just anwser .the question, so that I can finish the essay
[10 marks] Given the following article in Computer Technology:
We can’t trust AI systems built on deep learning alone
Gary Marcus, a leader in the field, discusses how we could achieve general intelligence— and why that might make machines safer.
by Karen Hao Sep 27, 2019
https://www.technologyreview.com/s/614443/we-cant-trust-ai-systems-built-on-deeplearning-alone/
INSTRUCTIONS: Answer the following questions in an essay:
1. What are the value and descriptive assumptions? [4 marks]
2. Is/Are there any fallacy/fallacies in the reasoning? [4 marks]
3. What kind of evidence is provided and how good is it? [2 marks]
In: Computer Science
C++ Code
***User Interface
Write a program that offers an easy way to add items, remove the last item, look at the last item put in the list. You will write all of the code for processing the stack - do not use any predefined objects in C++. You decide how the interface will look. A menu driven program is always a good choice.
***Rules for program***
****PLEASE READ**** Additional information for program below.
Write a program to keep up with a collection of "Item" objects. ( Please put comments on all functions other than main to describe purpose)
create a class “Item” with the following private data attributes:
For this lab have separate files in a project. Put your class definitions in header files and the implementations of the methods in a .cpp file.
You will have the following public methods:
Create another class to implement a stack of "Items" using an array-based implementation.
Your stack class should include the following operations:
In: Computer Science
Write a java code that first discards as many whitespace characters as necessary until the first non-whitespace character is found. Then, starting from this character, takes an optional initial plus or minus sign followed by as many numerical digits as possible, and interprets them as a numerical value.
The string can contain additional characters after those that form the integral number, which are ignored and have no effect on the behavior of this function.
If the first sequence of non-whitespace characters in str is not a valid integral number, or if no such sequence exists because either str is empty or it contains only whitespace characters, no conversion is performed.
If no valid conversion could be performed, a zero value is returned.
Example 1:
Input: "42"
Output: 42
Example 2:
Input: " -42"
Output: -42
Explanation: The first non-whitespace character is '-', which is the minus sign. Then take as many numerical digits as possible, which gets 42.
Example 3:
Input: "4193 with words"
Output: 4193
Explanation: Conversion stops at digit '3' as the next character is not a numerical digit.
Example 4:
Input: "words and 987"
Output: 0
Explanation: The first non-whitespace character is 'w', which is not a numerical digit or a +/- sign. Therefore no valid conversion could be performed.
Note 1: When you are testing your code, drop the " around the input values.
Note 2: In this project, you should use the String methods you have learned in this class and implement a loop structure.
In: Computer Science
1) Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.
(TRUE OR FALSE)
2) In microsoft access, Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
(TRUE OR FALSE)
3) A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.
(TRUE OR FALSE)
4) A client is any computer on a network that sends messages requesting services from the servers on the network.
(TRUE OR FALSE)
5) JavaScript can be used to validate data entry in a Web form.
(TRUE OR FALSE
In: Computer Science
Create 3 Classes per the following instructions:
1) Create an abstract parent superclass called MobileDevices and include only the attributes that are common to both cellphones and tablets like iPads. Also create at least one abstract method.
2) Create a child class that extends the MobileDevices class called DeviceType that has attributes and methods regarding the type of device.
3) Create a third class that extends the DeviceType class called DeviceBrand that has attributes and methods for both Apple and Android devices. Make sure to create methods that override any methods in the superclass and possibly any parent class.
4) Create a driver class that initializes the classes and prints out values. Submit you .java files with your name appended to the file names and screenshots of your output.
In: Computer Science
Using Jeliot, execute the following algorithm which implements a buffer pool algorithm. The algorithm offers options for three different heuristics including LRU, LFU, and FIFO.
In: Computer Science
Caches are important to providing a high performance memory hierarchy to processors. Below is a list of 32-bit memory address references, given as word addresses. 6, 214, 175, 149, 214, 6 Given a direct-mapped cache with four-word blocks and a total size of 16 blocks. Please fill in the following table. You may assume that the cache is initially empty. Because the given address is word address, we may compute tags and indices based on word address. Four-word blocks indicate the right most 2 bits are offset in a block. 16 blocks indicates there are 4 bits for indices, and the rest 26 bits will be the tag.
Word address Binary Tag (hex) Index (Hex) Hit/Miss
6
214
175
149
214
6
In: Computer Science
I want to write java program to implement the indexing concept
so as an example we have file named Students this file contains information like this
112233445 ahmed
222442211 saeed
112453345 john
this program should search for the student name by its number so as an output example:
enter the student number
112233445
name found : ahmed
also i want to print the index number of where does the student name exists
In: Computer Science
Twenty One
This game is similar to the famous card game blackjack. We will play a one-player version of the game. The game is played for some number N of rounds (we will use N = 10,000), at the end of which the player wins points. The player accumulates points during the whole game, and the objective is, of course, to end up with the maximum number of points.
The objective in each round of the game is to score as close to 21 as possible by rolling a die as many times as you wish and adding all the numbers that appear. When a player's total exceeds 21, he is 'busted' and gets 0 points. If the player chooses to stop rolling before he exceeds 21, then he wins whatever his total is at that point. So for example, if a player rolls 5, 2, 4, and then 6, his total at that point is 17, and he has to decide whether it is worth trying again: he will be busted if he gets 5 or more (since 17+5=22), but will get a better total if he gets 4 or less.
There are many variations on this game, some involving multiple players, or a "banker" or different numbers of dice, or alcohol..... here is a short YT video explaining the basic game.
A computer can play this game with a suitable strategy. For this problem, we will consider a strategy to be simply an integer K which is the value at which you stop rolling (thinking that you are close enough to 21). The number K is fixed for the entire game. For example, if you set K = 19, then in every round, you will keep rolling if your sum to that point is less than 19; if you get a num ≥ 19 you stop. Clearly, any good strategy will be a number at least 15, since 15+6=21 and if you roll again at 15, you will never bust. But we will try all possible strategies.
QUESTION: in python
You should write a function playRound(K) which rolls a single die until you reach or exceed K or get busted, and either return your score (if you reached or exceeded K), or 0 (if you were busted). Then write a function playGame() which calls playRound(K) for N = 10,000 times for each K and returns an array of 21 numbers giving the average payoff for each K = 1, ..., 21.
Your task is to answer the following questions:
For each K = 1 .. 21, what is the average payoff per round for a game played with this strategy?
What is the best strategy for the game, meaning what value of K wins the most points on average?
Print out the values and an appropriate bar chart for the first question, and simply print out the answer to the second question using a print(...) function.
In: Computer Science
Design an algorithm to prompt user to enter a number. Determine the number is odd or even with Case Logic.
In: Computer Science
Twenty One
This game is similar to the famous card game blackjack. We will play a one-player version of the game. The game is played for some number N of rounds (we will use N = 10,000), at the end of which the player wins points. The player accumulates points during the whole game, and the objective is, of course, to end up with the maximum number of points.
The objective in each round of the game is to score as close to 21 as possible by rolling a die as many times as you wish and adding all the numbers that appear. When a player's total exceeds 21, he is 'busted' and gets 0 points. If the player chooses to stop rolling before he exceeds 21, then he wins whatever his total is at that point. So for example, if a player rolls 5, 2, 4, and then 6, his total at that point is 17, and he has to decide whether it is worth trying again: he will be busted if he gets 5 or more (since 17+5=22), but will get a better total if he gets 4 or less.
There are many variations on this game, some involving multiple players, or a "banker" or different numbers of dice, or alcohol..... here is a short YT video explaining the basic game.
A computer can play this game with a suitable strategy. For this problem, we will consider a strategy to be simply an integer K which is the value at which you stop rolling (thinking that you are close enough to 21). The number K is fixed for the entire game. For example, if you set K = 19, then in every round, you will keep rolling if your sum to that point is less than 19; if you get a num ≥ 19 you stop. Clearly, any good strategy will be a number at least 15, since 15+6=21 and if you roll again at 15, you will never bust. But we will try all possible strategies.
QUESTION: in python
You should write a function playRound(K) which rolls a single die until you reach or exceed K or get busted, and either return your score (if you reached or exceeded K), or 0 (if you were busted). Then write a function playGame() which calls playRound(K) for N = 10,000 times for each K and returns an array of 21 numbers giving the average payoff for each K = 1, ..., 21.
Your task is to answer the following questions:
For each K = 1 .. 21, what is the average payoff per round for a game played with this strategy?
What is the best strategy for the game, meaning what value of K wins the most points on average?
Print out the values and an appropriate bar chart for the first question, and simply print out the answer to the second question using a print(...) function.
In: Computer Science
Write a C++ program to run a menu driven program with the following choices:
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
requirements:
1. Write a function called getValidGrade that allows a user to enter in an integer and loops until a valid number that is >= 0 and <= 100 is entered. It returns the valid value.
2. Write a function called getValidStudentNumber that allows a user to enter in an integer and loops until a valid number that is >= 0 and < NUM_STUDENTS is entered. It returns the valid value.
3. Write a function called getValidAssignmentNumber that allows a user to enter in an integer and loops until a valid number that is >= 0 and < NUM_GRADES is entered. It returns the valid value.
4. Write a function called displayGrades that takes the student and grade arrays as parameters and displays the grades in the format in the sample run below.
5. Write a function called displayAverageForEachStudent that takes the student and grade arrays as parameters, computes the average grade for each student, and displays the grades in the format in the sample run below.
6. Write a function called displayNumStudentsAtLeastBForSelectedAssignment that takes the student and grade arrays as parameters, allows the user to select a valid assignment and locates and displays the number of the student with at least a grade >= 80 for that assignment in the format in the sample run below.
7. Write a function called AdjustGrade that takes grade arrays as a pass by reference parameter, allows the user to select a valid student, a valid assignment, and a valid grade and changes the student assignment grade to the value entered.
8. Add comments wherever necessary.
Sample run:
Welcome to the help with the grading program!
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..1
Name Assign. 1 Assign. 2 Assign. 3 Assign. 4 Assign. 5
Tom 78 98 88 99 77
Jane 62 99 94 85 93
Jo 73 82 88 85 78
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..2
Adjust Grade
Please enter in the student number...
1
Please enter in an assignment number...
0
Please enter in the grade...
98
Grade changed
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..1
Name Assign. 1 Assign. 2 Assign. 3 Assign. 4 Assign. 5
Tom 78 98 88 99 77
Jane 62 99 94 85 93
Jo 98 82 88 85 78
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..0
Select an option (1..5)..9
Select an option (1..5)..3
Average grade for each student
Average Student 1: 88
Average Student 2: 86.6
Average Student 3: 86.2
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..4
Number of students with at least B
Please enter in an assignment number...
-9
Please enter in a valid assignment number...
1
Number of students with at least B on assignment 1 :1
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..2
Adjust Grade
Please enter in the student number...
2
Please enter in an assignment number...
1
Please enter in the grade...
-9
Please enter in a valid grade...
8888
Please enter in a valid grade...
55
Grade changed
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..1
Name Assign. 1 Assign. 2 Assign. 3 Assign. 4 Assign. 5
Tom 78 98 88 99 77
Jane 62 99 94 85 93
Jo 98 55 88 85 78
1) Display the grades
2) Adjust grade
3) Display Average for each student
4) Display number of student with at least a B
5) Quit
Select an option (1..5)..5
Process finished with exit code 0
In: Computer Science
What is model learning in computer science?
What are its uses?
what is the “Black Box”?
In: Computer Science
INTERFACE (BinaryTreeInterface):
BinaryTreeInterface.java
This interface represents all the functionalities a generic binary
tree.
Operations
+ getRootData(): T - This method returns the data stored in the
root node of a tree. Note that you cannot return the data of an
empty tree.
+ getRootNode(): BinaryNode<T> - This method returns the
reference to the root node of a tree.
+ setRootNode(BinaryNode<T>):void - This method sets the root
node of a tree.
+ getHeight():int - This method returns the height of a tree.
+ getNumberOfNodes(): int - This method returns the number of nodes
in a tree.
+ isEmpty():boolean - This method returns true, if a tree is empty,
false otherwise.
+ clear():void – clears a tree.
CLASS (BinaryTree): BinaryTree.java
This generic class implements the BinaryTreeInterface. The class
has one attribute root, which represents the root node of a tree.
In addition, it has the following behaviors:
+BinaryTree(): constructor - initializes root to null.
+ BinaryTree(data): constructor - initializes the root node’s
data.
+ BinaryTree(data, leftTree, rightTree): constructor - initializes
the root node with the given values.
+ setTree(data, leftTree, rightTree): void- set the tree to the
root with data and the leftTree and rightTree subtrees. Make sure
that the new created tree has only one point of entry, which is the
root.
+inorderTraversal(): void – displays all the nodes in tree using
inorder traversal. It displays the content of the nodes separated
by a space in a single line. For example, if the nodes’ content are
1, 2, 3, and 4, the method displays “1 2 3 4”. We have to have a
non empty tree for traversals.
Please implement those interface and class today, thank you
In: Computer Science
1. Match the term with the definition
Malware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Spyware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Adware
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
Pharm
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
voice
[ Choose ] any software specifically designed to damage a computer system without owner knowledge. Although it is often legal and used by big companies such as Verizon and Panasonic, it can be used by illegitimate companies promoting pornography or gambling. Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http. is misleading software that is secretly installed on a computer through the web. Confidential information can be obtained by the installer such as passwords, keystrokes and email addresses. A systems that extract features from speech patterns in order to recognize someones voice which is then digitalized and stored.
2.What prevention technique did the American Library Association suggest for youth using the Internet?
3. What is Biometrics and where was it said to have started?
4. Why do we have passwords and what ancient civilization was reported to use it?
5. Why do computer systems have firewalls?
6. According to your readings, what are a Trojan horse, a virus, and a worm? Highlight their differences.
7. Authentication is used to determine that you are who you are. Authorization refers to resources to which you have access. They are two very different security items.
One of the rising stars of authentication is Biometrics. Discuss two forms of biometric authentication and explain how they can add to the security of a person's identity.
8. Briefly explain the difference in a boot sector virus, a macro virus, and a logic bomb.
9. What did Lamarr, a film star from the late 1930s to the 1950s, assist in inventing and how many frequencies did it range?
10. In your words, what is cyberterrorism? Make sure the answer is your own.
In: Computer Science