Questions
Define a Python function which finds the all of the odd numbers and the product of...

Define a Python function which finds the all of the odd numbers and the product of the odd numbers. (Use for loop and if conditions for this problem. Do not use existing codes. Use your own codes).(You need to use append function to obtain a list of odd numbers)

In: Computer Science

]write two main programs: one will add exception handling to a geometric object, and the other...

]write two main programs: one will add exception handling to a geometric object, and the other will create a Template function to find the max of three “entities” (either ints, floats, doubles, chars, and strings)

A trapezoid is a quadrilateral in which two opposite sides are parallel. (note: all squares, rectangles, and parallelograms are trapezoids)

Note 1: the length of Base 1 is always greater than or equal to Base 2

Note 2: To form a valid trapezoid, if must satisfy the side/length rule, namely, the sum of the lengths of Leg1,Leg2 , and Base 2 must be greater than the length of Base 1

Note 3:If a default trapezoid is created, set all the sides equal to 1 (i.e., a square, or rhombus)

The following is the UMs for a trapezoid:

Trapezoid

-base1 : double

-base2: double

-leg1: double

-leg2: double

+Trapezoid()

+Trapezoid (base1, base2, leg1, leg2)

// setters and getters

+print(void): void

+toString(void) : string

For the driver program:

Note 1: If the user creates a trapezoid that violates the side/length rule (including 0 or negative side lengths), throw an exception

Note 2: If the user sets one of the sides that violates the side/length rule, do not change the side, and throw an exception

A main drvier (main8a.cpp) :

#include <iostream>
#include "trapezoid.h"

using namespace std;

int main()
{
    cout << "Welcome to Lecture 16: Exceptions and Templates" << endl;
    cout << "The Trapezoid Program!\n";

    cout << "\nTry creating t1 (no parameters, which is valid):\n";
    try
    {
      Trapezoid t1; // this is valid, by design
      t1.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }

    cout << "\nTry creating t2(15,3,3,3) (which is invalid):\n";
    try
    {
      Trapezoid t2(15,3,3,3); // this is invalid
      t2.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }

    cout << "\nTry creating t3(5,3,4,4) (which is valid):\n";
    try
    {
      Trapezoid t3(5,3,4,4); // this is valid
      t3.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }

    cout << "\nTry changing base1 of default t4 to 10 (which is invalid):\n";
    try
    {
      Trapezoid t4;
      t4.setBase1(10); // this is invalid
      t4.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }

    cout << "\nTry changing leg2 of t5(55,30,15,12) to 6 (which is invalid):\n";
    try
    {
      Trapezoid t5(55,30,15,12);
      t5.setLeg2(6); // this is invalid
      t5.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }

    cout << "\nTry changing leg1 of default t6 to .5 (which is valid):\n";
    try
    {
      Trapezoid t6;
      t6.setLeg1(.5); // this is valid
      t6.print();
    }
    catch(string errorMsg)
    {
      cout << errorMsg << endl;
    }


    return EXIT_SUCCESS;
}

In: Computer Science

Using C language: Write a program that asks the user for the size of an array,...

Using C language:

  1. Write a program that asks the user for the size of an array, then reads a number of integer values (from user input) into the array. Write a function to print out the array and call it to print the array out after all values are read in. Write a function to implement Insertion Sort and run it on the data array to sort the array. Write another function to implement Selection Sort and run it on the data array.  Print out the array before and after each sort. NOTE: sort the items in descending order.

void show_array (int data[ ], int n);

void InsertionSort (int data[ ], int n);

void SelectionSort (int data[ ], int n);

where data[] is the array and n is the size of the array.

If you implement both sort routines you will need to make a copy of the original unsorted array before using the first sort, or else the second sort will be working on a sorted version of the array.

In: Computer Science

Select a Database of your own choice and apply the first three normalization processes. (1NF, 2NF...

Select a Database of your own choice and apply the first three normalization processes. (1NF, 2NF & 3NF)

• The minimum number of records in the table must be 10
• Make sure you carry the same table from 1NF to 2NF and 3NF, do not use separate tables from scratch for all the three forms.
• Brief explanation of the normalization processes must be specified

In: Computer Science

ETHICS IN IT The general moral imperatives involving individuals is to: a. Contribute to society and...

ETHICS IN IT

The general moral imperatives involving individuals is to:
a. Contribute to society and human well-being.
b. Avoid harm to others.
c. Be honest and trustworthy.
d. Be fair and take action not to discriminate.
e. Honour property rights including copyrights and patent.
You are required to discuss the above general moral imperatives in relation to
Information and Communication Technology (ICT).

In: Computer Science

Consider the following relation and convert to the normal form indicated. Make sure your Primary Key...

Consider the following relation and convert to the normal form indicated. Make sure your Primary Key and its attribute(s) is/are underlined for full credit. Also indicate foreign keys using (FK) if any.

0NF:

ORDER[order_num, date, SSN, cust_name, phone, email, (SKU, item_name, price)]

Notes:An order has only one customer, but a customer can place many orders. Each order can have multiple items.  

1NF:

2NF:

3NF:

In: Computer Science

In c++ please. Write a program that opens a specified text tile then displays a list...

In c++ please. Write a program that opens a specified text tile then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.

In: Computer Science

in the context of access control , explain the concepts of access control matrix, access control...

in the context of access control , explain the concepts of access control matrix, access control list ,privilege control list and capability

In: Computer Science

Must a Huffman tree be a two-tree? Explain

Must a Huffman tree be a two-tree? Explain

In: Computer Science

QUESTION 1 Which of the following will correctly change the name of the LOCATIONS table to...

QUESTION 1

  1. Which of the following will correctly change the name of the LOCATIONS table to NEW_LOCATIONS?

    ALTER TABLE LOCATIONS RENAME NEW_LOCATIONS

    MODIFY TABLE LOCATIONS RENAME NEW_LOCATIONS

    RENAME LOCATIONS TO NEW_LOCATIONS

    None of the above, you cannot rename a table, you can only CREATE, ALTER and DROP a table.

1 points   

QUESTION 2

  1. The data type of a column can never be changed once it has been created.

    True

    False

1 points   

QUESTION 3

  1. The following code creates a table named student_table with four columns: id, lname, fname, lunch_num CREATE TABLE student_table (id NUMBER(6), lname VARCHAR(20), fname VARCHAR(20), lunch_num NUMBER(4)); The lunch_num column in the above table has been marked as UNUSED. Which of the following is the best statement you can use if you wish to remove the UNUSED column from the student_table?

    DROP column

    ALTER TABLE DELETE UNUSED COLUMNS

    ALTER TABLE DROP UNUSED COLUMNS

    ALTER TABLE DELETE ALL COLUMNS

1 points   

QUESTION 4

  1. After issuing a SET UNUSED command on a column, another column with the same name can be added using an ALTER TABLE statement.

    True

    False

1 points   

QUESTION 5

  1. Comments can be added to a table by using the COMMENT ON TABLE statement. The comments being added are enclosed in:

    Double quotes " "

    Single quotes ' '

    Parentheses ( )

    Brackets { }

1 points   

QUESTION 6

  1. You can use the ALTER TABLE statement to:

    Add a new column

    Modify an existing column

    Drop a column

    All of the above

1 points   

QUESTION 7

  1. ALTER TABLE table_name RENAME can be used to:

    Rename a row

    Rename a column

    Rename a table

    All of the above

1 points   

QUESTION 8

  1. To completely get rid of a table, its contents, its structure, AND release the storage space the keyword is:

    DROP

    DELETE

    TRUNCATE

    KILL

1 points   

QUESTION 9

  1. When should you use the SET UNUSED command?

    Never, there is no SET UNUSED command

    You should use it if you think the column may be needed again later

    You should use it when the system is being heavily used

    You should only use this command if you want the column to still be visible when you DESCRIBE the table

1 points   

QUESTION 10

  1. You can use DROP COLUMN to drop all columns in a table, leaving a table structure with no columns.

    True

    False

In: Computer Science

In MatLab, Determine how many years it will take to accumulate at least $10,000 in your...

In MatLab, Determine how many years it will take to accumulate at least $10,000 in

your bank account if you deposit $1000 initially and $500 at the end of

each year. The account pays 2.5% interest annually. At the end of each

year your loop should write a message to the user, for example: "After

year 1, the balance in your account is $xx,xxx.xx". Your script should

also write out the final balance after $10,000 is reached.

In: Computer Science

An employee suspects that his password has been compromised. He changed it two days ago, yet...

An employee suspects that his password has been compromised. He changed it two days ago, yet it seems someone has used it again. What might be going on?

Answer according to digital forensics

In: Computer Science

Discuss the importance of effective project management in following the workflow and achieving the specific project...

Discuss the importance of effective project management in following the workflow and achieving the specific project deliverables. Address appropriate strategies and methodologies for Software Development, or Web Design and Development. Be thorough. Take into consideration all stakeholders and identify both positive and negative potential outcomes

In: Computer Science

A cloud customer has asked you to do a forensics analysis of data stored on a...

A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.

Answer according to digital forensics

In: Computer Science

I am trying to return a string from certain position of the sentence on C++, like...

I am trying to return a string from certain position of the sentence on C++, like a function/ statement that is equivalent to excel mid function.

In: Computer Science