Questions
Python Write an interactive program for a board game called Parcheesi. Objective Develop an interface system...

Python

Write an interactive program for a board game called Parcheesi.

Objective

Develop an interface system using techniques and design patterns seen in class through a problem with realistic constraints.

Specs

  • Use just the basic rules. It can be consulted on Wikipedia
  • Make two implementations of user interface, one text-based and the other graphically. Use the case study "Dice Poker" in Chapter 12 as a reference
  • It should not include any other graphics system other than graphics.py
  • Use inheritance that allows to extend or overwrite appearance properties or behaviors for both the dice, the player's pieces and the board. See example in the "ColorDieView" class from chapter 12.
  • put the program output

In: Computer Science

I am just trying to make confNum static so all my classes can use. Can me...

I am just trying to make confNum static so all my classes can use. Can me help with that please.

.h

#include <stdio.h>

#include <iomanip>

#include <stdlib.h>

#include <time.h>

#include "Customer.hpp"

#include "Employee.hpp"

class BankAccount: public Customer

{

protected:

long AccountNumber;

double Balance;

int confNum;

public:

  

BankAccount(const string&, const string&, const string&, const string&,long , double, int);//constructor

  

void setAccountNumber(long);

long getAccountNumber()const;

  

void setBalance(double);

double getBalance()const;

  

void setConfNum(int);

int getConfNum();

  

virtual void deposit(double);

virtual void withdrawl(double);

virtual void writeCheck(double);

virtual void print();

  

  

};

#endif /* Bank_Account_hpp */

.cpp

#include "Bank Account.hpp"

#include "Teller.hpp"

double Teller::registerCash;//Static member

BankAccount::BankAccount(const string& first, const string& last, const string& social,const string& IDN,long AccNum, double balance,int num): Customer(first,last,social,AccNum,IDN)

{

setAccountNumber(AccNum);

setBalance(balance);

setConfNum(num);

}

void BankAccount::setAccountNumber(long AccNum)

{

if(AccNum>1000000000 && AccNum<9999999999)

{

AccountNumber=AccNum;

}

}

long BankAccount::getAccountNumber()const

{

return AccountNumber;

}

void BankAccount::setBalance(double balance)

{

if(balance>0)

{

Balance = balance;

}

}

double BankAccount:: getBalance() const

{

return Balance;

}

void BankAccount:: setConfNum(int num)

{

num=(num+1);

confNum=num;

}

int BankAccount::getConfNum()

{

return confNum;

  

}

void BankAccount::deposit(double amount)

{

Teller::registerCash=amount+Teller::registerCash;

Balance=Balance+amount;

cout<<"The amount of $"<<amount<<" was deposited to the Account #"<<getAccountNumber()<<"."<<endl;

   cout<<"The confirmation number: "<< getConfNum()<<"."<<endl<<endl;

}

void BankAccount:: withdrawl(double amount)

{

   if(Balance>= amount)

{

Teller::registerCash=Teller::registerCash-amount;

Balance=Balance-amount;

cout<<"The amount of $"<<amount<<" was withdrawn from the Account # "<<getAccountNumber()<<"."<<endl;

cout<<"The confirmation number: "<< getConfNum()<<"."<<endl<<endl;

}

else

{

cout<<"There is not enough money to withdrawl";

}

  

}

void BankAccount::writeCheck(double amount)

{

if(amount<=Balance)

{

cout<<endl<< "A check was written from the account and the ammount of the check is $"<<amount<<"."<<endl;

withdrawl(amount);

}

else

{

cout<<"There is not enough money available for writing this check"<<endl;

}

}

void BankAccount:: print()

{

cout<<"Bank Account#: "<<getAccountNumber()<<" Balance: $"<< setprecision(2) << fixed << getBalance()<<"."<<endl<<endl;

}

In: Computer Science

Use python to solve For f (x) = x ln(x), (1) use appropriate Lagrange interpolating polynomial...

Use python to solve

For f (x) = x ln(x), (1) use appropriate Lagrange interpolating polynomial of degree three to approximate f(8.4). Use the following data: f(8.1) = 16.94410, f(8.3) = 17.56492, f(8.6) = 18.50515, f(8.7) = 18.82091. (2) use appropriate Newton interpolation polynomial again to redo the work.

In: Computer Science

Justify the following statements a) Performance of the pipelined processor increases with increase in the number...

Justify
the
following statements
a) Performance
of
the pipelined
processor
increases
with
increase
in the
number of
stages
.
b) Forwarding
can
eliminate
all
possible
stalls
arises
out of
data dependencies
COA ( computer organization and architecture)

In: Computer Science

Instructions Write a program that prompts the user to enter 50 integers and stores them in...

Instructions

Write a program that prompts the user to enter 50 integers and stores them in an array. The program then determines and outputs which numbers in the array are sum of two other array elements. If an array element is the sum of two other array elements, then for this array element, the program should output all such pairs separated by a ';'.

An example of the program is shown below:

list[0] = 15 is the sum of: 
----------------------
list[1] = 25 is the sum of: list[5], list[14]; list[13], list[47]; list[46], list[47]; 
----------------------
list[2] = 23 is the sum of: list[0], list[33]; 
----------------------
list[3] = 65 is the sum of: list[4], list[32]; list[13], list[20]; list[20], list[46]; list[21], list[34]; list[32], list[38]; 
----------------------
list[4] = 34 is the sum of: list[0], list[14]; list[6], list[48]; 
----------------------
list[5] = 6 is the sum of: 
...

If no two elements can equal the value of an element, the line can remain empty, as shown above for list[0] and list[5].

C++

In: Computer Science

Suppose a department has determined that some users have gained unauthorized access to the computing system....

  1. Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $2,000,000 with 5% likelihood per year.

One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is is $50,000 with 80% effectiveness. Here is the summary of risk and control:

  • Cost to reconstruct correct data = $2,000,000 with 5% likelihood per year
  • Effectiveness of access control software: 80%
  • Cost of access control software: $50,000

Determine the expected annual costs due to loss and controls. Also, determine whether the costs outweigh the benefits of preventing or mitigating the risks. (5 points)

In: Computer Science

Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key...

  1. Suppose the following:
    • James’ public key = Kj, James’ private key = Kj-1
    • Randy’s public key = Kr, Randy’s private key = Kr-1
    • Each person’s public key is known to others; Each one’s private key is only known to the owner
  1. Explain how Randy can send a plaintext P to James secretly
  1. Explain how James can verify if a plaintext P is sent from Randy

  1. Explain how Randy can verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy.

In: Computer Science

Write and Compile a python script to solve the 4-queens problem using. The code should allow...

Write and Compile a python script to solve the 4-queens problem using. The code should allow for random starting, and for placed starting using numpy

"The 4-Queens Problem[1] consists in placing four queens on a 4 x 4 chessboard so that no two queens can capture each other. That is, no two queens are allowed to be placed on the same row, the same column or the same diagonal."

Display the iterations until the final solution

Arc consistency

In: Computer Science

Design an IP Addressing Scheme; please provide explanation with the answers Subnet the 192.168.1.0 network into...

Design an IP Addressing Scheme; please provide explanation with the answers

Subnet the 192.168.1.0 network into the appropriate number of subnets.

  1. What will be the subnet mask be for the subnetworks?
  2. How many usable host IP addresses are there per subnet?
  3. Fill in the following chart with the subnet information

Subnet Number

Subnet Address

1st Usable Host Address

Last Usable Host Address

Broadcast Address

In: Computer Science

How to fit an example of non-stationary data into GARCH model in R programming.

How to fit an example of non-stationary data into GARCH model in R programming.

In: Computer Science

Description of the Assignment: Write a Python program to create a deque and append few elements...

Description of the Assignment: Write a Python program to create a deque and append few elements to the left and right, then remove some elements from the left, right sides and reverse the deque.

Please use the following comments in your python script:

# *************************************************
# COP3375
# Student's full name ( <<< your name goes here)
# Week 9: Assignment 1
# *************************************************

# Write your code below:

# Create a deque

# Print a deque

# Append to the left

# Print a deque

# Append to the right

# Print a deque

# Remove from the right

# Print a deque

# Remove from the left

# Print a deque

# Reverse the dequeue

# Print a deque

Sample Output - Your output should look like something similar to the following:

deque(['Red', 'Green', 'White'])

Adding to the left:
deque(['Pink', 'Red', 'Green', 'White'])

Adding to the right:
deque(['Pink', 'Red', 'Green', 'White', 'Orange'])

Removing from the right:
deque(['Pink', 'Red', 'Green', 'White'])

Removing from the left:
deque(['Red', 'Green', 'White'])

Reversing the deque:
deque(['White', 'Green', 'Red'])

In: Computer Science

According to Cooper & Zmud (1990), in which stage is an IT application installed, and are...

  1. According to Cooper & Zmud (1990), in which stage is an IT application installed, and are organizational processes revised and developed?
  1. Initiation
  2. Adoption
  3. Adaption
  4. Acceptance
  5. Routinization
  1. According to Cooper & Zmud (1990), in which stage is increased organizational effectiveness obtained by using the IT application?
  1. Adoption
  2. Adaption
  3. Acceptance
  4. Routinization
  5. Infusion
  1. Deciding who and when to hire, creating a budget, setting up ways to measure the project outcomes occurs during this specific part of implementing an ERP system.
  1. Coding
  2. Implementation
  3. Planning
  4. Realization
  1. Setting the project mission and making important decisions about the scope and of the project occurs during this specific phase of implementing an ERP systems.
  1. Planning
  2. Coding
  3. Initiation
  4. Transition
  1. B hvjvjvj
  2. Implementing an ERP system on a module by module basis is an example of which of the following approaches.
  1. Blueprinting
  2. Button up approach
  3. Big Bang approach
  4. Phased approach
  1. In an ERP system implementation what does “process failure” mean?
  1. The system doesn’t meet design objectives
  2. The implementation was not on time and/or not within budget
  3. The system is not used as designed
  4. The return from the implementation is not what stockholders expected for
  1. What are some most important factors to consider when choosing an ERP
  1. Experience of the partner
  2. Security requirements of the system
  3. Restraining forces
  4. Extraterrestrial concerns
  1. A “Vanilla” ERP implementation is when the organization decides to implement the ERP software:
  1. “as-is”
  2. Quickly
  3. With B2B capabilities
  4. Without complex interfaces
  5. With special additions
  1. What are some of the critical success factors for ERP system implementation?
  1. Centralized approach to decision-making
  2. Rigid, sturdy organization
  3. Commitment from top management
  4. Defined business direction
  5. C & d
  1. What is/are correct about “configuration” in the realization phase?
  1. Configuration is a generic term that involves modifying the “plain vanilla” ERP system to support the specific business processes, structure and data requirements of a particular organization.
  2. The business blueprint is used for configuration tool
  3. Configuration involves the common set of combinations of all purpose ERP parameters for a company to operate on a day-to-day business basis
  4. Configurations do not tell the ERP system where to find the data for a process
  5. A & b
  1. Online analytical process (OLAP) is tool for the ________ module ERP
  1. E-Commerce
  2. Business intelligence (BI)
  3. Performance
  1. The complex network of relationships that organizations maintain with training partners to source, manufacture, and deliver products is:
  1. Integrated make-to stock
  2. Supply chain
  3. Channel assembly
  4. Vendor managed inventory
  1. A project team member who has a strong understanding of taxation in another country in which a new ERP system is scheduled to operate is a:
  1. Business process expert
  2. Technical expert
  3. Geographic business process expert
  4. Change management expert
  1. A project team member who has a strong understanding of taxation in another country in which a new ERP system is scheduled to operate is a:
  1. Business process expert
  2. Technical expert
  3. Geographic business process expert
  4. Change management expert

In: Computer Science

What is recurrence for worst case of QuickSort and what is the time complexity in Worst...

  1. What is recurrence for worst case of QuickSort and what is the time complexity in Worst case?

algorithms coures

In: Computer Science

Week 1 - Map and Critique a Control Flow. Initial Post Describe and map a sample...

Week 1 - Map and Critique a Control Flow.

Initial Post

Describe and map a sample of a control flow.

Group Discussion Critique the control flow of two other submissions.

This should include why it is either an effective or ineffective control flow.

If effective, describe why. Examples would be its thoroughness of structures, substantial interactions and flows, etc.

If ineffective, describe why. Examples would be missing steps, flow is incorrectly lined, etc.

In: Computer Science

Java Algorithmic Performance as you are aware, consists (mainly) of 2 dimensions: Time and Space. From...

Java

Algorithmic Performance as you are aware, consists (mainly) of 2 dimensions: Time and Space. From a technical perspective, discuss the following:

  • Regarding runtime, discuss algorithmic performance with respect to its runtime performance.  As you develop an algorithm, what must you also consider in terms of some of the trade-offs?

  

  • How would you go about estimating the time required for an algorithm’s efficiency (i.e. time to complete in terms of its potential complexity)? What techniques can you use? Give an example of how to measure it.  

In: Computer Science