Questions
Using MYSQL Workbench: ** Cannot use intersect only allowed to use inner join or in** Suppliers(sid:...

Using MYSQL Workbench:

** Cannot use intersect only allowed to use inner join or in**

Suppliers(sid: int, sname: VARCHAR(30), address: VARCHAR(50))

Parts(pid: int, pname: VARCHAR(30), color:VARCHAR(10))

Catalog(sid: int, pid:int, cost: double)

(Bolded names are primary keys)

1. Find distinct sids and snames of suppliers who supply a red part and a green part.

In: Computer Science

Proof of the smoothness rule by providing details of the proof that t (n) ∈ Ω(f(n))...

Proof of the smoothness rule by providing details of the proof that t (n) ∈ Ω(f(n)) whenever (n) is a smooth function and t(n) is an eventually nondecreasing function such that

t(n) ∈ Θ(f(n) | n is a power of b).

In: Computer Science

Write program#2 upload .java file. 2A) Write a java program that uses the Random class to...

Write program#2 upload .java file.

2A) Write a java program that uses the Random class to generate a number in the range 21 to 64.  Print the generated number.

2B) Using the Random class and nextInt(6), rolls two die generating two random numbers each in the range 1 through 6. Total by adding the two values together. Print the value of each die, and the total value.

2C) Using the Math class and sqrt(num), calculate the square root of integer twenty-two divided by integer seven, print the result formated to ten decimal places. Hint: the result of the division needs data conversion to support a double.

In: Computer Science

Josie needs a data structure that can handle the following operations: push, pop, contains, remove, where...

Josie needs a data structure that can handle the following operations: push, pop, contains, remove, where contains(Item x) answers whether a given item is in the data structure and remove(Item x) removes the given item from the data structure. How can this be implemented efficiently? (Java)

In: Computer Science

Digital Forensics In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic...

Digital Forensics

In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic examiners can use it in a case. In addition, describe what metadata is and how it relates to digital forensics.

In: Computer Science

PLEASE USE PYTHON CODE 2. Find the smallest positive (real) root of x^3-3.23x^2-5.54x+9.84 = 0 by...

PLEASE USE PYTHON CODE

2. Find the smallest positive (real) root of x^3-3.23x^2-5.54x+9.84 = 0 by the method of bisection

In: Computer Science

Consider two languages A and B where A is a context free language and B is...

Consider two languages A and B where A is a context free language and B is a regular language. Show that the set difference, A-B, must also be context free.

Also show that B-A may not be context free

In: Computer Science

* The course name Ethics in information Technology* 1-Using your research skills, find the meaning of...

* The course name Ethics in information Technology*

1-Using your research skills, find the meaning of the following terms, which constitute important parts of trustworthy software:

-Security

-Reliability

-Privacy

2-List your references. (You should have at least 3 references)

In: Computer Science

With a technique called randomized encryption. Applying this technique to AES, we need to have an...

With a technique called randomized encryption. Applying this technique to AES, we need to have an initialization vector (IV). Say we have a message m with 128 bits, show how to encrypt m with secured AES Cipher block chaining CBC mode showing all steps.

In: Computer Science

Write program#1 upload .java file. #1 Write a java program that prompts the user for input...

Write program#1 upload .java file. #1 Write a java program that prompts the user for input using the Scanner class. First to enter their first name. Then prompts the user to enter their last name. Then prompts the user to enter their city. Then prompts the user to enter their state. Then prompts the user to enter their zip code. Concatenate first name and last name into full_name. Using String Class is optional. Use the String Class to replace zip code "0" with "N", replace "7" with "J". Use the String Class to make all the values upper case. Use the String Class to determine the length of full_name. Print on first line full_name and length of full_name. Print all on second line mailing address, including zip_string?

In: Computer Science

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said...

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said to be relatively prime if there is no integer greater than one that divides them both. Sample I/O: Enter the first number: 14 Enter the second number: 15 The entered numbers are relatively prime. Sample I/O: Enter the first number: 12 Enter the second number: 15 The entered numbers are not relatively prime.

In: Computer Science

Do the following with OpenSSL: Create a 2048 bit RSA private key. Convert this private key...

Do the following with OpenSSL:

  1. Create a 2048 bit RSA private key.
  2. Convert this private key into a text format so it shows the following information:
  • modulus
  • public exponent (e)
  • private exponent (d)
  • the primes (p and q)

Use the appropriate command that generates this information and saves it in key.txt file.

  1. Save the message "Hello from (your UID)" in a plaintext file message.txt. Using openssl's rsautl option to sign this message with your private key (key.txt). Save this signed message as the file signed.txt. Use this link for reference.
  2. Using openssl's rsautl option encrypt the message.txt file using your private key generated in Step#1 above. Save the encrypted message as encrypted.txt.
  3. Assemble all the files of key.txt, signed.txt, message.txt and encrypted.txt and all procedure screenshots of above work into a single file to upload for submission.

In: Computer Science

Internet of Things (IoT). Please explain IoT (please use a reference).

Internet of Things (IoT).

Please explain IoT (please use a reference).

In: Computer Science

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s...

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s center point, and the circle’s radius as arguments. The function should draw the specified circle. The algorithm should draw the circle’s circumference by turning 3 degrees and moving a given distance 120 times. Calculate the distance moved with the formula 2.0 × π × radius ÷ 120.0.

Define a function main that will draw a circle with the following parameters when the program is run:

  • X = 50
  • Y = 75
  • Radius = 100

In: Computer Science

Create a set of use cases for the following system: A video store (AVS) runs a...

Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.

Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card

In: Computer Science