Questions
How is the first argument passed to a function in x86-64 assembly? Give an example of...

How is the first argument passed to a function in x86-64 assembly? Give an example of this happening in assembly and the corresponding C code.

What x86-64 register is changed to allocate local variables? Explain briefly with an example.

In: Computer Science

what are the four pillars of design And discuss them?

what are the four pillars of design And discuss them?

In: Computer Science

Program Specification: (Visual Studio C++) 1. Read data for names and weights for 15 people from...

Program Specification: (Visual Studio C++)
1. Read data for names and weights for 15 people from the console where there is a name on a line followed by a weight on the next line.
2. Your program will build a list for the data maintained in ascending order based on both name and weight via a doubly linked list.
3. This dll will use one pointer to keep weights in sorted order, and use the other link to keep names on sorted order.
4. You need to build the list as you go maintaining this ordering, so at any time a print method was called it would print the related field in order. (This means nodes are added to the list in sorted order, elements are not added to the list followed by a sort called on the list.)

For example after 3 elements are added for (Name – Weight):
Michael – 275, Tom – 150, Abe – 200.

Output:
Names & weights sorted(ascending) by name. : Abe – 200, Michael – 275, Tom - 150
Names & weights sorted(ascending) by weight. : Tom – 150, Abe – 200, Michael - 275

Jim
150
Tom
212
Michael
174
Abe
199
Richard
200
April
117
Claire
124
Bobby
109
Bob
156
Kevin
145
Jason
182
Brian
150
Chris
175
Steven
164
Annabelle
99

In: Computer Science

*C PROGRAMMING LANGUAGE* a) Given an array of size n, sort the array using pointers using...

*C PROGRAMMING LANGUAGE*

a) Given an array of size n, sort the array using pointers using malloc or calloc. Examples: Input: n = 5, A= {33,21,2,55,4} Output: {2,4,21,33,55}

b) Write a function that declares an array of 256 doubles and initializes each element in the array to have a value equal to half of the index of that element. That is, the value at index 0 should be 0.0, the value at index 1 should be 0.5, the value at index 2 should be 1.0, and so on. your function must be called in the main. Also, declaring array and the size must be using heap.

In: Computer Science

C++ code: Write a program that randomly generates an integer between 0 and 100, inclusive. The...

C++ code:

Write a program that randomly generates an integer between 0 and 100, inclusive. The program prompts the user to enter a number continuously until the number matches the randomly generated number. For each user input, the program tells the user whether the input is too low or too high, so the user can choose the next input intelligently. Here is a sample run:

In: Computer Science

Case Study 1: Securing your home computer You just purchased a brand new computer for your...

Case Study 1: Securing your home computer
You just purchased a brand new computer for your home environment. It comes with the latest operating system, Internet connectivity and all accessories to complete your home office and school activities. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking.
Describe the steps you plan to go through to ensure this new computer system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement, browser privacy and security settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and uses the proper certificates.
Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment.

In: Computer Science

Use the web or other resources to research at least two criminal or civil cases in...

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Need 300 words Please don't write already existing chegg anw

In: Computer Science

Suppose that the file inData.txt contains the following data: 10.20 5.35 15.6 Randy Gill 31 18500...

Suppose that the file inData.txt contains the following data:

10.20 5.35

15.6

Randy Gill 31

18500 3.5

A

The numbers in the first line represent the length and width, respectively, of a rectangle. The number in the second line represents the radius of a circle. The third line contains the first name, last name, and the age of a person. The first number in the fourth line is the savings account balance at the beginning of the month, and the second number is the interest rate per year. (Assume that π = 3.1416.) The fifth line contains an uppercase letter between A and Y (inclusive). Write statements so that after the program executes, the contents of the file outData.txt are as shown below. If necessary, declare additional variables. Your statements should be general enough so that if the content of the input file changes and the program is run again (without editing and recompiling), it outputs the appropriate results.

Rectangle:

Length = 10.20, width = 5.35, area = 54.57, parameter = 31.10

Circle:

Radius = 15.60, area = 764.54, circumference = 98.02

Name: Randy Gill, age: 31

Beginning balance = $18500.00, interest rate = 3.50

Balance at the end of the month = $18553.96

The character that comes after A in the ASCII set is B


In: Computer Science

Some analysts have argued that Big Data is fundamentally about data “plumbing,” and not about insights,...

Some analysts have argued that Big Data is fundamentally about data “plumbing,” and not about insights, or deriving interesting patterns. It is argued that value (the fifth V) can just as easily be found in “small,” normal, or “weird” datasets (i.e., datasets that wouldn’t have been considered before). Do you agree with this? Can you think of small or novel datasets that would provide value as well, without requiring a full-fledged Hadoop setup?

In: Computer Science

Need to modify so that it uses a function. We are taking a number and rounding...

Need to modify so that it uses a function. We are taking a number and rounding it to 2 from the decimal.

<!doctype html>
<html>
<head>
   <title> NumberRounder </title>
</head>

<body>
   <h2>Number Rounder</h2>
   <p>
   Enter a number: <input type="text" id="numberBox" size=12 value=3.14159>
   </p>
   <input type="button" value="Round It"
       onclick="number=parseFloat(document.getElementId('numberBox').value);
               rounded=Math.round(number*100)/100;
               document.getElementId('outputDiv').innerHTML=
                   number + ' rounded to one decimal place is ' + rounded;">
  
   <hr>
   <div id="outputDiv"></div>
</body>
</html>

In: Computer Science

Think about some examples of Big data in industry. Try to focus on Vs other than...

Think about some examples of Big data in industry. Try to focus on Vs other than the volume aspect of Big Data. Why do you think these examples qualify as Big Data?

In: Computer Science

The following Java code is set up to ask how many people are attending a meeting...

The following Java code is set up to ask how many people are attending a meeting and checks these user generate responses with replies, using the do while setup. To end the loop you type 0, change this to accept the answer "Y" to continue the loop after every response and "N" to end the loop with every case type. (Y,y,N,n)

Meeting.java
------
import java.util.Scanner;

public class Meeting {
   public static void main(String[] args) {
       Scanner input = new Scanner(System.in);
       final int ROOM_CAPACITY = 100;
       int numPeople, diff;
       String name;
       System.out.println("****** Meeting Organizer ******");
      
       System.out.print("Enter your name: ");
       name = input.nextLine();
       System.out.println("Welcome " + name);
       do{
           System.out.print("\nHow many people would attend the meeting? (type 0 to quit): ");
           numPeople = input.nextInt();
           if(numPeople < 0)
               System.out.println("Invalid input!");
           else if(numPeople != 0)
           {
               if(numPeople > ROOM_CAPACITY)
               {
                   diff = numPeople - ROOM_CAPACITY;
                   System.out.println("Sorry! The room can only accommodate " + ROOM_CAPACITY +" people. ");
                   System.out.println(diff + " people have to drop off");
               }
               else if(numPeople < ROOM_CAPACITY)
               {
                   diff = ROOM_CAPACITY - numPeople;
                   System.out.println("The meeting can take place. You may still invite " + diff + " people");
               }
               else
               {
                   System.out.println("The meeting can take place. The room is full");
               }
           }
       }while(numPeople != 0);
       System.out.println("Goodbye!");   }
}

In: Computer Science

7/Draw a flowchart that asks the user to enter an array of random numbers, then sorts...

7/Draw a flowchart that asks the user to enter an array of random numbers, then sorts the numbers (descending order), after that reverses it (the first element will be the last...).

In: Computer Science

How to write code for stack with singly linked list using C? Please show examples for...

How to write code for stack with singly linked list using C?

Please show examples for create, free, isempty, push, top, pop functions.

In: Computer Science

In a computer instruction format, the instruction length is 16 bits and the size of an...

In a computer instruction format, the instruction length is 16 bits and the size of an address field is 4 bits. Is it possible to have: 15 instructions with 3 addresses, 14 instructions with 2 addresses, 31 instructions with one address, and 16 instructions with zero addresses, using this format? Justify your answer.

In: Computer Science