Questions
In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several...

In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several Normal forms that are used in database 1NF, 2NF, BCNF etc.

The term functional dependency is very important in NF. Multivalued attributes, Atomicity property etc. plays important role in NF

Action Items

  • You are requested to:
    • Submit 1NF and 2NF examples with explanation.
    • Discuss one of the following:
      • Discuss the need of Normal Forms.
  • Discuss and explain why we need 2NF.
  • Discuss the drawback of 1NF.
  • Discuss Atomicity and multivalued attribute
  • Discuss functional dependency
  • All students have to participate at least twice in the discussions.

In: Computer Science

This program (in python) will display a set of authors and the number of novels written...

This program (in python) will display a set of authors and the number of novels written by each author in both a table and a histogram. You will ask the user for all of the information. Using what you learned about incremental development, use the following approach to create your program:

  1. Prompt the user for the information about the table. First, ask for the title of this data set by prompting the user for a title for data. Output the title.

    Ex:
Enter a title for the data:
Number of Novels Authored
You entered: Number of Novels Authored
  1. The table will have two columns; one for the authors and one for the number of novels. Prompt the user for the headers of two columns of the table. Output the column headers.

    Ex:
Enter the column 1 header:
Author name
You entered: Author name

Enter the column 2 header:
Number of novels
You entered: Number of novels
  1. Prompt the user for data points. Data points must be in this format: string, int, representing the author and the number of novels written by the author. Store the information before the comma into a string variable and the information after the comma into an integer. The user will enter -1 when they have finished entering data points. Output the data points. Store the string components of the data points in a list of strings. Store the integer components of the data points in a list of integers.

    Ex:
Enter a data point (-1 to stop input):
Jane Austen, 6
Author: Jane Austen
Number of Novel(s): 6
  1. Perform error checking for the data point entries as follows:
  • If entry has no comma and is not -1
  • Output: Error: No comma in string.

If the error occurs, output the appropriate error message and prompt again for a valid data point. You can assume that if a comma is present, then the data point is entered correctly.
Ex:

Enter a data point (-1 to stop input):
Ernest Hemingway 9
Error: No comma in string.

Enter a data point (-1 to stop input):
Ernest Hemingway, 9
Author: Ernest Hemingway
Number of Novel(s): 9
  1. Output the information in a formatted table. The title is right justified with a minimum field width value of 33. Column 1 has a minimum field width value of 20. Column 2 has a minimum field width value of 23.

    Ex:
        Number of Novels Authored
Author name         |       Number of novels
--------------------------------------------
Jane Austen         |                      6
Charles Dickens     |                     20
Ernest Hemingway    |                      9
Jack Kerouac        |                     22
F. Scott Fitzgerald |                      8
Mary Shelley        |                      7
Charlotte Bronte    |                      5
Mark Twain          |                     11
Agatha Christie     |                     73
Ian Flemming        |                     14
J.K. Rowling        |                     14
Stephen King        |                     54
Oscar Wilde         |                      1
  1. Output the information as a formatted histogram. Each name is right justified with a minimum field width value of 20.

    Ex:
         Jane Austen ******
     Charles Dickens ********************
    Ernest Hemingway *********
        Jack Kerouac **********************
 F. Scott Fitzgerald ********
        Mary Shelley *******
    Charlotte Bronte *****
          Mark Twain ***********
     Agatha Christie *************************************************************************
        Ian Flemming **************
        J.K. Rowling **************
        Stephen King ******************************************************
         Oscar Wilde *

For this program, you can assume that the user will not enter duplicate author names

In: Computer Science

When we look at cloud usage the categories can include some of but is not limited...

When we look at cloud usage the categories can include some of but is not limited to following:

·          SaaS: Software as a Service

·          PaaS: Platform as a Service

·          IaaS: Infrastructure as a Service

·          MaaS: Monitoring as a Service

Research cloud computing. Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:

·          Describe at least 3 types of cloud computing service categories

·          What are the architecture considerations?

·          Give details of the function of the service with an example

·          What are the advantages and disadvantages of the service?

·          What are the security risk and protection considerations?

·          Do you see any impact on availability and performance?

Specific questions or items to address:

·          Describe at least 3 types of cloud computing service categories

·          What are the architecture considerations?

·          Give details of the function of the service with an example

·          What are the advantages and disadvantages of the service?

·          What are the security risk and protection considerations?

·          Do you see any impact on availability and performance?

In: Computer Science

Write a C++ program to explain the following concepts 1.Data hiding 2.Information hiding 3.Proxy class (solve...

Write a C++ program to explain the following concepts

1.Data hiding

2.Information hiding

3.Proxy class

(solve fast)

In: Computer Science

Latitude and Longitude are the two components used to exactly identify a specific spot on the...

Latitude and Longitude are the two components used to exactly identify a specific spot on the Earth. Latitude provides the North/South direction and runs from 90 degrees north at the north poll to -90 degrees south at the south poll. The equator has a Latitude of zero.

Longitude provides the East/West direction and runs from the Prime Meridian that runs through Greenwich, England and has a Longitude of zero. Longitudes then run negatively to the west and positively to the east with the maximum Longitude being 180 degrees (or -180 degrees. They are the same Longitude.)

Usually Latitude and Longitude are usually depicted in degrees, minutes and second, but they can also be represented with just real numbers, which is how your class will need to be written. (FYI Lake Worth has a 26.61353 latitude and -80.057458)

Your assignment is to create a class called locCoordinates with the following properties and methods:

class locCoordinates

{

private:

            double latitude;

            double longitude;

            string location;

public:

            locCoordinates();

            bool set(double, double, string)

            bool setLatitude(double);

            bool setLongitude(double);

            void setLocation(string);

            double getLatitude();

            double getLongitude();

            string getLocation();

            void moveUpDown (double, string);

            void moveLeftRight (double, string);

            void move (double, double, string);

            void print();

}

And here are the specifics for this class.

The constructor should set the latitude and longitude to zero, and the location to "Prime Meridian at Equator). It should not accept any parameters (and should not call the set function).

The set function will take the two numbers entered (latitude then longitude) and ensure they are correct. If either of the numbers are not within the correct range, then the location should be set to "Error", the value of the invalid entry should be set to zero and the function return a false. If everything is good it returns a true.

setLatitude will change the current value of Latitude. It also needs to check to make sure that it is a good latitude. If not correct the function should set the Latitude to zero and return false otherwise return true. In either case, the Location should be changed to "Unknown".

setLongitude does what setLatitude does, only to the Longitude.

setLocation just updates the location string in the class.

The gets return the values in the properties.

moveUpDown will pass in a double that may be either negative or positive. This value needs to be adjusted for the number of total degrees in the latitude, and then the latitude adjusted by that amount. The location would then also be updated.

moveEastWest does just like moveUpDown, but does it for Longitude.

move takes both a change in Latitude and Longitude and applies them along with setting the new location. (If I were coding this, I would probably just call moveUpDown and moveEastWest to do the work!!)

print will print out:

            Latitude: 99.99999, Longitude: 999.99999 is at location: XXXXXX

You can implement this any way you want either by creating separate class header and implementation files, or by just putting everything in one big ole file with a main routine after the class definition. In the main routine, please set up a location with a bad input and show that a false is returned, then set one up with good input. Then use the move command to adjust the coordinates by an amount above 90 (or below -90) for latitude and above 180 (or below -180) for longitude. Then use the print function to print out the results.

I need help it C++

In: Computer Science

- Make a table which shows the difference between the security features and functionalities of windows...

- Make a table which shows the difference between the security features and functionalities of windows server 2016 and windows server 2012 and which one is more secure

PLEASE USE YOUR OWN WORDS!!

In: Computer Science

Sorting (merge) Sort the array (as in Part 2) using merge sort. Write the array content...

Sorting (merge)

Sort the array (as in Part 2) using merge sort. Write the array content after each pass (i.e., from pass 1 to pass 9). Each pass is defined as the completion of one merge operation.

Suppose an array contains the following integers: -1, 20, 10, -5, 0, -7, 100, -7, 30, -10. Sort the array using the following algorithms: selection sort, bubble sort, and insertion sort. For each algorithm, write the array content after each pass (i.e., from pass 1 to pass 9). Each pass is defined as one iteration of the outer loop. There are total of n − 1 passes, where n is the array size.

In: Computer Science

Using a suitable Venn diagram, describe the relationship between NP, NP-Hard, and NP-Complete problems from

Using a suitable Venn diagram, describe the relationship between NP, NP-Hard, and NP-Complete problems from

In: Computer Science

Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in...

Subject: Introduction to Cyber Security

Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words.

  1. Explain how that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks.. Discuss how operationally, the security engineer performs threat and vulnerability assessments to identify security risks, and then regularly updates the security controls identified through those assessments.Examine the tools needed by a digital forensics professional to collect digital evidence and write a brief 250 word report

In: Computer Science

In JAVA, write a number guessing game that randomly assigns a integer between one and twenty...

In JAVA, write a number guessing game that randomly assigns a integer between one and twenty for the user to guess.

Write three methods to make this particular program work.

1. Have a method which generates a random number and returns the value to the main (stored as a variable)

2. Have a method which prompts the user for a guess. Return the guess to the main.

3. Evaluate the guess and the random "secret" number by parameters, and then have it evaluate if the guess is correct. RETURN A STRING to let the user know if the guess was correct, too high, or too low.

Use a nested loop in main. Ask the user if they would like to play again. Use an inner loop that continually calls the third method until the guess is correct.

In: Computer Science

Need Java Code and UML Design for the following program: Use the Account class created above...

Need Java Code and UML Design for the following program:

Use the Account class created above to simulate an ATM machine. Create five accounts in an array with id 0, 1, ..., 4, and initial balance $100. The system prompts the user to enter an id. If the id is entered incorrectly, ask the user to enter a correct id. Once an id is accepted, the main menu is displayed as shown in the sample run (see below). You can enter a choice 1 for viewing the current balance, 2 for withdrawing money, 3 for depositing money, and 4 for exiting the main menu. Once you exit, the system will prompt for an id again. Thus, once the system starts, the ATM machine will not stop.

Sample run of the ATM machine is as follows: Enter an id to start transactions: 4

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 100.0

Main menu
1: check balance 2: withdraw

3: deposit
4: exit
Enter a choice: 2
Enter an amount to withdraw: 3

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 97.0

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 3
Enter an amount to deposit: 10

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 107.0

Main menu
1: check balance 2: withdraw
3: deposit
4: exit
Enter a choice: 4

Enter an id to start transactions:

In: Computer Science

I've updated this as much as I can think of. This is a PYTHON problem that...

I've updated this as much as I can think of. This is a PYTHON problem that is due today. Please help. I'm trying to read names from a file that begin with @ and print them to another file. It will also read multiple lines of sales amounts for each name and write them and then total them with the end being ***END*** at the bottom of each person's figures and total. I am supposed to write a try and except to insert as well if the numbers aren't actual numbers. Trying to make it a float or produce an error message.

def main():
PRE = '@'
SEP = '***END***\n'

inputFile = open(\r'C:\Users\Trey\Desktop\Programming\good.txt', 'r')
outputFile = open(\r'C:\Users\Trey\Desktop\Programming\goodTrey.txt', 'w')
  
for line in inputFile:
amount = 0
if inputFile.startswith(PRE):
outputfile.write(' ',line)
elif:
amount = float(line)
outputfile.write('$'{:,.2f}.format(amount),'\n')
else:
inputFile.startswith(SEP):
total += amount
outputfile.write('$'{:,.2f}.format(total),'\n', '***END***\n')
# close the files
inputFile.close()
outputFile.close()
  
#call the main function   
main()

In: Computer Science

2) [9point] The following can be solved greedily. You are given a set of posters with...

2) [9point] The following can be solved greedily.

You are given a set of posters with a limited number of types. You want to make a

symmetrical display with the posters.You also want the tallest posters in the middle. All

posters have the same width. Can you make the display symmetrical, and if so,

what is the largest symmetrical display you can make with the tallest posters in the middle?

a. [3 points] What is the optimal substructure for placement?

b.[3 points] What is the greedy property? That is, what is your rule for selecting where a picture goes?

c.[3 points] Prove the correctness of your algorithm by proof of contradiction.

In: Computer Science

For my assignment, I'm not sure how to start making a stack implemented via linked list...

For my assignment, I'm not sure how to start making a stack implemented via linked list of arrays. I'm stuck on how to approach the very first steps (Stack class members and constructor.) I'm familiar with allocating memory, arrays, and linked lists, but putting them together has me lost. How should I create a Stack with a dynamic linked list of arrays?

Stack name (number of elements); Creates a stack of strings with name “name.” Internally, each unit of memory allocation is “number of elements” elements. Users should be smart enough to choose a number of elements that matches their expected usage patterns.

void push(string) Adds an element containing string to the top of the stack.

bool top(string &)   Retrieves the string in the top element. If the stack it empty, returns false.

bool pop(string &) Retrieves and removes the top element. If the stack is empty, returns false.

destroy() Releases any memory used by the stack.

Implementation details:

Stack class members :

- int array size (specified by user when instantiating)

-linked list definition // ex.( list < string* > something; )

- int topElement (element number of the current top element of the stack)

The element number is logically a “pointer” to the top element. It always points to the place in the current array where the next element would go. Again, assume that the array size is 10. If the element number is 5, then a new element goes into array [5]. When the list is empty, the element number is zero. When the element number is 10, the array is full.

constructor:

allocate an array of the specified size

create a linked list entry containing a pointer to the array

  set topElement to 0, indicating that the top of the stack is element 0 of the current array

push:

if the current array is full (topElement = array size)

{

  create a new array

  add a pointer node for this array to the linked list

  move the data to element 0 of the new array

  set topElement to 1

}

else

{

  add data to the array at position {topElement]

  topElement ++

}

pop:

if the current array is empty (topElement = 0)

{

  if there is only one array allocated

{

  return false

}

else

{

delete current array

remove linked list entry for array

set topElement = array size - 1

  retrieve data from current array [topElement]

return true

}

}

else

{

  topElement - -

  retrieve data from current array [topElement]

return true

}

destroy:

delete array

remove linked list node for array

set topElement = array size

Use a header file for your Stack class, a .cpp for its member functions, and a second .cpp for the main routine.

The main is included and KEEP MAIN AS IS

int main() {
   Stack s(5);
   string st;
   bool b;
   s.push("aaaaa");
   s.push("bbbbb");
   s.push("ccccc");
   s.push("ddddd");
   s.push("eeeee");

   cout << "main: start of part 1" << endl;
   b = s.top(st);
   cout << "main: top of stack " << st << endl;
   b = s.pop(st);
   cout << "main: just popped this ->" << st << endl;
   b = s.top(st);
   cout << "main: new top of stack after pop " << st << endl;
   b = s.pop(st);
   cout << "main: just popped this ->" << st << endl;
   b = s.pop(st);
   cout << "main: just popped this ->" << st << endl;
   b = s.pop(st);
   cout << "main: just popped this ->" << st << endl;
   b = s.pop(st);
   cout << "main: just popped this ->" << st << " stack should now be empty" << endl;
   b = s.top(st);
   if (b)
   {
       cout << "main: stack non-empty when it should be empty" << endl;
       return 4;
   }
   else
   {
       cout << "main: stack empty when it's empty" << endl;
   }

   cout << endl << "main: start of part 2" << endl;
   s.push("aaaaa");   // 1st element 1st array
   s.push("bbbbb");
   s.push("ccccc");
   s.push("ddddd");
   s.push("eeeee");
   s.push("fffff");   // 1st element 2nd array
   s.push("ggggg");
   s.push("hhhhh");
   s.push("iiiii");
   s.push("jjjjj");
   s.push("kkkkk");   // 1st element 3rd array

   b = s.top(st);
   cout << "main: top of stack " << st << endl;
   cout << "main: before while loop " << st << endl;
   b = s.pop(st);
   while (b)
   {
       cout << "main: element of stack " << st << endl;
       b=s.pop(st);
   }

   cout <<"main: before destroy"<< endl;
   s.destroy();
   cout <<"main: after destroy"<< endl;
   s.push("zzzzz");
   b=s.top(st);
   cout << "main: new top of stack " << st << endl;
   s.destroy();

   return 0;
}

In: Computer Science

The biggest challenges I saw for this position were the same ones NAO was facing: reducing...

The biggest challenges I saw for this position were the same ones NAO was facing: reducing vehicle development time and structural costs, increasing market share, achieving world class levels of customer enthusiasm, and integrating the various functional departments of NAO. We expected to know we had been successful when 99% of the projects were delivered on time, on budget, and with expected benefits, and when the people in NAO took great pride in this organization. Of course, we are all also working to increase profitability and market share. That was to be done by working with the process information officers, the sector information officers, and with the regional information officers. Our virtual teams had to be flexible to really understand the needs of our internal customers and to help them figure out ways to meet those needs.

One of the Business Unit Information Officers was Maryann Goebel, CIO of the Truck Group. She had over 24 years of experience in information systems, gained from working in 10 different large companies first as a programmer/analyst, and later as an IT executive or in a functional area as an IT specialist. She came to GM in April, 1997 from Bell Atlantic/NYNEX Mobile, where she helped a relationship with an outsourcer turn around. She described her GM job.

The challenge was to make GM number one again. Management believed in the right value set, and consistently delivered the right message. Ralph was the perfect leader for the challenge because there was a lot of history between EDS and GM. In the Truck Group, I found a team who had embraced the GM 5 core values that worked for me: continuous improvement, customer enthusiasm, teamwork, integrity, and innovation. As the CIO of the Truck Group, I reported to two people, Dan McNicholl, the CIO of NAO and Tom Davis, the head of the Truck Group. This business had 45,000 people on the payroll, and I had about 16 employees and 17 contractors reporting to me. There were some other people in the sector that look like IT people, and we often worked with them. We bought services from EDS, and they supplied whatever individuals were needed to meet the service levels we agreed to.

The job of CIO of this sector was a new position. No one focused on this job before me. The reception was very positive, in fact some managers welcomed me with open arms. Most of the managers were interested in my views as an outsider and helped me get to know their organization. I knew I was getting the right message across when several individuals who were initially afraid, I was there to "steal their resources" called me up to ask for my involvement in their IT projects. They finally trusted me.

Some of the tasks I was initially asked to do were to evaluate a proposal for services from EDS where the Truck Group manager wanted to know if this was a realistic reasonable cost for the services offered. I had to really evaluate what was in the numbers in the proposal. Another service I offered was to bring an outside perspective to the Truck Group. I was not afraid to ask a lot of questions, and since I was new to GM, I didn't take for granted many of the things more experienced managers do. I was also a participant in decisions on how the business should be run. I believed that unless you were participating, you were only an order taker. But there is much to do to be a participant. I read briefings, networked with knowledgeable individuals and asked lots of questions to get up to speed.

The biggest challenge I saw in August 1997 was achieving globalization of the IT functions that supported the Truck Group. The structure had the US and Canadian organizations reporting up through the truck team. But other international operations didn't report in the same way. The challenge was to help management of this group understand the global picture, which meant figuring out how to collect, process, and disseminate the management information. I'll know I will have been successful through metrics on customer satisfaction, not on internal efficiency. Establishing the metrics was another challenge.

Cherri Musser joined IS&S as the IO of Business Services which included human resources, finance, legal and purchasing. Musser spent 23 years working in information systems at Texas Instruments, then came to GM in November 1996. When she left TI, she was the VP for research and development for the Texas Instruments Software Business. She joined the new GM IS&S team because,

Ralph wanted to keep information systems efforts focused on the customer and business value. The opportunity to address the IT needs of a company the size of GM—and to build a new IT team to do it— was too good to pass up.

I saw my job as working with the functional areas such as human resources, finance, purchasing, legal, facilities management, etc. to look for synergies across the company. I was looking for ways to drive common systems. We already had a purchasing systems project underway. We were thinking about how to transition to supply chain. For every plant that GM brought up, the plant manager had selected his or her own administrative system.

We worked on convergence. This was done by convening a strategy board for each functional area. For example, the strategy board for finance consisted of the corporate CFO, the CFOs for NAO, GMAC and Delphi, and the corporate comptroller. We met once per month to discuss the process we were using to reach common systems. A similar board was set up in human resources, and that one included the president of GM University and the top human resources individuals in each business unit. Another board was set up for procurement and materials management.

Describe in detail how General Motors leveraged IS to enable global collaboration. What were the challenges encountered at General Motors by enabling global collaboration, and how would you suggest to resolves these challenges?

In: Computer Science