Questions
Generating a sequence using Pthreads Having multiple threads call a function, like will have a non-deterministic...

Generating a sequence using Pthreads

Having multiple threads call a function, like will have a non-deterministic execution. Write a program with 3 threads that call a function called do_work. Each thread will be responsible for generating a number and appending it to a buffer. Thread 1 generates number 1, thread 2 generates number 2, and thread 3 generates number 3. These numbers assigned to the threads are passed in as arguments. Each thread will store its value in a shared buffer of integers having a size of 3 elements called “buffer”. When the third element is added to the buffer by either thread 1, 2 or 3, then it checks to see if the sequence is “123”. If not, it clears the buffer and the threads try to generate the sequence again. Once the total number of sequences of “123” reach 10, the threads print out the total number of tries it took to print “123”. For example, keep track of the total number of other sequences generated (includi it should print out it’s corresponding number. Below is example output at the end of the program’s execution. Ensure that your program produces the exact same output formatting; you will see why in a moment. ...

My id: 2

My id: 1

Total ses geneted: 38

Number of cect sequences: 10

Testing:

You will test that your program appears to work correctly. I provide you with a python script that tests the output of your program: A3sequence_test.py. After you believe your pr document it as well, with screenshots and a text description. For instance “my program never stops running and it should stop because the counter value is 10 and therefore...”.

In: Computer Science

1) Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN)....

1) Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN). Discuss what confidentiality, integrity, availability, authenticity, and non-repudiation refer to in this type of service.
2) Discuss how design principles of abstraction, modularity, and layering help with security.

In: Computer Science

You work for a hospital in the registration and admissions department, and most of your tasks...

You work for a hospital in the registration and admissions department, and most of your tasks are performed manually. For example, when an individual checks in, you must obtain personal information, details on an individual’s medical background, and hospitalization insurance. You are a strong advocate for information technology and have proposed to IT management that information systems would be beneficial. The hospital has decided to develop and implement an information system that helps to streamline your processes. Since you have extended personal experience with the processes, and you have considerable knowledge of information systems and technology employed by your counterparts at other hospitals, you have been asked to function as the project business analyst. You will work very closely with the IT department’s system analyst. The system analyst has questions regarding the following:

  • What specifically do you do to complete your tasks?
  • What are your thoughts about how technology might improve your processes?
  • What are the challenges and obstacles that would be overcome with the use of an information system?
  • What are your thoughts about the type of information system that might be employed at your hospital?
  • Based on your understanding, what components would be required to implement the information system? For example, would you need any special hardware or software?

In a 3–5-page Word document, be sure to include the following.

  • Summarized list of tasks, or processes, to register and to check in a patient.
  • Benefits of using an information system in support of your day-to-day tasks.
  • Specifics regarding how the information system would help to overcome the present challenges and obstacles.
  • The specific type of information system you recommend (support your recommendation).
  • An outline of all components you see as necessary to implement your recommended information system.
  • Explain how the new information system would help your organization to reduce the overall cost of health care and to improve the profitability of your hospital.

In: Computer Science

Takes a string and removes all spaces and special characters, and converts // to upper case,...

Takes a string and removes all spaces and special characters, and converts
// to upper case, returning the result
// Pre: inString contains a string
// Post: Returns a string with all spaces and special characters removed and
// converted to upper case

in c++ please

In: Computer Science

implement heap sort algorithm continuing off this #include <iostream> #define MAX_INT 2147483647 using namespace std; int...

implement heap sort algorithm continuing off this

#include <iostream>
#define MAX_INT 2147483647
using namespace std;

int main(int argc,char **argv) {

int* array;
int arraySize = 1;


// Get the size of the sequence
cin >> arraySize;
array = new int[arraySize];

// Read the sequence
for(int i=0; i<arraySize; i++){

cin >> array[i];

}

In: Computer Science

Our MIPS assembly version will “compile” the following C program: #include void Compare(int b1, int h1,...

Our MIPS assembly version will “compile” the following C program: #include void Compare(int b1, int h1, int b2, int h2); int Area(int b, int h); int main(int argc, char **argv) { int base1, base2, height1, height2; base1=10; base2=12; height1=8; height2=7; Compare(base1, height1, base2, height2); return 0; } void Compare(int b1, int h1, int b2, int h2) { int A1=Area(b1, h1); int A2=Area(b2, h2); if (A1>=A2) printf("Area1 is greater than Area2.\n"); else printf("Area2 is greater than Area1.\n"); } int Area(int b, int h) { int A=(b*h)/2; return A; } The MIPS Assembly Triangles Program .data: b1: .word 10 h1: .word 12 b2: .word 8 h2: .word 7 msg1: .asciiz "Area1 greater than Area2.\n" msg2: .asciiz "Area2 greater than Area1.\n" 5 Adriana WISE—CS301 Thursday, September 26, 2019 debug1: .asciiz "Area1=" debug2: .asciiz "Area2=" newline: .asciiz "\n" .text: main: lw $a0, b1 lw $a1, h1 lw $a2, b2 lw $a3, h2 jal Compare li $v0, 10 syscall Compare: subi $sp, $sp, 4 sw $ra, 0($sp) jal Area add $s0, $v0, $zero la $a0, debug1 li $v0, 4 syscall add $a0, $s0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall la $a0, debug2 li $v0, 4 syscall add $a0, $a2, $zero add $a1, $a3, $zero jal Area add $a0, $v0, $zero li $v0, 1 syscall la $a0, newline li $v0, 4 syscall sub $s0, $s0, $v0 6 Adriana WISE—CS301 Thursday, September 26, 2019 bltz $s0, LESS j MORE LESS: li $v0, 4 la $a0, msg2 syscall MORE: li $v0, 4 la $a0, msg1 syscall lw $ra, 0($sp) addi $sp, $sp, 4 jr $ra Area: subi $sp, $sp, 8 sw $ra, 0($sp) sw $s0, 4($sp) mul $s1, $a0, $a1 srl $v0, $s1, 1 lw $ra, 0($sp) lw $s0, 4($sp) addi $sp, $sp, 8 jr $ra Output: Area1=40 Area2=42 Area1 greater than Area2. -- program is finished running — Re-write the Triangles C and MIPS programs to read the triangles’ bases and heights as interactive user input. Write a MIPS assembly program (instructions at the end of Lecture 5 notes) to compare the areas of two triangles, taking as user input the bases and heights of the two triangles, and using two functions, Compare() and Area(), where Compare() calls Area(). For practice, also modify the existing C program to accept user input, as presented in class (lecture notes assume hard-coded values).

In: Computer Science

I am stuck on the following problem please and it has to be in python! 1)...

I am stuck on the following problem please and it has to be in python!

1) Initially, create a list of the following elements and assign the list to a variable "thing".

"Mercy", "NYU", "SUNY", "CUNY"

2) print the list above

3) add your last name to the list

4) print the list

5) add the following elements as a nested list to the list:

"iPhone", "Android"

6) print the list

7) add the following list to the end of the list as elements:

["MIT", "CMU"]

8) print the list

9) add the following nested list to the third position of the list thing:

[30, 40+1]

10) print the list

11) delete "SUNY" from the list. # revised this question on 9/24 8:41pm!

12) print the list

13) add "Mercy" to the second last in the list (so "Mercy" should be in between "MIT" and "CMU"):

14) print the list

15) count "Mercy" in the list and print.

16) print the number of the top-level elements in the list.

17) In Step 10 above, explain why 40+1 is entered 41 to the list.


Challenge) Can we remove an element from a nested list? If yes, explain how in plain text. If not, explain why not

Challenge) Can we count each every element in a list, which may contain nested lists? If yes, explain how in plain text. If not, explain why not

In: Computer Science

Problem 2: (20 pts) Create a Patient class which has private fields for patientid, lastname, firstname,...

Problem 2:

(20 pts) Create a Patient class which has private fields for patientid, lastname,

firstname, age, and email. Create public data items for each of these private fields with get and

set methods. The entire lastname must be stored in uppercase. Create a main class which

instantiates a patient object and sets values for each data item within the class. Display the

data in the object to the console window

In: Computer Science

What happens if the stack and heap segments collide (i.e., one overwrites part of the other)?...

What happens if the stack and heap segments collide (i.e., one overwrites part of the other)? Why is this dangerous? How would you prevent it?

In: Computer Science

write a one-page paper that supports the claim that, in the future, computer criminals will become...

  1. write a one-page paper that supports the claim that, in the future, computer criminals will become more sophisticated and that protecting personal information will become more difficult.

In: Computer Science

how would I be able to implement a hash table into a spell checker program while...

how would I be able to implement a hash table into a spell checker program while using a StringNode class in java that checks for spelling mistakes?

In: Computer Science

import java.util.Scanner; public class test {    public static void main(String args[]){        char letter;...

import java.util.Scanner;
public class test {
   public static void main(String args[]){
       char letter;
       int number = 0;
       Scanner in = new Scanner(System.in);
       System.out.print("Enter a letter: ");
       letter = in.next().charAt(0);
       if(letter == 'A' || letter == 'B' || letter == 'C') number = 2;
       if(letter == 'D' || letter == 'E' || letter == 'F') number = 3;
       if(letter == 'G' || letter == 'H' || letter == 'I') number = 4;
       if(letter == 'J' || letter == 'K' || letter == 'L') number = 5;
       if(letter == 'M' || letter == 'N' || letter == 'O') number = 6;
       if(letter == 'P' || letter == 'R' || letter == 'S') number = 7;
       if(letter == 'T' || letter == 'U' || letter == 'V') number = 8;
       if(letter == 'W' || letter == 'X' || letter == 'Y') number = 9;
       if(letter == 'Q' || letter == 'Z') number = -1;
       if(number > 0) System.out.println("Letter " + letter + " corresponds to digit " + number);
       else System.out.println("Letter " + letter + " is not used in a telephone");
   }
}

My question is how can I use Switch statement in this program?

In: Computer Science

Write a function named "replacement" that takes a string as a parameter and returns an identical...

Write a function named "replacement" that takes a string as a parameter and returns an identical string except with every instance of the character "w" replaced with the character "v"

My code:

function replacement(word){
var str=word;
var n=str.replace("w","v");
return n;
}

Syntax Error: function replacement incorrect on input

Not sure how to fix? Can't use a loop for answer

In: Computer Science

In Modern Infrastructure strategy there are 2 basic models to consider. Keep in mind choosing the...

In Modern Infrastructure strategy there are 2 basic models to consider. Keep in mind choosing the best for the business is the right strategic decision.

Model 1-Traditional onsite of co-located data center facility. This houses your network, storage and compute technologies. You purchase and manage the equipment and your entire network/compute environment yourself.

Model 2-Newer Cloud or SAS model. In this model all the network, comput, storage lives in the cloud or at a service provider's datacenter. It's model 1 but your paying someone to host and maintain the environment for you.

Compare and contrast the 2. What is the right strategy fr a smaller start up firm? What about a larger more established firm. Support your arguments and create a strength and weakness argument for each small vs larger firm. Remember concerns like cost, scale, security etc-as discussed in class.

In: Computer Science

My add method is not working to add elements into an arrayList in java. This is...

My add method is not working to add elements into an arrayList in java.

This is the error message I keep getting:

Exception in thread "main" java.lang.NullPointerException
   at assignment1.ArrayBag.add(ArrayBag.java:50)
   at assignment1.Main.main(Main.java:21)
BUILD FAILED (total time: 0 seconds)

The following are all the methods I've created.

/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package assignment1;


/**
*
* @author Daniela Garcia Toranzo ; PID: 5674893
*/
public class ArrayBag implements Bag {

private int SIZE = 10;
private String[] bag;
private int length;

public void ArrayBag() {
bag = new String[10];
length = 0;
}

@Override
public boolean isEmpty() {

return length == 0;
}

@Override
public void print() {
for (int i = 0; i < bag.length; i++) {
if (bag[i] != null) {
System.out.print(bag[i] + " ");
}

}

}

@Override
public void add(String s) {

if (isFull() == true) {

System.out.println("Arraylist is full, cannot add anything else");;

} else {

bag[length] = s;

length++;

}
}

@Override
public void remove(String s) {
boolean found = false;
String x, y = "";

for (int i = 0; i < length; i++) {
x = bag[i].toString();

if (x.equals(y)) {
found = true;
bag[i] = bag[length - 1];
bag[length - 1] = null;
length--;
}

}

}

@Override
public int count(String s) {
int counter = 0;

for (int i = 0; i < length; i++) {

if (s.equals(bag[i])) {

counter++;
}

}

return counter;
}

private boolean isFull() {

if (length > SIZE) {
System.out.println("ArrayList is Full");
}

return length > SIZE;

}

}

In: Computer Science