Questions
Describe how cloud computing may lead to “intelligent fabrics” in the future and how this will...

Describe how cloud computing may lead to “intelligent fabrics” in the future and how this will impact companies and consumers. Use real-world examples to support your assertions.

In: Computer Science

Write a C# console program that continually asks the user "Do you want to enter a...

Write a C# console program that continually asks the user "Do you want to enter a name (Y/N)? ". Use a "while" loop to accomplish this. As long as the user enters either an upper or lowercase 'Y', then prompt to the screen "Enter First and Last Name: " and then get keyboard input of the name. After entering the name, display the name to the screen.

In: Computer Science

Linux Fundamentals part 4 final Below are questions related to the command line use of Linux....

Linux Fundamentals part 4 final

Below are questions related to the command line use of Linux.  You can use the videos, man pages, and notes to answer these questions. 

Remember that Linux is CASE SENSITIVE.  Rm and rm are NOT the same command.  I will count off totally for a question if you do not take this into account.

For each command give me the ENTIRE COMMAND SEQUENCE.  If I ask you  'What command would I use to move the file one.txt to the parent directory and rename it to two.txt?", the answer is NOT 'mv'. That is only part of the command. I want the entire command sequence.

16. Find all files under ~ whose content contain the keyword taco OR Taco OR taCo OR tacO. NOT all variations in case for 'taco', but just the variations listed meaning a keyword of tAco, tACO, tACo, etc, will not produce a result.


17. Find all files under the current directory which ends in '.txt' (just the .txt not the single quotes) and use -exec to create a listing of each files inode number. Since we're using -exec, this means we will call another command to produce the inode based on the results found. What command do we use to make listings? Now you just need to find how to make it produce an inode result. To the man page!


18. What command would I run to update the database of file names used by the locate command?


19. Find all files under the /var directory with a size less than 1 kilobyte. Use -exec and an appropriate command to copy those files to ~/Documents/FallFun/sep.


20. Find all files under the ~ directory that are named 'Picard' ignoring case.

In: Computer Science

Prove that the following language are NOT regular using the pumping lemma (20 pt.) ? =...

Prove that the following language are NOT regular using the pumping lemma

  1. (20 pt.) ? = {? ∈ {?, #}∗ | ? = ??#??# ... #?? ??? ? ≥ ?, ?? ∈ ?∗ ??? ????? ?, ??? ?? ≠?? ???????? ?≠?}
    Hint: choose a string ? ∈ ? that contains ? #’s.

In: Computer Science

implement Max Subarray Problem via Divide-and-conquer off this code #include <iostream> #define MAX_INT 2147483647 using namespace...

implement Max Subarray Problem via Divide-and-conquer off this code

#include <iostream>
#define MAX_INT 2147483647
using namespace std;

int main(int argc,char **argv) {

int* array;
int arraySize = 1;


// Get the size of the sequence
cin >> arraySize;
array = new int[arraySize];

// Read the sequence
for(int i=0; i<arraySize; i++){

cin >> array[i];

}

In: Computer Science

Configuring Windows Firewall In this project, you edit configuration settings on Windows Firewall. Note Windows Firewall...

Configuring Windows Firewall

In this project, you edit configuration settings on Windows Firewall.

Note

Windows Firewall uses three different profiles: domain (when the computer is connected to a Windows domain), private (when connected to a private network, such as a work or home network), and public (used when connected to a public network, such as a public Wi-Fi). A computer may use multiple profiles, so that a business laptop computer may use the domain profile at work, the private profile when connected to the home network, and the public profile when connected to a public Wi-Fi network. Windows asks whether a network is public or private when you first connect to it.

  1. 1

    Click Start, click the search icon, and enter Firewall.

  2. 2

    Click Windows Firewall Control panel.

  3. 3

    Click Turn Windows Firewall on or off. Be sure that the Windows Firewall is turned on for both private and public networks.

  4. 4

    Under Public network settings check Block all incoming connections, including those in the list of allowed apps. This provides an extra level of security when using a public network such as a free Wi-Fi network by preventing a malicious incoming connection from another computer on the network. Click OK.

  5. 5

    To allow an inbound connection from an installed application, in the left pane click Allow an app or feature through Windows Firewall.

  6. 6

    Each program or feature of Windows can be chosen to allow an incoming connection on public or private networks. Click Allow another app.

  7. 7

    From here you can select an app that will permit an incoming connection. Because this is a security risk, click Cancel and then OK.

  8. 8

    Now check the configuration properties of Windows Firewall. Click Advanced settings.

  9. 9

    Click Properties in the right pane.

  10. 10

    Note the settings on each of the profiles by clicking the Domain Profile, Private Profile, and Public Profile tabs. Is there any difference in the settings between these profiles? Why?

  11. 11

    On each tab under Settings, click Customize. Be sure that Display a notification is set to Yes. Why would this be important?

  12. 12

    Click OK to return to the Windows Firewall with Advanced Security page.

  13. 13

    In addition to being application-aware, Windows Firewall also can be configured for firewall rules. Click Outbound Rules in the left pane to block a program from reaching the Internet.

  14. 14

    In the right pane, click New Rule.

  15. 15

    Click Port and then click Next.

    Note

    In addition to ports, the Windows Firewall also can block by program (Program) or even by program, port, and IP address (Custom).

  16. 16

    If necessary, click TCP.

  17. 17

    Next to Specific remote ports: enter 80. Click Next.

  18. 18

    If necessary, click Block the connection. Click Next.

  19. 19

    Be sure that this new rule applies to all three domains. Click Next.

  20. 20

    Under Name: enter Blocking Port 80. Click Finish.

  21. 21

    Now open a web browser and try to connect to the Internet. What happens?

  22. 22

    Click the Back button to return to the Windows Firewall screen and click Action and Restore Default Policy to disable this rule. If a warning dialog box appears, click Yes. Click OK.

  23. 23

    Select Outbound Rules in the left pane. In the right pane, click New Rule.

  24. 24

    Click Custom and Next.

  25. 25

    If necessary, click All programs and Next.

  26. 26

    Note that you can configure a firewall rule based on protocol, protocol number, local port, and remote port.

  27. 27

    Click Cancel.

  28. 28

    Close all windows.

  29. please answer all the questions, and take screenshots of all the steps

In: Computer Science

What is printed? public static void main(String[] args) { int i = 6; aMeth(i); System.out.print(i); }...

What is printed?

public static void main(String[] args)
{
int i = 6;
aMeth(i);
System.out.print(i);
}
public static void aMeth(int i) 
{
System.out.print(i);
i = i + 1;
System.out.print(i);
}

2)

What is printed as the value of b?

 Scanner kybd = new Scanner(System.in);
 System.out.println("Enter two ints " );
 int i = kybd.nextInt();
 int j = kybd.nextInt();
 boolean b = ((i % 2) == 0) && ((j % 2) == 0);
 System.out.println(b);

3)

In: Computer Science

Generating a sequence using Pthreads Having multiple threads call a function, like will have a non-deterministic...

Generating a sequence using Pthreads

Having multiple threads call a function, like will have a non-deterministic execution. Write a program with 3 threads that call a function called do_work. Each thread will be responsible for generating a number and appending it to a buffer. Thread 1 generates number 1, thread 2 generates number 2, and thread 3 generates number 3. These numbers assigned to the threads are passed in as arguments. Each thread will store its value in a shared buffer of integers having a size of 3 elements called “buffer”. When the third element is added to the buffer by either thread 1, 2 or 3, then it checks to see if the sequence is “123”. If not, it clears the buffer and the threads try to generate the sequence again. Once the total number of sequences of “123” reach 10, the threads print out the total number of tries it took to print “123”. For example, keep track of the total number of other sequences generated (includi it should print out it’s corresponding number. Below is example output at the end of the program’s execution. Ensure that your program produces the exact same output formatting; you will see why in a moment. ...

My id: 2

My id: 1

Total ses geneted: 38

Number of cect sequences: 10

Testing:

You will test that your program appears to work correctly. I provide you with a python script that tests the output of your program: A3sequence_test.py. After you believe your pr document it as well, with screenshots and a text description. For instance “my program never stops running and it should stop because the counter value is 10 and therefore...”.

In: Computer Science

1) Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN)....

1) Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN). Discuss what confidentiality, integrity, availability, authenticity, and non-repudiation refer to in this type of service.
2) Discuss how design principles of abstraction, modularity, and layering help with security.

In: Computer Science

You work for a hospital in the registration and admissions department, and most of your tasks...

You work for a hospital in the registration and admissions department, and most of your tasks are performed manually. For example, when an individual checks in, you must obtain personal information, details on an individual’s medical background, and hospitalization insurance. You are a strong advocate for information technology and have proposed to IT management that information systems would be beneficial. The hospital has decided to develop and implement an information system that helps to streamline your processes. Since you have extended personal experience with the processes, and you have considerable knowledge of information systems and technology employed by your counterparts at other hospitals, you have been asked to function as the project business analyst. You will work very closely with the IT department’s system analyst. The system analyst has questions regarding the following:

  • What specifically do you do to complete your tasks?
  • What are your thoughts about how technology might improve your processes?
  • What are the challenges and obstacles that would be overcome with the use of an information system?
  • What are your thoughts about the type of information system that might be employed at your hospital?
  • Based on your understanding, what components would be required to implement the information system? For example, would you need any special hardware or software?

In a 3–5-page Word document, be sure to include the following.

  • Summarized list of tasks, or processes, to register and to check in a patient.
  • Benefits of using an information system in support of your day-to-day tasks.
  • Specifics regarding how the information system would help to overcome the present challenges and obstacles.
  • The specific type of information system you recommend (support your recommendation).
  • An outline of all components you see as necessary to implement your recommended information system.
  • Explain how the new information system would help your organization to reduce the overall cost of health care and to improve the profitability of your hospital.

In: Computer Science

Takes a string and removes all spaces and special characters, and converts // to upper case,...

Takes a string and removes all spaces and special characters, and converts
// to upper case, returning the result
// Pre: inString contains a string
// Post: Returns a string with all spaces and special characters removed and
// converted to upper case

in c++ please

In: Computer Science

implement heap sort algorithm continuing off this #include <iostream> #define MAX_INT 2147483647 using namespace std; int...

implement heap sort algorithm continuing off this

#include <iostream>
#define MAX_INT 2147483647
using namespace std;

int main(int argc,char **argv) {

int* array;
int arraySize = 1;


// Get the size of the sequence
cin >> arraySize;
array = new int[arraySize];

// Read the sequence
for(int i=0; i<arraySize; i++){

cin >> array[i];

}

In: Computer Science

Our MIPS assembly version will “compile” the following C program: #include void Compare(int b1, int h1,...

Our MIPS assembly version will “compile” the following C program: #include void Compare(int b1, int h1, int b2, int h2); int Area(int b, int h); int main(int argc, char **argv) { int base1, base2, height1, height2; base1=10; base2=12; height1=8; height2=7; Compare(base1, height1, base2, height2); return 0; } void Compare(int b1, int h1, int b2, int h2) { int A1=Area(b1, h1); int A2=Area(b2, h2); if (A1>=A2) printf("Area1 is greater than Area2.\n"); else printf("Area2 is greater than Area1.\n"); } int Area(int b, int h) { int A=(b*h)/2; return A; } The MIPS Assembly Triangles Program .data: b1: .word 10 h1: .word 12 b2: .word 8 h2: .word 7 msg1: .asciiz "Area1 greater than Area2.\n" msg2: .asciiz "Area2 greater than Area1.\n" 5 Adriana WISE—CS301 Thursday, September 26, 2019 debug1: .asciiz "Area1=" debug2: .asciiz "Area2=" newline: .asciiz "\n" .text: main: lw $a0, b1 lw $a1, h1 lw $a2, b2 lw $a3, h2 jal Compare li $v0, 10 syscall Compare: subi $sp, $sp, 4 sw $ra, 0($sp) jal Area add $s0, $v0, $zero la $a0, debug1 li $v0, 4 syscall add $a0, $s0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall la $a0, debug2 li $v0, 4 syscall add $a0, $a2, $zero add $a1, $a3, $zero jal Area add $a0, $v0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall sub $s0, $s0, $v0 6 Adriana WISE—CS301 Thursday, September 26, 2019 bltz $s0, LESS j MORE LESS: li $v0, 4 la $a0, msg2 syscall MORE: li $v0, 4 la $a0, msg1 syscall lw $ra, 0($sp) addi $sp, $sp, 4 jr $ra Area: subi $sp, $sp, 8 sw $ra, 0($sp) sw $s0, 4($sp) mul $s1, $a0, $a1 srl $v0, $s1, 1 lw $ra, 0($sp) lw $s0, 4($sp) addi $sp, $sp, 8 jr $ra Output: Area1=40 Area2=42 Area1 greater than Area2. -- program is finished running — Re-write the Triangles C and MIPS programs to read the triangles’ bases and heights as interactive user input. Write a MIPS assembly program (instructions at the end of Lecture 5 notes) to compare the areas of two triangles, taking as user input the bases and heights of the two triangles, and using two functions, Compare() and Area(), where Compare() calls Area(). For practice, also modify the existing C program to accept user input, as presented in class (lecture notes assume hard-coded values).

In: Computer Science

I am stuck on the following problem please and it has to be in python! 1)...

I am stuck on the following problem please and it has to be in python!

1) Initially, create a list of the following elements and assign the list to a variable "thing".

"Mercy", "NYU", "SUNY", "CUNY"

2) print the list above

3) add your last name to the list

4) print the list

5) add the following elements as a nested list to the list:

"iPhone", "Android"

6) print the list

7) add the following list to the end of the list as elements:

["MIT", "CMU"]

8) print the list

9) add the following nested list to the third position of the list thing:

[30, 40+1]

10) print the list

11) delete "SUNY" from the list. # revised this question on 9/24 8:41pm!

12) print the list

13) add "Mercy" to the second last in the list (so "Mercy" should be in between "MIT" and "CMU"):

14) print the list

15) count "Mercy" in the list and print.

16) print the number of the top-level elements in the list.

17) In Step 10 above, explain why 40+1 is entered 41 to the list.


Challenge) Can we remove an element from a nested list? If yes, explain how in plain text. If not, explain why not

Challenge) Can we count each every element in a list, which may contain nested lists? If yes, explain how in plain text. If not, explain why not

In: Computer Science

Problem 2: (20 pts) Create a Patient class which has private fields for patientid, lastname, firstname,...

Problem 2:

(20 pts) Create a Patient class which has private fields for patientid, lastname,

firstname, age, and email. Create public data items for each of these private fields with get and

set methods. The entire lastname must be stored in uppercase. Create a main class which

instantiates a patient object and sets values for each data item within the class. Display the

data in the object to the console window

In: Computer Science