Questions
Write a MIPS program that will ask the user to enter two numbers at the console...

Write a MIPS program that will ask the user to enter two numbers at the console and compute xy

In: Computer Science

9. The protocol that ensures packets of information are transferred to the correct network device. Question...

9. The protocol that ensures packets of information are transferred to the correct network device.

Question options:

routing

internet

packet

transmission control

Question 10 0 / 1 point

Which of the following is a disadvantage of a mobile network.

Question options:

limited mobility

high cost

security

expanded throughput

Question 11 0 / 1 point

The data communication process is described by the following:

Question options:

computer-router-medium-router-computer

computer-medium-modem-medium-computer

computer-modem-medium-modem-computer

computer-medium-router-medium-computer

In: Computer Science

1. A company that wants to send data over the Internet will use an encryption program...

1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the second digit with the fourth. Print the encrypted integer on the screen.  Write a separate application where an encrypted four-digit integer is entered and decrypted (reversing the encryption scheme) and finds the original number. 2. Create a class called Employee that contains three instance variables (First Name (String), Last Name (String), Monthly Salary (double)). Create a constructor that initializes these variables. Define set and get methods for each variable. If the monthly salary is not positive, do not set the salary. Create a separate test class called EmployeeTest that will use the Employee class. By running this class, create two employees (Employee object) and print the annual salary of each employee (object). Then set the new salary by giving each employee a 10% raise and display each employee's annual salary on the screen again.

Note: code should be written in Java language.

In: Computer Science

Explain how the software can influence positively on business strategies and what are the main software...

Explain how the software can influence positively on business strategies and what are the main software required in any organization with an example?

In: Computer Science

In the decimal system (base 10), a natural number is represented as a sequence dndn−1 ....

In the decimal system (base 10), a natural number is represented as a sequence dndn−1 . . . d0 of (decimal) digits, each of which is in the range 0..9. The value of the number is d0 ×100 +d1 ×101 +···+ dn ×10n. Similarly, in the binary system (base 2), a natural number is represented as a sequence bnbn−1 · · · b0 of (binary) digits, each of which is 0 or 1. The value of the number is b0 ×20 +b1 ×21 +···+bn ×2n. For example, the value of the number whose binary representation is 101is: 1×20+0×21+1×22 =1+0+4=5.

Without using any built-in functions for converting numbers, write a function that takes as input the binary representation of a positive integer n and returns its decimal representation.

In: Computer Science

How to find max non-intersecting subset of circles ? (Given center coordinate and radius of each...

How to find max non-intersecting subset of circles ?
(Given center coordinate and radius of each circle)
Need algorithm that better than O(N2)

In: Computer Science

In.java Write a program that repeatedly asks the user to enter their password until they enter...

In.java

Write a program that repeatedly asks the user to enter their password until they enter the correct one. However, after 5 failed attempts, the program "locks out" the user. We will show that with an error message.
Assume the password is HOC2141 (case sensitive).
Note that there is a special case that is not shown below. To identify it, think of all possible scenarios of input for this program.

----------- Sample run 1:
Enter your password: Blake
Wrong
Enter your password: hoc2341
Wrong
Enter your password: hoc2141
Wrong
Enter your password: HOC2141
Correct! You're in!
Bye 

----------- Sample run 2:
Enter your password: HOC2141
Correct! You're in!
Bye
 
----------- Sample run 3:
Enter your password: asdf
Wrong
Enter your password: ffgdf
Wrong
Enter your password: asdxcv
Wrong
Enter your password: 1276
Wrong
Enter your password: HOCK
Wrong
You are locked out!
Bye
 

In: Computer Science

The router is in interface mode when the router prompt is________ Group of answer choices Router(config-Line)#...

The router is in interface mode when the router prompt is________

Group of answer choices

Router(config-Line)#

Router(config-if)#

Router(config)#

Router(config-router)#

With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router.

interface

router

line

global

In: Computer Science

Write a MATLAB script which gets a matrix as input and check the dimensions of the...

Write a MATLAB script which gets a matrix as input and check the dimensions of the input:

Part A) If the input matrix is a square matrix, calculate the inverse of it and show it in the command window, otherwise, show the text “the input matrix is not invertible”.

Part B) Reshape the input matrix to a row vector and assign it to Y and make a vector named X with the same length as Y then make a 2D Plot and show it.

In: Computer Science

Hi! I have a question in Data communication and network please! Make the “ping” return the...

Hi!

I have a question in Data communication and network please!

Make the “ping” return the following messages:

1_ Request Timed Out
2_Destination Network / Host unreachable
3_Time Exceeded

and explain the reasons.

I want to se result please, My computer is Mac.

Thanks!

In: Computer Science

Would your school or place of work benefit from cloud computing? Identify at least two cloud...

Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then, examine one element of your chosen network’s infrastructure and apply it to cloud computing. Would it be feasible to migrate to the cloud? Would it be cost effective? Why or why not?

In: Computer Science

in. java Write a program that reads a string from the user, and creates another string...

in. java

Write a program that reads a string from the user, and creates another string with the letters from in reversed order. You should do this using string concatenation and loops. Do not use any method from Java that does the work for you. The reverse string must be built. Do not just print the letters in reversed order. Instead, concatenate them in a string.

--- Sample run:
This program will create a string with letters in reversed order.
Enter a string: banana
The reversed string is: ananab
Bye

--- Sample run:
This program will create a string with letters in reversed order.
Enter a string: what the heck
The reversed string is: kceh eht tahw
Bye

In: Computer Science

in.java Write a program that reads an integer from the user and prints a rectangle of...

in.java

Write a program that reads an integer from the user and prints a rectangle of starts of width 5 3 and height N.

Sample run 1:
Enter N: 5
***
***
***
***
***
Bye

Sample run 2:
Enter N: 8
***
***
***
***
***
***
***
***
Bye

Sample run 3:
Enter N: 2
***
***
Bye

Sample run 4:
Enter N: -2
Bye

In: Computer Science

Consider the following simple script incorporating a for loop: #!/bin/bash RED='\033[0;31m' NC='\033[0m' clear; cd /home for...

Consider the following simple script incorporating a for loop:

#!/bin/bash
RED='\033[0;31m'
NC='\033[0m'
clear; cd /home
for DIR in $HOME; do
#for DIR in *;do
CHK=$(grep -c "/home/$DIR" /etc/passwd)
if [ $CHK -ge 1 ]
then
echo -e "${NC}$DIR is good"
else
echo -e "${RED}ALERT! $DIR is NOT good!"
fi
done

What kind of script is presented above? How did you make your determination? What is the purpose of the script?

In lines #5/6, what is the type of $DIR?

In line #7, what is the value of $CHK?

In line #8, what are the instructions contained with the brackets known as?

Why are there two lines containing the word "for"? Which line will execute? Will that line execute correctly?

What should you do before running the script?

How could the script be factored into your duties as a sysadmin?

In: Computer Science

Write a java program MyCalendar that outputs a monthly calendar for a given month and year....

Write a java program MyCalendar that outputs a monthly calendar for a given month and year.
the output should be looks like this one at the bottom:( I don't know why it doesn't show right but the first day of the month is not Sunday it starts from Wednesday)

F. Last’s My Calendar
Enter month year? 10 2019
10/2019
Sun Mon Tue Wed Thu Fri Sat
---------------------------------
1 2 3 4
5 6 7 8 9 10  11
12 13 14 15 16 17 18
19 20 21   22 23 24 25
26 27 28 29 30 31

In: Computer Science