Questions
Write a program using Newton's method: Use your programs to find approximations to within 10^(-4) to...

Write a program using Newton's method:

Use your programs to find approximations to within 10^(-4) to all zeros of the following cubic polynomials.


Use |P_(n+1)-P_n| as a measure of the error in the iteration. Save all of the iterations. What are your conclusions?
(a) f(x) = x^3-5x^2 + 2x

(b) f(x) = x^3-2x^2-5

The program has to be used with MATLAB. I'm still learning how to use the program. I would love some help and tips on solving these methods. Thank you

In: Computer Science

Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...

Assignment task

Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following

Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  

Item 2: Virus/Malware details:

  1. Name of malware/virus
  2. When and where was this virus/malware first discovered?
  3. How prevalent is this virus/malware? Is it regionalized by geography or business sector? Is it worldwide? How many computers/victims has it claimed?
  4. What has been the impact of this particular virus/malware? Has it damaged computers/data? Has it caused the loss of revenue or reputation? Has it physically damaged anything?
  5. Description of the virus/malware:

What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?

Item 3 - Malware/Virus removal - How effective is software in removing it? What has to be done to remove it? What can be done to prevent being impacted by it?

Example of what I am looking for: Leading anti-virus/malware products such as <Name some products> are effective in removing the malicious .DLL, They do this by first configuring Internet Explorer to not run the .DLL and then deleting the malicious .DLL itself.

In: Computer Science

write code to manage a linked list using recursive approach. (Using this code) C++ IN Unix....

write code to manage a linked list using recursive approach. (Using this code) C++ IN Unix.

// app.cpp

#include <iostream>
#include "linkedlist.h"

using namespace std;

void find(LinkedList& list, char ch)
{
   if (list.find(ch))
       cout << "found ";
   else
       cout << "did not find ";
   cout << ch << endl;
}

int main()
{
   LinkedList   list;

   list.add('x');
   list.add('y');
   list.add('z');
   cout << list;
   find(list, 'y');

   list.del('y');
   cout << list;
   find(list, 'y');

   list.del('x');
   cout << list;
   find(list, 'y');

   list.del('z');
   cout << list;
   find(list, 'y');

   return 0;
}

//-------------------

//linkedlist.h

#ifndef _LINKED_LIST_
#define _LINKED_LIST_

#include <ostream>

class LinkedList
{
public:
   LinkedList();
   ~LinkedList();

   void add(char ch);
   bool find(char ch);
   bool del(char ch);

   friend std::ostream& operator<<(std::ostream& out, LinkedList& list);
};

#endif // _LINKED_LIST_

//-------------------------
//makefile

CC = g++
CPPFLAGS = -Wall -g -std=c++11

app:           app.o linkedlist.o

app.o:           linkedlist.h

linkedlist.o:       linkedlist.h

.PHONY:   clean
clean:           # clean the directory
           $(info -- cleaning the directory --)
           rm -f *.o
           rm -f app
//-----------------------

In: Computer Science

verilog question Please answer true or false: The expression(A==B)is evaluated as true if A is equal...

verilog question

Please answer true or false:

The expression(A==B)is evaluated as true if A is equal to B and false other wise .The !=operator has the opposite effect.

true or false?

For background reference only:

Write a verilog code for 16:1 multiplexer and create a test bench for the 15th input to be selected by control input to be on output line.

In: Computer Science

File management is the process of administering a system that correctly handles digital data. Therefore, an...

File management is the process of administering a system that correctly handles digital data. Therefore, an effective file management system improves the overall function of a business workflow. It also organizes important data and provides a searchable database for quick retrieval. Now that you have more insight into file management, how will you use file management with your computer? Why is fie management necessary? How would file management help you to be more efficient?


In: Computer Science

Systems engineering: Take an example of a complex system (real or made up). According to the...

Systems engineering:

Take an example of a complex system (real or made up). According to the System Engineering Flow diagram, chart all different stages of its development. Also give the task participation by different participants (Sys. Engg, Test Engg., Design Engg. etc.) at different levels.

In: Computer Science

Prove that the following two statements are not logically equivalent. In your proof, completely justify your...

Prove that the following two statements are not logically equivalent. In your proof, completely justify your answer.

(a) A real number is less than 1 only if its reciprocal is greater than 1.

(b) Having a reciprocal greater than 1 is a sufficient condition for a real number to be less than 1.

Proof:

 
 
 
#2. 
Prove that the following is a valid argument:

         All real numbers have nonnegative squares.

The number i has a negative square.

         Therefore, the number i is not a real number.

Proof:

In: Computer Science

Cutting Edge Incorporated is a company engaged in the development of computer-aided design (CAD) software packages....

  1. Cutting Edge Incorporated is a company engaged in the development of computer-aided design (CAD) software packages. The management of Cutting Edge wants to develop a project tracking system to accumulate and report data on current projects, employees and departments. They have given you the following attributes they store on an excel spreadsheet. A project can have several employees assigned to it. An employee belongs to only one department. Make any necessary assumptions and normalize to 3NF.

(ProjectNumber, ProjectName, StartDate, ProjectStatus, (EmployeeNumber, EmployeeName, DepartmentNumber, DepartmentName, JobTitle, ProjectHours))

In: Computer Science

Instructions To make the most of programming, you need to deeply understand the principles that underly...

Instructions

To make the most of programming, you need to deeply understand the principles that underly the paradigm that you are using.

For this task you must explain the principles of object oriented programming and relate these to the programs you have created.

Note: Explain is more than just a description, you want to convey a deeper understand- ing that can be achieved with a simple description. Try to relate the principles together and express the depth of your understanding.

Tip: A deep explanation does not need to be a long one. Aim to convey your under- standing in a concise fashion.

Create an article / blog post / letter to a friend / comic / movie / podcast / etc that explains the principles of object oriented programming, as you understand them, and outline what qualities you should look for in good object oriented programs.

  1. Keep it to about 1 or 2 pages of text (if text based)

  2. Videos or podcasts should be kept as short — but still demonstrate depth of understand- ing.

  3. Creativity will be valued

    Tip: Including references to textbooks (not wikipedia) or research papers can help you strengthen your explanation. Remember to reference other peoples work.

Make sure your explanation covers the following:

Concepts and Principles Programming Artefacts

Abstraction

Encapsulation

Class

Method

Inheritance

Polymorphism

Object

Fields

Roles

Responsibilities

Interface

Collaborations

Coupling

Cohesion

Relate these to programs you have written in this unit.

In: Computer Science

Language is C# (i've got some code but it seems to not run correctly, would love...

Language is C# (i've got some code but it seems to not run correctly, would love a new take)

Create an Employee class with five fields: first name, last name, workID, yearStartedWked, and initSalary. It includes constructor(s) and properties to initialize values for all fields. Create an interface, SalaryCalculate, class that includes two functions: first,CalcYearWorked() function, it takes one parameter (currentyear) and calculates the number of year the worker has been working. The second function, CalcCurSalary() function that calculates the current year salary. Create a Worker classes that is derived from Employee and SalaryCalculate class. In Worker class, it includes two field, nYearWked and curSalary, and constructor(s). It defines the CalcYearWorked() function using (current year – yearStartedWked) and save it in the nYearWked variable. It also defines the CalcCurSalary() function that calculates the current year salary by using initial salary with 3% yearly increment. Create a Manager class that is derived from Worker class. In Manager class, it includes one field: yearPromo and constructor(s). Itincludes a CalcCurSalary function that calculate the current year salary by overriding the base class function using initial salary with 5% yearly increment plus 10% bonus. The manager’s salary calculates in two parts. It calculates as a worker before the year promoted and as a manager after the promotion. Write an application that reads the workers and managers information from files (“worker.txt” and “manager.txt”) and then creates the dynamic arrays of objects. Prompt the user for current year and display the workers’ and managers’ current information in separate groups: first and last name, ID, the year he/she has been working, and current salary.

Worker.txt

5
Hector
Alcoser
A001231
1999
24000
Anna
Alaniz
A001232
2001
34000
Lydia
Bean
A001233
2002
30000
Jorge
Botello
A001234
2005
40000
Pablo
Gonzalez
A001235
2007
35000

Manager.txt

3
Sam
Reza
M000411
1995
51000
2005
Jose
Perez
M000412
1998
55000
2002
Rachel
Pena
M000413
2000
48000
2010

In: Computer Science

// JavaLanguage . You need to write a program that asks the user for an array...

// JavaLanguage

. You need to write a program that asks the user for an array size, and then asks the user to enter that many integers. Your program will then print out the sum , average, largest and smallest of the values in the array.

In: Computer Science

this is a workplace skill assignment. You have been promoted to Evening Team Lead at a...

this is a workplace skill assignment.

You have been promoted to Evening Team Lead at a data center. You have reviewed the current infrastructure to ensure that operational procedures, maintenance and support of critical systems are in place.   

You feel you have a well-trained, responsible staff in place and are confident that they are providing high quality operational support. If you could do anything, you would add more support staff to the team. Although you are getting by, you often run in to a shortage of coverage. Team members regularly voices their concerns to you about their ability to accomplish the workload.

Being understaffed is great in terms of the departmental budget. You have also heard it can be difficult to get new positions approved. You decide your team can handle the hectic pace and put off exploring the need for additional personnel with your supervisor. Next year’s budget, you tell yourself.

On Monday night, the data center goes offline. Your team follows the recovery protocol but finds that the data restore fails. After some investigation, you determine that James was assigned to complete nightly backups but has not been doing so for the last six months. The data is lost.

Your next step has to be to take this to your supervisor. How do handle responsibility for this problem with your boss?

In: Computer Science

Considering our personal and professional reliance on technology, how has mobile technology positively and negatively impacted...

Considering our personal and professional reliance on technology, how has mobile technology positively and negatively impacted business?

How can social media negatively impact your career goals? What are the positive attributes of social media in achieving your career goals?

In: Computer Science

PYTHON- create a queue class that uses a LINKEDLIST in order to store data. this queue...

PYTHON- create a queue class that uses a LINKEDLIST in order to store data. this queue will call on a linkedlist class

class Queue:
    def __init__(self):
        self.items = LinkedList()

    #has to be O(1)
    def enqueue(self, item):
      
    #has to be O(1)
    def dequeue(self):
        

    def is_empty(self):
        

    def __len__(self):

In: Computer Science

Briefly describe the operation of TCP/IP in the process of sending a message from port 3...

Briefly describe the operation of TCP/IP in the process of sending a message from port 3 on host A to port 1 on host B.

In: Computer Science