Questions
BEFORE YOU START MAKE SURE TO SEND AS A TEXT FILE NOT PDF OR PICTURES. WRITE...

BEFORE YOU START MAKE SURE TO SEND AS A TEXT FILE NOT PDF OR PICTURES. WRITE IN A NEXT FILE IN JAVA ECLIPSE FORMAT. WILL BE POSTING THE CODE ON JAVA ECLIPSE. ALSO WILL GIVE THUMBS UP

Write a class called Dog that contains instance data that represents the dog’s name and age. Define the Dog constructor to accept and initialize instance data. Include getter and setter methods for the name and age. Include a method to compute and return the age of the dog in “person years” (seven times the dog’s age). Include a toString method that returns a one-line description of the dog. Create a driver class called Kennel, whose main method instantiates and updates several Dog objects.

In: Computer Science

C++ Define a MyDate class to represent a data that has 3 data members: day, month,...

C++
Define a MyDate class to represent a data that has 3 data members: day, month, year. The class should have: A default constructor to initialize the day, month, and year to 0. A constructor that accepts three integers as arguments to initialize the day, month, and year if the three arguments are valid. A copy constructor that accepts a reference to a MyDate object as argument. This constructor use the argument's three data fields to initialize the day, month, and year. Overload the operator + : this function adds a number of days to the calling object and return the result date. Overload the operator -: this function accepts a MyDate object as argument. It calculates the number of days difference between the calling object and the argument object. Overload the operator -: this function subtract a number of days to the calling object and return the result date. Overload the opertor ==: this function accepts a MyDate object as argument. It compares the calling object with the argument object and returns true if they are the same date, otherwise, the function returns false. Friend function to overload operator >>: this function accepts an istream object and a MyDate object as argument. In this function, it get the day, month, and year as input and returns a MyDate object. Friend function to overload operator <<: this function accepts an ostream object and a MyDate object as argument. In this function, it displays the day, month, and year of the MyDate object in mm/dd/yyyy format.

In: Computer Science

Compare and contrast OSI and TCP/IP network models. Differentiate between same-layer interactions and adjacent-layer interactions in...

  1. Compare and contrast OSI and TCP/IP network models.
  2. Differentiate between same-layer interactions and adjacent-layer interactions in network models (applicable for both TCP/IP and OSI models), and specify why each type of interaction is required in networking.
  3. Explain what is data encapsulation and why is it required in computer networking.
  4. Convert the following physical and logical addresses to the required formats:
    • MAC Address: AD:6F:23:4C:9B:EE to the equivalent binary
    • IP Address: 11000000.10010001.00011010.00000100 to the equivalent decimal

In: Computer Science

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System Quiz Questions a....

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System

Quiz Questions

a. What tools might you use after learning Mike’s e-mail address?

b. What can you determine by entering Mike’s e-mail address into Google? What about just the handle “vetman2601”?

c. Could the information you learned from Google be used to conduct vulnerability testing?

d. Write a memo to the IT manager, Bob Jones, about the potential issues with running a old RHEL 5.8 server, and mention the importance of patch hygiene. Make sure your memo explains how you gathered this information and offers constructive feedback. Your memo shouldn’t point a finger at any company employees; it should discuss problems on a general level.

In: Computer Science

List the 3 strategies for Cyberethics dilemmas

List the 3 strategies for Cyberethics dilemmas

In: Computer Science

SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic...

  1. SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic sequences. There are several hundred such sequences at GenBank, as linked in the References. Here are two examples:    Wuhan-Hu-1: https://www.ncbi.nlm.nih.gov/nuccore/NC_045512.2?report=GenBank    U.S.A.: https://www.ncbi.nlm.nih.gov/nuccore/MN985325.1
    • Download the sequences Wuhan-Hu-1 and U.S.A in FASTA format.
    • Write a Python program that reads these files and saves the sequences as strings.
    • Your program should compare the nucleotide sequences and print out the the locations (indecies) where they differ and the differences. Note that these sequences are of different lengths; compare them only upto the length of the shorter one.

In: Computer Science

Create a java program that allows people to buy tickets to a concert. Using java create...

Create a java program that allows people to buy tickets to a concert. Using java create a program that asks for the users name, and if they want an adult or teen ticket. As long as the user wants to purchase a ticket the program with "yes" the program will continue. When the user inputs "no" the program will output the customer name, total amount of tickets, and the total price.

The adult ticket is $60 and the child ticket is $30.

In: Computer Science

Hi, i would like to know how to get information of an 'image' and put it...

Hi, i would like to know how to get information of an 'image' and put it on 'C programming'

I would also like to know how to compress the image information and decompress it.

In: Computer Science

I'm trying to convert between different number representations in C++ , I have the prototype but...

I'm trying to convert between different number representations in C++ , I have the prototype but im not sure what do do from here

bool convert2(int & n, const string & bits);
bits should have size exactly 5, and each char of bits should be '0' or '1'; otherwise
return false.
If bits is ok, set n to the number that bits represents as a 2's complement number and
return true.
For example, convertU(n, "10011") should set n to -13 and return true.

In: Computer Science

What is the broadband communication system and how broadband network support quality of service (Qos)? no...

What is the broadband communication system and how broadband network support quality of service (Qos)? no hand writing plz

In: Computer Science

In a well-developed inital post, walk your classmates through the process as you conducted your search....

In a well-developed inital post, walk your classmates through the process as you conducted your search.

Then explain what insights you has as you reviewed the reference page of your source.


In a well-developed post, what is the process of conducting a research on a specific topic.

In: Computer Science

How many key comparisons are made by mergesort in the a. Best case? b. Worst Case?

How many key comparisons are made by mergesort in the

a. Best case?

b. Worst Case?

In: Computer Science

Why would you want to use grouping in a query? Explain.

Why would you want to use grouping in a query? Explain.

In: Computer Science

Use a For loop to compute the sum of all the odd numbers from 1 through...

  1. Use a For loop to compute the sum of all the odd numbers from 1 through 99. Your result should be labeled, and the value should be 2500.
  2. Print your name 7 times using a While loop.
  3. String dogNames[ ] = {"Sam","Buster","Fido","Patches","Gromit","Flicka"};
    Using the array defined here, print the values of the array vertically and horizontally using one For-Each loop.
  4. Reverse the logic for zyBook Challenge activity 4.6.1 (Nested loops: Indent text) so that the first line is indented userNum number of spaces and the subsequent lines are each indented one less space until the last value is not indented at all (‘s’ indicates one space):
    sssss5
    ssss4
    sss3
    ss2
    s1
    0
  5. String method practice:
    • Create a String variable that contains your full name
    • Repeat the following steps 5 times (note you will use predefined String methods to modify your name as indicated):
      • Generate a random number between 1 and 4
      • If number is 1, display your name in all upper case
      • If number is 2, display your name in all lower case
      • If number is 3, replace your first name with “Three” and display your name
      • If number is 4, display the character at index 4

In: Computer Science

Create a class named TestLease whose main() method declares four Lease objects. Call a getData() method...

Create a class named TestLease whose main() method declares four Lease objects. Call a getData() method three times. Within the method, prompt a user for values for each field for a Lease, and return a Lease object to the main() method where it is assigned to one of main()’s Lease objects.

Do not prompt the user for values for the fourth Lease object, but let it continue to hold the default values. Then, in main(), pass one of the Lease objects to a showValues() method that displays the data.

Then call the addPetFee() method using the passed Lease object and confirm that the fee explanation statement is displayed. Next, call the showValues() method for the Lease object again and confirm that the pet fee has been added to the rent.

Finally, call the showValues() method with each of the other three objects; confirm that two hold the values you supplied as input and one holds the constructor default values. Save the application as TestLease.java.

In: Computer Science