As a Sys admin you were asked to plan a network including three subnets each one for a different usage. You may plan the net for the organization you are familiar with, or an imaginary net you dreamed to implement. Be specific with your plan including all IP Addresses hosts. Include a graphic layout of your plan.
In: Computer Science
In this case study, your task is to study different search algorithms to solve the N-Queens Problem which has been presented in class. We will focus on the incremental formulation in which we add a queen to any square in the leftmost empty column that is not attacked by any other queen.
Question: Does Simulated Annealing (SA) algorithms (with 10 iterations) solve the 14-Queens Problem? What about Simulated Annealing (SA) algorithms (with 50 iterations). Show your answer.
In: Computer Science
Create a java program with class Customer: Name, Surname, ID (incremental ID by 1 for each new customer), Email, Phone, Address. The program must create New customer, and Print information for customer with a certain ID.
In: Computer Science
**I need rewrite the answer with unique word ... thank you
Q1:
What strategic competitive benefits do you see in a company’s use of extranets?
Answer :
An extranet can increase the value of your organization by helping you convey and work together more viably with customers, clients, and accomplices. Especially in the business-to-business market, an extranet can give your organization an edge over the opposition and set aside you cash by smoothing out conventional business capacities and reducing overhead expenses.
Extranets accomplish a similar work as an intranet, however it additionally takes into account correspondence on the planet. An extranet permits client, sellers and providers to get to the data through the PC framework. The organizations use extranets to get strategic like:
1. Expanded efficiency: As you mechanize measures that were generally done physically, bottlenecks will vanish and your organization's profitability will increment. Basic data won't lose all sense of direction via the post office or covered in an email inbox, and occupied representatives won't miss or overlook key functions. An extranet can, for instance, screen business exercises and trigger explicit activities, for example, naturally submitting a request with a provider when your stock dips under a specific level.
2. More limited chance to advertise: In the event that your business isn't moving at "Web speed," you hazard being abandoned. An extranet can assist you with getting your items to showcase all the more rapidly by making proposition and determinations accessible to providers, and surrendering customers and accomplices to-date data on current undertakings.
3. Construct client loyalty : Extranets make business simpler for your clients. The more you make convenient, precise data accessible to your clients, the more probable it is you'll keep their business
4.Reduced stock : One of the signs of a business-to-business extranet is its effect on flexibly chain the board. By connecting your stock framework straightforwardly to a provider, you can handle arranges when the framework realizes you need them, in this manner lessening the stock you keep available and making the acquirement cycle more proficient.
Q2:
Data Modelling is the primary step in the process of database design. Compare and contrast Conceptual data model versus Physical data model. Illustrates with help of example to list down data (entities), relationship among data and constraints on data.
Data modelling is the first step in database design. It is the process of creating a data model for the data to be stored in a database. It is considered as the high level. It is also referred as the conceptual design. Data modeling helps in the visual representation of data and enforces business rules, regulatory compliances, and government policies on the data. Data Models ensure consistency in naming conventions, default values, semantics, security while ensuring quality of the data..It describes the data contained in the database, relationship between data items and the constraints on the data.
Conceptual data model
This Data Model defines WHAT the system contains. The purpose is to organize, scope and define business concepts and rules. It is an organized view of database concepts and their relationships.. It does not have the complete data of the database. It is used to create entities, their attributes, and relationships.
·Includes the important entities and the relationships among them.
·No attribute is specified.
·No primary key is specified.
Physical Data model
This Data Model describes HOW the system will be implemented using a specific DBMS system. The purpose is actual implementation of the database.It offers database abstraction and helps generate the schema. The physical data model also helps in visualizing database structure by replicating database column keys, constraints, indexes, triggers and other schemas.
In: Computer Science
“The software design/development team and test engineers need to develop a strategy for planning, design, execution, data collection, and test evaluation”. Discuss this statement.
please no handwrite
please no picture
In: Computer Science
PYTHON WHILE Write a program that prompts for and reads the number ? of spheres to be processed. If ?≤0 your program must display an error message and terminate; otherwise it does the following for ? times:
In: Computer Science
Java question: I need to fix a point class (code below) Thank you!
/**
* A point, implemented as a location without a shape.
*/
public class Point extends Location {
// TODO your job
// HINT: use a circle with radius 0 as the shape!
public Point(final int x, final int y) {
super(-1, -1, null);
assert x >= 0;
assert y >= 0;
}
}
In: Computer Science
A = [-1000:1:1000] write a script file that gives the positive numbers greater than 480 and divisible by 3. Hint: Use this command if A(i)>480&&(rem(A(i),3)==0) and indeed, if is always accompanied by an end
In: Computer Science
In: Computer Science
In: Computer Science
What role should measurement play in a good testing strategy?
In: Computer Science
Write a Python program that asks the user to enter the monthly costs for the following expenses incurred from operating his or her automobile:
Write a function that takes these six items as arguments and computes the total cost of these expenses.
Write a main program that asks the user for these six items and calls your function.
Print total monthly cost and the total annual cost for these expenses.
Your function should not have any input statements or print statements (except for debugging print statements).
In: Computer Science
Explain the crypto-economy concept of blockchain? Explain how cryptographic hash function is applied to protect the integrity of blockchain transactions and to detect double-spending attack. State the property of the hash function that is relevant for each application.
In: Computer Science
Question is based on AWS Fortinet 7000
What is application ID in an application firewall and how is it used? What does a firewall signature mean?
In: Computer Science
Complete the code that inserts elements into a list. The list should always be in an ordered state.
-----------------------------------------------------------------------------------------------------------------
#include <stdio.h>
#include <stdlib.h>
/* list of nodes, each with a single integer */
struct element {
struct element *next;
int value;
};
/* protypes for functions defined after main */
struct element *elementalloc(void);
struct element *listinitialize();
struct element *insertelement(struct element *, int);
void printlist(struct element *);
/* main
* Creates an ordered list
* Elements added to the list must be inserted maintaining the
list
* in an ordered state
*/
int main() {
struct element *listhead = NULL;
listhead = listinitialize();
for (int i = 3; i < 100; i+=11){
listhead = insertnewelement(listhead, i);
}
printlist(listhead);
}
/* allocate memory for a new list element */
struct element *elementalloc(void) {
return (struct element *)malloc(sizeof(struct element));
}
/* simple list initialization function */
struct element *listinitialize() {
const int numbers[7] = {4, 9, 13, 18, 27, 49, 60};
struct element *newlist = NULL;
struct element *tail = NULL;
struct element *temp = NULL;
for (int i = 0; i < 7; i++) {
if (newlist == NULL) {
newlist = elementalloc();
newlist->next = NULL;
newlist->value = numbers[i];
tail = newlist;
} else {
temp = elementalloc();
temp->value = numbers[i];
temp->next = NULL;
tail->next = temp;
tail = tail->next;
}
}
return newlist;
}
/* function to insert elements into an ordered list */
struct element *insertnewelement(struct element *listhead, int x)
{
struct element *newelement;
newelement = elementalloc();
struct element *iter = listhead;
while( ) {
}
return listhead;
}
/* print the list and the respective memory locations in list
order */
void printlist(struct element *listhead)
{
while (listhead != NULL) {
printf("Memory: %p contains value: %d\n", listhead,
listhead->value);
listhead = listhead->next;
}
}
In: Computer Science