Description
I don't understand these two questions (see pdf). Could someone please give me a detailed explanation on how you find the answer?
Unformatted Attachment Preview
CS177 Spring 2015
Final exam - Page 6 of 29
Fri 05/08 7:00p - 9:00p
8. What is the output of the following program
def lucasNumbers ( n ) :
i f ( n==0) :
return 2
i f ( n==1) :
return 1
return lucasNumbers ( n 1) + lucasNumbers ( n 2)
print ( lucasNumbers ( 5 ) )
A. 5
B. 7
C. 8
D. 11
E. 18
9. What is the space complexity of this algorithm that reverses a List (input is a list of
length n)
def r e v e r s e ( l i s t 1 ) :
newlist =[]
for i in range( 1, len ( l i s t 1 ) 1, 1) :
n e w l i s t . append ( l i s t 1 [ i ] )
return n e w l i s t
A. O(1)
B. O(log(n))
C. O(n)
D. O(n*log(n))
E. O(n2 )
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I needed. Studypool is a lifesaver!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
SUNY Old Westbury User Interface and Task Analysis Discussion Paper
Analyze user problems to inform user-centered design solutions
Scenario
The IT department at MYU (MY University) is c ...
SUNY Old Westbury User Interface and Task Analysis Discussion Paper
Analyze user problems to inform user-centered design solutions
Scenario
The IT department at MYU (MY University) is considering a new student portal. The current portal has been in use for a number of years, and learners are encountering numerous issues regarding usability. The university has decided to start fresh. Therefore, it has conducted a task analysis of what students have to do to register for a class within the current portal. As a usability engineer, you have been asked to analyze the issues that exist within the user interface and task analysis, then write a report to be shared with university officials. Within this report, you will provide recommendations and create user personas. Additionally, you have been asked to create a paper prototype that addresses issues identified within the task analysis and conduct an observation of someone using your prototype.
Directions
In order to create your 2- to 3-page report, you will have to experience the registration process using the demonstration system and Student Portal Task Analysis provided in the Supporting Materials section. Your project also involves an in-person observation of someone using the paper prototype you create in response to the issues you identify within the student portal. Plan accordingly; you will need time to recruit your subject, complete the observation, and document the experience.
Within your report, you must:
Identify user issues within the task analysis that impact usability
Provide written recommendations, informed by user-centered design, that could be implemented to improve usability. Your recommendations should address:
Effectiveness
Efficiency
Utility
Learnability
Memorability
Create three user personas based on the user profiles and task analysis. These personas will represent information regarding user needs (register for class, complete and turn in homework, access portals appropriate to major, complete assigned readings, petition to graduate), experiences, and behaviors when interacting with the student portal. For each persona, identify the user’s:
Age range
Familiarity or comfort level with technology
Time of access (e.g., early morning, late at night)
Method of access (e.g., PC, phone)
Additionally, you must:
Construct a paper prototype that resolves issues found in the task analysis. The paper prototype is a paper representation of the design that shows the tasks and subtasks the user must accomplish to complete the intended goal. Users are able to “interact” by pointing to a representation of a button, menu, or other options available through the interface. The designer (you) would present another paper representation showing the screen corresponding to the chosen option. Your prototype must address:
Navigation issues that users encounter
Language issues within the portal
Issues that users cannot recover from in the current portal
The needs of all three personas
Conduct an observation of someone using your paper prototype. You may recruit a coworker, family member, or friend. You will need to conduct this observation in person. During this observation, you will provide specific guidance to lead the user through the prototype while documenting their experience and your observations using the Prototype Observation Template provided in the Supporting Materials section. Plan accordingly; you will need time to recruit your subject, complete the observation, and document the experience.
APM Tools SME Doctoral Degree and Curriculum Vitae Worksheet
Overview: To help prepare you for the scholarly world beyond your doctoral degree, we will take on a unique way of introdu ...
APM Tools SME Doctoral Degree and Curriculum Vitae Worksheet
Overview: To help prepare you for the scholarly world beyond your doctoral degree, we will take on a unique way of introducing ourselves in this course. Rather than a simple “here is who I am,” we are going to post a Curriculum Vitae and an acknowledgements section.
Directions:
View the rubric and examples to make sure you understand the expectations of this assignment
Create a discussion thread to include the following:
Develop (or improve) a current curriculum vita for yourself.
If you are unfamiliar with this process, be sure to check out the examples and article.
Write the acknowledgements section for your dissertation.
You may actually use this later when you publish so make it strong.
See the examples for additional clarification.
Include a professional photo of yourself (preferably a professional headshot).
Include a photo of you and someone or something you mention in your acknowledgement section.
Your entire post will consist of the curriculum vita, the acknowledgement section, a professional photo, and a “fun” photo.
Respond to one other classmate with one thing you have in common with them after reading their CV or acknowledgement section.
SU CIS 505 Standards in The Telecommunication Industry Research Paper
The following website may be used for reference to complete this assignment. The website represents an electronic documen ...
SU CIS 505 Standards in The Telecommunication Industry Research Paper
The following website may be used for reference to complete this assignment. The website represents an electronic document titled “Standards Organizations,” written by William Stallings (2009), located at http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1.
Write a fully developed paper in which you:
Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Justify the need of the IEEE 802 standard used in networking.
Evaluate the three standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
.
5 pages
Digital Investigation Processes And Procedures
Organizations and companies are mainly and occasionally faced with internal breaches and conflicts resulting in the instan ...
Digital Investigation Processes And Procedures
Organizations and companies are mainly and occasionally faced with internal breaches and conflicts resulting in the instances of impending ...
Please help with this question!
What are the common
motivations for an attacker to target a specific piece of software?
Give at least three reasons a ...
Please help with this question!
What are the common
motivations for an attacker to target a specific piece of software?
Give at least three reasons and justify your answer with analysis or
examples.What could an attacker stand to gain from compromising a piece of software? Justify your answers with analysis or examples.Why would an attacker want to attack a trivial but
widespread software program? Give at least two reasons. Is attacking
trivial but widespread software a better or worse choice than attacking
more complex software that protects sensitive information? Support your
answer with appropriate reasoning.
Consider the need to protect software from
becoming unstable through buffer overflow exploits and answer the
following questions.
Strong bounds checking
means a programming language must explicitly declare the length of any
variable (including arrays), and these bounds are tested before storing
any information. How could strong bounds checking be both beneficial and
harmful to a language? What is the trade-off that has to occur in a
language with strong bounds checking compared to one without it? Justify
your answer.How does string processing allow for possible buffer
overflows even with bounds checking in a language? What types of
software or what languages are most vulnerable to buffer overflow attack
and why? Give at least two examples and support your answer.
Similar Content
Arizona State University Chapter 11 Cyber Attacks Questions Response
Evaluate the National disaster recovery effectiveness based on case studies from the text or recent news stories and make ...
Project: Risk Management
HiPlease have a look on attached documents and let me know soon.Need it by 8th Feb.Thanks,Sam...
Algorithm Creation for Sorting Fruits from a Farm Program Project
The context of this question is Divide and Conquer (merge Sort, etc.):You are working on a busy fruit farm that produces t...
University of the Cumberlands Business Intelligence Discussion
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to neuroshell.com click on the...
NEC Managing Information Security Discussion
Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragr...
Virginia State University Servers and Services in The Cloud Project Worksheet
Project #2 Worksheet ver.2For this project, you will submit a new virtualized environment proposal and an update network d...
Question 1
...
Artificial Intelligence In Mobility
Nikitas, A., Michalakopoulou, K., Njoya, E. T., & Karampatzakis, D. (2020). Artificial intelligence, transport and the sma...
Discussion
What I learned from reading "Good Modeling Practices in Excel" is that the most important thing when creating and optimizi...
Related Tags
Book Guides
The Handmaids Tale
by Margaret Atwood
Salt To The Sea
by Ruta Sepetys
Girl in Translation
by Jean Kwok
Beowulf
by Anonymous Anglo-Saxon poet
Sounds Like Titanic
by Jessica Chiccehito Hindman
The Picture of Dorian Gray
by Oscar Wilde
A Farewell To Arms
by Ernest Hemingway
Good Kids Bad City
by Kyle Swenson
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
SUNY Old Westbury User Interface and Task Analysis Discussion Paper
Analyze user problems to inform user-centered design solutions
Scenario
The IT department at MYU (MY University) is c ...
SUNY Old Westbury User Interface and Task Analysis Discussion Paper
Analyze user problems to inform user-centered design solutions
Scenario
The IT department at MYU (MY University) is considering a new student portal. The current portal has been in use for a number of years, and learners are encountering numerous issues regarding usability. The university has decided to start fresh. Therefore, it has conducted a task analysis of what students have to do to register for a class within the current portal. As a usability engineer, you have been asked to analyze the issues that exist within the user interface and task analysis, then write a report to be shared with university officials. Within this report, you will provide recommendations and create user personas. Additionally, you have been asked to create a paper prototype that addresses issues identified within the task analysis and conduct an observation of someone using your prototype.
Directions
In order to create your 2- to 3-page report, you will have to experience the registration process using the demonstration system and Student Portal Task Analysis provided in the Supporting Materials section. Your project also involves an in-person observation of someone using the paper prototype you create in response to the issues you identify within the student portal. Plan accordingly; you will need time to recruit your subject, complete the observation, and document the experience.
Within your report, you must:
Identify user issues within the task analysis that impact usability
Provide written recommendations, informed by user-centered design, that could be implemented to improve usability. Your recommendations should address:
Effectiveness
Efficiency
Utility
Learnability
Memorability
Create three user personas based on the user profiles and task analysis. These personas will represent information regarding user needs (register for class, complete and turn in homework, access portals appropriate to major, complete assigned readings, petition to graduate), experiences, and behaviors when interacting with the student portal. For each persona, identify the user’s:
Age range
Familiarity or comfort level with technology
Time of access (e.g., early morning, late at night)
Method of access (e.g., PC, phone)
Additionally, you must:
Construct a paper prototype that resolves issues found in the task analysis. The paper prototype is a paper representation of the design that shows the tasks and subtasks the user must accomplish to complete the intended goal. Users are able to “interact” by pointing to a representation of a button, menu, or other options available through the interface. The designer (you) would present another paper representation showing the screen corresponding to the chosen option. Your prototype must address:
Navigation issues that users encounter
Language issues within the portal
Issues that users cannot recover from in the current portal
The needs of all three personas
Conduct an observation of someone using your paper prototype. You may recruit a coworker, family member, or friend. You will need to conduct this observation in person. During this observation, you will provide specific guidance to lead the user through the prototype while documenting their experience and your observations using the Prototype Observation Template provided in the Supporting Materials section. Plan accordingly; you will need time to recruit your subject, complete the observation, and document the experience.
APM Tools SME Doctoral Degree and Curriculum Vitae Worksheet
Overview: To help prepare you for the scholarly world beyond your doctoral degree, we will take on a unique way of introdu ...
APM Tools SME Doctoral Degree and Curriculum Vitae Worksheet
Overview: To help prepare you for the scholarly world beyond your doctoral degree, we will take on a unique way of introducing ourselves in this course. Rather than a simple “here is who I am,” we are going to post a Curriculum Vitae and an acknowledgements section.
Directions:
View the rubric and examples to make sure you understand the expectations of this assignment
Create a discussion thread to include the following:
Develop (or improve) a current curriculum vita for yourself.
If you are unfamiliar with this process, be sure to check out the examples and article.
Write the acknowledgements section for your dissertation.
You may actually use this later when you publish so make it strong.
See the examples for additional clarification.
Include a professional photo of yourself (preferably a professional headshot).
Include a photo of you and someone or something you mention in your acknowledgement section.
Your entire post will consist of the curriculum vita, the acknowledgement section, a professional photo, and a “fun” photo.
Respond to one other classmate with one thing you have in common with them after reading their CV or acknowledgement section.
SU CIS 505 Standards in The Telecommunication Industry Research Paper
The following website may be used for reference to complete this assignment. The website represents an electronic documen ...
SU CIS 505 Standards in The Telecommunication Industry Research Paper
The following website may be used for reference to complete this assignment. The website represents an electronic document titled “Standards Organizations,” written by William Stallings (2009), located at http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1.
Write a fully developed paper in which you:
Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Justify the need of the IEEE 802 standard used in networking.
Evaluate the three standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
.
5 pages
Digital Investigation Processes And Procedures
Organizations and companies are mainly and occasionally faced with internal breaches and conflicts resulting in the instan ...
Digital Investigation Processes And Procedures
Organizations and companies are mainly and occasionally faced with internal breaches and conflicts resulting in the instances of impending ...
Please help with this question!
What are the common
motivations for an attacker to target a specific piece of software?
Give at least three reasons a ...
Please help with this question!
What are the common
motivations for an attacker to target a specific piece of software?
Give at least three reasons and justify your answer with analysis or
examples.What could an attacker stand to gain from compromising a piece of software? Justify your answers with analysis or examples.Why would an attacker want to attack a trivial but
widespread software program? Give at least two reasons. Is attacking
trivial but widespread software a better or worse choice than attacking
more complex software that protects sensitive information? Support your
answer with appropriate reasoning.
Consider the need to protect software from
becoming unstable through buffer overflow exploits and answer the
following questions.
Strong bounds checking
means a programming language must explicitly declare the length of any
variable (including arrays), and these bounds are tested before storing
any information. How could strong bounds checking be both beneficial and
harmful to a language? What is the trade-off that has to occur in a
language with strong bounds checking compared to one without it? Justify
your answer.How does string processing allow for possible buffer
overflows even with bounds checking in a language? What types of
software or what languages are most vulnerable to buffer overflow attack
and why? Give at least two examples and support your answer.
Earn money selling
your Study Documents