Questions
When programming in the Unix/Linux shell, short-circuit evaluation of an expression is a standard way to...

  1. When programming in the Unix/Linux shell, short-circuit evaluation of an expression is a standard way to execute a second command ONLY IF the first command was successful. How does this work?

  2. What is a ternary operator? When should it be used and when should it be avoided?

  3. We perform a hand trace of a C program to validate what?

In: Computer Science

Convert from twos compliment in 7 bits to base ten (decimal) a. 1100010 b. 0101010

Convert from twos compliment in 7 bits to base ten (decimal)

a. 1100010

b. 0101010

In: Computer Science

Python! Modify the following code to include countries name which should be displaying onto the console...

Python!

Modify the following code to include countries name which should be displaying onto the console from countries with the lowest population to the highest Morroco :38,964, china:1000000000, usa:400,000,000, England:55,000,000.   

class Node:
    def __init__(self,value):
        self.value=value
        self.right=None
        self.left=None
class BinarySearchTree:
    def __init__(self):
        self.root=None
    #adding the element to the bst
    def add(self,value):
        node=Node(value)
        temp=self.root
        flag=1
        while(temp):
            flag=0
            if(node.value>temp.value):
                if(temp.right):
                    temp=temp.right
                else:
                    temp.right=node
                    break
            else:
                if(temp.left):
                    temp=temp.left
                else:
                    temp.left=node
                    break
        if(flag):
            self.root=node
    #pre order traversing
    def preOrder(self,root):
        if(root):
            print(root.value)
            self.preOrder(root.left)
            self.preOrder(root.right)
    #in order traversing
    def inOrder(self,root):
        if(root):
            self.inOrder(root.left)
            print(root.value)
            self.inOrder(root.right)
    #post order traversing
    def postOrder(self,root):
        if(root):
            self.postOrder(root.left)
            self.postOrder(root.right)
            print(root.value)

In: Computer Science

1. When working as a pen-tester, why is it important to stay within the pen-test scope?...

1. When working as a pen-tester, why is it important to stay within the pen-test scope?

2. When working as a pen-tester you determine you have exceeded the scope of your agreement. What should you do next?

3. Is it ok to perform a limited scope pen-test against your bank's servers? (You are an account holder at the bank). Why/Why not and explain your answer.

4. What is the purpose of using nmap during a pen-test?

In: Computer Science

PLEASE ANSWER ALL OF THE FOLLOWING QUESTIONS 2. Describe the networks that might be used to...

PLEASE ANSWER ALL OF THE FOLLOWING QUESTIONS

2. Describe the networks that might be used to support a small family-owned neighborhood convenience store with a point of sale (POS) computer, and an office computer for inventory control, accounting, product acquisition, etc.

3. Describe the distributed applications that might be used to support a neighborhood book store with a coffee shop/browsing area that offers free Internet access to its customers, accepts credit cards for purchases, has an email-based marketing plan, and sells some products online.

4. Describe the networks that might be used to support a small manufacturing facility that supplies widgets to a large international manufacturing firm. The organization uses automation in their production, employs a small management staff (accounting, materials procurement, human resources, etc.), and receives their orders for widgets via electronic communications with the larger firm.

5. Explain the differences between backend LANs, SANs, and backbone LANs

6. List and describe the key components of satellite communications systems

7. In a computer and network security context, list and briefly describe three classes of intruders

8. In a computer and network security context, list and briefly describe three intruder behavior patterns

9. Describe the computing needs of a medium-sized enterprise and the need for client/server, intranet, and/or cloud computing.

10. Conveniently Yours is a small family-owned neighborhood convenience store that sells products and Lottery tickets to a very limited customer base. Their computing equipment is minimal with a point of sale (POS) computer, an office computer for inventory control, accounting, product acquisition, etc. Describe Conveniently Yours computing needs and their possible need for client/server, intranet, and/or cloud computing that would support his business operations.

In: Computer Science

Part 1 (Objective C++ and please have output screenshot) The purpose of this part of the...

Part 1 (Objective C++ and please have output screenshot)

The purpose of this part of the assignment is to give you practice in creating a class. You will develop a program that creates a class for a book. The main program will simply test this class.

The class will have the following data members:

  1. A string for the name of the author
  2. A string for the book title
  3. A long integer for the ISBN

The class will have the following member functions (details about each one are below:)

  1. A default constructor
  2. A Print function which prints out all the information about the book.
  3. A GetData function which reads information from a file into the data members.
  4. A function GetISBN that returns the integer containing the ISBN. (This will be needed in Part 2).

You must create your program using the following three files:

book.h – used for declaring your class. In this header file, the declarations of the class and its members (both data and functions) will be done without the definitions. The definitions should be done in the book.cpp file.

book.cpp – contains the definitions of the member functions:

  1. The default constructor will initialize the author's name to “No name”, the title to "Unknown title", and the ISBN to 0.
  2. The Print function will display all of the information about a book in a clear format. This will be a const function because it does not change the data members. For formatting purposes, you may assume that no name will have more than 20 characters and that no book title will have more than 50 characters.
  3. The GetData function will have the input file as a parameter, will read information from the file and put appropriate values into the data members. (See below for the format of the data file.)
  4. The GetISBN function will simply return the long integer containing the ISBN. It also will be a const function.

Mp8bookDriver.cpp – should contain the main program to test the class.

It should declare two book objects (book1 and book2) using the default constructor. Call the print function for book1 (to show that the default constructor is correct). Open the input file and call the GetData function for book2 and then print its information. Finally, test the GetISBN function for book2 and output the result returned from the function.

Format of Data file
The name of the data file is mp7book.txt
It has data for one book arranged as follows:

  • The name is on one line by itself (hint: use getline).
  • The title is on a line by itself.
  • The ISBN is on the third line.

mp7book.txt

Jane Smith
History Of This World
12349876

Get this part of the program working and save all the files before starting on Part 2. The output should be similar to the following:

Testing the book class by (your name)

The information for book 1 is:
No name Unknown title 0
The information for book 2 is:
Jane Smith History Of The World 12349876
book2 has ISBN 12349876
Press any key to continue

Part 2

Now you will use the book class to create an array of books for a small library. Note that the book.h and book.cpp files should not have to be changed at all - you just have to change the main program in the Mp8bookDriver.cpp file.

There is a new data file, mp7bookarray.txt. It contains the information for the books in the library using the same format as described above for each book. There will be exactly 10 books in the file.

Declare an array of books that could hold 10 book objects. Open the new data file and use a loop to call the GetData function to read the information about the books into the objects in the array. Print out the list of books in the library in a nice format. Notice that the books are arranged in order by ISBN in the data file.

Now imagine customers coming into the library who want to know whether a particular book is in the collection. Each customer knows the ISBN of the book. Open the third data file (mp8bookISBN.txt) which contains ISBN's, read each one, and use a binary search to find out whether the book is in the array. If it is found, print out all the information about the book, if not, print an appropriate message. Then repeat the process for each of the ISBN's until you get to the end of the file.

mp8bookarray.txt

H. M. Deitel
C++ How to Program
130895717
Judy Bishop
Java Gently
201593998
Jeff Salvage
The C++ Coach
201702894
Thomas Wu
Object-Oriented Programming with Java
256254621
Cay Horstmann
Computing Concepts with C++
471164372
Gary Bronson
Program Development and Design
534371302
Joyce Farrell
Object-Oriented Programming
619033614
D. S. Malik
C++ Programming
619062134
James Roberge
Introduction to Programming in C++
669347183
Nell Dale
C++ Plus Data Structures
763714704

mp8bokkISBN.txt
201593998
888899999
763714704
111122222
256254621
130895717
488881111
534371302
619033614

In: Computer Science

Please use R studio Dataset: IBM HR Analytics Employee Attrition & Performance dataset (you can download...

Please use R studio

Dataset: IBM HR Analytics Employee Attrition & Performance dataset (you can download the dataset from kaggle)

Name

Description

ATTRITION

Employee leaving the company (0=no, 1=yes)

BUSINESS TRAVEL

(1=No Travel, 2=Travel Frequently, 3=Tavel Rarely)

DEPARTMENT

(1=HR, 2=R&D, 3=Sales)

EDUCATION FIELD

(1=HR, 2=LIFE SCIENCES, 3=MARKETING, 4=MEDICAL SCIENCES, 5=OTHERS, 6= TEHCNICAL)

GENDER

(1=FEMALE, 0=MALE)

JOB ROLE

(1=HC REP, 2=HR, 3=LAB TECHNICIAN, 4=MANAGER, 5= MANAGING DIRECTOR, 6= REASEARCH DIRECTOR, 7= RESEARCH SCIENTIST, 8=SALES EXECUTIEVE, 9= SALES REPRESENTATIVE)

MARITAL STATUS

(1=DIVORCED, 2=MARRIED, 3=SINGLE)

OVERTIME

(0=NO, 1=YES)

The Variable Attrition is what we plan to use as our dependent variable. The variable contains a Yes if they stay with IBM and 'No' if they do not. We need to creat into a binary dummy variable with 0 if they do not stay with IBM (Attrition = 'No') and 1 if they do stay with IBM (Attrition = 'Yes'). This will also need to be done to the variable Gender and OverTime. Gender we can assign "Male" to zero and "Female" to one. For OverTime we will assign 0 for "No" and 1 for "Yes".

Make Pivot tables instead of correlation matrixes for categorical variables and do the data analysis.

For data analysis:

  • Describe the data using the techniques above (e.g. "We can see in this scatter plot that there is a positive correlation between the number of hours in which the patient exercised per week and his/her weight loss."). About one page without the images.
  • Based on these observations, draw some insights. (e.g. "We believe the patient is burning calories when exercising, thus contributing to the loss of weight"). About one page.
  • State actionable experiments based upon your insights. (e.g. "We will use multiple regression that includes hours exercised as an explanatory variable to model weight loss. We expect...")

In: Computer Science

What are the System Requests in this project? System Request Introduction Northern Ontario Recreational Vehicle Storage...

What are the System Requests in this project?

System Request
Introduction


Northern Ontario Recreational Vehicle Storage (NORVS) specializes in supply of local storage as a convenient and safe alternative to pulling a trailer up and down the highways, and a seasonal storage facility to protect valuable items from the elements in the off season. The type of vehicles that they store are snowmobiles, All Terrain Vehicles (ATVs), boats, Recreational Vehicles (RVs) and camper trailers (see examples at the end of this document).

The type of customers that use this service are people who own such vehicles for seasonal activities and need somewhere to store then during the off season.

Your responsibility will be to take the information in the Business Summary section and create the deliverable documentation.

Business Summary

Existing System

NORVS current system is completely manual. If a customer needs to store something at the facility, they call in and either the owner, or an employee will take down details for the client’s desired storage on their intake form. When the customer arrives to drop off their vehicle(s), an employee must be available to meet them in order to permit access to the secured site. The customer makes payment at this time if they did not leave a credit card number when the booking was initially arranged. Vehicle pickups follow the same process since the site is not manned on a full-time basis.

The storage facility consists of indoor and outdoor space. Storage spaces have been configured in the following sizes to accommodate the most common vehicles.

  • 10 X 20 feet
  • 10 X 10 feet
  • 10 X 5 feet

To meet larger requirements, individual spaces are combined to suit the needs of the specific vehicle. Each space has an ID which locates it on the property for both internal and external locations. Space allocations by client are maintained on a large magnetic whiteboard layout of the property. Red magnetized cards are placed in occupied spaces with the client’s name written on them. This allows staff to keep track of space utilization, however, it is not always up to date. Vehicles are often relocated to either consolidate space or improve access and the changes are not always made to the whiteboard. New vehicle arrivals are frequently not listed on the board. When discovered, it requires an extensive amount of work to bring the whiteboard up to date.

This issue has caused some embarrassments to the owners as they have committed space to new clients based on the whiteboard information only to discover that spaces have already been filled.

The owners also find it difficult to compile monthly reports of revenues and to follow up with their clients for future repeat bookings. Contact information is misplaced or not correctly captured during the initial contact. Other storage facilities are now moving into the area offering competition and in order to compete and grow their business they must upgrade their system.

Proposed New System

The owners have decided to implement a new internet-based system. This system will provide the required functionality to support both desktop/laptop and mobile phone access using the internet.

One of the main features of the new system will be an integrated storage space management component that tracks space availability based on “reservation commitments” and “contracted commitments”. When spaces are vacated, reservations cancelled or converted to a contract, the system will be automatically updated to ensure space availability status for new client enquiries. There will also be an administrative function built into the storage space management component to allow the owner and employees to adjust the spaces should they decide to move vehicles from one spot to another for convenience. The administrator will also be permitted to add, drop, and merge spaces depending on needs. This administrative feature would only be available to management.

When clients complete a reservation request, they must supply all their contact information along with specific details of the vehicle(s) to be stored. This will include make, model, color, year of manufacture of the vehicle and approximate value. A photo image would also be uploaded, attached to the application. In addition, the width, height and length of the vehicle(s) will also be required to confirm storage space needs. Finally, indoor or outdoor storage will be specified on the client request. When the request is approved it then becomes the Rental Agreement. If the request is denied, it is deleted.

In order to permit clients 7X24X365 access to the site, the owners would like to install a biometric security gate. Clients would be able to drive up to the gate and scan their finger print or eyes (iris recognition) and activate the gate to allow them to enter and leave the storage facility at their convenience. This would also allow management to have a log of exactly who entered and exited the facility, and at what time. The initial biometric registration would take place after the reservation has been confirmed. i.e., payment has been received.

The new system will directly interface to a third-party credit card authorization service, such as PayPal, to handle all payment transactions.

The system will also provide monthly statements in hard or soft copy depending on client preferences. This preference will be identified in the client registration process and can be modified at any time by the client through the client profile management component which would be secured by username and password authentication. Client profile management will allow clients to access and change their contact information at any time.

Finally, the owners would like to have a built-in management reporting feature as part of the system which would allow them to track all business activity including;

  • monthly revenues
  • entry and exit times and profiles of who activated the gate when
  • comparisons with previous months’ revenues
  • monthly reservation bookings and cancellations
  • contract completions
  • pending contract renewals
  • space availability
  • Etc.,

In: Computer Science

3.1 What are the shared characteristics of different agile methods of software development? 2. For what...

3.1

What are the shared characteristics of different agile methods of software development?

2. For what types of system are agile approaches to development particularly likely to be successful?

3. List the 5 principles of agile methods.

4. List 4 questions that should be asked when deciding whether or not to adopt an agile method of software development.

5. Name three important agile techniques that were introduced in extreme programming?

6. What is test-first development?

7. What are the possible problems of test-first development?

8. Why has the Scrum agile method been widely adopted in preference to methods such as XP?

9. What is a Scrum sprint?

10. What are the barriers to introducing agile methods into large companies?

In: Computer Science

When the user enters 4 at the menu prompt, your program will access all objects in...

When the user enters 4 at the menu prompt, your program will access all objects in the array to calculate and display only the largest number of coin denomination, and the total number of coins for the largest denomination. If there are more than one coin denominations having equal amount, you will need to list down all of them. After processing the output for menu option 4, the menu is re-displayed.

Menu option 4 should return as follows.

The largest number of coin denomination is:
$1
5 cent
The total number of $1 coin is: 2
The total number of 5 cent coin is: 2

i'm stuck with the returnDenomination() method

===

// import Scanner class to take user input

import java.util.Scanner;

// Client class

public class Client {

// for display colored terminal output

public static final String ANSI_RESET = "\u001B[0m";

public static final String ANSI_YELLOW = "\u001B[33m";

public static final String ANSI_GREEN = "\u001B[32m";

// scanner object

static Scanner userInput = new Scanner(System.in);

public static void main(String[] args) {

// declare and initialise variables

char yesNo = ' ';

String name;

boolean newPerson;

int menuInput;

int coinAmount;

int personNum = 0;

// declar array of object, Change type

Change person[] = new Change[10];

// for the purpose of testing the program by tutor, hard-coded data

personNum = 9;

person[0] = new Change("Abel", 10);

person[1] = new Change("Belle", 25);

person[2] = new Change("Chanel", 235);

person[3] = new Change("Desmond", 240);

person[4] = new Change("Elaine", 55);

person[5] = new Change("Farah", 60);

person[6] = new Change("Gabriel", 170);

person[7] = new Change("Hazel", 285);

person[8] = new Change("Iris", 190);

// display recommendation msg

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.println("Recommendation: Please enter at least 9 records to test the program.");

// loop while userInput is not 'N' for new person

do {

newPerson = true;

System.out.println("\nCurrent record: " + personNum + "/9");

// userInput for name & coinAmount

System.out.print("\nPlease enter the name of the person: ");

name = userInput.nextLine();

System.out.print("Please enter coin value for the person (range 5 to 95, a multiple of 5): ");

coinAmount = userInput.nextInt();

userInput.nextLine();

// verify if useInput amount is valid (range 5 to 95, multiple of 5)

if(coinAmount < 5 || coinAmount > 95 || (coinAmount % 5) !=0) {

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.println("Incorrect coin value. Must be in the range 5 to 95, multiple of 5");

continue;

}

// verify person in record

for (int i = 0; i < personNum; i++) {

// update total amount if name matches exisiting record

if (person[i].getName().equalsIgnoreCase(name)) {

person[i].setAmount(person[i].getAmount() + coinAmount);

newPerson = false;

break;

}

}

// add to record if the person is new

if (newPerson)

person[personNum++] = new Change(name, coinAmount);

// break when number of person in record greater/equals 9

if (personNum >= 9)

break;

System.out.print("\nDo you have more person to enter (Y/N): ");

yesNo = Character.toUpperCase(userInput.nextLine().charAt(0));

// verify only Y or N userInput

while (yesNo != 'Y' && yesNo != 'N') {

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.print("Invalid! Do you have more person to enter (Y/N): ");

yesNo = Character.toUpperCase(userInput.nextLine().charAt(0));

}

} while(yesNo != 'N'); // end of newPerson do-while loop

// loop until userInput 5 to exit

do {

// display menu

System.out.println("\n1. Enter a name and display change to be given for each denomination");

System.out.println("2. Find the name with the smallest amount and display change to be given for each denomination");

System.out.println("3. Find the name with the largest amount and display change to be given for each denomination");

System.out.println("4. Calculate and display the largest number of coin denomination, and the total number of the coin");

System.out.println("5. Exit");

// wait for userInput

System.out.print("\nWhat would you like to do? Enter your choice: ");

menuInput = userInput.nextInt();

userInput.nextLine();

// display according to userInput

switch (menuInput) {

// display changes based on name of person entered

case 1:

returnIndividual(person, personNum);

break;

// display person with smallest amount and changes

case 2:

returnSmallest(person, personNum);

break;

// display person with largest amount and changes

case 3:

returnLargest(person, personNum);

break;

// display total of largest numer of coin denomination

case 4:

returnDenomination(person, personNum);

break;

// display farewell message and exit program

case 5:

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.println("Have a good day ahead. Bye!\n");

System.exit(0);

break;

// default for no case match

default:

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.println("Invalid! Please enter your choice again: \n");

}

} while (menuInput != 5); // end of menu do-while loop

} // end of main()

// method to find individual person by name and display denomination

public static void returnIndividual(Change person[], int personNum) {

// declare variable to store array of denomination

int denomination[] = new int[4];

// prompt userInput for name

System.out.print("Enter name: ");

String name = userInput.nextLine();

boolean nameNotFound = true;

// verify display name and coinAmount in record

for (int i = 0; i < personNum; i++) {

if (person[i].getName().equalsIgnoreCase(name)) {

// calculate and return count of each denomination

denomination = person[i].calDenomination();

System.out.println(ANSI_GREEN);

System.out.println("\n" + person[i].getName() + " has an account of: " + person[i].getAmount() + " cents\n");

// display count of each denomination

System.out.println("Change:");

if (denomination[0] != 0)

System.out.println("$1 : " + denomination[0]);

if (denomination[1] != 0)

System.out.println("50¢: " + denomination[1]);

if (denomination[2] != 0)

System.out.println("20¢: " + denomination[2]);

if (denomination[3] != 0)

System.out.println("10¢: " + denomination[3]);

if (denomination[4] != 0)

System.out.println("5¢ : " + denomination[4] + "\n");

System.out.println(ANSI_RESET);

// set flag to false since name is in record

nameNotFound = false;

break;

}

}

// display error msg if name not in record

if (nameNotFound) {

System.out.print(ANSI_YELLOW);

System.out.print("\n[System Msg] ");

System.out.print(ANSI_RESET);

System.out.println(name + " not found in record!\n");

}

} // end of returnIndividual()

public static void returnDenomination(Change person[], int personNum) {

// for menu 4

} // end of returnDenomination

} // end of Client class

In: Computer Science

What is a growth function? How does it relate to the efficiency of an algorithm? Explain...

What is a growth function? How does it relate to the efficiency of an algorithm? Explain with example.

In: Computer Science

1. What are the fundamental activities that are common to all software processes? 2. List 3...

1. What are the fundamental activities that are common to all software processes?

2. List 3 generic process models that are used in software engineering?

3. Why are iterations usually limited when the waterfall model is used?

4. What are the three benefits of incremental development, compared to the waterfall model?

5. What are the development stages in integration and configuration?

6. What are the principal requirements engineering activities?

7. Why is it increasingly irrelevant to distinguish between software development and evolution?

8. What are the advantages of using incremental development and delivery?

9. What are the two different approaches to process improvement and change that have been proposed?

10. What are the identified levels in the SEI’s Capability Maturity Model

In: Computer Science

Functional & non-functional requirements document The following document has gathered from various sources, including engineers working...

Functional & non-functional requirements document

The following document has gathered from various sources, including engineers working in our company, interviews, contacts with the client, etc., all the requirements for a project described below. You are strongly advised to read the following document multiple times, and keep notes. Don’t bother searching on the internet, you will not find anything helpful. Instead, you have to be the chief Software Engineer, and your mission is to describe functional and non-functional requirements, as good and detailed as possible. When you are missing data, you have to make assumptions (sometimes wild ones). No one can really answer your questions, and you have a presentation to the higher management in 45 min sharp. By then, you have to construct a document, with a very small ( no more than 10 lines) executive description, and no more than two A4 pages (1.25 space, font 12) text. Good luck.

INFORMATION ABOUT THE PROJECT

Our company is seriously considering of bidding for the following project, and we ask you, the lead Software Engineer, to construct a draft document, with the functional and non-functional requirements. The better your document, the better job will do our business development team to construct a proposal.

Project abstract description

The project is about monitoring the two gates of the University, automate the entry of authorized personnel, plus record all car license plates, if they left at night, and also raise alarms if a car is in the parking for more than 5 days. Also the system needs to report cars that are still at the parking, or during any holiday, or when the University is closed officially (e.g., during summer holidays). During those periods, only high-ranking personnel is automatically allowed to enter (e.g., Deans). All others need to be stopped at the gate, and call their supervisor. For that purpose, the following descriptions have been gathered.

Notes

• Each security room next to each gate, will be equipped with the necessary hardware, in order for the guards to see the license plate camera, plus another camera facing the car driver. Also each car will be equipped with electronic id device. The entry bar will be connected to the system, and will be automatically raised, if the car and driver are both authorized.

  • The license plate cameras have to have a good false positive rate. The driver-side camera will not do face recognition at the beginning, but the client wants this to be an option for the near future.

  • The time it takes for one car to enter, is of great importance. The client needs to know this in detail.

  • There should be a “manual override” button on the screen, but the system should keep all details possible, guard details, time, date, car & license picture, etc.

  • The client will accommodate all data into their own facilities and infrastructure, but they will not provide any hardware/software for this project.

  • The guards will be trained accordingly if desired.

  • The data gathered should not be used for other purposes.

  • The staff, students, faculty, are really worried about their personal data, and how those

    are going to be used. Some even claim that the data will be used to monitor their

    working time.

  • Our company, is worried about the cost of this project, and we want to find innovative

    ways to keep the cost low, so we can bid a lower price, and get a competitive advantage

    against other bidders.

  • Our company also is not very experienced in such projects, and they hired you to “make

the difference”

(no specific language nor coding needed )

In: Computer Science

Hands-On Project 19-2 Print in the Cloud To practice cloud printing using Google Cloud Print, you’ll...

Hands-On Project 19-2 Print in the Cloud

To practice cloud printing using Google Cloud Print, you’ll need a computer with an installed printer and another computer somewhere on the Internet. For the easiest solution to using Google Cloud Print, both computers need Google Chrome installed. You’ll also need a Google account. On the computer with an installed printer, do the following:

1. If you don’t already have Google Chrome, go to google.com/chrome/browser/desktop, download, and install it.

2. Open Google Chrome and enter chrome://devices in the address box. Click Add printers. Sign in to Google with your Google account. If you don’t already have an account, you can click Create account to create one.

3. The list of installed printers appears. Uncheck all printers except the one you want to use for cloud printing. Click Add Printer(s). On a computer anywhere on the Internet, do the following:

4. If necessary, install Google Chrome.

5. Open Google Chrome and sign in with your Google account. Navigate to a webpage you want to print. Click the menu icon in the upper-right corner of the Chrome window and click Print.

6. On the Print page, click Change and select the printer, which is listed in the Google Cloud Print group. Click Print. The page prints over the web to your printer.

In: Computer Science

Question? Identify the relationships of Player and Player fields including PKs, CKs, and FDs. While using...

Question?

Identify the relationships of Player and Player fields including PKs, CKs, and FDs. While using the entities and fields found in Player, create a DBDL example of tables, fields, and key fields that are in third normal form.

Instructions: Convert this table to an equivalent collection of tables, fields, and keys that are in the third normal form. Represent your exercise answers in DBDL design from the database normalization phases.

The player contains information about players and their teams.

Player has attributes PlayerId, First, Last, Gender, TeamId, TeamName, TeamCity where PlayerId is the only CK and the FDs are:

PlayerId → First

PlayerId → Last

PlayerId →Gender

PlayerId → TeamId

PlayerId → TeamName

PlayerId → TeamCity

TeamId → TeamName

TeamId → TeamCity

Figure 1: Player – Sample Data

PlayerID First Last Gender TeamID TeamName TeamCity
1 Jim Jones M 1 Flyers Winnipeg
2 Betty Smith F 5 OilKings Calgary
3 Jim Smith M 10 Oilers Edmonton
4 Lee Mann M 1 Flyers Winnipeg
5 Samantha McDonald F 5 OilKings Calgary
6 Jimmy Jasper M 99 OilKings Winnipeg

In: Computer Science