- Home >
- Computer Science >
- Computer Networking.
Computer Networking.
treneqvav69
label
Computer Science
timer
Asked: Jul 31st, 2013
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
Most Popular Content
6 pages
Database Administration
Current businesses and organizations use network databases to share and store their information. Availability of network a ...
Database Administration
Current businesses and organizations use network databases to share and store their information. Availability of network and its components enables ...
7 pages
Case Study On Upward Bound Airline
The B2C project is formed with the purpose of making one standard decision of reducing the costs in the organization and e ...
Case Study On Upward Bound Airline
The B2C project is formed with the purpose of making one standard decision of reducing the costs in the organization and ensuring the faster provision ...
OSU Importing and Indexing a Data Set Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
OSU Importing and Indexing a Data Set Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Every time you connect to your Apporto environment, please start your MongoDB server with either of the command lines:#start mongo without authentication/usr/local/bin/mongod_ctl start-noauthCopy the port number given in the output, for example:Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution. Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell. IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:<code>/usr/local/bin/mongod_ctl stop
/usr/local/bin/mongod_ctl start
</code>You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:<code>mongo --authenticationDatabase "admin" -u "admin" -p
</code>This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable. Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial. If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:<code>/usr/local/bin/mongod_ctl stop
/usr/local/bin/mongod_ctl start-noauth
</code>Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”. IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
Disks and Printers, computer science homework help
"Disks and Printers" Identify the specific manufacture and model of one (1) magnetic disk, one (1) solid state drive, and ...
Disks and Printers, computer science homework help
"Disks and Printers" Identify the specific manufacture and model of one (1) magnetic disk, one (1) solid state drive, and one (1) optical drive. Evaluate the quality of each in terms of read and write speeds, access methods, storage capacity, longevity, and price. Recommend the device that would be the best suited for a home environment and the device that would be best suited for a business environment. Provide a rationale for your response.Identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch), memory, color capability, duplex printing capability, cartridge price, cartridge printing capacity, and longevity. Next, recommend the printer that would be the best suited for a home environment and the printer that would be the best suited for a business environment. Provide a rationale for your response.
Data Mining and Statistical Analysis Project
THE OBJECTIVE OF THIS PORTFOLIO PROJECT IS MINING DATA FROM A DATA WAREHOUSE, WHICH CONTAINS DATA FROM THE NORTHWIND DATAB ...
Data Mining and Statistical Analysis Project
THE OBJECTIVE OF THIS PORTFOLIO PROJECT IS MINING DATA FROM A DATA WAREHOUSE, WHICH CONTAINS DATA FROM THE NORTHWIND DATABASE THAT WAS CONSTRUCTED DURING YOUR INSTALLATION OF POSTGRESQL.Below are the summarized tasks for this Project.***This requires PostgreSQL and SAS University (all free downloads).***1. Create a data warehouse database (MUST USE DATA FROM NORTHWIND DATABASE: https://github.com/pthom/northwind_psql/blob/maste...), including the fact and dimension tables (star schema).Create the schema for each table.Populate the tables using SQL (PostgreSQL).Submit screen shots of tables, schemas, and populated tables/results2. Preprocessing for SAS:Extract data from the data warehouse, creating a file for input into SAS. The format of the file is your choice. Ensure SAS University Edition accepts your selected format.3. Statistical Analysis Using SAS:Import data created in the preprocessing step.Conduct statistical analysis using the appropriate statistics from each category:Summary statisticsClassificationClusteringAssociationSubmit screen shots of the statistical analysis with notes on findingsMust include:An analysis of each variable in the data setAn analysis to determine which variables could serve as appropriate classifier variablesAn analysis to determine if any variables are candidates for clusteringAn analysis to determine if any variables have associationsAny tables, histograms, or scatterplot graphs necessary to support your analyses (Screenshots)
ITS 83340 Golden Gate Univ Developing an Information Governance Strategy Response
Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free stora ...
ITS 83340 Golden Gate Univ Developing an Information Governance Strategy Response
Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained. Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements. For this to be achievable, the chapter has identified one most important consideration that must be met. What is that consideration? Identify, and provide a brief narrative to support your answer.All original posts and comments must beYou must do the following:1) Create a new thread and share your perspectives with examples and references to course material with APA guidelines2) Please make your initial post with 500 words and two response posts substantive with at least 150 words . A substantive post will do at least TWO of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)Make an argument concerning the topic.
Similar Content
Ohio University Computer Tableau Visualizations Question
Data visualization has become a standard analytical tool which capitalizes on the ability of humans to recognize patterns ...
Brown Bag Lunch
Congratulations! You've been asked to prepare a short presentation for one of the company's Brown Bag Lunch training even...
COMP 10005 Middle East College Introduction to Programming Report
All requirements in the file attached Similarity less than 8%plagrisim report is needed For ...
significance of information in security plan
Using proper APA formatting write 400-600 words, not including your heading or reference pages discussing the significance...
American College of California Storage and Integration? Discussion
Pick on below mentioned topic and then identify the benefits and challenges associated with that concept. Do not simply li...
Brite Divinity School of Texas Christian Decoding Binary Sequence Paper
Simple Comp Science Task Please check if I have chosen the right language. ...
Executive Program Practical Connection
Rittinghouse & Ransome (2017), Information innovation (IT) is developing quickly. It gets obsolete as quick as it develops...
Swot Analysis
Java Jake’s Coffee House is designed to be an inviting, modern, and premium The shop will offer a variety of high-end go...
Networks To Catch Criminals
According to a paper published by the Global Initiative against Transnational Organized Crime (GITOC) in 2021, 79.2% of th...
Related Tags
Book Guides
Studypool values your privacy. Only questions posted as Public are visible on our website.
Most Popular Content
6 pages
Database Administration
Current businesses and organizations use network databases to share and store their information. Availability of network a ...
Database Administration
Current businesses and organizations use network databases to share and store their information. Availability of network and its components enables ...
7 pages
Case Study On Upward Bound Airline
The B2C project is formed with the purpose of making one standard decision of reducing the costs in the organization and e ...
Case Study On Upward Bound Airline
The B2C project is formed with the purpose of making one standard decision of reducing the costs in the organization and ensuring the faster provision ...
OSU Importing and Indexing a Data Set Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
OSU Importing and Indexing a Data Set Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Every time you connect to your Apporto environment, please start your MongoDB server with either of the command lines:#start mongo without authentication/usr/local/bin/mongod_ctl start-noauthCopy the port number given in the output, for example:Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution. Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell. IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:<code>/usr/local/bin/mongod_ctl stop
/usr/local/bin/mongod_ctl start
</code>You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:<code>mongo --authenticationDatabase "admin" -u "admin" -p
</code>This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable. Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial. If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:<code>/usr/local/bin/mongod_ctl stop
/usr/local/bin/mongod_ctl start-noauth
</code>Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”. IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
Disks and Printers, computer science homework help
"Disks and Printers" Identify the specific manufacture and model of one (1) magnetic disk, one (1) solid state drive, and ...
Disks and Printers, computer science homework help
"Disks and Printers" Identify the specific manufacture and model of one (1) magnetic disk, one (1) solid state drive, and one (1) optical drive. Evaluate the quality of each in terms of read and write speeds, access methods, storage capacity, longevity, and price. Recommend the device that would be the best suited for a home environment and the device that would be best suited for a business environment. Provide a rationale for your response.Identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch), memory, color capability, duplex printing capability, cartridge price, cartridge printing capacity, and longevity. Next, recommend the printer that would be the best suited for a home environment and the printer that would be the best suited for a business environment. Provide a rationale for your response.
Data Mining and Statistical Analysis Project
THE OBJECTIVE OF THIS PORTFOLIO PROJECT IS MINING DATA FROM A DATA WAREHOUSE, WHICH CONTAINS DATA FROM THE NORTHWIND DATAB ...
Data Mining and Statistical Analysis Project
THE OBJECTIVE OF THIS PORTFOLIO PROJECT IS MINING DATA FROM A DATA WAREHOUSE, WHICH CONTAINS DATA FROM THE NORTHWIND DATABASE THAT WAS CONSTRUCTED DURING YOUR INSTALLATION OF POSTGRESQL.Below are the summarized tasks for this Project.***This requires PostgreSQL and SAS University (all free downloads).***1. Create a data warehouse database (MUST USE DATA FROM NORTHWIND DATABASE: https://github.com/pthom/northwind_psql/blob/maste...), including the fact and dimension tables (star schema).Create the schema for each table.Populate the tables using SQL (PostgreSQL).Submit screen shots of tables, schemas, and populated tables/results2. Preprocessing for SAS:Extract data from the data warehouse, creating a file for input into SAS. The format of the file is your choice. Ensure SAS University Edition accepts your selected format.3. Statistical Analysis Using SAS:Import data created in the preprocessing step.Conduct statistical analysis using the appropriate statistics from each category:Summary statisticsClassificationClusteringAssociationSubmit screen shots of the statistical analysis with notes on findingsMust include:An analysis of each variable in the data setAn analysis to determine which variables could serve as appropriate classifier variablesAn analysis to determine if any variables are candidates for clusteringAn analysis to determine if any variables have associationsAny tables, histograms, or scatterplot graphs necessary to support your analyses (Screenshots)
ITS 83340 Golden Gate Univ Developing an Information Governance Strategy Response
Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free stora ...
ITS 83340 Golden Gate Univ Developing an Information Governance Strategy Response
Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained. Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements. For this to be achievable, the chapter has identified one most important consideration that must be met. What is that consideration? Identify, and provide a brief narrative to support your answer.All original posts and comments must beYou must do the following:1) Create a new thread and share your perspectives with examples and references to course material with APA guidelines2) Please make your initial post with 500 words and two response posts substantive with at least 150 words . A substantive post will do at least TWO of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)Make an argument concerning the topic.
Brown University
1271 Tutors
California Institute of Technology
2131 Tutors
Carnegie Mellon University
982 Tutors
Columbia University
1256 Tutors
Dartmouth University
2113 Tutors
Emory University
2279 Tutors
Harvard University
599 Tutors
Massachusetts Institute of Technology
2319 Tutors
New York University
1645 Tutors
Notre Dam University
1911 Tutors
Oklahoma University
2122 Tutors
Pennsylvania State University
932 Tutors
Princeton University
1211 Tutors
Stanford University
983 Tutors
University of California
1282 Tutors
Oxford University
123 Tutors
Yale University
2325 Tutors
Have a homework question? Get help from verified tutors now!