Create the function fact that had a positive integer argument and returns its factorial . Recall that factorial (n) = 1*2*3***n. For example factorial (4)=1*2*3*4=24, (python)
In: Computer Science
You are an intern in the Cybersecurity Operations Office for the new National Youth Social Media Administration. You just graduated from the Webster University Cybersecurity Program and you want to impress your supervisors in order to have a greater opportunity for a promotion. Discuss your proposal for a Cybersecurity strategy for this new national office.
In: Computer Science
C++...This program is broken down into phases for your convenience only. Please turn in only the final phase. Before turning in your program, please make sure that it does something reasonable if the user enters a negative number the first time.
Phase I: Write a program for a theater that will keep track of how many people in each of 5 age categories attended a particular movie. Use the 5 age categories listed below in the sample screen output. The user will enter a number of ages, entering a negative number when there are no more ages to enter. Your program will then report on how many people in each age group attended. Sample screen output:
Enter age of attendee (-1 to quit): 34 Enter age of attendee (-1 to quit): 16 Enter age of attendee (-1 to quit): 68 Enter age of attendee (-1 to quit): 53 Enter age of attendee (-1 to quit): 39 Enter age of attendee (-1 to quit): 23 Enter age of attendee (-1 to quit): 21 Enter age of attendee (-1 to quit): -1 age 0 to 18: 1 age 19 to 30: 2 age 31 to 40: 2 age 41 to 60: 1 over 60: 1 |
Phase II: Modify your program so that, in addition
to the report that the program currently produces, it also gives
the average age of the people in attendance, the age of the oldest
person in attendance, and the age of the youngest person in
attendance. Sample screen output:
Enter age of attendee (-1 to quit): 34 Enter age of attendee (-1 to quit): 16 Enter age of attendee (-1 to quit): 68 Enter age of attendee (-1 to quit): 53 Enter age of attendee (-1 to quit): 39 Enter age of attendee (-1 to quit): 23 Enter age of attendee (-1 to quit): 21 Enter age of attendee (-1 to quit): -1 age 0 to 18: 1 age 19 to 30: 2 age 31 to 40: 2 age 41 to 60: 1 over 60: 1 The average age was 36. The youngest person in attendance was 16. The oldest person in attendance was 68. |
Phase III: Modify your program so that it also asks each attendee for a theater concession stand purchase. The attendee must make a selection based on the following choices ā¦
1 - Soft Drink (such as Coca Cola, ICCEE, Mineral Water etc...)
2 - Popcorn
3 - Nachos
4 - Soft drink & Popcorn
5 - Soft drink & Nachos
6 - Organic and Gluten-free snacks
7 ā None
The program output should now also provide a theater concession stand sales summary with a count of each category purchased.
Note: Include a validation routine to ensure that a correct choice is input for each attendee.
Check the sample screen output below for the final formatted display of theater statistics.
========================== THEATER STATS PROGRAM ========================== Movie theater snacks available for purchase ========================================== 1 - Soft Drink (such as Coca Cola, ICCEE, Mineral Water etc...) 2 - Popcorn 3 - Nachos 4 - Soft drink & Popcorn 5 - Soft drink & Nachos 6 - Organic and Gluten-free snacks 7 - None ========================================== Enter age of attendee (-1 to quit): 34 Movie theater snack purchased. (Select items 1 - 7):4 -------------------------- Enter age of attendee (-1 to quit): 16 Movie theater snack purchased. (Select items 1 - 7):5 -------------------------- Enter age of attendee (-1 to quit): 68 Movie theater snack purchased. (Select items 1 - 7):12 Invalid selection, please choose from 1 - 7 Movie theater snack purchased. (Select items 1 - 7):6 -------------------------- Enter age of attendee (-1 to quit): 53 Movie theater snack purchased. (Select items 1 - 7):6 -------------------------- Enter age of attendee (-1 to quit): 39 Movie theater snack purchased. (Select items 1 - 7):1 -------------------------- Enter age of attendee (-1 to quit): 23 Movie theater snack purchased. (Select items 1 - 7):2 -------------------------- Enter age of attendee (-1 to quit): 21 Movie theater snack purchased. (Select items 1 - 7):3 -------------------------- Enter age of attendee (-1 to quit): 21 Movie theater snack purchased. (Select items 1 - 7):4 -------------------------- Enter age of attendee (-1 to quit): -1 ================================== THEATER STATS PROGRAM RESULTS ================================== age 0 to 18: 1 age 19 to 30: 3 age 31 to 40: 2 age 41 to 60: 1 over 60: 1 The average age was 34 The youngest person in attendance was 16 The oldest person in attendance was 68 Theater Concession Stand sales ================================== Soft Drink (such as Coca Cola, ICCEE, Mineral Water etc.): 1 Popcorn: 1 Nachos: 1 Soft drink & Popcorn: 2 Soft drink & Nachos: 1 Organic and Gluten-free snacks: 2 Process returned 0 (0x0) execution time : 169.589 s Press any key to continue. |
In: Computer Science
Using R Language
The code provided below uses a for loop to simulate conducting 10,000 polls of 8 people in which each person has 58% probability of being a supporter of the Democratic candidate and a 42% probability of being a supporter of the Republican. The way the loop works is it runs through the code inside the loop 10,000 times, but changing the value of i with each iteration (i is 1 in the first iteration, 10,000 in the last).
# Define a vector of integers that has 10,000 elements. poll_sims = vector(length = 10000, mode = "integer") # for loop to simulate 10,000 polls for (i in 1:10000) { # Do a poll of 8 people in which each person has a 58% chance of supporting the # Democratic candidate and 42% chance of supporting the Republican. poll = sample(c("Democrat", "Republican"), size = 8, replace = T, prob = c(.58, .42)) # Count the number of people who support the Democrat and store the result in the # poll_sims vector as the ith result. poll_sims[i] = sum(poll == "Democrat") } 2 # Visualise the poll_sims vector using basic R plot(factor(poll_sims)) # Visualise the poll_sims vector using tidyverse library(tidyverse) qplot(factor(poll_sims)) + geom_bar()
1. Run this code on your own and find the fraction of the simulations in which less than half the people (3 or fewer) support the Democratic candidate. Compare this result to your answer in Question 5 of the previous section.
2. Change the code to simulate 10,000 polls of 100 people (rather than 10,000 polls of 8). Find the fraction of simulations in which less than half the people support the Democratic candidate. In other words, use the simulations to approximate the likelihood that a poll of 100 people will incorrectly guess the winner of the election.
3. Graph the simulations so you can visualize the distribution.
4. Change the code again to simulate 10,000 polls of 1,000 people. Find the fraction of simulations in which between 55% and 61% of the people support the Democratic candidate. In other words, use the simulations to approximate the likelihood that a poll of 1,000 people will be off from the true probability by 3% or less.
In: Computer Science
create a file in java where you can store the first name, last name and the grade of the student. this will repeats until the answer of the question "are you done?" is.equals (y). then write another program that you can read from this file the student's information .
I have dome most of it but my program stores only 1 student's information. WRITE IN FILE
public static void main(String[] args) {
System.out.println("Enter the file name");
Scanner keyboard=new Scanner(System.in);
String fileName= keyboard.next();
boolean done=false;
String response;
PrintWriter output=null;
try {
output=new PrintWriter(fileName);
}
catch(FileNotFoundException e) {
System.out.println ("error in " + fileName);
System.exit(0);
}
while(!done) {
//for (int i=1;i<=2;i++) {
System.out.println("first name:");
String fname= keyboard.next();
System.out.println("Last name:");
String lname=keyboard.next();
System.out.println("Grade:");
double grade=keyboard.nextDouble();
output.println(fname +" "+ lname+" " +grade);
output.close();
System.out.println("Are you done?");
}
String response1 =keyboard.next();
if (response1.equals("y"))
done=true;
}
}
READ THE FILE.
public class ReaderFile {
public static void main(String[] args) throws Exception {
System.out.println("Enter the file name");
Scanner keyboard=new Scanner(System.in);
String fileName=keyboard.next();
File file= new File(fileName);
Scanner input=null;
try {
input= new Scanner(new File(fileName));
}
catch(Exception e) {
System.out.println("Error reading the file" + fileName);
System.exit(0);
}
while(input.hasNext()) {
String fname=input.next();
String lname=input.next();
double grade=input.nextDouble();
System.out.println(fname+" "+lname+" "+grade);
}
}
}
In: Computer Science
3. IEEE Floating Point Representation
What decimal number does the 32-bit IEEE floating point number 0xC27F0000 represent? Fill in the requested information in the blanks below. What is the sign of the number (say positive or negative): What is the exponent in decimal format: What is the significand in binary: What is the value of the stored decimal number in decimal (final answer): Credit will be given for your final answer in the blanks and the work shown below.
In: Computer Science
C-Language
Modify the existing vector's contents, by erasing 200, then inserting 100 and 102 in the shown locations. Use Vector ADT's erase() and insert() only. Sample output of below program:
100 101 102 103
----------------------------------------------------------------------------------
#include <stdio.h>
#include <stdlib.h>
// struct and typedef declaration for Vector ADT
typedef struct vector_struct {
int* elements;
unsigned int size;
} vector;
// Initialize vector with specified size
void vector_create(vector* v, unsigned int vectorSize) {
int i;
if (v == NULL) return;
v->elements = (int*)malloc(vectorSize *
sizeof(int));
v->size = vectorSize;
for (i = 0; i < v->size; ++i) {
v->elements[i] = 0;
}
}
// Resize the size of the vector
void vector_resize(vector* v, unsigned int vectorSize) {
int oldSize;
int i;
if (v == NULL) return;
oldSize = v->size;
v->elements = (int*)realloc(v->elements,
vectorSize * sizeof(int));
v->size = vectorSize;
for (i = oldSize; i < v->size; ++i) {
v->elements[i] = 0;
}
}
// Return pointer to element at specified index
int* vector_at(vector* v, unsigned int index) {
if (v == NULL || index >= v->size) return
NULL;
return &(v->elements[index]);
}
// Insert new value at specified index
void vector_insert(vector* v, unsigned int index, int value)
{
int i;
if (v == NULL || index > v->size) return;
vector_resize(v, v->size + 1);
for (i = v->size - 1; i > index; --i) {
v->elements[i] =
v->elements[i-1];
}
v->elements[index] = value;
}
// Insert new value at end of vector
void vector_push_back(vector* v, int value) {
vector_insert(v, v->size, value);
}
// Erase (remove) value at specified index
void vector_erase(vector* v, unsigned int index) {
int i;
if (v == NULL || index >= v->size) return;
for (i = index; i < v->size - 1; ++i) {
v->elements[i] =
v->elements[i+1];
}
vector_resize(v, v->size - 1);
}
// Return number of elements within vector
int vector_size(vector* v) {
if (v == NULL) return -1;
return v->size;
}
void PrintVectors(vector* numberList) {
int i;
for (i = 0; i < vector_size(numberList); ++i)
{
printf("%d ", *vector_at(numberList,
i));
}
printf("\n");
}
int main(void) {
vector numberList;
vector_create(&numberList, 0);
// Populate vector with 101 200 103
vector_push_back(&numberList, 101);
vector_push_back(&numberList, 200);
vector_push_back(&numberList, 103);
// Erase 200 then insert 100 and 102
/* Your solution goes here */
PrintVectors(&numberList);
return 0;
}
In: Computer Science
Using Python, write a program that finds a root of function f(x) = x^2-4x+3 on interval [2,5] using bisection search method. Recall that r is a root of a function if f(r) = 0. Output the number of iterations it took your algorithm to find a root.
In: Computer Science
Topic 1
TRUE OR FALSE Q's
1. Computer software is the collection of programs that provide the instructions that a computer carries out.
2. An abstraction is a mental model that removes or hides complex details.
3. The abacus was the world's first electronic digital computer.
4. Ada Augusta, Countess of Lovelace, is credited with being the first programmer.
5. A vacuum tube was a device used in the third generation of computers.
6. The fourth generation of computer hardware was characterized by large-scale integration.
7. The personal computer was introduced in the fourth generation of computer hardware.
8. The Internet is descended from a U.S. government-sponsored network called the ARPANET.
9. Assembly-language is first generation software.
10. Earliest machine programs were hard wired.
11. Algorithmic thinking is a necessary skill in Computer Science.
12. Computational Science is one of the Systems areas.
13. Spreadsheets and word processors are known as software applications.
14. Applications programmers use the tools built by systems programmers.
15. An algorithm is a set of steps that defines how a task is performed.
In: Computer Science
(Language: PYTHON) Format existing address records and eliminate records with missing critical fields.Critical fields include FirstName, Lastname, Zipcode+4, and Phone number for customers. Use an array to hold data with these 4 fields containing at least 25records. The Zipcode field should contain either traditional 5-digit Zipcode(e.g. 21801)or Zip+4 format(e.g 21801-1101). The phone numbers should contain 10-digit (e.g. 5555555555)or formatted 10-digit(e.g. 555-555-5555). Some records might be corrupt so the data needs to be munged. At this point, we assume only U.S data will be present therefor country code is not needed.
Label each column, properly format the Zip code to be either 11111 or 11111-1111 formats, properly formatthe phone numbers to always be 111-111-1111 format, and replace incorrect values with a blank string.
Notice invalid data was removed and formatting was applied as required. Commas can be left if desired. Default alignment with the column labels is acceptable.
In: Computer Science
For binary data, the L1 distance corresponds to the Hamming distance; that is, the number of bits that are different between two binary vectors. For the following two binary vectors, compute:
X = 10011011
Y = 01011000
1 - Hamming distance
2 - Jaccard Similarity Coefficient (JSC) and Simple Matching Coefficient (SMC)
3 - Cosine Similarity
4 - L2 (Euclidean) and Lā (Supermum) distances
5 - Correlation between X and Y
In: Computer Science
**C++ Programming Language**
a program that computes the average of a collection of numbers and then outputs the total number of values that are greater than the average. The objective of this assignment is to select a language that you have never used before and modify the program from the text so that it outputs the number of A's, B's, C's, D's and F's. An A grade is any score that is at least 20% greater than the average. The B grade is any score that is not an A, but is at least 10% greater than the average. An F grade is any score that is at least 20% less than the average. The D grade is any score that is not an F, but is at least 10% less than the average. Any scores that are within 10% of the average (either less than or greater than) are C's.
In: Computer Science
Could i please have assistance with the following.
A) TCP/IP protocol stack, how does a switch differ from a hub?
B) How does a switch/bridge know what station is on a given port?
C) What does a switch/bridge do if it does not know the out-going port of a destination MAC address?
D) How is a token ring similar to a Master-and-slave or polling channel access protocol?
In: Computer Science
Design a header file named gshapes.h that contains a namespace named Shapes. The Shapes namespace should contain definitions of at least six inline user-defined functions, each of which computes and returns either volume, or surface area for at least three different geometric shapes of your choice (e.g., cone, pyramid, cylinder, sphere, ...). The gshapes.h header file should be saved within the same project folder that also contains your main program files.
Design the main program that includes the gshapes.h header file and uses the functions from the Shapes namespace. The program will display a menu with at least three geometric shapes' options for the user to select. When the user selects a shape, the program will first obtain the necessary input values for the selected shape, and then call two functions from the Shapes namespace to compute and display the volume and surface area for that geometric shape respectively. The program will then loop back to the main menu for the user to select and process another shape, or to exit the program.
In: Computer Science
Background / Scenario
Attackers have developed many tools over the years to attack and
compromise networks. These attacks take many forms, but in most
cases, they seek to obtain sensitive information, destroy
resources, or deny legitimate users access to resources. When
network resources are inaccessible, worker productivity can suffer,
and business income may be lost.
To understand how to defend a network against attacks, an
administrator must identify network vulnerabilities. Specialized
security audit software, developed by equipment and software
manufacturers, can be used to help identify potential weaknesses.
These same tools used by individuals to attack networks can also be
used by network professionals to test the ability of a network to
mitigate an attack. After the vulnerabilities are discovered, steps
can be taken to help protect the network.
This assignment provides a structured research project that is
divided into two parts: Researching Network Attacks and Researching
Security Audit Tools. Inform your instructor about which network
attack(s) and network security audit tool(s) you have chosen to
research. This will ensure that a variety of network attacks and
vulnerability tools are reported on by the members of the c
In Part 2, research network security audit tools and attack tools. Investigate one that can be used to identify host or network device vulnerabilities. Create a one-page summary of the tool based on the form included within this lab.
Part 2: Researching Network Security Audit Tools and Attack
Tools Step 1: Research various network security audit tools and
attack tools.
Step 2: Fill in the following form for the network security audit
tool/attack tool selected.
Name of tool:
Developer:
Type of tool (character-based or GUI):
Used on (network device or computer host):
Cost:
Description of key features and capabilities of product or
tool:
References and info links:
In: Computer Science