Mark Arnez of Aspen consulting has been contacted by a client who represents an international company with locations in your city, in Toronto, and in London. Each location has a plant for making parts for boilers used in large buildings. There also are sales and parts distribution offices at the plants. All buildings currently are networked using 10-Mbps communications to each workstation or server and 100-Mbps communications between floors. The client is exploring ways to link the business networks at all three locations. Form a team to determine the best way to connect the locations. Use the internet to research some gross estimates of the costs.
In: Computer Science
3-1. On your first visit with gray sharma, he tells you he would like to know about some basic network designs. use microsoft paint or another drawing package to draw examples of the basic network topologies for gray. then, use the space below to summarize those topologies.
Explain the advantages and disadvantages of the topologies you summarized for gray in Assignment 3-1. Based on what you know at this point, which topology would you recommend for the physicians building? why would you recommend it?
In: Computer Science
In: Computer Science
(C++) Write a program that prompts the user for the length of one side of a triangle and the sizes of the two adjacent angles in degrees and then displays the length of the two other sides and the size of the third angle.
In: Computer Science
Can anyone please sort the differential evolution alogrithim for the sake of automatic time table generator? Please do coding.
In: Computer Science
Please break down this python code into steps on how to do it.
def membership(sequence, value):
if value in sequence:
return value
if [value] in sequence:
return [value]
if [[value]] in sequence:
return [[value]]
a_list = ['a', ['a'], [['a']]]
print(membership(a_list, 'a'))
In: Computer Science
Code in java(eclipse) and please use simple codes
Assignment
Bigfoot has reportedly been seen in Southeast Texas forests. We have a drone searching for Bigfoot that can take pictures from the air. During a 24-hour period the drone can fly over the forest 3 times. On each flight we estimate Bigfoot will be in range of the camera on the drone for 2 minutes. The camera can take 10 photos per minute. We estimate there is a 30% chance Bigfoot will appear on each photo taken.
Run a simulation of our drone taking photos of Bigfoot. For each picture taken, generate a random number from 0-100 and compare it to the percentage chance Bigfoot will appear in the photo. Calculate the number of photos taken during the 24-hour period and print it. Calculate the number of photos taken during 24-hour period in which Bigfoot appears in the photo and print that also.
Run the above simulation 5 times. At the end, compute the average number of photos taken (rounded down) during a 24-hour period in which Bigfoot appears (by averaging the number of photos taken of Bigfoot during all of the 5 simulations).
Run your program. Your program must run successfully to receive full credit for this homework. Take a screenshot of your program. The screenshot should show all of your source code and the output of your program in the Console window. Resize the editor and/or console windows as needed so that everything is shown. You may also need to expand Eclipse to full screen size. If you program is too large you can take multiple screenshots so the source code is all shown and zip all the files together (use .zip format only, not .7zip, .rar or any other format besides .zip).
An example of output from the program might look something like:
Simulation 1: Photos of Bigfoot: 33 of 60
Simulation 2: Photos of Bigfoot: 37 of 60
Simulation 3: Photos of Bigfoot: 49 of 60
Simulation 4: Photos of Bigfoot: 40 of 60
Simulation 5: Photos of Bigfoot: 51 of 60
Average photos taken of Bigfoot: 42 of 60
In: Computer Science
Explain the MIS impact on revenue, fixed costs, variable costs, initial investment, training, implementation, customer acquisition, customer retention, and customer satisfaction .
In: Computer Science
Write a program to simulate rolling a six-sided fair die. Allow the user to enter the
number of rolls.
Your program should use rand() to get the result of die rolling.
Compute the number of occurrences for each number roll.
Calculate the percentage for each number roll.
Out put the results in the following format.
Use a do while loop to allow the user to repeat the process.
Here is the sample run for your program:
Please enter the number of die rolls
25
Number Frequency Percentage
1 3 0.12
2 6 0.24
3 10 0.40
4 1 0.04
5 3 0.12
6 2 0.08
Do you want to continue rolling die another time? Press Y or N
Y
Please enter the number of die rolls
10
I want to be able to do it with a switch statement but am unsure
In: Computer Science
Use C++ write a "Design and implement a class of infix calculators" ,simply write a function named "evaluateInfix()" that evaluates infix expressions. It should have one string parameter and should return an int result. It should call a separate function named "infixToPostfix()" to convert the infix expression into a postfix expression, and then it should do the work of evaluating the resulting postfix expression. Then write a main() function to thoroughly test the function.
Use the pseudocode algorithm that evaluates postfix expressions given at the end of section 6.3.1 and the pseudocode algorithm that converts an infix expression to postfix form given near the end of section 6.3.2. Use the STL stack class.
Here is the pseudocode for 6.3.1
for ( each character ch in the string) {
if (ch is an operand)
Push the value of the operand ch onto the stack
else // ch is an operator named
{
// Evaluate and push the result
operand2 = top of stack
Pop the stack
operand1 = top of stack
Pop the stack
result = operand1 op operand2
Push result onto the stack
}
}
Here is the pseudocode for 6.3.2
for ( each character ch in the infix expression) {
switch (ch) {
case operand: // Append operand to end of postfix expression—step 1
postfixExp = postfixExp • ch
break
case '(': // Save '(' on stack—step 2
aStack.push(ch)
break
case operator: // Process stack operators of greater precedence—step 3
while (!aStack.isEmpty() and aStack.peek() is not a '(' and precedence(ch) <= precedence(aStack.peek())) {
Append aStack.peek() to the end of postfixExp
aStack.pop()
}
aStack.push(ch) // Save the operator
break
case ')': // Pop stack until matching '(' —step 4
while (aStack.peek() is not a '(')
{ Append aStack.peek() to the end of postfixExp
aStack.pop()
}
aStack.pop() // Remove the open parenthesis
break }
}
// Append to postfixExp the operators remaining in the stack—step 5
while (!aStack.isEmpty())
{ Append aStack.peek() to the end of postfixExp
aStack.pop()
}
In: Computer Science
In C++, write a program that reads data from a text file. Include in this program functions that calculate the mean and the standard deviation. Make sure that the only global variables are the actual data points, the mean, the standard deviation, and the number of data entered. All other variables must be local to the function. At the top of the program make sure you use functional prototypes instead of writing each function before the main function... ALL LINES OF THE PROGRAM MUST BE COMMENTED.
349.5
376.2
36.9
283.5
361.0
381.0
344.7
328.5
368.3
370.5
360.6
426.9
434.7
Help please and comment on every line.
In: Computer Science
Describe the role and relationship between each high-level component of the Von Neumann Architecture? (I/O, Memory, CPU, ALU). b) What are some of the differences between a Von Neumann Architecture and other computing architectures?
In: Computer Science
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Submit a list of all e-Commerce applications required in the travel agency's network. Make sure to include a description of each application.
In: Computer Science
DOS Command * | Linux Command |
CHDIR [target directory] | cd [target directory] |
CLS | clear |
COPY [source file] [destination file] | cp [source file] [destination file] |
CREATEDIR [directory name] | mkdir [directory name] |
CREATEFILE [file name] | touch [file name] |
DELETE [file name] | rm [file name] |
DIR [file name | directory name | wildcard] | ls [file name | directory name | wildcard] |
MOVE [source] [destination] | mv [source] [destination] |
PRINT [message to print] | echo [message to print] |
QUIT | N/A |
RENAME [old name] [new name] | mv [old name] [new name] |
TYPE [file name] | cat [file name] |
* Assume DOS commands are case-insensitive (i.e., DIR is the same as dir). |
In: Computer Science
Learning Objectives:
● review implementing the interface Comparable<T>
● programming against interfaces not objects.
● review reading in data from a file
● use the internet to learn about the interface Comparator<T>
● use a Comparator to provide an alternative way to order elements in a
collection
Description:
Turn in:
Turn in the assignment via Canvas
Create a package called booksthat includes 3 files: Book.java, BookApp.java, and books.csv (provided).
Class Book represents Pulitzer prize winning
books that have a title, an author and a year, when they
won the award. Implement the class Book exactly as specified in the
UML diagram below.
You are allowed to create private methods to structure your code,
but fields, constructors, and public methods must not be changed
nor added or removed.
Notice that class Book implements the interface
Comparable<T>. The method specified in the interface
is not listed in the UML class diagram of class Book. However, the
fact that Book implements Comparable<T> implies that the
interface method needs to be implemented.
The interface Comparable<T> implements the natural order. In
case of class Book it should sort by title.
Also notice that class Book is immutable. It has getters but no setters.
Method toString:
The toString method should return a string of the following
form: name by author ( year )
Make sure to include the @Override annotation
Method getList:
Note that the method getList is underlined. Underlining a method
in a UML class diagrams indicates that the method is static.
The method getList should readin the data from the csv file
book.csv. If a line doesn’t follow the pattern
title,author,yearthen a message should be written to the
standard error stream (see sample output) The program should
continue reading in the next line. NO exception should be thrown
.
Please note that the sample output is only provided to help clarify the instructions. The program still needs to fulfill all the requirement when I test it with another csv file (e.g. where all lines are correct or other lines have an issue)
Write a test client called BookApp.java
● It should read in the data from the file book.csv. Two lines have an issue. Treat them as described above.
● Print the number of books that were read in.
Make sure to determine the number of books at run time. I will test your code with a different csv file.
● Sort the list in natural order and print the list
● Sort the books in the list in reverse order using a Comparator<T>that is provided in class Collections
● List the book in the newly reversed order
Sample Output:
Problem reading in "No Pulitzer prize for fiction was awarded in 2012" Problem reading in "The Brief, Wondrous Life of Oscar Wao,Junot Diaz,2008" Number of books read in: 14
Sorted book list:
A Visit from the Goon Squad by Jennifer Egan (2011)
Empire Falls by Richard Russo (2002)
Gilead by Marilynne Robinson (2005)
Interpreter of Maladies by Jhumpa Lahiri (2000)
March by Geraldine Brooks (2006)
Middlesex by Jeffrey Eugenides (2003)
Olive Kitteridge by Elizabeth Strout (2009)
The Amazing Adventures of Kavalier & Clay by Michael Chabon
(2001) The Goldfinch by Donna Tartt (2014)
The Hours by Michael Cunningham (1999)
The Known World by Edward P. Jones (2004)
The Orphan Master's Son by Adam Johnson (2013)
The Road by Cormac McCarthy (2007)
Tinkers by Paul Harding (2010)
Reverse order:
Tinkers by Paul Harding (2010)
The Road by Cormac McCarthy (2007)
The Orphan Master's Son by Adam Johnson (2013)
The Known World by Edward P. Jones (2004)
The Hours by Michael Cunningham (1999)
The Goldfinch by Donna Tartt (2014)
The Amazing Adventures of Kavalier & Clay by Michael Chabon
(2001) Olive Kitteridge by Elizabeth Strout (2009)
Middlesex by Jeffrey Eugenides (2003)
March by Geraldine Brooks (2006)
Interpreter of Maladies by Jhumpa Lahiri (2000)
Gilead by Marilynne Robinson (2005)
Empire Falls by Richard Russo (2002)
A Visit from the Goon Squad by Jennifer Egan (2011)
In: Computer Science