Questions
C++ Define a MyDate class to represent a data that has 3 data members: day, month,...

C++
Define a MyDate class to represent a data that has 3 data members: day, month, year. The class should have: A default constructor to initialize the day, month, and year to 0. A constructor that accepts three integers as arguments to initialize the day, month, and year if the three arguments are valid. A copy constructor that accepts a reference to a MyDate object as argument. This constructor use the argument's three data fields to initialize the day, month, and year. Overload the operator + : this function adds a number of days to the calling object and return the result date. Overload the operator -: this function accepts a MyDate object as argument. It calculates the number of days difference between the calling object and the argument object. Overload the operator -: this function subtract a number of days to the calling object and return the result date. Overload the opertor ==: this function accepts a MyDate object as argument. It compares the calling object with the argument object and returns true if they are the same date, otherwise, the function returns false. Friend function to overload operator >>: this function accepts an istream object and a MyDate object as argument. In this function, it get the day, month, and year as input and returns a MyDate object. Friend function to overload operator <<: this function accepts an ostream object and a MyDate object as argument. In this function, it displays the day, month, and year of the MyDate object in mm/dd/yyyy format.

In: Computer Science

Compare and contrast OSI and TCP/IP network models. Differentiate between same-layer interactions and adjacent-layer interactions in...

  1. Compare and contrast OSI and TCP/IP network models.
  2. Differentiate between same-layer interactions and adjacent-layer interactions in network models (applicable for both TCP/IP and OSI models), and specify why each type of interaction is required in networking.
  3. Explain what is data encapsulation and why is it required in computer networking.
  4. Convert the following physical and logical addresses to the required formats:
    • MAC Address: AD:6F:23:4C:9B:EE to the equivalent binary
    • IP Address: 11000000.10010001.00011010.00000100 to the equivalent decimal

In: Computer Science

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System Quiz Questions a....

Case Project 4-1: Using an E-mail Address to Determine a Network’s Operating System

Quiz Questions

a. What tools might you use after learning Mike’s e-mail address?

b. What can you determine by entering Mike’s e-mail address into Google? What about just the handle “vetman2601”?

c. Could the information you learned from Google be used to conduct vulnerability testing?

d. Write a memo to the IT manager, Bob Jones, about the potential issues with running a old RHEL 5.8 server, and mention the importance of patch hygiene. Make sure your memo explains how you gathered this information and offers constructive feedback. Your memo shouldn’t point a finger at any company employees; it should discuss problems on a general level.

In: Computer Science

List the 3 strategies for Cyberethics dilemmas

List the 3 strategies for Cyberethics dilemmas

In: Computer Science

SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic...

  1. SARS-CoV-2 genomic variations: Samples of this virus from various geographical locations display variations in the genomic sequences. There are several hundred such sequences at GenBank, as linked in the References. Here are two examples:    Wuhan-Hu-1: https://www.ncbi.nlm.nih.gov/nuccore/NC_045512.2?report=GenBank    U.S.A.: https://www.ncbi.nlm.nih.gov/nuccore/MN985325.1
    • Download the sequences Wuhan-Hu-1 and U.S.A in FASTA format.
    • Write a Python program that reads these files and saves the sequences as strings.
    • Your program should compare the nucleotide sequences and print out the the locations (indecies) where they differ and the differences. Note that these sequences are of different lengths; compare them only upto the length of the shorter one.

In: Computer Science

Create a java program that allows people to buy tickets to a concert. Using java create...

Create a java program that allows people to buy tickets to a concert. Using java create a program that asks for the users name, and if they want an adult or teen ticket. As long as the user wants to purchase a ticket the program with "yes" the program will continue. When the user inputs "no" the program will output the customer name, total amount of tickets, and the total price.

The adult ticket is $60 and the child ticket is $30.

In: Computer Science

Hi, i would like to know how to get information of an 'image' and put it...

Hi, i would like to know how to get information of an 'image' and put it on 'C programming'

I would also like to know how to compress the image information and decompress it.

In: Computer Science

I'm trying to convert between different number representations in C++ , I have the prototype but...

I'm trying to convert between different number representations in C++ , I have the prototype but im not sure what do do from here

bool convert2(int & n, const string & bits);
bits should have size exactly 5, and each char of bits should be '0' or '1'; otherwise
return false.
If bits is ok, set n to the number that bits represents as a 2's complement number and
return true.
For example, convertU(n, "10011") should set n to -13 and return true.

In: Computer Science

What is the broadband communication system and how broadband network support quality of service (Qos)? no...

What is the broadband communication system and how broadband network support quality of service (Qos)? no hand writing plz

In: Computer Science

In a well-developed inital post, walk your classmates through the process as you conducted your search....

In a well-developed inital post, walk your classmates through the process as you conducted your search.

Then explain what insights you has as you reviewed the reference page of your source.


In a well-developed post, what is the process of conducting a research on a specific topic.

In: Computer Science

How many key comparisons are made by mergesort in the a. Best case? b. Worst Case?

How many key comparisons are made by mergesort in the

a. Best case?

b. Worst Case?

In: Computer Science

Why would you want to use grouping in a query? Explain.

Why would you want to use grouping in a query? Explain.

In: Computer Science

Use a For loop to compute the sum of all the odd numbers from 1 through...

  1. Use a For loop to compute the sum of all the odd numbers from 1 through 99. Your result should be labeled, and the value should be 2500.
  2. Print your name 7 times using a While loop.
  3. String dogNames[ ] = {"Sam","Buster","Fido","Patches","Gromit","Flicka"};
    Using the array defined here, print the values of the array vertically and horizontally using one For-Each loop.
  4. Reverse the logic for zyBook Challenge activity 4.6.1 (Nested loops: Indent text) so that the first line is indented userNum number of spaces and the subsequent lines are each indented one less space until the last value is not indented at all (‘s’ indicates one space):
    sssss5
    ssss4
    sss3
    ss2
    s1
    0
  5. String method practice:
    • Create a String variable that contains your full name
    • Repeat the following steps 5 times (note you will use predefined String methods to modify your name as indicated):
      • Generate a random number between 1 and 4
      • If number is 1, display your name in all upper case
      • If number is 2, display your name in all lower case
      • If number is 3, replace your first name with “Three” and display your name
      • If number is 4, display the character at index 4

In: Computer Science

Create a class named TestLease whose main() method declares four Lease objects. Call a getData() method...

Create a class named TestLease whose main() method declares four Lease objects. Call a getData() method three times. Within the method, prompt a user for values for each field for a Lease, and return a Lease object to the main() method where it is assigned to one of main()’s Lease objects.

Do not prompt the user for values for the fourth Lease object, but let it continue to hold the default values. Then, in main(), pass one of the Lease objects to a showValues() method that displays the data.

Then call the addPetFee() method using the passed Lease object and confirm that the fee explanation statement is displayed. Next, call the showValues() method for the Lease object again and confirm that the pet fee has been added to the rent.

Finally, call the showValues() method with each of the other three objects; confirm that two hold the values you supplied as input and one holds the constructor default values. Save the application as TestLease.java.

In: Computer Science

SQL This assignment aligns with the following objectives: Create a relational database containing at least three...

SQL

This assignment aligns with the following objectives:

  • Create a relational database containing at least three tables
  • Populate the database using the INSERT command
  • Create integrity constraints on the tables created

Deli has hired you as a consultant to design a database for the deli. They have provided you with the following information:

  • Every employee has a social security number, name, salary, and date of hire.
  • The deli is organized into several departments. Each department has a unique name.
  • Each department has exactly one employee as its manager but an employee may manage more than one department. The database should record the date when the most recent manager of each dept. was appointed in that position.
  • very employee must be assigned a department.
  • Every employee has a supervisor who need not be the manager of any department.

The deli has these four departments:

  1. hot foods
  2. sandwich
  3. snacks
  4. beverage

You are provided the following additional information, which should be inserted into the database using SQL queries (not using any GUI interfaces, such as PhpMyAdmin):

  • Jim Jones (ssn: 134-56-8877, salary: $28,000, dept:hot foods, date of hire: 1/26/2015, supervisor: Rita Bita)
  • Rita Bita (ssn: 138-56-8050, salary: $32,000, dept: beverages, date of hire: 2/15/2017, supervisor: Holly Dew. manages: beverages, starting 3/18/2018)
  • Holly Dew (ssn: 334-55-8877, salary: $29,000, dept:sandwich, date of hire: 1/15/2016, supervisor: Pablo Escobar)
  • Pablo Escobar (ssn: 666-56-6666, salary: $48,000, dept:snacks, date of hire: 1/26/2014, supervisor: Rita Bita, manages: snacks, starting 5/5/2015)
  • Al Capone (ssn: 888-91-8870, salary: $40,000, dept:hot foods, date of hire: 1/26/2015, supervisor: Pablo Escobar, manages: hot foods, starting 1/1/2016)
  • Bonnie Clyde (ssn: 111-22-3333, salary: $42,000, dept: sandwiches, date of hire: 4/7/2015, supervisor: Al Capone, manages: sandwich, starting 1/1/2016)

Helpful Hints:

Please do not assume that the database should be structured in the way this data is provided. Your database should be structured such that constraints such as “Each dept. has exactly one employee as a manager” can be enforced.

There should not be a separate table for Deli – the entire database represents the deli. There should be a table for each major entity mentioned in the specifications. Relations between entities (such as, who works in which department) should be their own tables. Primary keys for each table should be chosen to enforce constraints.

In: Computer Science