use r code to do this project* Include the following under the section Reading Data and submit your Project template in html format ORGANIZE YOUR FINAL PROJECT download data sets 2021, 2020, 2019 separately (From FARS web site) read files accident from 2021, 2020 and 2019 and combine them in one file called accident3 Include dim(accident3) and table(accident3$YEAR)
Q: Construct a 16-bit serial-parallel counter, using four 4-bit parallel counters. Suppose that all…
A: The 16-bit serial-parallel counter is constructed by organizing four 4-bit parallel counters in…
Q: Q2. Design a control logic to implement the following register transfer statements assuming that…
A: Here, the task specified in the question is to design a control logic for the given register transfe…
Q: Qo (ε,0,1) Q1 €.0,1 ww (ε,0,1)* Qf (ε,0,1)
A: A nondeterministic finite automaton (NFA) is a computational model used in the theory of computation…
Q: . Answer the following questions about IEEE 754 32-bit single precision numbers. a. Draw a diagram…
A: a. Diagram of IEEE 754 32-bit single precision format: 1 bit 8 bits 23 bits S |…
Q: What is the largest purely output-queued ATM switch with zero cell loss requirement that we can…
A: To determine the largest purely output-queued ATM switch with a zero cell loss requirement, we can…
Q: 4.3-4a. IPv4/IPv6 co-existence: tunneling (a). Consider the mixed IPv4/IPv6 network shown where an…
A: We have to talk about the network diagram.IPv4/IPv6 tunnеling is a tеchniquе for еncapsulating IPv6…
Q: modify.py is the name of your script
A: The task involves creating a Python script, modify.py, to automate the modification of a…
Q: Draw a UML class diagram of your domain model from the information attached Create an interaction…
A: In developing a domain model for a vending machine, it's crucial to understand the system's primary…
Q: Design a hardware solution to prevent side-channel attacks on a cryptographic processor.
A: Side channel attacks exploit information leaked through characteristics of a system, such, as power…
Q: 옷 Driver Push Button to Print Parking Permit > Raise Gate > Lower Gate > Barcode Reader Scans…
A: We must comprehend the UML class diagram for the parking deck system scenario in order to answer…
Q: Suppose you have a byte-addressable virtual address memory system with 32 virtual pages of 32 bytes…
A: All MCQ are based on the Operating system. Memory management is a crucial aspect of operating…
Q: What are the different types of software dependencies and how do they impact software development?
A: The process of developing software is intricate and sometimes requires integrating several parts to…
Q: Suppose you have a byte-addressable virtual address memory system with 32 virtual pages of 32 bytes…
A: Logical mеmory is thе mеmory that a program sееs when it is running. It is an abstract viеw of…
Q: There are two tribes on the island of Tufa: the Tu's, who always tell the truth, and the Fa's, who…
A: The island of Tufa is home to two distinct tribes: the Tu's, known for their unwavering commitment…
Q: All processes have critical sections. True False
A: A critical section is a part of a program or code where shared resources, such as variables or data…
Q: Answer the following: This problem exercises the basic concepts of game playing, using tic-tac-toe…
A: In the tic toe games, there are 9 possible ways of placing the first mark on the square, 8 remaining…
Q: Consider the universal relation R(A, B, C, D, E, F, G, H, I, J) and the following set of functional…
A: To find thе kеys of thе rеlation R(A, B, C, D, E, F, G, H, I, J) with thе givеn sеt of…
Q: Create a professional PowerPoint presentation summarizing the following: • Briefly describe each of…
A: The question asks for assistance in creating a PowerPoint presentation about malware and forensic…
Q: Exercise # 3: A company would like to create a system to track its customer visits by recording the…
A: Given below is the implementation of the three classes: Person, Bill, and Customer as per the UML…
Q: Write a set of simple requirements for this system Write a set of key use cases from this…
A: In developing a domain model for a vending machine, it's crucial to understand the system's primary…
Q: Implement the Solver class. The point of the solver class is the solve method which takes a…
A: Define the Solver class with a solve method that takes a 5-by-5 boolean array representing the…
Q: Describe two actions that the GIT version management system takes to reduce storage requirements.
A: The objective of the question is to understand the mechanisms used by GIT, a version control system,…
Q: Develop a new development strategy that addresses the challenges of developing software for emerging…
A: Developing software, for emerging technologies presents challenges that require an approach.These…
Q: What are some tools and resources that can be used to evaluate software dependencies?
A: Evaluating software dependencies is a crucial aspect of software development and maintenance.…
Q: What are some best practices for evaluating software dependency?
A: Evaluating software dependencies is a critical aspect of project development, influencing factors…
Q: I have inlcluded my code and cannot get the y or no portion to add at end of the loop and trying to…
A: Step1: We have just add in your code in the line no 30,31 and 32 and we have attached the code and…
Q: Propose a new approach to optimizing the performance of computer systems for specific applications.
A: In this question we have to understand about the approach to optimizing the performance of computer…
Q: Q5: Compute the run time of the following program Line No 1 2 3 4 56 Interpretation Initialization A…
A: The analysis of a given program, breaking down its instructions and computing essential metrics.…
Q: Using JavaScript and html, a do while loop, and let instead of var
A: Step-1) First, creating a title of "Guess the Number Game".Step-2) In script tag, generating a…
Q: 1.Use Karnaugh map to find minimum sum of products expressions for each function: g(d, e, f) =…
A: We need to find the minimum sum of product using the karnough map. So we will see in the more…
Q: List the components of data communications
A: Data communication refers to the process of exchanging digital information between two or more…
Q: Consider a cache memory with 8 cache blocks (0-7). If the memory block requests are in the following…
A: We're dealing with an 8-block cache memory, and we have a series of memory block requests to handle.…
Q: Assume the variable s references a string. Write a statement that assigns the second through fifth…
A: String is a collection of characters example: Hello, World
Q: I really need help with this below, please. I need to draw four AVL tree, balancing as I add items…
A: In this exercise, the goal is to construct an AVL (Adelson-Velsky and Landis) tree by sequentially…
Q: a. Normalize the Bank Accounts Table to 1NF by increasing the records in the existing table.
A: AccountHolderID AccountHolderName C111 Joe Smith C222 Sue…
Q: function drawFractalLine is recursive. Write a script that draws the Koch snowflake. Define a…
A: Here, we have to write a script that draws the Koch snowflake.Also, we will define the function and…
Q: List 4 parameters for a multilevel feedback queue
A: The Multilevel Feedback Queue (MFQ) scheduling is an advanced algorithm used by operating systems to…
Q: How do compilers and interpreters work?
A: Compilers and interpreters are components, in the field of computer science.They have a role in…
Q: 6.4-6. Self Learning Switches (c). Consider the network below with six nodes, star-connected into an…
A: A switch can be defined in such a way that it is a networking device that operates at Layer 2 (Data…
Q: Write a complete MIPS program that prompts a user for their age and then prints out their age to the…
A: Algorithm of the MIPS Assembly Program:1. Display Prompt: a. Load system call code (4) for…
Q: There are two tribes on the island of Tufa: the Tu's, who always tell the truth, and the Fa's, who…
A: The island of Tufa is home to two distinct tribes: the Tu's, known for their unwavering commitment…
Q: You're preparing the message below to the Kingdom of the North but can't let it be un- derstood by…
A: RSA is an asymmetric cryptographic algorithm that is widely used for secure data transmission and…
Q: Develop an algorithm for finding the most frequently occurring value in an array of numbers. Use a…
A: Below is the complete solution with explanation in detail for the given question about finding the…
Q: What are some common risks associated with software dependencies?
A: Software dependencies are components, libraries, modules that a software system relies on to…
Q: Write a Java program that will allow the user to play a hangman game repeatedly until they choose to…
A: As per the given question, we need to implement the Hangman Game in Java.This implementation of the…
Q: You are given the network number of 86.30.88.0/20 with the following arrangement. (12 hosts) (30…
A: A subnetwork or subnet which refers to the one it is a logical subdivision of an IP network. The…
Q: LOGIC GATES: Draw the truth table and draw out the circuit of the expression. F=ABC(C+D')
A: In logic and mathematics, a truth table is a tabular representation that displays every possible…
Q: What are the different factors to consider when choosing hardware for a project?
A: When it comes to selecting hardware for a project there are factors that need consideration.These…
Q: 2. Consider the course enrollment system. Four classes are used. The student enrollment (methods:…
A: The scope of the question seems to be focused on creating a class diagram for a course enrollment…
Q: What are the key differences between waterfall and agile development strategies?
A: Software development is the creative process of designing, coding, testing, and maintaining computer…
*use r code to do this project*
Include the following under the section Reading Data and submit your Project template in html format
ORGANIZE YOUR FINAL PROJECT
- download data sets 2021, 2020, 2019 separately (From FARS web site)
- read files accident from 2021, 2020 and 2019
and combine them in one file called accident3
Include dim(accident3) and table(accident3$YEAR)
- Read the files person and combine them into person3. The YEAR variable is missing,
- you have to include YEAR variable into each person's file separately. YEAR = 2021 2020 or 2019, then combine them.
Use dim(person3) and table(person3$YEAR) to show the accuracy of your work.
*just show how to do it especially steps*
Step by step
Solved in 3 steps
- Create a formula that provides the start date of a project as follows: In cell H4, begin to enter a formula using the INDEX Use the Lookup table (range A2:E23) as the array. For the row_num argument, use the MATCH Use the Project ID (cell H2) as the lookup_value for the MATCH function. Use the ID column (range A2:A23) as the lookup_array for the MATCH function. Specify an exact match (0) for the MATCH function. Use the Start Date column (column 4) as the column_num for the INDEX function.you are supposed to create an excel sheet for student grade sheet. There must be at least 10 records. Following columns will be needed for the sheet. Also add summary of the grades as follows. Grade Count A 6 B 4 C 8 D 2 F 10 TOTAL 30 Grading Criteria to calculate grades is as follows: Marks Grade 90-100 A 80-89 A- 75-79 B+ 70-74 B 65-69 C+ 60-64 C 50-59 D Less than 50 F1. The timeclock.txt file contains the hours worked data for every employee as well as the shift they worked. The layout for the file is as follows: EMPLOYEE NUMBER, HOURS WORKED, SHIFT 2. The personnel.txt file contains the names of all employees and their hourly pay rates. The layout for the file is as follows: EMPLOYEE NUMBER, EMPLOYEE NAME, PAY RATE Note: Both the timeclock.txt and payroll.txt files are pre-sorted by EMPLOYEE NUMBER in ascending order. Business Rules 1. For hours <= 40, the employee gross pay is: HOURS WORKED PAY RATE 2. For hours> 40, the employee gross pay is: HOURS WORKED PAY RATE 1.5 3. For shift 3, add $1 per hour to the employee pay rate The program should: 1. Download both input files in the same folder that you will create your .py program. 2. Read both input files together. 3. Match the input files by the EMPLOYEE NUMBER. 4. For each record in the timesheet.txt file, write a record in a new output file named payroll,txt based on the business rules…
- Transcribed Image Text A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session. Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions. The following code segment is intended to create lunchList, which is initially empty. It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise. FOR EACH child IN morningList { <MISSING CODE> Which of the following could replace <MISSING CODE> so that the code segment works as intended? IF (IsFound (afternoonList, child)) { A APPEND (lunchList, child)LAB - Select horses with logical operators The Horse table has the following columns: • ID integer, primary key • RegisteredName - variable-length string • Breed - variable-length string • Height-decimal number • BirthDate - date Write a SELECT statement to select the registered name, height, and birth date for only horses that have a height between 15.0 and 16.0 (inclusive) or have a birth date on or after January 1, 2020.C. d. ne: ID: A 7. A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session. Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList. which will contain the names of children attending both sessions. The following code segment is intended to create lunchList, which is initially empty. It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise. FOR EACH child IN morningList Which of the following could replace so that the code segment works as intended? IF (ISFound (lunchList, child)) IF (IsFound (afternoonList, child)) APPEND (afternoonList, child) APPEND (lunchList, child) a. IF ((Is Found (morningList, child)) OR (IsFound (afternoonList, child) )) IF (IsFound (morningList, child)) APPEND…
- Question # 1 : P02-01- Jenny's Salon & Spa Create a file called P02-01 Design the data models below Export the file containing the data models as a PDF file and submit P02-01a At Jenny's Salon & Spa, we have several hairstylists that are salaried employees. In addition to their salary, we store their first name, last name, social security number, mobile number, and email address. The salon has clients, which they record first name, last name, mobile number, email address, and preferred day. Some clients do not have a preferred day. Name the first tab P02-01a Identify and draw the entities Add the attributes associated with each entity and identify them as mandatory or optional Identify candidate keys for each entity Specify the UID/PK for each entity Specify all other candidate keys as unique keys (UKs) P02-01b Each hairstylist is assigned clients. When a hairstylist is hired, the hairstylist is not assigned any clients during orientation. Each…The file FDICBankFailures contains data on failures of federally insured banks between 2000 and 2012. Create a PivotTable in Excel to answer the following questions. The PivotTable should group the closing dates of the banks into yearly bins and display the counts of bank closures each year in columns of Excel. Row labels should include the bank locations and allow for grouping the locations into states or viewing by city. You should also sort the PivotTable so that the states with the greatest number of total bank failures between 2000 and 2012 appear at the top of the PivotTable. Click on the datafile logo to reference the data. (a) Which state had the greatest number of federally insured bank closings between 2000 and 2012? - Select your answer -(b) How many bank closings occurred in the state of Nevada (NV) in 2010?In what cities did these bank closings occur? - Select your answer -(c) Use the PivotTable’s filter capability to view only bank closings in California (CA),…a. Create table "STUDENT" with attributes "STUDENT_ID", "STUDENT_NAME", "STUDENT_GPA". b. Use appropriate datatype for each attribute. C. Insert details of three students. d. Use FOR loop to print these details in the descending order (Highest first and Lowest last) of their GPA.
- Create a formula that provides this information as follows: In cell H3, begin to enter a formula using the VLOOKUP Use the Project ID (cell H2) as the lookup value. Use the Lookup table (range A2:E23) as the table_array. Use the Project Name column (column 2) as the col_index_num. Specify an exact match (FALSE) for the range_lookup.Drop down box method works well for small Excel data validation lists that are unlikely to ever change. TRUE OR FALSEcalculate_trip_time( iata_src: str, iata_dst: str, flight_walk: List[str], flights: Flight Dir float: def ) -> """ Return a float corresponding to the amount of time required to travel from the source airport to the destination airport to the destination airport, as outlined by the flight_walk. The start time of the trip should be considered zero. In other words, assuming we start the trip at 12:00am, this function should return the time it takes for the trip to finish, including all the waiting times before, and between the flights. If there is no path available, return -1.0 >>> calculate_trip_time("AA1", "AA2", ["AA1", "AA2"], TEST_FLIGHTS_DIR_FOUR_ 2.0 "AA7", ["AA7", "AA1"], TEST_FLIGHTS_DIR_FOUR_ "AA7", ["AA1", "AA7"], TEST_FLIGHTS_DIR_FOUR_ "AA1", ["AA1"], TEST_FLIGHTS_DIR_FOUR_CITIES) "AA2", ["AA4", "AA1", "AA2"], TEST_FLIGHTS_DI "AA3", ["AA1", "AA2", "AA3"], TEST_FLIGHTS_DI >>> calculate_trip_time("AA1", "AA4", ["AA1", "AA4"], TEST_FLIGHTS_DIR_FOUR_ 2.0 || || || >>>…