The purpose of this lab is to become familiar with searching, inserting and deleting elements in a linked list.using java
public boolean contains(String name) // returns true if provided name exists in the list, otherwise returns false public void add(String name) // adds name to the list in its proper lexographical (alphabetical) ordering public void delete(String name) // removes name from list
In: Computer Science
Write a C++ code to insert the following numbers in
two Linked Lists. Insert numbers of first list in Linked List#1,
and numbers of second list in Linked List#2. Do not insert both
lists in a single Linked List.
List#1.
5, 78, 45, 23, 11, 89, 10, 78, 6, 99, 876, 5, 67,
13
List#2.
5, 89, 688, 52, 557, 953, 5, 7, 55, 35, 89, 99, 99, 6,
557, 89, 5, 99, 6, 2, 45, 12, 7, 6, 94, 93, 99, 67
After inserting numbers in linked lists. Write a
function to print only those numbers that appear in List#1 and more
than 2 times in List#2.
For example, the number “5” appears in List#1 and 3
times in List#2. So your code should print “5” and similar other
numbers.
In: Computer Science
C# Programming
Explain in your own words how using the control selection ( decision) structure is useful in programming in general. Provide Example
In: Computer Science
Task 1: HTML and CSS
Create a website using HTML5 and CSS3 only. Please no JavaScript or Bootstrap. Website theme can be anything you want: a country, a town, a place, a hobby, people (yourself, your family...), pets, flowers, food, or anything that you find interesting or useful. It may be about real people/places/things or fictitious.
Part 1: Content (HTML)
After you decide the theme of your website, create HTML pages with the content you want to present. Remember to separate content from presentation. The content is placed in the HTML files, and the layout and style will be defined using CSS (see part 2). Your website must include (at least):
Do not forget to make your pages accessible. You should double-check your code to make sure you are not missing closing tags, etc. and test it using different browsers. Focus on making your pages syntactically and semantically correct.
Part 2: Style (CSS)
You'll create an external stylesheet (css) to style the html pages you created in part 1. Name this file main.css.
All html pages should link to the same main.css file. You must use a variety of selectors and properties presented in chapters 4 and 5, including:
Part 3: An alternate style (CSS)
You'll create a different CSS file, with different style and layout rules, to make your HTML pages look completely different (without making any changes to the HTML files).
In: Computer Science
Your team has been contacted by Ms. Asma to develop a software system for the library only. She has prepared a description of some basic functions of the library loan system currently done manually. Ms. Asma wants an automatic library system that should work as described below: “The library loan system that we have at present is mostly manual. The library has three types of items for loan to its members: Book, DVD, and Magazine. Each item is identified with a unique call number of six digit long. The item has also a title and year of publication/production. Not all items are for loan. Some items are only for the use inside the library. For a book, 4 weeks; for a DVD, one week; and for a magazine 2 weeks loan is granted if the item is available for loan. A member can borrow maximum 5 items. The library maintains three different file systems: Membership, Item, and Loan. The university has also a separate software system called UniSys that deals with students and staff. The system has three major components: Staff/Student data, Registration data, and Course data. However, our library system needs data from UniSys to check the validity of the membership of the library. The university has another software system that deals with finance and payments, called FinSys which is also independent but communicates with other systems in the university. It has three components: Financial account of the staff/student, Salary, and Expenditure. Every person at Al-Ekra University has a FinSys account called Fin_Account. The information on the salary of the staff and the tuition fee of the student are stored here. We now want a library system that can provide the following functions. The member of the library can only borrow items from the library. The person must be either staff or student of Al-Ekra University. The person first submits an online application form. The forms include the name and address of the person, and the Fin_Account of the person with Al-Ekra University. A library administrative staff is immediately informed by the system that an application has been submitted. The admin staff first checks the application, and provides input if needed. The system saves the updated information of the application, and then contacts UniSys to get the confirmation that the applicant is either staff or student. Once the library system gets the feedback from UniSys, it records the feedback. If the person is a member of the university, the application is preliminary accepted; otherwise the application is rejected without further processing. The library system then requests FinSys to transfer QR. 500 from the applicant’s Fin_Account to the library. Once the money is transferred, the system creates a library membership account, and deposits the money in this account. After transferring the money to the library system, FinSys records in the applicant’s Fin_Account that QR. 500 has been transferred to library. Finally, it produces a membership card, and assigns a unique membership number. The system finally sends the membership card to the member. If FinSys does not transfer money, the system generates an error message to enter valid Fin_Account. Page 1 In order to borrow an item from the library, a member first enters the membership card into a card reader of the library. The system retrieves the membership details and contacts the university system UniSys to find if the member is an active staff or student. If not, the system does not allow the member to borrow any item from the library and terminates the function. Otherwise, the system asks the member to place the item in the scanner. Once the member does this, the system gets the item details and its type. It also checks if the item is available for loan. The system also finds out the total items already borrowed but not returned. If the item is available for loan, and the total item borrowed but not returned is less than 5, it makes a loan for the member. The item is included in the membership account with the borrowing date and due date for return. The system then increments the total borrowed items by 1, and it makes the item unavailable for other members. The system also decrements the total items reserved of the member if the item was reserved by the member. The member has also choice to request for extended loan time for one more week. If the item was not reserved, one more week is added with the original return date. Finally, it creates a receipt of the loan, and releases the security code of the item. The receipt includes information such as membership number, item call number, loan date, and return date. A member can return a borrowed item to the library by scanning the item into the system that finds the loan details. It then checks the due date. If the due date already passed, it calculates the fine based on number late days. The system updates the member account with the fine. It then makes the item available and sets the security code of the item. The system decrements the total item borrowed by 1. It then creates a receipt of the return. The members can also extend the return date of an item if not reserved by other members. The member first inserts the membership card into the card reader. The system retrieves the list of all currently borrowed items. The member then selects the item that he/she wants to be extended. The system finds the current return date. If the return date has already passed, no extension is possible. An extension is only possible if the request is made before the return date. It also checks if the item has already been reserved. If reserved by other, the return date cannot be extended, otherwise one week extension is made. The system updates the member account with the new return date. It prepares a receipt with the new return date. A member can reserve an item if it is currently on loan with other member. The member first enters the card into the card reader. The system finds the membership details. It checks the total number of current reserved items. It the member has already reserved 3 items, no more reservation request is possible. The system asks for the call number of the item he/she wants to reserve. The system retrieves the item details once the member enters the call number of the item. If already reserved by other, it cannot be reserved by anyone. If not, the item is reserved under the member account, and increments the total reserved item by 1. The system confirms the reservation to the member. Every day at 10 am, the library system automatically checks if any item was not returned after 10 days of the due date. The system generates a list of such items and alerts the admin staff with the list. The staff then enters the call number of each item into the system which finds the loan details. It changes the status of the item as ‘lost’. The system deducts QR. 500 from the deposit money as a fine from the member account. It then requests FinSys with the Fin_Account of the applicant to transfer QR. 500 to the library. FinSys forwards the transfer information to the library that receives the advice and updates the member account with the deposit money. The member is informed about the lost item. The system should know which item was borrowed by which member, borrowing date, the return date, if the item was returned and when. It can also find out which item was lost and by which member, how many items were borrowed by one member, which item was borrowed by which members so far, etc. " Page 2 Ms. Asma wants that the managing of the above activities of the library should be automated as much as possible. There will be also possibility that the administrative staff can generate summary report of loans, returns, fines, etc. At this stage, she wants you to analysis ONLY the functionalities of the library system. She also warns you that you should not analyze any functionality of other systems in this phase. You need to define the system boundary carefully
. please do class digram
In: Computer Science
Database Management Systems Question
a. Design a simple RETAIL store records database with 3 to 4 tables to track customer purchases of store products and answer the following questions about your database.
b. Create an instance (a state) of your database.
In: Computer Science
Use the code supplied to display the Customers, Products, and Prices . Also show the total and average prices package
arraylist3;
import java.util.ArrayList;
import javax.swing.JOptionPane;
public class Arraylist3 {
public static void main(String[] args) {
private static ArrayList customers = new ArrayList<>()
; private static ArrayList products = new ArrayList<>();
private static ArrayList price = new ArrayList<>();
private static int x = 0;
public static void main(String[] args) {
x = Integer.parseInt(JOptionPane.showInputDialog(null,"Enter the number of customer")); input_customers(); display_sales_report(); } private static void input_customers(){ for(int y = 0;y < x; y++){ customers.add(JOptionPane.showInputDialog(null,"Please enter the customer :"+(y+1))); products.add(JOptionPane.showInputDialog(null,"Please enter the product :" + customers.get(y))); price.add(Double.parseDouble(JOptionPane.showInputDialog(null,"Please enter the price :R" + products.get(y)))); } } private static void display_sales_report(){ } } } }
In: Computer Science
Given the following six relations for an order-processing database application in a company:
CUSTOMER (Cust#, Cname, City)
ORDER (Order#, Odate, Cust#, Ord_Amt)
ORDER_ITEM (Order#, Item#, Qty)
ITEM (Item#, Unit_price)
SHIPMENT (Order#, Warehouse#, Ship_date)
WAREHOUSE (Warehouse#, City)
Here, Ord_Amt refers to total dollar
amount of an order; Odate is the date the order was placed;
Ship_date is the date an order (or part of an order) is shipped
from the warehouse. Assume that an order can be shipped from
several warehouses.
Hint: Remember, the relations (tables) describing entities carry
the primary keys that are referenced by the relations (tables)
describing relationships between entities.
In: Computer Science
In: Computer Science
In: Computer Science
How should we deal with automation in modern systems? How do you use automation in your life, and in what ways do you think it makes your digital life more or less secure? Back up your opinion with at least one cite.
In: Computer Science
Compute the first 4 pivots using quick sort algorithm on an array A=<10,15,17,18,6,120,30,250,95>. Write the content of the array A after each pivot is chosen.
In: Computer Science
Shapes2D Assignment
Write the following four classes to practice using an abstract class and polymorphism. Submit all four classes.
Shape2D class
For this class, include just an abstract method name get2DArea() that returns a double.
Rectangle2D class
Make this class inherit from the Shape2D class. Have it store a length and a width as fields. Provide a constructor that takes two double arguments and uses them to set the fields. Note, the area of a rectangle is the length times the width.
Circle2D class
Also make this class inherit from the Shape2D class. Have it store a radius as a field. Provide a constructor that takes a double argument and uses it to set the field. Note, the area of a circle is PI times it's radius times it's radius.
Shape2DDriver class
Have this class provide a method named displayName() that takes an object from just any of the above three classes (you can't use an Object type parameter). Have the method display the area of the object, rounded to one decimal place.
In: Computer Science
Show that a language that is described by a regular expression can also be generated by a context-free grammar. As a hint, consider each mechanism, such as using a basic form or forming the regular expression re1 ∪ re2 from the expressions re1 and re2, and show how this can be transformed into grammar rules that can be added to the grammars generating the collection of strings denoted by re1 and re2.
In: Computer Science
(IN terms of cybersecurity)
What are the vulnerabilities? Explain and give at least 2 examples
Name at least two ways to implement an awareness program
(Please answer in detail and explain)
In: Computer Science