Questions
Write a program function code in Python that prompts the user to enter the total of...

Write a program function code in Python that prompts the user to enter the total of his/her purchase and add 5% as the VAT. The program should display the total without and with VAT.

( that mean i should ask the user to enter the number of their item " so i think that i should use range"

then print the result with and without the VAT )

In: Computer Science

Create a timer in REACT JS using any library application which asks the user for minutes....

  1. Create a timer in REACT JS using any library application which asks the user for minutes. The user then click Start button and starts the timer count down.

In: Computer Science

A UML class diagram can be used to model UML by considering each graphical component of...


A UML class diagram can be used to model UML by considering each graphical component of the notation to be a class. For example, a class diagram contains a collection of classes.
Your problem is to construct and draw one class diagram with the below UML elements. That is, there will be a class for each of the elements listed. You must also provide ALL of the relationships between each of these classes. The elements to model in the class diagram are:
Class Diagram
Class
Method/Operator
Attribute
Relationships
Generalization
Dependency
Association
Aggregation
Composition
Sequence Diagram
Object
Message/Call
You may use a UML drawing tool and submit PDF or image of diagram. You may also draw it by hand (neatly) and take a picture of it and submit a PDF or image.

In: Computer Science

Part 1: Software Testing (6 marks): Assume that you are building a web-based grocery shopping system...

Part 1: Software Testing :

Assume that you are building a web-based grocery shopping system (similar to the ones that

Woolworths and Coles provide). The system allows customers to add grocery items to a (virtual)

shopping cart and pay online. They will then be notified when the order is ready for pick-up in the

selected store.

1. Identify one functional and one non-functional requirement related to that system .

2. Describe how you would test those two requirements .

3. For the item counts in the shopping cart, describe what equivalence classes and boundary values

you would choose when creating the corresponding unit tests .

Part 2: Project Management (Risk Management) :

Consider the scenario outlined in Part 1.

1. Identify two risks associated with the development of that system .

2. Assess their probability and severity .

3. Provide strategies to manage the risks .

Can someone give me some ideas?

In: Computer Science

Part 2: Project Management (Risk Management) (6 marks): 1. Identify two risks associated with the development...

Part 2: Project Management (Risk Management) :

1. Identify two risks associated with the development of that system .

2. Assess their probability and severity .

3. Provide strategies to manage the risks .

In: Computer Science

IT-344: Database Management Systems please No handwriting thank you Topic of Discussion According to the conflicts...

IT-344: Database Management Systems
please No handwriting
thank you

Topic of Discussion
According to the conflicts and failure in transactions processing, the need of concurrency control and recovery appeared.
Discuss the differences between concurrency control and recovery in terms of:
The purposes.
The algorithms.
The problems.

In: Computer Science

how to change binary to ternary or base3 and base6 and base7. 1001010110 into base3 and...

how to change binary to ternary or base3 and base6 and base7.
1001010110 into base3 and base7

i just want to know how change binary into base3 base6 and base7.
110010110 into base3 base6 and base7.

In: Computer Science

Explain the difference in characteristics between client-side widgets and server-side widgets? e-portal development no copy original...

Explain the difference in characteristics between client-side widgets and server-side widgets?

e-portal development

no copy original answer please also no hand writing

In: Computer Science

Create a python program that will ask the user for his job title and print out...

Create a python program that will ask the user for his job title and print out the first letter, the last letter and the total number of letters in his job

In: Computer Science

I used this code for my first draft assignment. My teacher told me not to add...

I used this code for my first draft assignment. My teacher told me not to add a decrypt function. I have the variable encryptionKey holding 16. I can simply negate encryptionKey with the - in front. Then I make one key change and all the code still works properly. How do I adjust this code?

import csv import sys #The password list - We start with it populated for testing purposes passwords = [["yahoo","XqffoZeo"],["google","CoIushujSetu"]] #The password file name to store the passwords to passwordFileName = "samplePasswordFile" #The encryption key for the caesar cypher encryptionKey=16 #Caesar Cypher Encryption def passwordEncrypt (unencryptedMessage, key): # We will start with an empty string as our encryptedMessage encryptedMessage = '' # For each symbol in the unencryptedMessage we will add an encrypted symbol into the encryptedMessage for symbol in unencryptedMessage: if symbol.isalpha(): num = ord(symbol) num += key if symbol.isupper(): if num > ord('Z'): num -= 26 elif num < ord('A'): num += 26 elif symbol.islower(): if num > ord('z'): num -= 26 elif num < ord('a'): num += 26 encryptedMessage += chr(num) else: encryptedMessage += symbol return encryptedMessage #Caesar Cypher Decryption def passwordDecrypt (encryptedMessage, key): # We will start with an empty string as our unencryptedMessage unEncryptedMessage = '' # For each symbol in the encryptedMessage we will add an unencrypted symbol into the unencryptedMessage for symbol in encryptedMessage: if symbol.isalpha(): num = ord(symbol) num -= key if symbol.isupper(): if num > ord('Z'): num -= 26 elif num < ord('A'): num += 26 elif symbol.islower(): if num > ord('z'): num -= 26 elif num < ord('a'): num += 26 unEncryptedMessage += chr(num) else: unEncryptedMessage += symbol return unEncryptedMessage def loadPasswordFile(fileName): with open(fileName, newline='') as csvfile: passwordreader = csv.reader(csvfile) passwordList = list(passwordreader) return passwordList def savePasswordFile(passwordList, fileName): with open(fileName, 'w+', newline='') as csvfile: passwordwriter = csv.writer(csvfile) passwordwriter.writerows(passwordList) while True: print("What would you like to do:") print(" 1. Open password file") print(" 2. Lookup a password") print(" 3. Add a password") print(" 4. Save password file") print(" 5. Print the encrypted password list (for testing)") print(" 6. Quit program") print("Please enter a number (1-4)") choice = input() if (choice == '1'): # Load the password list from a file passwords = loadPasswordFile(passwordFileName) if (choice == '2'): # Lookup at password print("Which website do you want to lookup the password for?") for keyvalue in passwords: print(keyvalue[0]) passwordToLookup = input() # Iterate through password list # Match it with user input # If matches, save password in a variable and break from loop # Print password # Decrypt password and print it as well for i in range(len(passwords)): if passwords[i][0]==passwordToLookup: pwd=passwords[i][1] break print(pwd) decryptedPassword=passwordDecrypt(pwd,encryptionKey) print(decryptedPassword) if (choice == '3'): print("What website is this password for?") website = input() print("What is the password?") unencryptedPassword = input() # Encrypt entered password # Create a list with website name and passsword # Add this to existing passwords list encryptedPassword = passwordEncrypt(unencryptedPassword, encryptionKey) pwdList=[website,encryptedPassword] passwords.append(pwdList) if (choice == '4'): # Save the passwords to a file savePasswordFile(passwords, passwordFileName) if (choice == '5'): # print out the password list for keyvalue in passwords: print(', '.join(keyvalue)) if (choice == '6'): # quit our program sys.exit()

In: Computer Science

The Classic Triangle Testing Problem, (Myer's Triangle): A program reads three integer values. The three values...

The Classic Triangle Testing Problem, (Myer's Triangle): A program reads three integer values. The three values are interpreted as representing the lengths of the sides of a triangle. The program prints a message that states whether the triangle is scalene, isosceles, or equilateral. Develop a set of test cases (at least 6 ) that you feel will adequately test this program. (This is a classic testing problem and you could find numerous explanations about it on the internet. I would recommend that you try to submit your own answer, based on your understanding of the topic)

Please answer as soon as possible. I have no time.

Software Engineering 1.

In: Computer Science

I want to scan in 4 ints and the next 3 lines into an array of...

I want to scan in 4 ints and the next 3 lines into an array of a text file in java.

Ex

1 2 3

adacdac

acddddd

acdadcd

1,2,3 would be stored into seperate int values and the next 3 strings would be stored into an array

In: Computer Science

Draw the MySQL Data Model Maria’s Pizza – a local pizza shop that provides pizzas for...

Draw the MySQL Data Model

Maria’s Pizza – a local pizza shop that provides pizzas for pickup with one location - has hired you to create a database for them to store information about the store and its operations. Prior to building the database, you have decided to present the data model to the client for her approval. Here are the set of requirements that you have for the data model.

The client would like you to track the employees that they have in their store and the shift that is worked by the employees. They need to keep track of personal information about the employee including their name, phone number, address, social security number and other relevant information. This information does change from time to time as employees occasionally move. The store maintains two shifts, mid-day (11 AM – 5 PM) and night (5:00 PM to 11:00 PM). Employees can work across multiple shifts and shifts have multiple employees that work in that period. Shifts also have an employee as a supervisor. Therefore, different employees have different shift supervisors depending on which shift they are working – an employee in one shift may be the shift supervisor in another shift during the week.

Maria’s Pizza would also like this database to tie into their inventory system of food products that they offer. They sell only pizza for pickup, so the ingredients are what they need to keep track of – and all ingredients are tracked by packages of certain ounces (for example flour comes in 400 oz packages, mushrooms come in 64 oz packages, mozzarella cheese comes in 128 oz packages). They need to know the purchase price for each package, and the date of receipt of each shipment, and they update the quantity on hand every night before closing.

Maria’s Pizza has a single food distributor as its main supplier, but will buy a few items like sausage and fresh tomatoes from other local sources. After conducting inventory every night, they send orders if inventory levels get below certain thresholds. They would like to track the reordering of the different products from the suppliers including the date the re-order was placed, the employee that placed the order, and the scheduled delivery date of that order. Products can get re-ordered multiple times and employees can place multiple orders for products. Supplier information is also to be stored in the database including the supplier’s contact information, name and address. Because the same product can get ordered from multiple suppliers, it is important that the reorder contain information about which supplier that re-order was placed with.

Draw a data model for the above scenario.

In: Computer Science

Write a MIPS assembly program that reads 3 add them together and stores the answer in...

Write a MIPS assembly program that reads 3 add them together and stores the answer in memory.

In: Computer Science

Write a small section of Python code that defines a function called check_even(value) - the function...

Write a small section of Python code that defines a function called check_even(value) - the function takes a numerical value as input and returns True or False based on whether the provided argument is divisible by 2 (i.e. is it odd or is it even). If the argument provided is not a number (as determined by built-in the isdigit() function - which only works on string data) then rather than crashing, the function should raise an exception which is caught outside the function (i.e. in the block of code calling the function). Provide three calls to the function: - One with an even value where the function should return True, - Another with an odd value where the function should return False, and - One with non-numerical data which should raise an exception that will be caught and displayed in the block of code that calls the function.

In: Computer Science