Questions
USE C++ for following problem and also use create full program that takes input from user...

USE C++ for following problem and also use create full program that takes input from user also do not use loops only recursion and try to keep program simple

A palindrome is any word, phrase, or sentence that reads the same forwards or backwards. Here are some palindromes: Level Civic Pot top A man a plan a canal Panama Write a boolean function that determines if a string argument is a palindrome. The function should return true if the argument reads the same forwards and backwards. Your function should ignore spaces and be case-insensitive. Assume the input is just letters and spaces.

In: Computer Science

difference between COOL lamguage and assembly language arrays ?

difference between COOL lamguage and assembly language arrays ?

In: Computer Science

we list a multiple hot technologies related to distributed systems/computing. Students need to write a paragraph...

we list a multiple hot technologies related to distributed systems/computing. Students need to write a paragraph on ALL the below topics  

  • What is Client Server model?

  • Compare and contrast centralized and distributed computing.  

  • Explain Servers, Clients, Thread, Code Migration, Software agents for the same. What is a process? Explain the various states of a process through state transition diagram.

  • Explain the layered protocols. Compare and contrast the OSI and TCP/IP model. What is spontaneous networking?

  • Compare and contrast some of the network and distributed simulation tools.

  • Explain the trends in large scale distributed systems simulation tools.

In: Computer Science

4. Identify and discuss a strategy that could be used to manage contractors during outsourcing of...

4. Identify and discuss a strategy that could be used to manage contractors during outsourcing of IT services [25 Marks]

In: Computer Science

c++ code: prompt user to enter a number then add loop that checks a list of...

c++ code: prompt user to enter a number then add loop that checks a list of numbers then display numbers that are higher or equal to the user's input.

In: Computer Science

Write a C++ program that reads in a table of numbers and finds out the average...

Write a C++ program that reads in a table of numbers and finds out the average of each row and column. This program should first take two numbers as number of rows and columns as input from the user

In: Computer Science

Describe how you would develop object-oriented features of Java for the Quiz program developed in the...

Describe how you would develop object-oriented features of Java for the Quiz program developed in the Programming Assignments. In particular, describe how the program could use each of the following: class variables, instance variables, inheritance, polymorphism, abstract classes, "this", "super", interfaces, and event listeners.

In: Computer Science

Write a template class that implements an extended queue. Ex: ExtendedQueue int_queue; ExtendedQueue double_queue; ExtendedQueue char_queue;...

Write a template class that implements an extended queue. Ex: ExtendedQueue int_queue; ExtendedQueue double_queue; ExtendedQueue char_queue; –Write a program to test this template class. you have to use inheritance so you will create classes . one for node one for queue one for extended queue inherited for queue.

In: Computer Science

Huffman Coding Huffman coding is a lossless data compression algorithm. The idea is to assign variable-...

Huffman Coding

Huffman coding is a lossless data compression algorithm. The idea is to assign variable- length codes to input characters; lengths of the assigned codes are based on the frequencies of corresponding characters. The most frequent character gets the smallest code and the least frequent character gets the largest code.

The variable-length codes assigned to input characters are Prefix Codes, means the codes (bit sequences) are assigned in such a way that the code assigned to one character is not prefix of code assigned to any other character. This is how Huffman Coding makes sure that there is no ambiguity when decoding the generated bit stream.

In this project, you will be using a priority queue and a binary tree of your design to implement a file compression/uncompression algorithm called "Huffman Coding".
Your program will read a text file and compress it using your implementation of the Huffman coding algorithm found in the explanation. The compressed text will be written to a file. That compressed file will be then be read back by your program and uncompressed. The uncompressed text will then be written to a third file. The uncompressed text file should of course match the original text file.

Summary of Processing

  • Read the specified file and count the frequency of all characters in the file.

  • Create the Huffman coding tree based on the frequencies.

  • Create the table of encodings for each character from the Huffman coding tree.

  • Encode the file and output the encoded/compressed file.

  • Read the encoded/compressed file you just created, decode it and output the

    decoded file.

In: Computer Science

Do you think social network platforms companies (twitter, facebook and etc) should monitor, control, and censor...

Do you think social network platforms companies (twitter, facebook and etc) should monitor, control, and censor hate speech? Please explain the issue and offer solutions.  

In: Computer Science

Design and UI Patterns Object models and relational models do not always work very well together....

Design and UI Patterns

Object models and relational models do not always work very well together. Databases represent data in a tabular form, whereas object-oriented languages represent data based on a graph of objects. There are a few common mismatch problems that can exist with association, aggregation, inheritance, and composition, and data navigation.

  • Given these potential problems, how you would use object-relational mapping to address at least two of these problems?

In: Computer Science

Reg # 14 X 9 A1 240 B1 380 C1 300 D1 150 E1 105 A2...

Reg #

14

X

9

A1

240

B1

380

C1

300

D1

150

E1

105

A2

340

B2

260

C2

400

D2

190

E2

195

1

Write a MIPS Assembly program function to calculate the factorial of an input number. Analyze the program for the number X (calculated above) and compute the Execution time in a pipelined MIPS at 2.4GHz.

MIPS Assembly

In: Computer Science

1) Write an INSERT statement that adds this row to the Invoices table: i nvoice_id: The...

1) Write an INSERT statement that adds this row to the Invoices table: i

nvoice_id: The next automatically generated ID

vendor_id : 32

invoice_number: AX-014-027

invoice_date: 8/1/2014

invoice_total: $434.58

payment_total: $0.0

credit_total: $0.0

terms_id: 2

invoice_due_date: 8/31/2014

payment_date: null

Write this statement without using a column list.: Use DEFAULT to insert the automatically generated ID.

2) Write an INSERT statement that adds these rows to the Invoice_line_Items table:

invoice_sequence: 1 2

account_number: 160 527

line_item_amount: $180.23 $254.35

line_item_description: Hard drive Exchange Server update

Set the invoice_id of these two rows to the invoice ID that was generated by MySQL for the invoice you added in question 1

3) Write an UPDATE statement that modifies the invoice you added in question 1. This statement should change the credit_total column so its 10% of the invoice_total column, and it should change the payment_total column so that the sum of the payment_total and credit_total are equal to the invoice_total column.

4) Write a DELETE statement that deletes the row that you added to the Invoices table in question 1. When you execute this statement, it will produce an error since the invoice has related rows in the Invoice_Line_Items table. To fix that, precede the DELETE statement with another DELETE statement that deletes the line items for this invoice. (Remember that to code two or more statements in a script, you must end each statement with a semicolon.

In: Computer Science

Suppose your business had an e-commerce web site where it sold goods and accepted credit card...

Suppose your business had an e-commerce web site where it sold goods and accepted credit card payments. Discuss the major security threats to this web site and their potential impact. What can be done to minimize these threats?

In: Computer Science

Asks a user to enter n values, then calculates and returns the minimum, maximum, total, and...

Asks a user to enter n values, then calculates and returns
the minimum, maximum, total, and average of those values.
Use: minimum, maximum, total, average = statistics(n)
-------------------------------------------------------
Parameters:
n - number of values to process (int > 0)
Returns:
minimum - smallest of n values (float)
maximum - largest of n values (float)
total - total of n values (float)
average - average of n values (float)
---------------------------------------

In: Computer Science