Using MYSQL Workbench:
** Cannot use intersect only allowed to use inner join or in**
Suppliers(sid: int, sname: VARCHAR(30), address: VARCHAR(50))
Parts(pid: int, pname: VARCHAR(30), color:VARCHAR(10))
Catalog(sid: int, pid:int, cost: double)
(Bolded names are primary keys)
1. Find distinct sids and snames of suppliers who supply a red part and a green part.
In: Computer Science
Proof of the smoothness rule by providing details of the proof that t (n) ∈ Ω(f(n)) whenever (n) is a smooth function and t(n) is an eventually nondecreasing function such that
t(n) ∈ Θ(f(n) | n is a power of b).
In: Computer Science
Write program#2 upload .java file.
2A) Write a java program that uses the Random class to generate a number in the range 21 to 64. Print the generated number.
2B) Using the Random class and nextInt(6), rolls two die generating two random numbers each in the range 1 through 6. Total by adding the two values together. Print the value of each die, and the total value.
2C) Using the Math class and sqrt(num), calculate the square root of integer twenty-two divided by integer seven, print the result formated to ten decimal places. Hint: the result of the division needs data conversion to support a double.
In: Computer Science
Josie needs a data structure that can handle the following operations: push, pop, contains, remove, where contains(Item x) answers whether a given item is in the data structure and remove(Item x) removes the given item from the data structure. How can this be implemented efficiently? (Java)
In: Computer Science
Digital Forensics
In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic examiners can use it in a case. In addition, describe what metadata is and how it relates to digital forensics.
In: Computer Science
PLEASE USE PYTHON CODE
2. Find the smallest positive (real) root of x^3-3.23x^2-5.54x+9.84 = 0 by the method of bisection
In: Computer Science
Consider two languages A and B where A is a context free language and B is a regular language. Show that the set difference, A-B, must also be context free.
Also show that B-A may not be context free
In: Computer Science
* The course name Ethics in information Technology*
1-Using your research skills, find the meaning of the following terms, which constitute important parts of trustworthy software:
-Security
-Reliability
-Privacy
2-List your references. (You should have at least 3 references)
In: Computer Science
With a technique called randomized encryption. Applying this technique to AES, we need to have an initialization vector (IV). Say we have a message m with 128 bits, show how to encrypt m with secured AES Cipher block chaining CBC mode showing all steps.
In: Computer Science
Write program#1 upload .java file. #1 Write a java program that prompts the user for input using the Scanner class. First to enter their first name. Then prompts the user to enter their last name. Then prompts the user to enter their city. Then prompts the user to enter their state. Then prompts the user to enter their zip code. Concatenate first name and last name into full_name. Using String Class is optional. Use the String Class to replace zip code "0" with "N", replace "7" with "J". Use the String Class to make all the values upper case. Use the String Class to determine the length of full_name. Print on first line full_name and length of full_name. Print all on second line mailing address, including zip_string?
In: Computer Science
Write a SPIM program to find weather two numbers are relatively prime. Two integers are said to be relatively prime if there is no integer greater than one that divides them both. Sample I/O: Enter the first number: 14 Enter the second number: 15 The entered numbers are relatively prime. Sample I/O: Enter the first number: 12 Enter the second number: 15 The entered numbers are not relatively prime.
In: Computer Science
Do the following with OpenSSL:
Use the appropriate command that generates this information and saves it in key.txt file.
In: Computer Science
Internet of Things (IoT).
Please explain IoT (please use a reference).
In: Computer Science
Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s center point, and the circle’s radius as arguments. The function should draw the specified circle. The algorithm should draw the circle’s circumference by turning 3 degrees and moving a given distance 120 times. Calculate the distance moved with the formula 2.0 × π × radius ÷ 120.0.
Define a function main that will draw a circle with the following parameters when the program is run:
In: Computer Science
Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.
Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card
In: Computer Science