Questions
How does the cloud consumer interact with the appropriate systems to gain access to the required...

How does the cloud consumer interact with the appropriate systems to
gain access to the required services. What different portals help the
consumer to achieve this?

In: Computer Science

JAVA Using the java.util.Calendar class, create 3 dates and times. Write a method to identify and...

JAVA Using the java.util.Calendar class, create 3 dates and times. Write a method to identify and print out the oldest of the 3 timestamps. Likewise, create another method that prints out the most recent time.

In: Computer Science

Examine computer-assisted tools and techniques for the auditing process to examine effective controls. How do these...

Examine computer-assisted tools and techniques for the auditing process to examine effective controls. How do these tools help IT managers maintain systems operations? How do the tools and techniques support the internal and external auditing process?

In: Computer Science

try to find articles that deal with Active Directory Group Policies. Find articles that discuss the...

try to find articles that deal with Active Directory Group Policies. Find articles that discuss the proper configurations or what happens when inherent policies override permissions.

a minimum of one full page of content

In: Computer Science

Patient dataset from a hospital has been taken to Identify whether the patient has heart disease...

Patient dataset from a hospital has been taken to Identify
whether the patient has heart disease or not. Dataset contains
noisy data and some outliers present in it, for that dataset choose
any of the suitable data preprocessing tasks and also tell how
outliers or noisy data removed from that dataset.

In: Computer Science

Write a complete program using the do-while loop that prompts the user to enter a string...

Write a complete program using the do-while loop that prompts the user to enter a string and displays its first and last characters. Repeat until the user enter a string that contains only one character.
Here is an example to show you how the output may look like:

<output>
Enter a string ( type only one character to exit): this is my string

The first character is t
The last character is g
Enter a string ( type only one character to exit): _
<output>

Do the code in C++

In: Computer Science

1- Definition and introduction of its layer 2- Explain the network functions 3- Explain the data...

1- Definition and introduction of its layer
2- Explain the network functions
3- Explain the data transfer method in the network
4- Mention the protocols if there is and explain them
5- Network positives and negatives effect

for the session layer

and transport layer

In: Computer Science

Because the database server can cache and reuse ___________________ statements, they are more efficient than regular...

Because the database server can cache and reuse ___________________ statements, they are more efficient than regular SQL statements.

When you work with a result set, the ____________ identifies the current position in the result set.

You use the __________________ class to work with data returned from a SQL query.

What does the invoices result set contain after the code that follows is executed?
String sql = "SELECT InvoiceDate, InvoiceTotal "
           + "FROM Invoices WHERE InvoiceTotal > ?";
PreparedStatement ps = connection.prepareStatement(sql);
ps.setDouble(1, 100);

ResultSet invoices = ps.executeQuery();

a.

All rows from the Invoices table

b.

Rows from the Invoices table where InvoiceTotal is greater than 100

c.

Rows from the Invoices table where InvoiceTotal is greater than 0

d.

Rows from the Invoices table where InvoiceTotal is greater than 1

In: Computer Science

Use the Database “Company shown on pages 7 to 9 to answer the questions (a) to...

Use the Database “Company shown on pages 7 to 9 to answer the questions (a) to (g):

  1. Retrieve both the names and social security numbers of employees who do not work on any one of projects with the project number 1, 2, and 3. (Show the query and output)
  1. Retrieve the social security number and the name of each employee, and the corresponding social security number and the name of his/her supervisees if any. (Otherwise, just display the employee's social security number and name.) (Show the query and output)

  1. Retrieve the social security numbers of all direct supervisees of James E.

Borg. (Show the query and output)

  1. Retrieve all of direct and indirect supervisees of James E Borg in the employee table. (Show the query and output)

  1. Find the social security numbers of employees who have no dependents. (Show the query and output)

  1. Calculate the total number of employees, the average salary, and the total salary of department 5. (Show the query and output)

  1. Retrieve the number of employees, the average salary, and the total salary of each

department that has more than one employee.

DDL Statements to Create Tables the Database “Company”

To create EMPLOYEE table:

create table EMPLOYEE

(

name varchar2(19) not null,

ssn char (9),

bdate date,

sex char(3),

salary number(8,2),

superssn char(9),

dno varchar(8),

constraint empPK

primary key (ssn),

constraint empsuperFRK

foreign key (superssn)

references employee(ssn) disable

);

To create DEPARTMENT table:

create table DEPARTMENT

(

dname varchar2(15) not null,

dnumber varchar(8),

mgrssn char(9),

mgrstardate date,

constraint departPK

primary key (dnumber),

constraint departUK

unique (dname),

constraint departFRK

foreign key (mgrssn)

references employee (ssn) on delete cascade disable

);

To create DEPTLOCATION table:

create table DEPTLOCATION

(

dnumber varchar(8),

dlocation varchar2(15),

constraint dlocPK

primary key (dnumber, dlocation),

constraint dlocnoFRK

foreign key (dnumber)

references department (dnumber) on delete cascade disable

);

To create PROJECT table:

create table project

(

pname varchar2(15) not null,

pnumber varchar(8),

plocation varchar2(15),

dnum varchar(8),

constraint projUK

unique (pname),

constraint projPK

primary key (pnumber),

constraint projFRK

foreign key (dnum)

references DEPARTMENT(dnumber)

);

To create WORKSON table:

create table WORKSON

(

essn char(9),

pno varchar(8),

hours number(5,1),

constraint workPK

primary key (essn, pno),

constraint workssnFRK

foreign key (essn)

references EMPLOYEE(ssn) on delete cascade disable,

constraint workpnoFRK

foreign key (pno)

references PROJECT(pnumber) on delete cascade disable

);

To create DEPENDENT table:

create table DEPENDENT

(

essn char(9),

dependentname varchar2(15),

sex char(3),

bdate date,

relationship varchar2(12),

constraint depenPK

primary key (essn, dependentname),

constraint depenFRK

foreign key (essn)

references EMPLOYEE (ssn) on delete cascade disable

);

DML Statements to Insert Data into Tables:

Insert the Data into the DEPARTMENT Table:

insert into DEPARTMENT values ('Research','5','333445555','22-MAY-78');

insert into DEPARTMENT values ('Administration','4','987654321','01-JAN-85');

insert into DEPARTMENT values ('Headquarters','1','888665555','19-JUN-71');

Insert the Data into the EMPLOYEE Table:

insert into EMPLOYEE values ('John B Smith','123456789','09-JAN-55','M',30000,'333445555','5');

insert into EMPLOYEE values ('Franklin T Wong','333445555','08-DEC-45','M',40000,'888665555','5');

insert into EMPLOYEE values ('Alicia J Zelaya','999887777','19-JUL-85','F',25000,'987654321','4');

insert into EMPLOYEE values ('Jennifer S Wallace','987654321','20-JUN-31','F',43000,'888665555','4');

insert into EMPLOYEE values ('Ramesh K Narayan','666884444','15-SEP-52','M',38000,'333445555','5');

insert into EMPLOYEE values ('Joyce A English','453453453','31-JUL-62','F',25000,'333445555','5');

insert into EMPLOYEE values ('Ahmad V Jabbar','987987987','29-MAR-59','M',25000,'987654321','4');

insert into EMPLOYEE values ('James E Borg','888665555','10-NOV-27','M',55000,' ','1');

Insert the Data into the DEPTLOACITON Table:

insert into deptlocation values ('1','Houston');

insert into deptlocation values ('4','Stafford');

insert into deptlocation values ('5','Bellaire');

insert into deptlocation values ('5','Sugarland');

insert into deptlocation values ('5','Houston');

Insert the Data into the PROJECT Table:

insert into project values ('ProductX','1','Bellaire','5');

insert into project values ('ProductY','2','Sugarland','5');

insert into project values ('ProductZ','3','Houston','5');

insert into project values ('Computerization','10','Stafford','4');

insert into project values ('Reorganization','20','Houston','1');

insert into project values ('Newbenefits','30','Stafford','4');

Insert the Data into the DEPENDENT Table:

insert into dependent values ('333445555','Alice','F','05-APR-76','Daughter');

insert into dependent values ('333445555','Theodore','M','25-OCT-73','Son');

insert into dependent values ('333445555','Joy','F','03-MAY-48','Spouse');

insert into dependent values ('987654321','Abner','M','29-FEB-32','Spouse');

insert into dependent values ('123456789','Michael','M','01-JAN-78','Son');

insert into dependent values ('123456789','Alice','F','31-DEC-78','Daughter');

insert into dependent values ('123456789','Elizabeth','F','05-MAY-57','Spouse');

Insert the Data into the WORKSON Table:

insert into workson values ('123456789','1',32.5);

insert into workson values ('123456789','2',7.5);

insert into workson values ('666884444','3',40.0);

insert into workson values ('453453453','1',20.0);

insert into workson values ('453453453','2',20.0);

insert into workson values ('333445555','2',10.0);

insert into workson values ('333445555','3',10.0);

insert into workson values ('333445555','10',10.0);

insert into workson values ('333445555','20',10.0);

insert into workson values ('999887777','30',30.0);

insert into workson values ('999887777','10',10.0);

insert into workson values ('987987987','10',35.0);

insert into workson values ('987987987','30',5.0);

insert into workson values ('987654321','30',20.0);

insert into workson values ('987654321','20',15.0);

insert into workson values ('888665555','20',NULL);

In: Computer Science

Write the binary representation of the decimal number -64 (negative 64) Assuming IEEE 754 single precision...

Write the binary representation of the decimal number -64 (negative 64)

  1. Assuming IEEE 754 single precision format
  2. Assuming 8-bit 2’s complement representation
  3. Assuming signed magnitude representation

In: Computer Science

Consider the sorted array myList of integers below. 2 5 21 25 35 40 45 48...

Consider the sorted array myList of integers below.


2 5 21 25 35 40 45 48 70 75 89 99


The Binary Search algorithm uses two index variables first and last to determine the position
(stored in another index variable mid) to search for an element. Using Binary Search to search
for the element 75 in myList, give the values of myList[first], myList[mid] and
myList[last] (in the form of a table) every time a new value is calculated for mid.

In: Computer Science

Consider sending a large file from a host to another over a TCP connection that has...

Consider sending a large file from a host to another over a TCP connection that has no loss. Suppose TCP uses AIMD for its congestion control without slow start. The initial MSS=4 and cwnd increases by 1 MSS every time a batch of ACKs is received. Assume approximately constant round-trip times. a. how long does it take for cwnd increase from 5 MSS to 9 MSS (assuming no loss events)? b. What is the average throughout (in terms of MSS and RTT) for this connection up through time =6 RTT?

In: Computer Science

For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption) You...

For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption)

You are required to research and report on this topic according to the Detail of Question below.

A. understand in order to present three main parts:

1. Summary:

o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space!

2. Main points:

o The main issues as you see them.

o This is different than the summary.

3. Strengths and Weaknesses:

o Provide some critical analysis of the paper under review, positive and/or negative.

In: Computer Science

Please write a Java program using a for loop with a switch statement to enter 5...

Please write a Java program using a for loop with a switch statement to enter 5 quiz scores. Each should be out of ten points and give the corresponding grade A, B , C etc.

In: Computer Science

write a c program that asks the user to enter any two intger numbers and each...

write a c program that asks the user to enter any two intger numbers and each number consist of four digits. your program should check whether the numbers are four digits or not and in case they are not a four digit number the program should print a message and exit otherwise it should do the following print a mnew as follows   

select what you want to do with the number 1-3:

1-print grreatest common divisor (gcd)of the two numbers

2-print sum of odd digits of each number

3-print relation of odd sum of digits larger/smaller/equal

In: Computer Science