Questions
acos() Prototype double acos(double x); To find arc cosine of type int, float or long double,...

acos() Prototype

double acos(double x);

To find arc cosine of type int, float or long double, you can explicitly convert the type to double using cast operator.

 int x = 0;
 double result;
 result = acos(double(x));
 int x = 0;
 double result;
 result = acos(double(x));

acos() Parameter

The acos() function takes a single argument in the range of [-1, +1]. It's because the value of cosine is in the range of 1 and -1.

Parameter Description
double value Required. A double value between - 1 and +1 inclusive.

acos() Return Value

The acos() functions returns the value in range of [0.0, π] in radians. If the parameter passed to the acos() function is less than -1 or greater than 1, the function returns NaN (not a number).

Parameter (x) Return Value
x = [-1, +1] [0, π] in radians
-1 > x or x > 1 NaN (not a number)

Example 1: acos() function with different parameters

#include <stdio.h>
#include <math.h>

int main() {
    // constant PI is defined
    const double PI =  3.1415926;
    double x, result;

    x =  -0.5;
    result = acos(x);
    printf("Inverse of cos(%.2f) = %.2lf in radians\n", x, result);

    // converting radians to degree
    result = acos(x)*180/PI;
    printf("Inverse of cos(%.2f) = %.2lf in degrees\n", x, result);

    // paramter not in range
    x = 1.2;
    result = acos(x);
    printf("Inverse of cos(%.2f) = %.2lf", x, result);

    return 0;
}

Output

Inverse of cos(-0.50) = 2.09 in radians
Inverse of cos(-0.50) = 120.00 in degrees
Inverse of cos(1.20) = nan

give an example of (math.h) function from the c language library and explain

1- prototype

2-input type (parameters)

3-output or return type

4- number of arguments/parameters

5- example

In: Computer Science

This assignment involves developing a program that prompts the user to enter a series of 10...

This assignment involves developing a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and smallest values entered.

Your solution must use at least the following variables: counter: A counter to count how many integers were entered

a Number: The integer most recently input by the user,

smallest: The smallest number entered so far, largest: The largest number entered so far.

Write three separate programs for this assignment:

Name the first program HiLoWhile and use a while construct in the solution.

Name the second program HiLoFor and use a for construct in the solution.

Name the third program HiLoDoWhile and use a do-while construct in the solution.

Write the pseudocode for ONLY the HiLoWhile program.

IN JAVA

In: Computer Science

Many dog owners see the benefit of buying natural dog food and treats. Dog Day Afternoon...

Many dog owners see the benefit of buying natural dog food and treats. Dog Day Afternoon is a local company that creates its own dog food and treats. Their products are made locally and with natural ingredients. Sales are up and the owners of Dog Day Afternoon have decided to expand their business. Currently they are manually calculating sales. They need a computer program to help speed up the process.

The owners of Dog Day Afternoon decided to get some help. They approached the Career Center and posted numerous temporary programming positions. You are eager to get some experience as a programmer so you apply and get the job.

Your portion of the project is to create a class called DogDay that will take in the quantity and the size of the dog treat. Store these values in attributes called quantity (integer) and size (string). The class will also contain three methods. One method will determine the cost of one dog bone. Name this method DeterminePrice. The cost of the different size natural raw hide bones is as follows:

  • Size A = $2.29
  • Size B = $3.50
  • Size C = $4.95
  • Size D = $7.00
  • Size E = $9.95

Store the cost of each individual dog bone in an attribute called price.

Your second method will be called DetermineTotal. This method will calculate the total cost (quantity * cost) and round this value to 2 decimal places. It will store this value in an attribute called total.

Your final method will return the total.

When creating this class start coding in VS Code or IDLE. To test your class create an object. Send in the values 6 and C. Next call your method DeterminePrice followed by DetermineTotal. Finally print the method ReturnTotal to the screen. Your code should print the following: 29.7

In: Computer Science

Suppose internet data in hex is 99 f5 44 27 23 96 e3 4f. Calculate internet...

Suppose internet data in hex is 99 f5 44 27 23 96 e3 4f. Calculate internet checksum.

You need to show steps and write answer here

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

, you are required to determine the main business requirements; consequently, the following must be included:

  • List the functional and nonfunctional business requirements for the system. (1 mark)
  • Create Use Cases(1 mark)
  • Model Processes (Data Flow Diagramming)(1 mark)
  • Model data (ER modeling)(1 mark)

In: Computer Science

Database systems and Information systems An information system performs three sets of services: It provides for...

Database systems and Information systems

An information system performs three sets of services:

  • It provides for data collection, storage, and retrieval.
  • It facilitates the transformation of data into information.
  • It provides the tools and conditions to manage both data and information.

Basically, a database is a fact (data) repository that serves an information system. If the database is designed poorly, one can hardly expect that the data/information transformation will be successful, nor is it reasonable to expect efficient and capable management of data and information.

The transformation of data into information is accomplished through application programs. It is impossible to produce good information from poor data; and, no matter how sophisticated the application programs are, it is impossible to use good application programs to overcome the effects of bad database design. In short: Good database design is the foundation of a successful information system.

Database design must yield a database that:

  • Does not fall prey to uncontrolled data duplication, thus preventing data anomalies and the attendant lack of data integrity.
  • Is efficient in its provision of data access.
  • Serves the needs of the information system.

The last point deserves emphasis: even the best-designed database lacks value if it fails to meet information system objectives. In short, good database designers must pay close attention to the information system requirements.

Systems design and database design are usually tightly intertwined and are often performed in parallel. Therefore, database and systems designers must cooperate and coordinate to yield the best possible information system.  

The SDLC traces the history (life cycle) of an information system. The DBLC traces the history (life cycle) of a database system. Since we know that the database serves the information system, it is not surprising that the two life cycles conform to the same basic phases.

There are two basic approaches to database design: top‑down and bottom‑up.

Top‑down design begins by identifying the different entity types and the definition of each entity's attributes. In other words, top‑down design:

  • starts by defining the required data sets and then
  • defines the data elements for each of those data sets.

Bottom‑up design:

  • first defines the required attributes and then
  • groups the attributes to form entities.

Although the two methodologies tend to be complementary, database designers who deal with small databases with relatively few entities, attributes, and transactions tend to emphasize the bottom‑up approach. Database designers who deal with large, complex databases usually find that a primarily top‑down design approach is more appropriate.

Even if a generally top‑down approach is selected, the normalization process that revises existing table structures is (inevitably) a bottom‑up technique. E-R models constitute a top-down process even if the selection of attributes and entities may be described as bottom-up. Since both the E-R model and normalization techniques form the basis for most designs, the top‑down vs. bottom-up debate may be based on a distinction without a difference.  

Assignment

Write two to three paragraphs answering each of the following questions:

  • What are business rules? Why are they important to a database designer?
  • What is the data dictionary's function in database design?
  • What factors are important in a DBMS software selection?

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

Under this section, include the following:

  • Select an architecture Design(1 mark)
  • Provide the type of the Using Data Storage Design(1 mark)

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

  • Project identification (Project Title, Project Description precisely stating the Core Problem to be solved, Primary Customer and Stakeholders)(1 mark)
  • Feasibility studies (Technical Feasibility, Economic Feasibility and Organizational Feasibility)(1 mark)
  • Adopt an SDLC development methodology(1 mark)
  • List the Tasks to be Performed and Develop a Work Plan (Gantt Chart) (1 mark)

In: Computer Science

Read Chapter One of David Brin's The Transparent Society. What is the effective difference between Brin's...

Read Chapter One of David Brin's The Transparent Society.

  1. What is the effective difference between Brin's "City Number One" and "City Number Two"? Think in terms of civil liberties. A description of how these two cities work is not enough, you must tell me about civil liberties.

In: Computer Science

36. A junior Linux administrator is performing version control on a Git repository. The administrator is...

36. A junior Linux administrator is performing version control on a Git repository. The administrator is given a list of tasks to complete:
• List the currently installed Git release.
• Show the status reporting on the clone.
Which of the following commands would allow the administrator to complete these tasks? (Select TWO).
A. git clone --progress
B. git clone --recursive
C. git --help
D. git clone --dissociate
E. git --version
F. git clone –shared


37. A company wants to provide internal identity verification services for networked devices. Which of the following should be installed?
A. SSH
B. VPN
C. CA
D. DCHP
E. DNS


38. A system administrator wants to disable the Linux Watchdog Timer Driver for security purposes. Which of the following will accomplish this task?
A. Add blacklist watchdog to the /etc/modprobe.d/blacklist file.
B. Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.
C. Remove the watchdog=1 from the /usr/modules/watchdog.conf file.
D. Add watchdog=0 to the /etc/modprobe.conf file.


39. Ann, a user has created a new directory and noticed that permissions on the new directory are as follows:
drwx------. 1 ann ann 0 Jun 11 08:20 work
Which of the following should the administrator do to restore default permissions for newly created directories?
A. Change unmask value in /etc/profile.
B. Run chmod command to update permissions.
C. Modify directory ownership to ann:ann with chown.
D. Execute chattr command to restore default access.


40. A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?
A. /etc/services
B. /etc/issue
C. /etc/hosts
D. /etc/mood

In: Computer Science

____________(str) is the function to run in the shell to find out details about how to...

____________(str) is the function to run in the shell to find out details about how to use str() and the type of data it accepts and returns.

In: Computer Science

Question 6 Advise the company on where to place the shared printer in the offices that...

Question 6

Advise the company on where to place the shared printer in the offices that they have retained from their lease agreement. What are the possible problems that can occur if a printer is not set up in the correct space and not managed correctly?

In: Computer Science

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of...

You will conduct a systems analysis project ( car rentals ) by performing 3 phases of SDLC (planning, analysis and design) for a small (real or imaginary) organization. ( car rentals )The actual project implementation is not required (i.e. No coding required.)

This project should follow the main steps of the first three phases of the SDLC (phase 1, 2 and 3). Details description and diagrams should be included in each phase.

my part that i need help in it :

, you are required to determine the main business requirements; consequently, the following must be included:

  • List the functional and nonfunctional business requirements for the system. (1 mark)
  • Create Use Cases(1 mark)
  • Model Processes (Data Flow Diagramming)(1 mark)
  • Model data (ER modeling)(1 mark)

In: Computer Science

What factors should you consider before determining whether your presentation should be posted online? Is your...

What factors should you consider before determining whether your presentation should be posted online? Is your material copyrighted? Can you prevent others from using your material without authorization?

In: Computer Science

Write and Compile a python script to solve the 4-queens problem using Forward Checking algorithm ....

Write and Compile a python script to solve the 4-queens problem using Forward Checking algorithm . The code should allow for random starting, and for placed starting. Random Starting means randomly place a queen position on the chessboard. Placed Starting means asked for the user input to place a queen position on the chessboard. Display the iterations until the final solution

"The 4-Queens Problem[1] consists in placing four queens on a 4 x 4 chessboard so that no two queens can capture each other. That is, no two queens are allowed to be placed on the same row, the same column or the same diagonal."

Display the output of the python Script

In: Computer Science