Questions
Describe how Java creates a single dimension array and a double dimension array. Describe and explain...

Describe how Java creates a single dimension array and a double dimension array.


Describe and explain how Java processes the contents of a single dimension array.


Describe and explain how Java saves values to a single dimension array, and to a double dimension array.

In: Computer Science

what are the goals of network administration ?

what are the goals of network administration ?

In: Computer Science

1. Prove  that the backtracking algorithm will always return a correct solution (where possible) when solving a...

1. Prove  that the backtracking algorithm will always return a correct solution (where possible) when solving a game of peg solitaire.

2.Perform empirical analysis and compare the observation to the theoretical analysis. of backtracking algorithm

In: Computer Science

For this assignment, you will select a current research paper (published since 2016) to review. You...

For this assignment, you will select a current research paper (published since 2016) to review. You may select any research paper that is related to Data Science or Big Data Analytics. I strongly recommend that you start your search at Google Scholar (scholar.google.com). Once you enter your search term(s), select the "Since 2016" link on the left. Feel free to choose ANY relevant paper. (I would recommend that you select one that you can read and summarize in a reasonable amount of time. Don't select a 100 page paper!)

Need 200 words review on that paper

In: Computer Science

Write a program in C++ that calculates the sum of two fractions. The program should ask...

Write a program in C++ that calculates the sum of two fractions. The program should ask for the numerators and denominators of two fractions and then output the sum of the two fractions. You will need to write four functions for this program, one to read the inputted data, one to calculate the sum of the two fractions, one to find the Greatest Common Divider (GCD) between the numerator and denominator and a function that will display the end result. The program should execute in a loop, asking the use if they wish to continue. The output should look similar as that below. Assume the user will only enter positive numbers, and neither denominator will ever be zero.
This program adds two fractions and displays the answer in reduced form.
Enter numerator 1: 1
Enter denominator 1: 3
Enter numerator 2: 1
Enter denominator 2: 6
1/3 + 1/6 = 1/2
Would you like to continue? (y/n)
After using the above formula, then reduce the answer by dividing the numerator and denominator by their GCD.
The prototypes for the four functions you will need to write are as follows:
void readTwoFractions(int &n1, int &d1, int &n2, int &d2);
void addTwoFractions(int n1, int d1, int n2, int d2, int &num, int &den);
int greatestCommonDivider(int top, int bottom);
void displaySumOfFractions(int n1, int d1, int n2, int d2, int top, int bottom);

In: Computer Science

Write a program function code in Python that prompts the user to enter the total of...

Write a program function code in Python that prompts the user to enter the total of his/her purchase and add 5% as the VAT. The program should display the total without and with VAT.

( that mean i should ask the user to enter the number of their item " so i think that i should use range"

then print the result with and without the VAT )

In: Computer Science

Create a timer in REACT JS using any library application which asks the user for minutes....

  1. Create a timer in REACT JS using any library application which asks the user for minutes. The user then click Start button and starts the timer count down.

In: Computer Science

A UML class diagram can be used to model UML by considering each graphical component of...


A UML class diagram can be used to model UML by considering each graphical component of the notation to be a class. For example, a class diagram contains a collection of classes.
Your problem is to construct and draw one class diagram with the below UML elements. That is, there will be a class for each of the elements listed. You must also provide ALL of the relationships between each of these classes. The elements to model in the class diagram are:
Class Diagram
Class
Method/Operator
Attribute
Relationships
Generalization
Dependency
Association
Aggregation
Composition
Sequence Diagram
Object
Message/Call
You may use a UML drawing tool and submit PDF or image of diagram. You may also draw it by hand (neatly) and take a picture of it and submit a PDF or image.

In: Computer Science

Part 1: Software Testing (6 marks): Assume that you are building a web-based grocery shopping system...

Part 1: Software Testing :

Assume that you are building a web-based grocery shopping system (similar to the ones that

Woolworths and Coles provide). The system allows customers to add grocery items to a (virtual)

shopping cart and pay online. They will then be notified when the order is ready for pick-up in the

selected store.

1. Identify one functional and one non-functional requirement related to that system .

2. Describe how you would test those two requirements .

3. For the item counts in the shopping cart, describe what equivalence classes and boundary values

you would choose when creating the corresponding unit tests .

Part 2: Project Management (Risk Management) :

Consider the scenario outlined in Part 1.

1. Identify two risks associated with the development of that system .

2. Assess their probability and severity .

3. Provide strategies to manage the risks .

Can someone give me some ideas?

In: Computer Science

Part 2: Project Management (Risk Management) (6 marks): 1. Identify two risks associated with the development...

Part 2: Project Management (Risk Management) :

1. Identify two risks associated with the development of that system .

2. Assess their probability and severity .

3. Provide strategies to manage the risks .

In: Computer Science

IT-344: Database Management Systems please No handwriting thank you Topic of Discussion According to the conflicts...

IT-344: Database Management Systems
please No handwriting
thank you

Topic of Discussion
According to the conflicts and failure in transactions processing, the need of concurrency control and recovery appeared.
Discuss the differences between concurrency control and recovery in terms of:
The purposes.
The algorithms.
The problems.

In: Computer Science

how to change binary to ternary or base3 and base6 and base7. 1001010110 into base3 and...

how to change binary to ternary or base3 and base6 and base7.
1001010110 into base3 and base7

i just want to know how change binary into base3 base6 and base7.
110010110 into base3 base6 and base7.

In: Computer Science

Explain the difference in characteristics between client-side widgets and server-side widgets? e-portal development no copy original...

Explain the difference in characteristics between client-side widgets and server-side widgets?

e-portal development

no copy original answer please also no hand writing

In: Computer Science

Create a python program that will ask the user for his job title and print out...

Create a python program that will ask the user for his job title and print out the first letter, the last letter and the total number of letters in his job

In: Computer Science

I used this code for my first draft assignment. My teacher told me not to add...

I used this code for my first draft assignment. My teacher told me not to add a decrypt function. I have the variable encryptionKey holding 16. I can simply negate encryptionKey with the - in front. Then I make one key change and all the code still works properly. How do I adjust this code?

import csv import sys #The password list - We start with it populated for testing purposes passwords = [["yahoo","XqffoZeo"],["google","CoIushujSetu"]] #The password file name to store the passwords to passwordFileName = "samplePasswordFile" #The encryption key for the caesar cypher encryptionKey=16 #Caesar Cypher Encryption def passwordEncrypt (unencryptedMessage, key): # We will start with an empty string as our encryptedMessage encryptedMessage = '' # For each symbol in the unencryptedMessage we will add an encrypted symbol into the encryptedMessage for symbol in unencryptedMessage: if symbol.isalpha(): num = ord(symbol) num += key if symbol.isupper(): if num > ord('Z'): num -= 26 elif num < ord('A'): num += 26 elif symbol.islower(): if num > ord('z'): num -= 26 elif num < ord('a'): num += 26 encryptedMessage += chr(num) else: encryptedMessage += symbol return encryptedMessage #Caesar Cypher Decryption def passwordDecrypt (encryptedMessage, key): # We will start with an empty string as our unencryptedMessage unEncryptedMessage = '' # For each symbol in the encryptedMessage we will add an unencrypted symbol into the unencryptedMessage for symbol in encryptedMessage: if symbol.isalpha(): num = ord(symbol) num -= key if symbol.isupper(): if num > ord('Z'): num -= 26 elif num < ord('A'): num += 26 elif symbol.islower(): if num > ord('z'): num -= 26 elif num < ord('a'): num += 26 unEncryptedMessage += chr(num) else: unEncryptedMessage += symbol return unEncryptedMessage def loadPasswordFile(fileName): with open(fileName, newline='') as csvfile: passwordreader = csv.reader(csvfile) passwordList = list(passwordreader) return passwordList def savePasswordFile(passwordList, fileName): with open(fileName, 'w+', newline='') as csvfile: passwordwriter = csv.writer(csvfile) passwordwriter.writerows(passwordList) while True: print("What would you like to do:") print(" 1. Open password file") print(" 2. Lookup a password") print(" 3. Add a password") print(" 4. Save password file") print(" 5. Print the encrypted password list (for testing)") print(" 6. Quit program") print("Please enter a number (1-4)") choice = input() if (choice == '1'): # Load the password list from a file passwords = loadPasswordFile(passwordFileName) if (choice == '2'): # Lookup at password print("Which website do you want to lookup the password for?") for keyvalue in passwords: print(keyvalue[0]) passwordToLookup = input() # Iterate through password list # Match it with user input # If matches, save password in a variable and break from loop # Print password # Decrypt password and print it as well for i in range(len(passwords)): if passwords[i][0]==passwordToLookup: pwd=passwords[i][1] break print(pwd) decryptedPassword=passwordDecrypt(pwd,encryptionKey) print(decryptedPassword) if (choice == '3'): print("What website is this password for?") website = input() print("What is the password?") unencryptedPassword = input() # Encrypt entered password # Create a list with website name and passsword # Add this to existing passwords list encryptedPassword = passwordEncrypt(unencryptedPassword, encryptionKey) pwdList=[website,encryptedPassword] passwords.append(pwdList) if (choice == '4'): # Save the passwords to a file savePasswordFile(passwords, passwordFileName) if (choice == '5'): # print out the password list for keyvalue in passwords: print(', '.join(keyvalue)) if (choice == '6'): # quit our program sys.exit()

In: Computer Science