In: Computer Science
Typed please.How can we implement efficient search operations? In this area, we will discuss various algorithms, including sequential search, sorted search, and binary search. The characteristics of these algorithms will be analyzed, such as the running times and the type of lists they can be used with.
In: Computer Science
ystems Analysis and Design in a Changing World (7th Edition)
on the Spot Courier Service
Case study for chapter # 6 [page # 182]
Previous chapters have described the technological
capabilities that Bill Wiley wants for servicing his customers. One
of the problems that Bill has is that his company is very small, so
he cannot afford to develop any special-purpose equipment or even
sophisticated software.
Given this limitation, Bill’s need for advanced technological
capabilities comes at an opportune time. Equipment manufacturers
are developing equipment with advanced telecommunications
capabilities, and freelance software developers are producing
software applications—many of which provide the capabilities that
Bill needs. The one caveat is that because this will be a live
production system, it needs to be reliable, stable, error-free,
dependable, and maintainable.
Let us review some of the required capabilities of the new system,
which has been described in previous chapters:
Customers
■ Customers can request package pickup via the
Internet.
■ Customers can check the status of packages via the
Internet.
■ Customers can print mailing labels at their
offices.
Drivers
■ Drivers can view their schedules via a portable
digital device while on their routes.
■ Drivers can update the status of packages while on
their routes.
■ Drivers can allow customers to “sign” for packages
that are delivered.
they only plan to provide some design specifications and guidelines
to each resort. The resort will be responsible for connecting to
the Internet and for providing a secure wireless environment for
the students.
1. For which subsystem(s) is(are) integrity and security controls
most important? Why?
2. What data should be encrypted during trans- mission through
resort wireless networks to SBRU systems? Does your answer change
if students interact with SBRU systems using a cell phone
(directly, or as a cellular modem)?
■ The system “knows” where the driver is on his route
and can send updates in real time.
■ Drivers can accept payments and record them on the
system.
Bill Wiley (management)
■ Bill can record package pickups from the ware-
house.
■ Bill can schedule delivery/pickup runs. ■
Bill can do accounting, billing, etc. ■ Bill can access
the company network from his
home. Given these requirements, do the following:
1. What kind of fraud is possible in this scenario? By
the customer? By the truck driver? By
colaboration between system users? What steps should Bill take to
minimize the opportunity for fraud?
2. What kind of access controls should be put in place?
For the customer? (Notice the customer has no financial
transactions. Would you change your answer if the customer could
also make payments online?) For the truck driver? For Bill? Are the
typical userID and password sufficient for all three, or would you
require more or less for each?
In: Computer Science
In: Computer Science
Polish notation, also known as Polish prefix notation or simply prefix notation, is a form of notation for logic, arithmetic, and algebra. Its distinguishing feature is that it places operators to the left of their operands.
The expression for adding the numbers 1 and 2, in prefix notation, is written as “+ 12” rather than “1 + 2”. In more complex expressions, the operands may be nontrivial expressions including operators of their own. For instance, the expression that would be written in conventional infix notation as (5 + 6) * 7 can be written in prefix as * (+ 5 6) 7
In this assignment, we only care about binary operators: + - * and /.
For binary operators, prefix representation is unambiguous and bracketing the prefix expression is unnecessary. As such, the previous expression can be further simplified to * + 5 6 7
The processing of the product is deferred until its two operands are available (i.e., 5 plus 6, then multiplies the result with 7). As with any notation, the innermost expressions are evaluated first, but in prefix notation this ”innermost-ness” is conveyed by order rather than bracketing.
Your task is to create a class that convert a prefix expression to a standard form (otherwise known as infix) and compute the prefix expression.
Main function
The test script will compile your code using
g++ -o main.out -std=c++11 -O2 -Wall *.cpp
It is your responsibility to ensure that your code compiles on the university system. g++ has too many versions, so being able to compile on your laptop does not guarantee that it compiles on the university system. You are encouraged to debug your code on a lab computer (or use SSH).
Create a main function that takes in one line. The line contains a list of operators and operands separated by spaces. The input doesn’t contain parenthesis. An operator is a character from +, -, *, and /. An operand is a nonnegative integer from 0 to 99. You are asked to convert the prefix expression to an infix form and output its value as well. If the expression is not a valid prefix expression, your program should output “Error”.
Sample input: * - 5 6 7
Sample output: (5 - 6) * 7 = -7
Sample input: * 5
Sample output: Error
Sample input: * 5 6 7
Sample output: Error
Please provide the .h, .cpp and main.cpp file for this, like Polish.h Polish.cpp and main.cpp thank you
In: Computer Science
Master thesis on :
Blockchain technology and its uses on today's on today's business life. [at least 4000 word ]
In: Computer Science
1. Explain why we need CAD CAM technologies
2. List advantages of 3D model over 2D model
3. Briefly explain 3 types of digital 3D modeling
4. Discuss the completeness, unambiguousness
and uniqueness of solid modeling schemes.
In: Computer Science
I am working on routing path and subnet. The question is I am given with source 10.1.240.240 and the destinations is 10.2.240.240. How is the packet traveling?
In: Computer Science
C language problem.
Suppose I open I file and read a integer 24. And I want to store them into a array byte [].
The answer should be byte[0] = 0x9F.
How can I do that?
In: Computer Science
1) Use Python to answer the below questions.
a) What is the output of the following python code?
def function(x):
return x * 5
print(func(7) * func(5))
b) What is the output of the following code fragment?
required_course = "Programming", "Security",
"Cybersecurity"
a,b,c =
required_course
print(b)
In: Computer Science
Write a java program that will read a file called stateinfo.txt and will store the information of the file into a map. The stateinfo.txt file contains the names of some states and their capitals. The format of stateinfo.txt file is as follows.
State Capital
--------- -----------
NSW Sydney
VIC Melbourne
WA Perth
TAS Tasmania
QLD Brisbane
SA Adelaide
The program then prompts the user to enter the name of a state. Upon receiving the user input, the program should display the name of the capital for that particular state. Assume that the name of the state that a user may enter already exists in the stateinfo.txt file.
In: Computer Science
Write a program that prompts the user to insert an item into a stack, delete an item from the stack, or display all the items in the stack. Assume that the stack maximum capacity is 10. Here is sample run
. Stack operation menu:
1. Insert
2. Delete
3. Display
4. Quit
In: Computer Science
Making a blackjack game in javascript
In: Computer Science
What is the difference between Computer Science and Software Engineering? (Academic and in your “own” words response)
Give examples of what is considered Computer Science and what is considered Software Engineering. Be very specific.
What is your major and why?
---------------
What is an Solution Architect?
What is the value of a AS? What skills are needed to be a good
SA?
---------------
What is Requirements Engineer?
What is the value of a RE? What skills are needed to be a good RE?
--------------
Use sources from Software Engineering by Ian Sommerville when applicable.
In: Computer Science
What is the difference between software copyrights and software patent ? NO plagiarism please.
In: Computer Science