Questions
Java or python. The clients need to be able to communicate with each other using the...

Java or python. The clients need to be able to communicate with each other using the command line. The "local chat" program should be implemented using a client/Server model based on UDP protocol.

Requirements:

1. The chat is performed between 2 clients and not the server.

2. The server will first start up and choose a port number. Then the server prints out its IP address and port number.

3. The client then will start up and create a socket based on the information provided by the server.

4. Now the client and the server can chat with each other by sending messages over the network.

5. The client/server MUST be able to communicate with each other in a continuous manner. (e.g. One side can send multiple messages without any replies from the other side)

6. There is no requirement on what language you use to implement this project, but your program should call upon the socket API for UDP to realize the functionality.

7. You should demonstrate your project using two machines (one for the client and one for the server. Pick your virtual machine as the client to communicate with your actual machine, which is server in our project).

8. You need to open at least 2 cmd window in your virtual machine to demonstrate multiple machine communicate with your server machine (actual machine)

In: Computer Science

In this module you learned how to implement recursive functions in your C++ programs. For this...

In this module you learned how to implement recursive functions in your C++ programs.

For this assignment, you will create a program that tests a string to see if it is a palindrome. A palindrome is a string such as “madam”, “radar”, “dad”, and “I”, that reads the same forwards and backwards. The empty string is regarded as a palindrome. Write a recursive function:

bool isPalindrome(string str, int lower, int upper)

that returns true if and only if the part of the string str in positions lower through upper (inclusive at both ends) is a palindrome. Test your function by writing a main function that repeatedly asks the user to enter strings terminated by the ENTER key. These strings are then tested for palindromicity. The program terminates when the user presses the ENTER key without typing any characters before it.

Be sure to include comments throughout your code where appropriate.

In: Computer Science

What is a Symbol table? Please explain how a symbol table is created and used by...

  1. What is a Symbol table? Please explain how a symbol table is created and used by assemblers.

In: Computer Science

Using java.util.Stack and java.util.StringTokenizer to write a program that converts an infix expression to a postfix...

Using java.util.Stack and java.util.StringTokenizer to write a program that converts an infix expression to a postfix expression using data from infix.dat. Make sure your program can handle negative number. If the input expression can’t be converted, display error message.(1.5 points)

(Should remove parentheses)

infix.dat

5 * 6 + -10
3 - 2 + 4 7
( 3 * 4 - (2 + 5)) * 4 / 2
10 + 6 * 11 -(3 * 2 + 14) / 2
2 * (12 + (3 + 5 ) * 2

In: Computer Science

Construct a finite-state machine, using combinational logic for an apple vending machine that only accepts nickels...

Construct a finite-state machine, using combinational logic for an apple vending machine that only accepts nickels (5 cents). When 15 cents is deposited the user can push a button to receive an apple and the machine resets. If the user inserts more than 15 cents no money will be returned.

  1. What are the machine states?
  2. What are the inputs?
  3. What are the outputs?
  4. Draw state table
  5. Draw state diagram
  6. Write the combinational logic for next state and output
  7. Explain if you built a Mealy or Moore machine

In: Computer Science

Assignment 4: Objects that contain objects In this assignment, you will implement a Java application, called...

Assignment 4: Objects that contain objects

In this assignment, you will implement a Java application, called BankApplication, that can be used to manage bank accounts. The application is to be implemented using three classes, called Account, Customer, and BankDriver. The description of these classes is below.

Problem Description

class Account

The Account class keeps track of the balance in a bank account with a varying annual interest rate. The Account class is identified as follows:
• two double instance variables, called balance and annualRate.
• A constructor that takes two input parameters to initialize the balance and annualRate instance variables.
• No-argument constructor to set both the balance and annualRate to zero.
• Getters for both instance variables.
• deposit: a method than takes an amount (of type double) and adds that amount of money to account's balance.
• withdraw: a method than takes an amount (of type double) and withdraws that amount of money from the balance. If the amount to be withdrawn is greater than the current balance, then the method displays as error message and does not change the balance.
• addInterest: a method that adds interest to the balance at the current rate. The method takes an input (of type int) indicating how many years-worth of interest to be added. For example, if the account's balance is 1000 and annualRate is 0.05, the call addInterest(3) will add 3-years-worth of interest (i.e., 3*1000*0.05) to the current balance. (Note that interest calculations can be more complex if the second year's interest is to be calculated using the first's year balance after adding first year's interest and so on. However, for simplicity, you are not required to implement this more complex interest calculations).
• equals: a method to test the equality of two accounts. Two accounts are considered to be equal if they have the same balance and the same annualRate.
• toString: a method that returns a nicely formatted string description of the account.


class Customer

The Customer class represents a bank customer. A customer is identified by the following instance variables:
• name: a string that represents customer name
• checkingAccount: an instance variable of type Account
• savingAccount: an instance variable of type Account
Implement the following methods for the Customer class:

• A constructor that takes as input only the customer's name and creates a customer with zero balance and zero rate in both accounts.
• A constructor that takes five inputs that represent the customer's name and four double variables that represent the customer's checking account's balance, checking account's annual rate, saving account's balance, and saving account's annual rate.
• Getter methods for the saving and checking accounts.
• getTotalBalance: a method that calculates and returns the total balance of a customer (which is the sum of the checking account's balance and the saving account's balance).
• creditAccount: a method that takes two inputs to represent the account type and an amount of money to deposit. Note that account type is either 1 for saving account or 2 for checking account. The method then calls the appropriate Account's deposit method to add the specified amount of money. For example, the call creditAccount(1,500) adds 500 to the saving account while the call creditAccount(2,500) adds 500 to the checking account. The method should display an error message if the first input is any number other than 1 or 2.
• debitAccount: similar to creditAccount but it withdraws money form the specified account.
• addInterest: similar to creditAccount, this method takes as input account type and number of years. The method then adds interest to the specified account.
• toString: a method that returns a string representation of the customer that includes customer name, details of customer's accounts and customer’s total balance.


class BankDriver

Your driver class should do the following actions:
• creates two customers with your choice of names, balances, and annual rate values.
• adds 1 year-worth of interest to all checking accounts.
• adds 3 years-worth of interest to all saving accounts.
• Check whether the checking account of the first customer is equal to the checking account of the second cusomter.
• prints all customers’ information in a nicely formatted output.


Important Requirements

The output of our program must be nicely formatted.
• The programs should display your name.
• At the top of the program include your name, a brief description of the program and what it does and the due date.
• Add appropriate comments to your code.
• All code blocks must be indented consistently and correctly. Blocks are delimited by opening and closing curly braces. Opening and closing curly braces must be aligned consistently.
• Variable names should convey meaning.
• The program must be written in Java and submitted via D2L.

Draw a UML diagram of your application that includes the Account and Customer classes but not the BankDriver class.

In: Computer Science

The following code snippet is free of errors (issues that will prevent the code from compiling)...

The following code snippet is free of errors (issues that will prevent the code from compiling) but it does contain a major bug that will cause the program to hang (not finish running). Identify the problem and create a line of code to fix it.

#include <stdio.h>

char get_input();

int main() {
    printf("The user's inputted letter is %c\n", get_input());
    return 0;
}

char get_input() {
    printf("Please enter a letter: \n");
    char input = getchar();
    
    while (!(input >= 'a' && input <= 'z') && !(input >= 'A' && input <= 'Z')) {
        printf("You did not enter a letter! Try again\n");
    }
    
    return input;
}

In: Computer Science

Your code must print all the steps in the output as an Eg> When you run...

Your code must print all the steps in the output as an Eg>

When you run your Merge sort code the sequence of output should be:

1) Enter input sequence

2) Show n/2 division of the input sequence

3) keep showing n/2 division of your sequence until you get one attribute

4) Sort first two numbers

5) Make a stack of 4 by merging 2 * 2 and sort them

6) keep showing merging and sorting until you show the final merging of last two stacks and sort them.

Similarly, show all the steps for Bubble sort.

Mostly need Bubble in Java, please.v

In: Computer Science

#include <stdio.h> #include <stdlib.h> #include <time.h> void sort(int a[], int size); void printArray(int a[], int size);...

#include <stdio.h>
#include <stdlib.h> 
#include <time.h> 

void sort(int a[], int size);
void printArray(int a[], int size);

int main(){
        int arraySize, limit, count,

        srand(time(0)); 

        print f("Enter the size of array\n");
        scanf("%d", arraySize);

        int array[arraySize];

        printf("Enter the upper limit\n");
        scanf("%d", &limit);

        count = 0;
        while(count <= arraySize){
                array[count] = (rand() % (limit + 1));
                count++;
        }

        printArray(array, &arraySize);

        sort(array, arraySize);

        printArray(array, arraySize);

        Return 0;
}

void printArray(int a[], int size){
        int i = 0;
        printf("Array: [");
        while(i < size){
                if(i != size - 1){
                        printf("%d, ", a[i]);
                } else {
                        printf("%d]\n", a[i]);
                }
                printf("%d, ", a[i]);
        }
}

Find the bugs in the given code and write the correct line of code where the bug is. There are a total of 7 bugs.

In: Computer Science

Describe any experiences you have had with tabletop simulation exercises or other types of simulation exercises....

  1. Describe any experiences you have had with tabletop simulation exercises or other types of simulation exercises. If you have not had direct experiences with this sort of exercise, discuss the closest you have come, including fantasy or role-playing games or even board games that spurred your imagination.
  2. Discuss the effectiveness of tabletop simulations or similar exercises. What are they good for? If done well, what sorts of results may be expected? Consider especially the use of such exercises in cybersecurity and in combating adversarial threats that are adaptable and may be hard to predict. Also, consider impacts beyond addressing technical controls: for instance, what can such exercises show an organization about compliance, communication, decision making, training, or other matters?

In: Computer Science

An information security officer reviews a report and notices a steady increase in outbound network traffic...

An information security officer reviews a report and notices a steady increase in outbound network traffic over the past ten months There is no clear explanation for the increase The security officer interviews several business units and discovers an unsanctioned cloud storage provider was used to share marketing materials with potential customers Which of the following services would be BEST for the security officer to recommend to the company?

  1. NIDS

  2. HIPS

  3. CASB

  4. SFTP

In: Computer Science

Apply one round of partition function in Quicksort on the following sequence: 32 41 92 13...

Apply one round of partition function in Quicksort on the following sequence: 32 41 92 13 75 18 26 87 53 57

In: Computer Science

Consider the following relational schema: Salerep(sales_rep_ID, name, address, commission, rate) Customer(customer_number, name, address, balance, credit_limit, sales_rep_ID)...

Consider the following relational schema:

Salerep(sales_rep_ID, name, address, commission, rate)

Customer(customer_number, name, address, balance, credit_limit, sales_rep_ID)

Part(part_number, part_description, on_hand, class, warehouse, price)

Orders(order_number, order_date, customer_number)

Orderlilne(order_number, part_number, number_order)

Write SQL statements for the following queries:

a) Produce a list showing part_number, part_description, on_hand, and price sorted by part_description.

b) List customer’s name followed by order_number, part_description, and number_order.

c) List names of customers who have ordered the most expensive item(Hint: Use a nested SQL query to determine thehighest price.)

d) List the names of the sale_reps who have sold the most number of part “123”.(Hint: Use a nested SQL query for the FROM clause)

In: Computer Science

Compute 20191023 mod 7 without using calculator. Show every step.

Compute 20191023 mod 7 without using calculator. Show every step.

In: Computer Science

A security analyst is reviewing an endpoint mat was found to have a rootkit installed. The...

A security analyst is reviewing an endpoint mat was found to have a rootkit installed. The root kit survived multiple attempts to clean the endpoint as well as an attempt to reinstall the OS. The security analyst needs to implement a method to prevent other endpoints from having similar issues. Which of the following would BEST accomplish this objective?

  1. Utilize measured boot attestation

  2. Enforce the secure boot process

  3. Reset the motherboard's TPM chip

  4. Reinstall the OS with Known-good media

  5. Configure custom anti malware rules

In: Computer Science