P-3.40 Implement a class, SubstitutionCipher, with a constructor that takes a string with the 26 uppercase letters in an arbitrary order and uses that as the encoder for a cipher (that is, A is mapped to the first character of the parameter, B is mapped to the second, and so on.) You should derive the decoding map from the forward version.
P-3.41 Redesign the CaesarCipher class as a subclass of the SubstitutionCipher from the previous problem.
P-3.42 Design a RandomCipher class as a subclass of the SubstitutionCipher from Exercise P-3.40, so that each instance of the class relies on a random permutation of letters for its mapping.
In: Computer Science
Explain what OS hardening is and why it is important? In addition, explain what could happen if OS Hardening is not done properly.
In: Computer Science
What is meant by best evidence? What are some examples? What is hearsay? When arriving at a crime scene, is it better to shut down the computer immediately or insure it stays on? What are the tradeoffs?
In: Computer Science
●In this task, the quick sort algorithm selects the first element in the list as the pivot. Revise it by selecting the median among the first, middle, and last elements in the list.
● Write the algorithm for searching for entries using linear probing.
● Write the algorithm for removing entries using linear probing.
● Create a diagram similar to the one above that shows the hash table of size 11 after entries with the keys 34, 29, 53, 44, 120, 39, 45, and 40 are inserted, using separate chaining.
I am very confused, this task involves algorithms , hashing and sorting.
THANK YOU IN ADVANCE
In: Computer Science
R-Studio (R Programming Language)
4. Let the data x be given by
`x <- c(1, 8, 2, 6, 3, 8, 5, 5, 5, 5)`
Use R to compute the following functions. Note, we use X1 to denote
the first element of x (which is 1) etc.
1. `(X1 + X2 + . . .+ X10)/10` (use sum)
2. Find log10(Xi) for each i. (Use the log function which by
default is base e)
3. Find `(Xi - 4.4)/2.875` for each i. (Do it all at once)
4. Find the difference between the largest and smallest values of
x. (This is the range. You can use `max` and
`min` or guess a built in command.)
```{r}
#insert your code
```
In: Computer Science
Using inner join, list the details of the products whose line price is greater than 100. what command we will use in sql?
In: Computer Science
For the following Ackerman function defined for non-negative
integers, write a Java program that:
Contains a method called computeAckermann that takes two integer
values as parameters and calculates and returns the value of the
Ackerman function. The method should be defined inside a class
named Ackermann.
Test the implementation of Ackerman in (a) by calling it from main
function and printing the returned value. The main function should
be defined in a separate class named AckermannDemo.
In: Computer Science
Everything changes—it’s the only constant. When things change on a network, there are new variables that can result in a compromise of the confidentiality, integrity, and/or availability.
Why must change be managed? What do we mean by change?
What are some examples of something on the network that changes that must be managed?
What are some of the possible consequences of not managing change?
Why is it important during the management of change to separate duties?
In: Computer Science
Draw the class diagram for the bank system given the following
specifications:
1.One bank is associated with 0 or more accounts
2. Each account is associated with exactly one bank
3. Current account, savings and money market are account
types.
Show and discuss the different class relations in your diagram.
In: Computer Science
Data Management
In: Computer Science
In: Computer Science
Write a short note on FRAUD ANALYST as it relate to "Information System Security"
In: Computer Science
For this lab we will be completing the Normalization step for several of your entities from your E/R diagram.
You will normalize the following entities to 3rd normal form - show ALL steps - 1st normal form, 2nd normal form and 3rd normal form for each of the following entities:
PATIENT
BED
EMPLOYEE
DEPARTMENT
TREATMENT
TEST
After going through your steps of normalization - add in your Foreign keys based on your cardinalities from your E/R diagram. Be sure you include your attributes in your table
In: Computer Science
C++ Memory Management:
- Create a class called DynamicArray that allocates an integer array of user defined size on the heap
- Don't not use any of the STL containers (vector, list, etc)
- Create the necessary constructors and destructor, code should allocate the array using new.
- Write a method print_array that prints the array’s length and the contents of the array.
- Create at least 2 DynamicArray objects and print their contents. Include your DynamicArray class below along with the constructors/destructor and sample output.
- Below is a sample main method that declares, fills (not required as part of the project, but it makes testing easier), and prints a DynamicArray
int main()
{
DynamicArray a(9);
a.fill_array(1); /* fills array with consecutive #’s */
a.print_array();
}
- in the comments label code as 'constructor' and 'destructor'
-show full code to pls
In: Computer Science
In: Computer Science