Evaluate the different types pf Back-Up which can be performed on Windows Server (2016/2019) and develop a back-up strategy for your organization which is a Large Bank in UAE with a branch office in each Emirate.
In: Computer Science
<Using C++ programming.>
<Prof said that you use the example given below.>
Write a program to find (A*B)*10 +
(2*C+D) using class Matrix.
For member functions, use add() and mul().
Add()
-a,b,c are all m*n matrices.
-Add(a,b,c,m,n): cij = aij + bij
-Add(a,m,n,num): cij = aij + num
Mul()
-a is an m*n matrix, b is an n*p matrix, and c is an m*p matrix.
-mul(a,b,c,m,n): (Matrix Multiplication)
-mul(a,m,n,num): aij = aij * num
In: Computer Science
I want to know 'Linked link + queue' and 'Linked link Stack' code in C++
But there is a condition. There shall be the following 'menu':
*****Menu*****
1. Insert into Stack 2. Insert into Queue
3. Delete from Stack 4. Delete from Queue
5. View Content in Stack 6. View Content in Queue
**********************************************
Let me give you a example.
>> 1 30 // Insert 30 into Stack
>>1 58// Insert 58 into Stack
>>1 26 // Insert 26 into Stack
>>3 // Delete from Stack
>>5 // View Content in Stack
Result: 58 30 ( Outputs in LIFO order)
Please help me. I am so curious.
In: Computer Science
Programming with Microsoft Visual Basic 2017:
Discuss the ORDER BY clause in the SELECT statement and how that can help simplify the data retrieved by the query.
In: Computer Science
A computer manufacturer offers the possibility of purchasing computers via the Internet. The customer can select a computer on the manufacture’s web page. The computers are classified into servers, desktops and portables. The customer can select a standard configuration or can build a desired configuration online. The configurable components are presented as pick lists of available options. For each new configuration, the system can calculate price. To place an order, the customer must fill out the shipment and payment information. Acceptable payment methods are credit cards and checks. Once the order has been entered, the system sends a confirmation e-mail message to the customer with details of the order. While waiting for the arrival of the computer, the customer can check the order status online at any time. The back end order processing consists of the steps needed to verify the customer’s credentials and payment method, to request the ordered configuration from the warehouse, to print an invoice, and to request the warehouse to ship the computer to the customer. Consider the following extended requirements: The customer uses the manufacturer’s online shopping web page to view the standard configuration of the chosen server, desktop or portable computer. The customer chooses to view the details of the configuration, perhaps with the intention of buying it as it or to build a more suitable configuration. The price for each configuration can be computed at the customer’s request. The customer may choose to order the computer online or may request that the salesperson contact him/her to explain order details, negotiate the price, etc. before the order is actually place. To place the order, the customer must fill out an online form with shipment and invoice address, and with payment details (credit card or cheque). After the customer’s order has been entered into the system, the salesperson sends and electronic request to the warehouse with details of the ordered configuration. The details of the transaction, including an order number and customer account number, are e-mailed to the customer, so that the customer can check the status of the order online. The warehouse obtains the invoice from the salesperson and ships the computer to the customer.
For the above Scenario draw the following UML diagrams
Q1: Identify actors, use-cases also draw use-case diagram with all possible associations?
In: Computer Science
In: Computer Science
Re-do Problem 1, but now implement the following method:
i must use this code :-
public static BagInterface intersection (BagInterface bagA, BagInterface bagB)
and here how my java program must work
This method must return a new bag which is the intersection of the two bags: bagA and bagB. An element appears in the intersection of two bags the minimum of the number of times it appears in either. For example, {1,1,2} ∩{1,1,2,2,3}= {1,1,2}. Do not forget to state the big O of your method implementation.
useing netbeans java
In: Computer Science
C++ Programming Chapter 7 Assignment:
Assignment #4 – Student Ranking :
In this assignment you are going to write a program that ask user number of students in a class and their names. Number of students are limited to 100 maximum. Then, it will ask for 3 test scores of each student. The program will calculate the average of test scores for each student and display with their names. Then, it will sort the averages in descending order and display the sorted list with students’ names and ranking.
Follow the Steps Below
In: Computer Science
Please Correct this Code. DO NOT, I repeat DO NOT edit the struct definitions and createNode Function because our prof said we shouldn't touch that part at all (I also staled that in the code). You can edit the others as far as it works. The task is to reverse 10 numbers in linked list using recursion. The 10 numbers should be inputted by the user. Please add comments to the edited code.
#include <stdio.h>
#include <stdlib.h>
//TASK: Reverse 10 numbers of linked list using recursion.
//Struct Definitions (DO NOT EDIT THIS PART)
typedef struct node { // (DO NOT EDIT THIS PART)
void* dataPtr; //(DO NOT EDIT THIS PART)
struct node* link; //(DO NOT EDIT THIS PART)
} NODE; // (DO NOT EDIT THIS PART)
//create NODE (DO NOT EDIT THIS PART)
NODE* createNode(void* itemPtr) { //(DO NOT EDIT THIS PART)
NODE* nodePtr; //(DO NOT EDIT THIS PART)
nodePtr = (NODE*) malloc (sizeof (NODE)); //(DO NOT EDIT THIS
PART)
nodePtr->dataPtr = itemPtr; //(DO NOT EDIT THIS PART)
nodePtr->link = NULL; //(DO NOT EDIT THIS PART)
return nodePtr; //(DO NOT EDIT THIS PART)
}
struct node* head;
void reverse(NODE* prev, NODE* curr) {
if (!curr){
return;
}
if (!curr->link) {
head=curr;
curr->link=prev;
return;
}
reverse(curr, curr->link);
curr->link=prev;
}
void display() {
struct node* value;
value = head;
while(value!=NULL) {
printf("%d ",value->dataPtr);
value=value->link;
}
printf("\n");
}
int main()
{
NODE* head=NULL;
int x;
printf("Enter 10 numbers to reverse ");
for(int i=0; i<9; i++) {
scanf(" %d ",&x);
}
head=createNode(x);
reverse(NULL, head); //reverse list recursively
printf("Reverse Linked List is ");
display();
return 0;
}
In: Computer Science
Re-do Problem 2, but now implement the following method: public static void deleteEvenNumbers() This method must delete all even numbers in the chain pointed to by aList, while preserving the original of the remaining numbers. For example, if aList is this list: 3, 9, 2, 10, 5, 6; the list becomes after calling the method as follows: 3, 9, 5.
useing netbeans
In: Computer Science
We want to make Error detection method, the even parity method. the input is 3bit binary, output is 1 bit of even parity bit.
if the 3 bit is 111 or 000 it is disable, other else are enable. we have to add this in even parity method.
if it is enable, the output 1 bit of even parity method will show.
if it is disable the output will be 0
(the gate must be maximum 4 bit input, and the number of gates must be at least)
draw the circuits
In: Computer Science
Pitch Deck
Overview
You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
Instructions
You will need to answer the following questions:
In: Computer Science
Write a program to receive a string from the user and compares the first and second half of the word and prints “First and Second Half Same” or “First and Second Half Different”. If the length of the word is odd, ignore the middle letter.
For example:
Run 1:
Enter a word: abcdabc
First and Second Half Same
Run 2:
Enter a word: abcde
First and Second Half Different
Hint: use the Math.floor() and length() to get the halves of the string and use the equals() to perform the similarity check inside if-else statement.
**********************************************************************************
Write a program that reads three different integers from the users and prints “all the same” if they are all equal, “all different”, if three numbers are different and “neither” for all other cases.
For example:
Enter first number: 3
Enter first number: 2
Enter first number: 6
All Different.
**********************************************************************************
Write a program that reads three different floating point numbers from the users and prints the largest of those three:
For example:
First number: 2.36
Second number: 2.99
Third number: 2.78
Largest: 2.99
In: Computer Science
Jiang, F., Jiang, Y., Zhi, H., Dong, Y., Li, H., Ma, S., ... & Wang, Y. (2017). Artificial intelligence in healthcare: past, present and future. Stroke and vascular neurology, 2(4), 230-243.
In: Computer Science
THIS IS A C++ QUESTION(SOME OTHER ASSIGNMENTS ARE DISPLAYED TO GIVE BACKGROUND INFO ON THIS QUESTION, ONLY THIS QUESTION SHOULD BE SOLVED):
Focus
Update
Problem:
Building on previous assignments, we will be reading a file of commands to create Nobles and Warriors, and sending them off to battle.
Previous Assignments(As Background info):
1) We will model a game of medieval times. Our world is filled with warriors. Naturally what warriors like to do is fight. To the death. So we happily let them.
Each warrior starts out with a name and a certain amount of strength. Each time he fights, he loses some strength. (He gets to keep his name.) If his opponent is stronger than he is, then he loses all of his strength, in which case he is dead, or at the very least pretty useless as a fighter. Otherwise he loses as much strength as his opponent had. Of course, if he and his opponent had the same strength then they are both losers.
Even losers are allowed to pick a fight. It doesn't require having any strength in order to do battle with someone else. Not that you stand much of a chance of winning anything, but perhaps it's worth getting beaten (again) just to have those 15 seconds of fame.
Your program will read in a file of commands. There are three types of commands:
2)
We will expand our Warrior a little. Each Warrior will have a weapon. He is "born" with it, i.e. the weapon is created together with the warrior. It can only be accessed by him. It provides him with his strength. In battle, weapons lose their edge and weaken. When a Warrior's weapon loses all of its strength, the Warrior himself dies.
Implementation
3)
We will [continue to] model a game of medieval times. Our world is filled with not only warriors but also nobles. Nobles don't have much to do except do battle with each other. (We'll leave the feasting and other entertainments for add-ons.) Warriors don't have much to do except hire out to a noble and fight in his behalf. Of course the nobles are pretty wimpy themselves and will lose if they don't have warriors to defend them. How does all this work?
Hiring and Firing
Death
It's a sad topic, but one we do have to address.
A test program and output are attached. Note that the output shown is what you are expected to generate. Pardon us, we don't like limiting your creativity, but having your output consistent with ours makes the first step of grading a bit easier. And also helps you to be more confident that your code works.
Key differences:
Commands
Our application is going to rely on each Noble having a unique name and each Warrior having a unique name. Otherwise, how would we be sure who we were hiring (or firing). Note that this is not a requirement of the Noble and Warrior classes themselves, just of this particular use of them, i.e. our application.
Whenever you are displaying a Noble or a Warrior, you will use the output operator for the class.
Handle errors!
Previously we promised that all of the commands we gave you the input would be valid. Now we would like you to take some responsibility for checking the input. First, we still guarantee that the format of the file will be correct. That means that the Warrior command will always have a name and a strength. The Battle command will always have two names. The Status command will not have any other information on it than just the word Status.
However, you will need to detect and report any issues indicating inconsistencies, such as:
We have not specified the format of these error messages, so we'll leave that up to you. (You get to be creative!)
Input:
"Noble King_Arthur
Noble Lancelot_du_Lac
Noble Jim
Noble Linus_Torvalds
Noble Bill_Gates
Warrior Tarzan 10
Warrior Merlin 15
Warrior Conan 12
Warrior Spock 15
Warrior Xena 20
Warrior Hulk 8
Warrior Hercules 3
Hire Jim Spock
Hire Lancelot_du_Lac Conan
Hire King_Arthur Merlin
Hire Lancelot_du_Lac Hercules
Hire Linus_Torvalds Xena
Hire Bill_Gates Hulk
Hire King_Arthur Tarzan
Status
Fire King_Arthur Tarzan
Status
Battle King_Arthur Lancelot_du_Lac
Battle Jim Lancelot_du_Lac
Battle Linus_Torvalds Bill_Gates
Battle Bill_Gates Lancelot_du_Lac
Status
Clear
Status"
Output:
"Status ====== Nobles: King_Arthur has an army of 2 Merlin: 15 Tarzan: 10 Lancelot_du_Lac has an army of 2 Conan: 12 Hercules: 3 Jim has an army of 1 Spock: 15 Linus_Torvalds has an army of 1 Xena: 20 Bill_Gates has an army of 1 Hulk: 8 Unemployed Warriors: NONE You don't work for me anymore Tarzan! -- King_Arthur. Status ====== Nobles: King_Arthur has an army of 1 Merlin: 15 Lancelot_du_Lac has an army of 2 Conan: 12 Hercules: 3 Jim has an army of 1 Spock: 15 Linus_Torvalds has an army of 1 Xena: 20 Bill_Gates has an army of 1 Hulk: 8 Unemployed Warriors: Tarzan: 10 King_Arthur battles Lancelot_du_Lac Mutual Annihalation: King_Arthur and Lancelot_du_Lac die at each other's hands Jim battles Lancelot_du_Lac He's dead, Jim Linus_Torvalds battles Bill_Gates Linus_Torvalds defeats Bill_Gates Bill_Gates battles Lancelot_du_Lac Oh, NO! They're both dead! Yuck! Status ====== Nobles: King_Arthur has an army of 1 Merlin: 0 Lancelot_du_Lac has an army of 2 Conan: 0 Hercules: 0 Jim has an army of 1 Spock: 15 Linus_Torvalds has an army of 1 Xena: 12 Bill_Gates has an army of 1 Hulk: 0 Unemployed Warriors: Tarzan: 10 Status ====== Nobles: NONE Unemployed Warriors: NONE"
In: Computer Science