Questions
Trace this code: 1) #include<iostream> using namespace std;    class Test {     int value; public:     Test(int...

Trace this code:

1)

#include<iostream>

using namespace std;

  

class Test {

    int value;

public:

    Test(int v);

};

  

Test::Test(int v) {

    value = v;

}

  

int main() {

    Test t[100];

    return 0;

}

===================================================================

2)

#include <iostream>

using namespace std;

int main()

{

                int i, j;

                for (i = 1; i <= 3; i++)

                {

                                //print * equal to row number

                                for (j = 1; j <= i; j++)

                                {

                                                cout << "* ";

                                }

                                cout << "\n";

                }

                system("pause");

                return 0;

In: Computer Science

1) Write a function that receives a pointer to an array along with the size of...

1) Write a function that receives a pointer to an array along with the size of the array, it returns the largest number in the array.

2) Write a function that receives a string and returns the length of it.

In: Computer Science

Q1.As a private sector investigator, you are investigating an important case for an office. You have...

Q1.As a private sector investigator, you are investigating an important case for an office. You have been given access to the office computer network and the computers that may contain some important information related to the case. You are allowed to speak the network administrator. In this scenario, what data acquisition method will you prefer to use? Justify your answer. Also, outline the problems you expect to encounter and explain how to rectify them describing your solution. Identify any potential customer privacy issues that should be considered.

subject:Guide to Computer Forensics and Investigations 6th edition

In: Computer Science

Q1-      Write a program that takes a list of values as an input from the user....

Q1-      Write a program that takes a list of values as an input from the user. The program should further ask the user about sorting the list in ascending or descending order. It is desirable to use Arraylist/Vector in place of simple arrays. (Object Oriented Programming java)

In: Computer Science

PROGRAMING in C RPSLS: The program that we must implement must allow two players to play...

PROGRAMING in C RPSLS:

The program that we must implement must allow two players to play in the same console (there will be only one program)
The program will initialize the information necessary to be able to store the name of two players and their respective markers throughout the game, to present
a result message at the end of the game.

1. When the program is ready for the game to start, it will ask PLAYER1 enter your name.
2. It will then ask PLAYER2 to enter their name.

As long as the game is not over (that is, until one of the two players arrives to 3 points) the program:
• Will ask PLAYER1 to place his bet (can be entered in the form of numeric code, or in the form of a character string)
• Will ask PLAYER2 to place his bet (similarly)
• Evaluate both bets, and modify the markers of each of the two players based on bets
• When either of the two players reaches the score of 3 points, it will be over the game

3. Message will be displayed on the screen that says: "PLAYER NAME1 has won PLAYERNAME2: SCOREBOARD "if PLAYER1 has won, where SCORE will be the result of the game (for example 3-2).

Then it will say "PLAYERNAME2 has lost against PLAYER NAME1: MARKER "because then PLAYER2 will have lost, and MARKER will have the result reversed (for example 2-3). If he player who has won is PLAYER2, the messages will indicate the victory of the PLAYER2 and PLAYER1's defeat.

As soon as the above message is presented, the program will end the program must NOT have any input parameters at the time of making
the program call, and all the parameters you might need (names and bets) will be entered by keyboard (upon presentation of a message that clearly state what the user is expected to key in (such as,say your NAME, enter your BET, etc.)

In: Computer Science

Q4. Assume you have been given a scrambled text file with some hidden text data similar...

Q4. Assume you have been given a scrambled text file with some hidden text data similar to the one in your assessment. What will be the best method that you will use to unscramble the file and why would you choose this method? Justify your answer. [5 marks] You have collected a digital evidence from a crime scene and calculated its hash value using WinHex editor with MD5 algorithm. You have stored the evidence in a forensics lab. After a week, when you started analysing the evidence, you again calculated the hash value of the evidence using Autopsy and with SHA-1 algorithm. You found that the hash value of the evidence is now changed. Describe why the hash value now is different than the one you calculated when you acquired the evidence? [5 marks]

Subject :Guide to Computer Forensics and Investigations 6th edition

In: Computer Science

explain pulp and paper industry in details with an example and diagram.(50marks) Need own answer and...

explain pulp and paper industry in details with an example and diagram.(50marks)

Need own answer and no internet answers r else i il downvote nd report to chegg.Even a single is wrong i il downvote.its 50marks question so no short answer minimum 10page answer required and own answer r else i il downvote.

Note:Minimum 10page answer and no plagarism r else i il downvote and report to chegg.Minimum 10 to 15page answer required r else dnt attempt.strictly no internet answer n no plagarism.

its 50marks question so i il stricly review nd report

In: Computer Science

Use induction to prove that 2 + 4 + 6 + ... + 2n = n2...

Use induction to prove that 2 + 4 + 6 + ... + 2n = n2 + n for n ≥ 1.

Prove this theorem as it is given, i.e., don’t first simplify it algebraically to some other formula that you may recognize before starting the induction proof.

I'd appreciate if you could label the steps you take, Thank you!

In: Computer Science

You have a program which has an interface for a remote public interface Remote { public...

You have a program which has an interface for a remote

public interface Remote {
public void on();
public void off();
public void setChannel(int channel);
public int getChannel();
public void sleep(int numMinutes);
}

You've been working with a Spanish firm that wants to use your program, but they have a different interface

public interface controlRemoto {
public void enciende();
public void apague();
public void cambiaCanal(int channel);
public int qualCanal();
public void duerme(int numMinutes);
}

Create an adapter/wrapper around controlRemoto to make it look like Remote. For simplicity, the methods in both interfaces are in the correct order.

In: Computer Science

While working with the huffman encoding of n letters with frequencies g1, g2, g3, g4,....gn. Please...

While working with the huffman encoding of n letters with frequencies g1, g2, g3, g4,....gn. Please state below the maximum length of a codeword possible. Please show proof to justify your answer.

In: Computer Science

Set T of integers is recursively defined as follows: 1. 1 is in set T 2....

Set T of integers is recursively defined as follows:

1. 1 is in set T

2. If x is in set T, then x + 2 and 2 ∙ x are both in T.

Which of these integers are in set T? 0 7 11 13 19 24

please explain why if possible, thank you!

In: Computer Science

The following algorithm multiplies two square matrices using a straightforward implementation of the definition of matrix...

The following algorithm multiplies two square matrices using a straightforward implementation of the definition of matrix multiplication.

(If you are unfamiliar with matrices, think of them as 2-dimensional arrays, and don’t worry, you don’t need to know how to do matrix multiplication to solve this problem)

1 2 3 4 5 6 7 8 9

10

ALGORITHM MatrixMultiplication(A[1..n, 1..n], B[1..n, 1..n])
// Multiply two square matrices of order n using the definition-based algorithm //Input: twon×nmatricesAandB
// Output: matrix C = AB
fori←1tondo

for j ← 1 to n do C[i, j] ← 0

for k ← 1 to n do

C[i, j] ← C[i, j] + (A[i, k] * B[k, j]) return C

The basic operations are the addition and multiplication of matrix elements at line 9. Determine the number of basic operations performed for two input matrices of size n × n. Write your answer in simplest form, if possible.

please try to explain how you did thi, thank you!

In: Computer Science

(Python code please) Of a Guessing game(1-10) with a limited amount of guesses (5)

(Python code please) Of a Guessing game(1-10) with a limited amount of guesses (5)

In: Computer Science

Please Provide Detailed Answer. Prove that a PDA that has access to two stacks is as...

Please Provide Detailed Answer. Prove that a PDA that has access to two stacks is as powerful as a Turing Machine. Such a PDA has labels on the transition arrows of the form (a, α, β → α' , β' ), meaning that read an a from the input, pop an α from the first stack, β from the second stack, and push α' on the first stack, and β' on the second stack.

In: Computer Science

Consider the following relational schema and set of functional dependencies. S(A,B,C,D,E,F,G) D → E E →...

Consider the following relational schema and set of functional dependencies.

S(A,B,C,D,E,F,G)

D → E

E → B

C → FG

BE → AC

Is the decomposition of S into S1(E,G,F) and S2(A,B,C,D,G) a lossless join decomposition?

Choose one of the following queries as your answer: SELECT ’lossy’; SELECT ’lossless’;

In: Computer Science