A purchasing clerk at corporate headquarters checks the system for open requests. Based on the system’s purchase requisitions, the purchasing clerk prepares each purchase order using the ERP system. A request may need to be split into more than one order as not all vendors supply every item. To obtain volume discounts, the clerk combines all requests for similar items into one purchase order. Each purchase order instructs the vendor to ship the inventory items directly to the appropriate stores. The computer process accesses the vendor and inventory master files and updates the purchase order transaction file. One copy of the purchase order is subsequently printed and forwarded to receiving. Each store has a receiving dock manned by warehouse workers. When a delivery comes in from a vendor, a warehouse worker inspects the items and manually creates a receiving report. The employee compares the receiving report to each purchase order for quantity or item differences. If there is a difference, the employee works with a store manager to resolve the discrepancy. The employee subsequently signs the receiving report and purchase order and keys the data into the system to update the receive goods transaction file. The signed receiving report and purchase order are then filed in the department numerically.
Required: Prepare a task-level document flowchart of the process described above using a computer graphics software program.
In: Computer Science
DIGITAL FORENSIC TOOKS:
1. USB FORENSIC
What value could this artifact have for investigation?
What kinds of information can you extract?
2. WINDOWS REGISTRY
What value could this artifact have for investigation?
What kinds of information can you extract?
What were they following originally designed for
What kind of forensic value could they provide in the in a digital investigation?
What are some of the limitations of each type of the artifact?
Link Files
Prefetch
ShimCache
Shellbags
Jump lists
VSS
Event Logs
In: Computer Science
// return index i such that A[i] = x, return -1 if x is not found
int mysearch(A, left, right, x) {
//add statements
}
(a) (10 pts) Given a sorted array A of size n, i.e. data has been sorted. Give a Divide and Conquer recursive “mysearch” algorithm which first tests the element at position n/4 for equality with some value x, and then possibly checks the element at position 3n/4. The result is either discovering x or reducing the set size to a fraction of the original.
(b) (5 points) Give the recurrence equation of mysearch algorithm.
(c) (5 points) Give the best-case and worst-case runtime complexity of mysearch algorithm? Explain your answer
(d) (5 points) What is the average-case runtime complexity of mysearch algorithm? Explain your answer. Show transcribed image text // return index i such that A[i] = x, return -1 if x is not found int mysearch(A, left, right, x) { //add statements }
In: Computer Science
What are the UNIX commands for each of these steps?
1. Copy all of the files in your Files directory to the Backup
directory.
2. Create an ITE130 directory in the Classes Directory
3. Move all the ITE 130 files from the backup directory to the
ITE130 directory.
4. Redirect echo step 19 to mark this step in the lab3.txt
file
5. Display all of the directories and sub-directories including
files so I can verify you completed all the
above steps correctly.
6. Repeat the above step and redirect the output to the file
lab3.txt without erasing what is already in it!
In: Computer Science
What are the UNIX commands for each of these steps?
1. Delete all the files in the Classes and Backup directories
only.
2. Redirect echo step 23 to mark this step in the lab3.txt
file
3. Display all of the directories and sub-directories including
files so I can verify you completed all the
steps correctly.
4. Repeat the above step and redirect the output to the file
lab3.txt without erasing what is already in it!
5. Redirect echo step 26 to mark this step in the lab3.txt file
In: Computer Science
Java Language
-Create a project and a class with a main method, TestCollectors.
-Add new class, Collector, which has an int instance variable collected, to keep track of how many of something they collected, another available, for how many of that thing exist, and a boolean completist, which is true if we want to collect every item available, or false if we don't care about having the complete set.
-Add a method addToCollection. In this method, add one to collected and report the new value. If after this we have collected all the available items, print a congratulatory message.
-Write a toString for this class as follows:
If there are more objects collected than are available, the result should be something like
an overflowing collection with 20 out of 15 items
if there are exactly the same number collected as available
a perfect collection with 15 out of 15 items
if there are fewer collected than are available, it depends whether we are being completist, so either
a sadly incomplete collection with 10 out of 15 items
or
a collection with 10 out of 15 items
[EC +10] Actually, if the number available is 0, no matter how many are collected, the result should be
not really a collection at all
adjust your toString accordingly
In your main, create several Collectors with different values and check that their toStrings come out correctly
[EC+20]
-Add a new (different from part A) class with a main. In main, ask the user for a value for each of three int variables x, y, and z.
-Using conditionals and nesting/else-if, print the three ints back out in decreasing order. (You can ignore the case where two numbers are the same)
So whether you were given 2, 1, 3, or 1,2,3 or 3,1,2, you'd print out 3, 2, 1.
You may add extra variables (i.e. small, med, and large) if you wish.
Make sure you test all possible orders for the three numbers.
In: Computer Science
What are some of the advantages of creating abstract classes? Are there any potential downsides to using parent classes and subclasses?
In: Computer Science
Cisco has proven that it is capable of moving data across fiber at 10 exabytes per second. But today’s limited technology prevents that in most cases. In almost every organization, the need for speed (bandwidth) has outgrown the growth in bandwidth. As more data gets processed and data variety expands, it becomes increasingly difficult to encounter efficient data transfers. Research and discuss or present information about Google’s data center project, and why it is important and ultimately need for big data. Make sure you consider at least the following questions: What exactly is Google’s data center project? What is the goal of the project? When was the project started? How many data centers are there in the US as of now? Worldwide? Do you think this project is a successful business model? Why?
In: Computer Science
Python coding: Write code for each method listed.
Input Text File Format:
username|Firstname|Lastname|password|accountnumber|balance jh123|Jane|Hudson|45678910|AB45|900
ah444|Allie|Hun|ah1234|HHYZ|1500
def build_dict():
'''
Returns a dictionary created from input file
where key is an existing username and
value is a list of fistname, lastname, account number and
balance.
'''
def write_to_file(users):
'''
Writes the updated user information to user list file
'''
In: Computer Science
Looking for an original answer. Not a copy and paste:
What are the major reasons that motivate networking? Consider some of the following:
In: Computer Science
Step by step in python
Write a program that will keep asking for a user input (until a blank line is entered) and will inform me whether what I entered was a valid number or not (without crashing).
In: Computer Science
A local credit union offers car loans to customers on a regular basis. Unfortunately, the credit union ends up repossessing an average of 20 cars per month. Once the cars are repossessed, the credit union sells them to individual buyers to recoup some of their losses.
The cars are placed in a secure parking lot; where potential buyers are invited to inspect the cars. To find out which cars are available each month, potential buyers subscribe to a mailing list. If the car looks good, the buyer puts in a bid to the credit union via email. The highest bid wins the car.
The credit union has been doing the paperwork for these transactions by hand, but now want a computerized system. Because you have knowledge in database development and Microsoft Access, you have been hired to create a database for the monthly auction.
Using the database design rules covered in class, list each rule. Then provide specific details when appropriate as you develop the auction database. When you are finished, I should be able to see the tables, fields, datatypes, primary keys, foreign keys, and relationships.
Consider the following.
- When the bank repossesses a car, an employee records the year, make and model of the car, the mileage, color and VIN number
- Potential customer information is also recorded; name, address, gender, phone number and email address.
- Finally, the bank needs to have some way of recording the bids that come in. Customers send in their bids on specific cars. The bids are recorded and the date is noted.
In: Computer Science
Assume you have the Pandas DataFrame data, with the following contents:
our_columns_name column_A column_B column_C column_D column_E
our_index_name
row_name_0 9 93 71 Hello 102
row_name_1 28 64 37 my 92
row_name_2 13 91 93 name 104
row_name_3 45 29 54 is 74
row_name_4 0 36 31 Jason 36
Each column has a dtype (data type). Which of the following could be set of dtypes for this DataFrame?
Hint 1: None of the numeric values shows a decimal point. (A float shows a decimal point, while an int does not. For example, 3. is a float, while 3 is an int.)
Hint 2: A column that has strings has a dtype of object, not str.
You can create the DataFrame above with this code:
data = pd.DataFrame({'column_A': {'row_name_0': 9,
'row_name_1': 28,
'row_name_2': 13,
'row_name_3': 45,
'row_name_4': 0},
'column_B': {'row_name_0': 93,
'row_name_1': 64,
'row_name_2': 91,
'row_name_3': 29,
'row_name_4': 36},
'column_C': {'row_name_0': 71,
'row_name_1': 37,
'row_name_2': 93,
'row_name_3': 54,
'row_name_4': 31},
'column_D': {'row_name_0': 'Hello',
'row_name_1': 'my',
'row_name_2': 'name',
'row_name_3': 'is',
'row_name_4': 'Jason'},
'column_E': {'row_name_0': 102,
'row_name_1': 92,
'row_name_2': 104,
'row_name_3': 74,
'row_name_4': 36}})
column_A int64
column_B float64
column_C float64
column_D object
column_E int64
column_A int64
column_B int32
column_C int32
column_D int64
column_E int64
column_A int64
column_B int64
column_C int64
column_D object
column_E int64
In: Computer Science
In the following Java program replace conditions in while loops to produce Christmas tree output.
import java.util.Scanner;
public class Tree
{
public static void main(String[] args)
{
int size;
Scanner scan = new Scanner(System.in);
System.out.print("Enter the size: ");
size = scan.nextInt();
int count = 0;
while (__________) //??? condition
{
int len = 0;
// print blanks
while (____________)//??? condition
{
System.out.print(' ');
len++;
}
len = 0;
// print stars
while (____________)//??? condition
{
System.out.print('*');
len++;
}
System.out.println(); // go to next line
count++;
}
}
}
Generated output for the size of 7:
Enter the size: 7
*
***
*****
*******
*********
***********
*************
In: Computer Science
a) consider a direct mapped cache with 10 blocks of 10 words each. Suppose main memory is 1000 words. For ewach memory address below say what cache block it maps to, what is the offset, and what is the tag.
934, 666, 348, 522
In: Computer Science