Questions
Evaluate the different types pf Back-Up which can be performed on Windows Server (2016/2019) and develop...

Evaluate the different types pf Back-Up which can be performed on Windows Server (2016/2019) and develop a back-up strategy for your organization which is a Large Bank in UAE with a branch office in each Emirate.

In: Computer Science

<Using C++ programming.> <Prof said that you use the example given below.> Write a program to...

<Using C++ programming.>

<Prof said that you use the example given below.>


Write a program to find (A*B)*10 + (2*C+D) using class Matrix.

For member functions, use add() and mul().


Add()

-a,b,c are all m*n matrices.

-Add(a,b,c,m,n): cij = aij + bij

-Add(a,m,n,num): cij = aij + num


Mul()

-a is an m*n matrix, b is an n*p matrix, and c is an m*p matrix.

-mul(a,b,c,m,n): (Matrix Multiplication)

-mul(a,m,n,num): aij = aij * num

In: Computer Science

I want to know 'Linked link + queue' and 'Linked link Stack' code in C++ But...

I want to know 'Linked link + queue' and 'Linked link Stack' code in C++

But there is a condition. There shall be the following 'menu':

*****Menu*****

1. Insert into Stack 2. Insert into Queue

3. Delete from Stack 4. Delete from Queue

5. View Content in Stack 6. View Content in Queue

**********************************************

Let me give you a example.

>> 1 30 // Insert 30 into Stack

>>1 58// Insert 58 into Stack

>>1 26 // Insert 26 into Stack

>>3 // Delete from Stack

>>5 // View Content in Stack

Result: 58 30 ( Outputs in LIFO order)

Please help me. I am so curious.

In: Computer Science

Programming with Microsoft Visual Basic 2017: Discuss the ORDER BY clause in the SELECT statement and...

Programming with Microsoft Visual Basic 2017:

Discuss the ORDER BY clause in the SELECT statement and how that can help simplify the data retrieved by the query.

In: Computer Science

A computer manufacturer offers the possibility of purchasing computers via the Internet. The customer can select...

A computer manufacturer offers the possibility of purchasing computers via the Internet. The customer can select a computer on the manufacture’s web page. The computers are classified into servers, desktops and portables. The customer can select a standard configuration or can build a desired configuration online. The configurable components are presented as pick lists of available options. For each new configuration, the system can calculate price. To place an order, the customer must fill out the shipment and payment information. Acceptable payment methods are credit cards and checks. Once the order has been entered, the system sends a confirmation e-mail message to the customer with details of the order. While waiting for the arrival of the computer, the customer can check the order status online at any time. The back end order processing consists of the steps needed to verify the customer’s credentials and payment method, to request the ordered configuration from the warehouse, to print an invoice, and to request the warehouse to ship the computer to the customer. Consider the following extended requirements: The customer uses the manufacturer’s online shopping web page to view the standard configuration of the chosen server, desktop or portable computer. The customer chooses to view the details of the configuration, perhaps with the intention of buying it as it or to build a more suitable configuration. The price for each configuration can be computed at the customer’s request. The customer may choose to order the computer online or may request that the salesperson contact him/her to explain order details, negotiate the price, etc. before the order is actually place. To place the order, the customer must fill out an online form with shipment and invoice address, and with payment details (credit card or cheque). After the customer’s order has been entered into the system, the salesperson sends and electronic request to the warehouse with details of the ordered configuration. The details of the transaction, including an order number and customer account number, are e-mailed to the customer, so that the customer can check the status of the order online. The warehouse obtains the invoice from the salesperson and ships the computer to the customer.

For the above Scenario draw the following UML diagrams

Q1: Identify actors, use-cases also draw use-case diagram with all possible associations?

In: Computer Science

Make a JAVA program: java.applet java.awt java.awt.evet java.swing.JOptionpane decisional structure (IF, ELSE IF), message box, checkbox,...

Make a JAVA program:
java.applet
java.awt
java.awt.evet
java.swing.JOptionpane

decisional structure (IF, ELSE IF), message box, checkbox, number format.
Data entry:
Customer name
Client number
Discount: New Customer 10% Existing Customer 5%
Registration: Daily $ 5 Weekly $ 20 Monthly $ 40 Yearly $ 80
Calculate the registration cost in a function according to the discount and type of registration
It should show the cost and a message box showing the selected alternatives; Result boxes must be visible when the button is pressed and cannot be altered. You must contemplate the different errors, use "try and catch". Create color and apply to shape.
Add button to clear text boxes and variables.

Make a JAVA program decisional structure, message box, matching box, number format.
Entry of Data:
Customer Name
Customer Number
Discount: New Customer 10% Existing Customer 5%
Registration: Daily $5 Weekly $20 Monthly $40 Annual $80
Calculate in a function the cost of registration according to the discount and type of registration
You must display the cost and a message box showing the selected alternatives; the result boxes must be visible when the button is pressed and cannot be altered. You must contemplate the different errors, use " try and catch". Create color and apply to the form.
Add button to clear text boxes and variables.

In: Computer Science

Re-do Problem 1, but now implement the following method: i must use this code :- public...

Re-do Problem 1, but now implement the following method:

i must use this code :-

public static BagInterface intersection (BagInterface bagA, BagInterface bagB)

and here how my java program must work

This method must return a new bag which is the intersection of the two bags: bagA and bagB. An element appears in the intersection of two bags the minimum of the number of times it appears in either. For example, {1,1,2} ∩{1,1,2,2,3}= {1,1,2}. Do not forget to state the big O of your method implementation.

useing netbeans java

In: Computer Science

C++ Programming Chapter 7 Assignment: Assignment #4 – Student Ranking : In this assignment you are...

C++ Programming Chapter 7 Assignment:

Assignment #4 – Student Ranking :

In this assignment you are going to write a program that ask user number of students in a class and their names. Number of students are limited to 100 maximum. Then, it will ask for 3 test scores of each student. The program will calculate the average of test scores for each student and display with their names. Then, it will sort the averages in descending order and display the sorted list with students’ names and ranking.

Follow the Steps Below

  1. Save the project as A4_StudentRanking_yourname.
  2. Use functions to divide your program into manageable pieces. Define three functions: displayList, findAverage, and sort.
    1. Write function prototypes at the top and define the functions after the main function.
  3. findAverage function:
    1. This function will get 4 parameters: array of student names, 2D array of grades from 3 tests of each student, array of averages to fill in, number of students as the arrays size.
    2. You need nested for loop to calculate average of 3 test scores for each student and record it to the array of averages. (You may define array of names and 2D array of grades as constants in the parameter list since you don’t need to make any changes.)
    3. No return value needed; changes will apply on the original array of averages.
  4. displayList function:
    1. This function has 3 parameters: array of student names, array average scores, and the size of the arrays.
    2. The function doesn’t make any changes on the arrays, so define them as constants in the parameter list.
    3. Call the function twice in your program
      1. When averages are calculated
      2. When averages are sorted
  5. sort function:
    1. This function gets 3 parameters: array of students, array of averages, and number of students as the size of the arrays.
    2. Use selection sort algorithm. Sort both arrays based on the average scores in descending order. (You will apply the sort on the array of averages by comparing the scores, but apply the swapping on both arrays. They are parallel arrays. This means they use the same index numbers.)
  6. Define constants as global constants. Do not use any literal in the program, use their identifiers.
  7. Write function prototypes.
  8. Keep variable definitions local.
  9. At the beginning of the program inform user about the program. Display a message stating that they can enter 3 test scores and any number of students limited to 100.
  10. Ask for number of the students to user.
  11. Array of students, test scores, and averages are parallel arrays. This means they store related data in the same subscript.
  12. The array of test scores is a two-dimensional array. First subscript holds number of students and second subscript holds number of test scores.
  13. Validate user input with a while or do-while loop. They shouldn’t exceed the maximum number; also, it can’t be less than 1.
  14. Ask for the student names and their test scores. Use getline function to get the students’ full names. You must use cin.ignore() before using the getline function since you also use cin object.
  15. Call findAverage function.
  16. Call displayList function.
  17. Call sort function.
  18. Call displayList function.
  19. Use comment lines to describe block of code statements in the program.

In: Computer Science

Please Correct this Code. DO NOT, I repeat DO NOT edit the struct definitions and createNode...

Please Correct this Code. DO NOT, I repeat DO NOT edit the struct definitions and createNode Function because our prof said we shouldn't touch that part at all (I also staled that in the code).  You can edit the others as far as it works. The task is to reverse 10 numbers in linked list using recursion. The 10 numbers should be inputted by the user. Please add comments to the edited code.

#include <stdio.h>
#include <stdlib.h>

//TASK: Reverse 10 numbers of linked list using recursion.

//Struct Definitions (DO NOT EDIT THIS PART)
typedef struct node { // (DO NOT EDIT THIS PART)
void* dataPtr; //(DO NOT EDIT THIS PART)
struct node* link; //(DO NOT EDIT THIS PART)
} NODE; // (DO NOT EDIT THIS PART)

//create NODE (DO NOT EDIT THIS PART)
NODE* createNode(void* itemPtr) { //(DO NOT EDIT THIS PART)
NODE* nodePtr; //(DO NOT EDIT THIS PART)
nodePtr = (NODE*) malloc (sizeof (NODE)); //(DO NOT EDIT THIS PART)
nodePtr->dataPtr = itemPtr; //(DO NOT EDIT THIS PART)
nodePtr->link = NULL; //(DO NOT EDIT THIS PART)
return nodePtr; //(DO NOT EDIT THIS PART)
}

struct node* head;
void reverse(NODE* prev, NODE* curr) {
if (!curr){
return;
}
if (!curr->link) {
head=curr;
curr->link=prev;
return;
}
  
reverse(curr, curr->link);
curr->link=prev;
}

void display() {
  
struct node* value;
value = head;
  
while(value!=NULL) {
printf("%d ",value->dataPtr);
value=value->link;
}
printf("\n");
}

int main()
{
NODE* head=NULL;
  int x;
  
printf("Enter 10 numbers to reverse ");
for(int i=0; i<9; i++) {
scanf(" %d ",&x);
}
head=createNode(x);

reverse(NULL, head); //reverse list recursively
  
printf("Reverse Linked List is ");
display();
  

return 0;
}

In: Computer Science

Re-do Problem 2, but now implement the following method: public static void deleteEvenNumbers() This method must...

Re-do Problem 2, but now implement the following method: public static void deleteEvenNumbers() This method must delete all even numbers in the chain pointed to by aList, while preserving the original of the remaining numbers. For example, if aList is this list: 3, 9, 2, 10, 5, 6; the list becomes after calling the method as follows: 3, 9, 5.

useing netbeans

In: Computer Science

We want to make Error detection method, the even parity method. the input is 3bit binary,...

We want to make Error detection method, the even parity method. the input is 3bit binary, output is 1 bit of even parity bit.

if the 3 bit is 111 or 000 it is disable, other else are enable. we have to add this in even parity method.

if it is enable, the output 1 bit of even parity method will show.

if it is disable the output will be 0

(the gate must be maximum 4 bit input, and the number of gates must be at least)

draw the circuits

In: Computer Science

Pitch Deck Overview You have been hired to create a website. In this assignment, you will...

Pitch Deck

Overview

You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.

Instructions

You will need to answer the following questions:

  • What kind of domain names will you register (that is .com, .biz, .net, et cetera)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
  • Will you register the site using multiple domains? Why is or isn't this necessary?
  • Will you need to secure any portion of your site? Why? (See the section on HTTPS.)
  • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
  • What browsers do you anticipate your visitors will be using based on information available today?
  • Does the browser have any impact on your design?
  • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?

In: Computer Science

Write a program to receive a string from the user and compares the first and second...

Write a program to receive a string from the user and compares the first and second half of the word and prints “First and Second Half Same” or “First and Second Half Different”. If the length of the word is odd, ignore the middle letter.

For example:

Run 1:

Enter a word: abcdabc

First and Second Half Same

Run 2:

Enter a word: abcde

First and Second Half Different

Hint: use the Math.floor() and length() to get the halves of the string and use the equals() to perform the similarity check inside if-else statement.

**********************************************************************************

Write a program that reads three different integers from the users and prints “all the same” if they are all equal, “all different”, if three numbers are different and “neither” for all other cases.

For example:

Enter first number: 3

Enter first number: 2

Enter first number: 6

All Different.

**********************************************************************************

Write a program that reads three different floating point numbers from the users and prints the largest of those three:

For example:

First number: 2.36

Second number: 2.99

Third number: 2.78

Largest: 2.99

In: Computer Science

Lee, J. G., Jun, S., Cho, Y. W., Lee, H., Kim, G. B., Seo, J. B.,...

  1. Lee, J. G., Jun, S., Cho, Y. W., Lee, H., Kim, G. B., Seo, J. B., & Kim, N. (2017). Deep learning in medical imaging: general overview. Korean journal of radiology, 18(4), 570-584.‏
  2. Choi, H. (2018). Deep learning in nuclear medicine and molecular imaging: current perspectives and future directions. Nuclear medicine and molecular imaging, 52(2), 109-118.‏
  3. Wang, G. (2016). A perspective on deep imaging. IEEE access, 4, 8914-8924.‏
  4. Jiang, F., Jiang, Y., Zhi, H., Dong, Y., Li, H., Ma, S., ... & Wang, Y. (2017). Artificial intelligence in healthcare: past, present and future. Stroke and vascular neurology, 2(4), 230-243.

  5. Fazal, M. I., Patel, M. E., Tye, J., & Gupta, Y. (2018). The past, present and future role of artificial intelligence in imaging. European journal of radiology, 105, 246-250.
  1. Please can you write a short paragraph 6-8 lines (summary) for each reference

In: Computer Science

THIS IS A C++ QUESTION(SOME OTHER ASSIGNMENTS ARE DISPLAYED TO GIVE BACKGROUND INFO ON THIS QUESTION,...

THIS IS A C++ QUESTION(SOME OTHER ASSIGNMENTS ARE DISPLAYED TO GIVE BACKGROUND INFO ON THIS QUESTION, ONLY THIS QUESTION SHOULD BE SOLVED):

Focus

  • Dynamic memory

Update

  • Do NOT make the Noble class a friend of the Warrior class.
  • Do NOT put a pointer in the Warrior class to the Noble class.

Problem:

Building on previous assignments, we will be reading a file of commands to create Nobles and Warriors, and sending them off to battle.

Previous Assignments(As Background info):

1) We will model a game of medieval times. Our world is filled with warriors. Naturally what warriors like to do is fight. To the death. So we happily let them.

Each warrior starts out with a name and a certain amount of strength. Each time he fights, he loses some strength. (He gets to keep his name.) If his opponent is stronger than he is, then he loses all of his strength, in which case he is dead, or at the very least pretty useless as a fighter. Otherwise he loses as much strength as his opponent had. Of course, if he and his opponent had the same strength then they are both losers.

Even losers are allowed to pick a fight. It doesn't require having any strength in order to do battle with someone else. Not that you stand much of a chance of winning anything, but perhaps it's worth getting beaten (again) just to have those 15 seconds of fame.

Your program will read in a file of commands. There are three types of commands:

  • Warrior creates a new warrior with the specified name and strength.
  • Battle causes a battle to occur between two warriors.
  • Status lists all warriors, alive or dead, and their strengths

2)

We will expand our Warrior a little. Each Warrior will have a weapon. He is "born" with it, i.e. the weapon is created together with the warrior. It can only be accessed by him. It provides him with his strength. In battle, weapons lose their edge and weaken. When a Warrior's weapon loses all of its strength, the Warrior himself dies.

Implementation

  • Remember that we are using data hiding. Therefore, every field, aka member variable, must be private.
  • What are the types of things in the problem? We will need a class for each type.
  • What do the things / types do? These "behaviors" should be represented as methods.
  • Weapons have both a name and a strength. The weapon is created together with the Warrior and cannot be accessed by anyone else.
  • Note that the input file changed a little, compared to the previous assignment. When a Warrior is created, instead of simply specifying his name and strength, the Warrior command specifies the Warrior's name as well as his Weapon's name and its strength.
  • The Status report will is also modified to show the name of the Warrior's Weapon.
  • No one can access a warrior's weapon except the warrior himself. But the weapon is what actually holds the warrior's strength. How does this effect the programming? Any time the code needs to know or change the warrior's strength, the warrior then "asks" the weapon what the strength is or tells the weapon that the strength needs to be changed. This represents the idea of delegation. We will see this concept frequently, where one object requests that another object do some task.
  • It is in fact unnecessary for any code other than a Warrior to even know about the Weapon. We will enforce this by nesting the definition of the Weapon class inside the Warrior class. To make sure that no code other than Warrior's makes use of Weapon, we need to make the class private.
  • The name of the input file will be "warriors.txt".
  • One last implementation detail. to display the information about an object, whether it is a warrior or a weapon, we will use that object's output operator.

3)

We will [continue to] model a game of medieval times. Our world is filled with not only warriors but also nobles. Nobles don't have much to do except do battle with each other. (We'll leave the feasting and other entertainments for add-ons.) Warriors don't have much to do except hire out to a noble and fight in his behalf. Of course the nobles are pretty wimpy themselves and will lose if they don't have warriors to defend them. How does all this work?

  • Warriors start out with a specified strength.
  • A battle between nobles is won by the noble who commands the stronger army.
  • The army's strength is simply the combined strengths of all its warriors.
  • A battle is to the death. The losing noble dies as does his warriors.
  • The winner does not usually walk away unscarred. All his men lose a portion of their strength equal to the ratio of the enemy army's combined strenth to their army's. If the losing army had a combined strength that was 1/4 the size of the winning army's, then each soldier in the winning army will have their own strength reduced by 1/4.

Hiring and Firing

  • Warriors are hired and fired by Nobles. Lack of adequate labor laws, have left the Warriors without the ability to quit, nor even to have a say on whether or not a Noble can hire them.
  • However it is possible that an attempt to hire or fire may fail. Naturally the methods should not "fail silently". Instead, they will return true or false depending on whether they succeed or not.
  • A Warrior can only be employed by one Noble at a time and cannot be hired away if he is already employed.
  • As noted below, Nobles who are dead can neither hire nor fire anyone. (Note this will implicitly prevent dead Warriors from being hired.)
  • When a warrior is fired, he is no longer part of the army of the Noble that hired him. He is then free to be hired by another Noble.
    • How do you remove something from a vector.
    • While there are techniques that make use of iterators, we have not yet discussed iterators so you will not use them here. (As a heads up, if you see a technique that requires you to call a vector's begin() method, that is using iterators. Don't use it.)
    • While it may seem a slight burden, certainly it does not require more than a simple loop to remove an item from a vector. No do not do something silly like create a whole new vector.
    • Soon we will cover iterators and then you will be freed from these constraints. Patience, please.

Death

It's a sad topic, but one we do have to address.

  • People die when they lose a battle, whether they are a Nobles or Warriors.
  • Nobles who are dead are in no position to hire or fire anyone. Any attempt by a dead Lord to hire someone will simply fail and the Warrior will remain unhired.
  • However curiously, as has been seen before, Nobles can declare battle even though they are dead.
  • Note that when a Noble is created he does not have any strength. At the same time he is obviously alive. So lack of strength and being dead are clearly not equivalent.

A test program and output are attached. Note that the output shown is what you are expected to generate. Pardon us, we don't like limiting your creativity, but having your output consistent with ours makes the first step of grading a bit easier. And also helps you to be more confident that your code works.

Key differences:

  • Each time a warrior or a noble is defined, we will create it on the heap.
  • We will keep track of the nobles in a vector of pointers to nobles.
  • We will keep track of all warriors using a vector of pointers to warriors.

Commands

  • Noble. Create a Noble on the heap.
  • Warrior. Create a Warrior on the heap.
  • Hire. Call the Noble's hire method.
  • Fire. Call the Noble's fire method.
  • Battle. Call the Noble's battle method.
  • Status. The status command shows the nobles, together with their armies, as we did previously. In addition, it will show separately the warriors who do not currentle have a employer
  • Clear. Clear out all the nobles and warriors that were created.

Our application is going to rely on each Noble having a unique name and each Warrior having a unique name. Otherwise, how would we be sure who we were hiring (or firing). Note that this is not a requirement of the Noble and Warrior classes themselves, just of this particular use of them, i.e. our application.

Whenever you are displaying a Noble or a Warrior, you will use the output operator for the class.

Handle errors!

Previously we promised that all of the commands we gave you the input would be valid. Now we would like you to take some responsibility for checking the input. First, we still guarantee that the format of the file will be correct. That means that the Warrior command will always have a name and a strength. The Battle command will always have two names. The Status command will not have any other information on it than just the word Status.

However, you will need to detect and report any issues indicating inconsistencies, such as:

  • Noble command: if a Noble with a given name already exists.
  • Warrior command:if a Warrior with a given name already exists.
  • Hire command: If a Noble tries to hire a Warrior and either of them do not exist.
  • Fire command: If a Noble tries to fire a Warrior and either the Noble does not exist or does not have the Warrior by that name in this army.
  • Battle command: If a Noble initiates a battle with another Noble, but one or the other does not exist

We have not specified the format of these error messages, so we'll leave that up to you. (You get to be creative!)

Input:

"Noble King_Arthur
Noble Lancelot_du_Lac
Noble Jim
Noble Linus_Torvalds
Noble Bill_Gates
Warrior Tarzan 10
Warrior Merlin 15
Warrior Conan 12
Warrior Spock 15
Warrior Xena 20
Warrior Hulk 8
Warrior Hercules 3
Hire Jim Spock
Hire Lancelot_du_Lac Conan
Hire King_Arthur Merlin
Hire Lancelot_du_Lac Hercules
Hire Linus_Torvalds Xena
Hire Bill_Gates Hulk
Hire King_Arthur Tarzan
Status
Fire King_Arthur Tarzan
Status
Battle King_Arthur Lancelot_du_Lac
Battle Jim Lancelot_du_Lac
Battle Linus_Torvalds Bill_Gates
Battle Bill_Gates Lancelot_du_Lac
Status
Clear
Status"

Output:

"Status
======
Nobles:
King_Arthur has an army of 2
        Merlin: 15
        Tarzan: 10
Lancelot_du_Lac has an army of 2
        Conan: 12
        Hercules: 3
Jim has an army of 1
        Spock: 15
Linus_Torvalds has an army of 1
        Xena: 20
Bill_Gates has an army of 1
        Hulk: 8
Unemployed Warriors:
NONE
You don't work for me anymore Tarzan! -- King_Arthur.
Status
======
Nobles:
King_Arthur has an army of 1
        Merlin: 15
Lancelot_du_Lac has an army of 2
        Conan: 12
        Hercules: 3
Jim has an army of 1
        Spock: 15
Linus_Torvalds has an army of 1
        Xena: 20
Bill_Gates has an army of 1
        Hulk: 8
Unemployed Warriors:
Tarzan: 10
King_Arthur battles Lancelot_du_Lac
Mutual Annihalation: King_Arthur and Lancelot_du_Lac die at each other's hands
Jim battles Lancelot_du_Lac
He's dead, Jim
Linus_Torvalds battles Bill_Gates
Linus_Torvalds defeats Bill_Gates
Bill_Gates battles Lancelot_du_Lac
Oh, NO!  They're both dead!  Yuck!
Status
======
Nobles:
King_Arthur has an army of 1
        Merlin: 0
Lancelot_du_Lac has an army of 2
        Conan: 0
        Hercules: 0
Jim has an army of 1
        Spock: 15
Linus_Torvalds has an army of 1
        Xena: 12
Bill_Gates has an army of 1
        Hulk: 0
Unemployed Warriors:
Tarzan: 10
Status
======
Nobles:
NONE
Unemployed Warriors:
NONE"

In: Computer Science