Questions
Can you think of a way that Excel can be used unethically and give an example?...

Can you think of a way that Excel can be used unethically and give an example?

Your answer must be a minimum of 2 paragraphs, no spelling errors, and complete sentences.

In: Computer Science

Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught...

Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading the articles, did you think about data being used in the manner that it is? Name one other organization that may be using data warehousing and data mining techniques and explain how it is being used. Or explain how after years of collecting data how the data in the Academic Database that was implemented in Modules 6 and 7 can be useful to the academic institution? Explain your answer in 100 to 150.

In: Computer Science

1.It is acceptable to let some else use your MSDSQ120 account if you are working close...

1.It is acceptable to let some else use your MSDSQ120 account if you are working close by in the lab. True or False

2. If I am a performing technical review on a plate map and I do not see a designated area for signature/initial and date, then the following is true: (choose the best response)

A. the plate map is exempt from my technical review

B. I only need to email the Originator of the plate map and say " I review the plate map"

C. I can apply my signature and date to the form.

D. I can apply my signature, date, and meaning of signature as "Reviewer" so that the purpose of my signature and date is clearly identify .

E. None of the above.

3. While in the lab, data should be recorded... ( Choose the best response)

A. On a scrap paper, then neatly written on the worksheet at the of the day.

B. Analyst should remember what happened in the lab with the assay and then record data at their desk.

C. While at the bench at the time each step is completed on the correct batch record.

4. Which examples below are acceptable format to document the date and time ( Choose best response)

a. 27Nov2020

b. 27Nov20

c. Nov 3, 2020

d. Nov3rd, 2020

e. January 3, 2020

f. All of the above

5. True or False : The date has been corrected according to Good Document Practices

(05Dec15) EE KAJ O6Dec15

6. True or False: We should record all data according to ALCOA documentation standards.

7. True or False : Recording data contemporaneously means that as long as it is recorded sometime during the day is acceptable.

8. True or False: Any pen is acceptable to use to record raw data as long as it is blue or black ink.

9. True or False : The date has been corrected according to Good Document Practices

(05Dec15) or 06Dec15EEKAJ 06Dec15

In: Computer Science

Show the major steps for computing X9 in “ADD X9, X10, X11” for the given values....

Show the major steps for computing X9 in “ADD X9, X10, X11” for the given values. Please indicate if there is an overflow and show the final content of X9 as a hexadecimal number. a) X10=0xCFFFFFFF and X11=0xC0000000 b) X10=0xCFFFFFFF and X11=0xA0000000

In: Computer Science

Convert 2.115 single-precision floating point binary format. Please show every single detail for upvote. Please do...

Convert 2.115 single-precision floating point binary format.
Please show every single detail for upvote.
Please do not answer otherwise.

In: Computer Science

Under normal conditions, commercial aircraft generally rise at about 1,000 to 2,000 feet per minute (this...

Under normal conditions, commercial aircraft generally rise at about 1,000 to 2,000
feet per minute (this is called the rate of climb) after take-off, until they reach a
cruising altitude of 35,000 feet. Design the logic for a program that allows the user to
enter the rate of climb as input, and then for every minute after take-off until the
aircraft has reached cruising altitude, outputs the minute number, and the height of the
plane after that minute. After that the program must output the number of minutes that
have elapsed since take off, and the height at which the plane is cruising (this may not
be exactly 35,000 feet).

In: Computer Science

Convert -10.5 single-precision floating point binary format. Please show every single detail for upvote. Please do...

Convert -10.5 single-precision floating point binary format.

Please show every single detail for upvote.

Please do not answer otherwise.

In: Computer Science

Language: Java Implement Merge Sort

Language: Java

Implement Merge Sort

In: Computer Science

Task: Read the case study below and answer the following questions. Case Study: The Reveton Ransomware...

Task: Read the case study below and answer the following questions.
Case Study: The Reveton Ransomware Attacks
In August 2012, the Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center, was inundated with reports of a new type of cybercrime. Victims across the United States reported that while searching the Internet, their computers locked up, and they received the following message, purportedly from the FBI: “This operating system is locked due to the violation of the federal laws of the United States of America! (Article 1, Section 8, Clause 8; Article 202; Article 210 of the Criminal Code of U.S.A. provides for a deprivation of liberty for four to twelve years.)” The message then accused the victim either of visiting pornography Web sites or of distributing copyrighted content. Victims were told they could unlock their computers and avoid prosecution by paying a fine of $200 within 72 hours of receiving the message. The message came replete with the official FBI logo.
The incident pointed to a steep rise in ransomware attacks. Ransomware is malware that disables a computer or smartphone until the victim pays a fee, or ransom. Unlike other viruses, the Reveton version of ransomware is not activated by opening a file or an attachment. Rather it is an example of “drive-by malware,” viruses that download automatically when a user visits an infected Web site.
The FBI immediately issued an alert, but within a month, cybersecurity experts had identified 16 variants of the ransomware. These viruses had infected 68,000 unique IP addresses. It is estimated that on an average day, about 170 victims paid the $200 fee and received valid unlock codes. The compromised computers could not be fixed through the installation or updating of antivirus software because the computer was locked. Because so many home PC owners fail to back up their systems regularly, many victims faced losing a significant amount of data. The $200 fee itself was low enough to encourage payment. A visit to a professional IT service to repair the damage could potentially cost the same amount and take more time to resolve. A quick payment through a prepaid money card system, such as MoneyPak, could save the victim a lot of trouble.
The United States was not the first country to be hit by these attacks. In early 2012, criminal gangs targeted France, Germany, and the United Kingdom. Ransomware attacks first broke out in Russia in 2009. Since that time, they have spread to almost every country on the globe, hitting the United States and Japan especially hard. Symantec, an IT security company, estimates that gangs are extorting over $5 million per year from online victims. The rise of ransomware attacks is, no doubt, due in part to their success. In France, for example, almost 4 percent of victims coughed up the ransom money during a non-Reveton scam.
The Reveton ransomware is delivered by the popular Russian-language Citadel malware toolkit. The latest version of Citadel can also grab passwords from Web browsers and change Web sites to trick users into handing over their login information.
In December 2012, the United Kingdom arrested three people they believed were involved in the Reveton ransomware attacks. Finding the perpetrators, however, is unusual and is not the most effective way to combat this crime. Law enforcement agencies and IT security companies have urged the public to take measures to prevent themselves from falling victim to such attacks—by keeping software such as Java, Acrobat Reader, Adobe Flash, Windows, and their browser software updated. An early Reveton ransomware attack made use of a vulnerability in a version of Java that had just been patched a month prior. Computer users can also avoid infections by using security software that identifies suspicious Web sites, and by not clicking online ads from dubious companies. Perhaps, however, the best way to avoid the spread of these attacks is to encourage victims to report the crime and to refuse to comply with the ransom demands.

Questions for the Homework
1-Why are ransomware attacks on the rise?
2-What can you do to prevent ransomware attacks on your own computer?
3-How do you think victims should respond to ransomware attacks?
4-Do the victims have an ethical obligation to future victims? If yes, why? If no, why?

In: Computer Science

From a processors’ point of view, why is it important to know when the critical moisture...

From a processors’ point of view, why is it important to know when the critical moisture content is reached?

In: Computer Science

You are to create a class called ManageDB. The ManageDB class will have a 2 input...

You are to create a class called ManageDB. The ManageDB class will have a

2 input constructor

that has the following definition:

ManageDB(int number, String fileName)

The constructor will create an array of EmployeeDB objects of length

"number".

The constructor will read the file located at "fileName" and extract the

information from that

file to populate a database of EmployeeDB objects. The file contains

information on the

EmployeeDB objects. This information is contained in records.

The format of each record is as follows:

^ "index of employee" "name of field" = "value of field"

Each record will start with a '^' character.

The "index of employee" is always a 4 character field representing a

positive integer.

The "name of field" is the name of the field to be populated for a

EmployeeDB object.

There is a delimiter between the "name of field" and the "value of field"

which is '='.

The "value of field" is the character string representing the value of the

field specified in "name of field".

The valid "name of field" strings are:

"age"

"name"

"salary"

For each "name of field" the "value of field" will be of the following

type:

age - integer

name - String

salary - double

An example of a valid record is as follow:

^0002age=24

This record would set the 0002 indexed EmployeeDB object age to 24.

You can assume that a record is formatted correctly. That is there will

always be a ^, =, and a valid

"name of field". However, the "index of employee" may not have a valid

number (either out of range or

not a number). The "value of field" may also be invalid if a number is

specified. The name

"value of field" will always have a valid String value (there are no

errors for this field).

If there is an error in the "index of employee" or the "value of field"

portion then ignore the

record and decode the next record. If the "index of employee" portion is

out of range then ignore that

record.

The EmployeeDB class is provided for you. Use the EmployeeDB class to

create the EmployeeDB array and track

the information for each Employee.

You need to create 3 public methods for the ManageDB class.

public String getName(int i) // returns the name of Employee at i index

public int getAge(int i) // returns the age of Employee at i index

public double getSalary(int i) // returns the salary of Employee at i

index

Compile your program with the EmployeeDB class and the DBTester class

which are both supplied to you.

Your program must run to completion and pass all the test cases. Make sure

to handle all exception

that might occur so your program can successfully run. The file to read is

called "EmployeeData.txt"

which is provided to you. Place this file in the working directory of your

project (the base directory

of your package).

Add your name to the DBTester.java file at the top so your name is

displayed.

Capture a screen image of the program ouput with your name and the result

of the test cases.

Files provided:

EmployeeDB.java

DBTester.java

EmployeeData.txt

------------------------

public class DBTester

{

public static void main(String args[ ])

{

System.out.println("Homework 4 test case results by Your Name");

ManageDB m = new ManageDB(5, "EmployeeData.txt");

boolean result;

int testCount = 1; // used to track test numbers

result = isSame(23, m.getAge(0));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

if (m.getName(0).equals("Jane"))

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(1000000.98, m.getSalary(0));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(-1, m.getAge(1));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

if (m.getName(1).equals("Jerry"))

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(100000, m.getSalary(1));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(29, m.getAge(2));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

if (m.getName(2).equals("Joann"))

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(50000.8, m.getSalary(2));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(-1, m.getAge(3));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

if (m.getName(3).equals(""))

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(-1, m.getSalary(3));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(25, m.getAge(4));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

if (m.getName(4).equals("John"))

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

result = isSame(1177.22, m.getSalary(4));

if (result == true)

System.out.println("Test Case " + testCount + " Passed");

else

System.out.println("Test Case " + testCount + " Failed");

testCount++;

}

private static boolean isSame(double x, double y)

{

double error = .00001;

boolean rv = false;

if (((x + error) >= y) && ((x - error) <= y))

{

rv = true;

}

return rv;

}

}

-----------------------------

employeedata.txt

^0000age=23^0000name=Jane^0000salary=1000000.98^0005age=20^0005name=Joe^00

05salary=11888.22^0002age=29^0002name=Joann^0002salary=50000.8

^00a1age=36^0001name=Jerry^0001salary=100000^0004age=25^0003age=3q2^0004sa

lary=1177.22^0w03name=Joan

^0004name=John^0003salary=100a00a

----------------------------

class EmployeeDB

{

// Member variables

private int age;

private String name;

private double salary;

// Constructors

public EmployeeDB()

{

age = -1;

name = "";

salary = -1.0;

}

// Mutators

public void setName(String n)

{

name = n;

}

public void setAge(int a)

{

age = a;

}

public void setSalary(double s)

{

salary = s;

}

// Accessors

public String getName()

{

return name;

}

public int getAge()

{

return age;

}

public double getSalary()

{

return salary;

}

}

In: Computer Science

Perhaps you remember the popular TV show, Deal or No Deal, with Howie Mandel as the...

Perhaps you remember the popular TV show, Deal or No Deal, with Howie Mandel as the host, that ran several years ago. In honor of the show returning in its original form (and renewed for a fifth season in 2019!) this lab is called Stack or No Stack.

Imagine again a bag data structure into which we can insert and remove elements. This bag has two operations, defined as:

1 x Insert an element (with value x) into the bag
2 x Take an element from the bag (the value x)

This time the bag is somewhat mysterious. Given a sequence of inserts and removals, the bag may operate like a LIFO stack, or it may not.

Your program must guess whether or not the bag is operating as a stack given a series of operations and the corresponding return values.

Program Input

The input to your program will be a series of test cases in a file. Each test case begins with a line containing a single integer n (1 < n < 100). Following the operations defined in the above table, each of of the next n lines is either a type-1 command followed by an integer x (which inserts the value x) or a type-2 command followed by an integer x which means the command retrieves the value x. The value of x is always a positive integer not larger than 100. There will be no ambiguous test cases. In other words, you will be able to fully determine the output based on the input alone. The input is terminated by an end-of-file (EOF).  

Your code may use anything in the standard C++ library -- including the STL stack container. This is, of course, optional.

Program Output

For each test case, output one of the following:

stack
not stack

which will indicate whether or not the bag is determined to be operating as a stack, given the series of operations.

Your code should compile, run, and pass all of the below test cases.

Your program should output only 'stack' or 'not stack' once per line, with one line for each test case.

Sample Input

Create a file with the following lines and use it as input into your program. Please use at least these as your test cases before submitting your code in Canvas.

4
1 2
1 1
2 1
2 2
6
1 5
1 10
1 12
2 10
2 5
2 12
2
1 8
2 8

Sample Output

stack
not stack
stack

In: Computer Science

explain the format of the password hash, the number and type of hash used Administrator:500:727E3576618FA1754A3B108F3FA6CB6D:92937945B518814341DE3F726500D4FF::: Alias:1003:NO...

explain the format of the password hash, the number and type of hash used

Administrator:500:727E3576618FA1754A3B108F3FA6CB6D:92937945B518814341DE3F726500D4FF::: Alias:1003:NO PASSWORD*********************:NO PASSWORD*********************::: auser:1015:598DDCE2660D3193AAD3B435B51404EE:2D20D252A479F485CDF5E171D93985BF::: Guest:501:NO PASSWORD*********************:NO PASSWORD*********************::: HelpAssistant:1000:DA4A67F35D4F7632F5982BC1C2AC18AA:7E3A7C491CDC419A64A01666A4C17BE0::: luser:1014:AEBD4DE384C7EC43AAD3B435B51404EE:7A21990FCD3D759941E45C490F143D5F::: Mills_103114:1013:33C4469F9DEB5C58075D448A4570597D:6C9E099D02541C841C97AD6337229F5B::: SUPPORT_388945a0:1002:NO PASSWORD*********************:D5C7AC7253E6D0B1B429C3FA397960D0:::

In: Computer Science

In-class exercise 2 Objective and Overview: The exercises in this document is on Lecture 3 Exercise...

In-class exercise 2

Objective and Overview:

The exercises in this document is on Lecture 3

Exercise 1:

(The Account class) Design a class named Account that contains:

1. A private int data field named id for the account (default 0).

2. A private double data field named balance for the account (default 0).

3. A private static double data field named annualInterestRate that stores the current interest rate (default 0). Assume that all accounts have the same interest rate.

4. A private static int data field named transactions, that stores the number of transactions for all accounts.

5. A no-arg (default) constructor that creates a default account.

6. An initialization constructor that creates an account with the specified id and initial balance.

7. A copy constructor that creates an Account and initializes its attribute to the values of another account.

8. The accessor and mutator methods for id, balance, annualInterestRate, and transactions. 9. A method named getMonthlyInterestRate() that returns the monthly interest rate.

10. A method named getMonthlyInterest() that returns the monthly interest.

11. A method named withdraw that withdraws a specified amount from the account.

12. A method named deposit that deposits a specified amount to the account.

13. a toString() method to display all account details and the number of transactions.

Draw the UML diagram for the class then implement the class.

(Hint: The method getMonthlyInterest() is to return monthly interest, not the interest rate. Monthly interest is balance * monthlyInterestRate.

monthlyInterestRate is annualInterestRate / 12.

Note annualInterestRate is a percentage, for example 4.5%. You need to divide it by 100.)

In: Computer Science

imporant note (the language of compiler and programming llanguage) Q1: A positive integer number n is...

imporant note (the language of compiler and programming llanguage)

Q1:

A positive integer number n is said to be perfect if the number is equal the sum of its divisors excluding the number itself.

Ex:

            6 is perfect since the divisors are 1, 2, 3 &   1+2+3 6

            28 is perfect since the divisors are 1, 2, 4, 7, 14 &    1+2+4+7+14 = 28

The function “mod” is defined in Xlisp, but the function “div” is not.

>(mod 18 7)

> 4

(a) Write a function “div” which when given two integers n, m and returns n div m.

Ex: > (div 18 7)

        > 2

(b) Write a function “perfect” which receives a positive integer n and returns 1 if n is perfect and 0 otherwise.

That is:

>(perfect 28)

>1

(perfect 14)

>0

Hint: I believe you may need to define other functions in addition to div.

Q2 )The McLaurin series for ex as follows:

           

Write a function “EeX” which receives a number x and returns the value ex.

That is:

> (EeX   1)

> 2.71

Note: you need to define two functions:

  1. power” which receives x , n and returns xn

That is,

> ( power 3 2)

>9

  1. factorial” which receives an integer n≥0 and return n!.

That is,

> ( factorial 5)

>120

Note: Stop the recursion when (xn/n!) < 0.001

(comp439)

In: Computer Science