Questions
The purpose of this lab is to become familiar with searching, inserting and deleting elements in...

The purpose of this lab is to become familiar with searching, inserting and deleting elements in a linked list.using java  

public boolean contains(String name) // returns true if provided name exists in the list, otherwise returns false public void add(String name) // adds name to the list in its proper lexographical (alphabetical) ordering public void delete(String name) // removes name from list

In: Computer Science

Write a C++ code to insert the following numbers in two Linked Lists. Insert numbers of...

Write a C++ code to insert the following numbers in two Linked Lists. Insert numbers of first list in Linked List#1, and numbers of second list in Linked List#2. Do not insert both lists in a single Linked List.

List#1.

5, 78, 45, 23, 11, 89, 10, 78, 6, 99, 876, 5, 67, 13

List#2.

5, 89, 688, 52, 557, 953, 5, 7, 55, 35, 89, 99, 99, 6, 557, 89, 5, 99, 6, 2, 45, 12, 7, 6, 94, 93, 99, 67

After inserting numbers in linked lists. Write a function to print only those numbers that appear in List#1 and more than 2 times in List#2.


For example, the number “5” appears in List#1 and 3 times in List#2. So your code should print “5” and similar other numbers.


In: Computer Science

C# Programming Explain in your own words how using the control selection ( decision) structure is...

C# Programming

Explain in your own words how using the control selection ( decision) structure is useful in programming in general. Provide Example

In: Computer Science

Task 1: HTML and CSS Create a website using HTML5 and CSS3 only. Please no JavaScript...

Task 1: HTML and CSS

Create a website using HTML5 and CSS3 only. Please no JavaScript or Bootstrap. Website theme can be anything you want: a country, a town, a place, a hobby, people (yourself, your family...), pets, flowers, food, or anything that you find interesting or useful. It may be about real people/places/things or fictitious.

Part 1: Content (HTML)

After you decide the theme of your website, create HTML pages with the content you want to present. Remember to separate content from presentation. The content is placed in the HTML files, and the layout and style will be defined using CSS (see part 2). Your website must include (at least):

  • 3 html pages:
    • index.html: this is the landing page (must be named index.html). The landing page is the first page a visitor will see when visiting your website.
    • another html page (any name)
    • yet another html page (any name)
  • a typical layout using semantic tags (header, nav, footer, article...)
  • page titles for each html page (titles show on the title bar/tabs)
  • different size headings
  • images:
    • at least 5 images in one html page,
    • the other pages may have any number of images (or none).
    • make sure all image paths are relative (not absolute)
  • internal links:
    • links from index.html to the other html pages you created
    • links from all the other pages back to index.html
    • make sure all internal links are relative links (not absolute)
  • external links:
    • at least two links to external websites (pages that you did not create).
    • external links should open in a new tab/window.
  • a list (ordered or unordered)
  • a table (with some relevant data)
  • your copyright info at the footer (with the © symbol).
  • classes and id's as needed (for styling with css)

Do not forget to make your pages accessible. You should double-check your code to make sure you are not missing closing tags, etc. and test it using different browsers. Focus on making your pages syntactically and semantically correct.

Part 2: Style (CSS)

You'll create an external stylesheet (css) to style the html pages you created in part 1. Name this file main.css.

All html pages should link to the same main.css file. You must use a variety of selectors and properties presented in chapters 4 and 5, including:

  • font family, size, color, background color of text and headings, font color for links (make sure visited and unvisited links are displayed in different colors)
  • positioning elements
  • special effects or animations
  • a navigation menu

Part 3: An alternate style (CSS)

You'll create a different CSS file, with different style and layout rules, to make your HTML pages look completely different (without making any changes to the HTML files).

  • Name this css file alternate.css.
  • Do not create new html files. You may change the name of the css linked in the html <head> section back and forth (while testing).
  • Before submitting, make sure all html files link to main.css (we'll change it when testing).

In: Computer Science

Your team has been contacted by Ms. Asma to develop a software system for the library...

Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library loan system that we have at present is mostly manual. The library has three types of items for loan to its members: Book, DVD, and Magazine. Each item is identified with a unique call number of six digit long. The item has also a title and year of publication/production. Not all items are for loan. Some items are only for the use inside the library. For a book, 4 weeks; for a DVD, one week; and for a magazine 2 weeks loan is granted if the item is available for loan. A member can borrow maximum 5 items. The library maintains three different file systems: Membership, Item, and Loan. The university has also a separate software system called UniSys that deals with students and staff. The system has three major components: Staff/Student data, Registration data, and Course data. However, our library system needs data from UniSys to check the validity of the membership of the library. The university has another software system that deals with finance and payments, called FinSys which is also independent but communicates with other systems in the university. It has three components: Financial account of the staff/student, Salary, and Expenditure. Every person at Al-Ekra University has a FinSys account called Fin_Account. The information on the salary of the staff and the tuition fee of the student are stored here. We now want a library system that can provide the following functions. The member of the library can only borrow items from the library. The person must be either staff or student of Al-Ekra University. The person first submits an online application form. The forms include the name and address of the person, and the Fin_Account of the person with Al-Ekra University. A library administrative staff is immediately informed by the system that an application has been submitted. The admin staff first checks the application, and provides input if needed. The system saves the updated information of the application, and then contacts UniSys to get the confirmation that the applicant is either staff or student. Once the library system gets the feedback from UniSys, it records the feedback. If the person is a member of the university, the application is preliminary accepted; otherwise the application is rejected without further processing. The library system then requests FinSys to transfer QR. 500 from the applicant’s Fin_Account to the library. Once the money is transferred, the system creates a library membership account, and deposits the money in this account. After transferring the money to the library system, FinSys records in the applicant’s Fin_Account that QR. 500 has been transferred to library. Finally, it produces a membership card, and assigns a unique membership number. The system finally sends the membership card to the member. If FinSys does not transfer money, the system generates an error message to enter valid Fin_Account. Page 1 In order to borrow an item from the library, a member first enters the membership card into a card reader of the library. The system retrieves the membership details and contacts the university system UniSys to find if the member is an active staff or student. If not, the system does not allow the member to borrow any item from the library and terminates the function. Otherwise, the system asks the member to place the item in the scanner. Once the member does this, the system gets the item details and its type. It also checks if the item is available for loan. The system also finds out the total items already borrowed but not returned. If the item is available for loan, and the total item borrowed but not returned is less than 5, it makes a loan for the member. The item is included in the membership account with the borrowing date and due date for return. The system then increments the total borrowed items by 1, and it makes the item unavailable for other members. The system also decrements the total items reserved of the member if the item was reserved by the member. The member has also choice to request for extended loan time for one more week. If the item was not reserved, one more week is added with the original return date. Finally, it creates a receipt of the loan, and releases the security code of the item. The receipt includes information such as membership number, item call number, loan date, and return date. A member can return a borrowed item to the library by scanning the item into the system that finds the loan details. It then checks the due date. If the due date already passed, it calculates the fine based on number late days. The system updates the member account with the fine. It then makes the item available and sets the security code of the item. The system decrements the total item borrowed by 1. It then creates a receipt of the return. The members can also extend the return date of an item if not reserved by other members. The member first inserts the membership card into the card reader. The system retrieves the list of all currently borrowed items. The member then selects the item that he/she wants to be extended. The system finds the current return date. If the return date has already passed, no extension is possible. An extension is only possible if the request is made before the return date. It also checks if the item has already been reserved. If reserved by other, the return date cannot be extended, otherwise one week extension is made. The system updates the member account with the new return date. It prepares a receipt with the new return date. A member can reserve an item if it is currently on loan with other member. The member first enters the card into the card reader. The system finds the membership details. It checks the total number of current reserved items. It the member has already reserved 3 items, no more reservation request is possible. The system asks for the call number of the item he/she wants to reserve. The system retrieves the item details once the member enters the call number of the item. If already reserved by other, it cannot be reserved by anyone. If not, the item is reserved under the member account, and increments the total reserved item by 1. The system confirms the reservation to the member. Every day at 10 am, the library system automatically checks if any item was not returned after 10 days of the due date. The system generates a list of such items and alerts the admin staff with the list. The staff then enters the call number of each item into the system which finds the loan details. It changes the status of the item as ‘lost’. The system deducts QR. 500 from the deposit money as a fine from the member account. It then requests FinSys with the Fin_Account of the applicant to transfer QR. 500 to the library. FinSys forwards the transfer information to the library that receives the advice and updates the member account with the deposit money. The member is informed about the lost item. The system should know which item was borrowed by which member, borrowing date, the return date, if the item was returned and when. It can also find out which item was lost and by which member, how many items were borrowed by one member, which item was borrowed by which members so far, etc. " Page 2 Ms. Asma wants that the managing of the above activities of the library should be automated as much as possible. There will be also possibility that the administrative staff can generate summary report of loans, returns, fines, etc. At this stage, she wants you to analysis ONLY the functionalities of the library system. She also warns you that you should not analyze any functionality of other systems in this phase. You need to define the system boundary carefully

. please do class digram

In: Computer Science

Database Management Systems Question a. Design a simple RETAIL store records database with 3 to 4...

Database Management Systems Question

a. Design a simple RETAIL store records database with 3 to 4 tables to track customer purchases of store products and answer the following questions about your database.

b. Create an instance (a state) of your database.       

In: Computer Science

Use the code supplied to display the Customers, Products, and Prices . Also show the total...

Use the code supplied to display the Customers, Products, and Prices . Also show the total and average prices package

arraylist3;

import java.util.ArrayList;

import javax.swing.JOptionPane;

public class Arraylist3 {

public static void main(String[] args) {

private static ArrayList customers = new ArrayList<>()

; private static ArrayList products = new ArrayList<>();

private static ArrayList price = new ArrayList<>();

private static int x = 0;

public static void main(String[] args) {

x = Integer.parseInt(JOptionPane.showInputDialog(null,"Enter the number of customer")); input_customers(); display_sales_report(); } private static void input_customers(){ for(int y = 0;y < x; y++){ customers.add(JOptionPane.showInputDialog(null,"Please enter the customer :"+(y+1))); products.add(JOptionPane.showInputDialog(null,"Please enter the product :" + customers.get(y))); price.add(Double.parseDouble(JOptionPane.showInputDialog(null,"Please enter the price :R" + products.get(y)))); } } private static void display_sales_report(){ } } } }

In: Computer Science

Given the following six relations for an order-processing database application in a company: CUSTOMER (Cust#, Cname,...

Given the following six relations for an order-processing database application in a company:

CUSTOMER (Cust#, Cname, City)

ORDER (Order#, Odate, Cust#, Ord_Amt)

ORDER_ITEM (Order#, Item#, Qty)

ITEM (Item#, Unit_price)

SHIPMENT (Order#, Warehouse#, Ship_date)

WAREHOUSE (Warehouse#, City)

Here, Ord_Amt refers to total dollar amount of an order; Odate is the date the order was placed; Ship_date is the date an order (or part of an order) is shipped from the warehouse. Assume that an order can be shipped from several warehouses.
Hint: Remember, the relations (tables) describing entities carry the primary keys that are referenced by the relations (tables) describing relationships between entities.

  1. Specify all the foreign keys for this schem State each foreign key using the following format “foreign key is the attribute ---------- of relation --------- that references relation
    -------------“.
  2. State two queries involving more than one table that can be posed on this database indicating the tables to visit to answer the queries each time.

In: Computer Science

someone please explain this to me ... Objective: Review each item below and determine whether it...

someone please explain this to me ...

Objective: Review each item below and determine whether it needs a subnet mask. Note the appropriate subnet mask number(s) and the number of bits required.
1. Class A network address on a local network.
2. Class B network address on a local network with 4,000 hosts.
3. Class C network address on a local network with 254 hosts.
4. Class A address with 6 subnets.
5. Class B address with 126 subnets.
6. Class A network address. Currently, there are 30 subnets that will grow to approximately 65 subnets within the next year. Each subnet will never have more than 50,000 hosts.
7. Using the subnet mask from step 6, how much growth will this subnet mask provide?
8. Class B network address. Currently, there are 14 subnets that may double in size within the next two years. Each subnet will have fewer than 1,500 hosts.
9. Using the subnet mask from step 8, how much growth will this subnet mask provide?

In: Computer Science

Create an application that allows the user to enter the total for an order and the...

Create an application that allows the user to enter the total for an order and the name of the customer. If the order is less than 500 dollars, the customer gets no discount. If the order is greater than or equal to 500 and less than 1000 dollars, the customer gets a 5 percent discount. If the order is greater than or equal to 1000 dollars, the customer gets a 10 percent discount. The application should display the name of the customer and the discounted total. (using visual basic)

In: Computer Science

How should we deal with automation in modern systems? How do you use automation in your...

How should we deal with automation in modern systems? How do you use automation in your life, and in what ways do you think it makes your digital life more or less secure? Back up your opinion with at least one cite.

In: Computer Science

Compute the first 4 pivots using quick sort algorithm on an array A=<10,15,17,18,6,120,30,250,95>. Write the content...

Compute the first 4 pivots using quick sort algorithm on an array A=<10,15,17,18,6,120,30,250,95>. Write the content of the array A after each pivot is chosen.

In: Computer Science

Shapes2D Assignment Write the following four classes to practice using an abstract class and polymorphism. Submit...

Shapes2D Assignment

Write the following four classes to practice using an abstract class and polymorphism. Submit all four classes.

Shape2D class

For this class, include just an abstract method name get2DArea() that returns a double.

Rectangle2D class

Make this class inherit from the Shape2D class. Have it store a length and a width as fields. Provide a constructor that takes two double arguments and uses them to set the fields. Note, the area of a rectangle is the length times the width.

Circle2D class

Also make this class inherit from the Shape2D class. Have it store a radius as a field. Provide a constructor that takes a double argument and uses it to set the field. Note, the area of a circle is PI times it's radius times it's radius.

Shape2DDriver class

Have this class provide a method named displayName() that takes an object from just any of the above three classes (you can't use an Object type parameter). Have the method display the area of the object, rounded to one decimal place.

In: Computer Science

Show that a language that is described by a regular expression can also be generated by...

Show that a language that is described by a regular expression can also be generated by a context-free grammar. As a hint, consider each mechanism, such as using a basic form or forming the regular expression re1 ∪ re2 from the expressions re1 and re2, and show how this can be transformed into grammar rules that can be added to the grammars generating the collection of strings denoted by re1 and re2.

In: Computer Science

(IN terms of cybersecurity) What are the vulnerabilities? Explain and give at least 2 examples Name...

(IN terms of cybersecurity)

What are the vulnerabilities? Explain and give at least 2 examples

Name at least two ways to implement an awareness program

(Please answer in detail and explain)

In: Computer Science