Using C language:
void show_array (int data[ ], int n);
void InsertionSort (int data[ ], int n);
void SelectionSort (int data[ ], int n);
where data[] is the array and n is the size of the array.
If you implement both sort routines you will need to make a copy of the original unsorted array before using the first sort, or else the second sort will be working on a sorted version of the array.
In: Computer Science
Select a Database of your own choice and apply the
first three normalization processes. (1NF, 2NF & 3NF)
• The minimum number of records in the table must be 10
• Make sure you carry the same table from 1NF to 2NF and 3NF, do
not use separate tables from scratch for all the three forms.
• Brief explanation of the normalization processes must be
specified
In: Computer Science
ETHICS IN IT
The general moral imperatives involving individuals is to:
a. Contribute to society and human well-being.
b. Avoid harm to others.
c. Be honest and trustworthy.
d. Be fair and take action not to discriminate.
e. Honour property rights including copyrights and patent.
You are required to discuss the above general moral imperatives in
relation to
Information and Communication Technology (ICT).
In: Computer Science
Consider the following relation and convert to the normal form indicated. Make sure your Primary Key and its attribute(s) is/are underlined for full credit. Also indicate foreign keys using (FK) if any.
0NF:
ORDER[order_num, date, SSN, cust_name, phone, email, (SKU, item_name, price)]
Notes:An order has only one customer, but a customer can place many orders. Each order can have multiple items.
1NF:
2NF:
3NF:
In: Computer Science
In c++ please. Write a program that opens a specified text tile then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.
In: Computer Science
in the context of access control , explain the concepts of access control matrix, access control list ,privilege control list and capability
In: Computer Science
Must a Huffman tree be a two-tree? Explain
In: Computer Science
QUESTION 1
Which of the following will correctly change the name of the LOCATIONS table to NEW_LOCATIONS?
ALTER TABLE LOCATIONS RENAME NEW_LOCATIONS |
||
MODIFY TABLE LOCATIONS RENAME NEW_LOCATIONS |
||
RENAME LOCATIONS TO NEW_LOCATIONS |
||
None of the above, you cannot rename a table, you can only CREATE, ALTER and DROP a table. |
1 points
QUESTION 2
The data type of a column can never be changed once it has been created.
True
False
1 points
QUESTION 3
The following code creates a table named student_table with four columns: id, lname, fname, lunch_num CREATE TABLE student_table (id NUMBER(6), lname VARCHAR(20), fname VARCHAR(20), lunch_num NUMBER(4)); The lunch_num column in the above table has been marked as UNUSED. Which of the following is the best statement you can use if you wish to remove the UNUSED column from the student_table?
DROP column |
||
ALTER TABLE DELETE UNUSED COLUMNS |
||
ALTER TABLE DROP UNUSED COLUMNS |
||
ALTER TABLE DELETE ALL COLUMNS |
1 points
QUESTION 4
After issuing a SET UNUSED command on a column, another column with the same name can be added using an ALTER TABLE statement.
True
False
1 points
QUESTION 5
Comments can be added to a table by using the COMMENT ON TABLE statement. The comments being added are enclosed in:
Double quotes " " |
||
Single quotes ' ' |
||
Parentheses ( ) |
||
Brackets { } |
1 points
QUESTION 6
You can use the ALTER TABLE statement to:
Add a new column |
||
Modify an existing column |
||
Drop a column |
||
All of the above |
1 points
QUESTION 7
ALTER TABLE table_name RENAME can be used to:
Rename a row |
||
Rename a column |
||
Rename a table |
||
All of the above |
1 points
QUESTION 8
To completely get rid of a table, its contents, its structure, AND release the storage space the keyword is:
DROP |
||
DELETE |
||
TRUNCATE |
||
KILL |
1 points
QUESTION 9
When should you use the SET UNUSED command?
Never, there is no SET UNUSED command |
||
You should use it if you think the column may be needed again later |
||
You should use it when the system is being heavily used |
||
You should only use this command if you want the column to still be visible when you DESCRIBE the table |
1 points
QUESTION 10
You can use DROP COLUMN to drop all columns in a table, leaving a table structure with no columns.
True
False
In: Computer Science
In MatLab, Determine how many years it will take to accumulate at least $10,000 in
your bank account if you deposit $1000 initially and $500 at the end of
each year. The account pays 2.5% interest annually. At the end of each
year your loop should write a message to the user, for example: "After
year 1, the balance in your account is $xx,xxx.xx". Your script should
also write out the final balance after $10,000 is reached.
In: Computer Science
An employee suspects that his password has been compromised. He changed it two days ago, yet it seems someone has used it again. What might be going on?
Answer according to digital forensics
In: Computer Science
Discuss the importance of effective project management in following the workflow and achieving the specific project deliverables. Address appropriate strategies and methodologies for Software Development, or Web Design and Development. Be thorough. Take into consideration all stakeholders and identify both positive and negative potential outcomes
In: Computer Science
A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.
Answer according to digital forensics
In: Computer Science
I am trying to return a string from certain position of the sentence on C++, like a function/ statement that is equivalent to excel mid function.
In: Computer Science
An 8-bit byte with binary value 11001101 is to be encoded using
an even-parity Hamming code.
What is the binary value after encoding?
A bit stream 10101010 is transmitted using the standard CRC
method. The divisor is 1011.
Show the actual bit string transmitted. Suppose the second bit from
the left is inverted during
transmission. Show that how this error is detected by the
receiver?
What is the maximum size of the sender window and receiver
windows for each of the following
protocols when the number of bits in the sequence field is 8?
c. Go-Back-N ARQ
d. Selective-Repeat ARQ
Compare and contrast the Go-Back-N ARQ Protocol with
Selective-Repeat ARQ describing
the process of each protocol with a suitable example.
In: Computer Science
Pass or Fail (C++)
Given a vector, where each element in the vector is a [name, grade] pair sort range by name, partition range into pass and fail, preserving alphabetical order within partition. The grades are the number of points earned (600 points earns a passing grade).
std::vector<std::pair<std::string, int>> v {
{"josh", 851},
{"mark", 600},
{"charles", 412},
{"sebnem", 1000},
{"abdol", 905},
{"imen", 300}
};
--------EXPECTED
OUTPUT-------------------------------------------------
std::vector<std::pair<std::string, int>> w {
{"abdol", 905},
{"josh", 851},
{"mark", 600},
{"sebnem", 1000}, // Everyone after this point failed
{"charles", 412},
{"imen", 300}
};
Note: NO LOOPS ALLOWED
Thanks!
In: Computer Science