Lab 1: Recursion
Introduction
Tracery (tracery.io) is a simple text-expansion language made by one of your TAs as a
homework assignment for one of Prof. Mateas's previous courses. It now has tens of
thousands of users, and runs about 7000 chatbots on Twitter (you never know where a
homework will take you!).
Tracery uses context-free grammars
( https://en.wikipedia.org/wiki/Context-free_grammar) to store information about how to
expand rules. A Tracery grammar is a set of keys, each of which has some set of
expansions that can replace it. In our version, the line
"beverage:tea|coffee|cola|milk" means that the symbol "beverage" can be
replaced with any of those four options. You replace a symbol whenever you see it in
hashtags. This rule "#name# drank a glass of #beverage#" will have the "name"
and "beverage" symbols replaced with expansions associated with those symbols. In
the case of the "beverage" rule above, which has four possible expansions, one will be
picked at random. If the replacement rule also has hashtags in it, we replace those, and
if those replacements have hashtags.... we keep replacing things until all the hashtags
are gone, recursively.
In this assignment, you will be implementing a simplified version of Tracery in Java, and
then using it to generate generative text. You will also be writing your own grammar to
generate new texts (hipster cocktails, emoji stories, or nonsense poems).
Outline
● Compile and run a Java program
● Save all the arguments
● Load the Tracery files
● Output all the rules
● Expand rules and print them to the screen
Compile and run a Java program
This program has several files (Rule.java, and TraceryRecursion.java). We can't
run these files as code, as we would with other “interpreted” languages (like Javascript
https://en.wikipedia.org/wiki/Context-free_grammar
or Python). For Java, we need the computer to put them all together and translate it to
machine code, in a process called “compiling”.
You will compile and run your Java program from the command line. When you see $,
this means that it is a command that you will enter in the command line. Windows and
Unix (such as Linux or the Mac terminal) command lines are a little different, be sure
you know the basics of navigating the one you are using.
Do you have Java installed on your machine? What version? Let's find out! Type the
following into your command line: $ javac -version $ java -version You should
have at least Javac 1.8 and Java 1.8 (often called “Java 8”) installed. If that's not the
case, this is a good time to fix that by updating your Java. We will be using some
features of Java 8 in this class.
Compile your java program.
$ javac TraceryRecursion.java
So far, it will compile without errors.
Look in the folder, and you will see that you have a new file TraceryRecursion.class.
This is the compiled version of your file. You can now run ...
Article link httpiveybusinessjournal.compublicationmanaging-.docxfredharris32
Article link: http://iveybusinessjournal.com/publication/managing-global-risk-to-seize-competitive-advantage/
Requirements: Write one summary and study note both no longer than one pages should include all point of article. Then do a PPT and write a presenting paper only for 5 minutes.
Groups of students will create and offer two MS PowerPoint presentation summarizing the main points of one of the readings for this course along with a one page handout for the students in the class. The aim of the presentations and the handouts is to provide the audience with the main ideas of the article and study notes. Groups will bring to class enough copies of the handout for each student in the class. The handout should list the name of the author, the title of the article, the title of the journal, and the publication date and page numbers along with a summary of its main points. Please do not exceed one page for this material.
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// ...
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
* CPS 350
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// Read in sample rate
sampleRate = Integer.parseInt(str.nextToken());
//
// Read in the remainder of the file on line at a time.
// The values in the first column are thrown away.
// Place values from the second column on the stack.
// Stop reading if we reach the end of the file.
//
DStack s;
if (useList)
s = new ListStack();
else
s = new ArrayStack();
String timestep;
double data;
int count = 0;
while ((oneLine = fileIn.readLine()) != null) {
if (oneLine.charAt(0) == ';') {
continue;
}
str = new StringTokenizer(oneLine);
// Read in time step value from first col.
InstructionYou’ll probably want to import FileReader, PrintWriter,.pdfarsmobiles
Instruction
You’ll probably want to import FileReader, PrintWriter, ArrayList, List, and Scanner.
For this assignment, keep all your classes in one file. Leave the Hwk8 class as public and don’t
use an access modifier for the other classes..
One suggestion for the order to implement the classes would be: the three Exceptions,
Dictionary, Template, and finally the Driver (main method).
You will need to generate the input text files manually from the sample runs of the program.
Exceptions:
The implementation of all three of them (DictionaryFormatException,
EmptyWordListException, and UnsupportedCategoryException) should be very similar.
Since they are all run-time type exceptions, they can extend the RuntimeException class.
You can provide a specific error message to pass into each of them while you are generating the
exceptions in the other classes.
Dictionary:
The instance variables of the Dictionary class are Lists of type String to store the following types
of words: nouns, verbs, adjectives, adverbs, pronouns, interjections. Using an ArrayList to
implement the Lists is recommended.
addWord: The input should be from the “words” file. Specifically it will have the format
“partofspeech:word”. Think about String methods you may use to format the input properly
before using it. Then consider what all these inputs should have in common to determine a
delimiter (character) for splitting the String. You should also check if the input line is empty
(skip it in this case) or whether there isn’t exactly two parts split from the String (in this case
throw a DictionaryFormatException). Trim the resulting two Strings at this point, and use their
data to determine which ArrayList the word belongs to before adding it to that list.
getWord: The input is a String representation of the part of speech list you want to extract a word
from. If the String does not correspond to a part of speech name (noun, verb, etc.), throw an
UnsupportedCategoryException. First make sure there are words remaining in the selected list. If
not, throw an EmptyWordListException. Finally, use a random function to randomly remove a
word from that list and return it as the output.
Template:
Its sole instance variable is a String called template. This should be the String equivalent of the
template file the driver reads in.
As such, the constructor should just set the template value to be the String representation of the
template passed into it.
fill: Takes in a dictionary as an argument, and returns a String representation of a modified
template. You’ll want to find a way to split the template String into pieces easier to manage. To
create the result String, you’ll need to keep the parts of the String that aren’t word prompts as-is.
Then for the elements where “/ pos” shows up, you’ll want to replace those by retrieving an
appropriate word from the dictionary list (so choose from the noun list when a noun is requested,
etc.) if the process of appending parts of the String fails for s.
Article link httpiveybusinessjournal.compublicationmanaging-.docxfredharris32
Article link: http://iveybusinessjournal.com/publication/managing-global-risk-to-seize-competitive-advantage/
Requirements: Write one summary and study note both no longer than one pages should include all point of article. Then do a PPT and write a presenting paper only for 5 minutes.
Groups of students will create and offer two MS PowerPoint presentation summarizing the main points of one of the readings for this course along with a one page handout for the students in the class. The aim of the presentations and the handouts is to provide the audience with the main ideas of the article and study notes. Groups will bring to class enough copies of the handout for each student in the class. The handout should list the name of the author, the title of the article, the title of the journal, and the publication date and page numbers along with a summary of its main points. Please do not exceed one page for this material.
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// ...
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.StringTokenizer;
/**
* Read a .dat file and reverse it.
* CPS 350
*/
public class Reverse {
public static void main(String[]args) {
if (args.length != 3) {
System.err.println(" Incorrect number of arguments");
System.err.println(" Usage: ");
System.err.
println("\tjava Reverse <stack type> <input file> <output file>");
System.exit(1);
}
boolean useList = true;
if (args[0].compareTo("list")==0)
useList = true;
else if (args[0].compareTo("array")==0)
useList = false;
else {
System.err.println("\tSaw "+args[0]+" instead of list or array as first argument");
System.exit(1);
}
try {
//
// Set up the input file to read, and the output file to write to
//
BufferedReader fileIn =
new BufferedReader(new FileReader(args[1]));
PrintWriter fileOut =
new PrintWriter(new
BufferedWriter(new FileWriter(args[2])));
//
// Read the first line of the .dat file to get sample rate.
// We want to store the sample rate value in a variable,
// but we can ignore the "; Sample Rate" part of the line.
// Step through the first line one token (word) at a time
// using the StringTokenizer. The fourth token is the one
// we want (the sample rate).
//
StringTokenizer str;
String oneLine;
int sampleRate;
String strJunk;
oneLine = fileIn.readLine();
str = new StringTokenizer(oneLine);
strJunk = str.nextToken(); // Read in semicolon
strJunk = str.nextToken(); // Read in "Sample"
strJunk = str.nextToken(); // Read in "Rate"
// Read in sample rate
sampleRate = Integer.parseInt(str.nextToken());
//
// Read in the remainder of the file on line at a time.
// The values in the first column are thrown away.
// Place values from the second column on the stack.
// Stop reading if we reach the end of the file.
//
DStack s;
if (useList)
s = new ListStack();
else
s = new ArrayStack();
String timestep;
double data;
int count = 0;
while ((oneLine = fileIn.readLine()) != null) {
if (oneLine.charAt(0) == ';') {
continue;
}
str = new StringTokenizer(oneLine);
// Read in time step value from first col.
InstructionYou’ll probably want to import FileReader, PrintWriter,.pdfarsmobiles
Instruction
You’ll probably want to import FileReader, PrintWriter, ArrayList, List, and Scanner.
For this assignment, keep all your classes in one file. Leave the Hwk8 class as public and don’t
use an access modifier for the other classes..
One suggestion for the order to implement the classes would be: the three Exceptions,
Dictionary, Template, and finally the Driver (main method).
You will need to generate the input text files manually from the sample runs of the program.
Exceptions:
The implementation of all three of them (DictionaryFormatException,
EmptyWordListException, and UnsupportedCategoryException) should be very similar.
Since they are all run-time type exceptions, they can extend the RuntimeException class.
You can provide a specific error message to pass into each of them while you are generating the
exceptions in the other classes.
Dictionary:
The instance variables of the Dictionary class are Lists of type String to store the following types
of words: nouns, verbs, adjectives, adverbs, pronouns, interjections. Using an ArrayList to
implement the Lists is recommended.
addWord: The input should be from the “words” file. Specifically it will have the format
“partofspeech:word”. Think about String methods you may use to format the input properly
before using it. Then consider what all these inputs should have in common to determine a
delimiter (character) for splitting the String. You should also check if the input line is empty
(skip it in this case) or whether there isn’t exactly two parts split from the String (in this case
throw a DictionaryFormatException). Trim the resulting two Strings at this point, and use their
data to determine which ArrayList the word belongs to before adding it to that list.
getWord: The input is a String representation of the part of speech list you want to extract a word
from. If the String does not correspond to a part of speech name (noun, verb, etc.), throw an
UnsupportedCategoryException. First make sure there are words remaining in the selected list. If
not, throw an EmptyWordListException. Finally, use a random function to randomly remove a
word from that list and return it as the output.
Template:
Its sole instance variable is a String called template. This should be the String equivalent of the
template file the driver reads in.
As such, the constructor should just set the template value to be the String representation of the
template passed into it.
fill: Takes in a dictionary as an argument, and returns a String representation of a modified
template. You’ll want to find a way to split the template String into pieces easier to manage. To
create the result String, you’ll need to keep the parts of the String that aren’t word prompts as-is.
Then for the elements where “/ pos” shows up, you’ll want to replace those by retrieving an
appropriate word from the dictionary list (so choose from the noun list when a noun is requested,
etc.) if the process of appending parts of the String fails for s.
Abstract Data Types (a) Explain briefly what is meant by the ter.pdfkarymadelaneyrenne19
Abstract Data Types
(a) Explain briefly what is meant by the term abstract data type (ADT). Give two
reasons why use of ADTs is good programming practice.
(b) Write out a signature, or interface, that defines the operations of a stack ADT.
(c) Consider a string of characters of the form
... (.( ... ).) ...
where ... indicates an arbitrary sequence of characters (except for parentheses),
(.( indicates an arbitrary number (one or more) of opening parentheses, and
similarly ).) indicates an arbitrary number of closing parentheses.
Using only the stack abstraction operations defined above, write pseudocode for
an algorithm that determines, using a stack, whether or not the number of closing
parentheses is the same as the number of opening parentheses.
You may assume the existence of a function read(str,ch) that reads the next character
of string str into ch.
You may also assume that you can invoke a function reportFail, that will cause
termination with failure, and similarly, reportSuccess causes termination with a
success indication.
Further, you may also assume that you can call a function newStack(S) to create
a new empty stack S, and eos(str) that returns false when you reach the end of
the string.
Solution
(a) Explain briefly what is meant by the term abstract data type (ADT). Give two
reasons why use of ADTs is good programming practice.
A data type is a collection of values and a set of operations on those values. That collection and
these operations form a mathematical construct that may be implemented with the use of a
particular hardware or software data structure. The term abstract data type (ADT) refers to the
basic mathematical concept that defines the data type. We have discussed four different
implementations of the list data structure.
In case of implementation of the list with the use of an array, the size of the array gives difficulty
if increased.
To avoid this, we allocate memory dynamically for nodes before connecting these nodes with the
help of pointers.
For this purpose, we made a singly linked list and connected it with the next pointer to make a
chain.
Moving forward is easy but going back is a difficult task.
To overcome this problem, we made a doubly linked list using prev andnext pointers. With the
help of these pointers, we can move forward and backward very easily. Now we face another
problem that the prev pointer of first node and the next pointer of the last node are NULL.
Therefore, we have to be careful in case of NULL pointers. To remove the NULL pointers, we
made the circular link list by connecting the first and last node.
The program employing the list data structure is not concerned with its implementation.
We do not care how the list is being implemented whether through an array, singly linked list,
doubly linked list or circular linked list. It has been witnessed that in these four implementations
of the list, the interface remained the same i.e. it implements the same methods like add, get,
next, start a.
ECMAScript is the name of the international standard that defines JavaScript. ES6 → ECMAScript 2015. Latest ECMAScript version is ES7 which is ECMAScript 2016.
Basically it is a superset of es5
MATLAB stands for Matrix Laboratory. MATLAB was written originally
to provide easy access to matrix software developed by the LINPACK (linear system package) and matlab 2012a manual pdf
Description 1) Create a Lab2 folder for this project2.docxtheodorelove43763
Description
1) Create a Lab2 folder for this project
2) Use the main driver program (called Writers.java) that I provide below to write files of differing types. You can copy and paste this code, but make sure the spaces variable copies correctly. The copy and paste operation eliminates the spaces between the quotes on some systems.
3) In the writers program, fill in the code for the three classes (Random, Binary, and Text). In each class, you will need a constructor, a write method, and a close method. The constructor opens the file, the write method writes a record, and the close method closes the file.
4) Other than what I just described, don't change the program in any way. The program asks for a file type (random, binary, or text) and the name of the file to create. In a loop it inputs a person's name (string), a person's age (int), and a person's annual salary (double). It writes to a file of the appropriate type. The loop terminates when the user indicates that inputting is complete. The program then asks if another file should be created. If the answer is yes, the whole process starts again. This and all of the java driver programs should be saved in your lab2 folder but not in the cs258 sub-folder.
5) Note: The method signatures for accessing all of the three types of files (binary, random, and text) are on the class web-site. Go to power point slides and click on week two. This will help if you didn't take accurate notes in class.
6) Write a main program to read binary files (BinReader.java). This program only needs to be able to read and display records from a Binary file that was created by the writers program.
7) Write a main program to read random files (RandReader.java). This program only needs to be able to read and display records from a Binary file that was created by the writers program. Make sure that this program reads and displays records in reverse order. DO NOT USE AN ARRAY!!!
8) In your Lab2 folder, create a subfolder within lab2 named cs258. Download Keyboard.java from the class web-site to that folder. Add a new first line of Keyboard.java with the statement, package cs258;. This line will make Keyboard.java part of the cs258 package. The driver program shown below has an import ‘cs258.*;’ statement to access the java files in this package.
9) Modify Keyboard.java. We want to extend this class so it can be extended to allow access to multiple files. The changes follow:
a. Remove all static references. This is necessary so that there will be an input stream variable (in) in each object.
b. Change the private modifier of the in and current_token variables to protected. Change the private modifier to protected in all of the signature lines of the overloaded getNextToken methods.
c. Create a constructor that instantiates the input stream for keyboard input. Remove the instantiation from the original declaration line for the in variable. The constructor doesn't need any parameters.
10)Create a class TextR.
PART B Please response to these two original posts below. Wh.docxsmile790243
PART B
Please response to these two original posts below. When
responding to these posts, please either expand the
thought, add additional insights, or respectfully disagree
and explain why. Remember that we are after reasons
and arguments, and not simply the statement of
opinions.
Original Post 1
Are human lives intrinsically valuable? If so, in virtue of what? (Is
it our uniqueness, perhaps, or our autonomy, or something else?)
To begin, I would like to remind us that being intrinsically valuable
means having values for just being us and nothing else. I believe
that human lives are intrinsically valuable in virtue of our
uniqueness. As a bio nerd, I would like to state the fact that there
are a lot of crossover events during meiosis, which create trillions
of different DNA combinations. Hence, from a biological
standpoint, without considering other aspects, being you is
already valuable because you are that one sperm that won the
race and got fertilized. On a larger scale, there are hardly two
people whose look and behaviors are the same in the same
family, unless they are identical twins. However, identical twins
still act differently and have differences (such as fingerprints).
Since we are raised in different families, we are taught different
things and have different cultures. In general, we all have
different genetic information, appearances, personalities, senses
of humor, ambitions, talents, interests and life experiences. These
characteristics make up our “unique individual value” and make
us so unique and irreplaceable.
I would also love to discuss how our diversities enrich and
contribute to society, but that would be a talk about our extrinsic
values.
Original Post 2
Are human lives intrinsically valuable? If so, in virtue of what? (Is
it our uniqueness, perhaps, or our autonomy, or something else?)
I believe that human lives are intrinsically valuable due to a
number of reasons. Firstly, human lives aren’t replaceable. You
can’t replace a human being with another just like you can
replace a broken laptop with brand new one. Part of the reason
why we tend to think this way is that we were nurtured with the
notion that there is, indeed, a special value to human life. This
could be in virtue of our uniqueness-- the fact that we are
sentient and capable of complex thoughts and emotions
separates us from any other species on this planet. From a
scientific standpoint, this is also one of the reasons as to why
humans became the dominant species in today’s age.
Moreover, human lives aren’t disposable. I think this is largely due
to us humans having the ability to empathize with others. We
understand that it’s morally inappropriate to take the life of
another individual even if they’re complete strangers because
they’re another human being like us who has their own thoughts,
values, memories, and stories. In a way, we have a strong
emotional connection to our own species. As .
Part C Developing Your Design SolutionThe Production Cycle.docxsmile790243
Part C Developing Your Design
Solution
The Production Cycle
Within the four stages of the design workflow there are two distinct parts.
The first three stages, as presented in Part B of this book, were described
as ‘The Hidden Thinking’ stages, as they are concerned with undertaking
the crucial behind-the-scenes preparatory work. You may have completed
them in terms of working through the book’s contents, but in visualisation
projects they will continue to command your attention, even if that is
reduced to a background concern.
You have now reached the second distinct part of the workflow which
involves developing your design solution. This stage follows a production
cycle, commencing with rationalising design ideas and moving through to
the development of a final solution.
The term cycle is appropriate to describe this stage as there are many loops
of iteration as you evolve rapidly between conceptual, practical and
technical thinking. The inevitability of this iterative cycle is, in large part,
again due to the nature of this pursuit being more about optimisation rather
than an expectation of achieving that elusive notion of perfection. Trade-
offs, compromises, and restrictions are omnipresent as you juggle ambition
and necessary pragmatism.
How you undertake this stage will differ considerably depending on the
nature of your task. The creation of a relatively simple, single chart to be
slotted into a report probably will not require the same rigour of a formal
production cycle that the development of a vast interactive visualisation to
be used by the public would demand. This is merely an outline of the most
you will need to do – you should edit, adapt and participate the steps to fit
with your context.
There are several discrete steps involved in this production cycle:
Conceiving ideas across the five layers of visualisation design.
Wireframing and storyboarding designs.
Developing prototypes or mock-up versions.
219
Testing.
Refining and completing.
Launching the solution.
Naturally, the specific approach for developing your design solution (from
prototyping through to launching) will vary hugely, depending particularly
on your skills and resources: it might be an Excel chart, or a Tableau
dashboard, an infographic created using Adobe Illustrator, or a web-based
interactive built with the D3.js library. As I have explained in the book’s
introduction, I’m not going to attempt to cover the myriad ways of
implementing a solution; that would be impossible to achieve as each task
and tool would require different instructions.
For the scope of this book, I am focusing on taking you through the first
two steps of this cycle – conceiving ideas and wireframing/storyboarding.
There are parallels here with the distinctions between architecture (design)
and engineering (execution) – I’m effectively chaperoning you through to
the conclusion of your design thinking.
To fulfil this, Part C presents a detailed breakdown of the many design
.
More Related Content
Similar to Lab 1 Recursion Introduction Tracery (tracery.io.docx
Abstract Data Types (a) Explain briefly what is meant by the ter.pdfkarymadelaneyrenne19
Abstract Data Types
(a) Explain briefly what is meant by the term abstract data type (ADT). Give two
reasons why use of ADTs is good programming practice.
(b) Write out a signature, or interface, that defines the operations of a stack ADT.
(c) Consider a string of characters of the form
... (.( ... ).) ...
where ... indicates an arbitrary sequence of characters (except for parentheses),
(.( indicates an arbitrary number (one or more) of opening parentheses, and
similarly ).) indicates an arbitrary number of closing parentheses.
Using only the stack abstraction operations defined above, write pseudocode for
an algorithm that determines, using a stack, whether or not the number of closing
parentheses is the same as the number of opening parentheses.
You may assume the existence of a function read(str,ch) that reads the next character
of string str into ch.
You may also assume that you can invoke a function reportFail, that will cause
termination with failure, and similarly, reportSuccess causes termination with a
success indication.
Further, you may also assume that you can call a function newStack(S) to create
a new empty stack S, and eos(str) that returns false when you reach the end of
the string.
Solution
(a) Explain briefly what is meant by the term abstract data type (ADT). Give two
reasons why use of ADTs is good programming practice.
A data type is a collection of values and a set of operations on those values. That collection and
these operations form a mathematical construct that may be implemented with the use of a
particular hardware or software data structure. The term abstract data type (ADT) refers to the
basic mathematical concept that defines the data type. We have discussed four different
implementations of the list data structure.
In case of implementation of the list with the use of an array, the size of the array gives difficulty
if increased.
To avoid this, we allocate memory dynamically for nodes before connecting these nodes with the
help of pointers.
For this purpose, we made a singly linked list and connected it with the next pointer to make a
chain.
Moving forward is easy but going back is a difficult task.
To overcome this problem, we made a doubly linked list using prev andnext pointers. With the
help of these pointers, we can move forward and backward very easily. Now we face another
problem that the prev pointer of first node and the next pointer of the last node are NULL.
Therefore, we have to be careful in case of NULL pointers. To remove the NULL pointers, we
made the circular link list by connecting the first and last node.
The program employing the list data structure is not concerned with its implementation.
We do not care how the list is being implemented whether through an array, singly linked list,
doubly linked list or circular linked list. It has been witnessed that in these four implementations
of the list, the interface remained the same i.e. it implements the same methods like add, get,
next, start a.
ECMAScript is the name of the international standard that defines JavaScript. ES6 → ECMAScript 2015. Latest ECMAScript version is ES7 which is ECMAScript 2016.
Basically it is a superset of es5
MATLAB stands for Matrix Laboratory. MATLAB was written originally
to provide easy access to matrix software developed by the LINPACK (linear system package) and matlab 2012a manual pdf
Description 1) Create a Lab2 folder for this project2.docxtheodorelove43763
Description
1) Create a Lab2 folder for this project
2) Use the main driver program (called Writers.java) that I provide below to write files of differing types. You can copy and paste this code, but make sure the spaces variable copies correctly. The copy and paste operation eliminates the spaces between the quotes on some systems.
3) In the writers program, fill in the code for the three classes (Random, Binary, and Text). In each class, you will need a constructor, a write method, and a close method. The constructor opens the file, the write method writes a record, and the close method closes the file.
4) Other than what I just described, don't change the program in any way. The program asks for a file type (random, binary, or text) and the name of the file to create. In a loop it inputs a person's name (string), a person's age (int), and a person's annual salary (double). It writes to a file of the appropriate type. The loop terminates when the user indicates that inputting is complete. The program then asks if another file should be created. If the answer is yes, the whole process starts again. This and all of the java driver programs should be saved in your lab2 folder but not in the cs258 sub-folder.
5) Note: The method signatures for accessing all of the three types of files (binary, random, and text) are on the class web-site. Go to power point slides and click on week two. This will help if you didn't take accurate notes in class.
6) Write a main program to read binary files (BinReader.java). This program only needs to be able to read and display records from a Binary file that was created by the writers program.
7) Write a main program to read random files (RandReader.java). This program only needs to be able to read and display records from a Binary file that was created by the writers program. Make sure that this program reads and displays records in reverse order. DO NOT USE AN ARRAY!!!
8) In your Lab2 folder, create a subfolder within lab2 named cs258. Download Keyboard.java from the class web-site to that folder. Add a new first line of Keyboard.java with the statement, package cs258;. This line will make Keyboard.java part of the cs258 package. The driver program shown below has an import ‘cs258.*;’ statement to access the java files in this package.
9) Modify Keyboard.java. We want to extend this class so it can be extended to allow access to multiple files. The changes follow:
a. Remove all static references. This is necessary so that there will be an input stream variable (in) in each object.
b. Change the private modifier of the in and current_token variables to protected. Change the private modifier to protected in all of the signature lines of the overloaded getNextToken methods.
c. Create a constructor that instantiates the input stream for keyboard input. Remove the instantiation from the original declaration line for the in variable. The constructor doesn't need any parameters.
10)Create a class TextR.
PART B Please response to these two original posts below. Wh.docxsmile790243
PART B
Please response to these two original posts below. When
responding to these posts, please either expand the
thought, add additional insights, or respectfully disagree
and explain why. Remember that we are after reasons
and arguments, and not simply the statement of
opinions.
Original Post 1
Are human lives intrinsically valuable? If so, in virtue of what? (Is
it our uniqueness, perhaps, or our autonomy, or something else?)
To begin, I would like to remind us that being intrinsically valuable
means having values for just being us and nothing else. I believe
that human lives are intrinsically valuable in virtue of our
uniqueness. As a bio nerd, I would like to state the fact that there
are a lot of crossover events during meiosis, which create trillions
of different DNA combinations. Hence, from a biological
standpoint, without considering other aspects, being you is
already valuable because you are that one sperm that won the
race and got fertilized. On a larger scale, there are hardly two
people whose look and behaviors are the same in the same
family, unless they are identical twins. However, identical twins
still act differently and have differences (such as fingerprints).
Since we are raised in different families, we are taught different
things and have different cultures. In general, we all have
different genetic information, appearances, personalities, senses
of humor, ambitions, talents, interests and life experiences. These
characteristics make up our “unique individual value” and make
us so unique and irreplaceable.
I would also love to discuss how our diversities enrich and
contribute to society, but that would be a talk about our extrinsic
values.
Original Post 2
Are human lives intrinsically valuable? If so, in virtue of what? (Is
it our uniqueness, perhaps, or our autonomy, or something else?)
I believe that human lives are intrinsically valuable due to a
number of reasons. Firstly, human lives aren’t replaceable. You
can’t replace a human being with another just like you can
replace a broken laptop with brand new one. Part of the reason
why we tend to think this way is that we were nurtured with the
notion that there is, indeed, a special value to human life. This
could be in virtue of our uniqueness-- the fact that we are
sentient and capable of complex thoughts and emotions
separates us from any other species on this planet. From a
scientific standpoint, this is also one of the reasons as to why
humans became the dominant species in today’s age.
Moreover, human lives aren’t disposable. I think this is largely due
to us humans having the ability to empathize with others. We
understand that it’s morally inappropriate to take the life of
another individual even if they’re complete strangers because
they’re another human being like us who has their own thoughts,
values, memories, and stories. In a way, we have a strong
emotional connection to our own species. As .
Part C Developing Your Design SolutionThe Production Cycle.docxsmile790243
Part C Developing Your Design
Solution
The Production Cycle
Within the four stages of the design workflow there are two distinct parts.
The first three stages, as presented in Part B of this book, were described
as ‘The Hidden Thinking’ stages, as they are concerned with undertaking
the crucial behind-the-scenes preparatory work. You may have completed
them in terms of working through the book’s contents, but in visualisation
projects they will continue to command your attention, even if that is
reduced to a background concern.
You have now reached the second distinct part of the workflow which
involves developing your design solution. This stage follows a production
cycle, commencing with rationalising design ideas and moving through to
the development of a final solution.
The term cycle is appropriate to describe this stage as there are many loops
of iteration as you evolve rapidly between conceptual, practical and
technical thinking. The inevitability of this iterative cycle is, in large part,
again due to the nature of this pursuit being more about optimisation rather
than an expectation of achieving that elusive notion of perfection. Trade-
offs, compromises, and restrictions are omnipresent as you juggle ambition
and necessary pragmatism.
How you undertake this stage will differ considerably depending on the
nature of your task. The creation of a relatively simple, single chart to be
slotted into a report probably will not require the same rigour of a formal
production cycle that the development of a vast interactive visualisation to
be used by the public would demand. This is merely an outline of the most
you will need to do – you should edit, adapt and participate the steps to fit
with your context.
There are several discrete steps involved in this production cycle:
Conceiving ideas across the five layers of visualisation design.
Wireframing and storyboarding designs.
Developing prototypes or mock-up versions.
219
Testing.
Refining and completing.
Launching the solution.
Naturally, the specific approach for developing your design solution (from
prototyping through to launching) will vary hugely, depending particularly
on your skills and resources: it might be an Excel chart, or a Tableau
dashboard, an infographic created using Adobe Illustrator, or a web-based
interactive built with the D3.js library. As I have explained in the book’s
introduction, I’m not going to attempt to cover the myriad ways of
implementing a solution; that would be impossible to achieve as each task
and tool would require different instructions.
For the scope of this book, I am focusing on taking you through the first
two steps of this cycle – conceiving ideas and wireframing/storyboarding.
There are parallels here with the distinctions between architecture (design)
and engineering (execution) – I’m effectively chaperoning you through to
the conclusion of your design thinking.
To fulfil this, Part C presents a detailed breakdown of the many design
.
PART A You will create a media piece based around the theme of a.docxsmile790243
PART A:
You will create a media piece based around the theme of “alternative facts.
Fake News:
Create a
series of 3
short, “fake news” articles or news videos. They should follow a specific theme. Make sure to have a clear understanding of WHY your fake news is being created (fake news is used by people, groups, companies, etc to convince an unsuspecting audience of something. It’s supposed to seem real, but the motivation behind it is to deceive. As part of this option, consider what your motivations are for your deception).
Part A: should be around 750 words for written tasks (or 250 for each 3 part task)
PART B:
The focus for this assignment is to demonstrate a
clear understanding of media conventions
, as well as
purpose
and
audience
. Therefore, along with your media product, you’ll also be required to submit a short
reflection
detailing why you created your product and for whom it was intended. You must discuss and analyze the elements within your media product (including why & how you used the persuasive techniques of ethos, logos and pathos) as well as the other elements of media you used and why.
.
Part 4. Implications to Nursing Practice & Implication to Patien.docxsmile790243
Part 4. Implications to Nursing Practice & Implication to Patient Outcomes
Provide a paragraph summary addressing the topics implications to nursing practice and patient outcomes. This section is NOT another review of the literature or introduction of new topics related to the PICOT question.
You may find if helpful to begin each topic with -
Nurses need to know …
Important patient outcomes include …
Example
– please note this is an older previous students work and so some references are older than 5 years.
Be sure to provide the PICOT question to begin this post.
PICOT Question:
P=Patient Population
I=Intervention
C=Comparison
O=Outcome
T=Time (duration):
In patients in the hospital, (P)
how does frequently provided patient hand washing (I)
compared with patient initiated hand washing (C)
affect hospital acquired infection (O)
within the hospital stay (T)
Implications to Nursing Practice & Patient Outcomes
Nurses need to know that they play a significant role in the reduction of hospital acquired infection by ensuring by health care workers and patients wash hands since nurses have the most interactions with patients. Implementing hand hygiene protocol with patients can enhance awareness and decrease healthcare associated infection (HAI). Both nurses and patients need to know that HAI is associated with increased morbidity and mortality as well cost of treatment and length of hospital stay. Nurses and patients also need to know that most HAI is preventable. Gujral (2015) notes that proper hand hygiene is the single most important, simplest, and least expensive means of reducing prevalence of HAI and the spread of antimicrobial resistance. Nurse and patient hand washing plays a vital role in decreasing healthcare costs and infections in all settings.
References
Gujral, H. (2015.) Survey shows importance of hand washing for infection prevention. American Nurse Today, 10 (10), 20. Retrieved from hEp://www.nursingworld.org/AmericanNurseToday
.
PART AHepatitis C is a chronic liver infection that can be e.docxsmile790243
PART A
Hepatitis C is a chronic liver infection that can be either silent (with no noticeable symptoms) or debilitating. Either way, 80% of infected persons experience continuing liver destruction. Chronic hepatitis C infection is the leading cause of liver transplants in the United States. The virus that causes it is blood borne, and therefore patients who undergo frequent procedures involving transfer of blood are particularly susceptible to infection. Kidney dialysis patients belong to this group. In 2008, a for-profit hemodialysis facility in New York was shut down after nine of its patients were confirmed as having become infected with hepatitis C while undergoing hemodialysis treatments there between 2001 and 2008.
When the investigation was conducted in 2008, investigators found that 20 of the facility’s 162 patients had been documented with hepatitis C infection at the time they began their association with the clinic. All the current patients were then offered hepatitis C testing, to determine how many had acquired hepatitis C during the time they were receiving treatment at the clinic. They were considered positive if enzyme-linked immunosorbent assay (ELISA) tests showed the presence of antibodies to the hepatitis C virus.
Health officials did not test the workers at the hemodialysis facility for hepatitis C because they did not view them as likely sources of the nine new infections. Why not?
Why do you think patients were tested for antibody to the virus instead of for the presence of the virus itself?
Ref.: Cowan, M. K. (2014) (4th Ed.). Microbiology: A Systems Approach, McGraw Hill
PART B
Summary:
Directions for the students: There are 4 essay questions. Please be sure to complete all of them with thorough substantive responses. Current APA Citations are required for all responses.
1. Precisely what is microbial death?
2. Why does a population of microbes not die instantaneously when exposed to an antimicrobial agent?
3. Explain what is wrong with this statement: “Prior to vaccination, the patient’s skin was sterilized with alcohol.” What would be a more correct wording?
4. Conduct additional research on the use of triclosan and other chemical agents in antimicrobial products today. Develop an opinion on whether this process should continue, providing evidence and citations to support your stance.
.
Part A post your answer to the following question1. How m.docxsmile790243
Part A post
your answer to the following question:
1. How might potential reactions to an adolescent’s questioning of their sexual identity, or gender role, impact their social environment, behavior and self-esteem?
2. As social workers, what role can we play in assuring the best outcomes for these adolescents?
Please use the Learning Resources to support your answer.
Part B
post
your answer to the following question:
1. How can social workers work toward assuring the best outcomes for adolescents questioning their sexual orientation or gender identity.
Please use the Learning Resources to support your answer.
.
PART BPlease response to these two original posts below..docxsmile790243
PART B
Please response to these two original posts below. When responding to
these posts, please either expand the thought, add additional insights, or
respectfully disagree and explain why. Remember that we are after reasons
and arguments, and not simply the statement of opinions.
Original Post 1
"What is moral relativism? Why might people be attracted to it? Is
it plausible?"
First of all, moral relativism is the view that moral truths are
subjective and depend on each individual's standpoints. Based
on this, everyone's moral view is legitimate. This can be attracted
because it sounds liberating and there is no need to argue for a
particular position. Moral relativism seems convincing in some
cases. For example, some people are okay with giving money to
homeless people, thinking that it's good to provide for the people
in need. Some people, on the other hand, claim that they can
work to satisfy their own needs. Moral relativism works well in
these cases because they all seem legitimate. However, there are
cases that moral relativism does not seem reasonable. For
example, child sacrifice in some cultures seems cruel and
uncivilized to most people. Hence, moral relativism is not
absolutely true.
Original Post 2
“Is your death bad for you, specifically, or only (at most) for others? Why
might someone claim that it isn’t bad for you?”
I'd start off by acknowledging what the two ancient philosophers,
Lucretius and Epicurus, outlined about death. They made the
point that death isn't necessarily bad for you since no suffering
takes place and that you yourself don't realize your own death. In
this way, one could make the claim that death isn't intrinsically
bad for you.
Another perspective I wanted to add was the influence of death
(both on you and others around you). Specifically, the event of
death itself may not be bad for you, but the idea of impending
death could impact one's life. Some may live freely, totally care-
free, accepting of death and enjoy life in the moment. Others may
be frightened by the idea of death that they live in constant fear
and hence death causing their mental health to take its toll. In
this way, I'd argue that death could, in fact, be bad for you. One
common reason for being afraid of death is the fear of being
forgotten. Not to mention the death of an individual certainly
affects others; death doesn't affect one's life but also all that is
connected to it. Focusing back to the point, it's clear that the
very idea of death directly affects the concerned individual. The
fact that those who live in fear of death are looking for legacies
and footprints to leave after they leave this world is telling of how
death could be arguably bad for you before it even happens.
PART A
Pick one or more questions below and write a substantive post
with >100 words. Please try to provide evidence(s) to support
your idea(s).
Questions:
• Do we have a duty to work out whe.
Part A (50 Points)Various men and women throughout history .docxsmile790243
Part A (50 Points):
Various men and women throughout history have made important contributions to the development of statistical science. Select any one (1) individual from the list below and write a 2 page summary of their influence on statistics. Be specific in detail to explain the concepts they developed and how this advanced our understanding and application of statistics.
Florence Nightingale
Francis Galton
Thomas Bayes
Part B (50 Points):
Select any one statistical concept you learned in this course and explain how it can be applied to our understanding of the Covid-19 pandemic (2 pages). You should use a specific example and include at least one diagram to illustrate your answer.
Please note: Your work must be original and not copied directly from other sources. No citations are needed. Be sure to submit this assignment in Blackboard on the due date specified.
.
Part A:
1. K
2. D
3. N
4. C
5. A
6. O
7. F
8. Q
9. H
10. M
11. S
12. Y
13. I
14. U
15. X
Part B:
1.
A. UTI is short form for Urinary tract infection. Means infection which affects organs of urinary tract. Such as urethra, urinary bladder and kidney. This are main organ for formation of urine and helps to expel it out of body.
B. Kidneys, urethra and urinary bladder gets affected during Urinary tract infection. Generally infection begins with urethra then travels to kidney.
When only lower part gets affected which is called lower UTI also cystitis because involves bladder
And when infection spread to upper side involving kidneys known as pyelonephritis.
2.
A. Microorganism in UTI
Escherichia coli
Klebsiella pneumoniae
B. Coli bacteria lives in intestine. So they also seen near anal canal. From which gets transferred to urethra.
C. Bacteria enters urinary tract from urethra. In very less cases kidney gets infected by blood stream.
3.
Signs and symptoms:
A) Pain with urination:
The infection cause inflammation of urinary tract, the urine from the inflammed urinary tract cause pain in urination.
B) orange or red colour urine:
The inflammation of urinary tract may cause a orange or red colour urine. It is common sign in UTI due to inflammation of urinary tract.
4.
UTI:
Urinary tract infection (UTI) any infection on the urinary tract causing difficult in urination. It most commonly affects the woman because thet are more prone to it.
Diagnosis And treatment:
A) The diagnostic test for UTI:
The two major diagnostic test for UTI are:
Urinalysis:
Urine is collected from the patient who came for test. This test shows the bacterial or any infectious organism in the urine.
The collected urine sample is added to the substance which promotes the growth of the organism in the urine.
If the growth is organism doesn't takes place then the test is negative.
If the organism growth in the urine takes place then the test is positive.
Ultra sound:
The sound waves from the transducer of ultra produce a imaging of the internal organs.
Patient lower abdomen is scanned by ultra sound to detect any abnormality in the organs and structures of urinary tract.
B) The medications for UTI are antibiotics or antimicrobial.
The two drugs are amoxicillin, sulfasulfamethaxazole.
Both of these drugs act on UTI by fighting against the microorganisms in the UTI. By assisting the immune system, it fight against the microorganisms and that relieves the symptoms of UTI.
5.
answer. a) In women at the time of pregnancy the drainage system from the kidney towards bladder become wide, hence, urine does not pass out as quickly. This makes it easier to get an infection. Similarly women has shorter urethra than a man have, the shorter distance make the way easy to bacteria to travel into the bladder.
b) There are no of ways by which women can reduce the risk of getting UTI. Like women should drink plenty of water this will help of getting rid from UTI, a women should protect their urethra .
Part A Develop an original age-appropriate activity for your .docxsmile790243
Part A:
Develop an original age-appropriate activity for your preschool class using
one
of the following.
Froebel’s cube gift
Froebel’s parquetry gift
Lincoln Logs
Describe the activity that you have developed.
Identify at least two (2) skills that the activity would help develop.
Part B:
Develop an original age-appropriate activity for your preschool class promoting the same skill(s) as the activity above, but develop the activity based on the Montessori method.
Describe the activity that you have developed.
What are at least two key differences between the two activities you developed?
.
Part 3 Social Situations2. Identify multicultural challenges th.docxsmile790243
Part 3: Social Situations
2. Identify multicultural challenges that your chosen individual may face as a recent
refugee.
• What are some of the issues that can arise for someone who has recently
immigrated to a new country?
• Explain how these multicultural challenges could impact your chosen individual’s
four areas of development?
3. Suggest plans of action or resources that you feel should be provided to this family to
assist them in proper develop
Part 3: Social Situations
• Proposal paper which identifies multicultural challenges that your chosen individual may face as a recent refugee.
• Suggested plan of action and/or resources which should be implemented to address the multicultural challenges.
• 2-3 Pages in length
• APA Formatting
• Submission will be checked for plagiaris
.
Part A (1000 words) Annotated Bibliography - Create an annota.docxsmile790243
Part A
(1000 words): Annotated Bibliography - Create an annotated bibliography that focuses on ONE particular aspect of current Software Engineering that face a world with different cultural standards. At least seven (7) peer-reviewed articles must be used for this exercise.
Part B
(3000 words):
Research Report
- Write a report of the analysis and synthesis using the
(Part A
) foundational
Annotated Bibliography
.
Part C (500 words): Why is it important to try to minimize complexity in a software system.
Part D (500 words): What are the advantages and disadvantages to companies that are developing software products that use cloud servers to support their development process?
Part E (500 words): Explain why each microservice should maintain its own data. Explain how data in service replicas can be kept consistent?
.
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxsmile790243
Part 6: Disseminating Results
Create a 5-minute, 5- to 6-slide narrated PowerPoint presentation of your Evidence-Based Project:
· Be sure to incorporate any feedback or changes from your presentation submission in Module 5.
· Explain how you would disseminate the results of your project to an audience. Provide a rationale for why you selected this dissemination strategy.
Points Range: 81 (81%) - 90 (90%)
The narrated presentation accurately and completely summarizes the evidence-based project. The narrated presentation is professional in nature and thoroughly addresses all components of the evidence-based project.
The narrated presentation accurately and clearly explains in detail how to disseminate the results of the project to an audience, citing specific and relevant examples.
The narrated presentation accurately and clearly provides a justification that details the selection of this dissemination strategy that is fully supported by specific and relevant examples.
The narrated presentation provides a complete, detailed, and specific synthesis of two outside resources related to the dissemination strategy explained. The narrated presentation fully integrates at least two outside resources and two or three course-specific resources that fully support the presentation.
Written Expression and Formatting—Paragraph Development and Organization:
Paragraphs make clear points that support well-developed ideas, flow logically, and demonstrate continuity of ideas. Sentences are carefully focused—neither long and rambling nor short and lacking substance. A clear and comprehensive purpose statement and introduction is provided which delineates all required criteria.
Points Range: 5 (5%) - 5 (5%)
Paragraphs and sentences follow writing standards for flow, continuity, and clarity.
A clear and comprehensive purpose statement, introduction, and conclusion is provided which delineates all required criteria.
Written Expression and Formatting—English Writing Standards:
Correct grammar, mechanics, and proper punctuation.
Points Range: 5 (5%) - 5 (5%)
Uses correct grammar, spelling, and punctuation with no errors.
Evidenced Based Change
Leslie Hill
Walden University
Introduction/PurposeChange is inevitable.Health care organizations need change to improve.There are challenges that need to be addressed(Baraka-Johnson et al. 2019).Challenges should be addressed using evidence-based research.These changes enhance professionalism therefore improving quality of care and quality of life.The purpose of this paper is to identify an existing problem in health care and suggest a change idea that would be effective in addressing the problem. The paper also articulates risks associated with the change process, how to distribute the change information and how to implement change successfully.
Organizational CultureThe Organization is a hospice facilityOffers end of life care for pain and symptom managementThe health care providers cu.
Part 3 Social Situations • Proposal paper which identifies multicul.docxsmile790243
Part 3: Social Situations • Proposal paper which identifies multicultural challenges that your chosen individual may face as a recent refugee. • Suggested plan of action and/or resources which should be implemented to address the multicultural challenges. • 2-3 Pages in length • APA Formatting • Submission will be checked for plagiarism
Part 3: Social Situations 2. Identify multicultural challenges that your chosen individual may face as a recent refugee. • What are some of the issues that can arise for someone who has recently immigrated to a new country? • Explain how these multicultural challenges could impact your chosen individual’s four areas of development? 3. Suggest plans of action or resources that you feel should be provided to this family to assist them in proper development.
.
Part 3 Social Situations 2. Identify multicultural challenges that .docxsmile790243
Part 3: Social Situations 2. Identify multicultural challenges that your chosen individual may face as a recent refugee. • What are some of the issues that can arise for someone who has recently immigrated to a new country? • Explain how these multicultural challenges could impact your chosen individual’s four areas of development? 3. Suggest plans of action or resources that you feel should be provided to this family to assist them in proper development.
Part 3: Social Situations • Proposal paper which identifies multicultural challenges that your chosen individual may face as a recent refugee. • Suggested plan of action and/or resources which should be implemented to address the multicultural challenges. • 2-3 Pages in length • APA Formatting • Submission will be checked for plagiarism
.
Part 2The client is a 32-year-old Hispanic American male who c.docxsmile790243
Part 2
The client is a 32-year-old Hispanic American male who came to the United States when he was in high school with his father. His mother died back in Mexico when he was in school. He presents today to the PMHNPs office for an initial appointment for complaints of depression. The client was referred by his PCP after “routine” medical work-up to rule out an organic basis for his depression. He has no other health issues except for some occasional back pain and “stiff” shoulders which he attributes to his current work as a laborer in a warehouse. the “Montgomery- Asberg Depression Rating Scale (MADRS)” and obtained a score of 51 (indicating severe depression). reports that he always felt like an outsider as he was “teased” a lot for being “black” in high school. States that he had few friends, and basically kept to himself. He also reports a remarkably diminished interest in engaging in usual activities, states that he has gained 15 pounds in the last 2 months. He is also troubled with insomnia which began about 6 months ago, but have been progressively getting worse. He does report poor concentration which he reports is getting in “trouble” at work.
· Decision #1: start Zoloft 25mg orally daily
· Which decision did you select?
· Why did you select this decision? Support your response with evidence and references to the Learning Resources.
· What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
· Explain any difference between what you expected to achieve with Decision #1 and the results of the decision. Why were they different?
· Decision #2: Client returns to clinic in four weeks, reports a 25% decrease in symptoms but concerned over the new onset of erectile dysfunction
*add Augmentin Wellbutrin IR 150mg in the morning
· Why did you select this decision? Support y our response with evidence and references to the Learning Resources.
· What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
· Explain any difference between what you expected to achieve with Decision #2 and the results of the decision. Why were they different?
· Decision #3: Client returns to clinic in four weeks, Client stated that depressive symptoms have decreased even more and his erectile dysfunction has abated
· Client reports that he has been feeling “jittery” and sometimes “nervous”
*change to Wellbutrin XL 150mg daily
· Why did you select this decision? Support your response with evidence and references to the Learning Resources.
· What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
· Explain any difference between what you expected to achieve with Decision #3 and the results of the decision. Why were they different?
Explain how ethical considerations might impact your treatment plan and communication with clients.
Conclusion.
Part 2For this section of the template, focus on gathering deta.docxsmile790243
Part 2:
For this section of the template, focus on gathering details about common, specific learning disabilities. These disabilities fall under the IDEA disability categories you researched for the chart above. Review the textbook and the topic study materials and use them to complete the chart.
Learning Disability Definition Characteristics Common Assessments for Diagnosis Potential Effect on Learning and Other Areas of Life Basic Strategies for Addressing the Disability
Attention Deficit Hyperactivity Disorder (ADHD)
Auditory Processing Disorder (APD)
Dyscalculia
Dysgraphia
Dyslexia
Dysphasia/Aphasia
Dyspraxia
Language Processing Disorder (LPD)
Non-Verbal Learning Disabilities
Visual Perceptual/Visual Motor Deficit
.
Part 2 Observation Summary and Analysis • Summary paper of observat.docxsmile790243
Part 2: Observation Summary and Analysis • Summary paper of observation findings for each area of development and connection to the observed participant. • Comprehensive description of the observed participant. • Analyzed observation experience with course material to determine whetherthe participant is developmentally on track for each area of development. • 4 Pages in length • APA Formatting • Submission will be checked for plagiarism
Part 2: Observation Summary and Analysis 1. Review and implement any comments from your instructor for Part 1: Observation. 2. Describe the participant that you observed. • Share your participant’s first name (can be fictional name if participant wants to remain anonymous), age, physical attributes, and you initial impressions. 3. Analyze your observation findings for each area of development (physical, cognitive, social/emotional, and spiritual/moral). • Explain how your observations support the 3-5 bullets for each area of development that you identified in your Development Observation Guidefrom Part 1: Observation. • Explain whether or not your participant is developmentally on track for each area of development. 4. What stood out the most to you about the observation? 5. Include at least 2 credible sources
.
Part 2 Observation Summary and Analysis 1. Review and implement any.docxsmile790243
Part 2: Observation Summary and Analysis 1. Review and implement any comments from your instructor for Part 1: Observation. 2. Describe the participant that you observed. • Share your participant’s first name (can be fictional name if participant wants to remain anonymous), age, physical attributes, and you initial impressions. 3. Analyze your observation findings for each area of development (physical, cognitive, social/emotional, and spiritual/moral). • Explain how your observations support the 3-5 bullets for each area of development that you identified in your Development Observation Guidefrom Part 1: Observation. • Explain whether or not your participant is developmentally on track for each area of development. 4. What stood out the most to you about the observation? 5. Include at least 2 credible sources
Part 2: Observation Summary and Analysis • Summary paper of observation findings for each area of development and connection to the observed participant. • Comprehensive description of the observed participant. • Analyzed observation experience with course material to determine whetherthe participant is developmentally on track for each area of development. • 4-6 Pages in length • APA Formatting • Submission will be checked for plagiarism
.
Part 2Data collectionfrom your change study initiative,.docxsmile790243
Part 2:
Data collection
from your change study initiative, sample, method, display of the results of the data itself, process, and method of analysis (graphs, charts, frequency counts, descriptive statistics of the data, narrative)
Part 3: Interpretation of the results of the Data
Collection and
Analysis, address likely resistance, and provide recommendations for continuing
the study
or evaluating your change study/initiative.
.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. Lab 1: Recursion
Introduction
Tracery (tracery.io) is a simple text-expansion language made
by one of your TAs as a
homework assignment for one of Prof. Mateas's previous
courses. It now has tens of
thousands of users, and runs about 7000 chatbots on Twitter
(you never know where a
homework will take you!).
Tracery uses context-free grammars
( https://en.wikipedia.org/wiki/Context-free_grammar) to store
information about how to
expand rules. A Tracery grammar is a set of keys, each of which
has some set of
expansions that can replace it. In our version, the line
"beverage:tea|coffee|cola|milk" means that the symbol
"beverage" can be
replaced with any of those four options. You replace a symbol
whenever you see it in
hashtags. This rule "#name# drank a glass of #beverage#" will
have the "name"
and "beverage" symbols replaced with expansions associated
with those symbols. In
the case of the "beverage" rule above, which has four possible
expansions, one will be
picked at random. If the replacement rule also has hashtags in
it, we replace those, and
if those replacements have hashtags.... we keep replacing things
2. until all the hashtags
are gone, recursively.
In this assignment, you will be implementing a simplified
version of Tracery in Java, and
then using it to generate generative text. You will also be
writing your own grammar to
generate new texts (hipster cocktails, emoji stories, or nonsense
poems).
Outline
● Compile and run a Java program
● Save all the arguments
● Load the Tracery files
● Output all the rules
● Expand rules and print them to the screen
Compile and run a Java program
This program has several files (Rule.java, and
TraceryRecursion.java). We can't
run these files as code, as we would with other “interpreted”
languages (like Javascript
https://en.wikipedia.org/wiki/Context-free_grammar
or Python). For Java, we need the computer to put them all
together and translate it to
machine code, in a process called “compiling”.
You will compile and run your Java program from the command
line. When you see $,
this means that it is a command that you will enter in the
command line. Windows and
3. Unix (such as Linux or the Mac terminal) command lines are a
little different, be sure
you know the basics of navigating the one you are using.
Do you have Java installed on your machine? What version?
Let's find out! Type the
following into your command line: $ javac -version $ java -
version You should
have at least Javac 1.8 and Java 1.8 (often called “Java 8”)
installed. If that's not the
case, this is a good time to fix that by updating your Java. We
will be using some
features of Java 8 in this class.
Compile your java program.
$ javac TraceryRecursion.java
So far, it will compile without errors.
Look in the folder, and you will see that you have a new file
TraceryRecursion.class.
This is the compiled version of your file. You can now run this
file by typing:
$ java TraceryRecursion
You should get the output Running TraceryRecursion....
Try typing javac TraceryRecursion or java
TraceryRecursion.java. Both of these
should give your errors. Compiling requires the .java extension,
and running requires
not having it. But it’s easy and common to misremember that,
so look at what there
errors look like, so that when it happens later, you know what
4. caused it.
You can compile and run in separate steps. But sometimes you
want to compile and run
with one line, and you can combine them like this:
$ javac TraceryRecursion.java && java TraceryRecursion .
Store arguments
Many java programs need outside information provided by the
user. This lets users
change the behavior of the program (or tell it which data to use)
without having to
modify the source code.
The main method of TraceryRecursion will be the first method
called when running
the program. This method is static, meaning that the method is
associated directly
with a class and can thus be called without creating an object
that is an instance of the
class, and its return type is void, meaning that it won't return
anything. It also has
parameters, an array of Strings called args (you could call this
parameter anything, but
the tradition is to call it args or arguments).
Our program will take 0-4 arguments:
● the name of the file containing the grammar (e.g.:
"grammar.txt")
● the starting symbol to begin the grammar expansion (e.g.:
"#story#")
● the number of times we want to perform that expansion (e.g:
5. "5")
● a seed value for the random number generator (e.g: "123")
(Seeded random
values allow us to make the random generator predictable)
You can see that in main, each variable is given a default value.
For example, if no seed
value is given in the arguments, the seed value will be the
current time (this means you
will get different random results each time you run the program,
unless a specific seed
is specified in the arguments).
TODO #1
For each of these parameters, test whether enough arguments
have been specified to
set that parameter. For example, to set the grammarFile
parameter there would have
to be at least one argument given. You can test the length of the
args array to
determine how many arguments have been passed in. Override
each of these default
parameters with its argument override. For the numbers, you
will need to use
Integer.parseInt and Long.parseLong to turn the arguments from
Strings into
numbers. NOTE: Do not add or remove code outside of the
START and END
comments. Keeping all your code between those two comments
will help us
grade your work.
Load a Tracery file
6. Java has many helpful built-in data structures: Lists, Arrays,
and Hashtables are only a
few of them. In this assignment, we will be loading and storing
a Tracery grammar as a
Hashtable. The Hashtable has a list of keys, and each key has
some data associated
with it, much like a dictionary stores words with their
definition. Hashtables come with
some helpful methods included:
● table.get(String s) returns the data for that key, but it will
throw an error if
that key is not in the table.
● table.put(String s, DATA) creates an entry for that key (or
replaces it) and
stores the data there.
In this part of the assignment, we will implement loadGrammar,
which takes a String
representing a file path, then loads a file, parses it (breaking it
into sections), and stores
it in our grammar object.
In the loadGrammar method, we have already added the line
that creates the
Hashtable. You can see that the data type has a weird ending
<String, Rule[]>,
which tells Java that this Hashtable uses Strings to look up
arrays of Rules, so if we try
to use numbers as look up values, or store Strings instead of
arrays of Rules, Java
knows to throw an error.
7. We also included a basic way to load a file. Loading files might
cause an IO exception
(for example, if the file does not exist), so for complex reasons,
we need to have the
loading line
new String(Files.readAllBytes(Paths.get(path)))
wrapped in a try/catch block. We will talk more about throwing
and catching
exceptions later this quarter. For right now, this loads a whole
file as a string. By
appending .split('r?n') on the end, we take the resulting string
and splits it into
an array of lines.
TODO #2
For each line in the array of lines, store the data in the grammar
hashtable. You can use
either a familiar for (int i = 0...) loop, or use the newer for
(String line:
lines) loop, if you don't need to see the index value.
We used the split String method above to split apart the file into
lines. Use split
again, but splitting on the character ":". Everything before the
":" is the key. Store it in
a variable named key. Everything after it is the rule
expansion(s).
First split apart the rules into an array of Strings. For each line
in the file, this will give
you a String array of length 2, where the first element of the
array is an expandable
symbol (which will be a key in the grammar hashtable), and the
8. second element of the
array is the expansion(s) for this symbol. But there is possibly
more than one expansion
for a symbol. If you look at the grammar files, you can see
where there is more than one
expansion for a symbol when there's a comma-delimited list of
expansions after a
symbol. So we have to further split the expansions into an array
of Strings, one for each
expansion (by splitting on ",").
Once you have an array of Strings (of expansions) we have to
turn it into an array of
Rules. Initialize an array, Rule[], of the right size. Use another
loop (inside the loop
iterating through lines) to iterate through your array of strings
and, for each expansion,
create a Rule (it takes a single string as a parameter), and add it
to your array of Rules.
You now have the right kind of data (Rule[]) to store in the
hashtable.
Store your data in grammar. What was that method that stores
data in a grammar (hint:
we describe it above)?
In the main() method there's already a call to outputGrammar;
this prints your grammar
to the console, so you can verify that it loaded it correctly (that
the correct expansions
are associated with the correct symbols).
Implementing Recursion
9. Now that you have successfully loaded a file and stored it as a
Hashtable<String,
Rule[]> grammar, we can implement the method that generates
the generative text!
Open up Rule.java, and look at the constructor for this class:
Rule(String raw).
This constructor takes the string that you passed to it in TODO
#2 and splits it into
sections (using "#"). The even indexed entries of sections are
plain text (ie. the zeroth,
second, fourth, etc.), and the odd indexed entries of the variable
sections are symbols
for expanding (ie. the first, third, fifth, etc.). This might seem a
bit confusing at first. In an
expansion like "once #character# and #character# went to a
#place#" it's
clear that splitting on # will cause the zeroth, second and fourth
elements (the even
elements) to be plain text (i.e. "once", "and" and "went to a")
and the first, third and
fifth elements (the odd elements) to be symbols (i.e.
"#character#", "#character#",
"#place#"). But consider the expansion "#name# the #adjective#
#animal#".
Won't this even and odd approach get reversed, since the
expansion starts with a
symbol? It turns out it won't because, if there's a symbol at the
beginning, or two
symbols right next to each other, splitting on "#" produces two
strings, the empty string
(which is what is before the "#") and then the string with the
symbol (which is what is
after the "#", minus the closing "#" since we're splitting on "#").
So splitting this
expansion on # will produce the following array:
10. sections[0]: ""
sections[1]: "name"
sections[2]: "the"
sections[3]: "adjective"
sections[4]: ""
sections[5]: "animal"
So the even and odd relationship still works out, it's just that
two of our even entries are
the empty string (which is still plain text), which, when we
include it in the output of the
expansion, won't be visible, and so won't cause us any
problems. Phew! Now that we've
explained that we can get back to actually writing the code in
Rule.java to expand the
text.
The method expand takes a grammar (the type is
Hashtable<String, Rule[]>) as an
argument, and returns the expanded String. But right now, it
only returns a copy of its
original expansion (with any symbols not expanded). We want it
to instead recursively
expand the odd sections.
TODO #3
Create an array of Strings named results that is the same size as
the rule sections
( sections.length). This is where we will store the results of
expanding each section.
11. Create a for-loop that iterates down the sections array. Since we
need to know whether
each section is odd or even, you will need to use for (int i = 0
...), rather than
for (String section: sections) style loops. For each section, if it
is even ( i%2 ==
0), copy the text from the rule section into the results array.
If it is odd, then this is a symbol that we need to expand. Use
the grammar to find the
array of expansions for this symbol. We need to pick a
“random” index in the array, but
we will use the seeded random number generator (so we can
reproduce our results
using the same random seed). You can get a random int with
random.nextInt(int
bound). This will return a random integer between 0 (inclusive)
and the bound argument
you pass in (exclusive). Since you're randomly picking from an
array of possible
expansions, what's the largest random value you will want? Pick
out an expansion, and
save it as the variable Rule selectedExpansion.
We want to store that new value in our results array, but since is
is an expansion
string we need to process it first because it might contain
symbols that need to be
expanded as well. What method should you call on
selectedExpansion to do that?
Store the resulting text in the results array.
We now have results values for each section in this rule! Use
String.join("",
results) to join all of the results together into a single string
(with no spaces between
12. them), and return the results of that operation. This new return
statement should replace
the return statement that was in the starter code. That is, your
new return statement
should replace the line: return "[" + raw + "]";
Finishing up
Run your program. It should now output however many outputs
of the text you want (as
specified by the count parameter). Try it with and without a
seed value. Does it always
output something new? Try out a few other grammars, we
included
grammar-recipe.txt which makes bad recipes, and grammar-
emojistory.txt which
tells stories with emoji.
Now edit grammar-yourgrammar.txt. Create something
interesting (of about equal
complexity to grammar-story.txt). We won't judge you on what
it makes, consider this
a freeplay exercise. Some inspirational twitterbots include
@unicode_garden,
@DUNSONnDRAGGAN, @orcish_insults, @GameIdeaGarden ,
@indulgine,
@CombinationBot, @thinkpiecebot, @infinite_scream,
FartingEmoji.
Make sure your grammar generates without causing errors! We
didn't implement a
graceful way to recover from bad formatting or missing
symbols, so these grammars are
13. brittle, they break easily.
Turn in
Wow, you're done! Congrats on finishing your first 12B lab.
Checklist:
● Works for no command‑line arguments, a few, or all of them
● If a random seed is specified, the output stays consistent. If
not, it changes
● If you switch the grammar file, you get output from a
different grammar
● You have edited grammar-yourgrammar.txt and it runs.
To check that your code is right, compare it with the following
output. This output
assumes that you’re using Random.nextInt() to generate the
random numbers (as
described above). This is running TraceryRecursion with the
following arguments:
$ java TraceryRecursion grammar-story.txt "#origin#" 5 10
The output should be:
Running TraceryRecursion...
with grammar:'grammar-story.txt' startsymbol:'#origin#'
count:5 seed:10
Set seed 10
animal:cat,emu,okapi
emotion:happy,sad,elated,curious,sleepy
14. color:red,green,blue
name:emily,luis,otavio,anna,charlie
character:#name# the #adjective# #animal#
place:school,the beach,the zoo,Burning Man
adjective:#color#,#emotion#,
origin:once #character# and #character# went to #place#
GRAMMAR:
adjective: "#color#","#emotion#",
place: "school","the beach","the zoo","Burning Man",
emotion: "happy","sad","elated","curious","sleepy",
origin: "once #character# and #character# went to
#place#",
color: "red","green","blue",
name: "emily","luis","otavio","anna","charlie",
character: "#name# the #adjective# #animal#",
animal: "cat","emu","okapi",
once anna the green emu and anna the sleepy emu went to the
zoo
once emily the green emu and anna the green cat went to school
once charlie the blue okapi and otavio the blue emu went to
school
once emily the blue emu and otavio the blue cat went to the
beach
15. once emily the sad okapi and charlie the elated okapi went to
the zoo
To turn in your code:
● Create a directory with the following name: <student
ID>_lab1 where you
replace <student ID> with your actual student ID. For example,
if your student
ID is 1234567, then the directory name is 1234567_lab1.
● Put a copy of your edited TraceryRecursion.java, Rule.java
and
grammar-yourgrammar.txt files in the directory.
● Compress the folder using zip to create. Zip is a compression
utility available on
mac, linux and windows that can compress a directory into a
single file. This
should result in a file named <student ID>_lab1.zip (with
<student ID>
replaced with your real ID of course).
● Upload the zip file through the page for Lab 1 in canvas
( https://canvas.ucsc.edu/courses/12730/assignments/36933).
Additional resources
● How should I name things in Java?
https://www.javatpoint.com/java‑naming‑conventions
● Basic Java Syntax
16. https://www.tutorialspoint.com/java/java_basic_syntax.htm
● Need some in‑depth Java tutorials? There are free courses
online:
https://www.codecademy.com/learn/learn‑java ,
https://www.udemy.com/java‑tutorial/
● Command line basics:
https://hellowebbooks.com/learn‑command‑line/
● Get Linux/OSX style command line tools on Windows with
Cygwin
https://cygwin.com/install.html
https://canvas.ucsc.edu/courses/12730/assignments/36933
https://www.javatpoint.com/java%E2%80%91naming%E2%80%
91conventions
https://www.tutorialspoint.com/java/java_basic_syntax.htm
https://www.codecademy.com/learn/learn%E2%80%91java
https://www.udemy.com/java%E2%80%91tutorial/
https://hellowebbooks.com/learn%E2%80%91command%E2%80
%91line/
https://cygwin.com/install.html
Utilizing the readings from the text and your research, provide
an in-depth analysis of 3 social media platforms and how
businesses are utilizing them to reach new and existing
customers. Specific groups to be addressed are Generation X,
Generation Y, Millennials, Baby Boomers, and 60+ market
segments.
An example of a discussion idea is to research the trend toward
mobility in social media and write a paper on how the different
markets described in your Week 1 Individual Project use
technology.
Note: Research is to be academic or professional in scope. Use
of blogs, personal Web sites, corporate Web sites, wikis, or
17. other social-media-related sources are not acceptable.
A minimum of 4 pages is required. Title and abstract pages do
not count toward the page minimum. A minimum of 5
professional or academic references is required to support your
paper and to provide additional discussion points.
17
VIDEO AND PODCASTING MADE EASY
Creating audio and video content for marketing and PR
purposes requires the same attention to appropriate topics as
other techniques outlined in this book. It requires targeting
individual buyer personas with thoughtful information that
addresses some aspect of their lives or a problem they face. By
doing so, you brand your organization as smart and worthy of
doing business with. However, unlike text-based content such as
blogs or news releases, audio and video might require a modest
investment in additional hardware such as microphones and
video cameras, as well as software, and, depending on the level
of quality you want to achieve, may also necessitate time-
consuming editing of the files. Although the actual procedures
for podcasting and video are a bit more convoluted than, say,
starting a blog, they are still not all that difficult.
Video and Your Buyers
Organizations that deliver products or services that naturally
lend themselves to video have been among the first to actively
use the medium to market and deliver information about their
offerings. For example, many churches routinely shoot video of
weekly services and offer it online for anyone to watch, drawing
more people into the congregation. Many amateur and
professional sports teams, musicians, and theater groups also
use video as a marketing and PR tool.
Video follows both blogs and podcasting on the adoption curve
at organizations that don't have a service that naturally lends
itself to video. 303Companies are certainly experimenting,
typically by embedding video (hosted at YouTube or another
video site) into their existing blogs and online media rooms. I'm
also seeing video snippets of CEO speeches, customer
18. interviews, and quick product demonstrations.
Business-Casual Video
In the United States, there has been a 20-year trend toward so-
called business-casual clothing in the workplace. My first job,
on Wall Street in the 1980s, required me to wear a suit and tie
wi
18
HOW TO USE NEWS RELEASES TO REACH BUYERS
DIRECTLY
Guess what? Press releases have never been exclusively for the
press. My first job in the mid-1980s was on a Wall Street
trading desk. Every day, I would come to work and watch the
Dow Jones Telerate and Reuters screens as they displayed
specialized financial data, economic information, and stock
prices. The screens also displayed news feeds, and within these
news feeds were press releases. For decades, financial market
professionals have had access to company press releases
distributed through Business Wire, PR Newswire, and other
electronic press release distribution services. And they weren't
just for publicly traded corporations; any company's release
would appear in trading rooms within seconds.
I distinctly remember traders intently watching the newswires
for any signs of market-moving events. Often the headline of a
press release would cause frenzy: “Did you see? IBM is
acquiring a software company!” “It's on the wire; Boeing just
got a 20-plane order from Singapore Airlines!” For years,
markets often moved and stock prices rose and fell based on the
press release content issued directly by companies, noton the
news stories written minutes or hours later by reporters from
newswire outlets like Reuters and Dow Jones (and later
Bloomberg).
Press releases have also been available to professionals working
within corporations, government agencies, and law firms, all of
which have had access to press releases through services like
those from NewsEdge, Dow Jones, and LexisNexis. These
19. services have been delivering press releases to all kinds of
professionals for competitive intelligence, research, discovery,
and other purposes for decades.
316
And since about 1995, the wide availability of the web has
meant that press releases have been available for free to anyone
with an Internet connection and a web browser.
Millions of people read press releases directly, unfiltered by the
media. You need to be speaking directly.
YOUR NEWSROOM: A FRONT DOOR FOR MUCH MORE
THAN THE MEDIA
The online newsroom (sometimes called a press room, media
room, or press page) is the part of your organization's website
that you create specifically for the media. In some
organizations, this section is simply a list of news releases with
contact information for the organization's PR person. But many
companies and nonprofits have elaborate newsrooms with a
great deal of information available in many different formats:
audio, video, photos, news releases, background information,
financial data, and much more. A close cousin to the newsroom
is the online investor relations (IR) room that many public
companies maintain; however, I don't cover IR sites in this
book.
Before I give you ideas on how to create a valuable newsroom
of your own, I want you to consider something that is vitally
important: All kinds of people visit your newsroom, not just
journalists. Stop and really let that soak in for a moment. Your
buyers are snooping around your organization by visiting the
media pages on your website. Your current customers, partners,
investors, suppliers, and employees all visit those pages. Why is
that? Based on casual research I've done (I often speak about
visitor statistics with employees who are responsible for their
organizations' newsrooms), I'm convinced that when people
want to know what's currentabout an organization, they go to a
newsroom.
Your newsroom is for your buyers, not just the media.
20. 329Visitors expect that the main pages of a website are
basically static (i.e., they are not updated often), but they also
expect that the news releases and media-targeted pages on a site
will reveal the very latest about a company. For many
companies, the news release section is one of the most
frequently visited parts of the website. Check out your own
website statistics; you may be amazed at how many visitors are
already reading your news releases and other media pages
online.
So I want you to do something that many traditional PR people
think is nuts. I want you to design your newsroom for
your buyers. By building a media room that targets buyers, you
will not only enhance those pages as a powerful marketing tool
but also make a better media site for journalists. I've reviewed
hundreds of newsrooms, and the best ones are built with buyers
in mind. This approach may sound a bit radical, but believe me,
it works.
When news releases are posted on your site, search engine
crawlers will find the content, index it, and rank it based on
words, phrases, and other factors. Because news release pages
update more often than any other part of a typical organization's
website, search engine algorithms (tuned to pay attention to
pages that update frequently) tend to rank news release pages
among the highest on your site, driving traffic there first.
“There's no question that a well-organized media room often has
higher search results and drives more traffic because of the way
the search engines work,” says Dee Rambeau, vice president of
customer engagement at PR Newswire. “A news release
dynamically builds out a new set of content in your newsroom,
with each news release generating its own indexable page,
which the search engines all capture. Google and the other
search engines love fresh content that relates back to similar
content on the other pages of the site. Aggressive companies
take advantage of this by sending news releases frequently to
get high rankings from the search engines. Frequency has a
21. great deal to do with search engine rankings—if you do 10 news
releases, that's great; 20 is better, and 100 is better still.”
The Kellogg Company—the world's leading producer of cereal
and second-largest producer of cookies, crackers, and savory
snacks—uses its newsroom1for search engine optimization
(SEO) purposes and as a tool to reach various audiences,
including reporters and editors who cover the company.
“What we found through our research is that, more and more,
our newsroom is extending beyond just media to other
stakeholders,” says Stephanie Slingerland, senior manager of
corporate communications at the Kellogg Company. “Anyone
coming to the site, be it an investor, an NGO or other partner
agency, or even a consumer—the newsroom is inviting for them
to get the information which may be relevant.”
Slingerland has strong partnerships with people who work in
other departments at the company and who also provide
information to the public. “Our investor relations team are
having conversations and engagements with analysts and
investors. So, from our partnership with that team, we know
what those stakeholders might be looking for. Or, for example,
our government relations team are regularly engaging with
government and nongovernmental officials. Again, we have a
strong partnership with them. We know what they're looking for
and can make sure that they have what they might be looking
for on our site. The same with our corporate social
responsibility team, who engage with agencies and others as
part of our philanthropic activities.”
Based on what she learns about the needs of the news media and
other stakeholders, Slingerland creates the right content,
including news releases, fact sheets, news alerts, and more.
“Since we are the folks that regularly engage with the media,
we know what we're getting asked for over and over, like the
fact sheet section,” she says. “And we also know that many
people want to know the latest news about the company, but
they don't necessarily come to our newsroom every day. So
22. that's why we created our news alerts section, so they opt in to
be alerted whenever
One important consideration that many marketing and PR
people overlook when considering the benefits of a newsroom is
that you control the content, not your IT department,
webmaster, or anyone else. Youshould design your newsroom as
a tool to reach buyers and journalists, and you don't need to
take into consideration the rules for posting content that the rest
of the organization's site may require. If you build this part of
your site using a specialized newsroom content-management
application, such as the MediaRoom2product from PR
Newswire, you will control a corner of your organization's
website that you can update whenever you like using simple
tools, and you won't need to request help from anyone in other
departments or locations. So start with your needs and the needs
of your buyers and journalists, not the needs of those who own
the other parts of your organization's website.
Start with a Needs Analysis
When designing a new newsroom (or planning an extensive
redesign), start with a needs analysis. Before you just jump
right into site aesthetics and the organization of news releases,
take time to analyze how the site fits into your 332larger
marketing, PR, and media relations strategy. Consider the buyer
persona profiles you built as part of your marketing and PR
plan. Talk with friendly journalists so you can understand what
they need. Who are the potential users of the newsroom, and
what content will be valuable to them? When you have collected
some information, build buyers' and journalists' needs into your
newsroom.
As you work toward starting your design, try to think a bit more
like a publisher and less like a marketing and PR person. A
publisher carefully identifies and defines target audiences and
then develops the content required to meet the needs of each
distinct demographic. Graphical elements, colors, fonts, and
other visual manifestations of the site are also important but
23. should take a backseat during the content needs analysis
process.