Questions
A purchasing clerk at corporate headquarters checks the system for open requests. Based on the system’s...

A purchasing clerk at corporate headquarters checks the system for open requests. Based on the system’s purchase requisitions, the purchasing clerk prepares each purchase order using the ERP system. A request may need to be split into more than one order as not all vendors supply every item. To obtain volume discounts, the clerk combines all requests for similar items into one purchase order. Each purchase order instructs the vendor to ship the inventory items directly to the appropriate stores. The computer process accesses the vendor and inventory master files and updates the purchase order transaction file. One copy of the purchase order is subsequently printed and forwarded to receiving. Each store has a receiving dock manned by warehouse workers. When a delivery comes in from a vendor, a warehouse worker inspects the items and manually creates a receiving report. The employee compares the receiving report to each purchase order for quantity or item differences. If there is a difference, the employee works with a store manager to resolve the discrepancy. The employee subsequently signs the receiving report and purchase order and keys the data into the system to update the receive goods transaction file. The signed receiving report and purchase order are then filed in the department numerically.

Required: Prepare a task-level document flowchart of the process described above using a computer graphics software program.

In: Computer Science

DIGITAL FORENSIC TOOKS: 1. USB FORENSIC What value could this artifact have for investigation? What kinds...

DIGITAL FORENSIC TOOKS:

1. USB FORENSIC

What value could this artifact have for investigation?

What kinds of information can you extract?

2. WINDOWS REGISTRY

What value could this artifact have for investigation?

What kinds of information can you extract?

What were they following originally designed for

What kind of forensic value could they provide in the in a digital investigation?

What are some of the limitations of each type of the artifact?

Link Files

Prefetch

ShimCache

Shellbags

Jump lists

VSS

Event Logs

In: Computer Science

// return index i such that A[i] = x, return -1 if x is not found...

// return index i such that A[i] = x, return -1 if x is not found

int mysearch(A, left, right, x) {

//add statements

}

(a) (10 pts) Given a sorted array A of size n, i.e. data has been sorted. Give a Divide and Conquer recursive “mysearch” algorithm which first tests the element at position n/4 for equality with some value x, and then possibly checks the element at position 3n/4. The result is either discovering x or reducing the set size to a fraction of the original.

(b) (5 points) Give the recurrence equation of mysearch algorithm.

(c) (5 points) Give the best-case and worst-case runtime complexity of mysearch algorithm? Explain your answer

(d) (5 points) What is the average-case runtime complexity of mysearch algorithm? Explain your answer. Show transcribed image text // return index i such that A[i] = x, return -1 if x is not found int mysearch(A, left, right, x) { //add statements }

In: Computer Science

What are the UNIX commands for each of these steps? 1. Copy all of the files...

What are the UNIX commands for each of these steps?

1. Copy all of the files in your Files directory to the Backup directory.
2. Create an ITE130 directory in the Classes Directory
3. Move all the ITE 130 files from the backup directory to the ITE130 directory.
4. Redirect echo step 19 to mark this step in the lab3.txt file
5. Display all of the directories and sub-directories including files so I can verify you completed all the
above steps correctly.
6. Repeat the above step and redirect the output to the file lab3.txt without erasing what is already in it!

In: Computer Science

What are the UNIX commands for each of these steps? 1. Delete all the files in...

What are the UNIX commands for each of these steps?

1. Delete all the files in the Classes and Backup directories only.
2. Redirect echo step 23 to mark this step in the lab3.txt file
3. Display all of the directories and sub-directories including files so I can verify you completed all the
steps correctly.
4. Repeat the above step and redirect the output to the file lab3.txt without erasing what is already in it!
5. Redirect echo step 26 to mark this step in the lab3.txt file

In: Computer Science

Java Language -Create a project and a class with a main method, TestCollectors. -Add new class,...

Java Language

-Create a project and a class with a main method, TestCollectors.

-Add new class, Collector, which has an int instance variable collected, to keep track of how many of something they collected, another available, for how many of that thing exist, and a boolean completist, which is true if we want to collect every item available, or false if we don't care about having the complete set.

-Add a method addToCollection. In this method, add one to collected and report the new value. If after this we have collected all the available items, print a congratulatory message.

-Write a toString for this class as follows:

If there are more objects collected than are available, the result should be something like

an overflowing collection with 20 out of 15 items

if there are exactly the same number collected as available

a perfect collection with 15 out of 15 items

if there are fewer collected than are available, it depends whether we are being completist, so either

a sadly incomplete collection with 10 out of 15 items

or

a collection with 10 out of 15 items

[EC +10] Actually, if the number available is 0, no matter how many are collected, the result should be

not really a collection at all

adjust your toString accordingly

In your main, create several Collectors with different values and check that their toStrings come out correctly

[EC+20]

-Add a new (different from part A) class with a main. In main, ask the user for a value for each of three int variables x, y, and z.

-Using conditionals and nesting/else-if, print the three ints back out in decreasing order. (You can ignore the case where two numbers are the same)

So whether you were given 2, 1, 3, or 1,2,3 or 3,1,2, you'd print out 3, 2, 1.

You may add extra variables (i.e. small, med, and large) if you wish.

Make sure you test all possible orders for the three numbers.

In: Computer Science

What are some of the advantages of creating abstract classes? Are there any potential downsides to...

What are some of the advantages of creating abstract classes? Are there any potential downsides to using parent classes and subclasses?

In: Computer Science

Cisco has proven that it is capable of moving data across fiber at 10 exabytes per...

Cisco has proven that it is capable of moving data across fiber at 10 exabytes per second. But today’s limited technology prevents that in most cases. In almost every organization, the need for speed (bandwidth) has outgrown the growth in bandwidth. As more data gets processed and data variety expands, it becomes increasingly difficult to encounter efficient data transfers. Research and discuss or present information about Google’s data center project, and why it is important and ultimately need for big data. Make sure you consider at least the following questions:  What exactly is Google’s data center project?  What is the goal of the project?  When was the project started?  How many data centers are there in the US as of now? Worldwide?  Do you think this project is a successful business model? Why?

In: Computer Science

Python coding: Write code for each method listed. Input Text File Format: username|Firstname|Lastname|password|accountnumber|balance jh123|Jane|Hudson|45678910|AB45|900 ah444|Allie|Hun|ah1234|HHYZ|1500 def...

Python coding: Write code for each method listed.

Input Text File Format:

username|Firstname|Lastname|password|accountnumber|balance
jh123|Jane|Hudson|45678910|AB45|900

ah444|Allie|Hun|ah1234|HHYZ|1500

def build_dict():
'''
Returns a dictionary created from input file
where key is an existing username and
value is a list of fistname, lastname, account number and balance.
'''

  

def write_to_file(users):
'''
Writes the updated user information to user list file
'''

In: Computer Science

Looking for an original answer. Not a copy and paste: What are the major reasons that...

Looking for an original answer. Not a copy and paste:

What are the major reasons that motivate networking? Consider some of the following:

  • What are the real/hidden costs of networks?
  • How have networks changed the way we do business?
  • Are some business sectors more affected than others?

In: Computer Science

Step by step in python Write a program that will keep asking for a user input...

Step by step in python

Write a program that will keep asking for a user input (until a blank line is entered) and will inform me whether what I entered was a valid number or not (without crashing).

  • The program should use at least one try/except loop
  • The program should include at least two custom written functions (a main() function can count as one of the two)

In: Computer Science

A local credit union offers car loans to customers on a regular basis. Unfortunately, the credit...

A local credit union offers car loans to customers on a regular basis. Unfortunately, the credit union ends up repossessing an average of 20 cars per month. Once the cars are repossessed, the credit union sells them to individual buyers to recoup some of their losses.

The cars are placed in a secure parking lot; where potential buyers are invited to inspect the cars. To find out which cars are available each month, potential buyers subscribe to a mailing list. If the car looks good, the buyer puts in a bid to the credit union via email. The highest bid wins the car.

The credit union has been doing the paperwork for these transactions by hand, but now want a computerized system. Because you have knowledge in database development and Microsoft Access, you have been hired to create a database for the monthly auction.

Using the database design rules covered in class, list each rule. Then provide specific details when appropriate as you develop the auction database. When you are finished, I should be able to see the tables, fields, datatypes, primary keys, foreign keys, and relationships.

Consider the following.

- When the bank repossesses a car, an employee records the year, make and model of the car, the mileage, color and VIN number

- Potential customer information is also recorded; name, address, gender, phone number and email address.

- Finally, the bank needs to have some way of recording the bids that come in. Customers send in their bids on specific cars. The bids are recorded and the date is noted.

In: Computer Science

Assume you have the Pandas DataFrame data, with the following contents: our_columns_name column_A column_B column_C column_D...

Assume you have the Pandas DataFrame data, with the following contents:

our_columns_name column_A column_B column_C column_D column_E

our_index_name                                                   

row_name_0               9        93        71    Hello       102

row_name_1              28        64        37       my        92

row_name_2              13        91        93     name       104

row_name_3              45        29        54       is        74

row_name_4               0        36        31    Jason        36

Each column has a dtype (data type). Which of the following could be set of dtypes for this DataFrame?

Hint 1: None of the numeric values shows a decimal point. (A float shows a decimal point, while an int does not. For example, 3. is a float, while 3 is an int.)

Hint 2: A column that has strings has a dtype of object, not str.

You can create the DataFrame above with this code:

data = pd.DataFrame({'column_A': {'row_name_0': 9,

'row_name_1': 28,

'row_name_2': 13,

'row_name_3': 45,

'row_name_4': 0},

'column_B': {'row_name_0': 93,

'row_name_1': 64,

'row_name_2': 91,

'row_name_3': 29,

'row_name_4': 36},

'column_C': {'row_name_0': 71,

'row_name_1': 37,

'row_name_2': 93,

'row_name_3': 54,

'row_name_4': 31},

'column_D': {'row_name_0': 'Hello',

'row_name_1': 'my',

'row_name_2': 'name',

'row_name_3': 'is',

'row_name_4': 'Jason'},

'column_E': {'row_name_0': 102,

'row_name_1': 92,

'row_name_2': 104,

'row_name_3': 74,

'row_name_4': 36}})

  • A.

    column_A     int64

    column_B   float64

    column_C   float64

    column_D    object

    column_E     int64

  • B.

    column_A     int64

    column_B     int32

    column_C     int32

    column_D    int64

    column_E     int64

  • C.

    column_A     int64

    column_B     int64

    column_C     int64

    column_D    object

    column_E     int64

In: Computer Science

In the following Java program replace conditions in while loops to produce Christmas tree output. import...

In the following Java program replace conditions in while loops to produce Christmas tree output.

import java.util.Scanner;

public class Tree

{

    public static void main(String[] args)

    {

        int size;

        Scanner scan = new Scanner(System.in);

        System.out.print("Enter the size: ");

        size = scan.nextInt();

        int count = 0;

        while (__________) //??? condition

        {

            int len = 0;

            // print blanks

            while (____________)//??? condition

            {

                System.out.print(' ');

                len++;

            }

            len = 0;

            // print stars

            while (____________)//??? condition

            {

                System.out.print('*');

                len++;

            }

            System.out.println(); // go to next line

            count++;

        }

    }

}

Generated output for the size of 7:

Enter the size: 7

      *

     ***

    *****

   *******

*********

***********

*************

In: Computer Science

a) consider a direct mapped cache with 10 blocks of 10 words each. Suppose main memory...

a) consider a direct mapped cache with 10 blocks of 10 words each. Suppose main memory is 1000 words. For ewach memory address below say what cache block it maps to, what is the offset, and what is the tag.

934, 666, 348, 522

In: Computer Science