What are three different types of SIEM's on the market today? Security information and event management (SIEM) is a subsection within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
In: Computer Science
Extract errors from the following codes & then obtain
weather they are Syntax
Error or Run Time Error? [15 pts]
a) [2 pts]
1 Dim number1 As Integer
2 Dim number2 As Integer
3 Dim result As Integer
4
5 number1 = (4 * 6 ^ 4) / (10 Mod 4 – 2)
6 number2 = (16 \ 3) ^ 2 * 6 + 1
7 result = number1 - number2
Line# / Error Description /Error Type (Syntax or Runtime) /Correction
b) [4pts]
1 Dim number1 As Double
2 Dim number2 Double
3 Dim result As Char
4
5 number1 = (4 ^ 2)
6 number2 = (16 \ 2)
7 result = number1 \ number2
Line# /Error Description /Error Type (Syntax or Runtime) /Correction
In: Computer Science
Question 4 a) Why do you think bottom-up approach is useful in gathering inputs for a new project? CR b) How would you go about sequencing activities of your project? AP 3 c) How significant is it to inculcate quality management into projects? CR (Total marks: 25)
In: Computer Science
A random variable (RV), x is distributed with a pdf as follows:
fX(x) = [C × x × (1 – x)] 0 ≤ x ≤ a (C and a are constants)
= 0 otherwise
Hence, determine the following: (i) C; (ii) cumulative probability of x in the range, [(u × a) ≤ x ≤ (v × a)]; where u and v are fractions; (iii) E[x]; (iv) second moment of x ; and, (v) standard deviation of x. Assume: a = 1, u = 0.5 and v = 0.75
Hence, choose the correct set of answers in the multiple-choices listed:
Multiple-choices on the answer-set
Choices |
(i) C |
(ii) cdf [ua ≤ x ≤ va] |
(iii) E[x] |
(iv) m2 |
(v) sigma(x) |
1 |
1.5 |
0.4458 |
0.75 |
0.35 |
0.250 |
2 |
1.6 |
1.3435 |
0.60 |
0.55 |
0.254 |
3 |
1.0 |
0.3438 |
0.50 |
0.30 |
0.224 |
4 |
1.0 |
0.3466 |
0.51 |
0.32 |
0.124 |
5 |
0.8 |
0.1458 |
0.45 |
0.22 |
0.324 |
In: Computer Science
The TOPCAR taxi company is developing a new computer system to be used to support taxi booking and corporate client credit accounts. This computer system aims to automate some manual processes and cut down on labour costs as TOPCAR has many customers from large corporate companies, e.g. CEO, and managers often need taxi trips to the airport. The following describes the activities that must be processed by the computer system:
A client company must first register and open a credit account with TOPCAR at TOPCAR’s website, in which case certain credit checks are made such as checking credit history of client company’s debt level. If the client company has no bad debt history, a credit account for the client company is set up.
At least 24 hours after successful account registration, authorized persons from such client company can request a taxi booking form TOPCAR’s website. When this happens, the availability of a taxi at the requested date and time is checked, as is the credit status of the client company checked. (Note that credit status in finance means a measure of a lender’s willingness to lend money to a particular person or organization, depending on their ability to repay).
If these two checks are successful, a booking is made, and a written confirmation is sent via SMS and emailed to client company. After the customer from the client company has used the taxi, the driver sends in a record of the work, including the cost, and this is added to client company’s account. (Note that driver is an outsourced worker from TOPCAR’s point of view.) At the end of each month, taxi bills are sent via SMS and emailed to client companies for settlement.
From the above description, draw a data flow diagram showing the flow of input information (and/or data) and output information (and/or data) to and from processes and database stores within this computer system and any external environmental elements that interact with this computer system. In this diagram, you must identify the following:
in (a) (5.5 marks)
(Hint: there are two environmental elements that interact with this computer system, and six main processes in this computer system)
In: Computer Science
Suppose as a language designer, you plan to implement a feature called “output-only” parameters. The expected semantics is that all output-only parameters are uninitialized when the callee starts execution; they can be used (both read and write) as other kinds of parameters within the callee; finally, the corresponding actual parameter in the caller is updated to the final values of the “output-only” parameters. Briefly describe one possible implementation of such “output-only” parameters
In: Computer Science
Create an array of ten strings. Write a program to join and split these strings. Feel free to use any whitespace character. Explain how the program works, when to use Python arrays, and when to use tuples, dictionaries, and sets. Explain how the program works and how it can be utilized to support an organization’s requirements.
In: Computer Science
Using python pls!!!!! Write a recursive function gcd(m,n) that returns the greatest common divisor of a pair of numbers. The gcd of m and n is the largest number that divides both m and n. If one of the numbers is 0, then the gcd is the other number. If m is greater than or equal to n, then the gcd of m and n is the same as the gcd of n and m-n. If n is greater than m, then the gcd is the same as the gcd of m and n-m.
Pls endevour to use recursive approach to this
In: Computer Science
C++ Visual Studio 2019
Part A :
Program Description:
Write a program to generate a report based on input received from a text file. Suppose the input text file student_grades.txt contains the student’s Last name , First name, SSN, Test1, Test2, Test3 and Test4. (25%)
i.e.
Alfalfa Aloysius 123-45-6789 40.0 90.0 100.0 83.0
Generate the output Report File student_final.txt in the following format :
LastName FirstName SSN Test1 Test2 Test3 Test4 Average FinalGrade
i.e.
Alfalfa Aloysius 123-45-6789 40.0 90.0 100.0 83.0 78.25 .0 C+
The program must be written to use the enum letterGrade :
enum letterGrade {A_PLUS,A, A_MINUS,B_PLUS,B, B_MINUS, C_PLUS,C, C_MINUS,D_PLUS,D, D_MINUS,F } ;
Use the following function prototype for deriving letter grade :
letterGrade deriveGrade(double average) ;
The average is calculated as follows : (test1 + test2 + test3 + test4)/4.0
The function deriveGrade should derive the letterGrade of the student based on the following grading scale :
Letter Grade |
Percentage |
GPA |
A+ |
97%+ |
4.33/4.00 or 4.00/4.00 |
A |
93%-96% |
4.00/4.00 |
A- |
90%-92% |
3.67/4.00 |
B+ |
87%-89% |
3.33/4.00 |
B |
83%-86% |
3.00/4.00 |
B- |
80%-82% |
2.67/4.00 |
C+ |
77%-79% |
2.33/4.00 |
C |
73%-76% |
2.00/4.00 |
C- |
70%-72% |
1.67/4.00 |
D+ |
67%-69% |
1.33/4.00 |
D |
63%-66% |
1.00/4.00 |
D- |
60%-62% |
0.67/4.00 |
F |
0%-59% |
0.00/4.00 |
Also provide the following function :
string convertToText(letterGrade grade) ; //This function converts a letterGrade type to a string type.
Requirement :
Input text file student_grades.txt
Alfalfa Aloysius 123-45-6789 90.0 100.0 83.0 49.0 Alfred Francis 123-12-1234 97.0 96.0 97.0 48.0 Gerty Gramma 567-89-0123 80.0 60.0 40.0 44.0 Android Alexis 087-65-4321 23.0 36.0 45.0 47.0 Bumpkin Fred 456-78-9012 78.0 88.0 77.0 45.0 Rubble Betty 234-56-7890 90.0 80.0 90.0 46.0 Noshow Cecil 345-67-8901 81.0 65.0 49.0 43.0 Buff Bif 632-79-9939 20.0 30.0 40.0 50.0 Airpump Andrew 223-45-6789 75.0 90.0 100.0 83.0 Backus Jim 143-12-1234 85.0 97.0 96.0 97.0 Carnivore Art 565-89-0123 71.0 80.0 60.0 40.0 Dandy Jim 087-75-4321 92.0 23.0 36.0 45.0 Elephant Ima 456-71-9012 19.0 78.0 88.0 77.0 Franklin Benny 234-56-2890 50.0 90.0 80.0 90.0 George Boy 345-67-3901 40.0 11.0 91.0 84.0 Heffalump Harvey 632-79-9439 30.0 91.0 20.0 30.0
In: Computer Science
make a C++ program to calculate total water bill for a customer. The water company charges $250.00 for <=1000 gallons of water. Over 1000 gallons the company charges .99 / gallons
The program displays
Gallons of water used = xx
Exatra payment= xx
Total payment = xx
In: Computer Science
Write a program that does the following in order:
1. Ask user to enter a name
2. Ask the user to enter five numbers “amount1”, “amount2”, “amount3”, “amount4”, “amount5”
3. Calculate the sum of the numbers “amount1”, “amount2”, “amount3”, “amount4”, “amount5”
4. If the sum is greater than 0, print out the sum
5. If the sum is equal to zero, print out “Your account balance is zero”
6. If the sum is less than 0, print out “Your account is overdrawn” and the “negative amount”
7. Round all print values to 1 decimal place
Round your sum output to 2 decimal places
In: Computer Science
make a C++ program to calculate discount for a customer.
If customer code equals 1 discount = 5%
Any other code discount = 2%
Display the discount
In: Computer Science
Question 3. A string p = p1…pn is a palindrome if it spells the same string when read backward, that is pi = pn+1 –i for 1≤ i ≤ n. Design an efficient algorithm for finding all palindromes (of all lengths) in a text. (The pseudo code the algorithm should be provided) (40 points)
In: Computer Science
The stages of the classical waterfall model for software development consist of requirements, design, implementation, testing, deployment, and maintenance. Why does picturing the development of software to run on mobile applications, business-based systems, or Internet environments help to ensure the success of the development effort? What might happen otherwise? What is the professionalism with respect to software engineering? What do you do, as a software engineer involved in a software systems development project, to ensure that the product is better because of your participation in the development effort?
Answer any 3 questions
In: Computer Science
Please write in Java and have two methods: the main method and the reverse word
Write a method that reads a line and reverses the words in the line (not the characters) using a stack. For example, given the following input:
The quick brown fox jumps over the lazy dog
you should get the following output:
dog lazy the over jumps fox brown quick The
Then create a main method to prompt the user to enter a line of words to be reversed using the previous reverse method.
In: Computer Science