Questions
Instructions: A movie theater only keeps a percentage of the revenue earned from ticket sales. The...

Instructions: A movie theater only keeps a percentage of the revenue earned from ticket sales. The remainder goes to the movie distributor. Write a program that calculates a theater’s gross and net box office profit for a night. The program should ask for the name of the movie, and how many adults and child tickets were sold. The price of an adult ticket is $10.00 ad a child ticket is $6.00.) It should display a report similar to


Movie Name: “Wheels of Fury”

Adult Tickets Sold: 382

Child Tickets Sold: 127

Gross Box Office Profit: $4582.00

Net Box Office Profit: $916.40

Amount Paid to Distributor: $3665.60


program used is c++

In: Computer Science

Typed please.How can we implement efficient search operations? In this area, we will discuss various algorithms,...

Typed please.How can we implement efficient search operations? In this area, we will discuss various algorithms, including sequential search, sorted search, and binary search. The characteristics of these algorithms will be analyzed, such as the running times and the type of lists they can be used with.

In: Computer Science

ystems Analysis and Design in a Changing World (7th Edition) on the Spot Courier Service Case...

ystems Analysis and Design in a Changing World (7th Edition)

on the Spot Courier Service

Case study for chapter # 6 [page # 182]

Previous chapters have described the technological capabilities that Bill Wiley wants for servicing his customers. One of the problems that Bill has is that his company is very small, so he cannot afford to develop any special-purpose equipment or even sophisticated software.
Given this limitation, Bill’s need for advanced technological capabilities comes at an opportune time. Equipment manufacturers are developing equipment with advanced telecommunications capabilities, and freelance software developers are producing software applications—many of which provide the capabilities that Bill needs. The one caveat is that because this will be a live production system, it needs to be reliable, stable, error-free, dependable, and maintainable.
Let us review some of the required capabilities of the new system, which has been described in previous chapters:
Customers
■   Customers can request package pickup via the Internet.
■   Customers can check the status of packages via the Internet.
■   Customers can print mailing labels at their offices.
Drivers
■   Drivers can view their schedules via a portable digital device while on their routes.
■   Drivers can update the status of packages while on their routes.
■   Drivers can allow customers to “sign” for packages that are delivered.
they only plan to provide some design specifications and guidelines to each resort. The resort will be responsible for connecting to the Internet and for providing a secure wireless environment for the students.
1. For which subsystem(s) is(are) integrity and security controls most important? Why?
2. What data should be encrypted during trans- mission through resort wireless networks to SBRU systems? Does your answer change if students interact with SBRU systems using a cell phone (directly, or as a cellular modem)?
■   The system “knows” where the driver is on his route and can send updates in real time.
■   Drivers can accept payments and record them on the system.
Bill Wiley (management)
■   Bill can record package pickups from the ware- house.
■   Bill can schedule delivery/pickup runs. ■   Bill can do accounting, billing, etc. ■   Bill can access the company network from his
home. Given these requirements, do the following:


1. What kind of fraud is possible in this scenario? By the customer? By the truck driver? By colaboration between system users? What steps should Bill take to minimize the opportunity for fraud?


2. What kind of access controls should be put in place? For the customer? (Notice the customer has no financial transactions. Would you change your answer if the customer could also make payments online?) For the truck driver? For Bill? Are the typical userID and password sufficient for all three, or would you require more or less for each?

In: Computer Science

Find the errors in following program. //This program averages three test scores. //It uses variable perfectScore...

Find the errors in following program.


//This program averages three test scores.


//It uses variable perfectScore as a flag.


#include <iostream>

uisng namespace std;


int main()


{

cout<<"Enter your three test scores and I will ";

<<" average them: ";


int score1, score2, score3,


cin>>score1>>score2>>score3;


double average;


average = (score1 + score2 + score3) / 3.0;


if (average = 100);

perfectScore = true; // set the flag variable

cout<<"Your average is "<<average <<endl;


bool perfectScore;


if (perfectScore);


{


cout<<"Congratulations!\n";

cout<<"That's a perfect score.\n";

return 0;


}

In: Computer Science

Polish notation, also known as Polish prefix notation or simply prefix notation, is a form of...

Polish notation, also known as Polish prefix notation or simply prefix notation, is a form of notation for logic, arithmetic, and algebra. Its distinguishing feature is that it places operators to the left of their operands.

The expression for adding the numbers 1 and 2, in prefix notation, is written as “+ 12” rather than “1 + 2”. In more complex expressions, the operands may be nontrivial expressions including operators of their own. For instance, the expression that would be written in conventional infix notation as (5 + 6) * 7 can be written in prefix as * (+ 5 6) 7

In this assignment, we only care about binary operators: + - * and /.

For binary operators, prefix representation is unambiguous and bracketing the prefix expression is unnecessary. As such, the previous expression can be further simplified to * + 5 6 7

The processing of the product is deferred until its two operands are available (i.e., 5 plus 6, then multiplies the result with 7). As with any notation, the innermost expressions are evaluated first, but in prefix notation this ”innermost-ness” is conveyed by order rather than bracketing.

Your task is to create a class that convert a prefix expression to a standard form (otherwise known as infix) and compute the prefix expression.

Main function

The test script will compile your code using

g++ -o main.out -std=c++11 -O2 -Wall *.cpp

It is your responsibility to ensure that your code compiles on the university system. g++ has too many versions, so being able to compile on your laptop does not guarantee that it compiles on the university system. You are encouraged to debug your code on a lab computer (or use SSH).

Create a main function that takes in one line. The line contains a list of operators and operands separated by spaces. The input doesn’t contain parenthesis. An operator is a character from +, -, *, and /. An operand is a nonnegative integer from 0 to 99. You are asked to convert the prefix expression to an infix form and output its value as well. If the expression is not a valid prefix expression, your program should output “Error”.

Sample input: * - 5 6 7

Sample output: (5 - 6) * 7 = -7

  

Sample input: * 5

Sample output: Error

Sample input: * 5 6 7

Sample output: Error

Please provide the .h, .cpp and main.cpp file for this, like Polish.h Polish.cpp and main.cpp thank you

In: Computer Science

Master thesis on : Blockchain technology and its uses on today's on today's business life. [at...

Master thesis on :

Blockchain technology and its uses on today's on today's business life. [at least 4000 word ]

In: Computer Science

1. Explain why we need CAD CAM technologies 2. List advantages of 3D model over 2D...

1. Explain why we need CAD CAM technologies
2. List advantages of 3D model over 2D model
3. Briefly explain 3 types of digital 3D modeling
4. Discuss the completeness, unambiguousness
and uniqueness of solid modeling schemes.

In: Computer Science

I am working on routing path and subnet. The question is I am given with source...

I am working on routing path and subnet. The question is I am given with source 10.1.240.240 and the destinations is 10.2.240.240. How is the packet traveling?

In: Computer Science

C language problem. Suppose I open I file and read a integer 24. And I want...

C language problem.

Suppose I open I file and read a integer 24. And I want to store them into a array byte [].

The answer should be byte[0] = 0x9F.

How can I do that?

In: Computer Science

1) Use Python to answer the below questions. a) What is the output of the following...

1) Use Python to answer the below questions.

a) What is the output of the following python code?

                        def function(x):
                             return x * 5
                       print(func(7) * func(5))

b) What is the output of the following code fragment?
    required_course = "Programming", "Security", "Cybersecurity"
        a,b,c = required_course
        print(b)

In: Computer Science

Write a java program that will read a file called stateinfo.txt and will store the information...

Write a java program that will read a file called stateinfo.txt and will store the information of the file into a map. The stateinfo.txt file contains the names of some states and their capitals. The format of stateinfo.txt file is as follows.

State                Capital

---------                         -----------

NSW               Sydney

VIC                 Melbourne

WA                 Perth

TAS                 Tasmania

QLD                Brisbane

SA                   Adelaide

The program then prompts the user to enter the name of a state. Upon receiving the user input, the program should display the name of the capital for that particular state. Assume that the name of the state that a user may enter already exists in the stateinfo.txt file.

In: Computer Science

Write a program that prompts the user to insert an item into a stack, delete an...

Write a program that prompts the user to insert an item into a stack, delete an item from the stack, or display all the items in the stack. Assume that the stack maximum capacity is 10. Here is sample run

. Stack operation menu:

1. Insert

2. Delete

3. Display

4. Quit

In: Computer Science

Making a blackjack game in javascript Create a function called createDeck() that will create an array...

Making a blackjack game in javascript

  • Create a function called createDeck() that will create an array of objects (52). Each object contains two properties: suit and value. The suit property will be either 'Hearts', 'Clubs', 'Diamonds', or 'Spades'. The value property will be either 'Ace', 'King', 'Queen', 'Jack', 'Ten', 'Nine', 'Eight', 'Seven', 'Six', 'Five', 'Four', 'Three' , or 'Two''.

    Note: We will probably want to store possible suits and values in separate arrays.
  • Create a function called shuffleDeck() that will randomly "shuffle" our deck of cards
  • We will create a Node application in repl.it that will listen for user input:
  • Create a function that will "draw" four cards (2 for the player and 2 for the computer). The function will choose these cards from our shuffled deck.
  • Display both sets of cards to the console.
  • Create a function to get the numeric card value to calculate the score of each hand
  • Create a function to calculate the score of all the cards in a hand (dealer or player). Hint: You may need two functions.
  • Create a function to "show status" which will be displaying the cards of both players (computer and player) and their score so far. Have the status to the player look like screen shot below:
  •   
  • Well, we need to give the player a chance to hit (get a new card) as many times as they want. We will add the checking for going over 21 and having the computer decide if it it should hit or stand in the next part. Use recursion

In: Computer Science

What is the difference between Computer Science and Software Engineering? (Academic and in your “own” words...

What is the difference between Computer Science and Software Engineering? (Academic and in your “own” words response)

Give examples of what is considered Computer Science and what is considered Software Engineering. Be very specific.

What is your major and why?

---------------

What is an Solution Architect?
What is the value of a AS? What skills are needed to be a good SA?
---------------
What is Requirements Engineer?

What is the value of a RE? What skills are needed to be a good RE?

--------------

Use sources from Software Engineering by Ian Sommerville when applicable.

In: Computer Science

What is the difference between software copyrights and software patent ? NO plagiarism please.

What is the difference between software copyrights and software patent ? NO plagiarism please.

In: Computer Science