Questions
TRANSPARANT DATA ENCRYPTION TOPIC INTRODUCTION 150WORDS, DESCRIPTION 250 WORDS,  CONCLUTION 150 WORDS USE OWN WORDS 500 WORDS....

TRANSPARANT DATA ENCRYPTION TOPIC INTRODUCTION 150WORDS, DESCRIPTION 250 WORDS,  CONCLUTION 150 WORDS USE OWN WORDS 500 WORDS. WITH REFERENCE SAFEASSIGN NEEDED

In: Computer Science

Create a class named GroceryList. The attributes will be threeLinkedLists. One LinkedList holds double (currency) values,...

Create a class named GroceryList. The attributes will be threeLinkedLists. One LinkedList holds double (currency) values, one holds integer values, and the last holds String values. The String LinkedList is a list of grocery item names. The double LinkedList holds the cost of that item. The integer LinkedList is the number of those items being purchased.

The constructor will simply create empty lists.

The following are the methods to create for this class:

1. add(String, cost, quantity) : Add the specified items to the next position on each LinkedList (note that will ensure that the index of each item is the same on both LinkedLists).

2. remove(String) : Remove the specified item from BOTH lists. This means find it in the String LinkedList, save that index, and then remove the item at that index from each list.

3. bill() : This method will return the total cost of the items being purchased.

4. receipt() : This method will print the name of each item being purchased, how many of those items are being purchased, and the total cost of that item. The last line will be the total cost of all items being purchased.

java language and it's not custom

In: Computer Science

.Variable created outside of function in the main script are available within the function. (Explain by...

  • .Variable created outside of function in the main script are available within the function. (Explain by giving an example)
    • a/
  • is it possible to include HTML in a PHP script file?explain by giving an example
  • here is a constant: define (“LocalHost”,”127.0.0.1”);
    • which one of the following is the correct way to refer to the above constant?
  • LocalHost
    • b.$LocaolHost
  • how many times will ”I love PHP programming!”be printed in the following program segment?
    • $count = 0
    • While ($count<10)
    • eco
  • the PHP function isset() only returns false if a parameter name is missing. It still returns true if the parameter name exists. True or false
  • Data submitted through the HTTP post method is store in array $_POST. True or false
  • Create an array and call it products that will contain the following key and value pairs:
    • i.”iphone “ :699
    • j.”blackberry” :300
    • k.”Samsung” :799
    • l.”Nokia” : 120
    • use a foreach loop to display the content of this array. Make sure to display both the key and value.
  • What will be the output of the following script?
    • <?php
      • $numbers = [100 , 200 ,300,400] ;
      • $values = array(“Hello”,”world”,from”,”csci2006” );
        • For ($i < count ( $numbers) ; $i++)
        • {              
          • echo “numbers[$i] = “ .$numbers[$i] . “<br /> “;
          • echo “values[$i] . “<br />”;
        • }
    • ?>
  • What classes of information are available via the $_server super global array?

In: Computer Science

IN JAVA 1.Write a class Item with these following requirements ØHas two properties: itemName (text) and...

IN JAVA 1.Write a class Item with these following requirements

ØHas two properties: itemName (text) and MSRP (decimal)

ØHas a getTax() method that has no implementation. This method returns a decimal value

ØHas a finalPrice() method that returns the price after tax

ØThis class cannot be instantiated

ØThis class is encapsulated

2.Write a class Electronics that inherits Item with these following requirements

ØHas two properties: manufacturer (text) and tax (decimal). tax value is shared among all electronic items

ØHas a constructor that initializes all attributes

ØProvide an implementation for getTax()

ØThis class is encapsulated

3.Write a class Shop that sells electronic items with these following requirements

ØHas two properties: shopName (text) and itemSold (collection). itemSold stores all the items that the shop sold. You can choose any Java built-in collection type that you like

ØHas a constructor (you can decide which input to have)

ØHas a method sellItem() that add a sold item to itemSold

ØHas a method getSoldList() that returns the names of all items sold in an array. This method shows an error when the collection is empty

ØThis class is encapsulated

4.Write a class Test that creates a Shop, sells a few items, then test getSoldList() and sortSoldList()

ØAssuming tax rate is 7%

In: Computer Science

Discuss in details the strategic benefits of Business Inelegance systems

Discuss in details the strategic benefits of Business Inelegance systems

In: Computer Science

Write a C++ program to read in various types of test questions (multiple choice and True/False)...

Write a C++ program to read in various types of test questions (multiple choice and True/False) from a test bank (text file), and load the questions into an array of questions. You will need to implement the following class hierarchy (given in UML):

Once the test bank has been loaded, simply iterate over the array of questions and have each question printed out to the screen.

The test bank (text file) will have the following format:

  • Line 1 will be an integer value, indicating how many questions in the file
  • Each question will start with a line that starts with either "MC" or "TF" followed by a space and then the point value of the question.
  • The next line will be the actual question.
  • If the question was True/False, the following line will be the answer, either "True" or "False"
  • If the question was multiple choice, the following line will be an integer value indicating how many choices will be provided for that question. The following lines will be the choices. There will never be more than 6 choices. The final line following the choices will be the answer: "A" or "B" or "C" or "D" or "E" or "F".

For this assignment, you may download this sample code for reference. A sample test bank file is as follows:

3

TF 5

There exist birds that cannot fly?

true

MC 10

Who was the President of the USA in 1991?

6

Richard Nixon

Gerald Ford

Jimmy Carter

Ronald Reagan

George Bush Sr.

Bill Clinton

E

TF 10

The city of Boston hosted the 2004 Summer Olympics?

false

In: Computer Science

Write a C program that accepts a port number as a command line argument, and starts...

Write a C program that accepts a port number as a command line argument, and starts an HTTP server. This server should constantly accept() connections, read requests of the form
GET /path HTTP/1.1\r\n\r\n
read the file indicated by /path, and send it over the "connect" file descriptor returned by the call to accept().

In: Computer Science

Suppose you have a list containing exactly three integer numbers. Each number could be positive, negative,...

Suppose you have a list containing exactly three integer numbers. Each number could be positive, negative, or zero. Write a C program that first asks the user for each of the numbers. After that, it should determine and display the number from the list that is nearest to the positive number five (5).

Examples:
If the numbers are 0, -3, and 8, then the displayed output is 8.
If the numbers are 6, 5, and 4, then the output is 5.
If the numbers are 3, 4, and 11, then the output is 4.
If the numbers are 4, 1, 6, then it turns out that 4 and 6 are both equidistant from 5. In this situation, the output should be the first number checked that satisfied the criterion. For this example, if you started on the left at 4 and proceeded to the right, the output is 4.

In: Computer Science

Is the middleware in an Android System considered an example of a middleware in a distributed...

Is the middleware in an Android System considered an example of a middleware in a distributed system?

In: Computer Science

This is a machine learning question. Please use python and google colab format. PLEASE USE BASIC...

This is a machine learning question. Please use python and google colab format. PLEASE USE BASIC MACHINE LEARNING CODES.

Using the Kaggle diamonds dataset, construct a KNN estimator to predict diamond prices. Choose an appropriate K value and predict the price of a diamond with the following parameters: "carat' : 0.32, 'cut' : Ideal, 'color' : E, 'clarity' : IF, 'depth' : 60.7, 'table' : 58.0, 'x' : 4.46, 'y' : 4.48,  'z': 2.71".

Please change the cut, color and clarity to numbers (Eg: cut: 'Fair' : 1, 'Good' : 2, 'Very Good' : 3, 'Premium' : 4, 'Ideal' : 5) etc. I need to predict the price of the specific diamond stated above. Thank you!

In: Computer Science

Implement the Fibonacci function by means of accumulative parameters so that it runs in linear time....

Implement the Fibonacci function by means of accumulative parameters so that it runs in linear time.

(Please use OCaml, Haskell or another functional language and delineate which you are using. Python won't work, unfortunately.)

In: Computer Science

Calculate the total time to transmit a 1000 KB file over a link in the following...

  1. Calculate the total time to transmit a 1000 KB file over a link in the following cases, assuming the one-way delay in either direction is 50ms, and an initial 2 x RTT of "handshaking" before any data is sent.
    1. The bandwidth is 1.5 Mbps, the packet size including the header is 1 KB of which the header is 40 bytes, and data packets are sent continuously and never lost.
    2. Same as (1), but the packet size is 5 KB (incl. header). ·What happens when 15 packets are lost and have to be retransmitted (no time is wasted in detecting which packets have been lost, the last packet in the stream is not retransmitted).
    3. Same as (1), but after we finish transmitting we must wait for one RTT before transmitting the next packet.
    4. Same as (1), but the link bandwidth is "infinite" ( the transmission time is assumed to be zero). We start by sending one packet in the first (2(1 – 1)), during the second RTT we send two ( 2(2-1) )packets, during the third RTT we send four (2(3-1)), and so on.

In: Computer Science

What to submit: your answers to exercises 1, 2, and 3 and separate the codes to...

What to submit: your answers to exercises 1, 2, and 3 and separate the codes to each question..

1. Create a UML diagram to help design the class described in exercise 3 below.

Do this exercise before you attempt to code the solution. Think about what instance variables will be required to describe a Baby class object; should they be private or public? Determine what class methods are required; should they be private or public?

2. Write Java code for a Baby class. A Baby has a name of type String and an age of type integer.

Supply two constructors: one will be the default constructor, that just sets default values for the name and age; the second constructor will take two parameters, a string to set the name and an integer to set the age. Also, supply methods for setting the name, setting the age, getting the name and getting the age.

Give Java code for an equals method for the Baby class. Babies count as being the same (i.e. equal) if their names and their ages are exactly identical (names should not be case sensitive). The method will take a Baby type parameter and use the calling object (thus comparing these two objects via name and age); it should return Boolean - true or false as appropriate. Remember, if comparing Strings, you must use String comparison methods.

.   Test your Baby class by writing a client program which uses an array to store information about 4 babies. That is, each of the four elements of the array must store a Baby object.

If you have an array for baby names and another array for baby ages, then you have missed the point of the exercise and therefore not met the requirement of this exercise.

A Baby class object stores the required information about a Baby. So each Baby object will have its own relevant information, and thus each object must be stored in one element of the array.

The client program should:

a. Enter details for each baby (name and age) and thus populate the

Baby array

b. Output the details of each baby from the array (name and age) c. Calculate and display the average age of all babies in the array d. Determine whether any two babies in the array are the same

As the required information for these tasks is stored in the Baby array, you will need to use a loop to access each array element (and use the dot notation to access the appropriate set and get methods to assign/retrieve the information).

For part d above, a nested loop is required.

In: Computer Science

Base class: Polygon Derived classes: Rectangle, Triangle Make Square a derived class of Rectangle. There can...

Base class: Polygon

Derived classes: Rectangle, Triangle

Make Square a derived class of Rectangle.

There can be several ways to represent the shapes. For example, a shape can be represented by an array of side lengths counted in the clock-wise order. For example, {2, 4, 2, 4} for a rectangle of width 2 and height 4, and {4, 4, 4, 4} for a square. You need to design your representation.

Each polygon should have a function area() that returns its area, and perimeter() that returns its perimeter.

The area of a triangle, given three sides a, b, and c, can be calculated using Heron's formula (http://www.mathopenref.com/heronsformula.html).

In a main program, create an array of pointers to Polygon; create at least one object from each derived class, assign it to the array, and print out the area and perimeter of each array member.

Polygon * shapes[3];

shapes[0] = new Rectangle(4.0, 2.0);

shapes[1] = new Square(4.0);

shapes[3] = new Triangle(4.0, 4.0, 4.0);

for (int i=0; i<3)

cout<<shapes[i]->area()<<" ,"<<shapes[i]->perimeter()<<endl;

Design your classes properly by using dynamic binding and well-thought-out constructors.

Submit 9 C++ files in one zip file: one header file and one cpp file for each of the four classes, plus a client.cpp.

In: Computer Science

Please explain with examples means details: 1. What is Data Security Compliance? 2. What is FISMA?...

Please explain with examples means details:

1. What is Data Security Compliance?

2. What is FISMA?

3. Why is data security important in our society?

In: Computer Science