Questions
Calculate TCP and UDP efficiency while sending data of size 200 bytes? Justify the difference between...

Calculate TCP and UDP efficiency while sending data of size 200 bytes? Justify the difference between two.

In: Computer Science

(Fraction calculator c++) | Write a program that lets the user perform arithmetic operations on fractions....

(Fraction calculator c++) | Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which _a_ and _b_ are integers and b ≠ 0. Your program must be menu driven, allowing the user to select the operation (+, –, *, or /) and input the numerator and denominator of each fraction. Furthermore, your program must consist of at least the following functions: Function menu: This function informs the user about the program’s purpose, explains how to enter data, and allows the user to select the operation. Function addFractions: This function takes as input four integers representing the numerators and denominators of two fractions, adds the fractions, and returns the numerator and denominator of the result. (Notice that this function has a total of six parameters.) Function subtractFractions: This function takes as input four integers representing the numerators and denominators of two fractions, subtracts the fractions, and returns the numerator and denominator of the result. (Notice that this function has a total of six parameters.) Function multiplyFractions: This function takes as input four integers representing the numerators and denominators of two fractions, multiplies the fractions, and returns the numerators and denominators of the result. (Notice that this function has a total of six parameters.) Function divideFractions: This function takes as input four integers representing the numerators and denominators of two fractions, divides the fractions, and returns the numerator and denominator of the result. (Notice that this function has a total of six parameters.) Some sample outputs are: 3 / 4 + 2 / 5 = 23 / 20 2 / 3 * 3 / 5 = 6 / 15 Your answer need not be in the lowest terms.

In: Computer Science

Define and implement class Course. This class should contain the following fields: course name, course description,...

Define and implement class Course. This class should contain the following fields: course name, course description, department, time the course starts, weekday the course is held on (for simplicity, let us assume the course only meets once a week). This class should contain getters and setters for all its attributes. This class also needs at least one constructor. Save this class and its definition into a file named Course.java.

Define and implement class Student. This class should contain the following fields: first name, last name, age, gpa, major, department, courses. Age should be an integer value. GPA should be a floating point value. Courses should be a linked list of Course variables. Class Student should contain getters and setters for all its attributes. This class also needs at least one constructor. In class Student implement the following methods: addCourse() to add a new course, removeCourse() to remove a course from this student, sortCourses() to print out a sorted list of courses. Method sortCourses() should accept parameters to specify whether the sorting should be ascending or descending and also based on which course attribute to sort the courses. The output should be printed to command line standard output. Save this class and its definition into a file named Student.java.

In: Computer Science

Configuring Mail services in Linux In this lab we will examine how to configure mail server...

Configuring Mail services in Linux

In this lab we will examine how to configure mail server (Sendmail, Dovecot and Spamassassin) services under Linux.

PART 1: Configuring the sendmail Mail Transport Agent (MTA) to provide Mail server services

Boot your system into the Fedora Linux server VM used in lab 3 to configure DNS and follow the procedure outlined below to configure your system as a Mail server using the sendmail MTA.

  • Log in as usual and make sure that the Ethernet (ens33) bridged network interface is enabled.
  • Since the sendmail packages are not installed by default on the system (to verify this type rpm -qa | grep sendmail at the command prompt), issue the command (as root)

dnf install sendmail sendmail-cf to install the latest versions of these packages.

  • Next, using the applet on the top right of the desktop, disable the Ethernet (ens33) interface (we do this to avoid having your ISP DNS server appear in the system configuration). Make sure the Ethernet (ens37) interface is configured with a static IP address as you did in part 1 of lab 3 (i.e. 192.168.100.10 with mask 255.255.255.0); also make sure that the DNS server address is set to 192.168.100.10 (i.e. the localhost). Turn off and re-enable the ens37 interface for the changes to take effect. If necessary, refer to lab 3 for details on configuring interface settings.
  • Make sure that the BIND DNS server configuration is completed as described in part 2 of lab 3. In addition, using the BIND configuration GUI, add an MX record entry to the nspdomN.local forward zone. To do this, right-click the nspdomN.local zone and select Add – MX Mail Exchange. In the MXMail Exchange window, enter the Mail Server Name as F24server.nspdomN.local. (including the trailing period, N is your unique number) and click OK. Click Save on the toolbar and then click Yes to save the changes you have made. Restart the DNS service by typing systemctl restart named.service.
  • To set up the Mail server we first have to configure the file /etc/mail/sendmail.mc (we do not want to edit the configuration file /etc/mail/sendmail.cf directly since errors in this file can create problems) and then start the service. Open a terminal window as root, and back up the existing configuration file by typing

cp /etc/mail/sendmail.mc /etc/mail/sendmail.mc.bak. Also, back up the sendmail.cf file using a similar command.

NOTE: Usually, the sendmail service is configured to start automatically at boot, so you only have to restart the service when making changes to the configuration files.

  • Using the gedit editor, edit the /etc/mail/sendmail.mc file and make the following changes:
  1. Change the domain name specified in the LOCAL_DOMAIN directive from localhost.localdomain to nspdomN.local (with no trailing period).

  1. The default configuration file does not allow sendmail to accept network connections from any other host other than the local computer. To configure sendmail as a server for other clients, completely remove the Addr=127.0.0.1 option of the DAEMON_OPTIONS directive.

NOTE: If you would like sendmail to accept connections from the local subnet only, you need to change the address in the Addr= option to the IP address of the ens8 interface (i.e. Addr=192.168.100.10). DO NOT MAKE THIS CHANGE!

  1. To have sendmail masquerade other host names on the network, so that their return address is [email protected] instead of [email protected] (this is useful when a single machine acts as a mail gateway for all machines on the network and assigns a consistent return address to all outgoing mail), uncomment (i.e. remove the letters dnl in front of) the MASQUERADE_AS directive, and change the name in this directive from mydomain.com to nspdomN.local. Also uncomment the lines FEATURE(masquerade_envelope) and FEATURE(masquerade_entire_domain) and add the directive MASQUERADE_DOMAIN(.nspdomN.local)dnl.

  1. DO NOT MAKE THIS CHANGE AS IT MAY PREVENT SENDMAIL FROM WORKING – JUST READ IT!

As configured by default, sendmail accepts e-mail from domains that it cannot resolve (and that may not exist). To turn this feature off and cut down the amount of spam you receive, add dnl to the beginning of the following line:

FEATURE(`accept_unresolvable_domains’)dnl

When this feature is off, sendmail uses DNS to look up the domains of all e-mails it receives. If it cannot resolve the domain, it rejects the e-mail.

NOTE: Please refer to page 743 – 752 in Sobell and chapter 10 of the Fedora 22 system administrator guide for more details.

  • Finally we need to specify which systems the local server relays e-mail for. To do this edit the file /etc/mail/access and add the line

Connect:192.168.100.                       RELAY

at the end of the file. This line will allow the server to relay outbound e-mail for all hosts on the local virtual subnet.

  • To enable and start the sendmail service enter the command systemctl enable sendmail.service followed by systemctl start sendmail.service.
  • The Mail server should now be functional. Test this by opening a terminal as user student and sending e-mail to the user itself. Type echo “my sendmail test” | /sbin/sendmail [email protected]

and then type less /var/spool/mail/student and scroll to the bottom of the file to see if the new message has been appended to the student mail spool file.

WHAT TO SUBMIT: Capture of system-config-bind GUI on Linux server showing MX record added. Capture of Linux server terminal window showing output of echo command above.

2 captures total.

In: Computer Science

Apply a “stepwise refi nement approach” to develop three different levels of procedural abstractions for one...

Apply a “stepwise refi nement approach” to develop three different levels of procedural abstractions for one or more of the following programs: (1) Develop a check writer that, given a numeric dollar amount, will print the amount in words normally required on a check. (2) Iteratively solve for the roots of a transcendental equation.

(3) Develop a simple task-scheduling algorithm for an operating system.

i need 3rd part solution because 1st 2 parts are already answerd.

In: Computer Science

* what are pseudocode and flowcharts and what are they used for? * how to interpret...

* what are pseudocode and flowcharts and what are they used for?

* how to interpret branching and looping logic?

* What is the difference between the two types of identifiers?

* What is the difference between two types of containers?

* what are functions and methods and what are they used for?

* what objects are?

In: Computer Science

JAVA PROGRAM Question : Design and implement two classes called InfixToPostfix and PostFixCalculator. The InfixToPrefix class...

JAVA PROGRAM

Question : Design and implement two classes called InfixToPostfix and PostFixCalculator. The InfixToPrefix class converts an infix expression to a postfix expression. The PostFixCalculator class evaluates a postfix expression. This means that the expressions will have already been converted into correct postfix form. Write a main method that prompts the user to enter an expression in the infix form, converts it into postfix, displays the postfix expression as well as it's evaluation. For simplicity, use only these operators, + , - , * , / and %.

I need help answering the programming question, not sure how this really functions. If you can please explain how it works with comments. Thank you I greatly appreciate the help.

In: Computer Science

1. In a few sentences, describe how the functionality of vApps would be useful in a...

1. In a few sentences, describe how the functionality of vApps would be useful in a multi-tier application.

In: Computer Science

In this lab, you will learn to read data from a sequential-access text file. To read...

In this lab, you will learn to read data from a sequential-access text file. To read data from a file, you need one FileStream object and one StreamReader object. The StreamReader object accepts the FileStream object as its argument.
To read data from a sequential-access text file, here's what you need to do:

  1. From the desktop, open Visual Studio 2017.
  2. From the menu bar, navigate to File > New > Project.
  3. In the New Project window, select Windows Forms App (.NET Framework).
  4. Type Name as StudentData and verify that the Solution name is automatically set as StudentData and click OK to create a new project with a textbox and button to open file information that contains student details.
  5. From the left side, navigate to Toolbox > All Windows Forms, drag Label and drop it on the blank area of the Form1 section.
  6. In the right pane, in the Properties side panel, under the Appearance section, remove the Text field's default value, i.e., label1.
  7. From the left side, navigate to Toolbox > All Windows Forms, drag Button, and drop it on the blank area of the Form1 section.
  8. In the right pane, in the Properties section, type Text as Open File.
  9. Double-click the Open File button.
  10. In the Form1.cs window, under using System.Windows.Forms, type the following code to include the System.IO library:Copy
    using System.IO;
  11. In the Form1.cs window, under private void button1_Click(object sender, EventArgs e), type the following code to declare and define an object, obtain a path for the text file, and display the file name encoded to UTF8 as output:Copy
     
    1. OpenFileDialog openFileDialog1 = new OpenFileDialog();
    2. openFileDialog1.ShowDialog();
    3. String file_name = openFileDialog1.FileName;
    4. string text = File.ReadAllText(@file_name, Encoding.UTF8);
    5. label1.Text = text;
  12. From the menu bar, navigate to Debug > Start Without Debugging and wait for the Form1 window to appear.
  13. In the Form1 window, click Open File.
  14. In the Open window, in the left pane, navigate to Local Disk (C:), select (say) the ip.txt file and click Open. You will see the file name encoded to UTF8.
  15. Close all the windows.

In: Computer Science

IN MIPS ASSEMBLY LANGUAGE Write an assembly program to read three 32-bit signed integers from the...

IN MIPS ASSEMBLY LANGUAGE

Write an assembly program to read three 32-bit signed integers from the user. Determine the smallest of these three numbers and display this result. Don’t use loops. Prompt the user for each entered integer.

Your output should look something like the following example.

Enter an integer: 7556

Enter an integer: -22984

Enter an integer: 8875

-22984

In: Computer Science

Question 1: As you know that “the base address or the starting address of any array...

Question 1: As you know that “the base address or the starting address of any array is its name”. Keeping this information, answer

a. Why the first index of any array always starts from zero. Although it points to the first location of an array.

b. The reason why the last index is always one less than array length is “the first index starts from zero”. Does it seems to be a correct reason justify.

c. What is the offset address of any array NAMED AS ARR1 who starting address is A011234h.

d Can you find the offset address of the 6th element of array given in 3? If its data type is INT.

e. What is the offset address of last element of an array stated in 3? If the length of array is 5 and data type is char.

Kindly solve the complete Questions with all parts......

In: Computer Science

who to write a program c++ that reads in an integer between 0 and 1000 and...

who to write a program c++ that reads in an integer between 0 and 1000 and adds all the digits in the integer?

In: Computer Science

Write a program in python that counts the number of words in President Abraham Lincoln’s Gettysburg...

Write a program in python that counts the number of words in President Abraham Lincoln’s Gettysburg Address from the file provided. Replace all instances of "nation" with country, and all instances of "we" with "Americans". Write the revised address to a new file

its for a txt file

In: Computer Science

javascritp Gallery On the gallery page, include a JavaScript driven photo gallery with at least five...

javascritp

Gallery On the gallery page, include a JavaScript driven photo gallery with at least five (5) images of original work (web pages screen shots, photographs, illustrations, etc) that you have created. The photo gallery must have previous and next buttons to change the image being displayed. Images must wrap to the first image when the next button is clicked while the last image is being displayed. Similarly, images must wrap to the last image when the previous button is clicked while the first image is being displayed. The next image must be displayed after five (5) seconds if the user has not clicked the next button. Use gallery.html as the filename for the Gallery page.

In: Computer Science

Please no plagiarism and must be in your own 800 words. Discuss the company, its approach...

Please no plagiarism and must be in your own 800 words.

Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence

In: Computer Science