Questions
intrusion Detection course a long and comprehensive explanation by typing please Why is wireless security important?...

intrusion Detection course

a long and comprehensive explanation by typing please

Why is wireless security important?

Explain the significance of wireless security.

Name 3 attacks relevant to wireless security and how to protect against them.

In: Computer Science

1) Write a single function CalcArea( ) that has no input/output arguments. Inside the function, you...

1) Write a single function CalcArea( ) that has no input/output arguments. Inside the function, you will first print a “menu” listing 2 items: “rectangle”, “circle”.  It prompts the user to choose an option, and then asks the user to enter the required parameters for calculating the area (i.e., the width and length of a rectangle, the radius of a circle) and then prints its area.  The script simply prints an error message for an incorrect option.  

Here are two examples of running it:

>> CalcArea

Menu

1. Rectangle

2. Circle

Please choose one:2

Enter the radius of the circle: 4.1

The area is 52.81.

>> CalcArea

Menu

1. Rectangle
2. Circle

Please choose one: 1

Enter the length: 4

Enter the width: 6

The area is 24.00.

In: Computer Science

Write a C# program using Repl.it that asks the user for a numeric grade between 0...

Write a C# program using Repl.it that asks the user for a numeric grade between 0 and 100, and displays a letter grade using the following conversion table:

Numeric grade   Letter grade

90 < grade <= 100 A

80 < grade <= 90 B

70 < grade <= 80 C

60< grade <= 70 D

grade <= 0.0 F

Don’t forget the comments in your code. The output should be similar to: Enter the test score: 87 The letter grade for a score of 87 is B. Submit the repl.it link to the text submission area of the assignment dropbox.

In: Computer Science

Discuss how companies use social media channel "influencers" to promote their product. Provide a link to...

Discuss how companies use social media channel "influencers" to promote their product. Provide a link to a specific example that illustrates your ideas.

In: Computer Science

In c++ use bool functions to create and print a truth table for disconjunction and negation...

In c++ use bool functions to create and print a truth table for disconjunction and negation functionality and use it to print the truth table for equation pv~p.

In: Computer Science

Complete the following tasks: a. Create a class named Trip that includes four string variables: destination...

Complete the following tasks:

  • a. Create a class named Trip that includes four string variables: destination (for example, “London”), means of transportation (for example, “air”), departure date (for example, “12/15/2015”), and trip's purpose (for example, “business”). Include two overloaded constructors. The default constructor sets each field to “XXX”. The nondefault constructor accepts four parameters—one for each field. Include two overloaded display() methods. The parameterless version displays all the Trip details. The second version accepts a string that represents a destination and displays the Trip details only if the Trip's destination matches the parameter.
  • b. Create an application that instantiates several Trip objects and demonstrates all the methods.

In: Computer Science

Problem 5. It is the next installment of the ECE 5484 Scavenger Hunt! Two pioneers of...

Problem 5. It is the next installment of the ECE 5484 Scavenger Hunt! Two pioneers of early computers and computer organization were Howard H. Aiken and John von Neumann. Answer the questions below regarding Aiken and von Neumann. Cite sources used for your answers. a) Is Aiken or von Neumann associated with the so-called Princeton architecture? b) Is Aiken or von Neumann associated with the so-called Harvard architecture? c) Briefly, and in your own words, what is the key feature of a Princeton architecture computer compared to the Harvard architecture? d) Does the MARIE architecture owe more to Aiken or von Neumann? In your own words, briefly justify your answer

In: Computer Science

To understand the value of counting loops: Write a java program that implements matrix multiplication using...

To understand the value of counting loops:

  1. Write a java program that implements matrix multiplication using counting loop constructs.
  2. Then write the same program using only logical loops—for example, while loops.

Sample Result is shown below:

Enter the number of rows of matrix A: 2

Enter the number of columns of matrix A: 3

Enter the number of columns of matrix B: 3

Enter the number of columns of matrix B: 4

Enter matrix A;

1 2 3

4 5 6

Enter matrix B:

7 8 9 10

11 12 13 14

15 16 17 18

Matrix A:

1 2 3

4 5 6

Matrix B:

7    8    9 10

11    12 13 14

15 16 17    18

Product of matrix A and Matrix B ( A x B) :

74 80 86 92

173 188 203    218   

In: Computer Science

Part I - Reading input in a loop Before you start doing any coding, brainstorm between...

Part I - Reading input in a loop

Before you start doing any coding, brainstorm between the two of you on how to go about starting this program. You need to get your code to repeatedly prompt for a new String until the user enters an empty line, and then end with a goodbye message. What is the algorithm that you need to use? Write your algorithm into comments in the main method of the Palindrome class (as shown in the class notes). The code you write needs to reproduce the following transcript (user entries are in BOLD):

Enter a string: 1331

Enter a string: racecar

Enter a string: blue

Enter a string:
Empty line read - Goodbye!
Part II - Checking for a palindrome

Now brainstorm with your partner again - once the user has entered a String you need to think about how to tell if it is a palindrome. One way to do this is to compare the characters that are supposed to match - if all of these characters match, then it is a palindrome. If any pair does not match, then it is not a palindrome. Think about the algorithm that does this kind of "pairwise character" comparison - how would you implement that with a loop? Work out the algorithm with your partner and put it into your code, then fill in the code around your algorithm to complete the task. A sample transcript of what your code should do once both parts are completed is below. User entries are shown in BOLD.

Enter a string: 1331
1331 is a palindrome.

Enter a string: racecar
racecar is a palindrome.

Enter a string: blue
blue is NOT a palindrome.

Enter a string:
Empty line read - Goodbye!
Do not worry about differences in case, punctuation, spacing or other issues. Your code should only check whether or not the string of characters is exactly the same forwards as it is backwards.

Enter a string: Racecar
Racecar is NOT a palindrome

Enter a string: RACECAR
RACECAR is a palindrome.

Enter a string: A man, a plan, a canal, Panama.
A man, a plan, a canal, Panama. is NOT a palindrome.

Enter a string: y123321y
y123321y is a palindrome.

Enter a string:
Empty line read - Goodbye!
Use the following template for your code:

public class Palindrome {
public static void main(String[] args) {
// TODO - fill in with your code
}
}

NOTE: You MUST use a nested loop for this assignment. There are other ways to solve this problem, but for this assignment you must have a loop nested inside another loop. Think about using the outer loop to read the String and the inner loop to test for the palindrome.

In: Computer Science

In MATLAB Write a function to create an array of N numbers with a normal distribution....

In MATLAB

Write a function to create an array of N numbers with a normal distribution. Call that from a script to create 1000 numbers, with a mean of 50 and a sigma of 10.

In: Computer Science

Problem 3. A digital computer has a memory unit with 32 bits per word. The instruction...

Problem 3. A digital computer has a memory unit with 32 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a) How many bits are needed for the opcode? b) How many bits are left for the address part of the instruction? c) What is the maximum allowable size for memory? d) What is the largest unsigned binary number that can be accommodated in one word of memory?

In: Computer Science

Problem 1. How many bits are required to address a 4M × 16 main memory under...

Problem 1. How many bits are required to address a 4M × 16 main memory under the following conditions. (“4M x 16” means there are 4x220 16-bit words.) a) The main memory is byte-addressable? b) The main memory is word-addressable? (For part b, assume a 16-bit word.)

In: Computer Science

If you were implementing an ERP system, in which cases would you be more inclined to...

  1. If you were implementing an ERP system, in which cases would you be more inclined to modify the ERP to match your business processes? What are the drawbacks of doing this?

In: Computer Science

Please explain step by step what is going on each step Also show how the output...

Please explain step by step what is going on each step

Also show how the output is coming. I would rate positively.

Thank you so much .

#include     <stdio.h>  
#include   <string.h>
  
int   main()  
{  
       char   buffer[16],   *pos;  
       printf("Enter   string:   ");  
       if   (!(fgets(buffer,sizeof(buffer),stdin)))   {  
                   printf("End   of   file\n");  
                   return   0;  
       }  
       printf("Length   of   %s   is   %lu   \n",buffer,strlen(buffer));  
       if   ((pos=strchr(buffer,   '\n'))   !=   NULL)  
                   *pos   =   '\0';      
       printf("Length   of   %s   is   now   %lu   \n",buffer,strlen(buffer));  
       return(0);  
}  

In: Computer Science

Assume we have two sequences of values S1 containing 1, 5, 3, 6, 7, 8 while...

Assume we have two sequences of values S1 containing 1, 5, 3, 6, 7, 8 while S2 containing 2, 5, 6, 9, 7. We store these two sequences as sets and perform a set intersection and set difference. Write C++ code to do that respectively.

In: Computer Science