How have embedded computers and the IoT impacted your daily life? What additional uses can you see yourself using? What security or other risks might you encounter with IoT?
In: Computer Science
How do you set up a Raspberry Pi 3 Model B as a master
in an I2C protocol?
Please explain this process thoroughly, as well as the code you
would use, if any
In: Computer Science
A. Open/create the file bank.txt for writing "w". Enter a character from the keyboard and write it to the file. Close the file. In the same program open the file for reading "r" and read the character from the file and print it on screen.
In: Computer Science
given an array, write code to scan the array for a particular purpose . use java
In: Computer Science
Give three examples of typical types of exceptions handled by CPU's.
In: Computer Science
Assignment 2 - Employee Hierarchy
In Chapter 9, we created the CommissionEmployee-BasePlusCommissionEmployee inheritance hierarchy to model the relationship between two types of employees and how to calculate the earnings for each. Another way to look at the problem is that CommissionEmployees and BasePlusCommissionEmployees are each Employees and that each has a different CompensationModel object.
A CompensationModel would provide an earnings method. Classes or subclasses of CompensationModel would contain the details of a particular Employee's compensation:
Each of these classes would contain a toString() method that displays the Compensation Model information as illustrated in the sample output.
This approach is more flexible than our original hierarchy. For example, consider an Employee who gets promoted. With the approach described here, you can simply change that Employee's CompensationModel by assigning the composed CompensationModel reference an appropriate subclass object. With the CommissionEmployee - BasePlusCommissionEmployee hierarchy, you'd need to change the Employee's type by creating a new object of the appropriate class and moving data from the old object to the new one.
Implement the Employee class and CompensationModel hierarchy discussed in this exercise. In addition to the firstName, lastName, socialSecurityNumber and CommisionCompensationModel instance variables, class Employee should provide:
Your code in the subclasses should call methods in the super classes whenever possible to reduce the amount of code in the subclasses and utilize the code already developed in the super classes as in the code demonstrated in Figures 9.10 and 9.11 in the book.
Use the following code in your main function to test your classes, just copy and paste it into your main method:
// Create the two
employees with their compensation models.
CommissionCompensationModel commissionModel = new
CommissionCompensationModel(2000.00, 0.04);
BasePlusCommissionCompensationModel basePlusCommissionModel = new
BasePlusCommissionCompensationModel(2000.00, 0.05, 600.00);
Employee employee1 = new
Employee("John", "Smith", "111-11-1111", commissionModel);
Employee employee2 = new
Employee("Sue", "Jones", "222-22-2222",
basePlusCommissionModel);
System.out.printf("%s%n%s%n", employee1, employee2);
System.out.printf("%s%s%s%s%s%8.2f%n%n", "Earnings for ",
employee1.getFirstName(), " ", employee1.getLastName(), ": ",
employee1.earnings());
// Change the
compensation model for the two employees.
CommissionCompensationModel commissionModelNew = new
CommissionCompensationModel(5000.00, 0.04);
BasePlusCommissionCompensationModel basePlusCommissionModelNew =
new BasePlusCommissionCompensationModel(4000.00, 0.05,
800.00);
// Set the new
compensation models for the employees.
employee1.setCompensation(basePlusCommissionModelNew);
employee2.setCompensation(commissionModelNew);
// Print out the new
information for the two employees.
System.out.printf("%s%n%s%n", employee1, employee2);
The output from your program should look like the following:
run:
John Smith
Social Security Number: 111-11-1111
Commission Compensation with:
Gross Sales of: 2000.00
Commission Rate of: 0.04
Earnings: 80.00
Sue Jones
Social Security Number: 222-22-2222
Base Plus Commission Compensation with:
Gross Sales of: 2000.00
Commission Rate of: 0.05
Base Salary of: 600.00
Earnings: 700.00
Earnings for John Smith: 80.00
John Smith
Social Security Number: 111-11-1111
Base Plus Commission Compensation with:
Gross Sales of: 4000.00
Commission Rate of: 0.05
Base Salary of: 800.00
Earnings: 1000.00
Sue Jones
Social Security Number: 222-22-2222
Commission Compensation with:
Gross Sales of: 5000.00
Commission Rate of: 0.04
Earnings: 200.00
In: Computer Science
Write a python program that implements a Brute Force attack on Shift Cipher. In this program there is only one input - ciphertext - is a sequence of UPPER CASE letters. To make it easy, the program will be interactive and will output all possible plaintexts and ask user which plaintext makes sense. As soon as user will decide YES, the program will stop searching and print the desired plaintext and the found SHIFT KEY.
In: Computer Science
How to write a method that performs matrix multiplication with three rectangle arrays along with their dimensions as parameters using Java programming?
In: Computer Science
1. Use the enum keyword or a C++ class to create a new type Boolean with the two values F and T defined. Use the C++ class/struct keyword and an array to create a list of pairs that cover all possible combinations of the 2 Boolean constants you defined.
2. Extend the same program and implement conjunction and disjunction functionality in a separate library (mylib.h/mylib.cpp). Use your implementation to print truth tables for both.
3. Further extend the same program by adding xdisjunction and negation functionality. Use your implementation to print truth table for both.
4. Use functions developed (conjunction, disjunction, negation ...) in above assignment and implement Example 1.8 (a) Construct the truth table of the proposition (p∧q)∨(∼ p∨∼ q). Determine if this proposition is a tautology. (b) Show that p∨∼ p is a tautology.
5. Use functions developed in mylib (mylib.h/mylib.cpp) separate library (conjunction, disjunction, negation ...) in previous assignments and implement Example 1.9
(a) Show that ∼ (p∨q) ≡∼ p∧∼ q.
(b) Show that ∼ (p∧q) ≡∼ p∨∼ q.
(c) Show that ∼ (∼ p) ≡ p.
Parts (a) and (b) are known as DeMorgan’s laws.
In: Computer Science
1. Translate the following code into MIPS
code.
B[i + 10] = B[i -2] + 40;
i = i + 10;
B[3] = B[i - 1];
a) Assume B is an array of integers (each integer takes 4
bytes). B's address
is stored at register $10. Also assume that the compiler associates
the
variable i to the register $11.
b) Assume B is an array of characters (each character takes one
byte). B's address
is stored at register $10. Also assume that the compiler associates
the variable i to the register $11.
2. Translate the following code into MIPS
code.
B [0] = 5;
for (i = 1 ; i < 50 ; i = i + 2)
{
B[i] =i + B[i-1];
}
Assume the compiler associates the variable i to the register
$t0. Also, assume B is an array of integers and its address is
stored at register $s1.
3. Translate the following code into MIPS
code.
for (i=0; i<=5; i=i+1)
{
if (i != k)
k=(k *2)-1;
else
k=(k *4)+1;
}
Assume the compiler associates the variables i and k to the registers $s0 and $s1, respectively.
4. Translate the following code into MIPS code.
Test (int i, int j)
{
int k;
k = Double(i+1) + Double (j-10)
return k;
}
Sub (int m)
{
int g;
g = m + m;
return g;
}
Assume the compiler associates the variable k to the register $s0. Assume the compiler associates the variable g to the register $t0.
In: Computer Science
Create a JavaScript program that asks for the input of at least five words (a total of 25+ characters) string from a user and performs the following functions to it:
STRING METHODS
Example: Input 5 words
Note: This is an example with example input. Your input will make this much different so don't hard code my examples into your code. The program should ask for input for the 5 words.
Enters: I think therefore I am
Check to make sure it is 25 characters in length. (step 1) - it is not, it is only 22 characters so have them try again.
Enters: Failure is success in progress (this is over 25 characters)
Output: Failure is success in progress (step 2)
Output in lowercase: failure is success in progress (step 3)
Output in uppercase: FAILURE IS SUCCESS IN PROGRESS (step 4)
Output character count: Your string has 30 characters. (step 5)
Output characters between index 5 and 10. re is (step 6)
Output 5 characters starting from position 15. ess i (step 7)
Combine with a 25+ character string you have created: Failure is success in progress Success is dependent on effort (step 8)
ARRAY METHODS - Working with the same string as the String Methods program, continue your program by completing these steps.
Example continued: Array Methods
Your list should be output of all words in your combined string: (step 1)
failure
is
success
in
progress
Success
is
dependent
on
effort
Output: Your string contains 10 words. (step 2)
Output after removing the first array item (step 3)
is
success
in
progress
Success
is
dependent
on
effort
Output after adding the word banana to the end of the array (step 4)
is
success
progress
Success
is
dependent
on
effort
banana
Output after reversing the array elements (step 5)
banana
effort
on
dependent
is
Success
progress
success
is
Output after updating the second array item with the word stardust (step 6)
banana
effort
stardust
dependent
is
Success
progress
success
is
Output after sorting the array (step 7)
Success
banana
dependent
effort
is
is
progress
stardust
success
In: Computer Science
Please write a C++ program to find the largest
number among three numbers using nested if...else
statements
You need to prompt the user to enter three integer numbers from the
keyboard, and then display the largest number among the
three.
Please create a function to find the largest number among three
numbers, and call the maxAmongThree function in the main
function.
In: Computer Science
Using the code below as a template, write a program that asks the user to enter two integers, and finds and prints their greatest common denominator (GCD) in Java!
package cp213; import java.util.Scanner; public class Lab01 { /** * @param a * @param b * @return */ public static int gcd(int a, int b) { // your code here } /** * @param args */ public static void main(String[] args) { Scanner keyboard = new Scanner(System.in); int a = 0; int b = 0; int c = 0; // Read an integer from the keyboard. System.out.print("Enter a (0 to quit): "); a = keyboard.nextInt(); // your code here // gcd function call c = Lab01.gcd( a, b ); // your code here } }
In: Computer Science
The multi-merge sort algorithm (M&M sort) works like merge sort, except that instead of dividing the array into 2 partitions, it divides the array into p partitions. It recursively sorts each of the p partitions and then merges the results doing a p-way merge (except, of course, for the base case of a singleton or empty array). (a) Write the recurrence for T(n) for M&M sort for the case where p is a constant. Then, give a closed-form solution to the recurrence using the Master Theorem, and note which case applied. (b) Now assume that p is not a constant, but rather p(n) = n/10. Rewrite T(n) for this case. Then, give a closed form solution. Use the Master Theorem if it applies, or any other means of arriving at the result.
In: Computer Science
Lab – Linux Fundamentals Instructions: Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following tasks based on the Linux Fundamentals lecture. For this lab, take screenshots for all major steps completed to illustrate that each task was successfully completed (the same method as would be used for other labs).
9. Display your current directory in the terminal
10. Display your current directories contents including the inode value and permissions for each file and directory
11. Without using an editor, create a file with no contents called billy_bobs_diary.txt in the user BillyBob’s home directory
12. Edit your file using nano or vi and add the following string into the contents of the file: “This is my super-duper secret diary. No one shall read my diary for as long as I live. I will encrypt this with the moistest strongest encryption that is known to man. P.S. I really love kitten memes”
13. Rename the file to secret_file.txt using the command line
14. Move the file, secret_file.txt, to a directory named secret located in /opt
15. Create a copy of the file, secret_file.txt, and place it in BillyBob’s home directory
16. On the file, secret_file.txt, located in /opt/secret, change the file permissions so that all users have read/write access, but not execute
17. After you get weirded out that your professor just did that for fun, change the permissions so that the owning user has r/w, the owning group has r/w, and all other users have read only access
18. Display the contents of secret_file.txt via the command line without using a text editor
19. Append the following line to the document without using a text editor: “I have hidden this file so cleverly, that no one will ever find it. My secrets are safe here.”
20. Using the command line, clone the GitHub repository below into the /opt directory. Use the ReadMe to introduce yourself to the mystery scenario. After familiar with the scenario and the instructions, solve the mystery and take snapshots along the way, especially when you figure out who done it! GitHub Repository: https://github.com/veltman/clmystery
In: Computer Science