Can you think of a way that Excel can be used unethically and give an example?
Your answer must be a minimum of 2 paragraphs, no spelling errors, and complete sentences.
In: Computer Science
Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading the articles, did you think about data being used in the manner that it is? Name one other organization that may be using data warehousing and data mining techniques and explain how it is being used. Or explain how after years of collecting data how the data in the Academic Database that was implemented in Modules 6 and 7 can be useful to the academic institution? Explain your answer in 100 to 150.
In: Computer Science
1.It is acceptable to let some else use your MSDSQ120 account if you are working close by in the lab. True or False
2. If I am a performing technical review on a plate map and I do not see a designated area for signature/initial and date, then the following is true: (choose the best response)
A. the plate map is exempt from my technical review
B. I only need to email the Originator of the plate map and say " I review the plate map"
C. I can apply my signature and date to the form.
D. I can apply my signature, date, and meaning of signature as "Reviewer" so that the purpose of my signature and date is clearly identify .
E. None of the above.
3. While in the lab, data should be recorded... ( Choose the best response)
A. On a scrap paper, then neatly written on the worksheet at the of the day.
B. Analyst should remember what happened in the lab with the assay and then record data at their desk.
C. While at the bench at the time each step is completed on the correct batch record.
4. Which examples below are acceptable format to document the date and time ( Choose best response)
a. 27Nov2020
b. 27Nov20
c. Nov 3, 2020
d. Nov3rd, 2020
e. January 3, 2020
f. All of the above
5. True or False : The date has been corrected according to Good Document Practices
(05Dec15) EE KAJ O6Dec15
6. True or False: We should record all data according to ALCOA documentation standards.
7. True or False : Recording data contemporaneously means that as long as it is recorded sometime during the day is acceptable.
8. True or False: Any pen is acceptable to use to record raw data as long as it is blue or black ink.
9. True or False : The date has been corrected according to Good Document Practices
(05Dec15) or 06Dec15EEKAJ 06Dec15
In: Computer Science
Show the major steps for computing X9 in “ADD X9, X10, X11” for the given values. Please indicate if there is an overflow and show the final content of X9 as a hexadecimal number. a) X10=0xCFFFFFFF and X11=0xC0000000 b) X10=0xCFFFFFFF and X11=0xA0000000
In: Computer Science
Convert 2.115 single-precision floating point binary format. Please show every single detail for upvote. Please do not answer otherwise.
In: Computer Science
Under normal conditions, commercial aircraft generally rise at
about 1,000 to 2,000
feet per minute (this is called the rate of climb) after take-off,
until they reach a
cruising altitude of 35,000 feet. Design the logic for a program
that allows the user to
enter the rate of climb as input, and then for every minute after
take-off until the
aircraft has reached cruising altitude, outputs the minute number,
and the height of the
plane after that minute. After that the program must output the
number of minutes that
have elapsed since take off, and the height at which the plane is
cruising (this may not
be exactly 35,000 feet).
In: Computer Science
Convert -10.5 single-precision floating point binary format.
Please show every single detail for upvote.
Please do not answer otherwise.
In: Computer Science
Task: Read the case study below and answer the following
questions.
Case Study: The Reveton Ransomware Attacks
In August 2012, the Internet Crime Complaint Center (IC3), a
partnership between the FBI and the National White Collar Crime
Center, was inundated with reports of a new type of cybercrime.
Victims across the United States reported that while searching the
Internet, their computers locked up, and they received the
following message, purportedly from the FBI: “This operating system
is locked due to the violation of the federal laws of the United
States of America! (Article 1, Section 8, Clause 8; Article 202;
Article 210 of the Criminal Code of U.S.A. provides for a
deprivation of liberty for four to twelve years.)” The message then
accused the victim either of visiting pornography Web sites or of
distributing copyrighted content. Victims were told they could
unlock their computers and avoid prosecution by paying a fine of
$200 within 72 hours of receiving the message. The message came
replete with the official FBI logo.
The incident pointed to a steep rise in ransomware attacks.
Ransomware is malware that disables a computer or smartphone until
the victim pays a fee, or ransom. Unlike other viruses, the Reveton
version of ransomware is not activated by opening a file or an
attachment. Rather it is an example of “drive-by malware,” viruses
that download automatically when a user visits an infected Web
site.
The FBI immediately issued an alert, but within a month,
cybersecurity experts had identified 16 variants of the ransomware.
These viruses had infected 68,000 unique IP addresses. It is
estimated that on an average day, about 170 victims paid the $200
fee and received valid unlock codes. The compromised computers
could not be fixed through the installation or updating of
antivirus software because the computer was locked. Because so many
home PC owners fail to back up their systems regularly, many
victims faced losing a significant amount of data. The $200 fee
itself was low enough to encourage payment. A visit to a
professional IT service to repair the damage could potentially cost
the same amount and take more time to resolve. A quick payment
through a prepaid money card system, such as MoneyPak, could save
the victim a lot of trouble.
The United States was not the first country to be hit by these
attacks. In early 2012, criminal gangs targeted France, Germany,
and the United Kingdom. Ransomware attacks first broke out in
Russia in 2009. Since that time, they have spread to almost every
country on the globe, hitting the United States and Japan
especially hard. Symantec, an IT security company, estimates that
gangs are extorting over $5 million per year from online victims.
The rise of ransomware attacks is, no doubt, due in part to their
success. In France, for example, almost 4 percent of victims
coughed up the ransom money during a non-Reveton scam.
The Reveton ransomware is delivered by the popular Russian-language
Citadel malware toolkit. The latest version of Citadel can also
grab passwords from Web browsers and change Web sites to trick
users into handing over their login information.
In December 2012, the United Kingdom arrested three people they
believed were involved in the Reveton ransomware attacks. Finding
the perpetrators, however, is unusual and is not the most effective
way to combat this crime. Law enforcement agencies and IT security
companies have urged the public to take measures to prevent
themselves from falling victim to such attacks—by keeping software
such as Java, Acrobat Reader, Adobe Flash, Windows, and their
browser software updated. An early Reveton ransomware attack made
use of a vulnerability in a version of Java that had just been
patched a month prior. Computer users can also avoid infections by
using security software that identifies suspicious Web sites, and
by not clicking online ads from dubious companies. Perhaps,
however, the best way to avoid the spread of these attacks is to
encourage victims to report the crime and to refuse to comply with
the ransom demands.
Questions for the Homework
1-Why are ransomware attacks on the rise?
2-What can you do to prevent ransomware attacks on your own
computer?
3-How do you think victims should respond to ransomware attacks?
4-Do the victims have an ethical obligation to future victims? If
yes, why? If no, why?
In: Computer Science
From a processors’ point of view, why is it important to know when the critical moisture content is reached?
In: Computer Science
You are to create a class called ManageDB. The ManageDB class will have a
2 input constructor
that has the following definition:
ManageDB(int number, String fileName)
The constructor will create an array of EmployeeDB objects of length
"number".
The constructor will read the file located at "fileName" and extract the
information from that
file to populate a database of EmployeeDB objects. The file contains
information on the
EmployeeDB objects. This information is contained in records.
The format of each record is as follows:
^ "index of employee" "name of field" = "value of field"
Each record will start with a '^' character.
The "index of employee" is always a 4 character field representing a
positive integer.
The "name of field" is the name of the field to be populated for a
EmployeeDB object.
There is a delimiter between the "name of field" and the "value of field"
which is '='.
The "value of field" is the character string representing the value of the
field specified in "name of field".
The valid "name of field" strings are:
"age"
"name"
"salary"
For each "name of field" the "value of field" will be of the following
type:
age - integer
name - String
salary - double
An example of a valid record is as follow:
^0002age=24
This record would set the 0002 indexed EmployeeDB object age to 24.
You can assume that a record is formatted correctly. That is there will
always be a ^, =, and a valid
"name of field". However, the "index of employee" may not have a valid
number (either out of range or
not a number). The "value of field" may also be invalid if a number is
specified. The name
"value of field" will always have a valid String value (there are no
errors for this field).
If there is an error in the "index of employee" or the "value of field"
portion then ignore the
record and decode the next record. If the "index of employee" portion is
out of range then ignore that
record.
The EmployeeDB class is provided for you. Use the EmployeeDB class to
create the EmployeeDB array and track
the information for each Employee.
You need to create 3 public methods for the ManageDB class.
public String getName(int i) // returns the name of Employee at i index
public int getAge(int i) // returns the age of Employee at i index
public double getSalary(int i) // returns the salary of Employee at i
index
Compile your program with the EmployeeDB class and the DBTester class
which are both supplied to you.
Your program must run to completion and pass all the test cases. Make sure
to handle all exception
that might occur so your program can successfully run. The file to read is
called "EmployeeData.txt"
which is provided to you. Place this file in the working directory of your
project (the base directory
of your package).
Add your name to the DBTester.java file at the top so your name is
displayed.
Capture a screen image of the program ouput with your name and the result
of the test cases.
Files provided:
EmployeeDB.java
DBTester.java
EmployeeData.txt
------------------------
public class DBTester
{
public static void main(String args[ ])
{
System.out.println("Homework 4 test case results by Your Name");
ManageDB m = new ManageDB(5, "EmployeeData.txt");
boolean result;
int testCount = 1; // used to track test numbers
result = isSame(23, m.getAge(0));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
if (m.getName(0).equals("Jane"))
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(1000000.98, m.getSalary(0));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(-1, m.getAge(1));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
if (m.getName(1).equals("Jerry"))
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(100000, m.getSalary(1));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(29, m.getAge(2));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
if (m.getName(2).equals("Joann"))
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(50000.8, m.getSalary(2));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(-1, m.getAge(3));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
if (m.getName(3).equals(""))
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(-1, m.getSalary(3));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(25, m.getAge(4));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
if (m.getName(4).equals("John"))
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
result = isSame(1177.22, m.getSalary(4));
if (result == true)
System.out.println("Test Case " + testCount + " Passed");
else
System.out.println("Test Case " + testCount + " Failed");
testCount++;
}
private static boolean isSame(double x, double y)
{
double error = .00001;
boolean rv = false;
if (((x + error) >= y) && ((x - error) <= y))
{
rv = true;
}
return rv;
}
}
-----------------------------
employeedata.txt
^0000age=23^0000name=Jane^0000salary=1000000.98^0005age=20^0005name=Joe^00
05salary=11888.22^0002age=29^0002name=Joann^0002salary=50000.8
^00a1age=36^0001name=Jerry^0001salary=100000^0004age=25^0003age=3q2^0004sa
lary=1177.22^0w03name=Joan
^0004name=John^0003salary=100a00a
----------------------------
class EmployeeDB
{
// Member variables
private int age;
private String name;
private double salary;
// Constructors
public EmployeeDB()
{
age = -1;
name = "";
salary = -1.0;
}
// Mutators
public void setName(String n)
{
name = n;
}
public void setAge(int a)
{
age = a;
}
public void setSalary(double s)
{
salary = s;
}
// Accessors
public String getName()
{
return name;
}
public int getAge()
{
return age;
}
public double getSalary()
{
return salary;
}
}
In: Computer Science
Perhaps you remember the popular TV show, Deal or No Deal, with Howie Mandel as the host, that ran several years ago. In honor of the show returning in its original form (and renewed for a fifth season in 2019!) this lab is called Stack or No Stack.
Imagine again a bag data structure into which we can insert and remove elements. This bag has two operations, defined as:
| 1 x | Insert an element (with value x) into the bag |
| 2 x | Take an element from the bag (the value x) |
This time the bag is somewhat mysterious. Given a sequence of inserts and removals, the bag may operate like a LIFO stack, or it may not.
Your program must guess whether or not the bag is operating as a stack given a series of operations and the corresponding return values.
Program Input
The input to your program will be a series of test cases in a file. Each test case begins with a line containing a single integer n (1 < n < 100). Following the operations defined in the above table, each of of the next n lines is either a type-1 command followed by an integer x (which inserts the value x) or a type-2 command followed by an integer x which means the command retrieves the value x. The value of x is always a positive integer not larger than 100. There will be no ambiguous test cases. In other words, you will be able to fully determine the output based on the input alone. The input is terminated by an end-of-file (EOF).
Your code may use anything in the standard C++ library -- including the STL stack container. This is, of course, optional.
Program Output
For each test case, output one of the following:
stack not stack
which will indicate whether or not the bag is determined to be operating as a stack, given the series of operations.
Your code should compile, run, and pass all of the below test cases.
Your program should output only 'stack' or 'not stack' once per line, with one line for each test case.
Sample Input
Create a file with the following lines and use it as input into your program. Please use at least these as your test cases before submitting your code in Canvas.
4 1 2 1 1 2 1 2 2 6 1 5 1 10 1 12 2 10 2 5 2 12 2 1 8 2 8
Sample Output
stack not stack stack
In: Computer Science
explain the format of the password hash, the number and type of hash used
Administrator:500:727E3576618FA1754A3B108F3FA6CB6D:92937945B518814341DE3F726500D4FF::: Alias:1003:NO PASSWORD*********************:NO PASSWORD*********************::: auser:1015:598DDCE2660D3193AAD3B435B51404EE:2D20D252A479F485CDF5E171D93985BF::: Guest:501:NO PASSWORD*********************:NO PASSWORD*********************::: HelpAssistant:1000:DA4A67F35D4F7632F5982BC1C2AC18AA:7E3A7C491CDC419A64A01666A4C17BE0::: luser:1014:AEBD4DE384C7EC43AAD3B435B51404EE:7A21990FCD3D759941E45C490F143D5F::: Mills_103114:1013:33C4469F9DEB5C58075D448A4570597D:6C9E099D02541C841C97AD6337229F5B::: SUPPORT_388945a0:1002:NO PASSWORD*********************:D5C7AC7253E6D0B1B429C3FA397960D0:::
In: Computer Science
In-class exercise 2
Objective and Overview:
The exercises in this document is on Lecture 3
Exercise 1:
(The Account class) Design a class named Account that contains:
1. A private int data field named id for the account (default 0).
2. A private double data field named balance for the account (default 0).
3. A private static double data field named annualInterestRate that stores the current interest rate (default 0). Assume that all accounts have the same interest rate.
4. A private static int data field named transactions, that stores the number of transactions for all accounts.
5. A no-arg (default) constructor that creates a default account.
6. An initialization constructor that creates an account with the specified id and initial balance.
7. A copy constructor that creates an Account and initializes its attribute to the values of another account.
8. The accessor and mutator methods for id, balance, annualInterestRate, and transactions. 9. A method named getMonthlyInterestRate() that returns the monthly interest rate.
10. A method named getMonthlyInterest() that returns the monthly interest.
11. A method named withdraw that withdraws a specified amount from the account.
12. A method named deposit that deposits a specified amount to the account.
13. a toString() method to display all account details and the number of transactions.
Draw the UML diagram for the class then implement the class.
(Hint: The method getMonthlyInterest() is to return monthly interest, not the interest rate. Monthly interest is balance * monthlyInterestRate.
monthlyInterestRate is annualInterestRate / 12.
Note annualInterestRate is a percentage, for example 4.5%. You need to divide it by 100.)
In: Computer Science
imporant note (the language of compiler and programming llanguage)
Q1:
A positive integer number n is said to be perfect if the number is equal the sum of its divisors excluding the number itself.
Ex:
6 is perfect since the divisors are 1, 2, 3 & 1+2+3 6
28 is perfect since the divisors are 1, 2, 4, 7, 14 & 1+2+4+7+14 = 28
The function “mod” is defined in Xlisp, but the function “div” is not.
>(mod 18 7)
> 4
(a) Write a function “div” which when given two integers n, m and returns n div m.
Ex: > (div 18 7)
> 2
(b) Write a function “perfect” which receives a positive integer n and returns 1 if n is perfect and 0 otherwise.
That is:
>(perfect 28)
>1
(perfect 14)
>0
Hint: I believe you may need to define other functions in addition to div.
Q2 )The McLaurin series for ex as follows:
Write a function “EeX” which receives a number x and returns the value ex.
That is:
> (EeX 1)
> 2.71
Note: you need to define two functions:
That is,
> ( power 3 2)
>9
That is,
> ( factorial 5)
>120
Note: Stop the recursion when (xn/n!) < 0.001
(comp439)
In: Computer Science