Questions
The Lab For this assignment, you need access to a computer running Windows 7, Windows 10...

The Lab

For this assignment, you need access to a computer running Windows 7, Windows 10 or a current operating system. Create a folder that contains two subfolders and five files of different types. Each subfolder should have at least three files. Apply each of the NTFS standard permissions to the first folder you created, and allow the permissions to be inherited. Record and report the effects of each change.

In: Computer Science

Step1 - Define two classes, Whole and part. Use a strong "has a" relationship with the...

Step1 - Define two classes, Whole and part. Use a strong "has a" relationship with the two classes.

            Constructor Functions

            Define a default constructor for the Part class.

                        Default just prints out "In default part constructor"

            Define a default and a parm constructor for the Whole class.

                        In Whole Default constructor assigns wholeName = "None"; and prints out "In whole default Constructor"

                        In Whole Parm constructor - Passes in name to WholeName and

                        Then It prints out value of wholeName variable and "In Whole parm constructor"

            Destructor Functions

            Define a destructor function for the part class.

            Define a string variable called wholeName in the whole class.

            Define a getName function for whole class.

Two test.

Step 2 - Declare a Whole W1, with default constructor

             Have the Whole constructor print "called default constructor", and contents of wholeName variable

             Have the Whole Destructor print "called destructor", and contents of wholeName variable

            Declare a Whole W2, with a parm constructor - Have it pass in "w2"

             Have the Whole constructor print "called parm constructor", and contents of wholeName variable.

             Have the Whole Destructor print "called destructor", and the contents of wholeName variable.

Step 3 - use the dot

            Use the dot notation to print out the contents of W1 wholeName variable

            Use the dot notation to print the contents of W2 wholeName variable

In: Computer Science

1. Explain the following behaviour by two employees and whether it is appropriate. Sam comes from...

1. Explain the following behaviour by two employees and whether it is appropriate. Sam comes from a country where it is acceptable to wink at others.

Sam has done this as a habit all his life. When Sam arrived in Australia, he was reported for inappropriate behaviour at his workplace. Explain in detail to Sam what has happened.

Min hugs everyone briefly when they meet. But when Min was on a business trip to South East Asia, Min was told it was wrong to hug members of the opposite sex. Can you explain to Min what is the problem here?

2.

In: Computer Science

An array A of n distinct numbers are said to be unimodal if there exists an...

An array A of n distinct numbers are said to be unimodal if there exists an index k, 1 ≤ k ≤ n, such that A[1] < A[2] < · · · < A[k − 1] < A[k] and A[k] > A[k + 1] > · · · > A[n]. In other words, A has a unique peak and are monotone on both sides of the peak. Design an efficient algorithm that finds the peak in a unimodal array of size n.

In: Computer Science

C LANGUAGE ONLY Write a C program to count the total number of duplicate elements in...

C LANGUAGE ONLY
Write a C program to count the total number of duplicate elements in an array.


Enter the number of elements to be stored in the array: 3

Input 3 elements in the arrangement:
element [0]: 5
element [1]: 1
element [2]: 1

Expected output:
The total number of duplicate elements found in the array is: 1

In: Computer Science

In C# Create a windows application which accepts the month number and displays the month name...

In C# Create a windows application which accepts the month number and displays the month name in a label.  

Use a nested if... else statement to determine the month name.

For months not in the range 1-12 display the message "Not a valid month"

In: Computer Science

Consider the context-free grammar G = ( {S}, {a, b}, S, P) where P = {...

Consider the context-free grammar G = ( {S}, {a, b}, S, P) where P = { S -> aaSb | aab }.

Construct a NPDA M that such that L(M) = L(G).

I would like the transition graph for this NPDA please.

In: Computer Science

DNS is a service that is predominant in networking for resolution. It is now a requirement...

DNS is a service that is predominant in networking for resolution. It is now a requirement of the Microsoft OS, but before in the NT 4.0 world, it was an add-on and not required. With the overhead that DNS generates, why did Microsoft make this service a requirement? Can you run a system without it now?

In: Computer Science

2. Implement a decoder for the encoding scheme used in the first problem. The decoder will...

2. Implement a decoder for the encoding scheme used in the first problem. The decoder will reverse whatever operation was performed on the string, meaning each character will be rotated 3 to the left. For example, the input string def will decode to abc. Create a program which implements this decoding scheme and allows the user to input a string to be decoded. • Only use ASCII characters in range [32, 127]. • Read an entire string of input from the user using fgets. • Use input prompt "Enter a string: ". • Remove the trailing newline character from the string. • Encode the string using the scheme described above. • Output ONLY the decoded message on a new line. • Save your code as decoder.c.

How to write this in C language

In: Computer Science

Show how to augment the ordinary Binary Search Tree (BST) data structure so that it supports...

Show how to augment the ordinary Binary Search Tree (BST) data structure so that it supports an efficient procedure which, on input (x, k) where x is the root of a BST and k an integer, output the k-th smallest number store in the BST. Let n denote the total number of elements stored in the BST, what is the running time of your efficient procedure? How does your modification of the BST data structure affect the performance of other BST operations we discussed in class?

In: Computer Science

PYTHON-- create a method that prints items from a stack in a top to bottom order

PYTHON-- create a method that prints items from a stack in a top to bottom order

In: Computer Science

Write a C function str_to_float() that takes a numeric string as input and converts it to...

Write a C function str_to_float() that takes a numeric string as input and converts it to a floating
point number. The function should return the floating point number by reference. If the
conversion is successful, the function should return 0, and -1 otherwise (e.g. the string does not
contain a valid number). The prototype of the function is given below
int str_to_float(char * str, float * number);

In: Computer Science

Here is my java code. It works and has the correct output, but I need to...

Here is my java code. It works and has the correct output, but I need to add a file and I am not sure how. I cannot use the FileNotFoundException. Please help!

import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;

public class Exercise {

public static void main(String[] args) {

Scanner input=new Scanner(System.in);
int[] WordsCharsLetters = {0,0,0};
while(input.hasNext())
{
String sentence=input.nextLine();
if(sentence!=null&&sentence.length()>0){
WordsCharsLetters[0] += calculateAndPrintChars(sentence)[0];
WordsCharsLetters[1] += calculateAndPrintChars(sentence)[1];
WordsCharsLetters[2] += calculateAndPrintChars(sentence)[2];
}
else
break;
}
input.close();
System.out.println("Words: " + WordsCharsLetters[0]);
System.out.println("Characters: " + WordsCharsLetters[1]);
System.out.println("Letters: " + WordsCharsLetters[2]);

}
static int[] calculateAndPrintChars(String sentence)
{
int[] WCL = new int[3];
String[] sentenceArray=sentence.split(" ");
WCL[0] = sentenceArray.length;
int letterCount=0;
for(int i=0;i<sentence.length();i++)
{
if(Character.isLetter(sentence.charAt(i)))
letterCount++;
}
WCL[1] = sentence.length();
WCL[2] = letterCount;
return WCL;
}

}

In: Computer Science

Was it ever one of your job duties to provide analysis with regard to Strategic Information...

Was it ever one of your job duties to provide analysis with regard to Strategic Information Systems? How would you alter your report in lieu of what you have learned now? If you've never had that opportunity, what recommendations would offer now?

In: Computer Science

Question 3. Describe memory types used in the MIPS assembly. Explain registers used in the MIPS...

Question 3.

  1. Describe memory types used in the MIPS assembly.
  2. Explain registers used in the MIPS assembly.
  3. Differentiate between assembly source code and machine code.
  4. Write a note on MIPS instruction formats.

In: Computer Science