Draw the class diagram for the bank system given the following
specifications:
1.One bank is associated with 0 or more accounts
2. Each account is associated with exactly one bank
3. Current account, savings and money market are account
types.
Show and discuss the different class relations in your diagram.
In: Computer Science
Data Management
In: Computer Science
In: Computer Science
Write a short note on FRAUD ANALYST as it relate to "Information System Security"
In: Computer Science
For this lab we will be completing the Normalization step for several of your entities from your E/R diagram.
You will normalize the following entities to 3rd normal form - show ALL steps - 1st normal form, 2nd normal form and 3rd normal form for each of the following entities:
PATIENT
BED
EMPLOYEE
DEPARTMENT
TREATMENT
TEST
After going through your steps of normalization - add in your Foreign keys based on your cardinalities from your E/R diagram. Be sure you include your attributes in your table
In: Computer Science
C++ Memory Management:
- Create a class called DynamicArray that allocates an integer array of user defined size on the heap
- Don't not use any of the STL containers (vector, list, etc)
- Create the necessary constructors and destructor, code should allocate the array using new.
- Write a method print_array that prints the array’s length and the contents of the array.
- Create at least 2 DynamicArray objects and print their contents. Include your DynamicArray class below along with the constructors/destructor and sample output.
- Below is a sample main method that declares, fills (not required as part of the project, but it makes testing easier), and prints a DynamicArray
int main()
{
DynamicArray a(9);
a.fill_array(1); /* fills array with consecutive #’s */
a.print_array();
}
- in the comments label code as 'constructor' and 'destructor'
-show full code to pls
In: Computer Science
In: Computer Science
In: Computer Science
In: Computer Science
The statement: "int ar[7] = {0};" sets all of the array elements of ar to 0 (zero)
True
False
-------------------------------------------
#define SIZE 3 - declares a constant value named SIZE, equal to 3, that is available throughout your program and is immutable.
True
False
----------------------------------------
Select all of the following that apply to an array:
| 1. |
Contiguous storage is storage without any gaps. |
|
| 2. |
Arrays make programming complex problems more difficult. |
|
| 3. |
An arrays elements are stored contiguously in memory. |
|
| 4. |
We can declare an array without defining a size or adding any elements at the time of declaration. |
|
| 5. |
An array is a data structure consisting of an ordered set of elements of common type |
We define constants so that when a value that is used frequently throughout a program must be changed, we only have to change the value in one place.
True
False
====================================
Select all of the following answers that are true:
| 1. |
In order to store 30 characters in a C string we must allocate enough space for 31 elements. |
|
| 2. |
The format specifier to print a C string using printf is %c. |
|
| 3. |
The index of the null terminator in a C string represents the number of meaningful characters in the string. |
|
| 4. |
The null terminator has the value 0 (zero) on some host platforms, and the value -1 on others. |
Select all of the following statements which are true:
| 1. |
The elements of parallel arrays with the same index make up the fields of a single record of information. |
|
| 2. |
In parallel arrays it is not always the case that the key and the value are stored at the same index. |
|
| 3. |
In a simple set of two parallel arrays, one array holds the key and the other array holds the value. |
|
| 4. |
Parallel arrays are an inconvenient way to store tabular information. |
---------------------------
The index of the first element of an array is usually 0 (zero), but can be set to a different value.
True
False
In: Computer Science
Describe the SGID special permission, and provide an example of where this permission might be used.
In: Computer Science
1. Write the C++ code for a program that calculates how many days are left until Halloween, when given as an input how many weeks are left until Halloween. Use variables named weeks and days.
------------
2. What header file must be included
- To perform mathematical functions like sqrt?
- To use cin and cout?
- To use stream manipulators like setprecision?
--------------------
3. What value will be stored in the variable t after each of the following statements executes?
1. t = (12 > 1);
2. t = (2 < 0);
3. t = (5 == (3 * 2));
4. t = ( 5 == 5);
----------------
4. Convert the following conditional expression into an if/else
statement:
q = (x < y) ? (a+b) : (x * 2);
------------------
5. Write a function named getNumber which uses a reference parameter to accept an integer argument. The function should prompt the user to enter a number in the range of 1 through 100. The input should be validated and stored in the parameter value.
------------------------
6. Write a C++ statement that prints the message “The number is valid.” If the variable temperature is within the range -50 through 150
In: Computer Science
Assignment on New Technologies (Essay)
Assignment on New Technologies
The world of information technology is constantly changing. New technologies are invented almost daily.
Tell the story of a new information technology invented during the past 30 years. You may present inventors’ stories. You should explain the relation to information technology. Examples of information technologies invented during the past 30 years include:
3. It is a group activity and makes a group of two (2) students. You can work individually if you do not find a suitable partner. However, each student has to submit the assignment and powerpoint presentation individually but have to mention the name of your partner in the submitted documents.
Submit the assignment and the presentation by uploading your files on CCMS (Moodle) to each student individually. If needed, you may submit only a link to the presentation. A submission of a presentation file is not required. You may present without any presentation documents.
In: Computer Science
The following program is written to calculate the addition for two numbers (9,3). Unfortunately, the program has Compile-time and Run-time errors that prevent the program from running and producing the correct result. Using the Table 2.1 below, allocate the error(s) on each program line.
In: Computer Science
Consider the following tables depicting variants of an important data distribution technique used in the RAID technology to improve disk performance and answer the following questions (a & b ).
Table 1:
|
Disk 1 |
Disk 2 |
Disk 3 |
Disk 4 |
|
File 1, bit 1 |
File 1, bit 2 |
File 1, bit 3 |
File 1, bit 4 |
|
File 1, bit 4 |
File 1, bit 5 |
File 1, bit 6 |
File 1, bit 7 |
|
File 2, bit 1 |
File 2, bit 2 |
File 2, bit 3 |
File 2, bit 4 |
|
File 2, bit 4 |
File 2, bit 5 |
File 2, bit 6 |
File 2, bit 7 |
Table 2:
|
Disk 1 |
Disk 2 |
Disk 3 |
Disk 4 |
|
|
File 1, block 1 |
File 1, block 2 |
File 1, block 3 |
File 1, block 4 |
|
|
File 1, block 4 |
File 1, block 5 |
File 1, block 6 |
File 1, block 7 |
|
|
File 2, block 1 |
File 2, block 2 |
File 2, block 3 |
File 2, block 4 |
|
|
File 2, block 4 |
File 2, block 5 |
File 2, block 6 |
File 2, block 7 |
a) What is the technique known as and how it improves the disk performance?
b) What are the variants of the technique (identified in i) are known as? Explain how these variants are different from each other?
In: Computer Science