Questions
C++ language We are given a Queue data structure that supports standard operations like Enqueue() and...

C++ language

We are given a Queue data structure that supports standard operations like Enqueue() and Dequeue(): Enqueue(element): add a new element at the tail of the queue; Dequeue(): delete the element at the head of the queue.

Show how to implement a stack using two queues. Analyze the running time of the stack operations: Push and Pop.

In: Computer Science

Kalamazoo College requires all computers connected to the campus network be running up-to-date antivirus software. When...

Kalamazoo College requires all computers connected to the campus network be running up-to-date antivirus software. When a student’s computer is discovered to have a virus, its network connection is cut until a staff member can remove the virus. If it turns out that the computer was not running up-to-date antivirus software, the student is fined $100. Is this a morally justifiable policy?

In: Computer Science

THE FOLLOWING QUESTION IS FOR C PROGRAMMING LANGUAGE Printing the decimal equivalent of a binary number....

THE FOLLOWING QUESTION IS FOR C PROGRAMMING LANGUAGE

Printing the decimal equivalent of a binary number. Write a program that accepts an integer (5 digits or fewer) containing only 0s and 1s (i.e., binary) and prints out its decimal equivalent using the remainder and division operator to select the "binary" digits one at a time. Make sure your input is tested for multiple options: incorrect characters, too many, too few, etc.

I need help making this program. No loops, if else, or while statements are allowed. Thank you!

In: Computer Science

Write a C program for the recursive algorithm that removes all occurrences of a specific character...

Write a C program for the recursive algorithm that removes all occurrences of a specific character from a string. (please comment the code)

In: Computer Science

Discuss the role of people within a company's computer-security plan.

Discuss the role of people within a company's computer-security plan.

In: Computer Science

BEFORE YOU START MAKE SURE TO SEND AS A TEXT FILE NOT PDF OR PICTURES. WRITE...

BEFORE YOU START MAKE SURE TO SEND AS A TEXT FILE NOT PDF OR PICTURES. WRITE IN A NEXT FILE IN JAVA ECLIPSE FORMAT. WILL BE POSTING THE CODE ON JAVA ECLIPSE. ALSO WILL GIVE THUMBS UP

Write a class called Dog that contains instance data that represents the dog’s name and age. Define the Dog constructor to accept and initialize instance data. Include getter and setter methods for the name and age. Include a method to compute and return the age of the dog in “person years” (seven times the dog’s age). Include a toString method that returns a one-line description of the dog. Create a driver class called Kennel, whose main method instantiates and updates several Dog objects.

In: Computer Science

C++ Define a MyDate class to represent a data that has 3 data members: day, month,...

C++
Define a MyDate class to represent a data that has 3 data members: day, month, year. The class should have: A default constructor to initialize the day, month, and year to 0. A constructor that accepts three integers as arguments to initialize the day, month, and year if the three arguments are valid. A copy constructor that accepts a reference to a MyDate object as argument. This constructor use the argument's three data fields to initialize the day, month, and year. Overload the operator + : this function adds a number of days to the calling object and return the result date. Overload the operator -: this function accepts a MyDate object as argument. It calculates the number of days difference between the calling object and the argument object. Overload the operator -: this function subtract a number of days to the calling object and return the result date. Overload the opertor ==: this function accepts a MyDate object as argument. It compares the calling object with the argument object and returns true if they are the same date, otherwise, the function returns false. Friend function to overload operator >>: this function accepts an istream object and a MyDate object as argument. In this function, it get the day, month, and year as input and returns a MyDate object. Friend function to overload operator <<: this function accepts an ostream object and a MyDate object as argument. In this function, it displays the day, month, and year of the MyDate object in mm/dd/yyyy format.

In: Computer Science

Compare and contrast OSI and TCP/IP network models. Differentiate between same-layer interactions and adjacent-layer interactions in...

  1. Compare and contrast OSI and TCP/IP network models.
  2. Differentiate between same-layer interactions and adjacent-layer interactions in network models (applicable for both TCP/IP and OSI models), and specify why each type of interaction is required in networking.
  3. Explain what is data encapsulation and why is it required in computer networking.
  4. Convert the following physical and logical addresses to the required formats:
    • MAC Address: AD:6F:23:4C:9B:EE to the equivalent binary
    • IP Address: 11000000.10010001.00011010.00000100 to the equivalent decimal

In: Computer Science

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System Quiz Questions a....

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System

Quiz Questions

a. What tools might you use after learning Mike’s e-mail address?

b. What can you determine by entering Mike’s e-mail address into Google? What about just the handle “vetman2601”?

c. Could the information you learned from Google be used to conduct vulnerability testing?

d. Write a memo to the IT manager, Bob Jones, about the potential issues with running a old RHEL 5.8 server, and mention the importance of patch hygiene. Make sure your memo explains how you gathered this information and offers constructive feedback. Your memo shouldn’t point a finger at any company employees; it should discuss problems on a general level.

In: Computer Science

List the 3 strategies for Cyberethics dilemmas

List the 3 strategies for Cyberethics dilemmas

In: Computer Science

SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic...

  1. SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic sequences. There are several hundred such sequences at GenBank, as linked in the References. Here are two examples:    Wuhan-Hu-1: https://www.ncbi.nlm.nih.gov/nuccore/NC_045512.2?report=GenBank    U.S.A.: https://www.ncbi.nlm.nih.gov/nuccore/MN985325.1
    • Download the sequences Wuhan-Hu-1 and U.S.A in FASTA format.
    • Write a Python program that reads these files and saves the sequences as strings.
    • Your program should compare the nucleotide sequences and print out the the locations (indecies) where they differ and the differences. Note that these sequences are of different lengths; compare them only upto the length of the shorter one.

In: Computer Science

Create a java program that allows people to buy tickets to a concert. Using java create...

Create a java program that allows people to buy tickets to a concert. Using java create a program that asks for the users name, and if they want an adult or teen ticket. As long as the user wants to purchase a ticket the program with "yes" the program will continue. When the user inputs "no" the program will output the customer name, total amount of tickets, and the total price.

The adult ticket is $60 and the child ticket is $30.

In: Computer Science

Hi, i would like to know how to get information of an 'image' and put it...

Hi, i would like to know how to get information of an 'image' and put it on 'C programming'

I would also like to know how to compress the image information and decompress it.

In: Computer Science

I'm trying to convert between different number representations in C++ , I have the prototype but...

I'm trying to convert between different number representations in C++ , I have the prototype but im not sure what do do from here

bool convert2(int & n, const string & bits);
bits should have size exactly 5, and each char of bits should be '0' or '1'; otherwise
return false.
If bits is ok, set n to the number that bits represents as a 2's complement number and
return true.
For example, convertU(n, "10011") should set n to -13 and return true.

In: Computer Science

What is the broadband communication system and how broadband network support quality of service (Qos)? no...

What is the broadband communication system and how broadband network support quality of service (Qos)? no hand writing plz

In: Computer Science