JAVA PROGRAMMING Write a program that ask the user for a number then prints the cube of the number. The program should be called CubeNumbers. Use a value returning method with parameter, call the method myCube.
In: Computer Science
Step 2: using text editor (WordPad) to create a web page with the following content (you may cut-and-paste):
-----------------------------------------------------------------------------------
Just a screenshoot of the output
Book-O-Rama Catalog Search
Book-O-Rama Catalog Search
Choose Search Type:
Author Title ISBN
Enter Search Term:
-------------------------------------------------------------------------------------
Then save above document to the local directory (C:\temp) and make sure that you saved it in the plain text format (in the “Save as type” popup window, choose “Text Document (*.txt)), name your file “firstpage.txt”.
Step 3: test your web page
You can test your page by doing the following:
1. change the file extension to html. Thus, you should have a file firstpage.html.
2. create a sub director named “firstwebsite” in the web server’s root directory. Your web root may be different from mine. In my machine, the XAMPP is installed at C drive. Thus, the web root will be:
C:\xampp\htdocs\
At the end of this step, the directory structure will be:
C:\xampp\hpdocs\firstwebsite\
3. copy the newly created file “firstpage.html” to the directory shown in the previous line.
4. fire up a web browser and type the following to the URL:
http:\\localhost\firstwebsite\firstpage.html
In: Computer Science
Provide a detailed code for Double Encryption using Image Steganography in PYTHON
First encrypt the data(using RC4/AES algorithm) before storing it in the image, after encrypted data is stored in the image, use image steganography to encrypt the image. Hence, we are using double encryption
In: Computer Science
Write a C++ program that requires the user to type in an integer M and computes the function y(M) which is defined by y(0)=2, y(1)=1, y(m+1)=y(m)+2*y(m-1).
In: Computer Science
The section on hacking by governments (Section 5.3.4) describes, mostly, incidents of hacking for military or strategic purposes.
1. Find and summarize information about hacking for industrial or economic espionage.
In: Computer Science
In: Computer Science
Consider the following class definition:
public class Parent {
private int varA;
protected double varB;
public Parent(int a, double b){
varA = a;
varB = b;
}
public int sum( ){
return varA + varB;
}
public String toString( ){
return "" + varA + " " + varB;
}
}
Consider that you want to extend Parent to Child. Child will have a third int instance data varC.
Using the class definitions for Parent and Child from Question 2, write a Java application that will represent a family of 4 members.
In: Computer Science
Activity Statement- The Payroll department at xyz company would like you to develop a computer program that will determine the net pay of an employee. Design a Python program, which utilizes modules, that asks the user to enter the Name of employee, the total number of hours worked by the employee, and the hourly pay rate of the employee. The program will determine the Employee Gross Pay, the Paid Federal Taxes ( 30% of the Employee Gross Pay ), the Paid State Taxes ( 10% of the Employee Gross Pay ), and the Employee Net Pay ( Gross Pay - Federal Taxes - State Taxes ). In addition, the program will display the following items:
Activity Instructions-
In: Computer Science
Please use the Java program below to test the following regex pattern (in the table) and record the output, and explain how the output is generated.
import java.util.Scanner;
import java.util.regex.Matcher;
import java.util.regex.Pattern;
public class RegexTestBarness {
public static void main(String[]
arg) {
Scanner input = new Scanner(System.in);
while (true)
{
System.out.println("Enter a regex pattern: ");
String regex = input.nextLine();
//
Create a regex pattern
Pattern pt = Pattern.compile(regex);
System.out.println("Enter a input string to search: ");
String sr = input.nextLine();
// Create a Matcher object
Matcher mt = pt.matcher(sr);
boolean found = false;
while (mt.find()) {
System.out.printf("I found the text \"%s\" starting at " +
"index %d and ending at index
%d.\n",
mt.group(), mt.start(),
mt.end());
found = true;
}
if(!found){
System.out.println("No match found.");
}
}
}
}
| regex pattern |
test string |
output |
explanation |
| [^abc] |
abc |
No match found. |
Any character except a, b, or c |
| GAATTC |
TGCAGAATTCGGG |
||
| \d |
Homework01 |
||
| \D |
2010 |
||
| \s |
this is a regex |
||
| \s+ |
this is a regex |
||
| [A-Z][A-Z]\s\d{5} |
MD 20943 |
In: Computer Science
Match the source of a property with the form of normalization it is first required in
|
|
In: Computer Science
Create a python script that reads in the contents of CityPop.csv and stores the data in a container. Task 2 will expect that your program can find cities by name within the container, so think about that as you set up your data container. Briefly describe how you store the data in comments. *It won't let me post the CSV file
In: Computer Science
hi, can you please create me a game that is not too hard but not too easy using pygame in python. can you also explain the codes in each line ?
In: Computer Science
Question 1:
Explain what I/O operation service provides. Describe why user application programs cannot provide these services.
Question 2 :
Discuss the advantage and disadvantages of a layered approach.
In: Computer Science
please research software build and automation tools such as Maven, ANT, and Gradle. Answer the following in your post:
- What are used for and how are they used? - Compare and contrast each of the tools. - What are the benefits and best uses of each tool? Make sure you main post is 200 words.
In: Computer Science
In: Computer Science