You will have to experiment with using chmod on the
folder and the file to come up with the following:
Find the chmod commands for both the folder and the file that you
would use to give the minimum permissions for You (the owner) to be
able to edit and change the file (and I don’t want to see 777! ? )
:
___________________________________________________________
___________________________________________________________
___________________________________________________________
In: Computer Science
in arduino, having two LED lights, I need to find a way to turn one LED with the push of a button, then with a next push of the button turn off the first LED and turn the second LED on. Help with the circuit and code would be appreciated.
In: Computer Science
Required Names:
StoreProgram
This project will be a program that provides information about inventory in a grocery store. Use this codeas your starting point. This code already has a main method written for you. DO NOT modify the main method. If you modify the main method, you will lose points.
In the main method, you will notice three arrays:
Here is the code as seen in the file:
String[] storeItems = { "broccoli", "onion", "carrot", "turnip", "mango", "bread", "garlic", "celery", "apple", "banana", "raisins", "grapes", "lemon", "orange", "potato" }; int[] itemQuantities = { 23, 5, 7, 15, 2, 13, 13, 8, 20, 30, 3, 25, 10, 9, 1 }; double[] itemPrices = { 2.0, 0.89, 0.70, 1.50, 2.99, 3.45, 1.45, 1.12, 3.99, 0.25, 4.99, 7.00, 1.75, 1.80, 3.25 };
Each array provides information about a specific item by index. This means that each index is specific for the item in the store. For example, notice that "carrot" is at index 2 in the storeItems array. This means that the quantity of carrots is also located at index 2in the itemQuantities array (which is 7), and the price of carrots is located at index 2 in the itemPrices array (which is 0.70).
For the purpose of this assignment, you can assume that the three arrays are always of equal length. This means that if you refer to the length property on any of them (for example, itemPrices.length), then the length will be the same for the other two arrays as well.
Instructions
Your program will need to have:
To help runTransaction run properly without making it too bulky, you will be required to implement the following methods as well. Each of these methods should have three parameters (the three arrays), and they should not return any values.
Pleases if I can get help today with how to do these steps of coding ?
In: Computer Science
- Read the below chapter and discuss in details (2-3 pages) using your own words about Cloud Security Concerns, Risk Issues, and Legal Aspects (use the below reference )
NOTE: please make sure that the answer is typing on the computer with font size 11pt
In: Computer Science
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!!
Question: Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?
In: Computer Science
write a Linear Search algorithm using sentinel approach? How can the sentinel linear search improve the performance over the standard linear search?
In: Computer Science
Using Excel to Calculate Factorials, Permutations, and Combinations
Using Excel to Calculate Factorials, Permutations and Combinations"
· In cell A1, compute 3 factorial
· In cell A2, calculate the number of permutations when selection 3 items from a total of ten items.
· In cell A3, calculate the number of combinations when selecting 3 items from a total of ten items.
In: Computer Science
What are the concurrency-control manager and recovery manager, respectively? What are their purpose?
In: Computer Science
In: Computer Science
Implementing a Stack
Write a program that implements a stack of integers, and exercises the stack based on commands read from cin. To do this, write a class called Stack with exactly the following members: class Stack { public: bool isEmpty(); // returns true if stack has no elements stored int top(); // returns element from top of the stack // throws runtime_error("stack is empty") int pop(); // returns element from top of the stack and removes it // throws runtime_error("stack is empty") void push(int); // puts a new element on top of the stack private: vector elements; }; The program should read commands from cin until either end-of-file is reached or the command end is entered. (You can manually test for end-of-file by entering CTRL-D.) Each time the program expects a new command it should first print a prompt: "stack> " Your program should catch all errors that happen and continue execution until the end command or end-of-file. In case the command push is read, the program should read an integer value from cin and push it onto the stack. In case top is read, the program should print the top integer of the stack to cout. In case pop is read, the program should print the top integer of the stack to cout, and remove it from the stack. In case the command list is read, the program should print all values currently on the stack, without modifying the stack. (Exact format see below.) Your program should check whether a "number" to be pushed is actually a number. If not, print an error message (see below), and reset cin such that it will again accept commands. (See Section 7.6 of the zyBook.) Also, your program should ignore all characters behind a number to be pushed that are on the same input line (example see below). An example of a correct execution of this program is shown below: stack> push 5 stack> pop 5 stack> pop error: stack is empty stack> push 6 stack> push 4bb stack> push foo error: not a number stack> list [4,6] stack> list [4,6] stack> top 4 stack> hello error: invalid command stack> end You may want to use the compare() function (Links to an external site.) on a string to check which command has been entered. Use of arrays, a built-in stack class, or container classes from std:: other than vector, is not allowed.
In: Computer Science
In: Computer Science
Write java programs to implement CBC mode of data encryption standard?
In: Computer Science
How do you validate in pseudocode a "REPEAT" "UNTIL" loop? For example if a user inputs invalid data there should be an error message that reprompts for correct data.
To show this can you write Pseudo Code for the following problem?
Create an application that can determine the yearly bonus for all company employees. Not all employees are eligible for a yearly bonus. Only employees that have been with the company longer than 2 years and must have been given a rating of “Great”. Employees receiving a rating of “Bad” are not eligible for a bonus. Lastly, each department awards a different bonus amount based on percentage of yearly salary as shown below.
IT = 5% bonus
Sales=8% bonus
The application should allow the user to continually input employee data until the HR representative has reviewed all employees and has indicated they are finished entering employee data. One by one, the application will enable the HR representative to input an employee’s name, years of service, department, rating and salary. Based on data provided, the application must print well-formatted detail stating whether or not the employee is eligible for a bonus. For employees eligible for a bonus, the application must also print the amount of the bonus to be awarded to the employee. Upon completion of entering all employee data, the application will print a report that includes the total number of employees entered by the HR representative, a count of employees that are eligible for a bonus, and the average bonus amount.
In: Computer Science
Explain TCO and describe how virtualization can reduce TCO.
In: Computer Science
What is are the correct code implementations to remove a node from a circular doubly linked list from the beginning, middle, and end? Using only a dummy node and a pointer in the code implementation for the removal of the last/end node.
In: Computer Science