The Lab
For this assignment, you need access to a computer running
Windows 7, Windows 10 or a current operating system. Create a
folder that contains two subfolders and five files of different
types. Each subfolder should have at least three files. Apply each
of the NTFS standard permissions to the first folder you created,
and allow the permissions to be inherited. Record and report the
effects of each change.
In: Computer Science
Step1 - Define two classes, Whole and part. Use a strong "has a" relationship with the two classes.
Constructor Functions
Define a default constructor for the Part class.
Default just prints out "In default part constructor"
Define a default and a parm constructor for the Whole class.
In Whole Default constructor assigns wholeName = "None"; and prints out "In whole default Constructor"
In Whole Parm constructor - Passes in name to WholeName and
Then It prints out value of wholeName variable and "In Whole parm constructor"
Destructor Functions
Define a destructor function for the part class.
Define a string variable called wholeName in the whole class.
Define a getName function for whole class.
Two test.
Step 2 - Declare a Whole W1, with default constructor
Have the Whole constructor print "called default constructor", and contents of wholeName variable
Have the Whole Destructor print "called destructor", and contents of wholeName variable
Declare a Whole W2, with a parm constructor - Have it pass in "w2"
Have the Whole constructor print "called parm constructor", and contents of wholeName variable.
Have the Whole Destructor print "called destructor", and the contents of wholeName variable.
Step 3 - use the dot
Use the dot notation to print out the contents of W1 wholeName variable
Use the dot notation to print the contents of W2 wholeName variable
In: Computer Science
1. Explain the following behaviour by two employees and whether it is appropriate. Sam comes from a country where it is acceptable to wink at others.
Sam has done this as a habit all his life. When Sam arrived in Australia, he was reported for inappropriate behaviour at his workplace. Explain in detail to Sam what has happened.
Min hugs everyone briefly when they meet. But when Min was on a business trip to South East Asia, Min was told it was wrong to hug members of the opposite sex. Can you explain to Min what is the problem here?
2.
In: Computer Science
An array A of n distinct numbers are said to be unimodal if there exists an index k, 1 ≤ k ≤ n, such that A[1] < A[2] < · · · < A[k − 1] < A[k] and A[k] > A[k + 1] > · · · > A[n]. In other words, A has a unique peak and are monotone on both sides of the peak. Design an efficient algorithm that finds the peak in a unimodal array of size n.
In: Computer Science
C LANGUAGE ONLY Write a C program to count the total number of duplicate elements in an array. Enter the number of elements to be stored in the array: 3 Input 3 elements in the arrangement: element [0]: 5 element [1]: 1 element [2]: 1 Expected output: The total number of duplicate elements found in the array is: 1
In: Computer Science
In C# Create a windows application which accepts the month
number and displays the month name in a label.
Use a nested if... else statement to determine the month
name.
For months not in the range 1-12 display the message "Not a valid
month"
In: Computer Science
Consider the context-free grammar G = ( {S}, {a, b}, S, P) where P = { S -> aaSb | aab }.
Construct a NPDA M that such that L(M) = L(G).
I would like the transition graph for this NPDA please.
In: Computer Science
DNS is a service that is predominant in networking for resolution. It is now a requirement of the Microsoft OS, but before in the NT 4.0 world, it was an add-on and not required. With the overhead that DNS generates, why did Microsoft make this service a requirement? Can you run a system without it now?
In: Computer Science
2. Implement a decoder for the encoding scheme used in the first problem. The decoder will reverse whatever operation was performed on the string, meaning each character will be rotated 3 to the left. For example, the input string def will decode to abc. Create a program which implements this decoding scheme and allows the user to input a string to be decoded. • Only use ASCII characters in range [32, 127]. • Read an entire string of input from the user using fgets. • Use input prompt "Enter a string: ". • Remove the trailing newline character from the string. • Encode the string using the scheme described above. • Output ONLY the decoded message on a new line. • Save your code as decoder.c.
How to write this in C language
In: Computer Science
Show how to augment the ordinary Binary Search Tree (BST) data structure so that it supports an efficient procedure which, on input (x, k) where x is the root of a BST and k an integer, output the k-th smallest number store in the BST. Let n denote the total number of elements stored in the BST, what is the running time of your efficient procedure? How does your modification of the BST data structure affect the performance of other BST operations we discussed in class?
In: Computer Science
PYTHON-- create a method that prints items from a stack in a top to bottom order
In: Computer Science
Write a C function str_to_float() that takes a numeric string as
input and converts it to a floating
point number. The function should return the floating point number
by reference. If the
conversion is successful, the function should return 0, and -1
otherwise (e.g. the string does not
contain a valid number). The prototype of the function is given
below
int str_to_float(char * str, float * number);
In: Computer Science
Here is my java code. It works and has the correct output, but I need to add a file and I am not sure how. I cannot use the FileNotFoundException. Please help!
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
public class Exercise {
public static void main(String[] args) {
Scanner input=new Scanner(System.in);
int[] WordsCharsLetters = {0,0,0};
while(input.hasNext())
{
String sentence=input.nextLine();
if(sentence!=null&&sentence.length()>0){
WordsCharsLetters[0] += calculateAndPrintChars(sentence)[0];
WordsCharsLetters[1] += calculateAndPrintChars(sentence)[1];
WordsCharsLetters[2] += calculateAndPrintChars(sentence)[2];
}
else
break;
}
input.close();
System.out.println("Words: " + WordsCharsLetters[0]);
System.out.println("Characters: " + WordsCharsLetters[1]);
System.out.println("Letters: " + WordsCharsLetters[2]);
}
static int[] calculateAndPrintChars(String sentence)
{
int[] WCL = new int[3];
String[] sentenceArray=sentence.split(" ");
WCL[0] = sentenceArray.length;
int letterCount=0;
for(int i=0;i<sentence.length();i++)
{
if(Character.isLetter(sentence.charAt(i)))
letterCount++;
}
WCL[1] = sentence.length();
WCL[2] = letterCount;
return WCL;
}
}
In: Computer Science
Was it ever one of your job duties to provide analysis with regard to Strategic Information Systems? How would you alter your report in lieu of what you have learned now? If you've never had that opportunity, what recommendations would offer now?
In: Computer Science
Question 3.
In: Computer Science