

32 String Matching 985 32.1 The naive string-matching algorithm 988 32.2 The Rabin-Karp algorithm 990 32.3 String matching with finite automata 995

? 32.4 The Knuth-Morris-Pratt algorithm 1002

33 Computational Geometry 1014 33.1 Line-segment properties 1015 33.2 Determining whether any pair of segments intersects 1021 33.3 Finding the convex hull 1029 33.4 Finding the closest pair of points 1039

34 NP-Completeness 1048 34.1 Polynomial time 1053 34.2 Polynomial-time verification 1061 34.3 NP-completeness and reducibility 1067 34.4 NP-completeness proofs 1078 34.5 NP-complete problems 1086

35 Approximation Algorithms 1106 35.1 The vertex-cover problem 1108 35.2 The traveling-salesman problem 1111 35.3 The set-covering problem 1117 35.4 Randomization and linear programming 1123 35.5 The subset-sum problem 1128

 

 

Contents xi

VIII Appendix: Mathematical Background

Introduction 1143

A Summations 1145 A.1 Summation formulas and properties 1145 A.2 Bounding summations 1149

B Sets, Etc. 1158 B.1 Sets 1158 B.2 Relations 1163 B.3 Functions 1166 B.4 Graphs 1168 B.5 Trees 1173

C Counting and Probability 1183 C.1 Counting 1183 C.2 Probability 1189 C.3 Discrete random variables 1196 C.4 The geometric and binomial distributions 1201

? C.5 The tails of the binomial distribution 1208

D Matrices 1217 D.1 Matrices and matrix operations 1217 D.2 Basic matrix properties 1222

Bibliography 1231

Index 1251

 

 

 

Preface

Before there were computers, there were algorithms. But now that there are com- puters, there are even more algorithms, and algorithms lie at the heart of computing.

This book provides a comprehensive introduction to the modern study of com- puter algorithms. It presents many algorithms and covers them in considerable depth, yet makes their design and analysis accessible to all levels of readers. We have tried to keep explanations elementary without sacrificing depth of coverage or mathematical rigor.

Each chapter presents an algorithm, a design technique, an application area, or a related topic. Algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The book contains 244 figures—many with multiple parts—illustrating how the algorithms work. Since we emphasize efficiency as a design criterion, we include careful analyses of the running times of all our algorithms.

The text is intended primarily for use in undergraduate or graduate courses in algorithms or data structures. Because it discusses engineering issues in algorithm design, as well as mathematical aspects, it is equally well suited for self-study by technical professionals.

In this, the third edition, we have once again updated the entire book. The changes cover a broad spectrum, including new chapters, revised pseudocode, and a more active writing style.

To the teacher

We have designed this book to be both versatile and complete. You should find it useful for a variety of courses, from an undergraduate course in data structures up through a graduate course in algorithms. Because we have provided considerably more material than can fit in a typical one-term course, you can consider this book to be a “buffet” or “smorgasbord” from which you can pick and choose the material that best supports the course you wish to teach.

 

 

xiv Preface

You should find it easy to organize your course around just the chapters you need. We have made chapters relatively self-contained, so that you need not worry about an unexpected and unnecessary dependence of one chapter on another. Each chapter presents the easier material first and the more difficult material later, with section boundaries marking natural stopping points. In an undergraduate course, you might use only the earlier sections from a chapter; in a graduate course, you might cover the entire chapter.

We have included 957 exercises and 158 problems. Each section ends with exer- cises, and each chapter ends with problems. The exercises are generally short ques- tions that test basic mastery of the material. Some are simple self-check thought exercises, whereas others are more substantial and are suitable as assigned home- work. The problems are more elaborate case studies that often introduce new ma- terial; they often consist of several questions that lead the student through the steps required to arrive at a solution.

Departing from our practice in previous editions of this book, we have made publicly available solutions to some, but by no means all, of the problems and ex- ercises. Our Web site, http://mitpress.mit.edu/algorithms/, links to these solutions. You will want to check this site to make sure that it does not contain the solution to an exercise or problem that you plan to assign. We expect the set of solutions that we post to grow slowly over time, so you will need to check it each time you teach the course.

We have starred (?) the sections and exercises that are more suitable for graduate students than for undergraduates. A starred section is not necessarily more diffi- cult than an unstarred one, but it may require an understanding of more advanced mathematics. Likewise, starred exercises may require an advanced background or more than average creativity.

To the student

We hope that this textbook provides you with an enjoyable introduction to the field of algorithms. We have attempted to make every algorithm accessible and interesting. To help you when you encounter unfamiliar or difficult algorithms, we describe each one in a step-by-step manner. We also provide careful explanations of the mathematics needed to understand the analysis of the algorithms. If you already have some familiarity with a topic, you will find the chapters organized so that you can skim introductory sections and proceed quickly to the more advanced material.

This is a large book, and your class will probably cover only a portion of its material. We have tried, however, to make this a book that will be useful to you now as a course textbook and also later in your career as a mathematical desk reference or an engineering handbook.

 

 

Preface xv

What are the prerequisites for reading this book?

� You should have some programming experience. In particular, you should un- derstand recursive procedures and simple data structures such as arrays and linked lists.

� You should have some facility with mathematical proofs, and especially proofs by mathematical induction. A few portions of the book rely on some knowledge of elementary calculus. Beyond that, Parts I and VIII of this book teach you all the mathematical techniques you will need.

We have heard, loud and clear, the call to supply solutions to problems and exercises. Our Web site, http://mitpress.mit.edu/algorithms/, links to solutions for a few of the problems and exercises. Feel free to check your solutions against ours. We ask, however, that you do not send your solutions to us.

To the professional

The wide range of topics in this book makes it an excellent handbook on algo- rithms. Because each chapter is relatively self-contained, you can focus in on the topics that most interest you.

Most of the algorithms we discuss have great practical utility. We therefore address implementation concerns and other engineering issues. We often provide practical alternatives to the few algorithms that are primarily of theoretical interest.

If you wish to implement any of the algorithms, you should find the transla- tion of our pseudocode into your favorite programming language to be a fairly straightforward task. We have designed the pseudocode to present each algorithm clearly and succinctly. Consequently, we do not address error-handling and other software-engineering issues that require specific assumptions about your program- ming environment. We attempt to present each algorithm simply and directly with- out allowing the idiosyncrasies of a particular programming language to obscure its essence.

We understand that if you are using this book outside of a course, then you might be unable to check your solutions to problems and exercises against solutions provided by an instructor. Our Web site, http://mitpress.mit.edu/algorithms/, links to solutions for some of the problems and exercises so that you can check your work. Please do not send your solutions to us.

To our colleagues

We have supplied an extensive bibliography and pointers to the current literature. Each chapter ends with a set of chapter notes that give historical details and ref- erences. The chapter notes do not provide a complete reference to the whole field

 

 

xvi Preface

of algorithms, however. Though it may be hard to believe for a book of this size, space constraints prevented us from including many interesting algorithms.

Despite myriad requests from students for solutions to problems and exercises, we have chosen as a matter of policy not to supply references for problems and exercises, to remove the temptation for students to look up a solution rather than to find it themselves.

Changes for the third edition

What has changed between the second and third editions of this book? The mag- nitude of the changes is on a par with the changes between the first and second editions. As we said about the second-edition changes, depending on how you look at it, the book changed either not much or quite a bit.

A quick look at the table of contents shows that most of the second-edition chap- ters and sections appear in the third edition. We removed two chapters and one section, but we have added three new chapters and two new sections apart from these new chapters.

We kept the hybrid organization from the first two editions. Rather than organiz- ing chapters by only problem domains or according only to techniques, this book has elements of both. It contains technique-based chapters on divide-and-conquer, dynamic programming, greedy algorithms, amortized analysis, NP-Completeness, and approximation algorithms. But it also has entire parts on sorting, on data structures for dynamic sets, and on algorithms for graph problems. We find that although you need to know how to apply techniques for designing and analyzing al- gorithms, problems seldom announce to you which techniques are most amenable to solving them.

Here is a summary of the most significant changes for the third edition:

� We added new chapters on van Emde Boas trees and multithreaded algorithms, and we have broken out material on matrix basics into its own appendix chapter.

� We revised the chapter on recurrences to more broadly cover the divide-and- conquer technique, and its first two sections apply divide-and-conquer to solve two problems. The second section of this chapter presents Strassen’s algorithm for matrix multiplication, which we have moved from the chapter on matrix operations.

� We removed two chapters that were rarely taught: binomial heaps and sorting networks. One key idea in the sorting networks chapter, the 0-1 principle, ap- pears in this edition within Problem 8-7 as the 0-1 sorting lemma for compare- exchange algorithms. The treatment of Fibonacci heaps no longer relies on binomial heaps as a precursor.

 

 

Preface xvii

� We revised our treatment of dynamic programming and greedy algorithms. Dy- namic programming now leads off with a more interesting problem, rod cutting, than the assembly-line scheduling problem from the second edition. Further- more, we emphasize memoization a bit more than we did in the second edition, and we introduce the notion of the subproblem graph as a way to understand the running time of a dynamic-programming algorithm. In our opening exam- ple of greedy algorithms, the activity-selection problem, we get to the greedy algorithm more directly than we did in the second edition.

� The way we delete a node from binary search trees (which includes red-black trees) now guarantees that the node requested for deletion is the node that is actually deleted. In the first two editions, in certain cases, some other node would be deleted, with its contents moving into the node passed to the deletion procedure. With our new way to delete nodes, if other components of a program maintain pointers to nodes in the tree, they will not mistakenly end up with stale pointers to nodes that have been deleted.

� The material on flow networks now bases flows entirely on edges. This ap- proach is more intuitive than the net flow used in the first two editions.

� With the material on matrix basics and Strassen’s algorithm moved to other chapters, the chapter on matrix operations is smaller than in the second edition.

� We have modified our treatment of the Knuth-Morris-Pratt string-matching al- gorithm.

� We corrected several errors. Most of these errors were posted on our Web site of second-edition errata, but a few were not.

� Based on many requests, we changed the syntax (as it were) of our pseudocode. We now use “D” to indicate assignment and “==” to test for equality, just as C, C++, Java, and Python do. Likewise, we have eliminated the keywords do and then and adopted “//” as our comment-to-end-of-line symbol. We also now use dot-notation to indicate object attributes. Our pseudocode remains procedural, rather than object-oriented. In other words, rather than running methods on objects, we simply call procedures, passing objects as parameters.

� We added 100 new exercises and 28 new problems. We also updated many bibliography entries and added several new ones.

� Finally, we went through the entire book and rewrote sentences, paragraphs, and sections to make the writing clearer and more active.

 

 

xviii Preface

Web site

You can use our Web site, http://mitpress.mit.edu/algorithms/, to obtain supple- mentary information and to communicate with us. The Web site links to a list of known errors, solutions to selected exercises and problems, and (of course) a list explaining the corny professor jokes, as well as other content that we might add. The Web site also tells you how to report errors or make suggestions.

How we produced this book

Like the second edition, the third edition was produced in LATEX 2″. We used the Times font with mathematics typeset using the MathTime Pro 2 fonts. We thank Michael Spivak from Publish or Perish, Inc., Lance Carnes from Personal TeX, Inc., and Tim Tregubov from Dartmouth College for technical support. As in the previous two editions, we compiled the index using Windex, a C program that we wrote, and the bibliography was produced with BIBTEX. The PDF files for this book were created on a MacBook running OS 10.5.

We drew the illustrations for the third edition using MacDraw Pro, with some of the mathematical expressions in illustrations laid in with the psfrag package for LATEX 2″. Unfortunately, MacDraw Pro is legacy software, having not been marketed for over a decade now. Happily, we still have a couple of Macintoshes that can run the Classic environment under OS 10.4, and hence they can run Mac- Draw Pro—mostly. Even under the Classic environment, we find MacDraw Pro to be far easier to use than any other drawing software for the types of illustrations that accompany computer-science text, and it produces beautiful output.1 Who knows how long our pre-Intel Macs will continue to run, so if anyone from Apple is listening: Please create an OS X-compatible version of MacDraw Pro!

Acknowledgments for the third edition

We have been working with the MIT Press for over two decades now, and what a terrific relationship it has been! We thank Ellen Faran, Bob Prior, Ada Brunstein, and Mary Reilly for their help and support.

We were geographically distributed while producing the third edition, working in the Dartmouth College Department of Computer Science, the MIT Computer

1We investigated several drawing programs that run under Mac OS X, but all had significant short- comings compared with MacDraw Pro. We briefly attempted to produce the illustrations for this book with a different, well known drawing program. We found that it took at least five times as long to produce each illustration as it took with MacDraw Pro, and the resulting illustrations did not look as good. Hence the decision to revert to MacDraw Pro running on older Macintoshes.

 

 

Preface xix

Science and Artificial Intelligence Laboratory, and the Columbia University De- partment of Industrial Engineering and Operations Research. We thank our re- spective universities and colleagues for providing such supportive and stimulating environments.

Julie Sussman, P.P.A., once again bailed us out as the technical copyeditor. Time and again, we were amazed at the errors that eluded us, but that Julie caught. She also helped us improve our presentation in several places. If there is a Hall of Fame for technical copyeditors, Julie is a sure-fire, first-ballot inductee. She is nothing short of phenomenal. Thank you, thank you, thank you, Julie! Priya Natarajan also found some errors that we were able to correct before this book went to press. Any errors that remain (and undoubtedly, some do) are the responsibility of the authors (and probably were inserted after Julie read the material).

The treatment for van Emde Boas trees derives from Erik Demaine’s notes, which were in turn influenced by Michael Bender. We also incorporated ideas from Javed Aslam, Bradley Kuszmaul, and Hui Zha into this edition.

The chapter on multithreading was based on notes originally written jointly with Harald Prokop. The material was influenced by several others working on the Cilk project at MIT, including Bradley Kuszmaul and Matteo Frigo. The design of the multithreaded pseudocode took its inspiration from the MIT Cilk extensions to C and by Cilk Arts’s Cilk++ extensions to C++.

We also thank the many readers of the first and second editions who reported errors or submitted suggestions for how to improve this book. We corrected all the bona fide errors that were reported, and we incorporated as many suggestions as we could. We rejoice that the number of such contributors has grown so great that we must regret that it has become impractical to list them all.

Finally, we thank our wives—Nicole Cormen, Wendy Leiserson, Gail Rivest, and Rebecca Ivry—and our children—Ricky, Will, Debby, and Katie Leiserson; Alex and Christopher Rivest; and Molly, Noah, and Benjamin Stein—for their love and support while we prepared this book. The patience and encouragement of our families made this project possible. We affectionately dedicate this book to them.

THOMAS H. CORMEN Lebanon, New Hampshire CHARLES E. LEISERSON Cambridge, Massachusetts RONALD L. RIVEST Cambridge, Massachusetts CLIFFORD STEIN New York, New York

February 2009

 

 

 

Introduction to Algorithms Third Edition

 

 

I Foundations

 

 

Introduction

This part will start you thinking about designing and analyzing algorithms. It is intended to be a gentle introduction to how we specify algorithms, some of the design strategies we will use throughout this book, and many of the fundamental ideas used in algorithm analysis. Later parts of this book will build upon this base.

Chapter 1 provides an overview of algorithms and their place in modern com- puting systems. This chapter defines what an algorithm is and lists some examples. It also makes a case that we should consider algorithms as a technology, along- side technologies such as fast hardware, graphical user interfaces, object-oriented systems, and networks.

In Chapter 2, we see our first algorithms, which solve the problem of sorting a sequence of n numbers. They are written in a pseudocode which, although not directly translatable to any conventional programming language, conveys the struc- ture of the algorithm clearly enough that you should be able to implement it in the language of your choice. The sorting algorithms we examine are insertion sort, which uses an incremental approach, and merge sort, which uses a recursive tech- nique known as “divide-and-conquer.” Although the time each requires increases with the value of n, the rate of increase differs between the two algorithms. We determine these running times in Chapter 2, and we develop a useful notation to express them.

Chapter 3 precisely defines this notation, which we call asymptotic notation. It starts by defining several asymptotic notations, which we use for bounding algo- rithm running times from above and/or below. The rest of Chapter 3 is primarily a presentation of mathematical notation, more to ensure that your use of notation matches that in this book than to teach you new mathematical concepts.

 

 

4 Part I Foundations

Chapter 4 delves further into the divide-and-conquer method introduced in Chapter 2. It provides additional examples of divide-and-conquer algorithms, in- cluding Strassen’s surprising method for multiplying two square matrices. Chap- ter 4 contains methods for solving recurrences, which are useful for describing the running times of recursive algorithms. One powerful technique is the “mas- ter method,” which we often use to solve recurrences that arise from divide-and- conquer algorithms. Although much of Chapter 4 is devoted to proving the cor- rectness of the master method, you may skip this proof yet still employ the master method.

Chapter 5 introduces probabilistic analysis and randomized algorithms. We typ- ically use probabilistic analysis to determine the running time of an algorithm in cases in which, due to the presence of an inherent probability distribution, the running time may differ on different inputs of the same size. In some cases, we assume that the inputs conform to a known probability distribution, so that we are averaging the running time over all possible inputs. In other cases, the probability distribution comes not from the inputs but from random choices made during the course of the algorithm. An algorithm whose behavior is determined not only by its input but by the values produced by a random-number generator is a randomized algorithm. We can use randomized algorithms to enforce a probability distribution on the inputs—thereby ensuring that no particular input always causes poor perfor- mance—or even to bound the error rate of algorithms that are allowed to produce incorrect results on a limited basis.

Appendices A–D contain other mathematical material that you will find helpful as you read this book. You are likely to have seen much of the material in the appendix chapters before having read this book (although the specific definitions and notational conventions we use may differ in some cases from what you have seen in the past), and so you should think of the Appendices as reference material. On the other hand, you probably have not already seen most of the material in Part I. All the chapters in Part I and the Appendices are written with a tutorial flavor.

 

 

1 The Role of Algorithms in Computing

What are algorithms? Why is the study of algorithms worthwhile? What is the role of algorithms relative to other technologies used in computers? In this chapter, we will answer these questions.

1.1 Algorithms

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

We can also view an algorithm as a tool for solving a well-specified computa- tional problem. The statement of the problem specifies in general terms the desired input/output relationship. The algorithm describes a specific computational proce- dure for achieving that input/output relationship.

For example, we might need to sort a sequence of numbers into nondecreasing order. This problem arises frequently in practice and provides fertile ground for introducing many standard design techniques and analysis tools. Here is how we formally define the sorting problem:

Input: A sequence of n numbers ha1; a2; : : : ; ani. Output: A permutation (reordering) ha01; a02; : : : ; a0ni of the input sequence such

that a01 � a02 � � � � � a0n. For example, given the input sequence h31; 41; 59; 26; 41; 58i, a sorting algorithm returns as output the sequence h26; 31; 41; 41; 58; 59i. Such an input sequence is called an instance of the sorting problem. In general, an instance of a problem consists of the input (satisfying whatever constraints are imposed in the problem statement) needed to compute a solution to the problem.

 

 

6 Chapter 1 The Role of Algorithms in Computing

Because many programs use it as an intermediate step, sorting is a fundamental operation in computer science. As a result, we have a large number of good sorting algorithms at our disposal. Which algorithm is best for a given application depends on—among other factors—the number of items to be sorted, the extent to which the items are already somewhat sorted, possible restrictions on the item values, the architecture of the computer, and the kind of storage devices to be used: main memory, disks, or even tapes.

An algorithm is said to be correct if, for every input instance, it halts with the correct output. We say that a correct algorithm solves the given computational problem. An incorrect algorithm might not halt at all on some input instances, or it might halt with an incorrect answer. Contrary to what you might expect, incorrect algorithms can sometimes be useful, if we can control their error rate. We shall see an example of an algorithm with a controllable error rate in Chapter 31 when we study algorithms for finding large prime numbers. Ordinarily, however, we shall be concerned only with correct algorithms.

An algorithm can be specified in English, as a computer program, or even as a hardware design. The only requirement is that the specification must provide a precise description of the computational procedure to be followed.

What kinds of problems are solved by algorithms?

Sorting is by no means the only computational problem for which algorithms have been developed. (You probably suspected as much when you saw the size of this book.) Practical applications of algorithms are ubiquitous and include the follow- ing examples:

� The Human Genome Project has made great progress toward the goals of iden- tifying all the 100,000 genes in human DNA, determining the sequences of the 3 billion chemical base pairs that make up human DNA, storing this informa- tion in databases, and developing tools for data analysis. Each of these steps requires sophisticated algorithms. Although the solutions to the various prob- lems involved are beyond the scope of this book, many methods to solve these biological problems use ideas from several of the chapters in this book, thereby enabling scientists to accomplish tasks while using resources efficiently. The savings are in time, both human and machine, and in money, as more informa- tion can be extracted from laboratory techniques.

� The Internet enables people all around the world to quickly access and retrieve large amounts of information. With the aid of clever algorithms, sites on the Internet are able to manage and manipulate this large volume of data. Examples of problems that make essential use of algorithms include finding good routes on which the data will travel (techniques for solving such problems appear in

 

 

1.1 Algorithms 7

Chapter 24), and using a search engine to quickly find pages on which particular information resides (related techniques are in Chapters 11 and 32).

� Electronic commerce enables goods and services to be negotiated and ex- changed electronically, and it depends on the privacy of personal informa- tion such as credit card numbers, passwords, and bank statements. The core technologies used in electronic commerce include public-key cryptography and digital signatures (covered in Chapter 31), which are based on numerical algo- rithms and number theory.

� Manufacturing and other commercial enterprises often need to allocate scarce resources in the most beneficial way. An oil company may wish to know where to place its wells in order to maximize its expected profit. A political candidate may want to determine where to spend money buying campaign advertising in order to maximize the chances of winning an election. An airline may wish to assign crews to flights in the least expensive way possible, making sure that each flight is covered and that government regulations regarding crew schedul- ing are met. An Internet service provider may wish to determine where to place additional resources in order to serve its customers more effectively. All of these are examples of problems that can be solved using linear programming, which we shall study in Chapter 29.

Although some of the details of these examples are beyond the scope of this book, we do give underlying techniques that apply to these problems and problem areas. We also show how to solve many specific problems, including the following:

� We are given a road map on which the distance between each pair of adjacent intersections is marked, and we wish to determine the shortest route from one intersection to another. The number of possible routes can be huge, even if we disallow routes that cross over themselves. How do we choose which of all possible routes is the shortest? Here, we model the road map (which is itself a model of the actual roads) as a graph (which we will meet in Part VI and Appendix B), and we wish to find the shortest path from one vertex to another in the graph. We shall see how to solve this problem efficiently in Chapter 24.

� We are given two ordered sequences of symbols, X D hx1; x2; : : : ; xmi and Y D hy1; y2; : : : ; yni, and we wish to find a longest common subsequence of X and Y . A subsequence of X is just X with some (or possibly all or none) of its elements removed. For example, one subsequence of hA; B; C; D; E; F; Gi would be hB; C; E; Gi. The length of a longest common subsequence of X and Y gives one measure of how similar these two sequences are. For example, if the two sequences are base pairs in DNA strands, then we might consider them similar if they have a long common subsequence. If X has m symbols and Y has n symbols, then X and Y have 2m and 2n possible subsequences,

 

 

8 Chapter 1 The Role of Algorithms in Computing

respectively. Selecting all possible subsequences of X and Y and matching them up could take a prohibitively long time unless m and n are very small. We shall see in Chapter 15 how to use a general technique known as dynamic programming to solve this problem much more efficiently.

� We are given a mechanical design in terms of a library of parts, where each part may include instances of other parts, and we need to list the parts in order so that each part appears before any part that uses it. If the design comprises n parts, then there are nŠ possible orders, where nŠ denotes the factorial function. Because the factorial function grows faster than even an exponential function, we cannot feasibly generate each possible order and then verify that, within that order, each part appears before the parts using it (unless we have only a few parts). This problem is an instance of topological sorting, and we shall see in Chapter 22 how to solve this problem efficiently.

� We are given n points in the plane, and we wish to find the convex hull of these points. The convex hull is the smallest convex polygon containing the points. Intuitively, we can think of each point as being represented by a nail sticking out from a board. The convex hull would be represented by a tight rubber band that surrounds all the nails. Each nail around which the rubber band makes a turn is a vertex of the convex hull. (See Figure 33.6 on page 1029 for an example.) Any of the 2n subsets of the points might be the vertices of the convex hull. Knowing which points are vertices of the convex hull is not quite enough, either, since we also need to know the order in which they appear. There are many choices, therefore, for the vertices of the convex hull. Chapter 33 gives two good methods for finding the convex hull.

These lists are far from exhaustive (as you again have probably surmised from this book’s heft), but exhibit two characteristics that are common to many interest- ing algorithmic problems:

1. They have many candidate solutions, the overwhelming majority of which do not solve the problem at hand. Finding one that does, or one that is “best,” can present quite a challenge.

2. They have practical applications. Of the problems in the above list, finding the shortest path provides the easiest examples. A transportation firm, such as a trucking or railroad company, has a financial interest in finding shortest paths through a road or rail network because taking shorter paths results in lower labor and fuel costs. Or a routing node on the Internet may need to find the shortest path through the network in order to route a message quickly. Or a person wishing to drive from New York to Boston may want to find driving directions from an appropriate Web site, or she may use her GPS while driving.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Microsoft Office Assignments

Aspen Falls Firefighting Equipment Inventory

Eq ui

pm en

t S ta

tis tic

s Minimum Supply Level 3 Maximum Supply Level 190 Lowest Cost $11 Highest Cost $1,299 Total in Supply 1,988 Average Supply Level 34 Average Cost $185

Quantity in

Supply Item

Cost

Each Type Category

Supply

Level Check Supplier

146 Coil Headphones $30 Radio Communication Level OK Cost OK 190 Radio Strap/Holder $45 Radio Communication Level OK Cost OK

3 Retractable Mic Keeper $20 Radio Communication Order Cost OK 41 Leather Radio Holder $25 Radio Communication Level OK Cost OK 20 10″ Zipper Boots $320 Boots Footwear Level OK Check new supplier 21 Leather Fire Boots $340 Boots Footwear Level OK Check new supplier 26 Rubber Lug Boot $109 Boots Footwear Level OK Cost OK 27 Rubber Fire Boots $169 Boots Footwear Level OK Cost OK 28 Rubber Bunker Boots $129 Boots Footwear Level OK Cost OK 10 Hazmat Boot $149 Boots Footwear Level OK Cost OK 25 Fire Gloves $89 Gloves Outerwear Level OK Cost OK 27 Proximity Gear Gloves $124 Gloves Outerwear Level OK Cost OK

9 Extrication Gloves $77 Gloves Extrication Gear Order Cost OK 34 Rescue Glove Liners $39 Gloves Outerwear Level OK Cost OK 17 Extrication Coat $223 Coat Extrication Gear Level OK Cost OK 14 Extrication Pants $189 Pants Extrication Gear Level OK Cost OK 11 Extrication Coveralls $359 Coveralls Extrication Gear Level OK Check new supplier

9 Gas Mask $259 Safety Safety Equipment Order Cost OK 9 Gas Mask Pouch $35 Safety Safety Equipment Order Cost OK

13 Respirator $369 Safety Safety Equipment Level OK Check new supplier 19 Coverall with Hood $159 Coveralls Outerwear Level OK Cost OK 45 Disaster Safe Bag $13 Safety Safety Equipment Level OK Cost OK 10 Chemical Overboot $52 Boots Footwear Level OK Cost OK 10 Haz-Mat Boots $89 Boots Footwear Level OK Cost OK 57 Disaster Kit $99 Safety Safety Equipment Level OK Cost OK 10 Helmet $229 Helmet Outerwear Level OK Cost OK 51 Structural Fire Helmet $179 Helmet Outerwear Level OK Cost OK 25 Helmet with Eye Shield $339 Shield Safety Equipment Level OK Check new supplier

8 Megaphone $79 Megaphone Communication Order Cost OK 53 Barrier Tape $12 Tape Traffic Level OK Cost OK 18 Fire Pants $649 Pants Outerwear Level OK Check new supplier 19 Fire Coat $989 Coat Outerwear Level OK Check new supplier 25 Proximity Coat $1,299 Coat Outerwear Level OK Check new supplier 17 Proximity Pants $1,059 Pants Outerwear Level OK Check new supplier 11 Radio Chest Harness $35 Safety Safety Equipment Level OK Cost OK 87 Rope Gloves $32 Gloves Outerwear Level OK Cost OK 28 Safety Harness $199 Safety Safety Equipment Level OK Cost OK 29 Chest Harness $99 Safety Safety Equipment Level OK Cost OK 35 EMS Jacket $399 Coat Outerwear Level OK Check new supplier 47 EMS Pants $289 Pants Outerwear Level OK Cost OK 89 Breakaway Vest $29 Vest Outerwear Level OK Cost OK 15 Mesh Vest $17 Vest Outerwear Level OK Cost OK 25 Mesh Traffic Vest $29 Vest Outerwear Level OK Cost OK 89 Reflective Nylon Vest $11 Vest Outerwear Level OK Cost OK 16 Handheld Remote Siren $289 Siren Traffic Level OK Cost OK 19 Siren $189 Siren Traffic Level OK Cost OK 27 Traffic Baton $19 Baton Traffic Level OK Cost OK 37 Flare Beacon Kit $305 Light Traffic Level OK Check new supplier 90 Flares with Stands $99 Light Traffic Level OK Cost OK 26 Traffic Flashlight $18 Light Traffic Level OK Cost OK 56 Night Barrier Tape $15 Tape Traffic Level OK Cost OK 17 Water Rescue Kit $119 Safety Water Rescue Level OK Cost OK

Eq ui

pm en

t S ta

tis tic

s

Lastname_Firstname_e04_Fire_Equipment.xlsx Equipment

Page 1 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Text Box
In the student’s electronic file, check for the following item(s): 1. Insert SUM and AVERAGE functions 2. Insert MAX and MIN functions 3. Insert IF function in columns F and G 4. Freeze rows 1 through 11 5. Create Excel table and add Total row 6. Convert Excel table to a range 7. Format large worksheets to print
Skills for Success
Text Box
Merge B3:D9 and change orientation
Skills for Success
Line
Skills for Success
Text Box
Apply custom formats and data bars
Skills for Success
Line
Skills for Success
Text Box
Find and replace words
Skills for Success
Line

 

Quantity in

Supply Item

Cost

Each Type Category

Supply

Level Check Supplier

38 Water Rescue Vest $99 Safety Water Rescue Level OK Cost OK 4 Water Tether System $59 Safety Water Rescue Order Cost OK

18 Wildfire Helmet $59 Helmet Outerwear Level OK Cost OK 17 Full-Brim Helmet $59 Helmet Outerwear Level OK Cost OK 58 Firefighting Goggles $49 Helmet Safety Equipment Level OK Cost OK 31 Water Throw Bag $59 Safety Water Rescue Level OK Cost OK 32 Dry Bag $18 Safety Water Rescue Level OK Cost OK

Edited by: Your Name

11/1/2012 12:23

Lastname_Firstname_e04_Fire_Equipment.xlsx Equipment

Page 2 of 7 e04_Fire_Equipment_ann_solution.pdf

 

 

Date Quantity

Purchased Cost Each

Total Monthly

Cost January 1, 2010 20 $16.00 $320.00 February 1, 2010 20 $15.50 $310.00 March 1, 2010 10 $16.00 $160.00 April 1, 2010 20 $15.25 $305.00 May 1, 2010 15 $16.00 $240.00 June 1, 2010 15 $16.25 $243.75 July 1, 2010 10 $16.25 $162.50 August 1, 2010 10 $16.50 $165.00 September 1, 2010 10 $17.00 $170.00 October 1, 2010 20 $16.25 $325.00 November 1, 2010 10 $17.00 $170.00 December 1, 2010 10 $17.50 $175.00 Total $2,746.25 Average Cost $228.85 Minimum Cost $160.00 Maximum Cost $325.00

Cost Trend

Aspen Falls

Cost of Mesh Vests

Lastname_Firstname_e04_Fire_Equipment.xlsx Vest

Page 3 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Text Box
Insert SUM and AVERAGE functions
Skills for Success
Line
Skills for Success
Text Box
Create Sparkline in B22
Skills for Success
Line
Skills for Success
Line
Skills for Success
Text Box
Insert MAX and MIN functions

 

Minimum Supply Level 3 Maximum Supply Level 190 Lowest Cost $11 Highest Cost $1,299 Total in Supply 1,988 Average Supply Level 34 Average Cost $185

Quantity in Supply Item Type Category Supply Level Total

Cost 25 Proximity Coat Coat Outerwear Level OK $32,475 19 Fire Coat Coat Outerwear Level OK $18,791 17 Proximity Pants Pants Outerwear Level OK $18,003 35 EMS Jacket Coat Outerwear Level OK $13,965 47 EMS Pants Pants Outerwear Level OK $13,583 18 Fire Pants Pants Outerwear Level OK $11,682 37 Flare Beacon Kit Light Traffic Level OK $11,285 51 Structural Fire Helmet Helmet Outerwear Level OK $9,129 90 Flares with Stands Light Traffic Level OK $8,910

190 Radio Strap/Holder Radio Communication Level OK $8,548 25 Helmet with Eye Shield Shield Safety Equipment Level OK $8,475 21 Leather Fire Boots Boots Footwear Level OK $7,140 20 10″ Zipper Boots Boots Footwear Level OK $6,400 57 Disaster Kit Safety Safety Equipment Level OK $5,643 28 Safety Harness Safety Safety Equipment Level OK $5,572 13 Respirator Safety Safety Equipment Level OK $4,797 16 Handheld Remote Siren Siren Traffic Level OK $4,624 27 Rubber Fire Boots Boots Footwear Level OK $4,563

146 Coil Headphones Radio Communication Level OK $4,378.54 11 Extrication Coveralls Coveralls Extrication Gear Level OK $3,949 17 Extrication Coat Coat Extrication Gear Level OK $3,791 38 Water Rescue Vest Safety Water Rescue Level OK $3,762 28 Rubber Bunker Boots Boots Footwear Level OK $3,612 19 Siren Siren Traffic Level OK $3,591 27 Proximity Gear Gloves Gloves Outerwear Level OK $3,348 19 Coverall with Hood Coveralls Outerwear Level OK $3,021 29 Chest Harness Safety Safety Equipment Level OK $2,871 58 Firefighting Goggles Helmet Safety Equipment Level OK $2,842

Edited by: Your Name

11/1/2012 12:23

Aspen Falls Firefighting Equipment Inventory

E qu

ip m

en t S

ta tis

tic s

Lastname_Firstname_e04_Fire_Equipment.xlsx Sort by Cost

Page 4 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Line
Skills for Success
Text Box
Create worksheet copies

 

Minimum Supply Level 3 Maximum Supply Level 190 Lowest Cost $11 Highest Cost $1,299 Total in Supply 1,988 Average Supply Level 34 Average Cost $185

Quantity in Supply Item Cost Each Type Category Supply Level Check Supplier Total

Cost

9 Gas Mask $259 Safety Safety Equipment Order Cost OK $2,331 9 Gas Mask Pouch $35 Safety Safety Equipment Order Cost OK $315

57 Disaster Kit $99 Safety Safety Equipment Level OK Cost OK $5,643 28 Safety Harness $199 Safety Safety Equipment Level OK Cost OK $5,572 13 Respirator $369 Safety Safety Equipment Level OK Check new supplier $4,797 29 Chest Harness $99 Safety Safety Equipment Level OK Cost OK $2,871 45 Disaster Safe Bag $13 Safety Safety Equipment Level OK Cost OK $585 11 Radio Chest Harness $35 Safety Safety Equipment Level OK Cost OK $385

Total $139 $22,499

Edited by: Your Name

11/1/2012 12:23

Aspen Falls Firefighting Equipment Inventory

E qu

ip m

en t S

ta tis

tic s

Lastname_Firstname_e04_Fire_Equipment.xlsx Supply Level

Page 5 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Text Box
Filter Excel table
Skills for Success
Line
Skills for Success
Text Box
Create Excel table and add Total row
Skills for Success
Line

 

Minimum Supply Level 3 Maximum Supply Level 190 Lowest Cost $11 Highest Cost $1,299 Total in Supply 1,988 Average Supply Level 34 Average Cost $185

Quantity in Supply Item Cost Each Type Category Supply Level Check Supplier Total

Cost

28 Safety Harness $199 Safety Safety Equipment Level OK Cost OK $5,572 29 Chest Harness $99 Safety Safety Equipment Level OK Cost OK $2,871 11 Radio Chest Harness $35 Safety Safety Equipment Level OK Cost OK $385

Total 3

Edited by: Your Name

11/1/2012 12:23

Aspen Falls Firefighting Equipment Inventory

E qu

ip m

en t S

ta tis

tic s

Lastname_Firstname_e04_Fire_Equipment.xlsx Harness

Page 6 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Line
Skills for Success
Text Box
Filter Excel table

 

Minimum Supply Level 3 Maximum Supply Level 190 Lowest Cost $11 Highest Cost $1,299 Total in Supply 1,988 Average Supply Level 34 Average Cost $185

Quantity in Supply Item Cost Each Type Category Supply Level Check Supplier Total

Cost

9 Gas Mask $259 Safety Safety Equipment Order Cost OK $2,331 9 Extrication Gloves $77 Gloves Extrication Gear Order Cost OK $693 8 Megaphone $79 Megaphone Communication Order Cost OK $632 9 Gas Mask Pouch $35 Safety Safety Equipment Order Cost OK $315 4 Water Tether System $59 Safety Water Rescue Order Cost OK $236 3 Retractable Mic Keeper $20 Radio Communication Order Cost OK $60

25 Proximity Coat $1,299 Coat Outerwear Level OK Check new supplier $32,475 19 Fire Coat $989 Coat Outerwear Level OK Check new supplier $18,791 17 Proximity Pants $1,059 Pants Outerwear Level OK Check new supplier $18,003 35 EMS Jacket $399 Coat Outerwear Level OK Check new supplier $13,965 47 EMS Pants $289 Pants Outerwear Level OK Cost OK $13,583 18 Fire Pants $649 Pants Outerwear Level OK Check new supplier $11,682 37 Flare Beacon Kit $305 Light Traffic Level OK Check new supplier $11,285 51 Structural Fire Helmet $179 Helmet Outerwear Level OK Cost OK $9,129 90 Flares with Stands $99 Light Traffic Level OK Cost OK $8,910

190 Radio Strap/Holder $45 Radio Communication Level OK Cost OK $8,548 25 Helmet with Eye Shield $339 Shield Safety Equipment Level OK Check new supplier $8,475 21 Leather Fire Boots $340 Boots Footwear Level OK Check new supplier $7,140 20 10″ Zipper Boots $320 Boots Footwear Level OK Check new supplier $6,400 57 Disaster Kit $99 Safety Safety Equipment Level OK Cost OK $5,643 28 Safety Harness $199 Safety Safety Equipment Level OK Cost OK $5,572 13 Respirator $369 Safety Safety Equipment Level OK Check new supplier $4,797 16 Handheld Remote Siren $289 Siren Traffic Level OK Cost OK $4,624 27 Rubber Fire Boots $169 Boots Footwear Level OK Cost OK $4,563

146 Coil Headphones $30 Radio Communication Level OK Cost OK $4,378.54 11 Extrication Coveralls $359 Coveralls Extrication Gear Level OK Check new supplier $3,949 17 Extrication Coat $223 Coat Extrication Gear Level OK Cost OK $3,791 38 Water Rescue Vest $99 Safety Water Rescue Level OK Cost OK $3,762 28 Rubber Bunker Boots $129 Boots Footwear Level OK Cost OK $3,612 19 Siren $189 Siren Traffic Level OK Cost OK $3,591 27 Proximity Gear Gloves $124 Gloves Outerwear Level OK Cost OK $3,348 19 Coverall with Hood $159 Coveralls Outerwear Level OK Cost OK $3,021 29 Chest Harness $99 Safety Safety Equipment Level OK Cost OK $2,871 58 Firefighting Goggles $49 Helmet Safety Equipment Level OK Cost OK $2,842 26 Rubber Lug Boot $109 Boots Footwear Level OK Cost OK $2,834 87 Rope Gloves $32 Gloves Outerwear Level OK Cost OK $2,784 14 Extrication Pants $189 Pants Extrication Gear Level OK Cost OK $2,646 89 Breakaway Vest $29 Vest Outerwear Level OK Cost OK $2,581 10 Helmet $229 Helmet Outerwear Level OK Cost OK $2,290 25 Fire Gloves $89 Gloves Outerwear Level OK Cost OK $2,225 17 Water Rescue Kit $119 Safety Water Rescue Level OK Cost OK $2,023 31 Water Throw Bag $59 Safety Water Rescue Level OK Cost OK $1,829 10 Hazmat Boot $149 Boots Footwear Level OK Cost OK $1,490 34 Rescue Glove Liners $39 Gloves Outerwear Level OK Cost OK $1,326 18 Wildfire Helmet $59 Helmet Outerwear Level OK Cost OK $1,062 41 Leather Radio Holder $25 Radio Communication Level OK Cost OK $1,025 17 Full-Brim Helmet $59 Helmet Outerwear Level OK Cost OK $1,003 89 Reflective Nylon Vest $11 Vest Outerwear Level OK Cost OK $979 10 Haz-Mat Boots $89 Boots Footwear Level OK Cost OK $890 56 Night Barrier Tape $15 Tape Traffic Level OK Cost OK $840 25 Mesh Traffic Vest $29 Vest Outerwear Level OK Cost OK $725 53 Barrier Tape $12 Tape Traffic Level OK Cost OK $636 45 Disaster Safe Bag $13 Safety Safety Equipment Level OK Cost OK $585 32 Dry Bag $18 Safety Water Rescue Level OK Cost OK $576 10 Chemical Overboot $52 Boots Footwear Level OK Cost OK $520 27 Traffic Baton $19 Baton Traffic Level OK Cost OK $513 26 Traffic Flashlight $18 Light Traffic Level OK Cost OK $468 11 Radio Chest Harness $35 Safety Safety Equipment Level OK Cost OK $385 15 Mesh Vest $17 Vest Outerwear Level OK Cost OK $255

Total 59

Edited by: Your Name

11/1/2012 12:23

Aspen Falls Firefighting Equipment Inventory

E qu

ip m

en t S

ta tis

tic s

Lastname_Firstname_e04_Fire_Equipment.xlsx Inventory

Page 7 of 7 e04_Fire_Equipment_ann_solution.pdf

 

Skills for Success
Text Box
Convert Excel table to a range
Skills for Success
Line
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java Programming

  1. This lab continues the Zuul project.Make a copy of your Lab 1 Zuul project folder (e.g., the folder named LastName-zuul1) and save it as LastName-zuul, using your last name, e.g., Smith-zuul.
  2. Set up a Git repository for your Zuul project by following the instructions Set Up a Repository for a Project. (Start following along at 0:25 in the video since you already have an existing project.)
  3. In Git, create a branch called ‘zuul2-refactoring’ and move onto the branch. You will do all your work for this lab on this branch, committing after each exercise.git branch zuul2-refactoring git checkout zuul2-refactoring
  4. Complete Exercises 6e: 8.5, 8.6, 8.7, 8.8, 8.11 .
  5. After each exercise:
    1. Test your program. The changes you make in these exercises are refactorings and should not change the behavior of the game. After each step make sure everything still works as it did before.
    2. Don’t forget to document your changes.
      • For any changed classes, be sure your name is in the @author list and update the version.
      • As you add and update methods make sure each method has a comment header that correctly describes its behavior using javadoc, including @param and @return tags.
    3. When an exercise is complete, commit your changes in Git with a commit message indicating the exercise you just completed as well as a brief description of the changes you made. For example:git add . git commit -m”Completed exercise 8.5 – extracted method printLocationInfo”
      It is critical that you commit after each exercise so that all exercises can be graded. Later exercises change the code from earlier exercises, and the instructor will be able to grade the early exercises by looking back in your commit history.
  6. When you have completed all the exercises, make sure your branch is clean. (When you do ‘git status’ it should say “On branch zuul2-refactoring. nothing to commit, working tree clean”)
  7. Merge your branch into the master:git checkout master git merge zuul2-refactoring
  8. Create a zip file of your entire project folder, and name it LastName-zuul2.zip
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Basic Project 17 Steps

Office 2013 – myitlab:grader – Instructions Exploring – Excel Chapter 4: Homework Project 1

Mountain View Realty

 

Project Description: A coworker developed a spreadsheet listing houses listed and sold during the past several months. She included addresses, location, list price, selling price, listing date, and date sold. You need to convert the data to a table. You will manage the large worksheet, prepare the worksheet for printing, sort and filter the table, include calculations, and format the table.

 

Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Open the downloaded file named exploring_e04_grader_h1.xlsx. 0 2 In the Sales Data worksheet, freeze the top row. Hint: On the VIEW tab, in the Window group, click Freeze Panes and then click Freeze Top Row. 5 3 In the Sales Data worksheet, convert the data to a table and apply Table Style Medium 17. Hint: To convert the data, on the INSERT tab, in the Tables group, click Table. To apply the style, on the DESIGN tab, in the Table Styles group, click the More button. 6 4 In the Sales Data worksheet, remove duplicate records in the table. Hint: On the DESIGN tab, in the Tools group, click Remove Duplicates. 5 5 In the Sales Data worksheet, insert a new field to the right of the Selling Price field. Name the new field Percent of List Price. Hint: Right-click the Column E header and click Insert. 6 6 In the Sales Data worksheet, create a formula in cell E2 with structured references to calculate what percent the selling price is of the list price. Format the field with Percent Style with one decimal place in the range E2:E43. Hint: In cell E2, enter the formula =[Selling Price]/[List Price]. To format the range, on the HOME tab, in the Number group, click the Number Format Dialog Box Launcher. 6 7 In the Sales Data worksheet, insert a new field to the right of the Sale Date field. Name the new field Days on Market. Create a formula with structured references to calculate the number of days on the market. Hint: In cell H1, type Days on Market and press ENTER. To insert the formula, in cell H2, type =[Sale Date]-[Listing Date]. 6 8 In the Sales Data worksheet, add a total row to display the average percent of list price and average number of days on market. Apply the General number format to the average number of days on market. Type Averages in cell A44. Hint: To display the Total row, on the DESIGN tab, in the Table Style Options group, click Total Row. To select the function, click the cell, click the arrow, and then click the function. 10 9 In the Sales Data worksheet, sort the table by City in alphabetical order and add a second level to sort by Days on Market with the houses on the market the longest at the top within each city. Hint: On the HOME tab, in the Editing group, click Sort & Filter. 8 10 In the Sales Data worksheet, select the Listing Date and Sale Date fields and set a column width of 11.00. Wrap the column labels in the range E1:H1. Hint: To set the column width, on the HOME tab, in the Cells group, click Format. To wrap the labels, in the Alignment group, click Wrap Text. 6 11 Set up the Sales Data worksheet so that when printed, the first row containing the field names will print as titles on each page. Hint: On the PAGE LAYOUT tab, in the Page Setup group, click Print Titles. 5 12 Display the Sales Data worksheet in Page Break Preview and move the page break to occur between rows 26 and 27, and then change back to Normal view. Hint: To display Page Break Preview, on the VIEW tab, in the Workbook Views group, click Page Break Preview. To insert the page break, click cell A27 and on the PAGE LAYOUT tab, in the Page Setup group, click Breaks. 5 13 Display the Filtered Data worksheet. Convert the table to a range of data. Hint: On the DESIGN tab, in the Tools group, click Convert to Range. 5 14 Filter the data to display the cities of Alpine, Cedar Hills, and Eagle Mountain. Hint: On the HOME tab, in the Editing group, click Sort & Filter. 6 15 Use a custom AutoFilter to display records for houses that were on the market 30 days or more. 5 16 Apply the 3 Arrows (Colored) icon set to the days on market field values. Do not include the field name in the range. Hint: On the HOME tab, in the Styles group, click Conditional Formatting and then point to Icon Sets. 5 17 Apply the Light Blue Data Bar conditional formatting in the Gradient Fill section to the selling prices. Hint: On the HOME tab, in the Styles group, click Conditional Formatting and then point to Data Bars. 5 18 Create a new conditional format that applies Yellow fill (fourth color in the bottom row) and bold font to values that are higher than 98% for the Percent of List Price column. Hint: On the HOME tab, in the Styles group, click Conditional Formatting and then click New Rule. 6 19 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Sales Data, Filtered Data. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed. 0 Total Points 100

 

Updated: 04/04/2013 1 E_CH04_EXPV1_H1_Instructions.docx

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

For Prof. Gegee!!!

WEEK 1

 

In order to complete the labs, you must install WAMP, the development server, and a PHP editor of choice, on your Windows computer.

A.                Install the WAMP Development Server following steps in Appendix B.

Install the PHP Editor Tools following steps in Appendix A

For the power users that want to step up from editing using Notepad, install one of these preferential PHP code editor:
⧫    Microsoft Windows WordPad Editor (an optional improvement)

⧫    Microsoft Web Expressions 4.0 (the recommended improvement)

⧫    Microsoft Visual Studio Editor (an optional improvement) Complete Lab Work:

 

o   Discovery Project 1-1 (p.72)

o   Discovery Project 1-2 (p.72)

o   Discovery Project 1-3 (p.73)

o   Discovery Project 1-4 (p.73)

 

WEEK 2

 

●  Save any coded PHP programs and scripts in the directory C:\wamp64\www\Wk2Exercise where you will ZIP and Submit the weeks PHP scripts and programs.

●  Submit the completed Exercises (Zip file of Wk2Excercise) directory to the dropbox under the Week1: Assignment submission area as an attachment.

Reinforcement Exercises

o   Exercise 4-1 (pages 221-224)

o   Exercise 4-2 (pages 224-227)

o   Exercise 4-3 (page 228)

o   Exercise 4-4 (page 228)

o   Exercise 4-5 (page 228)

 

o   Exercise 5-1 (pages 288-289)

o   Exercise 5-2 (pages 289-291)

o   Exercise 5-3 (page 291)

o   Exercise 5-4 (page 291)

o   Exercise 5-5 (pages 291-292)
o   Exercise 6-1 (pages 369-373)

o   Exercise 6-2 (page 373)

o   Exercise 6-3 (pages 373-376)

o   Exercise 6-4 (page 376

o   Exercise 6-5 (page 376)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

4 Case Studies Due Date Today 8pm

1.You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.(3,4)

2.Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan to use in your lab. Be sure to cite references, such as the ISO standard or NIST, to support your procedure. Make sure you use APA formatting.(chapter 5,6)

3.As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (not including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1. Make sure you follow the grading rubric and write your paper in APA format.(chapter 9,10)

4. A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. Make sure you adhere to the grading rubric and write the report in APA format.(chapter 11,12)

· 3-4 pages in length  (excluding cover page, abstract, and reference list)

· APA format, Use the APA template located in the Student Resource Center to complete the assignment.

· Please use the Case Study Guide as a reference point for writing your case study.

Refere text book :

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Raptor Programming

Below I have listed the second assignment for you to do.  Every assignment should be submitted with a cover page.  With that being said please do the following assignments.

** To complete this assignment Chapter0 – Chapter3 should be reviewed.  Also see the document “Introduction to Raptor Tutorials” for assistance using Raptor.

2nd Assignment is located in the AITT-Summer 2018\Assignments folder.  Please answer all questions and submit. The questions can be answered within the document.

1)  AITT4300 – Assignment2

The second part of the assignment is also located in the AITT-Summer 2018\Assignment folder.  The document isAITT4300_Chapter3_PC_1-5.

2)  Under the section Programming Challenges (page 177), do questions 4 and 5.  This assignment should be done in a project format.  The two problems are to be submitted as one project.

I. Cover Page

II. Background/Theory

III. Problem Statement

IV. Pseudocode

V. Flowchart

VI. Code

VII. Results

VIII. Conclusion

 

Below I have listed the first assignment for you to do.  Every assignment should be submitted with a cover page.  With that being said please do the following assignments.

** To complete this assignment Chapter0 – Chapter3 should be reviewed.  Also see the document “Introduction to Raptor Tutorials” for assistance using Raptor.

1st Assignment is located in the AITT-Summer 2018\Assignments folder.  Please answer all questions and submit. The questions can be answered within the document.

1)  Try_It_Yourself_AppendixA_Exercises

2)  Try_It_Yourself_AppendixB_Exercises

2nd Assignment is also located in the AITT-Summer 2018\Assignment folder.  The document is Chapter3_Questions.pdf.

1) Under the section Programming Problems (page 161), do questions 1 and 2.  This assignment should be done in a project format.  The two problems are to be submitted as one project.

I. Cover Page
II. Background/Theory
III. Problem Statement
IV. Pseudocode
V. Flowchart
VI. Code
VII. Results
VIII. Conclusion

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!