Questions
Write java programs to implement CBC mode of data encryption standard?

Write java programs to implement CBC mode of data encryption standard?

In: Computer Science

How do you validate in pseudocode a "REPEAT" "UNTIL" loop? For example if a user inputs...

How do you validate in pseudocode a "REPEAT" "UNTIL" loop? For example if a user inputs invalid data there should be an error message that reprompts for correct data.

To show this can you write Pseudo Code for the following problem?

Create an application that can determine the yearly bonus for all company employees. Not all employees are eligible for a yearly bonus. Only employees that have been with the company longer than 2 years and must have been given a rating of “Great”. Employees receiving a rating of “Bad” are not eligible for a bonus. Lastly, each department awards a different bonus amount based on percentage of yearly salary as shown below.

IT = 5% bonus

Sales=8% bonus

The application should allow the user to continually input employee data until the HR representative has reviewed all employees and has indicated they are finished entering employee data. One by one, the application will enable the HR representative to input an employee’s name, years of service, department, rating and salary. Based on data provided, the application must print well-formatted detail stating whether or not the employee is eligible for a bonus. For employees eligible for a bonus, the application must also print the amount of the bonus to be awarded to the employee. Upon completion of entering all employee data, the application will print a report that includes the total number of employees entered by the HR representative, a count of employees that are eligible for a bonus, and the average bonus amount.

In: Computer Science

Explain TCO and describe how virtualization can reduce TCO.

Explain TCO and describe how virtualization can reduce TCO.

In: Computer Science

What is are the correct code implementations to remove a node from a circular doubly linked...

What is are the correct code implementations to remove a node from a circular doubly linked list from the beginning, middle, and end? Using only a dummy node and a pointer in the code implementation for the removal of the last/end node.

In: Computer Science

What decimal number is represented by the binary 2’s complement 8-bit number 11100111? Show your work

What decimal number is represented by the binary 2’s complement 8-bit number 11100111? Show your work

In: Computer Science

Question: Write a method named reduce that: ● Takes a function of type (A, A) =>...

Question: Write a method named reduce that:
● Takes a function of type (A, A) => A
● Returns A
● Combines all the elements of the list into a single value by applying the provided function
to all elements
○ You may assume the function is commutative
● If the list has size 1, return that element without calling the provided function
Example: If head stores a reference to the List(4, 6, 2)
head.reduce((a: Int, b: Int) => a + b) == 12

Programming language is Scala

In: Computer Science

Using Java: Write a program that uses hash tables and reads in a string from the...

Using Java:

Write a program that uses hash tables and reads in a string from the command line and a dictionary of words from standard input, and checks whether it is a "good" password. Here, assume "good" means that it (i) is at least 8 characters long, (ii) is not a word in the dictionary, (iii) is not a word in the dictionary followed by a digit 0-9 (e.g., hello5), (iv) is not two words separated by a digit (e.g., hello2world).

In: Computer Science

Suppose there are 4 processes P1, P2, P3 and P4 getting to ready queue in various...

Suppose there are 4 processes P1, P2, P3 and P4 getting to ready queue in various arrival times and with various bursts times as detailed in the table below. Using Shortest-remaining-time-first scheduling approach, find waiting time for each process and the average waiting time and provide detailed steps taken to find the answer. Using time quantum of milliseconds.

Process

Arrival time (ms)

Burst Time (ms)

P1

0

8

P2

2

3

P3

6

2

P4

9

7

In: Computer Science

create a new Python 3 Jupyter Notebook.. Create one python code cell for the problem below....

create a new Python 3 Jupyter Notebook..

Create one python code cell for the problem below. Use any additional variables and comments as needed to program a solution to the corresponding problem. All functions should be defined at the top of the code in alphabetical order.

Problem:

  1. Define a function with the following characteristics:
    • The function's purpose will be checking that a number matches another, so it should be named appropriately.
    • It must accept one parameter, which is the number it will be checking. Name this parameter appropriately.
    • It must have an appropriate docstring.
    • There needs to be a variable defined within the program that is the integer value of ((your birth month prepended to your birth year) mod 555). So if your birthday is October 1925, this variable would be (101925 % 555). It is the number the argument will be compared to, so name it appropriately.
    • If the numbers match, the function should return True, otherwise False.
  2. Define a different function with the following characteristics:
    • This function will be trying to guess a passcode, so it should be named appropriately.
    • It must accept two parameters, both with default values.
      • The first parameter will be for the smallest number to check and its default value will be 0.
      • The second parameter will be for the largest number to check and its default value will be 100.
    • The function must have an appropriate docstring.
    • Create a variable to hold the correct passcode. You won't know the value yet, so define it as None.
    • Build a list of all of the numbers from the smallest to the largest (it must include the largest number in the list). Hint: Use the range() function with the first argument as the smallest number and the second argument as the largest value plus 1.
    • Loop through the list and for each iteration of the loop, do the following:
      • Call the function described in step 1 with the current list item as the argument and assign its return value to a variable.
      • If the function above returns True, store the current list item in the correct passcode variable and break out of the loop.
    • Return the correct passcode.
  3. In your main code section, call the function defined in step 2 and store its return value in a variable named "passcode". You'll use the default argument value for the smallest number, so leave it out of the call. However, for the largest number, you need to pass in 555 as the argument.
  4. Print out the correct passcode in a format string with a friendly (or funny) message.

Rubric:

  • Adequate readability, comments, etc.
  • Uses docstrings for methods
  • Calls checker function using default argument for the first parameter
  • Calls checker function overriding argument for second parameter
  • Has a method to check against mod value
  • Uses mod correctly
  • Has a method to loop through range
  • Uses default argments for parameters
  • Range is defined using second parameter plus one
  • Break out of loop when value is found
  • Store in variable named passcode
  • Uses a format string to print
  • Has a main code section

In: Computer Science

Conduct an illustrated SWOT analysis of data consolidation versus data integration versus data propagation.

Conduct an illustrated SWOT analysis of data consolidation versus data integration versus data propagation.

In: Computer Science

What is the 8-bit sum of the following 2’s complement numbers: 11101100+00001101? Show your work.

What is the 8-bit sum of the following 2’s complement numbers: 11101100+00001101? Show your work.

In: Computer Science

Either the iftcase macro in Emacs Lisp which can be used as follows : (iftcase <exp>...

Either the iftcase macro in Emacs Lisp which can be used as follows :

(iftcase <exp>

((1 3 5) <exp1>)

((4) <exp2>)

(_ <exp3>))

Which will mean : first evaluate exp then evaluate exp1 if exp returns 1, 3, or 5; otherwise evaluate exp2 if exp returns 4; otherwise evaluate exp3

  1. Show the desired expansion for this code.
  2. Identify the possible risks of excessive repeated evaluation (similar to passing by name) and name capture , if the macro is defined too naively
  3. Give a definition of this macro which does not suffer from these problems.

In: Computer Science

When you first receive a Request for Proposals (RFP), what three sections should you look at...

When you first receive a Request for Proposals (RFP), what three sections should you look at to determine if you are going to respond?

In: Computer Science

Python.Python.Python. Write a functional program over the automata that accepts odd length binary digits and rejects...

Python.Python.Python. Write a functional program over the automata that accepts odd length binary digits and rejects those that are not. It must include a function called q0 ,q1, accept and reject(). CANNOT USE STRING. OR LENTH.

101 accepted (3 binary digits)

10610 rejected (the number 6 is not a binary number)

101111 rejected (6 digit binary number)

11111 accepted (5 binary digits)

In: Computer Science

C++ programming Instructions Create a ShopCart class that allows you to add items to a shopping...

C++ programming

Instructions

Create a ShopCart class that allows you to add items to a shopping cart and get the total price of purchases made.

Items are simply described by an Item class as follows:

class Item {

  public:

     std :: String description;

     float price;

};

The ShopCart class must be able to add and remove items and display an invoice. This class must use a dynamically allocated array of items whose capacity is fixed in advance to the build. The class must include the following methods:

• a constructor specifying the capacity of the cart;

• a copy constructor;

• an addsItem method allowing to add to the cart the item in argument (passage by reference). This method returns true if the addition was made and false if the basket is full;

• an removeItem method to remove the item for which the description is given (std :: String). It will return false if no item in the basket has a description corresponding to that given;

• an billInfo method to display the list of items purchased, their individual price and the total purchase price;

• a destroyer.

Your classes must be in the shop.h file, but all methods must have their definition in the shop.cpp file. You must also create a main function (contained in the dev1.cpp file) to test this class.

In: Computer Science