Write java programs to implement CBC mode of data encryption standard?
In: Computer Science
How do you validate in pseudocode a "REPEAT" "UNTIL" loop? For example if a user inputs invalid data there should be an error message that reprompts for correct data.
To show this can you write Pseudo Code for the following problem?
Create an application that can determine the yearly bonus for all company employees. Not all employees are eligible for a yearly bonus. Only employees that have been with the company longer than 2 years and must have been given a rating of “Great”. Employees receiving a rating of “Bad” are not eligible for a bonus. Lastly, each department awards a different bonus amount based on percentage of yearly salary as shown below.
IT = 5% bonus
Sales=8% bonus
The application should allow the user to continually input employee data until the HR representative has reviewed all employees and has indicated they are finished entering employee data. One by one, the application will enable the HR representative to input an employee’s name, years of service, department, rating and salary. Based on data provided, the application must print well-formatted detail stating whether or not the employee is eligible for a bonus. For employees eligible for a bonus, the application must also print the amount of the bonus to be awarded to the employee. Upon completion of entering all employee data, the application will print a report that includes the total number of employees entered by the HR representative, a count of employees that are eligible for a bonus, and the average bonus amount.
In: Computer Science
Explain TCO and describe how virtualization can reduce TCO.
In: Computer Science
What is are the correct code implementations to remove a node from a circular doubly linked list from the beginning, middle, and end? Using only a dummy node and a pointer in the code implementation for the removal of the last/end node.
In: Computer Science
What decimal number is represented by the binary 2’s complement 8-bit number 11100111? Show your work
In: Computer Science
Question: Write a method named reduce that:
● Takes a function of type (A, A) => A
● Returns A
● Combines all the elements of the list into a single value by
applying the provided function
to all elements
○ You may assume the function is commutative
● If the list has size 1, return that element without calling the
provided function
Example: If head stores a reference to the List(4, 6, 2)
head.reduce((a: Int, b: Int) => a + b) == 12
Programming language is Scala
In: Computer Science
Using Java:
Write a program that uses hash tables and reads in a string from the command line and a dictionary of words from standard input, and checks whether it is a "good" password. Here, assume "good" means that it (i) is at least 8 characters long, (ii) is not a word in the dictionary, (iii) is not a word in the dictionary followed by a digit 0-9 (e.g., hello5), (iv) is not two words separated by a digit (e.g., hello2world).
In: Computer Science
Suppose there are 4 processes P1, P2, P3 and P4 getting to ready queue in various arrival times and with various bursts times as detailed in the table below. Using Shortest-remaining-time-first scheduling approach, find waiting time for each process and the average waiting time and provide detailed steps taken to find the answer. Using time quantum of milliseconds.
|
Process |
Arrival time (ms) |
Burst Time (ms) |
|
P1 |
0 |
8 |
|
P2 |
2 |
3 |
|
P3 |
6 |
2 |
|
P4 |
9 |
7 |
In: Computer Science
create a new Python 3 Jupyter Notebook..
Create one python code cell for the problem below. Use any additional variables and comments as needed to program a solution to the corresponding problem. All functions should be defined at the top of the code in alphabetical order.
Problem:
Rubric:
In: Computer Science
Conduct an illustrated SWOT analysis of data consolidation versus data integration versus data propagation.
In: Computer Science
What is the 8-bit sum of the following 2’s complement numbers: 11101100+00001101? Show your work.
In: Computer Science
Either the iftcase macro in Emacs Lisp which can be used as follows :
(iftcase <exp>
((1 3 5) <exp1>)
((4) <exp2>)
(_ <exp3>))
Which will mean : first evaluate exp then evaluate exp1 if exp returns 1, 3, or 5; otherwise evaluate exp2 if exp returns 4; otherwise evaluate exp3
In: Computer Science
When you first receive a Request for Proposals (RFP), what three sections should you look at to determine if you are going to respond?
In: Computer Science
Python.Python.Python. Write a functional program over the automata that accepts odd length binary digits and rejects those that are not. It must include a function called q0 ,q1, accept and reject(). CANNOT USE STRING. OR LENTH.
101 accepted (3 binary digits)
10610 rejected (the number 6 is not a binary number)
101111 rejected (6 digit binary number)
11111 accepted (5 binary digits)
In: Computer Science
C++ programming
Instructions
Create a ShopCart class that allows you to add items to a shopping cart and get the total price of purchases made.
Items are simply described by an Item class as follows:
class Item {
public:
std :: String description;
float price;
};
The ShopCart class must be able to add and remove items and display an invoice. This class must use a dynamically allocated array of items whose capacity is fixed in advance to the build. The class must include the following methods:
• a constructor specifying the capacity of the cart;
• a copy constructor;
• an addsItem method allowing to add to the cart the item in argument (passage by reference). This method returns true if the addition was made and false if the basket is full;
• an removeItem method to remove the item for which the description is given (std :: String). It will return false if no item in the basket has a description corresponding to that given;
• an billInfo method to display the list of items purchased, their individual price and the total purchase price;
• a destroyer.
Your classes must be in the shop.h file, but all methods must have their definition in the shop.cpp file. You must also create a main function (contained in the dev1.cpp file) to test this class.
In: Computer Science