Questions
You need to apply multiple photoshop techniques on an image. The following techniques to be applied:...

You need to apply multiple photoshop techniques on an image.
The following techniques to be applied:
Image retouching
Image stretching and equify technique
Changing background (white)
The above techniques need to be applied to an image with a person.
You can have as many layers as you need but keep the original image layer at bottom so that it can be compared with the edited image.

In: Computer Science

what type of research do you think is best suited for the topic area you are...

what type of research do you think is best suited for the topic area you are interested in follows a bottoms-up or top-down for theory verification or theory generation? Why?

In: Computer Science

This violates the ISP principle in SOLID, can someone explain why and refactor? Thank you! public...

This violates the ISP principle in SOLID, can someone explain why and refactor? Thank you!

   public interface IGesture
    {
        void OnClick();
        void OnSwipe();
        void OnDoubleClick();
    }

    public class LaunchButton : IGesture
    {
        public void OnClick()
        {
            //Launch nuclear missiles
        }

        public void OnDoubleClick()
        {
            throw new NotImplementedException();
        }

        public void OnSwipe()
        {
            throw new NotImplementedException();
        }
    }

In: Computer Science

•A theater owner agrees to donate a portion of gross ticket sales to a charity •The...

•A theater owner agrees to donate a portion of gross ticket sales to a charity

•The program will prompt the user to input:

−Movie name

−Adult ticket price

−Child ticket price

−Number of adult tickets sold

−Number of child tickets sold

−Percentage of gross amount to be donated

•Inputs: movie name, adult and child ticket price, # adult and child tickets sold, and percentage of the gross to be donated

•The program needs to:

1.Get the movie name

2.Get the price of an adult ticket price

3.Get the price of a child ticket price

4.Get the number of adult tickets sold

5.Get the number of child tickets sold

USE C++

In: Computer Science

Discuss how demultiplexing is carried out using TCP and UDP. (8 marks) Please make a table,...

Discuss how demultiplexing is carried out using TCP and UDP.

Please make a table, one side FULLY explaining how demultiplexing is carried out using TCP and the other side FULLY explaining how demultiplexing is carried out using UDP.

In: Computer Science

what is the most use applications of Natural language processing , could you describe it?

what is the most use applications of Natural language processing , could you describe it?

In: Computer Science

Using form events functions to answer this question. Use the attached form html file which contains...

Using form events functions to answer this question. Use the attached form html file which contains 2 html radio buttons. When the first choice is chosen, display the text ”First” under the first choice. When the second choice is chosen, display the text ”Second” under the second choice. Here is my HTML code

<!DOCTYPE html>
<html>
<head>
    <title>midterm exam</title>
    <link rel="stylesheet" href="css/q1.css" />
</head>
<body>
    <div id = "page">
       <form>
          <input type="radio" id="first" name="midterm" value="first">
          <label for="first">First</label><br>
          <input type="radio" id="second" name="midterm" value="second">
          <label for="second">Second</label><br>
       </form>
   </div>
    <script src="js/q4.js"></script>
</body>
</html>

In: Computer Science

When using scapy in python how can I get the same result as the snippit bellow?...

When using scapy in python how can I get the same result as the snippit bellow? (which in run in terminal)
>>> sr(IP(dst="192.168.8.1")/TCP(dport=[21,22,23]))
Received 6 packets, got 3 answers, remaining 0 packets
(<Results: UDP:0 TCP:3 ICMP:0 Other:0>, <Unanswered: UDP:0 TCP:0 ICMP:0 Other:0>)
>>> ans,unans=_
>>> ans.summary()
IP / TCP 192.168.8.14:20 > 192.168.8.1:21 S ==> Ether / IP / TCP 192.168.8.1:21 > 192.168.8.14:20 RA / Padding
IP / TCP 192.168.8.14:20 > 192.168.8.1:22 S ==> Ether / IP / TCP 192.168.8.1:22 > 192.168.8.14:20 RA / Padding
IP / TCP 192.168.8.14:20 > 192.168.8.1:23 S ==> Ether / IP / TCP 192.168.8.1:23 > 192.168.8.14:20 RA / Padding

I tried doing something like res = sr(IP(dst="192.168.8.1")/TCP(dport=[21,22,23])) and then doing res.summary(), but it doesnt seem to work :(

In: Computer Science

import tkinter as tk import math window = tk.Tk() window.title("RSA Encryption/Decryption") window.geometry("500x500") #screen.configure(background="black") #functions def Modulus():...

import tkinter as tk
import math

window = tk.Tk()
window.title("RSA Encryption/Decryption")
window.geometry("500x500")
#screen.configure(background="black")

#functions
def Modulus():
p = int(p_input1.get())
q = int(q_input1.get())
n = p*q

  
open_text = tk.Label(text="Keep your Messages Secure", fg = "white", bg = "blue")
open_text.pack()


Encryp_text = tk.Label(text="Encryption", fg="white", bg="red")
Encryp_text.place(x=200, y=35)

Decryp_text = tk.Label(text="Decryption", fg="white", bg="green")
Decryp_text.place(x=200, y=270)

p_input=tk.Label(text="Enter the value of P: ")
p_input.place(x=10, y=58)

p_input1=tk.Entry()
p_input1.place(x = 130, y=58)

q_input=tk.Label(text="Enter the value of q:")
q_input.place(x=10, y=78)

q_input1=tk.Entry()
q_input1.place(x = 130, y=78)


mod = tk.Label(text= "RSA Modulus(n)is: ",command = Modulus)
mod.place(x=10, y=100)

window.mainloop()

i'm not able to get the result which is the value of n. can you please help with this?

In: Computer Science

A customer brings you her laptop computer and tells you that it will not connect to...

A customer brings you her laptop computer and tells you that it will not connect to any Wi-Fi networks. She tells you that it was working yesterday, and that she was on the web updating her Facebook page and then downloading a coupon-shopping program. Now she cannot connect to the Internet.

A friend asks you to look at his laptop computer. He tells you that any time the screen is moved, the image on the screen flickers and then goes blank. He also says that when he is on the World Wide Web, random webpages open without his authorization. When he tries to close them, more of these pages open up.

In: Computer Science

Develop an algorithm to demonstrate hashing using hash table with modulo as the hash function. Assume...

Develop an algorithm to demonstrate hashing using hash table with modulo as the hash function. Assume the size of the hash table as 10. To avoid collisions in case of identical keys for two different elements, use Linear Probing collision resolution technique.
using c++
add comment on the code

In: Computer Science

The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is...

The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is by:

A. including the CIO in the information security steering committee
B. conducting benchmarking with industry best practices
C. including information security metrics in the organizational metrics
D. performing periodic internal audits of the information security program

Correct Answer: C????? or D??????????????

______________________

Note

■ Some experts claim that the correct answer is: "C. including information security metrics in the organizational metrics"

■ Other experts claim that the correct answer is: "D. performing periodic internal audits of the information security program"

■ What do you think about that? Please explains: Why B and "not" C......or.......Why C and "not" B

Many thanks!

In: Computer Science

Develop a recursive algorithm to find the smallest and largest element in an array and trace...

Develop a recursive algorithm to find the smallest and largest element in an array and trace the recursive function with appropriate message.
using c++
add comment to the code

In: Computer Science

1. (10 pts) Define the nodes in the LinkedList. Create the LinkedList using the ListNode class....

1. (10 pts) Define the nodes in the LinkedList. Create the LinkedList using the ListNode class. Create a method to find a node with given value in a LinkedList. Return the value is this value exists in the LinkedList. Return null if not exists. Use these two examples to test your method.

Example 1:

Input: 1 -> 2 -> 3, and target value = 3

Output: 3

Example 2:

Input: 1 -> 2 -> 3, and target value = 4

Output: null

Using Eclipse for Java

In: Computer Science

The computer has important parts such as the input/output, memory and CPU. The human has similar...

The computer has important parts such as the input/output, memory and CPU. The human has similar attributes making it possible to interact with computers. As an expert in Human Computer Interaction: a. How would you model a Human as a Processor? 6 marks b. Briefly explain 4 limitations of interactive performance. 4 marks c. Use switching of a light bulb to illustrate Norman’s cycle. 9 marks d. Differentiate between error and a slip. 1 mark

In: Computer Science