Questions
a) What types of files might you want to copy to the cloud? Why would you...

a) What types of files might you want to copy to the cloud? Why would you copy files to
the cloud instead of copying them to an external storage device?

b) How does the access time of storage compare with the access time of memory?

c) End user programs are designed for specific functions such as word processing or a
game. You have installed a new piece of applications software onto a stand-alone PC.
You then find that the printer attached to the PC fails to produce what can be seen on
screen in that package. Explain clearly why this might happen.

In: Computer Science

Define .svg, .ps, .ai, and .eps.  Describe how these file formats are used in web design?

Define .svg, .ps, .ai, and .eps.  Describe how these file formats are used in web design?

In: Computer Science

A local online bitcoin wallet company, Luno is running out of capacity and performance with the...

A local online bitcoin wallet company, Luno is running out of capacity and performance with the current storage system. Luno has decided to own a RAID system at a reasonable cost to increase the speed, capacity, availability and scalability of the trading activities.

(a) Recommend a suitable RAID system for Luno. Provide your strong justifications.

In: Computer Science

A young child wants to jump over a puddle. The caregiver agrees, but has conditions: “you...

A young child wants to jump over a puddle. The caregiver agrees, but has conditions: “you can jump until you are tired but you cannot jump over the puddle more than 15 times”.

Can someone write this to me in pseudo code and flow chat please thanks


In: Computer Science

please use c write a program that utilizes pipes for Interprocess Communication (IPC). The program will...

please use c

write a program that utilizes pipes for Interprocess Communication (IPC). The program will create a pipe(s) to allow the parent and child to communicate.

The parent process will generate a random number based on the pid of the child process created. The parent will send this random number to the child and wait for a response (Received) from the child. After receiving a response from the child, the parent will send another message to the child telling the child it is okay to end. This message should be “BYE”.

The child process should wait to receive the random number from the parent. After receiving the random number, it should send a response back to the parent. This message should be “Received”. The child should then wait for another message (BYE) from the parent indicating it is okay for the child to end.

Both processes should print to standard output the message it will write to the pipe and any message it receives from the pipe. Each message printed should be the process (“Parent” or “Child”) and if the message will be sent to the pipe or if it was received by the pipe. Example output might be similar to this:

Parent sending to pipe: 784392

Child received from pipe: 784392

Child sending to pipe: Received

Parent received from pipe: Received

Parent sending to pipe: BYE

Child received from pipe: BYE

Make sure you follow good programming practices, such as the use of functions, closing file descriptors as soon as not needed, in-line comments, error checking, freeing dynamic memory, etc.

use any programming language that allows the creation of new processes similar to the fork() system call in C and the use of pipes similar to the pipe() system call in C.

In: Computer Science

As part of the duties of a digital forensics examiner, creating an investigation plan is a...

As part of the duties of a digital forensics examiner, creating an investigation plan is a standard pactice. Write a paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files, such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1.

In: Computer Science

how to solve the binary bomb phase 3.. what is the password

how to solve the binary bomb phase 3.. what is the password

In: Computer Science

1 In Linux, when a timer expires, there is a context switch so that the CPU...

1 In Linux, when a timer expires, there is a context switch so that the CPU scheduler can run.

False

True

2 The operating system keeps track of CPU usage for all processes.

False

True

3 A system call that does not invoke the CPU scheduler executes in the same context as the process that makes the call.

False

True

4

A ____ synchronizes access to memory from devices that want to access it.

In UNIX, the system call to perform input from a device is named ___.

In: Computer Science

6. Write a function to count a tree’s height, which is the length of the longest...

6. Write a function to count a tree’s height, which is the length of the longest path from the root to a leaf.

Please finish this question in python programming

In: Computer Science

1.       Test the execution time of the program in Code 3. Make a screen capture which...

1.       Test the execution time of the program in Code 3. Make a screen capture which shows the execution time that has the unit of machine time unit.

Code3

SOURCE.CPP

# include<fstream>
# include "List.h"
# include <iostream>
using namespace std;

int main()
{
List temps;
int oneTemp;
ifstream inData;
ofstream outData;

inData.open("temp.dat");
if (!inData)
{
  outData<<"Can't open file temp.dat" << endl;
  return 1;
}

inData >> oneTemp;
while (inData && !temps.IsFull())
{
  if (!temps.IsPresent(oneTemp))
   temps.Insert(oneTemp);
  inData >> oneTemp;
}

outData << "No. of uniqiue readings:" << temps.Length() << endl;
temps.Reset();
while (temps.HasNext())
{
  oneTemp = temps.GetNextItem();
  outData << oneTemp << endl;
}
temps.Delete(23);

outData << "Readings without value of 23." << endl;
temps.Reset();
while (temps.HasNext())
{
  oneTemp = temps.GetNextItem();
  outData << oneTemp << endl;
}

temps.SelSort();
outData << "Readings after the sort algorithm." << endl;
temps.Reset();
while (temps.HasNext())
{
  oneTemp = temps.GetNextItem();
  outData << oneTemp << endl;
}
inData.close();
outData.close();

system("pause");
return 0;
}

LIST.CPP

// Implementation file array-based list
// (“list.cpp”)

#include "List.h"
#include <iostream>

using namespace std;

List::List()
// Constructor
// Post: length == 0
{
length = 0;
}

int List::Length() const
// Post: Return value is length
{
return length;
}
bool List::IsFull() const
// Post: Return value is true
//       if length is equal
// to MAX_LENGTH and false otherwise
{
return (length == MAX_LENGTH);
}
bool List::IsEmpty() const
// Post: Return value is true if length is equal
// to zero and false otherwise
{
return (length == 0);
}

void List::Insert(/* in */ ItemType item)
// Pre: length < MAX_LENGTH && item is assigned
// Post: data[length@entry] == item &&
//       length == length@entry + 1
{
data[length] = item;
length++;
}

void List::Delete( /* in */ ItemType item)
// Pre: length > 0 && item is assigned
// Post: IF item is in data array at entry
//  First occurrence of item is no longer
//   in array
//     && length == length@entry - 1
//  ELSE
//       length and data array are unchanged
{
int index = 0;

while (index < length &&
  item != data[index])
  index++;
// IF item found, move last element into
// item’s place
if (index < length)
{
  data[index] = data[length - 1];
  length--;
}
}

ItemType List::GetNextItem()
// Pre: No transformer has been executed since last call
// Post:Return value is currentPos@entry
//   Current position has been updated
//   If last item returned, next call returns first item
{
ItemType item;
item = data[currentPos];
if (currentPos == length )
  currentPos = 0;
else
  currentPos++;
return item;
}

bool List::IsPresent( /* in */ ItemType item) const
// Searches the list for item, reporting
//   whether found
// Post: Function value is true, if item is in
//   data[0 . . length-1] and is false otherwise
{
int index = 0;
while (index < length && item != data[index])
  index++;
return (index < length);
}

void List::SelSort()
// Sorts list into ascending order
{
ItemType temp;
int passCount;
int sIndx;
int minIndx; // Index of minimum so far   
  for (passCount = 0; passCount < length - 1; passCount++)
  {
   minIndx = passCount;
   // Find index of smallest value left
   for (sIndx = passCount + 1; sIndx < length; sIndx++)
    if (data[sIndx] < data[minIndx])
     minIndx = sIndx;
   temp = data[minIndx];  // Swap
   data[minIndx] = data[passCount];
   data[passCount] = temp;
  }
}

void List::Reset()
{
currentPos = 0;
}

bool List::HasNext() const
{
return(currentPos != length);
}

LIST.H

#pragma once
#include<iostream>
using namespace std;

const int MAX_LENGTH = 110000;
typedef int   ItemType;

class List           // Declares a class data type
{
public:            // Public member functions

List();           // constructor
bool IsEmpty() const;
bool IsFull() const;
int Length() const; // Returns length of list
void Insert(ItemType item);
void Delete(ItemType item);
bool IsPresent(ItemType item) const;
void Reset();
ItemType GetNextItem();
void SelSort();
bool HasNext() const;

private:       // Private data members

int length; // Number of values currently stored
int currentPos; // Used in iteration
ItemType data[MAX_LENGTH];
};

In: Computer Science

Create an ER data model to reflect the process of a consumer opening a checking account...

Create an ER data model to reflect the process of a consumer opening a checking account at a bank. The data model should be created using the data modelling utility in MySQLWorkbench.The model should contain at least five (5) entities. Each entity should have at least three (3) attributes.

Please build using SQL Queries as per mysql.

Please help... Urgent

In: Computer Science

<HTML> <Head> </HEAD> <BODY> </BODY>    <CANVAS ID ="MyScreen" width="780" Height="640" alt="Your browser does not support...

<HTML>
<Head>


</HEAD>
<BODY>


</BODY>

   <CANVAS ID ="MyScreen" width="780" Height="640" alt="Your browser does not support canvas"></CANVAS>
  
  
   <SCRIPT>
  
   var vertexShaderText =
   [
   'precision mediump float;',
   '',
   'attribute vec2 vertPosition;',
   'attribute vec3 vertColor;',
   'varying vec3 fragColor;',
   'void main()',
   '{',
   'gl_pointsize = 10.0;',
   'fragColor = vertColor;',
   'gl_Position = vec4(vertPosition,0.0,1.0);',
   '}'
   ].join("\n");
  
   var fragmentShaderText =
   [
   'precision mediump float;',
   'varying vec3 fragColor;',
   'void main()',
   '{',
   'gl_FragColor = vec4(fragColor,1.0);',
   '}'
   ].join('\n');
  
   var c = document.getElementById("MyScreen");
   //var ctx = c.getContext("2d");
   //ctx.beginPath();
   //ctx.arc(95,50,40,0,2*Math.PI);
   //ctx.stroke();
  
   var gl = c.getContext("webgl")||c.getContext("experimental-webgl");
   if(!gl)
   {
       alert("WEBGL IS NOT AVAILABLE");
   }
   gl.viewport(0,0,c.width, c.height);
   gl.clearColor(.5,.5,1.0,1.0);
   gl.clear(gl.COLOR_BUFFER_BIT|gl.DEPTH_BUFFER_BIT);
  
   //Setup shaders
   var vertexShader = gl.createShader(gl.VERTEX_SHADER);
   var fragmentShader = gl.createShader(gl.FRAGMENT_SHADER);
  
   gl.shaderSource(vertexShader,vertexShaderText);
   gl.shaderSource(fragmentShader,fragmentShaderText);
   gl.compileShader(vertexShader);
   if(!gl.getShaderParameter(vertexShader,gl.COMPILE_STATUS))
   {
       console.log("ERROR: ",gl.getShaderInfoLog(vertexShader));
   }
   gl.compileShader(fragmentShader);
   if(!gl.getShaderParameter(fragmentShader,gl.COMPILE_STATUS))
   {
       console.log("ERROR: ",gl.getShaderInfoLog(fragmentShader));
   }
  
   //Setup program
   var program = gl.createProgram();
   gl.attachShader(program, vertexShader);
   gl.attachShader(program, fragmentShader);
   gl.linkProgram(program);
   if(!gl.getProgramParameter(program,gl.LINK_STATUS))
   {
       console.error('ERROR', gl.getShaderInfoLog(program));
   }
   gl.validateProgram(program);
   if(!gl.getProgramParameter(program,gl.VALIDATE_STATUS))
   {
       console.error('ERROR', gl.getShaderInfoLog(program));
   }
  

   //Create Buffer
   var triangleVertices =
   [//x and y       R, G, B
       0.0,0.5, 1.0,0.0,0.0,
       -0.5,-0.5, 0.0,1.0,0.0,
       0.5,-0.5, 0.0,0.0,1.0
   ];
  
   var triagnleVertexBufferObject = gl.createBuffer();
   gl.bindBuffer(gl.ARRAY_BUFFER,triagnleVertexBufferObject);
   gl.bufferData(gl.ARRAY_BUFFER, new Float32Array(triangleVertices),gl.STATIC_DRAW);
  
   var positionAttributeLcoation = gl.getAttribLocation(program,'vertPosition');
   var colorAttributeLcoation = gl.getAttribLocation(program,'vertColor');
   gl.vertexAttribPointer(
   positionAttributeLcoation, //ATTRIBUTE LOCATION
   2, //NUMBER of elements per attribute
   gl.FLOAT, //TYPES OF ELEMENTS
   gl.FALSE,
   5*Float32Array.BYTES_PER_ELEMENT, //SIZE OF AN INDIVIDUAL VERTEX
   0 //OFFSET
   );
  
  
   gl.vertexAttribPointer(
   colorAttributeLcoation, //ATTRIBUTE LOCATION
   3, //NUMBER of elements per attribute
   gl.FLOAT, //TYPES OF ELEMENTS
   gl.FALSE,
   5*Float32Array.BYTES_PER_ELEMENT, //SIZE OF AN INDIVIDUAL VERTEX
   2*Float32Array.BYTES_PER_ELEMENT //OFFSET
   );
  
   gl.enableVertexAttribArray(positionAttributeLcoation);
   gl.enableVertexAttribArray(colorAttributeLcoation);
   //Main Loop
   gl.useProgram(program);
   gl.drawArrays(gl.TRIANGLES,0,3);
   </SCRIPT>
  
  
</HTML>

2.3At the lowest level of processing, we manipulate bits in the framebuffer. In WebGL, we can create a virtual framebuffer in our application as a two- dimensional array. You can experiment with simple raster algorithms, such as drawing lines or circles, through a function that generates a single value in the array. Write a small library that will allow you to work in a virtual frame- buffer that you create in memory. The core functions should be WritePixel and ReadPixel. Your library should allow you to set up and display your vir- tual framebuffer and to run a user program that reads and writes pixels using gl.POINTS in gl.drawArrays.

2.4 Turtle graphics is an alternative positioning system that is based on the concept of a turtle moving around the screen with a pen attached to the bottom of its shell. The turtle’s position can be described by a triplet (x, y, θ), giving the location of the center and the orientation of the turtle. A typical API for such a system includes functions such as the following: init(x,y,theta); // initialize position and orientation of turtle forward(distance); right(angle); left(angle); pen(up_down); Implement a turtle graphics library using WebGL. All this using Html file below and editing it

In: Computer Science

The administration of the Kasoa Government hospital wants to improve its quality of service by reducing...

The administration of the Kasoa Government hospital wants to improve its quality of service by reducing the waiting time of travelers. For that purpose, they want to design what could be the best queuing strategy to have the minimum waiting time. You have been task to advice on the best queuing strategy in order to reduce the waiting time of patients before attended to. Discuss how you will address the problem

In: Computer Science

Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4...

Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4 (c) and 4(d) based on this information.

4 (a). Relate the principal objective of computer security with the function of access control.

4 (b). Briefly explain how access control being implemented in the machine.

4 (c). If Process A requires 500MB of memory space to perform calculation and Process B requires 100MB of memory space to perform graphics processing, identify the object, subject and access operation in this scenario. Provide explanation for your answer.

4 (d). Company RT wants to have different access levels for each of its users. A management level employee will have more privileges to files and operations. The executive level will have moderate privilege to the files but individual users will have their own level of control to the files they own. Which type of access control is suitable for this company and its employee? Clearly explain and justify your answer.

In: Computer Science

Goal: to write a Python program that will read a playlist from a CSV file and...

Goal: to write a Python program that will read a playlist from a CSV file and display it in the console in the form of a table.

https://s3.eu-west-2.amazonaws.com/bb-python-modules/Coursework/CW3/playlist_text_question.html

The following is a link to the question. It includes all instruction and a template file (with additional instructions) where the answer must be completed.

In: Computer Science