Questions
Recall that the Cell Phones & Stuff server will provide many services and roles. These services...

Recall that the Cell Phones & Stuff server will provide many services and roles. These services include Active Directory, DNS, DHCP, FTP, print services, and email. You have decided to use virtualization in your implementation. How will you implement the services within the virtual realm? Please address the following questions and be sure to provide justifications for your decisions:

How do you plan to create, configure, and manage virtual machines (VMs) for the company?

What services will those VMs offer?

How many virtualized servers will you create? Why?

In: Computer Science

1) How is neuroscience and technology interrelated? 2) In what sense does brain and machine comparable?...

1) How is neuroscience and technology interrelated?

2) In what sense does brain and machine comparable?

3) To what extent does AI affects lives of human? Cite examples

In: Computer Science

Write a class called Animal that contains a static variable called count to keep track of...

Write a class called Animal that contains a static variable called count to keep track of the number of animals created. Your class needs a getter and setter to manage this resource. Create another variable called myCount that is assigned to each animal for each animal to keep track of its own given number. Write a getter and setter to manage the static variable count so that it can be accessed as a class resource

In: Computer Science

Build a Date class and a main function to test it Specifications Below is the interface...

Build a Date class and a main function to test it

Specifications
Below is the interface for the Date class: it is our "contract" with you: you have to implement everything it describes, and show us that it works with a test harness that puts it through its paces. The comments in the interface below should be sufficient for you to understand the project (use these comments in your Date declaration), without the need of any further documentation.

class Date
{
 private:
   unsigned day;
   unsigned month;
   string monthName;
   unsigned year;

 public:
   // creates the date January 1st, 2000.
   Date();


   /* parameterized constructor: month number, day, year 
       - e.g. (3, 1, 2010) will construct the date March 1st, 2010

       If any of the arguments are invalid (e.g. 15 for month or 32 for day)
       then the constructor will construct instead a valid Date as close
       as possible to the arguments provided - e.g. in above example,
       Date(15, 32, 2010), the Date would be corrected to Dec 31st, 2010.
       In case of such invalid input, the constructor will issue a console error message: 

       Invalid date values: Date corrected to 12/31/2010.
       (with a newline at the end).
   */
   Date(unsigned m, unsigned d, unsigned y);


   /* parameterized constructor: month name, day, year
 ­      - e.g. (December, 15, 2012) will construct the date December 15th, 2012

       If the constructor is unable to recognize the string argument as a valid month name,
       then it will issue a console error message: 

       Invalid month name: the Date was set to 1/1/2000.
       (with a newline at the end).

       If the day argument is invalid for the given month (but the month name was valid),
       then the constructor will handle this error in the same manner as the other
       parameterized constructor. 

       This constructor will recognize both "december" and "December"
       as month name.
   */
   Date(const string &mn, unsigned d, unsigned y);


   /* Outputs to the console (cout) a Date exactly in the format "3/1/2012". 
      Does not output a newline at the end.
   */
   void printNumeric() const;


   /* Outputs to the console (cout) a Date exactly in the format "March 1, 2012".
      The first letter of the month name is upper case, and the month name is
      printed in full - January, not Jan, jan, or january. 
      Does not output a newline at the end.
   */
   void printAlpha() const;

 private:

   /* Returns true if the year passed in is a leap year, otherwise returns false.
   */
   bool isLeap(unsigned y) const;


   /* Returns number of days allowed in a given month
      -  e.g. daysPerMonth(9, 2000) returns 30.
      Calculates February's days for leap and non-­leap years,
      thus, the reason year is also a parameter.
   */
   unsigned daysPerMonth(unsigned m, unsigned y) const;

   /* Returns the name of a given month
      - e.g. name(12) returns the string "December"
   */
   string name(unsigned m) const;

   /* Returns the number of a given named month
      - e.g. number("March") returns 3
   */
   unsigned number(const string &mn) const;
};

Private Member Functions

The functions declared private above, isLeap, daysPerMonth, name, number, are helper functions - member functions that will never be needed by a user of the class, and so do not belong to the public interface (which is why they are "private"). They are, however, needed by the interface functions (public member functions), which use them to test the validity of arguments and construct valid dates. For example, the constructor that passes in the month as a string will call the number function to assign a value to the unsigned member variable month.

isLeap: The rule for whether a year is a leap year is:

(year % 4 == 0) implies leap year

except (year % 100 == 0) implies NOT leap year

except (year % 400 == 0) implies leap year

So, for instance, year 2000 is a leap year, but 1900 is NOT a leap year. Years 2004, 2008, 2012, 2016, etc. are all leap years. Years 2005, 2006, 2007, 2009, 2010, etc. are NOT leap years.

Output Specifications

Read the specifications for the print function carefully. The only cout statements within your Date member functions should be:

1. the "Invalid Date" warnings in the constructors

2. in your two print functions

Required main function to be used:

Date getDate();

int main() {

   Date testDate;
   testDate = getDate();
   cout << endl;
   cout << "Numeric: ";
   testDate.printNumeric();
   cout << endl;
   cout << "Alpha:   ";
   testDate.printAlpha();
   cout << endl;

   return 0;
}

Date getDate() {
   int choice;
   unsigned monthNumber, day, year;
   string monthName;

   cout << "Which Date constructor? (Enter 1, 2, or 3)" << endl
      << "1 - Month Number" << endl
      << "2 - Month Name" << endl
      << "3 - default" << endl;
   cin >> choice;
   cout << endl;

   if (choice == 1) {
      cout << "month number? ";
      cin >> monthNumber;
      cout << endl;
      cout << "day? ";
      cin >> day;
      cout << endl;
      cout << "year? ";
      cin >> year;
      cout << endl;
      return Date(monthNumber, day, year);
   } else if (choice == 2) {
      cout << "month name? ";
      cin >> monthName;
      cout << endl;
      cout << "day? ";
      cin >> day;
      cout << endl;
      cout << "year? ";
      cin >> year;
      cout << endl;
      return Date(monthName, day, year);
   } else {
      return Date();
   }
}

In: Computer Science

Discuss which of the 5 steps of session hijacking you believe represents the most difficult technical...

Discuss which of the 5 steps of session hijacking you believe represents the most difficult technical challenge and explain the methods or approaches you might employ to overcome the challenges.

In: Computer Science

INTRODUCTION TO COMPUTER SYSTEMS Explain the term relocation. Explain the structure of a Typical ELF executable...

INTRODUCTION TO COMPUTER SYSTEMS
Explain the term relocation. Explain the structure of a Typical ELF executable object file.

In: Computer Science

it is a question of discrete math RSA is the most widely used public key cryptosystem....

it is a question of discrete math

RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11.
Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using the numbers 01 through 26, and represent a space by the number 32. Treat upper case and lower case letters as the same.
Optional: If you want to include punctuation characters, you can use the numbers 27 through 31 for that, but you must inform your classmates that you did.
How did you calculate your value for d? As a check, the phrase “A CAB” would be represented by “01 32 03 01 02” and would be encrypted as “01 32 27 01 08”.

In: Computer Science

List 5 useful questions and accompanying information gained that can be used by talking to existing...

List 5 useful questions and accompanying information gained that can be used by talking to existing personnel on the current network being upgraded in the final project.

In: Computer Science

Java 1.Write a method removeEvenLength that takes an ArrayList of Strings as a parameter and that...

Java

1.Write a method removeEvenLength that takes an ArrayList of Strings as a parameter and that removes all of the strings of even length from the list.

2. Given the following Vehicle interface and client program in the Car class:

public interface Vehicle{

public void move();

}

public class Car implements Vehicle{

public static void main(String args[])

Vehicle v = new Vehicle(); // vehicle declaration

}

The above declaration is valid? True or False?

3. Java permits a class to implement only one interface? True or false

4. The Comparable interface enables the comparison of objects in Java? True or false

In: Computer Science

   private static void merge(int arr[], int l, int m, int r) {        //...

   private static void merge(int arr[], int l, int m, int r) {
       // Find sizes of two subarrays to be merged
       int n1 = m - l + 1;
       int n2 = r - m;

       /* Create temp arrays */
       int L[] = new int[n1];
       int R[] = new int[n2];

       /* Copy data to temp arrays */
       for (int i = 0; i < n1; ++i)
           L[i] = arr[l + i];
       for (int j = 0; j < n2; ++j)
           R[j] = arr[m + 1 + j];

       /* Merge the temp arrays */

       // Initial indexes of first and second subarrays
       int i = 0, j = 0;

       // Initial index of merged subarry array
       int k = l;
       while (i < n1 && j < n2) {
           if (L[i] <= R[j]) {
               arr[k] = L[i];
               i++;
           } else {
               arr[k] = R[j];
               j++;
           }
           k++;
       }

       /* Copy remaining elements of L[] if any */
       while (i < n1) {
           arr[k] = L[i];
           i++;
           k++;
       }

       /* Copy remaining elements of R[] if any */
       while (j < n2) {
           arr[k] = R[j];
           j++;
           k++;
       }
   }

   /**
   * Merge sort
   *
   * @param arr - Integer array
   * @param l -Left index
   * @param r - right index
   */
   private static void mergeSort(int arr[], int l, int r) {
       if (l < r) {
           // Find the middle point
           int m = (l + r) / 2;

           // Sort first and second halves
           mergeSort(arr, l, m);
           mergeSort(arr, m + 1, r);

           // Merge the sorted halves
           merge(arr, l, m, r);
       }
   }

How to count number of swaps and comparisions in the above code?

In: Computer Science

1. The development of a forensic lab for computers and mobile devices involves numerous specialized tools....

1. The development of a forensic lab for computers and mobile devices involves numerous specialized tools. Describe both hardware and software tools that might be utilized in such a lab.
2. Select ONE type of software tool from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific software tool you chose.
1) Device Seizure by Paraben
2) ForensicSIM by Evidence Talks
3) USIMdetective by Quantaq Solutions
4) SIMCON by Inside Out Forensics
5) .XRY by Micro Systemation 6) MOBILedit! Forensic by Compelson Laboratories

In: Computer Science

Three pharmacists in Atlanta, Georgia have invented a new energy drink called Booster. It has become...

Three pharmacists in Atlanta, Georgia have invented a new energy drink called Booster. It has become the number one soft drink in the world and you are assigned to find out how it is made. This is a closely guarded secret known to only three original pharmacists: Pat knows the process, and Audre and Stacey each know half of the formula. The entire secret is stored in the Booster Vault at Booster HQ. The Booster Vault is accessible only by the Booster Virtual Private Network and will only work when all three passphrases are entered within 30 seconds of each other from three different IP addresses. Design a campaign, including technical, social engineering, and reverse social engineering techniques to get the full formula and process.

In: Computer Science

Do you agree that WannaCry attack is more interesting than the Ransomware. If so why

Do you agree that WannaCry attack is more interesting than the Ransomware. If so why

In: Computer Science

Perl Programming Please write a simple to understand Perl script that computes compound interest, based on...

Perl Programming

Please write a simple to understand Perl script that computes compound interest, based on input from user for P, n, r and t.

In: Computer Science

Using a Web browser, search on the term intrusion prevention systems. What are the characteristics of...

Using a Web browser, search on the term intrusion prevention systems. What are the characteristics of an IPS? Compare the costs of a typical IPS to an IDPS. Do they differ? What characteristics justify the difference in cost, if any?

In: Computer Science