Questions
Draw the class diagram for the bank system given the following specifications: 1.One bank is associated...

Draw the class diagram for the bank system given the following specifications:
1.One bank is associated with 0 or more accounts
2. Each account is associated with exactly one bank
3. Current account, savings and money market are account types.
Show and discuss the different class relations in your diagram.

In: Computer Science

Data Management Describe how the data management plan will assist in meeting the data quality in...

Data Management

  • Describe how the data management plan will assist in meeting the data quality in the medical clinic.

In: Computer Science

Data Management List the current data challenges of the medical clinic and the data quality goals.

  • Data Management
  • List the current data challenges of the medical clinic and the data quality goals.

In: Computer Science

Write a short note on FRAUD ANALYST as it relate to "Information System Security"

Write a short note on FRAUD ANALYST as it relate to "Information System Security"

In: Computer Science

For this lab we will be completing the Normalization step for several of your entities from...

For this lab we will be completing the Normalization step for several of your entities from your E/R diagram.

You will normalize the following entities to 3rd normal form - show ALL steps - 1st normal form, 2nd normal form and 3rd normal form for each of the following entities:

PATIENT

BED

EMPLOYEE

DEPARTMENT

TREATMENT

TEST

After going through your steps of normalization - add in your Foreign keys based on your cardinalities from your E/R diagram. Be sure you include your attributes in your table

In: Computer Science

C++ Memory Management: - Create a class called DynamicArray that allocates an integer array of user...

C++ Memory Management:

- Create a class called DynamicArray that allocates an integer array of user defined size on the heap

- Don't not use any of the STL containers (vector, list, etc)

- Create the necessary constructors and destructor, code should allocate the array using new.

- Write a method print_array that prints the array’s length and the contents of the array.

- Create at least 2 DynamicArray objects and print their contents. Include your DynamicArray class below along with the constructors/destructor and sample output.

- Below is a sample main method that declares, fills (not required as part of the project, but it makes testing easier), and prints a DynamicArray

int main()

{

    DynamicArray a(9);

    a.fill_array(1); /* fills array with consecutive #’s */

    a.print_array();

}

- in the comments label code as 'constructor' and 'destructor'

-show full code to pls

In: Computer Science

Need to design a program in C++ that plays hangman using classes (polymorphism and inheritance) Below...

Need to design a program in C++ that plays hangman using classes (polymorphism and inheritance)

Below is the code only need to add the classes and make the program run with at least one class of Polymorphism and Inheritance.

CODE:

#include <iostream>
#include <cstdlib>
#include<ctime>
#include <string>
using namespace std;

int NUM_TRY=8; //A classic Hangman game has 8 tries. You can change if you want.
int checkGuess (char, string, string&); //function to check the guessed letter
void main_menu();
string message = "Play!"; //it will always display


int main(int argc, char *argv[])
{
string name;
char letter;
string word;
  

string words[] = //These are the list of 10 three lettered words.
{ //You can change them as per your requirement.
"man",
"van",
"tan",
"hop",
"pop",
"two",
"six",
"may",
"low",
"out",
};
  
srand(time(NULL));
int n=rand()% 10; //Random function to genterate random words from the given list
word=words[n];
  
  
string hide_m(word.length(),'X'); // This function is used to hide the actuall word to be guessed.
//The mask selected is 'X' so the word will show as 'XXX' till you guess the correct letters.
  
  
  
while (NUM_TRY!=0)
{
main_menu();
cout << "\n" << hide_m;
cout << "\nGuess a letter: ";
cin >> letter;
  
if (checkGuess(letter, word, hide_m)==0)
{
message = "Wrong letter.";
NUM_TRY = NUM_TRY - 1;
}
else
{
message = "NICE! You guessed a letter";
}
if (word==hide_m)
{
message = "Congratulations! You got it!";
main_menu();
cout << "\nThe word is : " << word << endl;
break;
}
}
if(NUM_TRY == 0)
{
message = "NOOOOOOO!...you've been hanged.";
main_menu();
cout << "\nThe word was : " << word << endl;
}
cin.ignore();// used to discard everything in the input stream
cin.get();
return 0;
}


int checkGuess (char guess, string secretword, string &guessword)
{
int i;
int matches=0;
int len=secretword.length();
for (i = 0; i< len; i++)
{
  
if (guess == guessword[i])
return 0;
  
if (guess == secretword[i])
{
guessword[i] = guess;
matches++;
}
}
return matches;
}

void main_menu()
{
system("cls");
cout<<"\nHangman Game!";
cout << "\nYou have " << NUM_TRY << " tries to try and guess the word.";
cout<<"\n"+message;
}

//*end of code*

Hangman Game

*** Need at least to add one Class to the game code that uses Polymorphism and Inheritance.

In: Computer Science

Primary Concepts: Priority Queues and Polymorphism Primary Concepts Priority Queues Object-Oriented Frameworks Inheritance and Polymorphism Please...

Primary Concepts: Priority Queues and Polymorphism

Primary Concepts

Priority Queues

Object-Oriented Frameworks

Inheritance and Polymorphism

Please read this Specification Document


Corresponding Discussion Forum

Important Design Requirement

Your design must be based on Modularity and Separation of Concerns.

Remember that interfaces represent behavior, while classes represent implementation.

The Priority Queue Data Structure and the Simulation Framework implementations must be based on "Information Hiding" and "Encapsulation".

The Software Gurus Bar is a client of the Simulation Framework.

The Simulation Framework is a client of the Priority Queue.

The Priority Queue neither knows about the Simulation Framework nor about the Software Gurus Bar.

The Simulation Framework knows about the Priority Queue (through its API), but it doesn't know about the Software Gurus Bar.

The Software Gurus Bar Application knows about the Simulation Framework through its Interface (API), but it doesn't know about the Priority Queue.

Page/Slide 11 of the above Specification Document gives a partial perspective about the Design.

The code should be written in JAVA

In: Computer Science

write a Python program (with comments) to do the following: Define a list list1 = [['Rose',...

  1. write a Python program (with comments) to do the following:
    1. Define a list list1 = [['Rose', 'Daisy'], 7, 0, 5.5, [1, 22, 2.45, 3, 6, 5.8]] and print it.
    2. Print the length of list1 (i.e. number of items in list1) with a suitable message.
    3. Print the first character of the first string in the first item of list1 with a suitable message (HINT: The first item is the item with index 0).
    4. Print the sum of the last 4 numbers in the last element of list1, with a suitable message.
    5. Append the list ['apple', 'pear', 'grape'] to list1 and print the updated value of list1 with a suitable messag
    6. Save your code to a file with name lab4sol.py.
    7. Submit your Python code (i.e. lab4sol.py file) through BB.

In: Computer Science

The statement: "int ar[7] = {0};" sets all of the array elements of ar to 0...

The statement: "int ar[7] = {0};" sets all of the array elements of ar to 0 (zero)

True

False

-------------------------------------------

#define SIZE 3 - declares a constant value named SIZE, equal to 3, that is available throughout your program and is immutable.

True

False

----------------------------------------

Select all of the following that apply to an array:

1.

Contiguous storage is storage without any gaps.

2.

Arrays make programming complex problems more difficult.

3.

An arrays elements are stored contiguously in memory.

4.

We can declare an array without defining a size or adding any elements at the time of declaration.

5.

An array is a data structure consisting of an ordered set of elements of common type

We define constants so that when a value that is used frequently throughout a program must be changed, we only have to change the value in one place.

True

False
====================================

Select all of the following answers that are true:

1.

In order to store 30 characters in a C string we must allocate enough space for 31 elements.

2.

The format specifier to print a C string using printf is %c.

3.

The index of the null terminator in a C string represents the number of meaningful characters in the string.

4.

The null terminator has the value 0 (zero) on some host platforms, and the value -1 on others.

Select all of the following statements which are true:

1.

The elements of parallel arrays with the same index make up the fields of a single record of information.

2.

In parallel arrays it is not always the case that the key and the value are stored at the same index.

3.

In a simple set of two parallel arrays, one array holds the key and the other array holds the value.

4.

Parallel arrays are an inconvenient way to store tabular information.

---------------------------

The index of the first element of an array is usually 0 (zero), but can be set to a different value.

True

False

In: Computer Science

Describe the SGID special permission, and provide an example of where this permission might be used.

Describe the SGID special permission, and provide an example of where this permission might be used.

In: Computer Science

1. Write the C++ code for a program that calculates how many days are left until...

1. Write the C++ code for a program that calculates how many days are left until Halloween, when given as an input how many weeks are left until Halloween. Use variables named weeks and days.

------------

2. What header file must be included

- To perform mathematical functions like sqrt?

- To use cin and cout?

- To use stream manipulators like setprecision?

--------------------

3. What value will be stored in the variable t after each of the following statements executes?

1. t = (12 > 1);

2. t = (2 < 0);

3. t = (5 == (3 * 2));

4. t = ( 5 == 5);

----------------

4. Convert the following conditional expression into an if/else statement:
q = (x < y) ? (a+b) : (x * 2);

------------------

5. Write a function named getNumber which uses a reference parameter to accept an integer argument. The function should prompt the user to enter a number in the range of 1 through 100. The input should be validated and stored in the parameter value.

------------------------

6. Write a C++ statement that prints the message “The number is valid.” If the variable temperature is within the range -50 through 150

In: Computer Science

Assignment on New Technologies (Essay) Assignment on New Technologies The world of information technology is constantly...

Assignment on New Technologies (Essay)

Assignment on New Technologies

The world of information technology is constantly changing. New technologies are invented almost daily.

Tell the story of a new information technology invented during the past 30 years. You may present inventors’ stories. You should explain the relation to information technology. Examples of information technologies invented during the past 30 years include:

  • Viber; Amazon; Netflix; Twitter; YouTube; MySpace; WebVR; Google; Flickr; Smartphone; Linux; PayPal; Wikipedia; Skype; fiber optics; cloud computing; HTML5; 4G or 5G Networks; Smartboard; 3-D Printer; Instagram; Pinterest; Auto-tune; Cochlear Implants; Snapchat; Bluetooth; lab-on-a-chip technology; a lab on fiber; Apple Watch; Second Life; IMVU; multi-core processor; flat panel display; solid-state drive; BitLocker technology; e-readers; laser microphone; robot vacuum; radar and laser detectors; Uber; see also textbooks and recent news. A good source for personal computers related information is PC World.
  1. Limit your written answer to a maximum of 350 words; after the text, including the sources you used for your research. The written assignment (Essay) portion of your mark is 2%.
  2. Prepare a 3-5-minute presentation. The presentation portion of your mark is 3%.

3. It is a group activity and makes a group of two (2) students. You can work individually if you do not find a suitable partner. However, each student has to submit the assignment and powerpoint presentation individually but have to mention the name of your partner in the submitted documents.

Submit the assignment and the presentation by uploading your files on CCMS (Moodle) to each student individually. If needed, you may submit only a link to the presentation. A submission of a presentation file is not required. You may present without any presentation documents.

In: Computer Science

The following program is written to calculate the addition for two numbers (9,3).  Unfortunately, the program has...

The following program is written to calculate the addition for two numbers (9,3).  Unfortunately, the program has Compile-time and Run-time errors that prevent the program from running and producing the correct result. Using the Table 2.1 below, allocate the error(s) on each program line.

  1. // define new class
  2. publicCalculation {
  1. privateintresult_add
  2. // define add method to add two numbers
  3. publicvoidadd(intfirst_number,intsecond_number) {
  4. int   number1= first_number;
  5. doublenumber2= second_number;
  6. result_add= number1/number2;
  1. }
  2. / return the value
  3. publicintgetvalue()
  4. {
  5. returnresult_add;
  6. }
  7. publicstaticvoidmain(String[] args) {
  8. // define new object with name summation
  1. Calculation summation= Calculation();
  2. summation.add(9,3);

  1. intresult= getvalue();
  2. System.println(result);

  1. }
  1. }

  1. }

In: Computer Science

Consider the following tables depicting variants of an important data distribution technique used in the RAID...

Consider the following tables depicting variants of an important data distribution technique used in the RAID technology to improve disk performance and answer the following questions (a & b ).

Table 1:

Disk 1

Disk 2

Disk 3

Disk 4

File 1, bit 1

File 1, bit 2

File 1, bit 3

File 1, bit 4

File 1, bit 4

File 1, bit 5

File 1, bit 6

File 1, bit 7

File 2, bit 1

File 2, bit 2

File 2, bit 3

File 2, bit 4

File 2, bit 4

File 2, bit 5

File 2, bit 6

File 2, bit 7

Table 2:

Disk 1

Disk 2

Disk 3

Disk 4

File 1, block 1

File 1, block 2

File 1, block 3

File 1, block 4

File 1, block 4

File 1, block 5

File 1, block 6

File 1, block 7

File 2, block 1

File 2, block 2

File 2, block 3

File 2, block 4

File 2, block 4

File 2, block 5

File 2, block 6

File 2, block 7

a) What is the technique known as and how it improves the disk performance?

b) What are the variants of the technique (identified in i) are known as? Explain how these variants are different from each other?

In: Computer Science