linux
Now use the date command and use redirection to APPEND today's date to the INSERTHERE file created (you want to append to the end of the file, not overwrite your name). What command did you use to do this?
In: Computer Science
Read the article and answer the question:
Question: Write your position (3 to 4 paragraphs) about Who Controls the Internet based on Dr. Wu
title:Hooking up
Let's say you're an entrepreneur who has an idea to build a wireless fob that finds your keys even if you left them in Virginia or Barcelona. Or say you want to design a refrigerator that transmits a signal to Safeway, instructing it to deliver a gallon of milk every time you're running low. To enter the market you will have to turn to one of the four mobile phone carriers that today exercise an oligopoly over wireless device communications: Verizon Wireless, AT&T, Sprint and T-Mobile.
Good luck. Get ready for an endless set of hurdles, including lengthy trials, revenue sharing and demands to cripple or modify features, without any guarantee of final approval. All that before your fob or fridge can transmit a tiny signal. In practice, many innovative devices never reach the market. The Big Four tend to approve only established partners whose devices fit their business plans, which is why we have yet to see all those wireless devices that were supposed to be in our future.
The firms already control what phones or devices reach Americans; 95% of cell phones are sold by the wireless carriers themselves. They strictly control phone design, blocking features that might threaten their revenue, like timers that keep track of how many minutes you've used each month. The carriers have also crippled or blocked alternative means of connecting wirelessly, like Bluetooth and Wi-Fi, because they want you to burn up minutes on their networks and charge extra fees.
The good news is that the federal government will soon have a chance to change all that and throw open America's airwaves to innovation and entrepreneurship. It will come in the form of an auction, within the next year, of the few remaining pieces of a precious national resource--licenses to the nation's wireless spectrum. This particular chunk of spectrum is becoming available because TV stations must stop using it to broadcast old-fashioned analog television by February 2009.
That's why this year's auction is so important. The Federal Communications Commission will soon deliver an initial set of rules to govern the spectrum auction. What's needed to spur innovation is a simple requirement: that any winner of the auction respect a rule that gives consumers the right to attach any safe device (meaning it does no harm) to the wireless network that uses that spectrum. It's called the Cellular Carterfone rule, after a 1968 decision by the FCC in a case brought by a company called Carter Electronics that wanted to attach a shortwave radio to AT&T 's network. That decision resulted in the creation of the standard phone jack. Applying the Carterfone rule to the next spectrum auction would ensure that our key fob designer need only look up standard technical specifications and then build and sell his device directly to the consumer. The tiny amounts of bandwidth the fob used would show up on the consumer's wireless bill.
The right to attach is a simple concept, and it has worked powerfully in other markets. For example, in the wired telephone world Carterfone rules are what made it possible to market answering machines, fax machines and the modems that sparked the Internet revolution.
Attachment rights can break open markets that might otherwise be controlled by dominant gatekeepers. Longshot companies like Ebay or YouTube might never have been born had they first needed the approval of a risk-averse company like AT&T. If you've invented a new toaster, you don't have to get approval from the electric company. Consumers decide how good your product is, not some gatekeeper.
But who has the political courage to push such ideas? To date, House Representatives Edward Markey (D--Mass.) and John Dingell (D--Mich.) have taken the lead in Congress by holding hearings on the issue. John McCain is the only presidential candidate so far to take a serious interest. Others should take notice. If America's reputation as the world's leading innovator is to be sustained, we need to get wireless policy right.
Tim Wu Professor at Columbia Law School and Author
In: Computer Science
PLEASE WRITE CLEAR AND CONCISE CODE
Subject is Unix system programming
Write code that downloads all of the log files ending in `.log` in an S3 bucket and counts the total number of HTTP errors in those logs.
Log lines are in the format `{"path": "/", status: 200}` or `{"path": "/", status: 404}`, for example. (This is JSON, and you can process it as such if you choose.)
Use the bucket `class6-logs`, the access key ID "AKIASUMBPHIPY6DLZ4C5", and the secret access key "JQdQIbxsRcipnoKFnsfse44SMRGouzz4tbAzTYbe".
Use the code below to get started:
Code-
import boto3
client = boto3.client(
's3',
aws_access_key_id="AKIASUMBPHIPY6DLZ4C5",
aws_secret_access_key="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",
)
resp = client.list_objects(Bucket='class6-logs')
client.download_file('class6-logs', resp['Contents'][0]
['Key'], 'downloaded_file')
# for object in resp['Contents']:
# print(object['Key'])
# print(resp['Contents'][0]['Key'])
In: Computer Science
how to get this to not consider 0, 1 and negative integers as prime. maybe using a "nested loop" or more than one loop?
//TestCode.java import java.util.Scanner; public class TestCode { public static void main(String[] args) { // Creating scanner object Scanner scan = new Scanner(System.in); boolean isPrime; int x; // Declaring an array with 10 ints int arr[] = new int[10]; // Reading values from user System.out.println("Enter 10 integer values for array:"); for(int i = 0;i<arr.length;i++){ arr[i] = scan.nextInt(); } // Looping through each value in array for(int i = 0;i<arr.length;i++){ x = arr[i]; // Assuming x is prime isPrime = true; // Loop through 2 to x-1 for(int j = 2;j<x;j++){ // if x is divisible by any of j if(x%j == 0) { // Then setting isPrime to false isPrime = false; } } // Printing value of x if it is a prime if(isPrime){ System.out.println(x); } } } }
In: Computer Science
Exploring Web-based Programs and Apps
Use Google to find information about web-based programs and apps to answer the following questions:
In: Computer Science
This is in Python, I am trying to create a new window to print the data to screen, it prints fine in the terminal. I know this is a small segment of my code and its the only portion I am having a problem with. I was wondering if anyone can see what my problem may be. The current issue is
NameError: name 'fltVal' is not defined and AttributeError: 'PressureGUI' object has no attribute 'r_count'
Any help would be appreciated Based on the comment I made some changes which got me past the error above
The updated code is now with a new error of
File "/Volumes/NO NAME/CSE-222/Data Analysis
Program/pressure_data.py", line 175, in
print_data_range_console
text= str(format(float,
'10.2f'))).grid(row=self.r_count,column=self.c_count)
TypeError: unsupported format string passed to type.__format__
I know it has to do with line 12 below but I am confused at this point
My output should be barometric pressue in the format of 1028.95 in one column and temp in the second column
def print_data_range_console(self):
new_win = tkinter.Toplevel(self.window)
label = tkinter.Label(new_win, text="Data Print")
#display_data_win = tkinter.Tk
#self.DisplayDataWin = display_data_win()
#self.display_win_open = True
"""Prints the given data selction to the console"""
print(" ".join(self.window.radio_var.get().split()))
for i in self.get_data_range():
self.DisplayWin.dd_win.data_lbl =
tk.Label(self.get_data_range,\
font=('Helvetica',10), bg='white',\
text= str(format(float,
'10.2f'))).grid(row=self.r_count,column=self.c_count)
self.col_count = self.c_count + 1
if self.col_count == 6:
self.col_count = 1
self.row_count = self.r_count + 1
print(" ".join(str(x) for x in i[1:]))
In: Computer Science
CIT 149 JAVA 1 programming question.
The Assignment
This program will display a menu to the user from which they can
choose an option to find the area of a rectangle, the area of a
triangle, or to quit.
The user will make the selection and will be prompted to enter the
height and width, or the base and height, depending upon which
selection they made. The program will then calculate the
appropriate area and display the results.
This program will be in two classes, each in a separate file. One
will contain the main method and the other will contain instance
variables and methods which make up the program.
? Specifications
There are several ways in which this program could be written. However, in order to grade for following specifications and to have a clear path to a solution, it is required that you write your program using the specifications below.
The Instance Variables
Constructing the Methods
Create the following methods:
? All of the methods below will be in the class Area.
menu()
setFirstDimension() (Mutator)
setSecondDimension() (Mutator)
areaOfRectangle()
areaOfTriangle()
displayOutput()
In: Computer Science
Use Google to search for articles discussing the built-in security features of at least two web browsers. Submit your findings in a brief 250 word essay.
In: Computer Science
Selection sort on fstream data C++:
Sort the given student information data inside a text file
The format of the student data inside the text file is:
Student Number, Surname, First Name, Middle Name, Birthday, Course, Year, School Year
(The list can be updated over time so there is no limit for the size of the data)
But I need to automatically sort the given the data in ascending alphabetical order based on their surnames when displaying the list. I don't know how, please help me. Thank you :)
In: Computer Science
// staff should be coming in to
// campus, or staying at home. Only part of the code is here.
// It bases the decision based on a points system by asking
the
// user a set of questions and keeping track of how many
times
// it gets a yes response back.
//
// The code implements policy by assigning a weight to each of
the
// categories of symptoms/risk factors
// 1) Mild Symptoms (1pt each)
// 2) Severe Symptoms (2pt each)
// 3) Recent exposure (3pt each)
// 4) Risk factors (3pt each)
//
// This file implements only the checks FOR ( 1
MILD) symptoms.
//
// There are 5 errors in this code.
//
// ~-~-~- ~-~-~-~-~ ~-~-~-~-~ ~-~-~-~-~ ~-~-~-~-~ ~-~-~-~-~
~-~-~-~-~ ~-~-~-~-~|
import java.util.Scanner;
public class Fragment1 {
public static final int MILD_SYMPTOMS = 1;
// This method gets the next line of input from the
scanner and
// Checks to see if it is "yes" (in either upper or
lower case)
// If it is, it returns the number provided as the
second argument
// else, it returns 0.
public static int checkAndAdd(Scanner input, int
score){
String answer = input.nextLine();
if (answer.equalsIgnoreCase("yes")){
return 0;
} else {
return score;
}
}
// This method asks the user about a list of symptoms
and uses
// the checkAndAdd method to check the answers.
// Tt sums up a score based on MILD_SYMPTOMS for each
yes answer
// and returns the total.
public static int checkMildSymptoms(String name,
Scanner input) {
int score = 0;
System.out.println(name+ ", do you have chills? (yes/no)");
score--;
System.out.println(name+ ", do you have diarrhea? (yes/no)");
score += checkAndAdd(input, MILD_SYMPTOMS);
System.out.println(name+ ", do you have sore throat?
(yes/no)");
score += checkAndAdd(input, MILD_SYMPTOMS)
System.out.println{name+ ", do you have body aches?
(yes/no)");
score += checkAndAdd(input, MILD_SYMPTOMS);
System.out.println(name+ ", do you have headache? (yes/no)");
score += check&Add(input, MILD_SYMPTOMS);
return score;
}
public static void main(String[] args) {
int totalScore = 0; // Tabulates the likelihood of infection
int totalRisk = 0; // Tabulates the high risk categories
String name=""; // Stores the name so we can be friendly
// Setup the scanner so we can prompt the user for answers
Scanner input = new Scanner(System.in);
System.out.println("Your total score is "+
checkMildSymptoms(name,input)
+ " points");
}
}
In: Computer Science
1.
Customer | Debt to Income Ratio (DTI) | Annual Income | Credit Score | Extend Credit? |
Alice A. Hall | 0.49 | $50,325.00 | 4.1 | |
Bruce A. Farrell | 0.18 | $58,113.00 | 1.4 | |
Kathleen U. Lucas | 0.22 | $63,241.00 | 1.7 | |
Amy O. Norman | 0.48 | $14,347.00 | 1.1 | |
Ronnie T. Atkins | 0.33 | $11,698.00 | 3.6 | |
Martha O. Monroe | 0.03 | $28,112.00 | 3 | |
Lynn O. Robertson | 0.51 | $108,420.00 | 3.3 | |
Jose Y. Sykes | 0.32 | $88,224.00 | 1.1 | |
Robert E. Reid | 0.05 | $39,103.00 | 1.4 | |
Pauline H. Chandler | 0.31 | $34,964.00 | 3.1 | |
Stephen I. Finch | 0.43 | $40,079.00 | 2.5 | |
Peggy O. Hobbs | 0.11 | $99,100.00 | 4.8 | |
Donna D. Adkins | 0.29 | $97,847.00 | 1.4 | |
Doris I. Kinney | 0.29 | $40,437.00 | 2.3 | |
Ben H. Whitaker | 0.39 | $129,588.00 | 2.6 | |
Kristin L. Alexander | 0.31 | $69,515.00 | 4.8 | |
Ryan O. Conner | 0.47 | $42,391.00 | 3.6 | |
Tracey A. Waters | 0.05 | $52,559.00 | 4.9 | |
Mark E. Becker | 0.01 | $33,307.00 | 2.5 | |
Louis O. Rollins | 0.38 | $18,664.00 | 1 |
Criteria | |
DTI | 0.3 |
Annual Income | $ 37,000 |
Credit Score | 4 |
2. Create a formula that will return "Extend Credit" or "No Credit" in column F. In order to be receive credit, the customers must have DTI that is lower than .30 (30%) and annual income of at least $37,000 or have a credit score higher than 4.0
Sales | Sales | % |
0 >= Your Sales < 5000 | $ - | 0.00% |
5000 >= Your Sales < 10000 | $ 5,000 | 2.00% |
Your Sales > = 10000 | $ 10,000 | 4.00% |
Sales | Bonus $ |
$6,000.00 |
Enter an IF statement in G4 that will return the appropriate bonus for the sales recorded in F4. The actual bonus rate depend on the amount sold. The table B2:D5 show the bonus rate for different sales levels. This assignment will require a statement with multiple if's.
Please mention the excel formula used here.
In: Computer Science
Prove by construction that the language An = { ai | i is a multiple of n } is regular.
In other words the language An contains all strings composed of the letter a some multiple of n times
In: Computer Science
In: Computer Science
Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.
In: Computer Science
REVIEW: KNOWLEDGE MANAGEMENT AND KNOWLEDGE MANAGEMENT SYSTEMS: CONCEPTUAL FOUNDATIONS AND RESEARCH ISSUES
Explain the following in summary;
1 a) Knowledge Storage and Retrieval and related research issues
b) Knowledge Transfer and related research issues
c) Knowledge Application and related research issues
In: Computer Science