Questions
Why must you keep the back-up copy of your keyring files in a safe place?

Why must you keep the back-up copy of your keyring files in a safe place?

In: Computer Science

Given the following attributes in a project management: Project scope & feasibility Documentation Project planning Testing...

Given the following attributes in a project management:

  • Project scope & feasibility
  • Documentation
  • Project planning
  • Testing and piloting
  • Risk minimisation

Discuss in detail each of them and on how would you use them as the IT manager for the company. Provide a details information support your discussion.

In: Computer Science

Use MIPS write an assembly program which asks the user to enter 3 number. The program...

Use MIPS write an assembly program which asks the user to enter 3 number. The program
then sorts these numbers, the prints them from largest to smallest.

In: Computer Science

The answer should be in JAVA. You will design and implement two classes to support a...

The answer should be in JAVA.

You will design and implement two classes to support a client program, RockPaperScissorsGame.java, to simulate Rock-Paper-Scissors game.

Read and understand the client program to find out the requirements for the HandShape and Player classes.

The rules of the Rock-Paper-Scissors game are:

    Scissors✌️ beats Paper✋ that beats Rock✊ that beats Scissors✌️

Additionally, to simplify the game logic (and complexify a little bit the HandSahpe class) , two players cannot show the same hand shape.

The followings are some sample runs:

$java RockPaperScissorsGame
Alice shows Paper
Bob shows Scissors
Bob wins!


$java RockPaperScissorsGame
Alice shows Paper
Bob shows Rock
Alice wins!


$java RockPaperScissorsGame
Alice shows Scissors
Bob shows Rock
Bob wins!

RockPaperScissorsGame.java

public class RockPaperScissorsGame {

        public static void main(String[] args) {
                
                String[] handShapeName = {"Rock", "Paper", "Scissors"};
                
                HandShape handShape = new HandShape();
                
                Player player1 = new Player("Alice");
                Player player2 = new Player("Bob");

                System.out.println(player1.getName() + " shows " + handShapeName[player1.showHand(handShape)]);
                System.out.println(player2.getName() + " shows " + handShapeName[player2.showHand(handShape)]);         
                
                System.out.println(player1.findWinner(player2) + "  wins!");
        }
}

In: Computer Science

Suppose that we throw balls into m bins until some bin contains two balls. Each throw...

Suppose that we throw balls into m bins until some bin contains two balls. Each throw
is independent, and each ball is equally likely to end up in any bin. What is the expected number of
ball throwed?

In: Computer Science

c++ How do I get numbers and words before I press the enter? For example, if...

c++

How do I get numbers and words before I press the enter?

For example, if i type cat 12 Rabbit 27 and then click enter, i want to stop receiving input.

In: Computer Science

Based on the below information, describe everything that can be determined about this packet (give the...

Based on the below information, describe everything that can be determined about this packet (give the actual data value for each field). Convert each field to its normally displayed value (i.e. Hexadecimal/Decimal/Binary). Example: Version is 4 which is IPv4 IP Datagram Header:

45 00 00 44 5b d2 00 00 80 11 ef 4d 8 3 b7 75 39 83 b7 72 e1

In: Computer Science

I am currently working on an HOME AUTOMATION PROJECT(((that which controls home appliances via web/Google Assistant/application.....

I am currently working on an HOME AUTOMATION PROJECT(((that which controls home appliances via web/Google Assistant/application..
My question is HOW CAN SUCH PROJECT BE IMPROVED..
And also HOW CAN IT BE MADE DIFFERENT from series of such projects on the web..
I need 4-5 ideas on HOW TO DISTINGUISH MY OWN from others..

TECHNICALITY OF THE HIGHEST ORDER IS DEMANDED IN THE ANSWERS

In: Computer Science

Instructions (No array) (c++) (visual studio) 1. Create a project called Project3B 2. Create 3 String...

Instructions (No array) (c++) (visual studio)

1. Create a project called Project3B
2. Create 3 String variables called name1, name2, name3
3. Create 9 double variables called test1_1, test1_2, test1_3, test2_1, test2_2, test2_3, test3_1, test3_2, test3_3
4. Create 3 double variables called average1, average2, average3
To calculate the average score = (test1 + test2 + test3) / 3.0
5. Run the program with the following data using cin
name1 = “Tom”, name2 = “Mary”, name3 = “Ali”
test1_1 = 81.4, test1_2 = 92.1, test1_3 = 75.5
test2_1 = 98.7, test2_2 = 93.5, test2_3 = 90.1
test3_1 = 64.2, test3_2 = 75.8, test3_3 = 78.4
6. Display the output using cout and setw()

In: Computer Science

Define spatial and temporal locality.  Consider the following code:               for (i=0; i < 50; i++)           &nbsp

Define spatial and temporal locality.  Consider the following code:  

            for (i=0; i < 50; i++)

            for (j =0; j < 30; j++)

                  a[i] = a[i] * j;

  1. Give an example of spatial locality in the above code.

b. Give an example of temporal locality in the above code.

In: Computer Science

What does Incognito/Private Mode do in various web browsers? Include information concerning the more popular browsers...

  1. What does Incognito/Private Mode do in various web browsers? Include information concerning the more popular browsers such as Chrome, Firefox, etc.
  2. Identify some things that Incognito/Private Mode does not do in various web browsers? Include information on misconceptions having to do with protection from viruses or other malware, what an internet service provider (ISP ) can see or not see, visibility about a physical location, bookmarks, etc.
  3. From a social and ethical perspective, why do people use private/incognito mode?
  4. How is web tracking accomplished? Is there a connection with privacy settings? Do browsers provide a way to avoid serving advertisements?
  5. What is the original purpose of cookies? Are cookies misused in any way? In there a connection between cookies and Incognito/Private Mode?
  6. What is a Virtual Private Network (VPN)? Will use of a VPN block cookies? Will use of a VPN help protect privacy?

In: Computer Science

Consider a simple system with 8-bit block size. Assume the encryption (and decryption) to be a...

Consider a simple system with 8-bit block size. Assume the encryption (and decryption) to be a simple XOR of the key with the input. In other words, to encrypt x with k we simply perform x⊕k giving y. Similarly, to decrypt y, we perform y⊕k giving x.

You are given the following 16-bit input 1A2Bin hexadecimal. You are provided IV as 9D in hexadecimal. The key to be used (where appropriate) is 7C in hexadecimal. Compute the encrypted output with the following methods. Express your final answer, for each of them, as 4 hexadecimal characters so it is easy to read.

A. ECB

B. CBC

C. OFB

D. CFB

In: Computer Science

Assignment Examine the Main and Address classes. You are going to add two classes derived from...

Assignment

Examine the Main and Address classes. You are going to add two classes derived from Address: BusinessAddress and PersonAddress.

Create BusinessAddress class

  1. Select package home and create a new Java class called BusinessAddress
  2. Make the class extend the Address class
  3. Add two private String fields businessName and address2
  4. Generate constructor and all getters and setters
  5. Add a printLabel() method

The printLabel method should print (using System.out.println())

First line – the businessName field

Second line – the address2 field if it is not null or empty

Third line – the StreetAddress field if it is not null or empty

Fourth line – city field followed by a comma and space, the state field followed by two spaces, and the zip field

Create PersonAddress class

  1. Select package home and create a new Java class called PersonAddress
  2. Make the class extend the Address class
  3. Add a private String field personName
  4. Generate constructor and all getters and setters
  5. Add a printLabel() method

The printLabel method should print (using System.out.println())

First line – the personName field

Second line – the StreetAddress field

Third line – city field followed by a comma and space, the state field followed by two spaces, and the zip field

Modify Main class

Add the following three BusinessAddress objects to the list.

BusinessName

Address2

StreetAddress

City

State

Zip

Columbus State

Eibling 302B

550 East Spring St.

Columbus

OH

43215

AEP

P.O. Box 2075

null

Columbus

OH

43201

Bill’s Coffee

null

2079 N. Main St.

Columbus

OH

43227

Add the following three PersonAddress objects to the list.

PersonName

StreetAddress

City

State

Zip

Saul Goodman

1200 N. Fourth St.

Worthington

OH

43217

Mike Ehrmentraut

207 Main St.

Reynoldsburg

OH

43211

Gustavo Fring

2091 Elm St.

Pickerington

OH

43191

Example Output

Columbus State

Eibling 302B

550 East Spring St.

Columbus, OH 43215

====================

AEP

P.O. Box 2075

Columbus, OH 43201

====================

Bill's Coffee

2079 N. Main St.

Columbus, OH 43227

====================

Saul Goodman

1200 N. Fourth St.

Worthington, OH 43217

====================

Mike Ehrmentraut

207 Main St.

Reynoldsburg, OH 43211

====================

Gustavo Fring

2091 Elm St.

Pickerington, OH 43191

====================

My code

package home;

public class Main {

    public static void main(String[] args) {
       Address[] addressList = new Address[6];

       // TODO Add 3 person addresses to list
        addressList[3] = new PersonAddress("1200 N. Fourth St.","Worthington","OH","43217","Saul Goodman");
        addressList[4] = new PersonAddress("207 Main St.","Reynoldsburg","OH","43217","Mike Ehrmentraut");
        addressList[5] = new PersonAddress("2091 Elm St.","Pickerington","OH","43191","Gustavo Fring");

        // TODO Add 3 business address to list
        addressList[0] = new BusinessAddress("550 East Spring St.","Columbus","OH","43215","Columbus State","Eibling 302B");
        addressList[1] = new BusinessAddress(null,"Columbus","OH","43201","AEP","P.O. Box 2075");
        addressList[2] = new BusinessAddress("2079 N. Main St.","Columbus","OH","43227","Bill’s Coffee",null);

       for (Address address : addressList) {
           address.printLabel();
            System.out.println("====================");
        }
    }
}
package home;

public class BusinessAddress extends Address {
    // two private String fields businessName and address2
    private String businessName;
    private String address2;
    //Constructor

    public BusinessAddress(String streetAddress, String city, String state, String zip, String businessName, String address2) {
        super(streetAddress, city, state, zip);
        this.businessName = businessName;
        this.address2 = address2;
    }

    //getters and setters

    public String getBusinessName() {
        return businessName;
    }

    public void setBusinessName(String businessName) {
        this.businessName = businessName;
    }

    public String getAddress2() {
        return address2;
    }

    public void setAddress2(String address2) {
        this.address2 = address2;
    }

    @Override
    public void printLabel() {
        String result ="";
        if(address2==null)
            result = businessName+"\n"+super.toString();
        else
            result = businessName+"\n"+address2+"\n"+super.toString();
        System.out.println(result);
    }
}

}
package home;

public class PersonAddress extends Address {
    private String  personName;

    //Constructor

    public PersonAddress(String streetAddress, String city, String state, String zip, String personName) {
        super(streetAddress, city, state, zip);
        this.personName = personName;
    }

    //getter and setter

    public String getPersonName() {
        return personName;
    }

    public void setPersonName(String personName) {
        this.personName = personName;
    }

    @Override
    public void printLabel() {
        System.out.println(personName+"\n"+super.toString());
    }
}
package home;

public abstract class Address {
    private String streetAddress;
    private String city;
    private String state;
    private String zip;

    public Address(String streetAddress, String city, String state, String zip) {
        this.streetAddress = streetAddress;
        this.city = city;
        this.state = state;
        this.zip = zip;
    }

    public String getStreetAddress() {
        return streetAddress;
    }

    public void setStreetAddress(String streetAddress) {
        this.streetAddress = streetAddress;
    }

    public String getCity() {
        return city;
    }

    public void setCity(String city) {
        this.city = city;
    }

    public String getState() {
        return state;
    }

    public void setState(String state) {
        this.state = state;
    }

    public String getZip() {
        return zip;
    }

    public void setZip(String zip) {
        this.zip = zip;
    }

    public String toString() {
        return streetAddress + "\n" +
                city + ", " + state + "  " + zip + "\n";
    }

    public abstract void printLabel();
}

In: Computer Science

write the outline pseudocode (code is also allowed) for the following problem... Catherine wants to simulate...

write the outline pseudocode (code is also allowed) for the following problem...

Catherine wants to simulate a lottery game. What steps would this require?

Imagine that Catherine wants a computer to simulate a lottery game. The computer will be generating two-digit numbers. Each time the computer generates a number, the user is first invited to guess what the number is. If the user guesses the exact number, the award is 10 000 EUR. If the user makes a correct guess on one of the digits, and on the right place, the award is 3 000 EUR. If the user guesses correctly that a digit was selected, but not which position it is in, the award is 100 EUR.

Examples:

Computer: 96: Computer: 47: Computer: 42:

User: 96 User: 43 User: 29

Award Award Award

10 000 EUR 3 000 EUR

100 EUR

Catherine’s algorithm and program can follow the below-mentioned steps:

Step 1: The computer generates a random two-digit number.

Step 2: The user makes a guess of what the number is and enters it through the keyboard.

Step 3: The computer compares the two numbers and evaluates whether the user wins anything.

Step 4: The computer displays the number that was generated in step 1.
Step 5: the computer displays a message of whether the user wins something, as suggested

above.

Step 6: The computer repeats the procedure from step 1 to step 5. The game is played 3 times.

In: Computer Science

Discuss how SQL Nexus assist in developing proper hypothesis for performance issues? 2. What recommendations do...

Discuss how SQL Nexus assist in developing proper hypothesis for performance issues? 2. What recommendations do you provide a novice DBA for using SQL Nexus?

In: Computer Science