Write a MIPS program that will ask the user to enter two numbers at the console and compute xy
In: Computer Science
9. The protocol that ensures packets of information are transferred to the correct network device.
Question options:
routing |
|
internet |
|
packet |
|
transmission control |
Question 10 | 0 / 1 point |
Which of the following is a disadvantage of a mobile network.
Question options:
limited mobility |
|
high cost |
|
security |
|
expanded throughput |
Question 11 | 0 / 1 point |
The data communication process is described by the following:
Question options:
computer-router-medium-router-computer |
|
computer-medium-modem-medium-computer |
|
computer-modem-medium-modem-computer |
|
computer-medium-router-medium-computer |
In: Computer Science
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the second digit with the fourth. Print the encrypted integer on the screen. Write a separate application where an encrypted four-digit integer is entered and decrypted (reversing the encryption scheme) and finds the original number. 2. Create a class called Employee that contains three instance variables (First Name (String), Last Name (String), Monthly Salary (double)). Create a constructor that initializes these variables. Define set and get methods for each variable. If the monthly salary is not positive, do not set the salary. Create a separate test class called EmployeeTest that will use the Employee class. By running this class, create two employees (Employee object) and print the annual salary of each employee (object). Then set the new salary by giving each employee a 10% raise and display each employee's annual salary on the screen again.
Note: code should be written in Java language.
In: Computer Science
Explain how the software can influence positively on business strategies and what are the main software required in any organization with an example?
In: Computer Science
In the decimal system (base 10), a natural number is represented as a sequence dndn−1 . . . d0 of (decimal) digits, each of which is in the range 0..9. The value of the number is d0 ×100 +d1 ×101 +···+ dn ×10n. Similarly, in the binary system (base 2), a natural number is represented as a sequence bnbn−1 · · · b0 of (binary) digits, each of which is 0 or 1. The value of the number is b0 ×20 +b1 ×21 +···+bn ×2n. For example, the value of the number whose binary representation is 101is: 1×20+0×21+1×22 =1+0+4=5.
Without using any built-in functions for converting numbers, write a function that takes as input the binary representation of a positive integer n and returns its decimal representation.
In: Computer Science
How to find max non-intersecting subset of circles ?
(Given center coordinate and radius of each circle)
Need algorithm that better than O(N2)
In: Computer Science
In.java
Write a program that repeatedly asks the user to enter their
password until they enter the correct one. However, after 5 failed
attempts, the program "locks out" the user. We will show that with
an error message.
Assume the password is HOC2141 (case
sensitive).
Note that there is a special case that is not shown below. To
identify it, think of all possible scenarios of input for this
program.
----------- Sample run 1: Enter your password: Blake Wrong Enter your password: hoc2341 Wrong Enter your password: hoc2141 Wrong Enter your password: HOC2141 Correct! You're in! Bye ----------- Sample run 2: Enter your password: HOC2141 Correct! You're in! Bye ----------- Sample run 3: Enter your password: asdf Wrong Enter your password: ffgdf Wrong Enter your password: asdxcv Wrong Enter your password: 1276 Wrong Enter your password: HOCK Wrong You are locked out! Bye
In: Computer Science
The router is in interface mode when the router prompt is________
Group of answer choices
Router(config-Line)#
Router(config-if)#
Router(config)#
Router(config-router)#
With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router.
interface
router
line
global
In: Computer Science
Write a MATLAB script which gets a matrix as input and check the dimensions of the input:
Part A) If the input matrix is a square matrix, calculate the inverse of it and show it in the command window, otherwise, show the text “the input matrix is not invertible”.
Part B) Reshape the input matrix to a row vector and assign it to Y and make a vector named X with the same length as Y then make a 2D Plot and show it.
In: Computer Science
Hi!
I have a question in Data communication and network please!
Make the “ping” return the following messages:
1_ Request Timed Out
2_Destination Network / Host unreachable
3_Time Exceeded
and explain the reasons.
I want to se result please, My computer is Mac.
Thanks!
In: Computer Science
Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then, examine one element of your chosen network’s infrastructure and apply it to cloud computing. Would it be feasible to migrate to the cloud? Would it be cost effective? Why or why not?
In: Computer Science
in. java
Write a program that reads a string from the user, and creates another string with the letters from in reversed order. You should do this using string concatenation and loops. Do not use any method from Java that does the work for you. The reverse string must be built. Do not just print the letters in reversed order. Instead, concatenate them in a string.
--- Sample run: This program will create a string with letters in reversed order. Enter a string: banana The reversed string is: ananab Bye --- Sample run: This program will create a string with letters in reversed order. Enter a string: what the heck The reversed string is: kceh eht tahw Bye
In: Computer Science
in.java
Write a program that reads an integer from the user and prints a rectangle of starts of width 5 3 and height N.
Sample run 1: Enter N: 5 *** *** *** *** *** Bye Sample run 2: Enter N: 8 *** *** *** *** *** *** *** *** Bye Sample run 3: Enter N: 2 *** *** Bye Sample run 4: Enter N: -2 Bye
In: Computer Science
Consider the following simple script incorporating a for loop:
#!/bin/bash
RED='\033[0;31m'
NC='\033[0m'
clear; cd /home
for DIR in $HOME; do
#for DIR in *;do
CHK=$(grep -c "/home/$DIR" /etc/passwd)
if [ $CHK -ge 1 ]
then
echo -e "${NC}$DIR is good"
else
echo -e "${RED}ALERT! $DIR is NOT good!"
fi
done
What kind of script is presented above? How did you make your determination? What is the purpose of the script?
In lines #5/6, what is the type of $DIR?
In line #7, what is the value of $CHK?
In line #8, what are the instructions contained with the brackets known as?
Why are there two lines containing the word "for"? Which line will execute? Will that line execute correctly?
What should you do before running the script?
How could the script be factored into your duties as a sysadmin?
In: Computer Science
Write a java program MyCalendar that outputs a monthly calendar
for a given month and year.
the output should be looks like this one at the bottom:( I don't
know why it doesn't show right but the first day of the month is
not Sunday it starts from Wednesday)
F. Last’s My Calendar
Enter month year? 10 2019
10/2019
Sun Mon Tue Wed Thu Fri Sat
---------------------------------
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
In: Computer Science