Questions
Write a C++ program where class 1 and class 2 (which is a base class) should...

Write a C++ program where class 1 and class 2 (which is a base class) should have a derived class (class 4 and class 5). Each of the derived classes should include at least 1 variable, 2 functions (one will be showing the function overriding case, the second one will be showing the function overloading case), 2 constructors (with default values, with parameters).

Then class 3 (composition) (to relate class 1 and class 2) should include 3 variables (first variable is an object belongs to class 1, second variable is an object belongs to class 2,third variable is class 3 own variable), 3 functions.

In: Computer Science

Write a program to calculate the amount of money in an account: The user will input...

Write a program to calculate the amount of money in an account:

The user will input initial deposit and the number of years to leave that money in the account.

The interest is constant at 0.5% for the entire length of time.

The output will be the balance, with interest compounded annually.

(simple interest formula: interest = principal * rate)

  1. What variables will you need to complete the program?





  2. What “controls” will you need for the program?






  3. What formula will you use? (give to you already!)







  4. Make the program user friendly!! (ideas for that?)

In: Computer Science

What is the Cyber Security Enhancement Act? Provide some examples of court cases that involved violations...

What is the Cyber Security Enhancement Act? Provide some examples of court cases that involved violations of this act. What are some of the punishment(s) if someone is found guilty? (150+ words, no copy and paste from other sources please.)

In: Computer Science

Your software company was invited to provide a proposal for a company in Australia. You currently...

Your software company was invited to provide a proposal for a company in Australia. You currently have the cost in US dollars and need to convert the prices to the Australian dollar.

Write a 2-part program using Ruby, Java®, or Python.

Part 1: Write a function to gather the following costs from the user:

  • Travel Cost: $9,800
  • Hotel Cost: $3,500
  • Rental Car Cost: $1,600
  • Labor Cost: $15,500

Part 2: Write a function to convert the costs from United States dollar (USD) to Australian dollar (AUD). Note: Look up the current USD to AUD exchange rate to use in your function.

Test the program 3 times by providing different costs in USD.

In: Computer Science

Write a C++ program that outputs to a file, final marks and average mark for a...

Write a C++ program that outputs to a file, final marks and average mark for a primary school class. Your program should also output to a second a file, the student names and their average mark in ascending order. This is an example of how your program in action could look like: Sample Input Please enter student name and student number Kgosi Kgosi 20150986 Please student marks for Setswana, Maths, Science, English, and Social Studies 80 70 80 65 100 Please enter any comments about the Student Sample Output First File *************************************Report************************************************* Student Name: Kgosi Kgosi Student Number: 20150986 Course Name Marks % Letter Grade Setswana 80 A - Maths 70 B Science 80 AEnglish 65 B - Social Studies 100 A+ Average: 79 Excellent Comments: **************************************************************************************************** Page 3 of 4 The program should also generate a second file listing all students and their average mark. The list of students should be arranged according to their marks in descending order. Sample Output Second File Kgosi Kgosi 79 Masego Ndi 59 Des Rinn 23

In: Computer Science

Discuss at least four factors that cause bugs and failures of computer systems. Include at least...

Discuss at least four factors that cause bugs and failures of computer systems. Include at least one that can be blamed on people and at least one that is inherent in the technology. For each of your four factors, tell which type of factor it is (blamed on humans or inherent in the technology). Include at least one example of each. Answer in 3 paragraphs. Like an essay

In: Computer Science

Linux always picks up the process from the highest priority queue that is not empty. How...

Linux always picks up the process from the highest priority queue that is not empty.

How does it prevent starvation of processes in the lower priority queues?

(Please help Operating system question, 6 points)

In: Computer Science

Find an article from the internet about Computer security and then write a summary of that...

Find an article from the internet about Computer security and then write a summary of that article. Include why you were interested in the article, what you learned from it, and how you could use it in your career as a cyber security professional. (minimum 1300 words)

In: Computer Science

The following methods are used: main(...), the encode(...) and the decode()....Is there any issue with one...

The following methods are used: main(...), the encode(...) and the decode()....Is there any issue with one of the method? If yes can you correct it.

You are requested to implement the same program without the two methods encode() and decode()...

Implement the code only with the main() and test your program again.

public class SCiphM {

    final static String key = "]kYV}(!7P$n5_0i R:?jOWtF/=-pe'AD&@r6%ZXs\"v*N"
            + "[#wSl9zq2^+g;LoB`aGh{3.HIu4fbK)mU8|dMET><,Qc\\C1yxJ";

    static String text = "Here we have to do is there will be a input/source "
            + "file in which we are going to Encrypt the file by replacing every "
            + "upper/lower case alphabets of the source file with another "
            + "predetermined upper/lower case alphabets or symbols and save "
            + "it into another output/encrypted file and then again convert "
            + "that output/encrypted file into original/decrypted file. This "
            + "type of Encryption/Decryption scheme is often called a "
            + "Substitution Cipher.";

    public static void main(String[] args) {
        String enc = encode(text);

        System.out.println("Encoded: " + enc);
        System.out.println("\nDecoded: " + decode(enc));
    }

    static String encode(String s) {
        String sb = new String(s);
        String r="";
        for (int i =0 ; i < sb.length(); i++) {
            r= r + key.charAt((int)sb.charAt(i) - 32);
           
        }

        return r;
    }
   
    static String decode(String s) {
        String sb1 = new String(s);
        String r1="";
       
        for (int i =0 ; i < sb1.length(); i++) {
            r1= r1 + key.charAt((int)sb1.charAt(i) + 32);
           
        }

        return r1;
    }
   

   
}

In: Computer Science

1. What are the strengths and weaknesses of using a Gantt chart for representing a project...

1. What are the strengths and weaknesses of using a Gantt chart for representing a project plan? How about a Network diagram and a PERT diagram? When they should be used ? Is one method “better” than the other? Should we combine them together?

Please No handwritten work.

In: Computer Science

Describe some advantages of using computer technology (e.g., smart cards, databases, etc.) for identification cards and...

Describe some advantages of using computer technology (e.g., smart cards, databases, etc.) for identification cards and identification systems, as compared to the current Social Security card and number system. Describe some serious potential risks or problems of using computerized ID cards/systems. Consider both private and governmental uses.

Answer in 3 paragraphs. Like an essay.

In: Computer Science

During the systems development life cycle (SDLC), certain key problems discovered in the later stages could...

During the systems development life cycle (SDLC), certain key problems discovered in the later stages could be directly traced back to inadequate and/or poor efforts in the requirements phase and industry studies show that over 50% of systems problems belong to this case. In addition, as mentioned in this week lecture notes "the cost of errors in requirements that weren’t discovered until later" may go up to 1,000 times. As a systems analyst, what should we do to minimize this problem? How might this be avoided?

Please no handwritten notes as those are hard to read.

In: Computer Science

Write a pseudo code program for a goal-based agent. The goal of the agent is to...

Write a pseudo code program for a goal-based agent. The goal of the agent is to find the exit of a labyrinth.

  • The agent is not omniscient
  • The agent can sense if it is next to a wall (in front, left or right)
  • The agent can turn 90 degrees to the right or left
  • The agent can drive 1unit forward

The maze is constructed of paths that are 1 unit across (wide)

Show a maze of your choosing and illustrate the path taken from start to exit according to your program (example shown here).

In: Computer Science

Complete ArrayCollection.java with following methods (Please complete code in java language): public ArrayCollection(); public ArrayCollection(int size);...

Complete ArrayCollection.java with following methods (Please complete code in java language):

public ArrayCollection();

public ArrayCollection(int size);

public boolean isEmpty();

public boolean isFull();

public int size(); // Return number of elements in the Collection.

public String toString();

public boolean add(T element); // Add an element into the Collection, return true if successful

public boolean remove(T target); // Remove the target from Collection, return true if successful

public boolean removeAll(T target); // Remove all occurrences of Target, return if successful

public void removeDuplicate(); // Remove duplicated element(s)

public boolean equals(ArrayCollection that); // Return true if this Collection is same as that Collection

public int count(T target); // Return the number of a given target in the Collection

public void merge(ArrayCollection that); // Merge this Collection with that Collection

public void enlarge(int size); //Increase this Collection with additional size elements

public void clear(); // Clear entire Collection

public boolean contains(T target); // Return true if the target is in the Collection

public int findIndex(T target); // Return index of the target

package Homework3;

public class ArrayCollection<T> {

protected static final int DEFAULT_CAPACITY = 100;

protected T[] elements;

protected int numberOfElements;

public ArrayCollection() {

this(DEFAULT_CAPACITY);

}

public ArrayCollection(int size) {

elements = (T[]) new Object[size];

numberOfElements = 0;

}

public boolean isEmpty() {

return numberOfElements == 0;

}

public boolean isFull() {

return numberOfElements == elements.length;

}

public int size() {

return numberOfElements;

}

public String toString() {

String collection = "";

for (int i = 0; i < numberOfElements; i++)

collection += elements[i] + "\n";

return collection;

}

public boolean add(T element) {

// Complete your code here

return true;

}

public boolean remove(T target) {

// Complete your code here

return true;

}

public boolean removeAll(T target) {

// Complete your code here

return true;

}

public void removeDuplicate() {

// Remove any duplicated elements

}

public boolean equals(ArrayCollection that) {

// Return true if ArrayCollection are identical.

boolean result = true;

// Complete your code here.

return result && this.size() == that.size();

}

public int count(T target) {

// Return count of target occurrences

int c = 0;

// Complete your code here

return c;

}

public void merge(ArrayCollection that) {

// Merge that ArrayCollection into this ArrayCollection

// Complete your code here

}

public void enlarge(int size) {

// Enlarge elements[] with additional size

// Complete your code here

}

public void clear() {

// Remove all elements in the collection

}

//Note: Different from textbook, this implementation has no 'found' and

'location' attributes.

// There is no find() method.

// There is a new methods findIndex().

public boolean contains(T target) {

// Return true if target is found

boolean found = false;

// Complete your code here

return found;

}

public int findIndex(T target) {

// Return index of target

int index = 0;

// Complete your code here

return index;

}

}

In: Computer Science

In the fall 0f 2008 Countrywide Morgage Corporation announced that the private information for thousands of...

In the fall 0f 2008 Countrywide Morgage Corporation announced that the private information for thousands of their customers, including social security numbers and loan numbers, had been compromised. Countrywide offered these customers a free 2-year subscription to a credit protection service. Should this action shield Countrywide from customer lawsuits? Could Countrywide do more? Should they? Given that it was a Countrywide employee who sold the data, does this change Countrywide's responsibilities toward the affected customers? Explain why or why not.

Answer in 3 paragraphs.

In: Computer Science