For guided media such as twisted pair, coaxial cable, and optical fiber, the most significant sources of signal quality impairments are Attenuation and attenuation distortion, Delay distortion, and Noise.
Describe each of the above impairments and discuss is there a solution to reduce or totally remove these impairments.
In: Computer Science
This program is to be written in Java Language. Thank you
A College has conducted a student survey. Students were asked to rate their satisfaction with remote learning courses. Students rated their satisfaction on a scale of 1 to 5 (1 = "I hate it", 5 = "I love it"). The student responses have been recorded in a file called "StudentResponses.txt". Each line of the file contains one student response.
Program 1 You are to write a program that reads and analyzes the survey responses. Your program should read the contents of the file and place the responses into an ArrayList. Your program should write a report to a file. The file should contain the number of students who responded to the survey, along with the mean, median, and standard deviation of the responses.
Program 2 Read the file "StudentResponses.txt" and count the number of occurances of the integers from 1 to 5. Use these counters to calculate the mean, median, and standard deviation.
Your program should use functions to calculate the mean, median and standard deviation. Each function should have an ArrayList as a parameter, and should return a double. Each function including the main should have a clearly stated algorithm.
In: Computer Science
(In java language)
Write an abstract class called House. The class should have type (mobile, multi-level, cottage, etc.) and size.
Provide the following methods:
Then write 2 subclasses, one for mobile house and one for cottage. Add relevant attributes and implement appropriate methods for each class.
Note that mobile house uses 50% more in heating cost than regular houses (cottage or multi-level) because it doesn't have foundation and good insulation. Cottages use 30% more in heating cost due to low insulation. The heating cost is calculated based on the size of the house multiplied by .35 cents.
Write a tester to test all classes by creating multiple objects in an ArrayList of House. Do not create individual objects with specific object type. Print out the house information as well as its heating cost.
In: Computer Science
What are the three phases (generations) of computer networking called? Also, is a centralized networking one?
In: Computer Science
Java program
Write a class called Animal that contains a static variable called count to keep track of the number of animals created. Your class needs a getter and setter to manage this resource. Create another variable called myCount that is assigned to each animal for each animal to keep track of its own given number. Write a getter and setter to manage the static variable count so that it can be accessed as a class resource
In: Computer Science
Directions
1. Start up IDLE3.8 and open a scripting window.
2. Write a program to solve the following problem:
functions - The program should input 3 integers, do calculations and print results. You need to write 4 functions for average, smallest, largest and middle as well as writing a main(). Use the main() for input, calling functions and output.
Enter a number...6
Enter a number...2
Enter a number...11
Average = 6.33
Smallest = 2
Largest = 11
Numbers in order are 2 6 11
In: Computer Science
PYTHON
please provide the complete function definition, full docstring with at least two examples
A word is a palindrome if it the same read forwards and backwards. We will call a word a fuzzy palindrome if it is the same read forwards and backwards, except for possible differences in case. For example, both 'tattarrattat' and 'TaTtArRAttat' are fuzzy palindromes. Define a function is_fuzzy_palindrome that returns True if and only if its argument is a fuzzy palindrome.
In: Computer Science
There are two errors in this code. Identify the errors and give the correct code that will make the program to display the following output:
Rectangle: height 2.0 width 4.0
Area of the Rectangle is 8.0
-----
public interface Shape {
public double getArea();
}
class Rectangle implements Shape {
double height;
double width;
public Rectangle(double height, double width) {
this.height=height;
this.width=width;
}
public double getArea() {
return height*width;
}
public String toString() {
return "Rectangle: height "+height+" width "+width;
}
}
class Main {
public static void main(String[] args) {
Shape r = new Rectangle(2.0,4.0);
System.out.println(r.toString());
System.out.println("Area of the rectangle is "+printArea(r));
}
public static double printArea(Shape s) {
if (s instance of Shape)
return s.getArea();
}
}
In: Computer Science
import java.util.ArrayList;
public class Workouts {
public enum Muscle {ABS, BACK, BICEPS, CHEST, FOREARM, GLUTES,
LOWERLEG, SHOULDER, TRICEPS, UPPERLEG, NONE} // Why didn't I have
to declare this static?
public enum Equipment {BARBELL, BODYWEIGHT, DUMBBELL, CABLE,
HAMMERSTRENGTH}
private final ArrayList<Workout> workoutList =
new ArrayList<Workout>();
// You will need to create a number of methods for the
inner class. You are not limited to
// only the methods listed inside this class.
private class Workout {
private String name;
private Equipment equipment;
private Muscle primaryMuscle;
private Muscle
secondaryMuscle;
private String desc;
private String reminders;
Workout(String name, Equipment equipment, Muscle primaryMuscle,
Muscle secondaryMuscle, String desc, String reminders)
{
// How do we get the name of an enumeration value?
//should instantiate an instance of the workout class
}
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
I would like help on the constructor
In: Computer Science
Please answer these questions in a detailed paragraph.
What attracts cyberattacks to universities?
What are the most common attack methods and approaches for mitigating those attacks?
Please use a reference to answer each question and
please add the reference links. Also, make sure these answers are
plagiarism free.
Thanks
In: Computer Science
****C++, put both of them in to one main method, make sure to start with main class, if I get a screenshot of the output as well.
thank you
(3) Use singly linked lists to implement integers of unlimited size. Each node of the list should store one digit of the integer. You should implement addition, subtraction, multiplication, and exponentiation operations. Limit exponents to be positive integers. What is the asymptotic running time for each of your operations, expressed in terms of the number of digits for the two operands of each function?
(4) Implement a program that can input an expression in postfix notation and output its value.
In: Computer Science
C# (Thank you in advance)
Create an Employee class with five fields: first name, last name, workID, yearStartedWked, and initSalary. It includes constructor(s) and properties to initialize values for all fields.
Create an interface, SalaryCalculate, class that includes two functions: first,CalcYearWorked() function, it takes one parameter (currentyear) and calculates the number of year the worker has been working. The second function, CalcCurSalary() function that calculates the current year salary.
Create a Worker classes that is derived from Employee and SalaryCalculate class.
Create a Manager class that is derived from Worker class.
Write an application that reads the workers and managers information from files (“worker.txt” and “manager.txt”) and then creates the dynamic arrays of objects. Prompt the user for current year and display the workers’ and managers’ current information in separate groups: first and last name, ID, the year he/she has been working, and current salary.
**Following is the content of the text files**
________________
manager.txt :
3 Sam Reza M000411 1995 51000 2005 Jose Perez M000412 1998 55000 2002 Rachel Pena M000413 2000 48000 2010
_______________
worker.txt :
5 Hector Alcoser A001231 1999 24000 Anna Alaniz A001232 2001 34000 Lydia Bean A001233 2002 30000 Jorge Botello A001234 2005 40000 Pablo Gonzalez A001235 2007 35000
In: Computer Science
Please answer in c++
6.Define a function to find a given target value in an array, but use pointer notation rather than array notation whenever possible.
7.Write a swap function, that swaps the values of two variables in main, but use pointers instead of reference parameters.
8.Write a function that takes an array of ints and its size as arguments. It should create a new array that is the same size as the argument. It should set the values in the new array by adding 10 to each element in the original array. The function should return a pointer to the new array. (Make sure you use dynamic memory allocation and try to get the syntax right).
In: Computer Science
Write a python program that keeps names and email addresses in a dictionary as key-value pairs. The program should display a menu that lets the user look up a person’s email address, add a new name and email address, change an existing email address, and delete an existing name and email address. The program should bind the dictionary and save it to a file when the user exits the program. Each time the program starts, it should retrieve the dictionary from the file and unbind it. The program should run continuously until the user selects option exit from the menu. You can also explore using Python pickle library.
In: Computer Science