Questions
Why is it costly if an error was discovered in later phases of software development?

Why is it costly if an error was discovered in later phases of software development?

In: Computer Science

3) Convert 1.25 decimal to 32 bit floating point format. 4) Convert the following truth table...

3) Convert 1.25 decimal to 32 bit floating point format.
4) Convert the following truth table to a digital circuit consisting of
   NOT, AND, and OR gates.

   ABC  Out
   000  1
   001  1
   010  0
   011  0
   100  1
   101  0
   110  1
   111  0

5) Construct a tri-state buffer using transistors
10) What are the advantages of a large page size?

In: Computer Science

Compare and contrast the representation and use of primitive data types and built-in data structures such...

Compare and contrast the representation and use of primitive data types and built-in data structures such as C-strings and string objects?

In: Computer Science

Web Mining Assignments Exercise 6.1.1 : Suppose there are 100 items, numbered 1 to 100, and...

Web Mining Assignments

Exercise 6.1.1 : Suppose there are 100 items, numbered 1 to 100, and also 100 baskets, also numbered 1 to 100. Item i is in basket b if and only if i divides b with no remainder. Thus, item 1 is in all the baskets, item 2 is in all fifty of the even-numbered baskets, and so on. Basket 12 consists of items {1, 2, 3, 4, 6, 12}, since these are all the integers that divide 12. Answer the following questions:

(a) If the support threshold is 5, which items are frequent?
! (b) If the support threshold is 5, which pairs of items are frequent?

! (c) What is the sum of the sizes of all the baskets?

PS: I know the answer of a) which are 1, 2, 3, 4 ... 18, 19, 20. But how to get the answers of b) and c) please show the steps and the explanation. Thank you.

In: Computer Science

Exp1: import java.util.Scanner; public class User_Authentication { public static void main(String args[]) { String username, password;...

Exp1:

import java.util.Scanner;

public class User_Authentication

{

public static void main(String args[])

{

String username, password;

Scanner s = new Scanner(System.in);

System.out.print("Enter username:");//username:user

username = s.nextLine();

System.out.print("Enter password:");//password:user

password = s.nextLine();

if(username.equals("Bisha") && password.equals("Computer"))

{

System.out.println("Authentication Successful");

}

else

{

    System.out.println("Authentication Failed");

   }

}

}

Exp3:

import java.io.BufferedReader;

import java.io.IOException;

import java.io.InputStreamReader;

import java.util.Scanner;

public class Main {

static Scanner sc=new Scanner(System.in);

static BufferedReader br = new BufferedReader(new InputStreamReader(System.in));

public static void main(String[] args) throws IOException {

// TODO code application logic here

System.out.print("Enter any String: ");

String str = br.readLine();

System.out.print("\nEnter the Key: ");

int key = sc.nextInt();

String encrypted = encrypt(str, key);

System.out.println("\nEncrypted String is: " +encrypted);

String decrypted = decrypt(encrypted, key);

System.out.println("\nDecrypted String is: "

+decrypted); System.out.println("\n");

}

public static String encrypt(String str, int key)

{ String encrypted = "";

for(int i = 0; i < str.length(); i++) {

int c = str.charAt(i);

if (Character.isUpperCase(c)) {

c = c + (key % 26);

if (c > 'Z')

c = c - 26;

}

else if (Character.isLowerCase(c)) {

c = c + (key % 26);

if (c > 'z')

c = c - 26;

}

encrypted += (char) c;

}

return encrypted;

}

public static String decrypt(String str, int key)

{ String decrypted = "";

for(int i = 0; i < str.length(); i++) {

int c = str.charAt(i);

if (Character.isUpperCase(c)) {

c = c - (key % 26);

if (c < 'A')

c = c + 26;

}

else if (Character.isLowerCase(c)) {

c = c - (key % 26);

if (c < 'a')

c = c + 26;

}

decrypted += (char) c;

}

return decrypted;

}

}

  1. Merge Exp. 1 and Exp. 3 to do the following: -
    1. Enter the username and password
    2. Verify the username and password
    3. If it is valid
      1. apply the Caesar cipher
      2. display the plain username and password
      3. display the encrypted username and password
    4. Write your conclusion about this encryption method and the authentication process.

      need your help regarding attached for all the questions

      Answered it from your mind Do not copying the Answered Especially "D"

In: Computer Science

Design, Develop and Implement the following operations on Singly Linked List (SLL) with a single field...

  1. Design, Develop and Implement the following operations on Singly Linked List (SLL) with a single field data

a.   Create a SLL for N Data by using front insertion.

b.   Display the status of SLL and count the number of nodes in it

c.   Perform Insertion and Deletion at End of SLL

d.   Perform Insertion at the third position.

e.    Delete the element at the Front of SLL

f.     Perform Deletion at second position of SLL

g.     Display the content.

  1. Design, Develop and Implement a menu driven Program in Java for the following operations on Singly

Linked List (SLL) of Student Data with the fields: USN, Name, Branch, Sem, PhNo

a.   Create a SLL of N Students Data by using front insertion.

b.   Display the status of SLL and count the number of nodes in it

c.   Perform Insertion and Deletion at End of SLL

d.   Perform Insertion and Deletion at Front of SLL

e.     Display the content.

  1. Design, Develop and Implement a Singly Linked List (SLL) with a single string field name using the class Linked List
  1. Create a SLL for N Data by using front insertion
  2. Insert an element at position first, 3 and last.
  3. Delete an element from first, 3 and last.
  4. Display the content

  1. Design, Develop and Implement a Circular Linked List (CLL) with a single field data
    1. Create a CLL for N Data by using front insertion
    2. Display the content.

  1. Design, Develop and Implement a Doubly Linked List (DLL) with a single field data

a.    Create a DLL for N Data by using front insertion.

b.   Perform Insertion and Deletion at End of DLL

d.   Perform Insertion at the third position.

e.     Delete the element in the Front of SLL

f.     Perform Deletion at second position of SLL

g.     Display the content.

In: Computer Science

Write a program that meets the following requirements: Cat Class Create a class called Cat which...

Write a program that meets the following requirements:

Cat Class

  1. Create a class called Cat which has only the following instance variables:

- name

- breed

- number of legs

- year born

  1. Create the no-argument constructor
  2. Create the constructor which uses all fields as parameters
  3. Write the getter and setter methods for all instance variables
  4. Override the toString method using the example shown above

There should be NO main method in the Cat class.

CatTester Class

  1. Create a class called CatTester which constructs 10 different Cat objects
  2. Add each Cat object to an array
  3. Use an enhanced for loop to SOP each Cat reference
  4. Use a second for loop to SOP only those Cats that are born after 2004 and have legs greater than 3
  • You should use the class names of Cat and CatTester

In: Computer Science

Q2.1 Write a Java program called Div that takes 2 (two) double command-line arguments as inputs,...

Q2.1 Write a Java program called Div that takes 2 (two) double command-line arguments as inputs, dividend and divisor (in that order) and performs a division operation. Your program either prints the quotient or an error if the divisor is zero. The divisor is the number you divide the dividend by.

public class Div

{

public static void main ( String[] args )

{

// WRITE YOUR CODE HERE

}

}

Q2.2

Write a Java program called IntCheck that examines the integer variable x, printing GT (greater than) if x is greater than 100, LT (less than) if x is less than 100 and EQ (equal) if x is 100.

public class IntCheck { public static void main ( String[] args ) { int x = Integer.parseInt(args[0]); // WRITE YOUR CODE HERE } }

In: Computer Science

Python Programming Problem: If I have to separate lists, one contains a large string of paragraphs...

Python Programming Problem:

If I have to separate lists, one contains a large string of paragraphs of words, and one contains just words, how can i iterate the words in my second list and compare it to my paragraph list to see how many times that word has occurred?

List1 = ['paragraph.......']

List2 = ['words', 'words', 'words'......]

these are just minimal examples

how do i approach this problem?

apprently numpy helps with processing time for something like this? cuz the lists could get quite big

In: Computer Science

Reflect on how the concepts and material presented in this Foundations of Research course can be...

Reflect on how the concepts and material presented in this Foundations of Research course can be used in your future academic endeavors. Include a specific example of a concept or assignment that you found most beneficial.

In: Computer Science

Please write code in c++ using iostream library. Write a function bool cmpr(char * s1, int...

Please write code in c++ using iostream library.

Write a function bool cmpr(char * s1, int SIZE1, char * s2, int SIZE2) that compares two strings.

Input
Input contains two strings. Each string is on a separate line.

example:

aqua

aqua

Output
Output YES if given two strings are the same or NO otherwise.
YES

In: Computer Science

Write in JAVA eclipse program (comment in every line): class for calculating an area of a...

Write in JAVA eclipse program (comment in every line):

class for calculating an area of a room. The program MUST ask for the length and the width of the room.

Make sure you write the methods to get the width and length and print the area.

In: Computer Science

Write a C++ program to simulate a service desk. This service desk should be able to...

Write a C++ program to simulate a service desk. This service desk should be able to service customers that can have one of three different priorities (high, medium, and low). The duration for any customer is a random number (between 5 minutes and 8 minutes).  You need to write a program that will do the following:

  1. Generate random 100 service requests.
  2. Each service request can be either high, medium, or low priority. (Your program should randomly allocate this priority to each service.)
  3. Each service request may need any time to be serviced between 5 and 8 minutes. (Your program should randomly allocate this time to each service.)
  4. Your program should simulate the case when you have one service station for all customers.
  5. Your program should simulate the case when you have two service stations for these 100 customers.
  6. For each case, output the following statistics:
    1. The number of requests for each priority along with the service time for each request
    2. The waiting time for each service request
    3. The average waiting time for service requests within each priority

Tips: Use a loop that will process 100 times, se each service request as an index for the queue, declare random numbers to generate priorities and service times, 5-8 for service, 1-3 for priority, generate 2 deques: one for service, 1 for priority, use push_front(high) and push_front(low) to add values to the deque, for medium priority use size()/2 to find the missle position of the deque using insert(name.insert(position, value).

In: Computer Science

Your order from store Your orders are 10 chips You purchased a total of 10 chips...

Your order from store
Your orders are 
10 chips
You purchased a total of 10 chips with a total price of $90
5 gums
You purchased a total of 5 gums with a total price of $30

Question: Please create a code to allow you to remove one or more of your orders (in python3 language)

In: Computer Science

**PLEASE ANSWER ALL QUESTIONS** Calliope is a forensics detective with a law enforcement agency. She discovers...

**PLEASE ANSWER ALL QUESTIONS**

Calliope is a forensics detective with a law enforcement agency. She discovers that an attacker who has just been caught was using a dead-drop method of controlling the bots in a botnet. Which of the following might have been a clue that the attacker was using this method?

a.

Finding devices that the attacker had hidden on multiple victims’ company networks

b.

Finding a directional antenna and Wi-Fi setup that allowed the bot herder to beam communications directly to the target computers

c.

Finding an e-mail account with multiple saved drafts that were never sent but contained instructions the bots were to follow

d.

Reading log files that contained constant encrypted communications from the attacker’s IP address to some of the identified bots

Belvais performing an audit of the e-mail server when she discovers that one of the accounts is sending a lot of e-mails all day that contain attachments. After a bit more research, she finds that the attachments contain extensive proprietary and confidential information. Which of the following should she consider implementing to prevent a reoccurrence?

a.

Buffer filtering

b.

DLP

c.

PoS

d.

Access point probe

Alika has just finished eradicating a piece of malware from a computer system. Which of the following might she do next as part of the validation process?

a.

Secure erase

b.

Patching

c.

Reconstruction

d.

Reimaging

Jaden has received an alert from a system that has identified potential malware on itself. Upon looking through the log files, he sees a list of error messages where an executable tried to write data to a range of memory addresses that did not exist for the system. Which of the following has most likely occurred?

a.

Space overflow

b.

Decimal overflow

c.

Buffer overflow

d.

Integer overflow

Victoria, a cybersecurity analyst, has just disconnected a computer from the network after finding that it was infected with malware. Which of the following is the next task that she should attempt to perform with the system?

a.

Containment

b.

Patching

c.

Eradication

d.

Validation

In: Computer Science