What are the major technical reviews and audits affecting software and system, the System Engineering team is responsible? Discuss any two
No screenshot
In: Computer Science
----------------
Exercise 2: String Permutations
----------------
Create a program that takes a string from the command line and prints every permutation of that string. You may assume the string will contain all unique characters. You may print the permutations in any order, as long as you print them all.
----------------
Output:
----------------
$>./prog dog d do dog dg dgo o od odg og ogd g gd gdo go god
----------------
I need help on this exercise that requires recursion only. I need main.cpp, makefile, Executive.cpp, and Executive.h files for this exercise, and I have no idea how to code this recursive exercise. So, will someone help me on this exercise?
In: Computer Science
What potential security problems do you see in the increasing use of e-banking in business? What might be done to solve such problems? provide examples. *
In: Computer Science
Assembly language - please post with output
Question:
Using the AddTwo program from class lecture as a reference, write a
program that calculates the following expression, using registers:
A = (A + B) - (C + D). Assign integer values to the EAX, EBX, ECX,
and EDX registers.
In: Computer Science
2. Write a description of Senior Management in an Organization. What are the different roles and responsibilities of senior management?
In: Computer Science
Visual Basic
Make a directory and copy some files from desktop to the created directory
In: Computer Science
How do you make a prediction from a decision tree using confusionMatrix function in rstudio?
In: Computer Science
In python and comments your code :
Exercise 1
1.Write a function waiting for two matrices and returning their
addition, −1 if it is not not possible.
2. Write a function associated with a matrix and a scalar and
returning the produced matrix.
3. Write a function accompanying an n × m matrix and a vector n and
returning the vector produced by each other, −1 if this is not
possible.
4. Write a function accompanying two n × m and m × k matrices and
returning the product matrix, −1 if this is not possible.
5.Write a function waiting for a vector (column or row) and
returning its transpose.
Exercise 2
1.Write a function waiting for a 2 × 2 matrix and calculating
its determinant.
2. Write a function waiting for a matrix A of size n × m and two
integers i and j and rendering a matrix (n − 1) × (m − 1), copy the
matrix A without row i and column j .
3. Write a determining function of a square matrix by expanding on
a line.
In: Computer Science
I need a paragraph on what the Gherkin language is. What is it used for? How do we use it? What are the good and bad things about it?
In: Computer Science
A friend of yours is new to computing, and he has learned that you are pursuing a CIS degree. He asked you about the meaning of a program, the key differences between the generations of programming, and how the open-source software (OSS) comes into play. How would you answer these questions?
In: Computer Science
c++
The input items are given in one line and each item is separated by white spaces (blank-space and tab).
how can I implement?
and
input:
34 peach 7
output:
number: 34 7
string: peach
How can I separate the numbers and characters that I type at once?
In: Computer Science
Could you please write an article on Software Engineering Trends in about 300 words? Please, also provide appropriate references.
In: Computer Science
Select the item below that best describes a buffer overflow and how is it used against a web server? a. A buffer overflow occurs when more data is sent to an input buffer field than its size. This can be used to overwrite the stack with malicious code and a return pointer to the malicious code. b. A buffer overflow is caused over a network when there is a mismatch in the processing rates between the two entities involved in the communication process. c. A buffer overflow occurs when rows of data are accessed directly in a database table that are larger than the defined row size for the table. d. Most of the time a buffer overflow occurs when a bug is released accidentally in a proprietary operating system.
In: Computer Science
23.2 PROJECT 2 : Data Visualization using LOOPS (python)
This program will display a set of authors and the number of novels written by each author in both a table and a histogram. You will ask the user for all of the information. Using what you learned about incremental development, use the following approach to create your program:
Enter a title for the data: Number of Novels Authored You entered: Number of Novels Authored
Enter the column 1 header: Author name You entered: Author name Enter the column 2 header: Number of novels You entered: Number of novels
Enter a data point (-1 to stop input): Jane Austen, 6 Author: Jane Austen Number of Novel(s): 6
If the error occurs, output the appropriate error message and
prompt again for a valid data point. You can assume that if a comma
is present, then the data point is entered correctly.
Ex:
Enter a data point (-1 to stop input): Ernest Hemingway 9 Error: No comma in string. Enter a data point (-1 to stop input): Ernest Hemingway, 9 Author: Ernest Hemingway Number of Novel(s): 9
Number of Novels Authored Author name | Number of novels -------------------------------------------- Jane Austen | 6 Charles Dickens | 20 Ernest Hemingway | 9 Jack Kerouac | 22 F. Scott Fitzgerald | 8 Mary Shelley | 7 Charlotte Bronte | 5 Mark Twain | 11 Agatha Christie | 73 Ian Flemming | 14 J.K. Rowling | 14 Stephen King | 54 Oscar Wilde | 1
Jane Austen ****** Charles Dickens ******************** Ernest Hemingway ********* Jack Kerouac ********************** F. Scott Fitzgerald ******** Mary Shelley ******* Charlotte Bronte ***** Mark Twain *********** Agatha Christie ************************************************************************* Ian Flemming ************** J.K. Rowling ************** Stephen King ****************************************************** Oscar Wilde *
For this project, you can assume that the user will not enter duplicate author names.
In: Computer Science
Given the code snippet below, complete this program by:
SUBMIT THE PYTHON FILE (.PY) NOT SCREENSHOT, WORD DOCUMENT ETC. IF YOUR SUBMISSION IS NOT A .PY FILE, AUTOMATIC ZERO.
#Code snippet below. Copy this into your favorite IDE and complete the tasks
import numpy as np
import pandas as pd
temps = np.random.randint(60, 101, 6)
temperatures = pd.Series(temps)
2.
Write a python program that asks the user to enter
a number of quarters, dimes, nickels and pennies and then outputs the monetary value of the coins in the format of
dollars and remaining cents. YOUR PROGRAM MUST HAVE AT LEAST ONE FUNCTION.
3.
USE THE python TextBlob library to create a language translation application. Your application should accept at least two input from the user. The first input should be the text to be translated (your program should accept any language). The second should be the language to translate to. At minimum, your program should be able to translate to 10 different languages.
Your program must have at least one python function.
In: Computer Science