Sort the given keys using Counting sort algorithm. Also write the algorithm.
5, 2, 3, 1, 0, 2, 1, 5, 0
In: Computer Science
I need this Java code transform to Python Code
PROGRAM:
import java.util.Scanner;
public class Main
{
static int count=0;
int calculate(int row, int column)
{
count++;
if(row==1&&column==1)
{
return 0;
}
else if(column==1)
{
return ((200+calculate(row-1,column))/2);
}
else if(column==row)
{
return (200+calculate(row-1,column-1))/2;
}
else
{
return
((200+calculate(row-1,column-1))/2)+((200+calculate(row-1,column))/2);
}
}
public static void main(String[] args)
{
int row,column,weight;
Main m=new Main();
System.out.println("Welcome to the Human pyramid. Select a row
column combination and i will tell you how much weight the person
is supporting");
System.out.println("Please type your selection for Row and
Column");
Scanner scan=new Scanner(System.in);
row=scan.nextInt();
column=scan.nextInt();
if(row==0 && column==0)
{
System.out.println("Thanks for playing Human Pyramid. Don't let me
down.");
System.exit(0);
}
if(row==0 || column==0)
{
System.out.println("Wrong option");
System.exit(0);
}
weight=m.calculate(row,column);
System.out.println("Person at ("+row+","+column+") is supporting
"+weight+" pounds");
System.out.println("Recursive function is called "+count+"
times");
}
}
In: Computer Science
i) Pen down the algorithm for Radix sort.
ii) What is the complexity of Radix sort?
iii) Give any 2 real time examples of Radix sort.
In: Computer Science
Using the Boyer-Moore algorithm, find the Bad Match table for the below patterns.
i) Pattern1: AABCACCCA
ii) Pattern 2: CCCAAABBD
iii) Pattern3: ABCABCBAD
iv) Pattern4: BSDGSBAA
In: Computer Science
Show the decimal integer -126 in 8-bit sign magnitude, one's complement, two's complement and excess-127 respectively in the given order, separated by comma.
In: Computer Science
Describe in detail five main images of the Android OS. Be sure to define what each part does for the overall OS.
In: Computer Science
convert 0xC2000000 into IEEE-754 single precision decimal format.
In: Computer Science
Explain in at least a paragraph
In: Computer Science
Answer these questions :
brief answers !!!!!!
adding examples in your report, such as iPhone x, Nexus 5, etc
__________________________________________________________________________________________
• Briefly describe various broadband Internet
connections
• Describe the purpose of an IP address and its
relationship to a domain name
• Describe features of browsers and identify the
components of a web address
• Describe ways to compose effective search text
• Explain benefits and risks of using online social
networks
• Describe uses of various types of websites
• Explain how the web uses graphics, animation,
audio, video, and virtual reality
• Explain how email, email lists, Internet messaging,
chat rooms, online discussions, VoIP, and FTP
work
• Identify the rules of netiquette
In: Computer Science
This is a ruby program, thank you Given a set of random integer numbers in a user-defined range, count the number of occurrences of each integer, and generate a histogram using # characters. The input and output of your program should match the following in format:
$ ./histogram.rb
How many random integer numbers do you want to generate?
10
Please input the maximum value for the random numbers:
9
The frequency of 1 | #
The frequency of 2 |#
The frequency of 3 |###
The frequency of 4 |#
The frequency of 6 |##
The frequency of 7 |###
The frequency of 8 |##
The frequency of 9 |####
Prompt the user to input the number of random integers to generate. Prompt the user to input the maximum value for the random integers. The minimum will always be 1 and the numbers generated should include the maximum value. Use the rand method available in Kernel to generate random numbers in a given range. The documentation for Random#rand is a bit more detailed than Kernel#rand, but it is the same method. Force the user input to be read from the line following the prompt in both cases. You must use an Array of the appropriate size to store the randomly generated numbers. In other words, if they ask for 50 random numbers, size the Array at 50. You must use a hash to store the frequency of each random number that is generated. HINT: Use a counting Hash. Do not generate lines in the histogram for numbers that are not found in the Array; note that there are no lines shown below for 5, 10, 16, and others. The numbers represented in the histogram should be in sorted order (low to high) when displayed. You must use an iterator method (which requires a code block) at least once in the program to iterate over the Array or the Hash (or both).
This is a ruby program, thank you
In: Computer Science
Business Case
Your company needs to conduct an analysis of a large dataset that is 10 times bigger than the size of a hard drive of your most powerful computer. This dataset contains data about ATM transactions. The security team has provided a smaller dataset of suspicious transactions. Your task is to identify transactions similar to suspicious ones.
Directions
explain which parallel computing techniques would be appropriate for this case and why. Explain which component of Hadoop ecosystem may be used in this case, and why.
Example of parallel computing could be (distributed calculations vs. MapReduce) or others
key principles of Apache Hadoop environment (Hive, Spark, Pig, etc.) or others
In: Computer Science
C++
The program you write for this lab will read in the number of nodes and a binary relation representing a graph. The program will create an adjacency matrix from the binary relation. The program will then print the following :
1. The adjacency matrix
2. Determine if there are any isolated nodes and print them
3. Determine if an Euler path exists and said so.
The sample run of the program is as follows. The output should just like this: It starts by asking the user to input the number of nodes, then ask the user to input the adjacency relation and then print out the adjacency matrix first, followed by the node that is isolated and then tells the user if an Euler path exist or not.
This is how the program should run and output
Please input the number of nodes:
6
Please input the adjacency relation:
{(1,2),(1,5),(2,1),(2,3),(3,2),(3,4),(4,3),(4,5),(5,1),(5,4)}
The Adjacency matrix is:
0 1 0 0 1 0
1 0 1 0 0 0
0 1 0 1 0 0
0 0 1 0 1 0
1 0 0 1 0 0
0 0 0 0 0 0
6 is an isolated node
An Euler path does exist in the
graph.
In: Computer Science
answer the questions :
Brief answers
adding examples in your report, such as iPhone x, Nexus 5, etc
_____________________________________
Define the term, digital security risks, and briefly
describe the types of cybercriminals
• Describe various types of Internet and network attacks,
and explain ways to safeguard against these attacks
• Discuss techniques to prevent unauthorized computer
access and use
• Explain the ways that software manufacturers protect
against software piracy
• Discuss how encryption, digital signatures, and digital
certificates work
• Identify safeguards against hardware theft,
vandalism, and failure
• Explain options available for backing up
• Identify risks and safeguards associated with
wireless communications
• Recognize issues related to information accuracy,
intellectual property rights, codes of conduct, and
green computing
• Discuss issues surrounding information privacy
• A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability
• Any illegal act involving the use of a computer or
related devices generally is referred to as a
computer crime
• A cybercrime is an online or Internet-based illegal
act
In: Computer Science
e ECPA extends the protections (from governmental monitoring) of the Omnibus Crime Control and Safe Streets Act to:
This act is now 33 years old. Is it still adequate to protect electronic communications from unwarranted snooping? What additional protections are required as we approach 2020 given the advances we have seen in technology?
In: Computer Science
convert 0xC2000000 into IEEE-754 single precision decimal format.
In: Computer Science