Description
everything is clear on the file
Unformatted Attachment Preview
CS 112, Lab 10 – Exercise
Exceptions
(due R 7/13, 11:59pm)
Files:
•
•
•
Create your own file with our convention (userID_2xx_L10.py).
You should also download this file for testing:
http://cs.gmu.edu/~marks/112/labs/testerL10E.py
Run the tester as always: python3 testerL10E.py gmason76_2B5_L10.py just these funcs
As this is an Exercise, you can read any and all materials, ask us questions, talk with other students, and
learn however you best learn in order to solve the task. Just create your own solution from those
experiences, and turn in your work.
Reminder: you can run individual inputs, such as get(['a','b','c'],0) by loading your file into
interactive mode with the –i flag. You should be using this technique on projects as well.
demo$ python3 –i gmason_2B5_L10.py
>>> get (['a', 'b', 'c'], 0 )
'a'
Exceptions provide a new form of control flow that also addresses code that crashes. We are able to
identify questionable code by placing it in a try block, and then we can selectively catch and respond to
different kinds of errors based on the type of issue that occurs.
You might also write code in a style of "ask for forgiveness" rather than "look before you leap" by just
attempting the code (in a try block) that you know will easily work on good input, and then just write the
response to failure afterwards.
In python, exception handling is particularly cheap (efficient); it's considered normal to use exception
handling in many ways throughout our python code.
Turning It In
Add a comment at the top of the file that indicates your name, userID, G#, lab section, a description of
your collaboration partners, as well as any other details you feel like sharing. Please also mention what
was most helpful for you. Once you are done, run the testing script once more to make sure you didn't
break things while adding these comments. Remember, if you didn't use try/except blocks on a
question when required, you won't get credit for it! If all is well, go ahead and turn in just your one
.py file you've been working on over on BlackBoard to the correct lab assignment. We have our own copy
of the testing file that we'll use, so please don't turn that in (or any other extra files), as it will just slow us
down.
What can I use?
There are no restrictions on what functions to use on this lab – use this time to learn how to raise
exceptions, how to catch exceptions, and how to use exception handling to deal with special cases.
get(xs, index, response=None): Consider a list of values, xs. Find and return the value at location
index. If index is invalid for xs, return response instead. Remember that .get() for dictionaries works
gracefully for non-existing keys. Here we are implementing a get() function for list type.
• Parameters:
o xs :: list of values of any length.
o index :: an integer, specifying which value in the list to return.
o response :: a python value, to be returned when index is invalid for the list.
• Return value: a value from xs at index or the pre-set response.
• Requirement: you must use try-except blocks in your solution!
• Examples:
o get(['a','b','c'],0)
→
'a'
o get(['a','b','c'],3)
→
None
o get(['a','b','c'],4,"oops") →
'oops'
classify(input_string): It takes as input a string with a mixed group of integers and words separated
by spaces. It returns a tuple of two lists: a list of integers and a list of non-empty words. Use exceptions
to distribute words and integers to their respective lists. Note: do NOT include empty string in the return
list; any string that does not include an integer only (e.g. '$10' or '3.00') should be classified as words.
Hint: check what happens when you call int() on strings like '3.00'.
• Parameter: input_string :: string with a group of integers and words separated by spaces.
• Return value: a tuple of a list of integers(int) and a list of words(string).
• Requirement: you must use try-except blocks in your solution!
• Examples:
o classify("I have 35 apples")
→ ([35], ['I', 'have', 'apples'])
o classify("Today is Sunday")
→ ([],['Today', 'is', 'Sunday'])
o classify("That will be $10 please") → ([],['That','will','be','$10','please'])
shelve(inventory, product_list): Given a dictionary, inventory, and a list of tuples product_list,
we need to update the inventory with products listed in product_list: if a product is already in store,
update the amount; if the product is not in store, add a new entry in inventory for it. We might also call
this function to update inventory when the stock amount is decreased. But if the amount of any product
is below zero, we must raise a ValueError with the "negative amount for product" message.
•
•
•
•
Parameters:
o inventory :: a dictionary with product name (string) keys and product amount (int) values.
o product_list :: a list of tuples, each tuple has two members: a string as the product name
and an integer as the amount.
Returns: None. You should make update to inventory in-place.
Raises: ValueError when the amount of a product is below zero.
Examples:
o
>>> d = {"apple":50, "pear":30, "orange":25}
>>> ps = [("apple",20),("pear",-10),("grape",18)]
>>> shelve(d,ps)
>>> d
{'pear': 20, 'grape': 18, 'orange': 25, 'apple': 70}
>>> shelve(d,[("apple",-1000)])
Traceback (most recent call last):
…
ValueError: negative amount for apple
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hi! H...
Completion Status:
100%
Review
Review
Anonymous
Really great stuff, couldn't ask for more.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
CTU InfoTech Enterprise Content Management and Data Governance Policies Case Study
ase Study: Problem 1The case study company has experienced rapid growth in both the size of its client base and also in th ...
CTU InfoTech Enterprise Content Management and Data Governance Policies Case Study
ase Study: Problem 1The case study company has experienced rapid growth in both the size of its client base and also in the services provided to clients. Unfortunately, the growth in data management policies, procedures, and systems has not kept pace with the growth, and the company finds itself in a position where sensitive data are not adequately protected, and content management is insufficient to ensure the accuracy and availability of the data. To resolve this problem, the company has enlisted the aid of a consultant with expertise in enterprise data management and data governance. After initial planning meetings with the company’s chief executive officer (CEO) and chief information officer (CIO), the consultant has determined that the first step in the project should be to evaluate the company’s current major content requirements. The consultant will also establish an implementation plan for a new enterprise content management (ECM) system. How should this evaluation be done, and what should be included in the results? (Key assignment deliverable: Project Outline and Requirements, Implementation Life Cycle)Key Assignment OverviewThroughout this course, you will work on several aspects of enterprise content management that will result in a complete ECM and Data Governance Policies and Procedures Manual for a company of your choosing. Enterprise content management is the formal management of the organization and the storage of an organization's valuable content and documents that are related to business processes. Data governance policies and procedures are the formal policies and processes that enforce data quality, management, and policies and business process management and risk management. You will not actually be performing the implementation of the system, but you will work extensively with the concepts of good enterprise content management practices. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week.Enterprise Content Management and Data Governance Policies and Procedures ManualThis course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of an Enterprise Content Management and Data Governance Policies and Procedures Manual. You will select an organization (real or fictitious) and apply your research to the development of an ECM and Data Governance Policies and Procedures Manual that would be appropriate for implementation within the organization. The goal of this course project is to develop the policies and procedures necessary for the organized management and governance of content in an enterprise.Organization and Project SelectionThe first step will be to select an organization as the target for your Enterprise Content Management and Data Governance Policies and Procedures Manual. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:Nontrivial: The organization should be large enough and should deal with sufficient amounts of data to allow reasonable exercise of the enterprise content management and data governance policies and procedures that you develop in your manual. Note that the organization should be similar to the organization presented in the Problem Based Learning Scenario, but the company does not have to be a consulting company. The company should, however, deal with clients and some of their sensitive data. The organization can be fictional if necessary, and appropriate assumptions may be made.Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.Accessibility: You should have good access to the people and other information related to the project because this will be an important part of the process.Note: The selected organization may already have an enterprise content management system in place and can still be used as the basis for the projects in this course.Select an organization that meets these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.AssignmentFor the assignments in this course, you will be developing an Enterprise Content Management and Data Governance Policies and Procedures Manual that defines the policies and procedures for management and governance of data and content within the organization. Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery (this is the Key Assignment). Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.The following are the project deliverables:Submit the project proposal to your instructor for approval.Enterprise Content Management and Data Governance Policies and Procedures Manual document shellUse WordTitle PageCourse number and nameProject nameStudent nameDateTable of ContentsUse an autogenerated TOC.It should be on a separate page.It should be a maximum of 3 levels deep.Be sure to update the fields of the TOC so it is up-to-date before submitting your project.Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)Project Outline and Requirements (Week 1)Implementation Life Cycle (Week 1)Information Infrastructure Evaluation (Week 2)Information Infrastructure Improvements (Week 3)Data Governance Evaluation (Week 4)Data Governance Improvements (Week 5)Implementation Plan (Week 5)New ContentProject Outline and RequirementsProvide a brief description of the organization (can be hypothetical) that will be used as the basis for the projects in the course.Include company size, location(s), and other pertinent information.The organization should be involved in dealing with clients and some of their sensitive information.Summarize the content requirements for the organization, including the major categories of content and regulations that might apply to the organization’s content. Material can be taken from an approved proposal that is submitted to the instructor.Implementation Life CycleThoroughly describe the life cycle that will be used to implement the ECM and data governance policies and procedures.Each stage of the life cycle should include significant detail and demonstrate a broad understanding of the implementation requirements.Be sure this project is approved by the instructor.Name the document "yourname_IT621_IP1.doc."Worked ExamplePlease refer to the Worked Example below for an example of this assignment based on the Problem-Based Learning Scenario. The worked example is not intended to be a complete example of the assignment but will illustrate the basic concepts required for completion of the assignment and can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific and should reflect your own approach to the assignment rather than just following the same outline provided in the worked example.The worked example is provided here to help with this assignment.Please submit your assignment.For assistance with your assignment, please use your text, Web resources, and all course materials.
lynix scripting codes assingment
Assignment 3 (2).docx this is the assignment aboveand this is the logFileSnippets.txt of it ************ [ ...
lynix scripting codes assingment
Assignment 3 (2).docx this is the assignment aboveand this is the logFileSnippets.txt of it ************ [/var/log/message: General message and system related stuff ] ************
Jul 17 22:04:25 router dnsprobe[276]: dns query failed
Jul 17 22:04:29 router last message repeated 2 times
Jul 17 22:04:29 router dnsprobe[276]: Primary DNS server Is Down... Switching To Secondary DNS server
Jul 17 22:05:08 router dnsprobe[276]: Switching Back To Primary DNS server
Jul 17 22:26:11 debian -- MARK --
Jul 17 22:46:11 debian -- MARK --
Jul 17 22:47:36 router -- MARK --
Jul 17 22:47:36 router dnsprobe[276]: dns query failed
Jul 17 22:47:38 debian kernel: rtc: lost some interrupts at 1024Hz.
Jun 17 22:47:39 debian kernel: IN=eth0 OUT= MAC=00:0f:ea:91:04:07:00:08:5c:00:00:01:08:00 SRC=61.4.218.24 DST=192.168.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=21599 DF PROTO=TCP SPT=59297 DPT=22 WINDOW=5840 RES=0x00 SYN URGP=0
************ [/var/log/auth.log: Authenication log] ************
Aug 18 11:00:57 izxvps sshd[5657]: Failed password for root from 95.58.255.62 port 38980 ssh2
Aug 18 23:08:26 izxvps sshd[5768]: Failed password for root from 91.205.189.15 port 38156 ssh2
Aug 18 23:08:30 izxvps sshd[5770]: Failed password for nobody from 91.205.189.15 port 38556 ssh2
Aug 18 23:08:34 izxvps sshd[5772]: Failed password for invalid user asterisk from 91.205.189.15 port 38864 ssh2
Aug 18 23:08:38 izxvps sshd[5774]: Failed password for invalid user sjobeck from 91.205.189.15 port 39157 ssh2
Aug 18 23:08:42 izxvps sshd[5776]: Failed password for root from 91.205.189.15 port 39467 ssh2
************ [var/log/kern.log: Kernel logs] ************
May 8 03:07:40 chad last message repeated 1585 times
May 8 03:08:40 chad last message repeated 1587 times
May 8 03:08:58 chad last message repeated 527 times
May 8 03:08:58 chad kernel: apm: BIOS version 1.2 Flags 0x07 (Driver version 1.16ac)
May 8 03:08:58 chad kernel: apm: overridden by ACPI.
May 8 03:08:58 chad kernel: APIC error on CPU0: 40(40)
May 8 03:09:29 chad last message repeated 805 times
May 8 03:10:30 chad last message repeated 1709 times
May 8 03:11:31 chad last message repeated 1745 times
May 8 03:12:32 chad last message repeated 1519 times
May 8 03:13:33 chad last message repeated 1479 times
************ [var/log/cron.log: Crond logs (cron job)] ************
Oct 8 22:00:00 dev-db crond[18340]: (root) CMD (/bin/sh /home/root/bin/system_check &)
Oct 8 23:00:00 dev-db crond[20348]: (oracle) CMD (/bin/sh /home/oracle/bin/cleanup.sh &)
Oct 8 23:59:00 dev-db crond[20399]: (john) CMD (/bin/sh /home/john/bin/backup.sh &)
************ [/var/log/maillog: Mail server logs] ************
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13360]: q71He1xw027248: to=postmaster, delay=3+17:03:10, xdelay=00:00:00, mailer=relay, pri=23074446, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13308]: q717K1wk024979: to=postmaster, delay=4+03:23:18, xdelay=00:00:00, mailer=relay, pri=25779463, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13360]: q71He1xx027248: to=postmaster, delay=3+17:03:10, xdelay=00:00:00, mailer=relay, pri=23075343, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
************ [/var/log/boot.log : System boot log] ************
Thu Jun 21 17:39:18 2012: [....] Setting parameters of disc: (none)^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0c.
Thu Jun 21 17:39:18 2012: [....] Setting preliminary keymap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Activating swap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Checking root file system...fsck from util-linux 2.20.1
Thu Jun 21 17:39:18 2012: /dev/md0: clean, 534274/72024064 files, 63548418/288085470 blocks
Thu Jun 21 17:39:18 2012: ^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [^[[36minfo^[[39;49m] Loading kernel module loop.
Thu Jun 21 17:39:18 2012: [....] Cleaning up temporary files... /tmp /lib/init/rw^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0c.
Thu Jun 21 17:39:18 2012: mount: according to mtab, tmpfs is already mounted on /run/lock
Thu Jun 21 17:39:18 2012:
Thu Jun 21 17:39:18 2012: mount: according to mtab, tmpfs is already mounted on /run/shm
Thu Jun 21 17:39:18 2012:
Thu Jun 21 17:39:18 2012: [....] Generating udev events for MD arrays...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Setting up LVM Volume Groups...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:19 2012: [....] Activating lvm and md swap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:19 2012: [....] Checking file systems...fsck from util-linux 2.20.1
************ [/var/log/httpd/httpd.log: Apache access and error logs directory] ************
[Wed Mar 21 11:30:58 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Wed Mar 21 11:30:58 2012] [warn] RSA server certificate CommonName (CN) `test8rc1.schtrumpf.com' does NOT match server name!?
[Wed Mar 21 11:30:58 2012] [notice] Digest: generating secret for digest authentication ...
[Wed Mar 21 11:30:58 2012] [notice] Digest: done
[Wed Mar 21 11:31:03 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Wed Mar 21 11:31:03 2012] [warn] RSA server certificate CommonName (CN) `test8rc1.schtrumpf.com' does NOT match server name!?
[Wed Mar 21 11:31:04 2012] [notice] Apache configured -- resuming normal operations
[Wed Mar 21 11:32:34 2012] [error] [client 192.168.0.1] File does not exist: /home/e-smith/files/ibays/Primary/html/favicon.ico
[Wed Mar 21 11:32:34 2012] [error] [client 192.168.0.1] File does not exist: /home/e-smith/files/ibays/Primary/html/favicon.ico
[Wed Mar 21 11:32:59 2012] [notice] Graceful restart requested, doing restart
[Wed Mar 21 11:32:59 2012] [notice] Digest: generating secret for digest authentication ...
[Wed Mar 21 11:32:59 2012] [notice] Digest: done
************ [/var/log/daemon.log: Apache access and error logs directory] ************
Feb 11 06:55:51 mamma NetworkManager: <info> starting...
Feb 11 06:55:51 mamma NetworkManager: <info> Trying to start the modem-manager...
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: init!
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: update_system_hostname
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: guessed connection type (eth0) = 802-3-ethernet
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: update_connection_setting_from_if_block: name:eth0, type:802-3-ethernet,id:Ifupdown (eth0), uuid: 681b428f-beaf-8932-dce4-687ed5bae28e
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: management mode:unmanaged
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: devices added (path: /sys/devices/pci0000:00/0000:00:1c.1/0000:40:00.0/net/eth0, iface:eth0)
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: locking wired connection setting
Feb 11 06:55:51 mamma NetworkManager: Ifupdown: get unmanaged devices count: 1
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: (141091568) ...get_connections.
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: (141091568) ...get_connections (managed=false): return empty list.
Feb 11 06:55:51 mamma NetworkManager: Ifupdown: get unmanaged devices
7 pages
Assignment On Honeybot
1. A screenshot showing the total number of sockets loaded in the bottom status bar. While using the HoneyBOT, I was able ...
Assignment On Honeybot
1. A screenshot showing the total number of sockets loaded in the bottom status bar. While using the HoneyBOT, I was able to capture various events ...
Discussion Question 1
Complete data are very rare because some data are usually missing. There are typically four strategies to handle missing d ...
Discussion Question 1
Complete data are very rare because some data are usually missing. There are typically four strategies to handle missing data.Ignore the variables with missing data.Delete the records that have some missing values.Impute the missing values (i.e., simply fill in the missing values with some other value, such as the mean of similar records with data).Use a data mining technique that can handle missing values, such as CART, which is one of a few techniques that handle missing data pretty well.Suppose you are working on a project to model a hotel company's customer base. The goal is to determine which customer attributes are correlated with a high number of hotel stays. You have access to data from a customer survey, but one field (which is optional) is yearly income and has some missing values equaling roughly 5% of the records. Which of the strategies should be used? Explain why. Suppose you chose the third strategy. Explain how you would impute the missing incomes.
CS449 University of Missouri Refactoring and Automated Testing Programming
Hello,I need someone to complete this homework by 11:00 pm (central time, USA). The instructions are well described in the ...
CS449 University of Missouri Refactoring and Automated Testing Programming
Hello,I need someone to complete this homework by 11:00 pm (central time, USA). The instructions are well described in the PDF document below. Thanks.
Similar Content
I want to know how to format number
I would like...
Database Environment Proposal
As one of the program outcomes for the Bachelor of Science in Information Technology program, students must design and dev...
Java Program
JAVA PROGRAM ASSIGNMENT JAVA PROGRAM ASSIGNMENT JAVA PROGRAM ASSIGNMENT ...
Barclay College Word Score Values in Scrabble Game Project
please check up the doc and follow the instructor.please check up the doc and follow the instructor.please check up the do...
University of California Irvine Hosaki Function Math Lab Report
3 matlab questions attached below, and if it's possible, I will send you 5 questions, and if I am wrong please help me fix...
NVCC Java Question
...
Analytical
The series RLC circuit with a dc source Vs is shown below: The voltage across R, L and C can be expressed in terms of curr...
Results
(base) HUYNGU3-M-841V:linuxLS huyngu3 ls [abc]*e*...
Midterm
You are requested to get ready for the exam by fully charging your computer/phone batteries, checking your camera, and int...
Related Tags
Book Guides
All the Kings Men
by Robert Penn Warren
The BFG
by Roald Dahl
Beowulf
by Anonymous Anglo-Saxon poet
Persuasion
by Jane Austen
One Flew Over the Cuckoos Nest
by Ken Kesey
The Lord of the Flies
by William Golding
And Then There Were None
by Agatha Christie
Extreme Ownership - How US Navy SEALs Lead and Win
by Jocko Willink and Leif Babin
A Passage to India
by E. M. Forster
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
CTU InfoTech Enterprise Content Management and Data Governance Policies Case Study
ase Study: Problem 1The case study company has experienced rapid growth in both the size of its client base and also in th ...
CTU InfoTech Enterprise Content Management and Data Governance Policies Case Study
ase Study: Problem 1The case study company has experienced rapid growth in both the size of its client base and also in the services provided to clients. Unfortunately, the growth in data management policies, procedures, and systems has not kept pace with the growth, and the company finds itself in a position where sensitive data are not adequately protected, and content management is insufficient to ensure the accuracy and availability of the data. To resolve this problem, the company has enlisted the aid of a consultant with expertise in enterprise data management and data governance. After initial planning meetings with the company’s chief executive officer (CEO) and chief information officer (CIO), the consultant has determined that the first step in the project should be to evaluate the company’s current major content requirements. The consultant will also establish an implementation plan for a new enterprise content management (ECM) system. How should this evaluation be done, and what should be included in the results? (Key assignment deliverable: Project Outline and Requirements, Implementation Life Cycle)Key Assignment OverviewThroughout this course, you will work on several aspects of enterprise content management that will result in a complete ECM and Data Governance Policies and Procedures Manual for a company of your choosing. Enterprise content management is the formal management of the organization and the storage of an organization's valuable content and documents that are related to business processes. Data governance policies and procedures are the formal policies and processes that enforce data quality, management, and policies and business process management and risk management. You will not actually be performing the implementation of the system, but you will work extensively with the concepts of good enterprise content management practices. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week.Enterprise Content Management and Data Governance Policies and Procedures ManualThis course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of an Enterprise Content Management and Data Governance Policies and Procedures Manual. You will select an organization (real or fictitious) and apply your research to the development of an ECM and Data Governance Policies and Procedures Manual that would be appropriate for implementation within the organization. The goal of this course project is to develop the policies and procedures necessary for the organized management and governance of content in an enterprise.Organization and Project SelectionThe first step will be to select an organization as the target for your Enterprise Content Management and Data Governance Policies and Procedures Manual. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:Nontrivial: The organization should be large enough and should deal with sufficient amounts of data to allow reasonable exercise of the enterprise content management and data governance policies and procedures that you develop in your manual. Note that the organization should be similar to the organization presented in the Problem Based Learning Scenario, but the company does not have to be a consulting company. The company should, however, deal with clients and some of their sensitive data. The organization can be fictional if necessary, and appropriate assumptions may be made.Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.Accessibility: You should have good access to the people and other information related to the project because this will be an important part of the process.Note: The selected organization may already have an enterprise content management system in place and can still be used as the basis for the projects in this course.Select an organization that meets these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.AssignmentFor the assignments in this course, you will be developing an Enterprise Content Management and Data Governance Policies and Procedures Manual that defines the policies and procedures for management and governance of data and content within the organization. Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery (this is the Key Assignment). Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.The following are the project deliverables:Submit the project proposal to your instructor for approval.Enterprise Content Management and Data Governance Policies and Procedures Manual document shellUse WordTitle PageCourse number and nameProject nameStudent nameDateTable of ContentsUse an autogenerated TOC.It should be on a separate page.It should be a maximum of 3 levels deep.Be sure to update the fields of the TOC so it is up-to-date before submitting your project.Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)Project Outline and Requirements (Week 1)Implementation Life Cycle (Week 1)Information Infrastructure Evaluation (Week 2)Information Infrastructure Improvements (Week 3)Data Governance Evaluation (Week 4)Data Governance Improvements (Week 5)Implementation Plan (Week 5)New ContentProject Outline and RequirementsProvide a brief description of the organization (can be hypothetical) that will be used as the basis for the projects in the course.Include company size, location(s), and other pertinent information.The organization should be involved in dealing with clients and some of their sensitive information.Summarize the content requirements for the organization, including the major categories of content and regulations that might apply to the organization’s content. Material can be taken from an approved proposal that is submitted to the instructor.Implementation Life CycleThoroughly describe the life cycle that will be used to implement the ECM and data governance policies and procedures.Each stage of the life cycle should include significant detail and demonstrate a broad understanding of the implementation requirements.Be sure this project is approved by the instructor.Name the document "yourname_IT621_IP1.doc."Worked ExamplePlease refer to the Worked Example below for an example of this assignment based on the Problem-Based Learning Scenario. The worked example is not intended to be a complete example of the assignment but will illustrate the basic concepts required for completion of the assignment and can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific and should reflect your own approach to the assignment rather than just following the same outline provided in the worked example.The worked example is provided here to help with this assignment.Please submit your assignment.For assistance with your assignment, please use your text, Web resources, and all course materials.
lynix scripting codes assingment
Assignment 3 (2).docx this is the assignment aboveand this is the logFileSnippets.txt of it ************ [ ...
lynix scripting codes assingment
Assignment 3 (2).docx this is the assignment aboveand this is the logFileSnippets.txt of it ************ [/var/log/message: General message and system related stuff ] ************
Jul 17 22:04:25 router dnsprobe[276]: dns query failed
Jul 17 22:04:29 router last message repeated 2 times
Jul 17 22:04:29 router dnsprobe[276]: Primary DNS server Is Down... Switching To Secondary DNS server
Jul 17 22:05:08 router dnsprobe[276]: Switching Back To Primary DNS server
Jul 17 22:26:11 debian -- MARK --
Jul 17 22:46:11 debian -- MARK --
Jul 17 22:47:36 router -- MARK --
Jul 17 22:47:36 router dnsprobe[276]: dns query failed
Jul 17 22:47:38 debian kernel: rtc: lost some interrupts at 1024Hz.
Jun 17 22:47:39 debian kernel: IN=eth0 OUT= MAC=00:0f:ea:91:04:07:00:08:5c:00:00:01:08:00 SRC=61.4.218.24 DST=192.168.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=21599 DF PROTO=TCP SPT=59297 DPT=22 WINDOW=5840 RES=0x00 SYN URGP=0
************ [/var/log/auth.log: Authenication log] ************
Aug 18 11:00:57 izxvps sshd[5657]: Failed password for root from 95.58.255.62 port 38980 ssh2
Aug 18 23:08:26 izxvps sshd[5768]: Failed password for root from 91.205.189.15 port 38156 ssh2
Aug 18 23:08:30 izxvps sshd[5770]: Failed password for nobody from 91.205.189.15 port 38556 ssh2
Aug 18 23:08:34 izxvps sshd[5772]: Failed password for invalid user asterisk from 91.205.189.15 port 38864 ssh2
Aug 18 23:08:38 izxvps sshd[5774]: Failed password for invalid user sjobeck from 91.205.189.15 port 39157 ssh2
Aug 18 23:08:42 izxvps sshd[5776]: Failed password for root from 91.205.189.15 port 39467 ssh2
************ [var/log/kern.log: Kernel logs] ************
May 8 03:07:40 chad last message repeated 1585 times
May 8 03:08:40 chad last message repeated 1587 times
May 8 03:08:58 chad last message repeated 527 times
May 8 03:08:58 chad kernel: apm: BIOS version 1.2 Flags 0x07 (Driver version 1.16ac)
May 8 03:08:58 chad kernel: apm: overridden by ACPI.
May 8 03:08:58 chad kernel: APIC error on CPU0: 40(40)
May 8 03:09:29 chad last message repeated 805 times
May 8 03:10:30 chad last message repeated 1709 times
May 8 03:11:31 chad last message repeated 1745 times
May 8 03:12:32 chad last message repeated 1519 times
May 8 03:13:33 chad last message repeated 1479 times
************ [var/log/cron.log: Crond logs (cron job)] ************
Oct 8 22:00:00 dev-db crond[18340]: (root) CMD (/bin/sh /home/root/bin/system_check &)
Oct 8 23:00:00 dev-db crond[20348]: (oracle) CMD (/bin/sh /home/oracle/bin/cleanup.sh &)
Oct 8 23:59:00 dev-db crond[20399]: (john) CMD (/bin/sh /home/john/bin/backup.sh &)
************ [/var/log/maillog: Mail server logs] ************
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13360]: q71He1xw027248: to=postmaster, delay=3+17:03:10, xdelay=00:00:00, mailer=relay, pri=23074446, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13308]: q717K1wk024979: to=postmaster, delay=4+03:23:18, xdelay=00:00:00, mailer=relay, pri=25779463, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
Aug 5 10:48:25 domU-12-31-39-0B-C4-54 sm-msp-queue[13360]: q71He1xx027248: to=postmaster, delay=3+17:03:10, xdelay=00:00:00, mailer=relay, pri=23075343, relay=[127.0.0.1] [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by [127.0.0.1]
************ [/var/log/boot.log : System boot log] ************
Thu Jun 21 17:39:18 2012: [....] Setting parameters of disc: (none)^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0c.
Thu Jun 21 17:39:18 2012: [....] Setting preliminary keymap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Activating swap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Checking root file system...fsck from util-linux 2.20.1
Thu Jun 21 17:39:18 2012: /dev/md0: clean, 534274/72024064 files, 63548418/288085470 blocks
Thu Jun 21 17:39:18 2012: ^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [^[[36minfo^[[39;49m] Loading kernel module loop.
Thu Jun 21 17:39:18 2012: [....] Cleaning up temporary files... /tmp /lib/init/rw^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0c.
Thu Jun 21 17:39:18 2012: mount: according to mtab, tmpfs is already mounted on /run/lock
Thu Jun 21 17:39:18 2012:
Thu Jun 21 17:39:18 2012: mount: according to mtab, tmpfs is already mounted on /run/shm
Thu Jun 21 17:39:18 2012:
Thu Jun 21 17:39:18 2012: [....] Generating udev events for MD arrays...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:18 2012: [....] Setting up LVM Volume Groups...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:19 2012: [....] Activating lvm and md swap...^[[?25l^[[?1c^[7^[[1G[^[[32m ok ^[[39;49m^[8^[[?25h^[[?0cdone.
Thu Jun 21 17:39:19 2012: [....] Checking file systems...fsck from util-linux 2.20.1
************ [/var/log/httpd/httpd.log: Apache access and error logs directory] ************
[Wed Mar 21 11:30:58 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Wed Mar 21 11:30:58 2012] [warn] RSA server certificate CommonName (CN) `test8rc1.schtrumpf.com' does NOT match server name!?
[Wed Mar 21 11:30:58 2012] [notice] Digest: generating secret for digest authentication ...
[Wed Mar 21 11:30:58 2012] [notice] Digest: done
[Wed Mar 21 11:31:03 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Wed Mar 21 11:31:03 2012] [warn] RSA server certificate CommonName (CN) `test8rc1.schtrumpf.com' does NOT match server name!?
[Wed Mar 21 11:31:04 2012] [notice] Apache configured -- resuming normal operations
[Wed Mar 21 11:32:34 2012] [error] [client 192.168.0.1] File does not exist: /home/e-smith/files/ibays/Primary/html/favicon.ico
[Wed Mar 21 11:32:34 2012] [error] [client 192.168.0.1] File does not exist: /home/e-smith/files/ibays/Primary/html/favicon.ico
[Wed Mar 21 11:32:59 2012] [notice] Graceful restart requested, doing restart
[Wed Mar 21 11:32:59 2012] [notice] Digest: generating secret for digest authentication ...
[Wed Mar 21 11:32:59 2012] [notice] Digest: done
************ [/var/log/daemon.log: Apache access and error logs directory] ************
Feb 11 06:55:51 mamma NetworkManager: <info> starting...
Feb 11 06:55:51 mamma NetworkManager: <info> Trying to start the modem-manager...
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: init!
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: update_system_hostname
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: guessed connection type (eth0) = 802-3-ethernet
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: update_connection_setting_from_if_block: name:eth0, type:802-3-ethernet,id:Ifupdown (eth0), uuid: 681b428f-beaf-8932-dce4-687ed5bae28e
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: management mode:unmanaged
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: devices added (path: /sys/devices/pci0000:00/0000:00:1c.1/0000:40:00.0/net/eth0, iface:eth0)
Feb 11 06:55:51 mamma NetworkManager: SCPluginIfupdown: locking wired connection setting
Feb 11 06:55:51 mamma NetworkManager: Ifupdown: get unmanaged devices count: 1
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: (141091568) ...get_connections.
Feb 11 06:55:51 mamma NetworkManager: SCPlugin-Ifupdown: (141091568) ...get_connections (managed=false): return empty list.
Feb 11 06:55:51 mamma NetworkManager: Ifupdown: get unmanaged devices
7 pages
Assignment On Honeybot
1. A screenshot showing the total number of sockets loaded in the bottom status bar. While using the HoneyBOT, I was able ...
Assignment On Honeybot
1. A screenshot showing the total number of sockets loaded in the bottom status bar. While using the HoneyBOT, I was able to capture various events ...
Discussion Question 1
Complete data are very rare because some data are usually missing. There are typically four strategies to handle missing d ...
Discussion Question 1
Complete data are very rare because some data are usually missing. There are typically four strategies to handle missing data.Ignore the variables with missing data.Delete the records that have some missing values.Impute the missing values (i.e., simply fill in the missing values with some other value, such as the mean of similar records with data).Use a data mining technique that can handle missing values, such as CART, which is one of a few techniques that handle missing data pretty well.Suppose you are working on a project to model a hotel company's customer base. The goal is to determine which customer attributes are correlated with a high number of hotel stays. You have access to data from a customer survey, but one field (which is optional) is yearly income and has some missing values equaling roughly 5% of the records. Which of the strategies should be used? Explain why. Suppose you chose the third strategy. Explain how you would impute the missing incomes.
CS449 University of Missouri Refactoring and Automated Testing Programming
Hello,I need someone to complete this homework by 11:00 pm (central time, USA). The instructions are well described in the ...
CS449 University of Missouri Refactoring and Automated Testing Programming
Hello,I need someone to complete this homework by 11:00 pm (central time, USA). The instructions are well described in the PDF document below. Thanks.
Earn money selling
your Study Documents