Questions
IN C ++ PLEASE CODE FOR BUBBLE SORT---Add code to sort the bowlers. You have to...

IN C ++ PLEASE CODE FOR BUBBLE SORT---Add code to sort the bowlers. You have to sort their parallel data also. Print the sorted bowlers and all their info .

You can use a bubble sort or a shell sort. Make sure to adjust your code depending on whether or not you put data starting in row zero or row one.

Sort by Average across, lowest to highest.  The highest average should then be on the last row..

When you sort the average, you also have to move the names and scores, this is the reason you can't use a built-in sort.

Names                    score1 score2 score3 average score

---------------------------------------------------------------------------

Linus too good           100      23     210    111.00

Charlie brown              1       2      12      5.00

Snoopy                   300     300     100    233.33

Peperment Patty          223     300     221    248.00

Pig Pen                  234     123     212    189.67

Red Headed Girl          123     222     111    152.00

Marcey                     1       2       3      2.00

keith hallmark           222     300     180    234.00

anna hallmark            222     111     211    181.33

roxie hallmark           100     100       2     67.33

Average for first score:     152.60

Average for second score:    148.30

Average for third score:     126.20

248.0 was bowled by Peperment Patty

2.0 was bowled by Marcey

....FINAL TABLE SHOULD LOOK LIKE THIS ....

-After sort-

Names                    score1 score2 score3 average score

---------------------------------------------------------------------------

Marcey                     1       2       3      2.00

Charlie brown              1       2      12      5.00

roxie hallmark           100     100       2     67.33

Linus too good           100      23     210    111.00

Red Headed Girl          123     222     111    152.00

anna hallmark            222     111     211    181.33

Pig Pen                  234     123     212    189.67

Snoopy                   300     300     100    233.33

keith hallmark           222     300     180    234.00

Peperment Patty          223     300     221    248.00

In: Computer Science

java language question Write a program that employs 2 threads that each toss their own die...

java language question

Write a program that employs 2 threads that each toss their own die (modelled by a random number generator that generates random numbers in the range 1..6) a given number of times. In both cases the result of each toss is stored in a shared array. The array is deemed to be large enough to store the result of every throw and each thread should only write to its own array segment. Once the threads have completed their work then the main program counts the frequency of each number thrown and prints it on the screen.

In: Computer Science

Discuss at least 4 common tasks of operating systems. Explain how Windows might accomplish one of...

Discuss at least 4 common tasks of operating systems. Explain how Windows might accomplish one of the tasks and how the Mac OS or Linux might accomplish it differently.

In: Computer Science

I get an error 1452 saying it cannot add or update my foreign key. is there...

I get an error 1452 saying it cannot add or update my foreign key. is there a way to fix this

In: Computer Science

- Part 2 – 4 Desk Checking Exercises – these are 3 programs (pseudocode) that are...

- Part 2 – 4 Desk Checking Exercises – these are 3 programs (pseudocode) that are working and 1 program (Python). Explainthe intent of the pseudocode / program. If you use test data, note the test data.  .  You are NOT trying to find mistakes

What does this do? Desk Checking #3:  Explain the intent of this pseudocode.  Be as specific as possible.  
List the data you use for example data.

Use this textbox to explain the pseudocode/ code intent. Include any test data used:

start

         Declarations

                                    num idNumber

                                    num itemsSold

                                    num itemsValue

                                    num ITEM_MIN = 200

                                    num VALUE_MIN = 1000

                                    string MSG = “High Performer!”

                  housekeeping()

                  detail()

                  finish()

         stop

         housekeeping()

                  output “Salesperson program”

                  input idNumber, itemsSold, itemsValue

         return

         detail()

                  if itemsSold > ITEM_MIN AND itemsValue > VALUE_MIN then

                                    output MSG

return

finish()

         output “End of program”

return

In: Computer Science

Explain any two Software tests used in software development. (10)

Explain any two Software tests used in software development. (10)

In: Computer Science

Method: DoublyLinkedList reverse(DoublyLinkedList list) Reverse() method accepts a DoublyLinkedList of Character as the argument, reverses the...

Method: DoublyLinkedList reverse(DoublyLinkedList list) Reverse() method accepts a DoublyLinkedList of Character as the argument, reverses the elements in the list, and returns the resulting list. For example:

The given list is

'a' 'b' 'c' 'd' 'e'

The return list should be

'e' 'd' 'c' 'b' 'a'

How can we do this in Java?

In: Computer Science

Write a C program that prints the Grade of each student in a class based on...

Write a C program that prints the Grade of each student in a class based on their mark. The program must also print the average mark of the class.

The program must prompt (ask) the user for the mark of a student (out of 100).

The program must then print the mark entered and the grade received based on the table below.

Grade

Range

A

85 to 100 inclusive

B

75 to 85 inclusive

C

60 to 70 inclusive

D

50 to 60 inclusive

F

Less than 50

For example “The student mark is 87 and their grade is A.”

This must be done repeatedly until a mark of -1 is entered.

The average mark of all of the class must then be shown.

For Example “The average mark of the class is 34.23.”

Note: To calculate the average, you must add up (total) all of the marks and then divide by the number of students (number of marks entered)

  • The choice of appropriate data types (variable type) is necessary
  • Appropriate Variable names must be used

In: Computer Science

1. Design a Java CartesianPoint class for a Cartesian Point which implements both cloneable and comparable...

1. Design a Java CartesianPoint class for a Cartesian Point which implements both cloneable and comparable interfaces

The class should have the following private member variables:

• the x value of a point: int

• the y value of a point: int

and the class should have the following public member functions:

• default constructor which initializes the point to the origin of the Cartesian coordinate system

• explicit constructor which initializes the point to a pair of given value as (u, v) • setX() function, which sets the x value to a new value v

• setY()function, which sets the y value to a new value u

• whereX() function, which returns the x value

• whereY() function, which returns the y value

• Overrided compareTo()method: use the distance to the coordinate system’s origin for comparison

• Overrided clone() method.

Please write your complete CartesianPoint class and its testing class below

1a (35 pts) Write your complete Java code for the above Java class in CartesianPoint.java file. 1b (35 pts) In a new file named testPoint.java, write your test Java class and its main method which will do the following:

✓ create two Cartesian objects(pointOne, pointTwo), both of them with the explicit constructors;

✓ then compare the two points and output the farther away one’s x and y coordinates (test of comparable interface);

✓ next create a third CartesianPoint object pointThree which is a clone of the farther away one between the above two points, and then reset its coordinates to new x and y values and output them.

In: Computer Science

Define MIPS and MFLOPS and explain how they are related and different from each other.

Define MIPS and MFLOPS and explain how they are related and different from each other.

In: Computer Science

1. Select the option below that indicates a DLL MAY have been hooked maliciously. Hooking module:...

1.
Select the option below that indicates a DLL MAY have been hooked maliciously.

Hooking module: CRYPTBASE.DLL
Hooking module: combase.dll
Hooking module: <unknown>

2.
The malfind module uses certain markers to identify potential hooks. Select all the markers that apply from the list below.

A tag of VadS
Is executable
Marked as Private (has a value of 1)
Is colored red

3.
From the list below, choose what you consider to be the MOST important statement regarding the external hard drive used for capturing images.

It MUST contain all of the forensic analysis software preloaded.
It MUST be USB.
It MUST be forensically clean.
All of the answers are MOST important.


4.
In response to the threats targeting your industry, select from the the list below all the mitigation techniques that may apply.

Creating firewall rules and intrusion detection systems.
Hardening vulnerable systems by patching and changing configurations.
Strengthening and enforcing password and access policies.
Increased monitoring of vulnerable assets.

5.
CTI provides intelligence you can use to enhance the security of the network by decreasing dwell time. From the list, select the appropriate aspect of intelligence.

Actionable
Timely
Relevant
All answers are correct

6.
You are designing a Network Security Monitoring program at your company, In order to collect network traffic flow data, you need to utilize a device to get packets to the sensor that will not disrupt normal business usage. What are your most reasonable options? (select all that apply)

Layer 3 Router
Network Tap
Span Port


7.
Which is the most restrictive Access Control method?


DAC
RBAC
TBAC

8.
No matter how strong your defenses are, or what proactive steps have been taken, eventually a motivated attacker will find a way to get in. Select the most appropriate reason for this statement.

None of the answers are correct.
Prevention eventually fails.
The segmented network architecture is too complex to manage effectively.

9.
Flat network designs have the following security concerns:

High cost associated with implementation.
Free flow of network traffic behind the firewall.
Single point of failure associated with the single firewall.
B & C

10.
The PCAP data format is applicable to which Network Security Monitor data type?

Alert data.
Full Packet Capture (FPC) data.
Packet String (PSTR) data.

11.
From the list below select ALL that apply to the definition of Threat-Centric Defense.

Question options:

Focuses on detection.
Knows that threats use different tools, tactics, and procedures.
Analyzes every attack in a vacuum.
Relies on prevention.
Assumes universal view of all threats.
Recognizes that prevention eventually fails.
Focuses on collection.
Combines intelligence from every attack.

12.
What is the primary reason Attackers use outbound C2 connections?

Outbound connections are more likely to be allowed through the firewall than inbound connections.

Malware cannot respond to inbound connections because control of compromised systems has to be initiated by the compromised system.

Attackers cannot reach compromised systems with inbound connections.

13.
The current state of security has led us to a point where traditional detection is no longer effective. Select the main reason for the failure from the list below.

A vulnerability-centric defense.

Detection is mostly signature-based.

Structured threats use formal Tactics, Techniques, and Procedures (TTP).

14.
According to the Sliding Scale of Cyber Security, which of the following is the recommended model for offense?

The Diamond Model.

None. Actually implementing security is the best defense.


15.
Which of the following should be the primary guide to network security design?

Annual revenue projections.

The level of Business Risk an organization is willing to tolerate.

Network speed requirements.

16.
In most scenarios, which type of NSM sensor is preferable because it allows for data analysis independent of the sensor?

Half-Cycle.
None of the answers are correct.
Full-Cycle.

In: Computer Science

Please ready a program should output Inorder Tree Traversal without recursion and without stack!, output in...

Please ready a program should output Inorder Tree Traversal without recursion and without stack!, output in ALGOL W programming only. Thumbs down for wrong answers
Make a program to perform Heap Sort, must run in Alice programming only. Only correct answers needed should be in given language

In: Computer Science

why we need socket programming? what its application.

why we need socket programming? what its application.

In: Computer Science

Using Python programming language, write a LONG piece of code that utilizes the do while function...

Using Python programming language, write a LONG piece of code that utilizes the do while function and the switch statement, please do not make It short, thank you.

In: Computer Science

For a LinkedList in Java how do I - Add a method named replace() that takes...

For a LinkedList in Java how do I

- Add a method named replace() that takes in two parameters (the data object to replaced, followed by the one to be inserted) that will remove the first occurrence of the item to be replaced and add the second parameter to the list. The method returns a boolean - true if the item to be replaced was found, false if not

- Add an instance method named showList() (no parameters or return value) that will extract all of the values from the list and display them in order, one per line, followed by another line displaying how many values are currently in the list. If the list is empty, display the message “The list is currently empty” instead

- Overload showList() with an integer parameter which represents how many items to display on each line. The method needs to newline after the last item no matter how many items were displayed (i.e. don’t leave the cursor hanging.)

In: Computer Science