In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several Normal forms that are used in database 1NF, 2NF, BCNF etc.
The term functional dependency is very important in NF. Multivalued attributes, Atomicity property etc. plays important role in NF
Action Items
In: Computer Science
This program (in python) will display a set of authors and the number of novels written by each author in both a table and a histogram. You will ask the user for all of the information. Using what you learned about incremental development, use the following approach to create your program:
Enter a title for the data: Number of Novels Authored You entered: Number of Novels Authored
Enter the column 1 header: Author name You entered: Author name Enter the column 2 header: Number of novels You entered: Number of novels
Enter a data point (-1 to stop input): Jane Austen, 6 Author: Jane Austen Number of Novel(s): 6
If the error occurs, output the appropriate error message and
prompt again for a valid data point. You can assume that if a comma
is present, then the data point is entered correctly.
Ex:
Enter a data point (-1 to stop input): Ernest Hemingway 9 Error: No comma in string. Enter a data point (-1 to stop input): Ernest Hemingway, 9 Author: Ernest Hemingway Number of Novel(s): 9
Number of Novels Authored Author name | Number of novels -------------------------------------------- Jane Austen | 6 Charles Dickens | 20 Ernest Hemingway | 9 Jack Kerouac | 22 F. Scott Fitzgerald | 8 Mary Shelley | 7 Charlotte Bronte | 5 Mark Twain | 11 Agatha Christie | 73 Ian Flemming | 14 J.K. Rowling | 14 Stephen King | 54 Oscar Wilde | 1
Jane Austen ****** Charles Dickens ******************** Ernest Hemingway ********* Jack Kerouac ********************** F. Scott Fitzgerald ******** Mary Shelley ******* Charlotte Bronte ***** Mark Twain *********** Agatha Christie ************************************************************************* Ian Flemming ************** J.K. Rowling ************** Stephen King ****************************************************** Oscar Wilde *
For this program, you can assume that the user will not enter duplicate author names
In: Computer Science
When we look at cloud usage the categories can include some of but is not limited to following:
· SaaS: Software as a Service
· PaaS: Platform as a Service
· IaaS: Infrastructure as a Service
· MaaS: Monitoring as a Service
Research cloud computing. Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:
· Describe at least 3 types of cloud computing service categories
· What are the architecture considerations?
· Give details of the function of the service with an example
· What are the advantages and disadvantages of the service?
· What are the security risk and protection considerations?
· Do you see any impact on availability and performance?
Specific questions or items to address:
· Describe at least 3 types of cloud computing service categories
· What are the architecture considerations?
· Give details of the function of the service with an example
· What are the advantages and disadvantages of the service?
· What are the security risk and protection considerations?
· Do you see any impact on availability and performance?
In: Computer Science
Write a C++ program to explain the following concepts
1.Data hiding
2.Information hiding
3.Proxy class
(solve fast)
In: Computer Science
Latitude and Longitude are the two components used to exactly identify a specific spot on the Earth. Latitude provides the North/South direction and runs from 90 degrees north at the north poll to -90 degrees south at the south poll. The equator has a Latitude of zero.
Longitude provides the East/West direction and runs from the Prime Meridian that runs through Greenwich, England and has a Longitude of zero. Longitudes then run negatively to the west and positively to the east with the maximum Longitude being 180 degrees (or -180 degrees. They are the same Longitude.)
Usually Latitude and Longitude are usually depicted in degrees, minutes and second, but they can also be represented with just real numbers, which is how your class will need to be written. (FYI Lake Worth has a 26.61353 latitude and -80.057458)
Your assignment is to create a class called locCoordinates with the following properties and methods:
class locCoordinates
{
private:
double latitude;
double longitude;
string location;
public:
locCoordinates();
bool set(double, double, string)
bool setLatitude(double);
bool setLongitude(double);
void setLocation(string);
double getLatitude();
double getLongitude();
string getLocation();
void moveUpDown (double, string);
void moveLeftRight (double, string);
void move (double, double, string);
void print();
}
And here are the specifics for this class.
The constructor should set the latitude and longitude to zero, and the location to "Prime Meridian at Equator). It should not accept any parameters (and should not call the set function).
The set function will take the two numbers entered (latitude then longitude) and ensure they are correct. If either of the numbers are not within the correct range, then the location should be set to "Error", the value of the invalid entry should be set to zero and the function return a false. If everything is good it returns a true.
setLatitude will change the current value of Latitude. It also needs to check to make sure that it is a good latitude. If not correct the function should set the Latitude to zero and return false otherwise return true. In either case, the Location should be changed to "Unknown".
setLongitude does what setLatitude does, only to the Longitude.
setLocation just updates the location string in the class.
The gets return the values in the properties.
moveUpDown will pass in a double that may be either negative or positive. This value needs to be adjusted for the number of total degrees in the latitude, and then the latitude adjusted by that amount. The location would then also be updated.
moveEastWest does just like moveUpDown, but does it for Longitude.
move takes both a change in Latitude and Longitude and applies them along with setting the new location. (If I were coding this, I would probably just call moveUpDown and moveEastWest to do the work!!)
print will print out:
Latitude: 99.99999, Longitude: 999.99999 is at location: XXXXXX
You can implement this any way you want either by creating separate class header and implementation files, or by just putting everything in one big ole file with a main routine after the class definition. In the main routine, please set up a location with a bad input and show that a false is returned, then set one up with good input. Then use the move command to adjust the coordinates by an amount above 90 (or below -90) for latitude and above 180 (or below -180) for longitude. Then use the print function to print out the results.
I need help it C++
In: Computer Science
- Make a table which shows the difference between the security features and functionalities of windows server 2016 and windows server 2012 and which one is more secure
PLEASE USE YOUR OWN WORDS!!
In: Computer Science
In: Computer Science
Using a suitable Venn diagram, describe the relationship between NP, NP-Hard, and NP-Complete problems from
In: Computer Science
Subject: Introduction to Cyber Security
Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words.
In: Computer Science
In JAVA, write a number guessing game that randomly assigns a integer between one and twenty for the user to guess.
Write three methods to make this particular program work.
1. Have a method which generates a random number and returns the value to the main (stored as a variable)
2. Have a method which prompts the user for a guess. Return the guess to the main.
3. Evaluate the guess and the random "secret" number by parameters, and then have it evaluate if the guess is correct. RETURN A STRING to let the user know if the guess was correct, too high, or too low.
Use a nested loop in main. Ask the user if they would like to play again. Use an inner loop that continually calls the third method until the guess is correct.
In: Computer Science
Need Java Code and UML Design for the following program:
Use the Account class created above to simulate an ATM machine. Create five accounts in an array with id 0, 1, ..., 4, and initial balance $100. The system prompts the user to enter an id. If the id is entered incorrectly, ask the user to enter a correct id. Once an id is accepted, the main menu is displayed as shown in the sample run (see below). You can enter a choice 1 for viewing the current balance, 2 for withdrawing money, 3 for depositing money, and 4 for exiting the main menu. Once you exit, the system will prompt for an id again. Thus, once the system starts, the ATM machine will not stop.
Sample run of the ATM machine is as follows: Enter an id to start transactions: 4
Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 100.0
Main menu
1: check balance 2: withdraw
3: deposit
4: exit
Enter a choice: 2
Enter an amount to withdraw: 3
Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 97.0
Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 3
Enter an amount to deposit: 10
Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 107.0
Main menu
1: check balance 2: withdraw
3: deposit
4: exit
Enter a choice: 4
Enter an id to start transactions:
In: Computer Science
I've updated this as much as I can think of. This is a PYTHON problem that is due today. Please help. I'm trying to read names from a file that begin with @ and print them to another file. It will also read multiple lines of sales amounts for each name and write them and then total them with the end being ***END*** at the bottom of each person's figures and total. I am supposed to write a try and except to insert as well if the numbers aren't actual numbers. Trying to make it a float or produce an error message.
def main():
PRE = '@'
SEP = '***END***\n'
inputFile = open(\r'C:\Users\Trey\Desktop\Programming\good.txt',
'r')
outputFile =
open(\r'C:\Users\Trey\Desktop\Programming\goodTrey.txt', 'w')
for line in inputFile:
amount = 0
if inputFile.startswith(PRE):
outputfile.write(' ',line)
elif:
amount = float(line)
outputfile.write('$'{:,.2f}.format(amount),'\n')
else:
inputFile.startswith(SEP):
total += amount
outputfile.write('$'{:,.2f}.format(total),'\n',
'***END***\n')
# close the files
inputFile.close()
outputFile.close()
#call the main function
main()
In: Computer Science
2) [9point] The following can be solved greedily.
You are given a set of posters with a limited number of types. You want to make a
symmetrical display with the posters.You also want the tallest posters in the middle. All
posters have the same width. Can you make the display symmetrical, and if so,
what is the largest symmetrical display you can make with the tallest posters in the middle?
a. [3 points] What is the optimal substructure for placement?
b.[3 points] What is the greedy property? That is, what is your rule for selecting where a picture goes?
c.[3 points] Prove the correctness of your algorithm by proof of contradiction.
In: Computer Science
For my assignment, I'm not sure how to start making a stack implemented via linked list of arrays. I'm stuck on how to approach the very first steps (Stack class members and constructor.) I'm familiar with allocating memory, arrays, and linked lists, but putting them together has me lost. How should I create a Stack with a dynamic linked list of arrays?
Stack name (number of elements); Creates a stack of strings with name “name.” Internally, each unit of memory allocation is “number of elements” elements. Users should be smart enough to choose a number of elements that matches their expected usage patterns.
void push(string) Adds an element containing string to the top of the stack.
bool top(string &) Retrieves the string in the top element. If the stack it empty, returns false.
bool pop(string &) Retrieves and removes the top element. If the stack is empty, returns false.
destroy() Releases any memory used by the stack.
Implementation details:
Stack class members :
- int array size (specified by user when instantiating)
-linked list definition // ex.( list < string* > something; )
- int topElement (element number of the current top element of the stack)
The element number is logically a “pointer” to the top element. It always points to the place in the current array where the next element would go. Again, assume that the array size is 10. If the element number is 5, then a new element goes into array [5]. When the list is empty, the element number is zero. When the element number is 10, the array is full.
constructor:
allocate an array of the specified size
create a linked list entry containing a pointer to the array
set topElement to 0, indicating that the top of the stack is element 0 of the current array
push:
if the current array is full (topElement = array size)
{
create a new array
add a pointer node for this array to the linked list
move the data to element 0 of the new array
set topElement to 1
}
else
{
add data to the array at position {topElement]
topElement ++
}
pop:
if the current array is empty (topElement = 0)
{
if there is only one array allocated
{
return false
}
else
{
delete current array
remove linked list entry for array
set topElement = array size - 1
retrieve data from current array [topElement]
return true
}
}
else
{
topElement - -
retrieve data from current array [topElement]
return true
}
destroy:
delete array
remove linked list node for array
set topElement = array size
Use a header file for your Stack class, a .cpp for its member functions, and a second .cpp for the main routine.
The main is included and KEEP MAIN AS IS
int main() {
Stack s(5);
string st;
bool b;
s.push("aaaaa");
s.push("bbbbb");
s.push("ccccc");
s.push("ddddd");
s.push("eeeee");
cout << "main: start of part 1" <<
endl;
b = s.top(st);
cout << "main: top of stack " << st
<< endl;
b = s.pop(st);
cout << "main: just popped this ->" <<
st << endl;
b = s.top(st);
cout << "main: new top of stack after pop "
<< st << endl;
b = s.pop(st);
cout << "main: just popped this ->" <<
st << endl;
b = s.pop(st);
cout << "main: just popped this ->" <<
st << endl;
b = s.pop(st);
cout << "main: just popped this ->" <<
st << endl;
b = s.pop(st);
cout << "main: just popped this ->" <<
st << " stack should now be empty" << endl;
b = s.top(st);
if (b)
{
cout << "main: stack
non-empty when it should be empty" << endl;
return 4;
}
else
{
cout << "main: stack empty
when it's empty" << endl;
}
cout << endl << "main: start of part 2"
<< endl;
s.push("aaaaa"); // 1st element 1st
array
s.push("bbbbb");
s.push("ccccc");
s.push("ddddd");
s.push("eeeee");
s.push("fffff"); // 1st element 2nd
array
s.push("ggggg");
s.push("hhhhh");
s.push("iiiii");
s.push("jjjjj");
s.push("kkkkk"); // 1st element 3rd
array
b = s.top(st);
cout << "main: top of stack " << st
<< endl;
cout << "main: before while loop " << st
<< endl;
b = s.pop(st);
while (b)
{
cout << "main: element of
stack " << st << endl;
b=s.pop(st);
}
cout <<"main: before destroy"<<
endl;
s.destroy();
cout <<"main: after destroy"<< endl;
s.push("zzzzz");
b=s.top(st);
cout << "main: new top of stack " << st
<< endl;
s.destroy();
return 0;
}
In: Computer Science
The biggest challenges I saw for this position were the same ones NAO was facing: reducing vehicle development time and structural costs, increasing market share, achieving world class levels of customer enthusiasm, and integrating the various functional departments of NAO. We expected to know we had been successful when 99% of the projects were delivered on time, on budget, and with expected benefits, and when the people in NAO took great pride in this organization. Of course, we are all also working to increase profitability and market share. That was to be done by working with the process information officers, the sector information officers, and with the regional information officers. Our virtual teams had to be flexible to really understand the needs of our internal customers and to help them figure out ways to meet those needs.
One of the Business Unit Information Officers was Maryann Goebel, CIO of the Truck Group. She had over 24 years of experience in information systems, gained from working in 10 different large companies first as a programmer/analyst, and later as an IT executive or in a functional area as an IT specialist. She came to GM in April, 1997 from Bell Atlantic/NYNEX Mobile, where she helped a relationship with an outsourcer turn around. She described her GM job.
The challenge was to make GM number one again. Management believed in the right value set, and consistently delivered the right message. Ralph was the perfect leader for the challenge because there was a lot of history between EDS and GM. In the Truck Group, I found a team who had embraced the GM 5 core values that worked for me: continuous improvement, customer enthusiasm, teamwork, integrity, and innovation. As the CIO of the Truck Group, I reported to two people, Dan McNicholl, the CIO of NAO and Tom Davis, the head of the Truck Group. This business had 45,000 people on the payroll, and I had about 16 employees and 17 contractors reporting to me. There were some other people in the sector that look like IT people, and we often worked with them. We bought services from EDS, and they supplied whatever individuals were needed to meet the service levels we agreed to.
The job of CIO of this sector was a new position. No one focused on this job before me. The reception was very positive, in fact some managers welcomed me with open arms. Most of the managers were interested in my views as an outsider and helped me get to know their organization. I knew I was getting the right message across when several individuals who were initially afraid, I was there to "steal their resources" called me up to ask for my involvement in their IT projects. They finally trusted me.
Some of the tasks I was initially asked to do were to evaluate a proposal for services from EDS where the Truck Group manager wanted to know if this was a realistic reasonable cost for the services offered. I had to really evaluate what was in the numbers in the proposal. Another service I offered was to bring an outside perspective to the Truck Group. I was not afraid to ask a lot of questions, and since I was new to GM, I didn't take for granted many of the things more experienced managers do. I was also a participant in decisions on how the business should be run. I believed that unless you were participating, you were only an order taker. But there is much to do to be a participant. I read briefings, networked with knowledgeable individuals and asked lots of questions to get up to speed.
The biggest challenge I saw in August 1997 was achieving globalization of the IT functions that supported the Truck Group. The structure had the US and Canadian organizations reporting up through the truck team. But other international operations didn't report in the same way. The challenge was to help management of this group understand the global picture, which meant figuring out how to collect, process, and disseminate the management information. I'll know I will have been successful through metrics on customer satisfaction, not on internal efficiency. Establishing the metrics was another challenge.
Cherri Musser joined IS&S as the IO of Business Services which included human resources, finance, legal and purchasing. Musser spent 23 years working in information systems at Texas Instruments, then came to GM in November 1996. When she left TI, she was the VP for research and development for the Texas Instruments Software Business. She joined the new GM IS&S team because,
Ralph wanted to keep information systems efforts focused on the customer and business value. The opportunity to address the IT needs of a company the size of GM—and to build a new IT team to do it— was too good to pass up.
I saw my job as working with the functional areas such as human resources, finance, purchasing, legal, facilities management, etc. to look for synergies across the company. I was looking for ways to drive common systems. We already had a purchasing systems project underway. We were thinking about how to transition to supply chain. For every plant that GM brought up, the plant manager had selected his or her own administrative system.
We worked on convergence. This was done by convening a strategy board for each functional area. For example, the strategy board for finance consisted of the corporate CFO, the CFOs for NAO, GMAC and Delphi, and the corporate comptroller. We met once per month to discuss the process we were using to reach common systems. A similar board was set up in human resources, and that one included the president of GM University and the top human resources individuals in each business unit. Another board was set up for procurement and materials management.
Describe in detail how General Motors leveraged IS to enable global collaboration. What were the challenges encountered at General Motors by enabling global collaboration, and how would you suggest to resolves these challenges?
In: Computer Science