Describe how cloud computing may lead to “intelligent fabrics” in the future and how this will impact companies and consumers. Use real-world examples to support your assertions.
In: Computer Science
Write a C# console program that continually asks the user "Do you want to enter a name (Y/N)? ". Use a "while" loop to accomplish this. As long as the user enters either an upper or lowercase 'Y', then prompt to the screen "Enter First and Last Name: " and then get keyboard input of the name. After entering the name, display the name to the screen.
In: Computer Science
Linux Fundamentals part 4 final Below are questions related to the command line use of Linux. You can use the videos, man pages, and notes to answer these questions. Remember that Linux is CASE SENSITIVE. Rm and rm are NOT the same command. I will count off totally for a question if you do not take this into account. For each command give me the ENTIRE COMMAND SEQUENCE. If I ask you 'What command would I use to move the file one.txt to the parent directory and rename it to two.txt?", the answer is NOT 'mv'. That is only part of the command. I want the entire command sequence.
16. Find all files under ~ whose content contain the keyword taco OR Taco OR taCo OR tacO. NOT all variations in case for 'taco', but just the variations listed meaning a keyword of tAco, tACO, tACo, etc, will not produce a result.
17. Find all files under the current directory which ends in
'.txt' (just the .txt not the single quotes) and use -exec to
create a listing of each files inode number. Since we're using
-exec, this means we will call another command to produce the inode
based on the results found. What command do we use to make
listings? Now you just need to find how to make it produce an inode
result. To the man page!
18. What command would I run to update the database of file
names used by the locate command?
19. Find all files under the /var directory with a size less
than 1 kilobyte. Use -exec and an appropriate command to copy those
files to ~/Documents/FallFun/sep.
20. Find all files under the ~ directory that are named
'Picard' ignoring case.
In: Computer Science
Prove that the following language are NOT regular using the pumping lemma
(20 pt.) ? = {? ∈ {?, #}∗ | ? = ??#??# ... #?? ??? ? ≥ ?, ?? ∈
?∗ ??? ????? ?, ??? ?? ≠?? ???????? ?≠?}
Hint: choose a string ? ∈ ? that contains ? #’s.
In: Computer Science
implement Max Subarray Problem via Divide-and-conquer off this code
#include <iostream>
#define MAX_INT 2147483647
using namespace std;
int main(int argc,char **argv) {
int* array;
int arraySize = 1;
// Get the size of the sequence
cin >> arraySize;
array = new int[arraySize];
// Read the sequence
for(int i=0; i<arraySize; i++){
cin >> array[i];
}
In: Computer Science
Configuring Windows Firewall
In this project, you edit configuration settings on Windows Firewall.
Note
Windows Firewall uses three different profiles: domain (when the computer is connected to a Windows domain), private (when connected to a private network, such as a work or home network), and public (used when connected to a public network, such as a public Wi-Fi). A computer may use multiple profiles, so that a business laptop computer may use the domain profile at work, the private profile when connected to the home network, and the public profile when connected to a public Wi-Fi network. Windows asks whether a network is public or private when you first connect to it.
1
Click Start, click the search icon, and enter Firewall.
2
Click Windows Firewall Control panel.
3
Click Turn Windows Firewall on or off. Be sure that the Windows Firewall is turned on for both private and public networks.
4
Under Public network settings check Block all incoming connections, including those in the list of allowed apps. This provides an extra level of security when using a public network such as a free Wi-Fi network by preventing a malicious incoming connection from another computer on the network. Click OK.
5
To allow an inbound connection from an installed application, in the left pane click Allow an app or feature through Windows Firewall.
6
Each program or feature of Windows can be chosen to allow an incoming connection on public or private networks. Click Allow another app.
7
From here you can select an app that will permit an incoming connection. Because this is a security risk, click Cancel and then OK.
8
Now check the configuration properties of Windows Firewall. Click Advanced settings.
9
Click Properties in the right pane.
10
Note the settings on each of the profiles by clicking the Domain Profile, Private Profile, and Public Profile tabs. Is there any difference in the settings between these profiles? Why?
11
On each tab under Settings, click Customize. Be sure that Display a notification is set to Yes. Why would this be important?
12
Click OK to return to the Windows Firewall with Advanced Security page.
13
In addition to being application-aware, Windows Firewall also can be configured for firewall rules. Click Outbound Rules in the left pane to block a program from reaching the Internet.
14
In the right pane, click New Rule.
15
Click Port and then click Next.
Note
In addition to ports, the Windows Firewall also can block by program (Program) or even by program, port, and IP address (Custom).
16
If necessary, click TCP.
17
Next to Specific remote ports: enter 80. Click Next.
18
If necessary, click Block the connection. Click Next.
19
Be sure that this new rule applies to all three domains. Click Next.
20
Under Name: enter Blocking Port 80. Click Finish.
21
Now open a web browser and try to connect to the Internet. What happens?
22
Click the Back button to return to the Windows Firewall screen and click Action and Restore Default Policy to disable this rule. If a warning dialog box appears, click Yes. Click OK.
23
Select Outbound Rules in the left pane. In the right pane, click New Rule.
24
Click Custom and Next.
25
If necessary, click All programs and Next.
26
Note that you can configure a firewall rule based on protocol, protocol number, local port, and remote port.
27
Click Cancel.
28
Close all windows.
please answer all the questions, and take screenshots of all the steps
In: Computer Science
What is printed?
public static void main(String[] args)
{
int i = 6;
aMeth(i);
System.out.print(i);
}
public static void aMeth(int i)
{
System.out.print(i);
i = i + 1;
System.out.print(i);
}
2)
What is printed as the value of b?
Scanner kybd = new Scanner(System.in);
System.out.println("Enter two ints " );
int i = kybd.nextInt();
int j = kybd.nextInt();
boolean b = ((i % 2) == 0) && ((j % 2) == 0);
System.out.println(b);
3)
In: Computer Science
Generating a sequence using Pthreads
Having multiple threads call a function, like will have a non-deterministic execution. Write a program with 3 threads that call a function called do_work. Each thread will be responsible for generating a number and appending it to a buffer. Thread 1 generates number 1, thread 2 generates number 2, and thread 3 generates number 3. These numbers assigned to the threads are passed in as arguments. Each thread will store its value in a shared buffer of integers having a size of 3 elements called “buffer”. When the third element is added to the buffer by either thread 1, 2 or 3, then it checks to see if the sequence is “123”. If not, it clears the buffer and the threads try to generate the sequence again. Once the total number of sequences of “123” reach 10, the threads print out the total number of tries it took to print “123”. For example, keep track of the total number of other sequences generated (includi it should print out it’s corresponding number. Below is example output at the end of the program’s execution. Ensure that your program produces the exact same output formatting; you will see why in a moment. ...
My id: 2
My id: 1
Total ses geneted: 38
Number of cect sequences: 10
Testing:
You will test that your program appears to work correctly. I provide you with a python script that tests the output of your program: A3sequence_test.py. After you believe your pr document it as well, with screenshots and a text description. For instance “my program never stops running and it should stop because the counter value is 10 and therefore...”.
In: Computer Science
1) Consider an automated teller machine (ATM) in which users
provide a personal identification number (PIN). Discuss what
confidentiality, integrity, availability, authenticity, and
non-repudiation refer to in this type of service.
2) Discuss how design principles of abstraction, modularity, and
layering help with security.
In: Computer Science
You work for a hospital in the registration and admissions department, and most of your tasks are performed manually. For example, when an individual checks in, you must obtain personal information, details on an individual’s medical background, and hospitalization insurance. You are a strong advocate for information technology and have proposed to IT management that information systems would be beneficial. The hospital has decided to develop and implement an information system that helps to streamline your processes. Since you have extended personal experience with the processes, and you have considerable knowledge of information systems and technology employed by your counterparts at other hospitals, you have been asked to function as the project business analyst. You will work very closely with the IT department’s system analyst. The system analyst has questions regarding the following:
In a 3–5-page Word document, be sure to include the following.
In: Computer Science
Takes a string and removes all spaces and special characters,
and converts
// to upper case, returning the result
// Pre: inString contains a string
// Post: Returns a string with all spaces and special characters
removed and
// converted to upper case
in c++ please
In: Computer Science
implement heap sort algorithm continuing off this
#include <iostream>
#define MAX_INT 2147483647
using namespace std;
int main(int argc,char **argv) {
int* array;
int arraySize = 1;
// Get the size of the sequence
cin >> arraySize;
array = new int[arraySize];
// Read the sequence
for(int i=0; i<arraySize; i++){
cin >> array[i];
}
In: Computer Science
Our MIPS assembly version will “compile” the following C program: #include void Compare(int b1, int h1, int b2, int h2); int Area(int b, int h); int main(int argc, char **argv) { int base1, base2, height1, height2; base1=10; base2=12; height1=8; height2=7; Compare(base1, height1, base2, height2); return 0; } void Compare(int b1, int h1, int b2, int h2) { int A1=Area(b1, h1); int A2=Area(b2, h2); if (A1>=A2) printf("Area1 is greater than Area2.\n"); else printf("Area2 is greater than Area1.\n"); } int Area(int b, int h) { int A=(b*h)/2; return A; } The MIPS Assembly Triangles Program .data: b1: .word 10 h1: .word 12 b2: .word 8 h2: .word 7 msg1: .asciiz "Area1 greater than Area2.\n" msg2: .asciiz "Area2 greater than Area1.\n" 5 Adriana WISE—CS301 Thursday, September 26, 2019 debug1: .asciiz "Area1=" debug2: .asciiz "Area2=" newline: .asciiz "\n" .text: main: lw $a0, b1 lw $a1, h1 lw $a2, b2 lw $a3, h2 jal Compare li $v0, 10 syscall Compare: subi $sp, $sp, 4 sw $ra, 0($sp) jal Area add $s0, $v0, $zero la $a0, debug1 li $v0, 4 syscall add $a0, $s0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall la $a0, debug2 li $v0, 4 syscall add $a0, $a2, $zero add $a1, $a3, $zero jal Area add $a0, $v0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall sub $s0, $s0, $v0 6 Adriana WISE—CS301 Thursday, September 26, 2019 bltz $s0, LESS j MORE LESS: li $v0, 4 la $a0, msg2 syscall MORE: li $v0, 4 la $a0, msg1 syscall lw $ra, 0($sp) addi $sp, $sp, 4 jr $ra Area: subi $sp, $sp, 8 sw $ra, 0($sp) sw $s0, 4($sp) mul $s1, $a0, $a1 srl $v0, $s1, 1 lw $ra, 0($sp) lw $s0, 4($sp) addi $sp, $sp, 8 jr $ra Output: Area1=40 Area2=42 Area1 greater than Area2. -- program is finished running — Re-write the Triangles C and MIPS programs to read the triangles’ bases and heights as interactive user input. Write a MIPS assembly program (instructions at the end of Lecture 5 notes) to compare the areas of two triangles, taking as user input the bases and heights of the two triangles, and using two functions, Compare() and Area(), where Compare() calls Area(). For practice, also modify the existing C program to accept user input, as presented in class (lecture notes assume hard-coded values).
In: Computer Science
I am stuck on the following problem please and it has to be in python!
1) Initially, create a list of the following elements and assign the list to a variable "thing".
"Mercy", "NYU", "SUNY", "CUNY"
2) print the list above
3) add your last name to the list
4) print the list
5) add the following elements as a nested list to the list:
"iPhone", "Android"
6) print the list
7) add the following list to the end of the list as elements:
["MIT", "CMU"]
8) print the list
9) add the following nested list to the third position of the list thing:
[30, 40+1]
10) print the list
11) delete "SUNY" from the list. # revised this question on 9/24 8:41pm!
12) print the list
13) add "Mercy" to the second last in the list (so "Mercy" should be in between "MIT" and "CMU"):
14) print the list
15) count "Mercy" in the list and print.
16) print the number of the top-level elements in the list.
17) In Step 10 above, explain why 40+1 is entered 41 to the list.
Challenge) Can we remove an element from a nested list? If yes, explain how in plain text. If not, explain why not
Challenge) Can we count each every element in a list, which may contain nested lists? If yes, explain how in plain text. If not, explain why not
In: Computer Science
Problem 2:
(20 pts) Create a Patient class which has private fields for patientid, lastname,
firstname, age, and email. Create public data items for each of these private fields with get and
set methods. The entire lastname must be stored in uppercase. Create a main class which
instantiates a patient object and sets values for each data item within the class. Display the
data in the object to the console window
In: Computer Science