Questions
Sort the given keys using Counting sort algorithm. Also write the algorithm. 5, 2, 3, 1,...

Sort the given keys using Counting sort algorithm. Also write the algorithm.

5, 2, 3, 1, 0, 2, 1, 5, 0  

In: Computer Science

I need this Java code transform to Python Code PROGRAM: import java.util.Scanner; public class Main {...

I need this Java code transform to Python Code

PROGRAM:

import java.util.Scanner;
public class Main
{
static int count=0;
int calculate(int row, int column)
{
count++;
if(row==1&&column==1)
{
return 0;
}
else if(column==1)
{
return ((200+calculate(row-1,column))/2);
}
else if(column==row)
{
return (200+calculate(row-1,column-1))/2;
}
else
{
return ((200+calculate(row-1,column-1))/2)+((200+calculate(row-1,column))/2);
}
  
}
public static void main(String[] args)
{
int row,column,weight;
Main m=new Main();
System.out.println("Welcome to the Human pyramid. Select a row column combination and i will tell you how much weight the person is supporting");
System.out.println("Please type your selection for Row and Column");
Scanner scan=new Scanner(System.in);
row=scan.nextInt();
column=scan.nextInt();
if(row==0 && column==0)
{
System.out.println("Thanks for playing Human Pyramid. Don't let me down.");
System.exit(0);
}
if(row==0 || column==0)
{
System.out.println("Wrong option");
System.exit(0);
}
weight=m.calculate(row,column);
System.out.println("Person at ("+row+","+column+") is supporting "+weight+" pounds");
System.out.println("Recursive function is called "+count+" times");
}
}

In: Computer Science

i) Pen down the algorithm for Radix sort. ii) What is the complexity of Radix sort?...

i) Pen down the algorithm for Radix sort.

ii) What is the complexity of Radix sort?

iii) Give any 2 real time examples of Radix sort.

In: Computer Science

Using the Boyer-Moore algorithm, find the Bad Match table for the below patterns.    i) Pattern1:   AABCACCCA...

Using the Boyer-Moore algorithm, find the Bad Match table for the below patterns.   

i) Pattern1:   AABCACCCA

ii) Pattern 2: CCCAAABBD

iii) Pattern3:  ABCABCBAD

iv) Pattern4:   BSDGSBAA

In: Computer Science

Show the decimal integer -126 in 8-bit sign magnitude, one's complement, two's complement and excess-127 respectively...

Show the decimal integer -126 in 8-bit sign magnitude, one's complement, two's complement and excess-127 respectively in the given order, separated by comma.

In: Computer Science

Describe in detail five main images of the Android OS. Be sure to define what each...

Describe in detail five main images of the Android OS. Be sure to define what each part does for the overall OS.

In: Computer Science

convert 0xC2000000 into IEEE-754 single precision decimal format.

convert 0xC2000000 into IEEE-754 single precision decimal format.

In: Computer Science

Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...

Explain in at least a paragraph

  • What are the risks associated with a pervasive security infrastructure?
  • What are the reasons for NOT having such infrastructure?
  • What are the alternatives?

In: Computer Science

Answer these questions : brief answers !!!!!! adding examples in your report, such as iPhone x,...

Answer these questions :

brief answers !!!!!!

adding examples in your report, such as iPhone x, Nexus 5, etc

__________________________________________________________________________________________

• Briefly describe various broadband Internet
connections


• Describe the purpose of an IP address and its
relationship to a domain name


• Describe features of browsers and identify the
components of a web address
• Describe ways to compose effective search text


• Explain benefits and risks of using online social
networks


• Describe uses of various types of websites


• Explain how the web uses graphics, animation,
audio, video, and virtual reality


• Explain how email, email lists, Internet messaging,
chat rooms, online discussions, VoIP, and FTP
work


• Identify the rules of netiquette

In: Computer Science

This is a ruby program, thank you Given a set of random integer numbers in a...

This is a ruby program, thank you Given a set of random integer numbers in a user-defined range, count the number of occurrences of each integer, and generate a histogram using # characters. The input and output of your program should match the following in format:

$ ./histogram.rb

How many random integer numbers do you want to generate?

10

Please input the maximum value for the random numbers:

9

The frequency of 1 | #

The frequency of 2 |#

The frequency of 3 |###

The frequency of 4 |#

The frequency of 6 |##

The frequency of 7 |###

The frequency of 8 |##

The frequency of 9 |####

Prompt the user to input the number of random integers to generate. Prompt the user to input the maximum value for the random integers. The minimum will always be 1 and the numbers generated should include the maximum value. Use the rand method available in Kernel to generate random numbers in a given range. The documentation for Random#rand is a bit more detailed than Kernel#rand, but it is the same method. Force the user input to be read from the line following the prompt in both cases. You must use an Array of the appropriate size to store the randomly generated numbers. In other words, if they ask for 50 random numbers, size the Array at 50. You must use a hash to store the frequency of each random number that is generated. HINT: Use a counting Hash. Do not generate lines in the histogram for numbers that are not found in the Array; note that there are no lines shown below for 5, 10, 16, and others. The numbers represented in the histogram should be in sorted order (low to high) when displayed. You must use an iterator method (which requires a code block) at least once in the program to iterate over the Array or the Hash (or both).

This is a ruby program, thank you

In: Computer Science

Business Case Your company needs to conduct an analysis of a large dataset that is 10...

Business Case

Your company needs to conduct an analysis of a large dataset that is 10 times bigger than the size of a hard drive of your most powerful computer. This dataset contains data about ATM transactions. The security team has provided a smaller dataset of suspicious transactions. Your task is to identify transactions similar to suspicious ones.

Directions

explain which parallel computing techniques would be appropriate for this case and why. Explain which component of Hadoop ecosystem may be used in this case, and why.

Example of parallel computing could be (distributed calculations vs. MapReduce) or others

key principles of Apache Hadoop environment (Hive, Spark, Pig, etc.) or others

In: Computer Science

C++ The program you write for this lab will read in the number of nodes and...

C++

The program you write for this lab will read in the number of nodes and a binary relation representing a graph. The program will create an adjacency matrix from the binary relation. The program will then print the following :

1. The adjacency matrix
2. Determine if there are any isolated nodes and print them
3. Determine if an Euler path exists and said so.

The sample run of the program is as follows. The output should just like this: It starts by asking the user to input the number of nodes, then ask the user to input the adjacency relation and then print out the adjacency matrix first, followed by the node that is isolated and then tells the user if an Euler path exist or not.

This is how the program should run and output

Please input the number of nodes:
6
Please input the adjacency relation:
{(1,2),(1,5),(2,1),(2,3),(3,2),(3,4),(4,3),(4,5),(5,1),(5,4)}

The Adjacency matrix is:
0 1 0 0 1 0
1 0 1 0 0 0
0 1 0 1 0 0
0 0 1 0 1 0
1 0 0 1 0 0
0 0 0 0 0 0


6 is an isolated node
An Euler path does exist in the graph.

In: Computer Science

answer the questions : Brief answers adding examples in your report, such as iPhone x, Nexus...

answer the questions :

Brief answers

adding examples in your report, such as iPhone x, Nexus 5, etc

_____________________________________

Define the term, digital security risks, and briefly
describe the types of cybercriminals

• Describe various types of Internet and network attacks,
and explain ways to safeguard against these attacks

• Discuss techniques to prevent unauthorized computer
access and use

• Explain the ways that software manufacturers protect
against software piracy

• Discuss how encryption, digital signatures, and digital
certificates work


• Identify safeguards against hardware theft,
vandalism, and failure

• Explain options available for backing up

• Identify risks and safeguards associated with
wireless communications

• Recognize issues related to information accuracy,
intellectual property rights, codes of conduct, and
green computing
• Discuss issues surrounding information privacy

• A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability

• Any illegal act involving the use of a computer or
related devices generally is referred to as a
computer crime

• A cybercrime is an online or Internet-based illegal
act

In: Computer Science

e ECPA extends the protections (from governmental monitoring) of the Omnibus Crime Control and Safe Streets...

e ECPA extends the protections (from governmental monitoring) of the Omnibus Crime Control and Safe Streets Act to:

  • E-mail, cellular telephones, radio paging devices, private communication carriers, and computer transmissions.
  • Both storage and transmission of digitized textual information (email) and voice mail.
  • Customer records of electronic service providers.

This act is now 33 years old. Is it still adequate to protect electronic communications from unwarranted snooping? What additional protections are required as we approach 2020 given the advances we have seen in technology?

In: Computer Science

convert 0xC2000000 into IEEE-754 single precision decimal format.

convert 0xC2000000 into IEEE-754 single precision decimal format.

In: Computer Science