In: Computer Science
What are the pattern elements for the Facade Design Pattern?
In: Computer Science
Articles which explain the importance of information security in achieving organisational goals and objectives
In: Computer Science
Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical Men, Inc., and you are working on designs for the following robots:
(a) A delivery robot that will carry supplies to different departments in a hospital.
(b) A supply robot that will carry heavy loads across loose soil and sand.
(c) A security robot that has to secure a wooded, hilly, area.
(d) A butler robot that will greet guests in a home and bring them drinks.
For each robot, describe what sensors you will equip it with, justifying your choices. Remember that, despite its monopoly, U.S. Robots and Mechanical Men, Inc. is a business, so you need to think carefully about the cost/benefit ratio of the sensors
In: Computer Science
• Local Security Policies Use Local Security Policy to administer security settings of a single Windows machine (either client or server).
Please provide step by step screen shots so I can see how it is done, and i will try it on my side.
Thank you
In: Computer Science
Normalization
This is a Database Development problem. Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)
Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.
Business Rules:
1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.
2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.
3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.
4. An attorney can only accept cases in their currently assigned department.
5. A client can have many open cases with our law firm at any one time.
6. Each client’s case is assigned to an attorney who specializes in that case’s form of law
In: Computer Science
NOTE: The first three are rules and do not have to be solved. Just there for the master theorem.
Master Theorem. Let T(n) = aT(n/b) + f(n) for some constants a ≥ 1, b > 1.
(Rule 1). If f(n) = O(n logb a− ) for some constant > 0, then T(n) = Θ(n logb a ).
(Rule 2). If f(n) = Θ(n logb a ), then T(n) = Θ(n logb a log n).
(Rule 3). If f(n) = Ω(n logb a+ ) for some constant > 0, and af(n/b) ≤ cf(n) for some constant c < 1, for all large n, then T(n) = Θ(f(n)).
1. Consider the recurrences: T(n) = 2T(n/2) + n log n. Either solve it using the Master method as given above, or explain why it can’t be solved using the Master method. If it can not be solved using Master method, use Recurrence tree method to solve it. Show your steps. If you use extended version of Master theorem to solve the same problem, does the solution thus obtained agree with the solution obtained by recurrence method?
In: Computer Science
Use C++ language Create a program which will ask the user to input three songs for a playlist (you may use TV shows or movies, if you prefer). Declare three strings to store each of the songs. Use getline to receive the input. Display output which lists each of the songs (or movies or tv shows), on separate lines, with a title on the first line: My Playlist. Insert three lines of comments at the beginning of the program for your name, today's date, and my playlist on the third line.
In: Computer Science
Create an application using PyQt. The user must be prompted for
the name of a country
(e.g. Spain) and a single character (e.g ‘a’). The application must
read the name of the
country and count the number of occurrences of the character in the
country name. The
count should be case-insensitive. Thus, if ‘c’ is entered as the
character then both capital
letter ‘C’ and small letter ‘c’ in the string should be counted.
The count must be displayed.
The application interface must include at least a label, an edit
and a button. You are
welcome to enhance your application with comments and messages.
In: Computer Science
Problem 1 Write a Java program that implements a two-dimensional array of grades for students in a class. The grades should be as follows: Row 1: 87, 45 Row 2: 69, 88, 90, 94 Row 3: 79, 87, 94 Compute and print out the maximum number of columns in the array. Hint: use a for loop. (5 Points.) */ /* Problem 2 * Suppose there are 4 candidates in 6 districts running for an election. Let's assume the candidates' names are: Jane, Amani, Doe, and Macbeth. Your task is to print out: 1) the total votes per candidate, and 2) the total votes per district. Here are some hints: 1) Create a two-dimensional array of type int and name it ballots. int [][] ballots = { }. Fill it with votes. Remember, you are going to have four columns and six rows. 2) Create the candidates as follows: String [] candidates = { } and assign them names. 3) Create an object reference to hold the tally for the votes. 4) Use a for loop to print the totals for candidates. 5) Use a for loop to print the totals for districts. Your output should look like: Total votes per candidate Jane x Amani x Doe x Macbeth x Total votes per district 1 x 2 x 3 x 4 x 5 x 6 x * (10 Points.)
In: Computer Science
Write the following assembly code file into C code.
.globl main
.text
main:
# Tests simple looping behaviour
li t0, 60
li t1, 0
loop:
addi t1, t1, 5
addi t0, t0, -1
bne t1, t0, loop
bne t1, zero, success
failure:
li a0, 0
li a7, 93 # a7 is what determines which system call we
are calling and we what to call write (64)
ecall # actually issue the call
success:
li a0, 42
li a7, 93
ecall
In: Computer Science
In your citations, include the following:
In: Computer Science
HTML
7.20
A palindrome is a number or a text phrase that reads the same backward and forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611. Write a script that reads in a five-digit integer and determines whether it’s a palindrome. If the number is not five digits long, display an alert dialog indicating the problem to the user. Allow the user to enter a new value after dismissing the alert dialog. [Hint: It’s possible to do this exercise with the techniques learned in this chapter. You’ll need to use both division and remainder operations to “pick off” each digit.]
In: Computer Science
In: Computer Science
Create a program that asks the user for two positive integers. If the user's input for either integer is not positive (less than or equal to 0), re-prompt the user until a positive integer is input. You may assume that all inputs will be integers.
Print out a list, ascending from 1, of all divisors common to both integers. Then, print out a message stating whether or not the numbers are "relatively prime" numbers. Two positive integers are considered relatively prime if, and only if, the only common divisor they have is 1.
For example, if the user inputs 8 and 12 the output should be:
Common divisors of 8 and 12:
1
2
4
8 and 12 are not relatively prime.
If the user inputs 8 and 9, on the other hand, the output should be:
Common divisors of 8 and 9:
1
8 and 9 are relatively prime.
Starter Code:-
import java.util.Scanner;
public class RelativelyPrime {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in); //Scanner to get user
input
//TODO
//Complete the program
}
}
In: Computer Science