Questions
In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that...

In the simplex algorithm can you have a degenerate pivot without cycling occuring? I know that Bland's rule prevents cycling but what about degenrate pivots? Or are degenerate pivots the same as cycling?

Also, when a variables leaves the tableau im assuming it cant come back the tableau for bland's?

In: Computer Science

What are the pattern elements for the Facade Design Pattern?

What are the pattern elements for the Facade Design Pattern?

In: Computer Science

Articles which explain the importance of information security in achieving organisational goals and objectives

Articles which explain the importance of information security in achieving organisational goals and objectives

In: Computer Science

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical...

Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical Men, Inc., and you are working on designs for the following robots:

(a) A delivery robot that will carry supplies to different departments in a hospital.

(b) A supply robot that will carry heavy loads across loose soil and sand.

(c) A security robot that has to secure a wooded, hilly, area.

(d) A butler robot that will greet guests in a home and bring them drinks.

For each robot, describe what sensors you will equip it with, justifying your choices. Remember that, despite its monopoly, U.S. Robots and Mechanical Men, Inc. is a business, so you need to think carefully about the cost/benefit ratio of the sensors

In: Computer Science

Use 2012SERVERA VM. Depending on whether you want to change the security of a single system...

  1. Use 2012SERVERA VM.
  2. Depending on whether you want to change the security of a single system or multiple systems, use the Start screen and type either Local Security Policy or Group Policy to launch the appropriate tool. If you are on a server, you can also use the Tools menu in Server Manager to launch the appropriate tool:

• Local Security Policies Use Local Security Policy to administer security settings of a single Windows machine (either client or server).

    1. Group Policy Management Console Use the Group Policy Management Console to administer policies on the network that apply to multiple systems.
  1. In the Start screen, type Local and then launch the Local Security Policy.
  2. Under Security Settings (on the left), expand Local Policies and then select User Rights Assignment.
  3. To allow the Authors group to back up files, double-click the “Back up files and directories” policy at right. List who currently has the right to do backups: _____________________________________________________________________ _____________________________________________________________________
  4. Click the “Add User or Group” button and add Authors to the list of those who can do backups.
  5. Choose OK and then close the policies window.

Please provide step by step screen shots so I can see how it is done, and i will try it on my side.

Thank you

In: Computer Science

Normalization This is a Database Development problem.  Go through all the steps and process of normalization. Do...

Normalization

This is a Database Development problem.  Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)

Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.

Business Rules:

1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.

2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.

3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.

4. An attorney can only accept cases in their currently assigned department.

5. A client can have many open cases with our law firm at any one time.

6. Each client’s case is assigned to an attorney who specializes in that case’s form of law

In: Computer Science

NOTE: The first three are rules and do not have to be solved. Just there for...

NOTE: The first three are rules and do not have to be solved. Just there for the master theorem.

Master Theorem. Let T(n) = aT(n/b) + f(n) for some constants a ≥ 1, b > 1.

(Rule 1). If f(n) = O(n logb a− ) for some constant > 0, then T(n) = Θ(n logb a ).

(Rule 2). If f(n) = Θ(n logb a ), then T(n) = Θ(n logb a log n).

(Rule 3). If f(n) = Ω(n logb a+ ) for some constant > 0, and af(n/b) ≤ cf(n) for some constant c < 1, for all large n, then T(n) = Θ(f(n)).

1. Consider the recurrences: T(n) = 2T(n/2) + n log n. Either solve it using the Master method as given above, or explain why it can’t be solved using the Master method. If it can not be solved using Master method, use Recurrence tree method to solve it. Show your steps. If you use extended version of Master theorem to solve the same problem, does the solution thus obtained agree with the solution obtained by recurrence method?

In: Computer Science

Use C++ language Create a program which will ask the user to input three songs for...

Use C++ language Create a program which will ask the user to input three songs for a playlist (you may use TV shows or movies, if you prefer). Declare three strings to store each of the songs. Use getline to receive the input. Display output which lists each of the songs (or movies or tv shows), on separate lines, with a title on the first line: My Playlist. Insert three lines of comments at the beginning of the program for your name, today's date, and my playlist on the third line.

In: Computer Science

Create an application using PyQt. The user must be prompted for the name of a country...

Create an application using PyQt. The user must be prompted for the name of a country
(e.g. Spain) and a single character (e.g ‘a’). The application must read the name of the
country and count the number of occurrences of the character in the country name. The
count should be case-insensitive. Thus, if ‘c’ is entered as the character then both capital
letter ‘C’ and small letter ‘c’ in the string should be counted. The count must be displayed.
The application interface must include at least a label, an edit and a button. You are
welcome to enhance your application with comments and messages.

In: Computer Science

Problem 1 Write a Java program that implements a two-dimensional array of grades for students in...

Problem 1
        Write a Java program that implements a two-dimensional array of grades
        for students in a class. The grades should be as follows:
        Row 1: 87, 45
        Row 2: 69, 88, 90, 94
        Row 3: 79, 87, 94
        
        Compute and print out the maximum number of columns in the array.
        Hint: use a for loop.
        
   (5 Points.)
*/

/*      Problem 2
*       Suppose there are 4 candidates in 6 districts running for an election.
    Let's assume the candidates' names are: Jane, Amani, Doe, and Macbeth.
        Your task is to print out: 1) the total votes per candidate, and 2) the
        total votes per district.
        
        Here are some hints:
        1) Create a two-dimensional array of type int and name it ballots.
         int [][] ballots = { }. Fill it with votes. Remember, you are going to have
         four columns and six rows.
         
        2) Create the candidates as follows: String [] candidates = { } and
        assign them names.
        
        3) Create an object reference to hold the tally for the votes.
        
        4) Use a for loop to print the totals for candidates. 
        
        5) Use a for loop to print the totals for districts.
        
        Your output should look like:
        Total votes per candidate
        Jane
        x
        
        Amani
        x
        
        Doe
        x
        
        Macbeth
        x
        
        Total votes per district
        1
        x
        
        2
        x
        
        3
        x
        
        4
        x
        
        5
        x
        
        6
        x
*       (10 Points.)

In: Computer Science

Write the following assembly code file into C code. .globl main .text main:    # Tests...

Write the following assembly code file into C code.

.globl main
.text
main:
   # Tests simple looping behaviour
   li t0, 60
   li t1, 0
loop:
   addi t1, t1, 5
   addi t0, t0, -1
   bne t1, t0, loop
   bne t1, zero, success
failure:
   li a0, 0
   li a7, 93 # a7 is what determines which system call we are calling and we what to call write (64)
    ecall # actually issue the call
  
success:
   li a0, 42
   li a7, 93
   ecall
  

In: Computer Science

Cite an instance when you should consider "making" new technology Cite an instance when you should...

  1. Cite an instance when you should consider "making" new technology
  2. Cite an instance when you should consider "buying" new technology
  3. Cite an instance when you should consider "modifying" existing technologies to create a new one.

In your citations, include the following:

  1. What technology do you wish to develop?
  2. What are the resources available or lacking which would make consider this option?  

In: Computer Science

HTML 7.20 A palindrome is a number or a text phrase that reads the same backward...

HTML

7.20

A palindrome is a number or a text phrase that reads the same backward and forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611. Write a script that reads in a five-digit integer and determines whether it’s a palindrome. If the number is not five digits long, display an alert dialog indicating the problem to the user. Allow the user to enter a new value after dismissing the alert dialog. [Hint: It’s possible to do this exercise with the techniques learned in this chapter. You’ll need to use both division and remainder operations to “pick off” each digit.]

In: Computer Science

Matrix Multiplication with Threads - C/C++ **Please read entire question before answering** **Please don't copy /...

Matrix Multiplication with Threads - C/C++

**Please read entire question before answering**
**Please don't copy / paste code**

In this assignment you will use the Pthreads library to write a program that multiplies two square arrays and compare the difference between the imperative and parallel implementations of this algorithm.

Use the matrix mulltiplication algorithm.

Write a program that contains three functions:

(1) A function that has an integer as a parameter and returns a pointer to square array of integers (i.e. both dimensions should be equal). The function should allocate storage from the heap and randomly fill that dynamically allocated array.

(2) A function that uses the algorithm described above to compute the matrix square of an array. It should be passed a pointer to an array of integers and an integer defining the dimensions of the array. It should return a pointer to the array containing the product.

(3) A function that uses pthreads to compute the matrix square of an array. This function should have the same parameters and return values of the previous function

The main() function in your program needs to use these functions to compute the square of matrices with 100, 500, 1000, 5000, and 10000 integers
Assume that the values used for the size of these square arrays will always be even.

My suggestion is to think about dividing each array into smaller and smaller pieces until you reach some reasonably small size. At that point multiply the matrices using the iterative algorithm.

In: Computer Science

Create a program that asks the user for two positive integers. If the user's input for...

Create a program that asks the user for two positive integers. If the user's input for either integer is not positive (less than or equal to 0), re-prompt the user until a positive integer is input. You may assume that all inputs will be integers.

Print out a list, ascending from 1, of all divisors common to both integers. Then, print out a message stating whether or not the numbers are "relatively prime" numbers. Two positive integers are considered relatively prime if, and only if, the only common divisor they have is 1.

For example, if the user inputs 8 and 12 the output should be:

Common divisors of 8 and 12:

1

2

4

8 and 12 are not relatively prime.

If the user inputs 8 and 9, on the other hand, the output should be:

Common divisors of 8 and 9:

1

8 and 9 are relatively prime.

Starter Code:-

import java.util.Scanner;

public class RelativelyPrime {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in); //Scanner to get user input
  
//TODO
//Complete the program
  
}
}

In: Computer Science