Compute 20191023 mod 7 without using calculator. Show every step.
In: Computer Science
A security analyst is reviewing an endpoint mat was found to have a rootkit installed. The root kit survived multiple attempts to clean the endpoint as well as an attempt to reinstall the OS. The security analyst needs to implement a method to prevent other endpoints from having similar issues. Which of the following would BEST accomplish this objective?
Utilize measured boot attestation
Enforce the secure boot process
Reset the motherboard's TPM chip
Reinstall the OS with Known-good media
Configure custom anti malware rules
In: Computer Science
Calculate the following issues in bit-level (signed values, two complement arithmetics)
a) 13 + 9 (use word lengths of 5 and 6 bits including the sign bit)
b) 11 – 17 (8-bit word length)
c) 9 * 5 (8-bit word length)
d) a-task using saturative arithmetics
In: Computer Science
Using pseudocode, write the code that will perform the necessary file operations as described in the short scenario below:
“During registration at a college, student’s details will be captured by a staff member and written to a file called “studentDetails.dat”. The following student details will be captured: name, surname, studentNumber, registeredCourse. The staff member will be prompted for the student details. After every record added to the file, the staff member will be asked whether they would like to add another record. If they choose not to add another record, the program should end.”
In: Computer Science
Write a PYTHON program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The name will be a local variable. The program should display a letter grade for each score, and the average test score, along with the student's name.
Write the following functions in the program: calc_average - this function should accept 8 test scores as arguments and return the average of the scores per student.
determine_grade - this function should accept a test score average as an argument and return a letter grade for the score based on the following grading scale: 90-100 A 80-89 B 70-79 C 60-69 D Below 60 F.
In: Computer Science
Situation
The ABC team will unveil their latest and greatest product, The
FoodieX. The
FoodieX is a mobile application for food delivery from across the
city and
nearby neighborhoods. This application will be used by our company
to enjoy
food without the concern of going to the restaurant. Your job is to
manage the
IT Infrastructure for the staff running the application that has
approximately 20
people and ensure infrastructure continuity so they are able to
safely launch
The FoodieX.
Your Task
Your supervisor is sending you onsite! Before sending you onsite to
complete
the tasks, your supervisor wants to review your plan of attack and
review any
questions you have for them.
The current IT infrastructure has some dated hardware and your
supervisor
has been leaning towards a Ubiquiti stack. During the previous
onsite, your
supervisor noticed there were issues with the firmware and that
these systems
were not backed up.
Develop a plan on how you will implement the Ubiquiti Firewall and
Switches
and back up their systems.
Your plan should include any planned communication with the client,
the
outline of steps to be taken, risk assessment/rollback strategy,
and questions
for your supervisor
In: Computer Science
Design an FIR filter using the fixed window-based method. Use the following high pass filter requirements:
δp = 0.2 dB
δs = − 30 dB
fs = 3000 Hz
f p = 5000 Hz
The sampling frequency is 10000 Hz
Select the optimal fixed window type for the calculations. Present the number of coefficients and the coefficient values of the impulse response of the specified filter
In: Computer Science
Fix the following codes in JAVA so they can work :
public class GeometricObject {
private String color = "white";
private boolean filled;
private java.util.Date dateCreated;
public GeometricObject1() {
dateCreated = new java.util.Date();
}
public GeometricObject1(String Color, boolean filled) {
dateCreated = new java.util.Date();
this.color = color;
this.filled = filled;
}
public String getColor() {
return color;
}
public void setColor(String color) {
this.color = color;
}
public boolean isFilled() {
return filled;
}
public void setFilled(boolean filled) {
this.filled = filled;
}
public java.util.Date getDateCreated() {
return dateCreated;
}
public String toString() {
return "created on " + dateCreated + "\ncolor: " + color +
" and filled: " + filled;
}
}
public class Rectangle extends GeometricObject {
private double width;
private double height;
public Rectangle1() {
}
public Rectangle(double width, double height) {
this.width = width;
this.height = height;
}
public Rectangle(double width, double height, String color,
boolean filled) {
this.width = width;
this.height = height;
setColor(color);
setFilled(filled);
}
public double getWidth() {
return width;
}
public void setWidth(double width) {
this.width = width;
}
public double getHeight() {
return height;
}
public void setHeight(double height) {
this.height = height;
}
public double getArea() {
return width * height;
}
public double getPerimeter() {
return 2 * (width + height);
}
}
public class TestCircleRectangle {
public static void main(String[] args) {
Circle4 circle = new Circle4(1);
System.out.println("A circle " + circle.toString());
System.out.println("The radius is " + circle.getRadius());
System.out.println("The area is " + circle.getArea());
System.out.println("The diameter is " +
circle.getDiameter());
Rectangle1 rectangle = new Rectangle(2, 4);
System.out.println("\nA rectangle " + rectangle.toString());
System.out.println("The area is " + rectangle.getArea());
System.out.println("The perimeter is " +
rectangle.getPerimeter());
}
}
public class Rectangle extends GeometricObject {
private double width;
private double height;
public Rectangle1() {
}
public Rectangle(double width, double height) {
this.width = width;
this.height = height;
}
public Rectangle(double width, double height, String color,
boolean filled) {
this.width = width;
this.height = height;
setColor(color);
setFilled(filled);
}
public double getWidth() {
return width;
}
public void setWidth(double width) {
this.width = width;
}
public double getHeight() {
return height;
}
public void setHeight(double height) {
this.height = height;
}
public double getArea() {
return width * height;
}
public double getPerimeter() {
return 2 * (width + height);
}
}
public class TestCircleRectangle {
public static void main(String[] args) {
Circle4 circle = new Circle4(1);
System.out.println("A circle " + circle.toString());
System.out.println("The radius is " + circle.getRadius());
System.out.println("The area is " + circle.getArea());
System.out.println("The diameter is " +
circle.getDiameter());
Rectangle1 rectangle = new Rectangle(2, 4);
System.out.println("\nA rectangle " + rectangle.toString());
System.out.println("The area is " + rectangle.getArea());
System.out.println("The perimeter is " +
rectangle.getPerimeter());
}
}
public class Circle4 extends GeometricObject {
private double radius;
public Circle4() {
}
public Circle4(double radius) {
super();
this.radius = radius;
}
public Circle4(double radius, String color, boolean filled) {
super(color, filled);
this.radius = radius;
//setColor(color);
//setFilled(filled);
}
public double getRadius() {
return radius;
}
public void setRadius(double radius) {
this.radius = radius;
}
public double getArea() {
return radius * radius * Math.PI;
}
public double getDiameter() {
return 2 * radius;
}
public double getPerimeter() {
return 2 * radius * Math.PI;
}
public void printCircle() {
System.out.println(toString() + "The circle is created " +
getDateCreated() +
" and the radius is " + radius);
}
public String toString() {
return "Circle WWWW " + getColor() + super.toString();
}
}
In: Computer Science
Pick three security concerns of database system and explain how you would address them.
In: Computer Science
1. Please convert the following decimal numbers to 8-bit binary sign magnitude and to 8-bit 2’s complement. Please show your work if there are multiple steps. Sign Magnitude 2’s complement a. +67 b. +40 c. -28 d. -40
In: Computer Science
Set the random number Pythonlist to variable x and write the code according to the items below.
(1)Write a code to find the second largest element among List x Element.
(ex.x=[4,4,2,1]->2,x=[5,4,3,1]-4)4)
(2)Write a code to find elements that appear only once in a while.
(ex.x=[4,4,2,1]->[2,1],x=[5,4,3,1]=>[5,4,3,1])
(3)Write a code that generates a list of the frequency of elements for each element of Listx.
(ex.x=[4,4,2,1]->y=[2,2,2,1,1],x=[5,4,3,1]->y=[1,1,1,1])
(4)Write a code to find the value that comes to the center of the list in descending order among the listx members. (*If the number of lists is even, suggest the average value of the two values that come to the center.)
(ex.x=[4,4,2,1]->3=(4+2)/2,x=[5,4,2,1,0]->2)
I am currently using Python and I am a beginner of Python. Tell me the detailed code for the questions (1), (2), (3) and (4).
In: Computer Science
To address database failure (if the system crashes), what type of redundancy would you recommend to address this?
In: Computer Science
if (M <= N + 3 && (C == ‘N’ || C == ‘n’))
C = ‘0’;
else
C = ‘1’;
Assume that M and N are 32-bit signed integer variables, and C is an 8-bit ASCII character variable. All variables are stored in memory, and all general-purpose registers are available for use.
In: Computer Science
how to write a function that clears every pixel and sets it to the Red color. similarly, we have to open the image including height and width and use while loop that accesses each pixel in Python
In: Computer Science
In: Computer Science