Questions
Show the decimal integer -126 in 8-bit sign magnitude, one's complement, two's complement and excess-127 respectively...

Show the decimal integer -126 in 8-bit sign magnitude, one's complement, two's complement and excess-127 respectively in the given order, separated by comma.

In: Computer Science

Describe in detail five main images of the Android OS. Be sure to define what each...

Describe in detail five main images of the Android OS. Be sure to define what each part does for the overall OS.

In: Computer Science

convert 0xC2000000 into IEEE-754 single precision decimal format.

convert 0xC2000000 into IEEE-754 single precision decimal format.

In: Computer Science

Explain in at least a paragraph What are the risks associated with a pervasive security infrastructure?...

Explain in at least a paragraph

  • What are the risks associated with a pervasive security infrastructure?
  • What are the reasons for NOT having such infrastructure?
  • What are the alternatives?

In: Computer Science

Answer these questions : brief answers !!!!!! adding examples in your report, such as iPhone x,...

Answer these questions :

brief answers !!!!!!

adding examples in your report, such as iPhone x, Nexus 5, etc

__________________________________________________________________________________________

• Briefly describe various broadband Internet
connections


• Describe the purpose of an IP address and its
relationship to a domain name


• Describe features of browsers and identify the
components of a web address
• Describe ways to compose effective search text


• Explain benefits and risks of using online social
networks


• Describe uses of various types of websites


• Explain how the web uses graphics, animation,
audio, video, and virtual reality


• Explain how email, email lists, Internet messaging,
chat rooms, online discussions, VoIP, and FTP
work


• Identify the rules of netiquette

In: Computer Science

This is a ruby program, thank you Given a set of random integer numbers in a...

This is a ruby program, thank you Given a set of random integer numbers in a user-defined range, count the number of occurrences of each integer, and generate a histogram using # characters. The input and output of your program should match the following in format:

$ ./histogram.rb

How many random integer numbers do you want to generate?

10

Please input the maximum value for the random numbers:

9

The frequency of 1 | #

The frequency of 2 |#

The frequency of 3 |###

The frequency of 4 |#

The frequency of 6 |##

The frequency of 7 |###

The frequency of 8 |##

The frequency of 9 |####

Prompt the user to input the number of random integers to generate. Prompt the user to input the maximum value for the random integers. The minimum will always be 1 and the numbers generated should include the maximum value. Use the rand method available in Kernel to generate random numbers in a given range. The documentation for Random#rand is a bit more detailed than Kernel#rand, but it is the same method. Force the user input to be read from the line following the prompt in both cases. You must use an Array of the appropriate size to store the randomly generated numbers. In other words, if they ask for 50 random numbers, size the Array at 50. You must use a hash to store the frequency of each random number that is generated. HINT: Use a counting Hash. Do not generate lines in the histogram for numbers that are not found in the Array; note that there are no lines shown below for 5, 10, 16, and others. The numbers represented in the histogram should be in sorted order (low to high) when displayed. You must use an iterator method (which requires a code block) at least once in the program to iterate over the Array or the Hash (or both).

This is a ruby program, thank you

In: Computer Science

Business Case Your company needs to conduct an analysis of a large dataset that is 10...

Business Case

Your company needs to conduct an analysis of a large dataset that is 10 times bigger than the size of a hard drive of your most powerful computer. This dataset contains data about ATM transactions. The security team has provided a smaller dataset of suspicious transactions. Your task is to identify transactions similar to suspicious ones.

Directions

explain which parallel computing techniques would be appropriate for this case and why. Explain which component of Hadoop ecosystem may be used in this case, and why.

Example of parallel computing could be (distributed calculations vs. MapReduce) or others

key principles of Apache Hadoop environment (Hive, Spark, Pig, etc.) or others

In: Computer Science

C++ The program you write for this lab will read in the number of nodes and...

C++

The program you write for this lab will read in the number of nodes and a binary relation representing a graph. The program will create an adjacency matrix from the binary relation. The program will then print the following :

1. The adjacency matrix
2. Determine if there are any isolated nodes and print them
3. Determine if an Euler path exists and said so.

The sample run of the program is as follows. The output should just like this: It starts by asking the user to input the number of nodes, then ask the user to input the adjacency relation and then print out the adjacency matrix first, followed by the node that is isolated and then tells the user if an Euler path exist or not.

This is how the program should run and output

Please input the number of nodes:
6
Please input the adjacency relation:
{(1,2),(1,5),(2,1),(2,3),(3,2),(3,4),(4,3),(4,5),(5,1),(5,4)}

The Adjacency matrix is:
0 1 0 0 1 0
1 0 1 0 0 0
0 1 0 1 0 0
0 0 1 0 1 0
1 0 0 1 0 0
0 0 0 0 0 0


6 is an isolated node
An Euler path does exist in the graph.

In: Computer Science

answer the questions : Brief answers adding examples in your report, such as iPhone x, Nexus...

answer the questions :

Brief answers

adding examples in your report, such as iPhone x, Nexus 5, etc

_____________________________________

Define the term, digital security risks, and briefly
describe the types of cybercriminals

• Describe various types of Internet and network attacks,
and explain ways to safeguard against these attacks

• Discuss techniques to prevent unauthorized computer
access and use

• Explain the ways that software manufacturers protect
against software piracy

• Discuss how encryption, digital signatures, and digital
certificates work


• Identify safeguards against hardware theft,
vandalism, and failure

• Explain options available for backing up

• Identify risks and safeguards associated with
wireless communications

• Recognize issues related to information accuracy,
intellectual property rights, codes of conduct, and
green computing
• Discuss issues surrounding information privacy

• A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability

• Any illegal act involving the use of a computer or
related devices generally is referred to as a
computer crime

• A cybercrime is an online or Internet-based illegal
act

In: Computer Science

e ECPA extends the protections (from governmental monitoring) of the Omnibus Crime Control and Safe Streets...

e ECPA extends the protections (from governmental monitoring) of the Omnibus Crime Control and Safe Streets Act to:

  • E-mail, cellular telephones, radio paging devices, private communication carriers, and computer transmissions.
  • Both storage and transmission of digitized textual information (email) and voice mail.
  • Customer records of electronic service providers.

This act is now 33 years old. Is it still adequate to protect electronic communications from unwarranted snooping? What additional protections are required as we approach 2020 given the advances we have seen in technology?

In: Computer Science

convert 0xC2000000 into IEEE-754 single precision decimal format.

convert 0xC2000000 into IEEE-754 single precision decimal format.

In: Computer Science

Complete the following method to return the median of three integers. Remember, you need to use...

Complete the following method to return the median of three integers. Remember, you need to use the names of the parameters as given in the method header. This is a return method, so you need to include return statement(s) NOT System.out.println.

JAVA PROGRAM

Exampe:

Method call Value returned
medof 5
medof 5
medof -2
medof 0

Method header:

public static int medof(int n1,int n2, int n3)

In: Computer Science

Program 1: Stay on the Screen!  Animation in video games is just like animation in movies –...

Program 1: Stay on the Screen!  Animation in video games is just like animation in movies – it’s drawn image by image (called “frames”).  Before the game can draw a frame, it needs to update the position of the objects based on their velocities (among other things).  To do that is relatively simple: add the velocity to the position of the object each frame.

For this program, imagine we want to track an object and detect if it goes off the left or right side of the screen (that is, it’s X position is less than 0 and greater than the width of the screen, say, 100).  Write a program that asks the user for the starting X and Y position of the object as well as the starting X and Y velocity, then prints out its position each frame until the object moves off of the screen.  Design (pseudocode) and implement (source code) for this program.

//////// WRITE IN PSEUDOCODE ////////

Sample run 1:

Enter the starting X position: 50

Enter the starting Y position: 50

Enter the starting X velocity: 4.7

Enter the starting Y velocity: 2

X:50    Y:50

X:54.7  Y:52

X:59.4  Y:54

X:64.1  Y:56

X:68.8  Y:58

X:73.5  Y:60

X:78.2  Y:62

X:82.9  Y:64

X:87.6  Y:66

X:92.3  Y:68

X:97    Y:70

X:101.7 Y:72

Sample run 2:

Enter the starting X position: 20

Enter the starting Y position: 45

Enter the starting X velocity: -3.7

Enter the starting Y velocity: 11.2

X:20    Y:45

X:16.3  Y:56.2

X:12.6  Y:67.4

X:8.9   Y:78.6

X:5.2   Y:89.8

X:1.5   Y:101

X:-2.2  Y:112.2

////////WRITE IN PSEUDOCODE//////

In: Computer Science

In a certain building at a top secret research lab , some yttrium-90 has leaked into...

In a certain building at a top secret research lab , some yttrium-90 has leaked into the computer analysts' coffee room. The leak would currently expose personnel to 150 millirems of radiation a day. The half-life of the substance is about three days; that is, the radiation level is only half of what it was three days ago. The analysts want to know how long it will be before the radiation is down to a safe level of 0.466 millirem a day. They would like a chart that displays the radiation level for every three days with the message Unsafe or Safe after every line. The chart should stop just before the radiation level is one-tenth of the safe level, because the more cautious analysts will require a safety factor of 10. The program should also print the first day that the room can be entered.

In: Computer Science

Code in C++ Assign negativeCntr with the number of negative values in the linked list. #include...

Code in C++

Assign negativeCntr with the number of negative values in the linked list.

#include <iostream>
#include <cstdlib>
using namespace std;

class IntNode {
public:
IntNode(int dataInit = 0, IntNode* nextLoc = nullptr);
void InsertAfter(IntNode* nodePtr);
IntNode* GetNext();
int GetDataVal();
private:
int dataVal;
IntNode* nextNodePtr;
};

// Constructor
IntNode::IntNode(int dataInit, IntNode* nextLoc) {
this->dataVal = dataInit;
this->nextNodePtr = nextLoc;
}

/* Insert node after this node.
* Before: this -- next
* After: this -- node -- next
*/
void IntNode::InsertAfter(IntNode* nodeLoc) {
IntNode* tmpNext = nullptr;

tmpNext = this->nextNodePtr; // Remember next
this->nextNodePtr = nodeLoc; // this -- node -- ?
nodeLoc->nextNodePtr = tmpNext; // this -- node -- next
}

// Grab location pointed by nextNodePtr
IntNode* IntNode::GetNext() {
return this->nextNodePtr;
}

int IntNode::GetDataVal() {
return this->dataVal;
}

int main() {
IntNode* headObj = nullptr; // Create intNode objects
IntNode* currObj = nullptr;
IntNode* lastObj = nullptr;
int i;
int negativeCntr;

negativeCntr = 0;

headObj = new IntNode(-1); // Front of nodes list
lastObj = headObj;

for (i = 0; i < 10; ++i) { // Append 10 rand nums
currObj = new IntNode((rand() % 21) - 10);
lastObj->InsertAfter(currObj); // Append curr
lastObj = currObj; // Curr is the new last item
}

currObj = headObj; // Print the list
while (currObj != nullptr) {
cout << currObj->GetDataVal() << ", ";
currObj = currObj->GetNext();
}
cout << endl;

currObj = headObj; // Count number of negative numbers
while (currObj != nullptr) {

/* Your solution goes here */

currObj = currObj->GetNext();
}
cout << "Number of negatives: " << negativeCntr << endl;

return 0;
}

In: Computer Science