Questions
You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

Under this section, include the following:

  • Select an architecture Design(1 mark)
  • Provide the type of the Using Data Storage Design(1 mark)

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

  • Project identification (Project Title, Project Description precisely stating the Core Problem to be solved, Primary Customer and Stakeholders)(1 mark)
  • Feasibility studies (Technical Feasibility, Economic Feasibility and Organizational Feasibility)(1 mark)
  • Adopt an SDLC development methodology(1 mark)
  • List the Tasks to be Performed and Develop a Work Plan (Gantt Chart) (1 mark)

In: Computer Science

Read Chapter One of David Brin's The Transparent Society. What is the effective difference between Brin's...

Read Chapter One of David Brin's The Transparent Society.

  1. What is the effective difference between Brin's "City Number One" and "City Number Two"? Think in terms of civil liberties. A description of how these two cities work is not enough, you must tell me about civil liberties.

In: Computer Science

36. A junior Linux administrator is performing version control on a Git repository. The administrator is...

36. A junior Linux administrator is performing version control on a Git repository. The administrator is given a list of tasks to complete:
• List the currently installed Git release.
• Show the status reporting on the clone.
Which of the following commands would allow the administrator to complete these tasks? (Select TWO).
A. git clone --progress
B. git clone --recursive
C. git --help
D. git clone --dissociate
E. git --version
F. git clone –shared


37. A company wants to provide internal identity verification services for networked devices. Which of the following should be installed?
A. SSH
B. VPN
C. CA
D. DCHP
E. DNS


38. A system administrator wants to disable the Linux Watchdog Timer Driver for security purposes. Which of the following will accomplish this task?
A. Add blacklist watchdog to the /etc/modprobe.d/blacklist file.
B. Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.
C. Remove the watchdog=1 from the /usr/modules/watchdog.conf file.
D. Add watchdog=0 to the /etc/modprobe.conf file.


39. Ann, a user has created a new directory and noticed that permissions on the new directory are as follows:
drwx------. 1 ann ann 0 Jun 11 08:20 work
Which of the following should the administrator do to restore default permissions for newly created directories?
A. Change unmask value in /etc/profile.
B. Run chmod command to update permissions.
C. Modify directory ownership to ann:ann with chown.
D. Execute chattr command to restore default access.


40. A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?
A. /etc/services
B. /etc/issue
C. /etc/hosts
D. /etc/mood

In: Computer Science

____________(str) is the function to run in the shell to find out details about how to...

____________(str) is the function to run in the shell to find out details about how to use str() and the type of data it accepts and returns.

In: Computer Science

Question 6 Advise the company on where to place the shared printer in the offices that...

Question 6

Advise the company on where to place the shared printer in the offices that they have retained from their lease agreement. What are the possible problems that can occur if a printer is not set up in the correct space and not managed correctly?

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

, you are required to determine the main business requirements; consequently, the following must be included:

  • List the functional and nonfunctional business requirements for the system. (1 mark)
  • Create Use Cases(1 mark)
  • Model Processes (Data Flow Diagramming)(1 mark)
  • Model data (ER modeling)(1 mark)

In: Computer Science

What factors should you consider before determining whether your presentation should be posted online? Is your...

What factors should you consider before determining whether your presentation should be posted online? Is your material copyrighted? Can you prevent others from using your material without authorization?

In: Computer Science

Write and Compile a python script to solve the 4-queens problem using Forward Checking algorithm ....

Write and Compile a python script to solve the 4-queens problem using Forward Checking algorithm . The code should allow for random starting, and for placed starting. Random Starting means randomly place a queen position on the chessboard. Placed Starting means asked for the user input to place a queen position on the chessboard. Display the iterations until the final solution

"The 4-Queens Problem[1] consists in placing four queens on a 4 x 4 chessboard so that no two queens can capture each other. That is, no two queens are allowed to be placed on the same row, the same column or the same diagonal."

Display the output of the python Script

In: Computer Science

Blurred Sequence Jojo as a treasure hunter has finally found the ancient treasure box. The treasure...

Blurred Sequence

Jojo as a treasure hunter has finally found the ancient treasure box. The treasure box has three layers of lock. Each layer of lock contains clues to unlock the lock.

The first layer of lock gives a sequence of numbers. But as we know that the treasure box is as old as the dinosaurs, the sequence is blurred as it goes to the end. Jojo can only read the first seven numbers of the sequence which is: 1 , 1 , 2 , 3 , 5 , 8 , 13, ... and the rest are blurred.

After a days of researching, Jojo found out that the sequence is a fibonacci sequence which each number is the sum of the two preceding ones. Formally, fibonacci sequence are written as Fi as the i-th fibonacci number and its property is Fi = Fi-1 + Fi-2 where i > 2 and in this case, the base cases are F1 = 1 and F2 = 1.

And it’s not even the riddle yet. The lock gives Jojo two numbers L and R and asks Jojo to get the sum of its digits from L-th fibonacci to R-th fibonacci inclusive. As a good friend of Jojo, help Jojo to solve the first layer lock riddle.

Format Input:

There are T testcases. Each testcase contains two integers L and R which indicates the numbers that the lock gives.

Format Output:

Output T line with format “Case # X: ”, where X indicates the testcase number and then followed by the answer of the riddle.

Constraints

• 1 ≤ T ≤ 100

• 1 ≤ L ≤ R ≤ 64

Sample Input (standard input):

5

1 4

3 5

6 7

9 9

3 11

Sample Output (standard output):

Case #1: 7

Case #2: 10

Case #3: 12

Case #4: 7

Case #5: 59

NOTE: USE C LANGUAGE, DONT USE FUNCTION(RESULT,RETURN),VOID,RECURSIVE, USE BASIC CODE AND CODE IT UNDER int main (){, constraint must be the same

In: Computer Science

Question 3 Coding of a video Answer this question using your chosen YouTube video. a) For...


Question 3 Coding of a video
Answer this question using your chosen YouTube video.
a) For the chosen video, is there a lot of temporal redundancy between the frames?
In your opinion, does the temporal redundancy in this video make it possible to obtain a
very high compression? Explain assuming compression with MPEG, as seen in
the lesson.
b) Is the chosen video encoded in progressive format? Explain your answer.
c) (1 point) Does the video contain block effects? Explain why there is presence or
absence of block effects.

In: Computer Science

Write a Java program to get the difference between the largest and smallest values in a...

Write a Java program to get the difference between the largest and smallest values in a user inputed array of integers. The length of the array must be 1 and above

In: Computer Science

Determine whether each of these sets is countable or uncountable. for those that are countably infinite....

Determine whether each of these sets is countable or uncountable. for those that are countably infinite. exhibit a one-on-one correspondence between the set of positive integers and that set.

In: Computer Science

Question 4 Audio coding Answer this question using your chosen YouTube video. For the chosen video,...


Question 4 Audio coding
Answer this question using your chosen YouTube video.
For the chosen video, could the sound be encoded efficiently with the predictive encoding method
linear (LPC)? Explain your answer.

In: Computer Science

Write a MIPS Assembly program function to calculate the factorial of an input number. Analyze the...

Write a MIPS Assembly program function to calculate the factorial of an input number. Analyze the program for the value 10 and compute the Execution time in a MIPS processor at 2.4GHz. The CPI is 1.

In: Computer Science