Questions
Write a java program: Write a nested loop program creating an array list of three positions.  The...

Write a java program:

Write a nested loop program creating an array list of three positions.  The first loop terminates with a sentinel value of which user is prompted for input to continue of quit.   Inside loop to enter in each position a prompted input of person's first name.  After the inside loop, edit the second array location making its value "Boston". Print the array's contents.

In: Computer Science

Sorting (quick) Sort the array using quick sort. Write the array content after each pass (i.e.,...

Sorting (quick)

Sort the array using quick sort. Write the array content after each pass (i.e., from pass 1 to pass 7). Each pass is defined as the completion of one partition. We always pick the first array element as the pivot for each partition.

In: Computer Science

In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several...

In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several Normal forms that are used in database 1NF, 2NF, BCNF etc.

The term functional dependency is very important in NF. Multivalued attributes, Atomicity property etc. plays important role in NF

Action Items

  • You are requested to:
    • Submit 1NF and 2NF examples with explanation.
    • Discuss one of the following:
      • Discuss the need of Normal Forms.
  • Discuss and explain why we need 2NF.
  • Discuss the drawback of 1NF.
  • Discuss Atomicity and multivalued attribute
  • Discuss functional dependency
  • All students have to participate at least twice in the discussions.

In: Computer Science

This program (in python) will display a set of authors and the number of novels written...

This program (in python) will display a set of authors and the number of novels written by each author in both a table and a histogram. You will ask the user for all of the information. Using what you learned about incremental development, use the following approach to create your program:

  1. Prompt the user for the information about the table. First, ask for the title of this data set by prompting the user for a title for data. Output the title.

    Ex:
Enter a title for the data:
Number of Novels Authored
You entered: Number of Novels Authored
  1. The table will have two columns; one for the authors and one for the number of novels. Prompt the user for the headers of two columns of the table. Output the column headers.

    Ex:
Enter the column 1 header:
Author name
You entered: Author name

Enter the column 2 header:
Number of novels
You entered: Number of novels
  1. Prompt the user for data points. Data points must be in this format: string, int, representing the author and the number of novels written by the author. Store the information before the comma into a string variable and the information after the comma into an integer. The user will enter -1 when they have finished entering data points. Output the data points. Store the string components of the data points in a list of strings. Store the integer components of the data points in a list of integers.

    Ex:
Enter a data point (-1 to stop input):
Jane Austen, 6
Author: Jane Austen
Number of Novel(s): 6
  1. Perform error checking for the data point entries as follows:
  • If entry has no comma and is not -1
  • Output: Error: No comma in string.

If the error occurs, output the appropriate error message and prompt again for a valid data point. You can assume that if a comma is present, then the data point is entered correctly.
Ex:

Enter a data point (-1 to stop input):
Ernest Hemingway 9
Error: No comma in string.

Enter a data point (-1 to stop input):
Ernest Hemingway, 9
Author: Ernest Hemingway
Number of Novel(s): 9
  1. Output the information in a formatted table. The title is right justified with a minimum field width value of 33. Column 1 has a minimum field width value of 20. Column 2 has a minimum field width value of 23.

    Ex:
        Number of Novels Authored
Author name         |       Number of novels
--------------------------------------------
Jane Austen         |                      6
Charles Dickens     |                     20
Ernest Hemingway    |                      9
Jack Kerouac        |                     22
F. Scott Fitzgerald |                      8
Mary Shelley        |                      7
Charlotte Bronte    |                      5
Mark Twain          |                     11
Agatha Christie     |                     73
Ian Flemming        |                     14
J.K. Rowling        |                     14
Stephen King        |                     54
Oscar Wilde         |                      1
  1. Output the information as a formatted histogram. Each name is right justified with a minimum field width value of 20.

    Ex:
         Jane Austen ******
     Charles Dickens ********************
    Ernest Hemingway *********
        Jack Kerouac **********************
 F. Scott Fitzgerald ********
        Mary Shelley *******
    Charlotte Bronte *****
          Mark Twain ***********
     Agatha Christie *************************************************************************
        Ian Flemming **************
        J.K. Rowling **************
        Stephen King ******************************************************
         Oscar Wilde *

For this program, you can assume that the user will not enter duplicate author names

In: Computer Science

When we look at cloud usage the categories can include some of but is not limited...

When we look at cloud usage the categories can include some of but is not limited to following:

·          SaaS: Software as a Service

·          PaaS: Platform as a Service

·          IaaS: Infrastructure as a Service

·          MaaS: Monitoring as a Service

Research cloud computing. Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:

·          Describe at least 3 types of cloud computing service categories

·          What are the architecture considerations?

·          Give details of the function of the service with an example

·          What are the advantages and disadvantages of the service?

·          What are the security risk and protection considerations?

·          Do you see any impact on availability and performance?

Specific questions or items to address:

·          Describe at least 3 types of cloud computing service categories

·          What are the architecture considerations?

·          Give details of the function of the service with an example

·          What are the advantages and disadvantages of the service?

·          What are the security risk and protection considerations?

·          Do you see any impact on availability and performance?

In: Computer Science

Write a C++ program to explain the following concepts 1.Data hiding 2.Information hiding 3.Proxy class (solve...

Write a C++ program to explain the following concepts

1.Data hiding

2.Information hiding

3.Proxy class

(solve fast)

In: Computer Science

Latitude and Longitude are the two components used to exactly identify a specific spot on the...

Latitude and Longitude are the two components used to exactly identify a specific spot on the Earth. Latitude provides the North/South direction and runs from 90 degrees north at the north poll to -90 degrees south at the south poll. The equator has a Latitude of zero.

Longitude provides the East/West direction and runs from the Prime Meridian that runs through Greenwich, England and has a Longitude of zero. Longitudes then run negatively to the west and positively to the east with the maximum Longitude being 180 degrees (or -180 degrees. They are the same Longitude.)

Usually Latitude and Longitude are usually depicted in degrees, minutes and second, but they can also be represented with just real numbers, which is how your class will need to be written. (FYI Lake Worth has a 26.61353 latitude and -80.057458)

Your assignment is to create a class called locCoordinates with the following properties and methods:

class locCoordinates

{

private:

            double latitude;

            double longitude;

            string location;

public:

            locCoordinates();

            bool set(double, double, string)

            bool setLatitude(double);

            bool setLongitude(double);

            void setLocation(string);

            double getLatitude();

            double getLongitude();

            string getLocation();

            void moveUpDown (double, string);

            void moveLeftRight (double, string);

            void move (double, double, string);

            void print();

}

And here are the specifics for this class.

The constructor should set the latitude and longitude to zero, and the location to "Prime Meridian at Equator). It should not accept any parameters (and should not call the set function).

The set function will take the two numbers entered (latitude then longitude) and ensure they are correct. If either of the numbers are not within the correct range, then the location should be set to "Error", the value of the invalid entry should be set to zero and the function return a false. If everything is good it returns a true.

setLatitude will change the current value of Latitude. It also needs to check to make sure that it is a good latitude. If not correct the function should set the Latitude to zero and return false otherwise return true. In either case, the Location should be changed to "Unknown".

setLongitude does what setLatitude does, only to the Longitude.

setLocation just updates the location string in the class.

The gets return the values in the properties.

moveUpDown will pass in a double that may be either negative or positive. This value needs to be adjusted for the number of total degrees in the latitude, and then the latitude adjusted by that amount. The location would then also be updated.

moveEastWest does just like moveUpDown, but does it for Longitude.

move takes both a change in Latitude and Longitude and applies them along with setting the new location. (If I were coding this, I would probably just call moveUpDown and moveEastWest to do the work!!)

print will print out:

            Latitude: 99.99999, Longitude: 999.99999 is at location: XXXXXX

You can implement this any way you want either by creating separate class header and implementation files, or by just putting everything in one big ole file with a main routine after the class definition. In the main routine, please set up a location with a bad input and show that a false is returned, then set one up with good input. Then use the move command to adjust the coordinates by an amount above 90 (or below -90) for latitude and above 180 (or below -180) for longitude. Then use the print function to print out the results.

I need help it C++

In: Computer Science

- Make a table which shows the difference between the security features and functionalities of windows...

- Make a table which shows the difference between the security features and functionalities of windows server 2016 and windows server 2012 and which one is more secure

PLEASE USE YOUR OWN WORDS!!

In: Computer Science

Sorting (merge) Sort the array (as in Part 2) using merge sort. Write the array content...

Sorting (merge)

Sort the array (as in Part 2) using merge sort. Write the array content after each pass (i.e., from pass 1 to pass 9). Each pass is defined as the completion of one merge operation.

Suppose an array contains the following integers: -1, 20, 10, -5, 0, -7, 100, -7, 30, -10. Sort the array using the following algorithms: selection sort, bubble sort, and insertion sort. For each algorithm, write the array content after each pass (i.e., from pass 1 to pass 9). Each pass is defined as one iteration of the outer loop. There are total of n − 1 passes, where n is the array size.

In: Computer Science

Using a suitable Venn diagram, describe the relationship between NP, NP-Hard, and NP-Complete problems from

Using a suitable Venn diagram, describe the relationship between NP, NP-Hard, and NP-Complete problems from

In: Computer Science

Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in...

Subject: Introduction to Cyber Security

Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words.

  1. Explain how that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks.. Discuss how operationally, the security engineer performs threat and vulnerability assessments to identify security risks, and then regularly updates the security controls identified through those assessments.Examine the tools needed by a digital forensics professional to collect digital evidence and write a brief 250 word report

In: Computer Science

In JAVA, write a number guessing game that randomly assigns a integer between one and twenty...

In JAVA, write a number guessing game that randomly assigns a integer between one and twenty for the user to guess.

Write three methods to make this particular program work.

1. Have a method which generates a random number and returns the value to the main (stored as a variable)

2. Have a method which prompts the user for a guess. Return the guess to the main.

3. Evaluate the guess and the random "secret" number by parameters, and then have it evaluate if the guess is correct. RETURN A STRING to let the user know if the guess was correct, too high, or too low.

Use a nested loop in main. Ask the user if they would like to play again. Use an inner loop that continually calls the third method until the guess is correct.

In: Computer Science

Need Java Code and UML Design for the following program: Use the Account class created above...

Need Java Code and UML Design for the following program:

Use the Account class created above to simulate an ATM machine. Create five accounts in an array with id 0, 1, ..., 4, and initial balance $100. The system prompts the user to enter an id. If the id is entered incorrectly, ask the user to enter a correct id. Once an id is accepted, the main menu is displayed as shown in the sample run (see below). You can enter a choice 1 for viewing the current balance, 2 for withdrawing money, 3 for depositing money, and 4 for exiting the main menu. Once you exit, the system will prompt for an id again. Thus, once the system starts, the ATM machine will not stop.

Sample run of the ATM machine is as follows: Enter an id to start transactions: 4

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 100.0

Main menu
1: check balance 2: withdraw

3: deposit
4: exit
Enter a choice: 2
Enter an amount to withdraw: 3

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 97.0

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 3
Enter an amount to deposit: 10

Main menu
1: check balance
2: withdraw
3: deposit
4: exit
Enter a choice: 1 The balance is 107.0

Main menu
1: check balance 2: withdraw
3: deposit
4: exit
Enter a choice: 4

Enter an id to start transactions:

In: Computer Science

I've updated this as much as I can think of. This is a PYTHON problem that...

I've updated this as much as I can think of. This is a PYTHON problem that is due today. Please help. I'm trying to read names from a file that begin with @ and print them to another file. It will also read multiple lines of sales amounts for each name and write them and then total them with the end being ***END*** at the bottom of each person's figures and total. I am supposed to write a try and except to insert as well if the numbers aren't actual numbers. Trying to make it a float or produce an error message.

def main():
PRE = '@'
SEP = '***END***\n'

inputFile = open(\r'C:\Users\Trey\Desktop\Programming\good.txt', 'r')
outputFile = open(\r'C:\Users\Trey\Desktop\Programming\goodTrey.txt', 'w')
  
for line in inputFile:
amount = 0
if inputFile.startswith(PRE):
outputfile.write(' ',line)
elif:
amount = float(line)
outputfile.write('$'{:,.2f}.format(amount),'\n')
else:
inputFile.startswith(SEP):
total += amount
outputfile.write('$'{:,.2f}.format(total),'\n', '***END***\n')
# close the files
inputFile.close()
outputFile.close()
  
#call the main function   
main()

In: Computer Science

2) [9point] The following can be solved greedily. You are given a set of posters with...

2) [9point] The following can be solved greedily.

You are given a set of posters with a limited number of types. You want to make a

symmetrical display with the posters.You also want the tallest posters in the middle. All

posters have the same width. Can you make the display symmetrical, and if so,

what is the largest symmetrical display you can make with the tallest posters in the middle?

a. [3 points] What is the optimal substructure for placement?

b.[3 points] What is the greedy property? That is, what is your rule for selecting where a picture goes?

c.[3 points] Prove the correctness of your algorithm by proof of contradiction.

In: Computer Science