SQL Server
6. Our new system cannot handle Unicode (Links to an external
site.) characters, only ASCII (Links to an external site.)
characters.
The current Productname data type is NVARCHAR, which is unicode,
and might have non-ASCII characters in it. We need to check!
Show the ProductID, and ProductName, and the first location of any
non-Unicode characters. See the note at the bottom for how to find
non-Unicode characters.
In: Computer Science
In: Computer Science
C++ contains some built-in functions (such as itoa and std::hex) which make this assignment trivial. You may NOT use these in your programs. You code must perform the conversion through your own algorithm.
The input values are:
5
9
24
2
39
83
60
8
11
10
6
18
31
27
In: Computer Science
(Minimum 100 words)
1. What are the two different transmission modes? Explain?
2.Define a DC component and its effect on digital transmission.
3. Distinguish between a signal element and a data element
In: Computer Science
Using Python read dataset in the HTML in beautiful way.
You need to read CSV file ( Use any for example, You
can use small dataset)
You need to use pandas library
You need to use Flask
Make search table like YouTube has.
In: Computer Science
In: Computer Science
Design and implement a special purpose system that allows access to doors 1 and 2 (D1 and D2 respectively) by persons who have been given a valid four-bit binary code. The code is entered using four switches: S1, S2, S3, and S4. Each valid switch can be set to 0 or 1. The system gives access to doors according to the following scheme:
Provide a truth table and implement your circuit only using NOR gates. The correct implementation of this circuit should only have two layers of NOR gates.
In: Computer Science
Design a kernel module that creates a /proc file named /proc/jiffies that reports the current value of jiffies when the /proc/jiffies file is read, such as with the command
cat /proc/jiffies
Be sure to remove /proc/jiffies when the module is removed.
Please help with this assignment using C programming and testing in Linux Ubuntu.
In: Computer Science
C and Systems Programming
Part I. Password Strength Meter
Weak passwords are common source of e-mail and social website accounts hacks. To alleviate this problem, pro-grams, often, when the user chooses a new password, determine if it is an adequately strong password. You are to write a function that validates the password strength. The restrictions that we de ne as our de ned level of strength of passwords is the following: the password must be at least eight characters long, and must include at least one uppercase, one lowercase letter, and one digit. The password cannot contain any other characters than letters and numbers. In addition, it must contain at least one string (consecutive letters) of at least four letters long (uppercase letters, lowecase letters, or combination of both). Furthermore, the password should not contain the username (usernames in our login program are not case-sensitive). Remember, failing to write this piece of code in the program correctly may result in accepting weak and vulnerable passwords. Your code helps rejecting such passwords.
bool i s S t r o n g P a s s w o r d ( const char * username , const char * password ) { // TODO : your code goes here .
}
Enter username : vahab
Enter new password : 1234
Your password is week . Try again !
Enter username : vahab
Enter new password : hello
Your password is week . Try again !
Enter username : vahab
Enter new password : 123 v aH aB k7 89
Your password is week . Try again !
Enter username : vahab
Enter new password : m e A c e C S 2 2 1
Strong password !
Part II. Default Password Generator
In this part, you will write a C function generateDefaultPassword(char* default_password, const char* username) that generates a default password randomly, which will be sent to the user to login. The users may wish to change the default password to a password of their own, which should pass the password strength meter you implemented in Part I. The default password generated by this function will be stored in a char array that the default_password is pointing to. Remember, the caller of this function (aka main()) must declare an array before passing it to this function, in order to avoid segmentation fault issues.
The default password must be created randomly (every character should be chosen randomly and independently from all allowed characters) and must have all the requirements of a strong password the user selects (Part I) except the following:
The default password must not be longer than 15 characters.
The default password may or may not satisfy the four consecutive letters requirement.
Implement a new function called isStrongDefaultPassword(const char* username, const char* password) which checks if the default password is strong based on the new constraints. This function is almost identical to your isStrongPassword() function in Part I, but needs some modi cations based on the default password requirements. In a loop, your program should then keep creating random strings and check if all the password
requirements for the default password are met. Once a compliant password is generated, the loop stops and your program displays the generated password in the following form:
Generating a default password...
Generated default password: x1B4fxH81I02
void g e n e r a t e D e f a u l t P a s s w o r d ( char * default_password , const char * username ) {
// TODO : your code goes here .
}
While you are limiting the length of your random password to 15 maximum length, remember that the size of your random password must be random as well.
For both parts, you can write as many helper functions of your own as you like, but as for functions not written by you, you may only use strlen, strcmp, strcpy, and strcat from string.h, and any functions de ned in stdbool.h, stdio.h, ctype.h, time.h, and stdlib.h, only. Your three functions must do exactly as speci ed in this project. You must include all your code relevant to these three functions inside the functions itself. That means, your code must contain these three functions, with the exact function signatures. Your code must compile and run correctly on the Linux lab machines. If we cannot compile your code on the lab machines, you will receive no credit. A small portion of your project grade (5%) is reserved for good code style and adequate comments. While good code style includes many elements, in this class we only grade your projects on suitable variable name choice and indentation.
Here is code for part 1
/**
*
* A password strength meter and a default password generator,
* as defined in the CS221 course website for Project 1.
*
*/
bool isStrongPassword(const char * username, const char
* password) {
//TODO: your code goes here.
return false;
}
/**
* Example: isStrongDefaultPassword("vahab", "Taher3h") returns
false
*/
bool isStrongDefaultPassword(const char* username, const char*
password) {
//TODO: your code goes here.
return false;
}
/**
* This function may *not* call isStrongPassword().
* This function must call isStrongDefaultPassword().
*/
void generateDefaultPassword(char * default_password, const char *
username) {
//TODO: your code goes here.
}
int main(void)
{
//TODO: your code goes here.
return 0;
}
In: Computer Science
***This program is to be created using Python***
Requirements to be numbered in program01.py:
• First Name
• Last Name
• Membership Level
i. Composer
ii. Conductor
iii. Musician
• Seat Preference
i. Orchestra
ii. Main
iii. Balcony
• Meal Type
i. Chicken
ii. Fish
iii. Vegan
• if Composer and Orchestra:
i. “You qualify for these are exceptional seats!”
• if Composer and Main:
i. “The seats in the main section are good seats.”
• if Composer and Balcony:
i. “Interesting, let us know if you want closer seats.”
• if Conductor and Orchestra:
i. “Member level of Composer required if you want to sit in the orchestra section.”
• if Conductor and Main:
i. “The seats in the main section are good seats.”
• if Conductor and Balcony:
i. “Interesting, let us know if you want closer seats.”
• if Musician and Orchestra:
i. “Member level of Composer required if you want to sit in the orchestra section.”
• if Musician and Main:
i. “Member level of Composer or Conductor required if you want to sit in the main section.”
• if Musician and Balcony:
• The concert was wonderful.
• The food was fantastic.
• The seats were superb.
• if Composer and (total score less than 12 or any score less than 4):
i. “Dear Composer, Your survey score of <score> was lower than we would like. Please give us another opportunity soon.”
• Else // Composer
i. “Thank you for being a Composer member and for having a good time!”
• if Conductor and (total score less than 11 or any score less than 3):
i. “Dear Conductor, Your survey score of <score> was lower than we would like. The next time you attend we will be nicer.
• Else //Conductor
i. “Thank you for being a Conductor member and for having a good time!”
• if Musician and (total score less than 10 or any score less than 2):
i. “Dear Musician, Your survey score of <score> was lower than we would like. You will have more fun next time.”
• Else // Musician
In: Computer Science
- Why do you think that usual maintenance for a widely used website is conducted at 12am or 2am.. etc. on weekends? (List three reasons)
- If you believe that a test is successful when it reveals an error then when do you think that it is the time to release a software to market? (Explain in one paragraph)
In: Computer Science
Question 2. The following code defines an array size that sums elements of the defined array through the loop.
#include <stdio.h>
#define A 10
int main(int argc, char** argv) {
int Total = 0;
int numbers[A];
for (int i=0; i < A; i++)
numbers[i] = i+1;
int i =0;
while (i<=A){
Total += numbers[i];
i++;
}
printf("Total =%d\n", Total);
return 0;
}
In: Computer Science
JavaScript
Write a function named "reverse_kvs" that has a key-value store as a parameter and returns a new key-value store. Your function should add each key-value pair in the parameter to the new key-value store EXCEPT reversing the key and value. For example, if the key-value "extreme":45 were in the parameter then the returned key-value store should contain the key-value pair 45:"extreme".
Code:
function reverse_kvs(store) {
var reverse_store = {};
for (var key in store) {
if (store.hasOwnProperty(key)) {
reverse_store[store[key]] = key;
}
}
return reverse_store;
}
I need to have this code return an output other than an empty result. Does anyone know how to fix the code?
*** UPDATE: The code is not correct. It returns an empty result, such as this "{}"***
In: Computer Science
Write in Java
Postfix notation is a way of writing expressions without using parentheses. For example, the expression (1 + 2) * 3 would be written as 1 2 + 3 *. A postfix expression is evaluated using a stack. Scan a postfix expression from left to right. A variable or constant is pushed into the stack. When an operator is encountered, apply the operator with the top two operands in the stack and replace the two operands with the result.. Write a program to evaluate postfix expressions. Pass the expression as a command-line argument in one string.
Command line argument:
“1 2 + 3 *”
Correct output (3 points):
9
In: Computer Science
Use winHex to become familiar with different the types. Follow these steps
1) Locate or create Microsoft Excel(xlsx), Microsoft Word (docx), gif , jpg, and mp3 files if you are creating a word document or an excel spreadsheet save its as a word or excel file.
2) Start WinHex
3) Open each file type in WinHex. Record the hexadecimal codes for each file in a text editor , such has Notepad or Worded. For example for the Word document , record Word Header:50 4B 03 04.
4) Save the file , and then print it to give to your instructor.
Note ) this is forensic class not operation Management class bcoz chegg doesn’t have an option of forensics class so i have to choose operation Management
In: Computer Science