Questions
Using C language: Write a program that asks the user for the size of an array,...

Using C language:

  1. Write a program that asks the user for the size of an array, then reads a number of integer values (from user input) into the array. Write a function to print out the array and call it to print the array out after all values are read in. Write a function to implement Insertion Sort and run it on the data array to sort the array. Write another function to implement Selection Sort and run it on the data array.  Print out the array before and after each sort. NOTE: sort the items in descending order.

void show_array (int data[ ], int n);

void InsertionSort (int data[ ], int n);

void SelectionSort (int data[ ], int n);

where data[] is the array and n is the size of the array.

If you implement both sort routines you will need to make a copy of the original unsorted array before using the first sort, or else the second sort will be working on a sorted version of the array.

In: Computer Science

Select a Database of your own choice and apply the first three normalization processes. (1NF, 2NF...

Select a Database of your own choice and apply the first three normalization processes. (1NF, 2NF & 3NF)

• The minimum number of records in the table must be 10
• Make sure you carry the same table from 1NF to 2NF and 3NF, do not use separate tables from scratch for all the three forms.
• Brief explanation of the normalization processes must be specified

In: Computer Science

ETHICS IN IT The general moral imperatives involving individuals is to: a. Contribute to society and...

ETHICS IN IT

The general moral imperatives involving individuals is to:
a. Contribute to society and human well-being.
b. Avoid harm to others.
c. Be honest and trustworthy.
d. Be fair and take action not to discriminate.
e. Honour property rights including copyrights and patent.
You are required to discuss the above general moral imperatives in relation to
Information and Communication Technology (ICT).

In: Computer Science

Consider the following relation and convert to the normal form indicated. Make sure your Primary Key...

Consider the following relation and convert to the normal form indicated. Make sure your Primary Key and its attribute(s) is/are underlined for full credit. Also indicate foreign keys using (FK) if any.

0NF:

ORDER[order_num, date, SSN, cust_name, phone, email, (SKU, item_name, price)]

Notes:An order has only one customer, but a customer can place many orders. Each order can have multiple items.  

1NF:

2NF:

3NF:

In: Computer Science

In c++ please. Write a program that opens a specified text tile then displays a list...

In c++ please. Write a program that opens a specified text tile then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.

In: Computer Science

in the context of access control , explain the concepts of access control matrix, access control...

in the context of access control , explain the concepts of access control matrix, access control list ,privilege control list and capability

In: Computer Science

Must a Huffman tree be a two-tree? Explain

Must a Huffman tree be a two-tree? Explain

In: Computer Science

QUESTION 1 Which of the following will correctly change the name of the LOCATIONS table to...

QUESTION 1

  1. Which of the following will correctly change the name of the LOCATIONS table to NEW_LOCATIONS?

    ALTER TABLE LOCATIONS RENAME NEW_LOCATIONS

    MODIFY TABLE LOCATIONS RENAME NEW_LOCATIONS

    RENAME LOCATIONS TO NEW_LOCATIONS

    None of the above, you cannot rename a table, you can only CREATE, ALTER and DROP a table.

1 points   

QUESTION 2

  1. The data type of a column can never be changed once it has been created.

    True

    False

1 points   

QUESTION 3

  1. The following code creates a table named student_table with four columns: id, lname, fname, lunch_num CREATE TABLE student_table (id NUMBER(6), lname VARCHAR(20), fname VARCHAR(20), lunch_num NUMBER(4)); The lunch_num column in the above table has been marked as UNUSED. Which of the following is the best statement you can use if you wish to remove the UNUSED column from the student_table?

    DROP column

    ALTER TABLE DELETE UNUSED COLUMNS

    ALTER TABLE DROP UNUSED COLUMNS

    ALTER TABLE DELETE ALL COLUMNS

1 points   

QUESTION 4

  1. After issuing a SET UNUSED command on a column, another column with the same name can be added using an ALTER TABLE statement.

    True

    False

1 points   

QUESTION 5

  1. Comments can be added to a table by using the COMMENT ON TABLE statement. The comments being added are enclosed in:

    Double quotes " "

    Single quotes ' '

    Parentheses ( )

    Brackets { }

1 points   

QUESTION 6

  1. You can use the ALTER TABLE statement to:

    Add a new column

    Modify an existing column

    Drop a column

    All of the above

1 points   

QUESTION 7

  1. ALTER TABLE table_name RENAME can be used to:

    Rename a row

    Rename a column

    Rename a table

    All of the above

1 points   

QUESTION 8

  1. To completely get rid of a table, its contents, its structure, AND release the storage space the keyword is:

    DROP

    DELETE

    TRUNCATE

    KILL

1 points   

QUESTION 9

  1. When should you use the SET UNUSED command?

    Never, there is no SET UNUSED command

    You should use it if you think the column may be needed again later

    You should use it when the system is being heavily used

    You should only use this command if you want the column to still be visible when you DESCRIBE the table

1 points   

QUESTION 10

  1. You can use DROP COLUMN to drop all columns in a table, leaving a table structure with no columns.

    True

    False

In: Computer Science

In MatLab, Determine how many years it will take to accumulate at least $10,000 in your...

In MatLab, Determine how many years it will take to accumulate at least $10,000 in

your bank account if you deposit $1000 initially and $500 at the end of

each year. The account pays 2.5% interest annually. At the end of each

year your loop should write a message to the user, for example: "After

year 1, the balance in your account is $xx,xxx.xx". Your script should

also write out the final balance after $10,000 is reached.

In: Computer Science

An employee suspects that his password has been compromised. He changed it two days ago, yet...

An employee suspects that his password has been compromised. He changed it two days ago, yet it seems someone has used it again. What might be going on?

Answer according to digital forensics

In: Computer Science

Discuss the importance of effective project management in following the workflow and achieving the specific project...

Discuss the importance of effective project management in following the workflow and achieving the specific project deliverables. Address appropriate strategies and methodologies for Software Development, or Web Design and Development. Be thorough. Take into consideration all stakeholders and identify both positive and negative potential outcomes

In: Computer Science

A cloud customer has asked you to do a forensics analysis of data stored on a...

A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.

Answer according to digital forensics

In: Computer Science

I am trying to return a string from certain position of the sentence on C++, like...

I am trying to return a string from certain position of the sentence on C++, like a function/ statement that is equivalent to excel mid function.

In: Computer Science

An 8-bit byte with binary value 11001101 is to be encoded using an even-parity Hamming code....

An 8-bit byte with binary value 11001101 is to be encoded using an even-parity Hamming code.
What is the binary value after encoding?

A bit stream 10101010 is transmitted using the standard CRC method. The divisor is 1011.
Show the actual bit string transmitted. Suppose the second bit from the left is inverted during
transmission. Show that how this error is detected by the receiver?

What is the maximum size of the sender window and receiver windows for each of the following
protocols when the number of bits in the sequence field is 8?
c. Go-Back-N ARQ
d. Selective-Repeat ARQ


Compare and contrast the Go-Back-N ARQ Protocol with Selective-Repeat ARQ describing
the process of each protocol with a suitable example.

In: Computer Science

Pass or Fail (C++) Given a vector, where each element in the vector is a [name,...

Pass or Fail (C++)

Given a vector, where each element in the vector is a [name, grade] pair sort range by name, partition range into pass and fail, preserving alphabetical order within partition. The grades are the number of points earned (600 points earns a passing grade).

std::vector<std::pair<std::string, int>> v {
{"josh", 851},
{"mark", 600},
{"charles", 412},
{"sebnem", 1000},
{"abdol", 905},
{"imen", 300}
};


--------EXPECTED OUTPUT-------------------------------------------------

std::vector<std::pair<std::string, int>> w {
{"abdol", 905},
{"josh", 851},
{"mark", 600},
{"sebnem", 1000}, // Everyone after this point failed
{"charles", 412},
{"imen", 300}
};

Note: NO LOOPS ALLOWED

Thanks!

In: Computer Science