Questions
Explain the difference between scalability and elasticity. And List and briefly explain factors that encourage organizations...

Explain the difference between scalability and elasticity. And List and briefly explain factors that encourage organizations to move to the cloud?

In: Computer Science

Please use Java language! with as much as comment! thanks! Write a program that displays a...

Please use Java language! with as much as comment! thanks!

Write a program that displays a frame with a three labels and three textfields. The labels should be "width:", "height:", and "title:" and should each be followed by one textfield. The texfields should be initialized with default values (Example 400, 600, default title), but should be edited by the user. There should be a button (label it whatever you want, I don't care). If you click the button, a new frame should become visible that has the title and dimensions the user entered in the textfields on the first frame (or the default values, if the user did not enter anything).

Use JPanels and the EXIT_ON_CLOSE statement. Give the first panel some proper dimensions using the setSize method.

In: Computer Science

Consider the file “PatientTemperature_CSV.csv” given to you representing patient body temperatures at a hospital on a...

  1. Consider the file “PatientTemperature_CSV.csv” given to you representing patient body temperatures at a hospital on a particular day. The data is organized into two columns: patient temperature and patient age. Using code snippets available from the class lecture material or otherwise, perform the following tasks with this data in python: [80 points]
    1. Read the data into Python
    2. Determine the mean, mode, median, variance, and standard deviation for the patient temperatures.
    3. Determine the mean, median, variance, and standard deviation for the patient ages.
    1. Determine the probability that a patient would have a body temperature greater than or equal to 97 F and lesser than or equal to 98 F.
    2. Plot a histogram of the temperature data. Please include a title and proper axes labels.

(Note: For parts b, c and d, your code must clearly print out the required quantities when executed. The display on screen must clearly say what quantity is being printed (eg: “The mean is: 3.45”, etc.).

The included spreadsheet

https://1drv.ms/x/s!ApVa8VAkzZo-aW5eXs8WmFBLivw

I can also post the file in the comments if that would be helpful.

In: Computer Science

C programming Get a number from the user and write a program that checks to see...

C programming
Get a number from the user and write a program that checks to see if the inputted number is equal to x*x+x and x must be greater than 0.

For example, if the user inputs 12. The program should check to see if 12 = x*x+x. In this case it is true because 3*3+3 = 12.

In: Computer Science

Question 12 The protection of data from unauthorized modification or destruction is an example of data...

Question 12

The protection of data from unauthorized modification or destruction is an example of data ___________

Question 12 options:

confidentiality

1integrity

availability

authentication

Question 13

In a public key encryption system, any person can encrypt a message using the receiver's ______.

Question 13 options:

public key

private key

Both A and B

Neither A nor B

Question 14

__________ is concerned with protecting student educational records

Question 14 options:

HIPPA

CISO

GLBA

FERPA

Question 15

__________ is the ability to correlate, with high certainty, a recorded action with its originating individual or entity.

Question 15 options:

Authentication

Confidentiality

Integrity

Non-repudiation

Question 16

_______________ requires companies to maintain financial records for seven years.

Question 16 options:

HIPPA

Sarbanes Oxley Act

GLBA

FISMA

Question 17

Which of the following statement is true comparing MANET with infrastructure based WLAN?

Question 17 options:

MANET generally has better performance in term of speed

MANET has less complicated routing mechanism

MANET is more tolerate to single point of failure

WLAN generally supports more flexible network topology

In: Computer Science

Write two classes, ToDoList and Driver ToDoList should implement the following UML class diagram: ToDoList -list:String[]...

Write two classes, ToDoList and Driver

ToDoList should implement the following UML class diagram:

ToDoList
-list:String[]
-size:int
+ToDoList()
+add(String item):void
+remove(String item): boolean
+toString():String

add(String item) should add the item as the last element in the list, updating size.

remove(String item) should remove the item and return true, or, if the item was not in the list, return false.  
To remove the item, check every list element from 0 to size-1, and if that item is equal to the parameter using s1.equalsIgnoreCase(s2), loop from i+1 to size, assigning each element the value of the following element in the list, so list[j-1] = list[j]. The size of the list will be one less.

toString() should return a numbered list, with a "\n" after each list item.

HW22 should run as in the sample run below. Use static methods as needed to input the choice and the list item.

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: j

Enter a number: 6

1 through 4 only: 3

Empty list

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 1

Enter a list item and press enter: Mow the lawn

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 1

Enter a list item and press enter: Wash the car

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 1

Enter a list item and press enter: Clean the kitchen

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 3

1. Mow the lawn

2. Wash the car

3. Clean the kitchen

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 2

Enter a list item and press enter: clean the kitchen

clean the kitchen removed

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 3

1. Mow the lawn

2. Wash the car

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 2

Enter a list item and press enter: Write a program

Could not remove Write a program

1. add an item

2. remove an item

3. print the list

4. quit

Enter your choice: 4

add(String item) should add the item as the last element in the list, updating size.

remove(String item) should remove the item and return true, or, if the item was not in the list, return

In: Computer Science

Write an inline assembly program that initialized a 100 byte area of memory using the STOS...

Write an inline assembly program that initialized a 100 byte area of memory using the STOS instruction.

In: Computer Science

In C++, Write a program that accepts exactly ten (10) integer numbers from the user. When...

In C++, Write a program that accepts exactly ten (10) integer numbers from the user. When the user is done inputting these numbers, the program prints back: (i) the sum of the 10 numbers, (ii) the minimum value from the 10 numbers, and (iii) the maximum value from the 10 numbers.

In: Computer Science

21. What is a Domain Controller, what purpose does it serve in an enterprise environment, what...

21. What is a Domain Controller, what purpose does it serve in an enterprise environment, what software/hardware combination does it run on, and why would an attacker be interested in compromising a Domain Controller? Additionally, what is the name of the file that stores the user credentials and associations and where is it located on the system? What ways could an attack acquire the file or its content and what dependencies, tools, and techniques would be required?
22. Kerberos is the primary system used for authorization and authentication in Windows Domains. Explain how Kerberos works, which information security services does it provide, and any limitations/security considerations/vulnerabilities associated with Kerberos, the way it issues tickets, or the tickets themselves that an attacker could exploit? Provide the names of the different types of attacks and a short explanation of how they work and what the attacker achieves by performing them.
23. Explain how a user’s password is stored on a local Windows system, how it is stored on a domain, the location for both, and then the authentication process for each to log a user onto the system. If an attacker is able to acquire the stored passwords, identify what an attacker would need to do to use them to move laterally in the network. Provide the specific name for each of the two attacks.
24. Explain the role of Group Policy, how it works, what purpose it serves in an enterprise environment, and why we would want to use it. Assuming we wanted to push an update to the client machines on a network immediately, explain the process for doing so using Group Policy on both the server and client machines.

In: Computer Science

This task is solved in Python 3. Develop a function which counts the number of vowels...

This task is solved in Python 3.

Develop a function which counts the number of vowels in a text.

>>> numberofVowels ("There is a cat outside the house")

13

In: Computer Science

IN JAVA A salesman wants to go to five different cities and sell some products. The...

IN JAVA

A salesman wants to go to five different cities and sell some products. The locations of the cities are listed in the following table.

City #

X_location

Y_location

City 1

1

1

City 2

1

3

City 3

4

1

City 4

5

3

City 5

3

5

The distance between two cities is defined as the Euclidean distance. That is:

Distance = sqrt( (x1 – x2)^2 + (y1 – y2)^2 )

For example, the distance between cities 1 and 2 will be:

Distance = sqrt( (1 – 1)^2 + (1 – 3)^2 ) = sqrt( 4 ) = 2

The purpose: The salesman starts his journey from city 1. He then has 4 remaining options for the next city (city 2, city 3, city 4, city 5). If he chooses city 3 as the next destination, then he will have 3 remaining options (city 2, city 4, city 5). He wants to travel all the cities and then come back to the start location (City 1). Not all the paths will be a good choice. We want to help the salesman by finding the shortest path (best order of cities to visit (visit all of them once) starting from city 1).

Steps:

Step 1 [7 points]: Create a class City with x and y as the class variables. The constructor with argument will get x and y and will initialize the city. Add a member function getDistanceFrom() to the class that gets a city as the input and finds the distance between the two cities.

city1.getDistanceFrom(city2) will be distance between city 1 and 2.

Step 2 [6 points]: Create 5 city objects and initialize their location (x and y) using the above table. Then put all of the five cities in a vector.

Step 3 [7 points]: Create a two dimensional array or vector DistanceVec of size 5 * 5 and initialize it such that DistanceVec[i,j] is the distance between city_i and city_j. Print the distanceVec and show the distance among all cities.

Step 4 [15 points]: If the salesman starts from the city 1, search all the possible paths and find the optimal path (order of cities to visit) that leads to the minimum total travel distance. Display the found optimal path (order of cities to travel) in your sample run.

In: Computer Science

How to create a program Budget Enter the amount budgeted for the month: 400 Enter the...

How to create a program Budget

Enter the amount budgeted for the month: 400

Enter the expense (-1 to quite):100

Enter the expense (-1 to quite):-1

$400 budgeted.

1 expenses totaling $100.

$300 under budget.

Need to use sentinel value of -1, while loop

In: Computer Science

Windows: Write one paragraph on the the benefits of BitLocker. Write one paragraph on the benefits...

Windows:

Write one paragraph on the the benefits of BitLocker.

Write one paragraph on the benefits of Implementing Windows Server Update Services (WSUS) Solution.

Write in your own words.

In: Computer Science

Problem 2(a). Letter Frequencies. ? Write Python code that reads a text file into memory and...

Problem 2(a). Letter Frequencies.

? Write Python code that reads a text file into memory and creates a dict object with a frequency count for each letter. For example, for encryptedA.txt, your output should contain the key:value pairs 'a': 78 and 'b': 31.

Notes

  • Do not distinguish between uppercase and lowercase letters.
  • Ignore punctuation. Punctuation counts must not appear in your dict
  • If a given letter does not appear in the text, there must be a key:value pair with value 0.

? Use Python to determine which letter has the highest frequency in each text file, and print the result.

Problem 2(b). Formatting for R.

? Write your two dictionaries with frequency counts from 2(a) to a pair of suitably named .csv files, with one column for the key and one column for the frequency counted. Include both .csv files with your commit to GitHub.

In: Computer Science

This is in python3.. Calculate the Balance - Deposit If the action is Deposit 'D’, use...

This is in python3..

Calculate the Balance - Deposit

If the action is Deposit 'D’, use a deposit function to add funds to the account

Deposit Input

userchoice = input ("What would you like to do?\n")
userchoice = 'B'
deposit_amount = 200

Deposit Output

What would you like to do?
How much would you like to deposit today?
Deposit was $200, current balance is $700.25

Customer Deposit

  1. Write a function called `deposit`.
  2. Request from the user the amount to be deposited. This value should be stored in a variable called `deposit_amount`. Use both the `input` and `float` methods in order to ensure the `deposit_amount` is a float value.
  3. Calculate a new account balance.
  4. The calculation for depositing funds into the account is `account_balance = account_balance + deposit_amount`.
  5. Print the new account balance.

need to add to this program below. use a deposit function to add funds to the account.

import sys# importing the sys library
# account balance
account_balance = float(500.25)
#PPrint the balance
# This is a custom function, it returns the current balance upto 2 decimal places
def printbalance():
print('Your current balance:')
return account_balance
#the function for deposit
#This is a custom function
def deposit():
deposit_amount = float(input("Enter amount to deposit : ")) # takes in input for deposit amount
balance = account_balance + deposit_amount #calculates balance
print("Deposit was $%2f, current balance is $%2f" %(deposit_amount,balance)) # prints out the balance
#function for withdraw
#this is a custom function
def withdraw():
withdraw_amount = float(input("Enter amount to withdraw")) # takes in the withdraw amount
if(withdraw_amount > account_balance): #checks whether the amount is more than balance or not
print("$%2f is greater than account balance $%2f\n" %(withdraw_amount,account_balance)) #if yes then
else:
balance = account_balance - withdraw_amount
print("$%2f was withdrawn, current balance is $%2f" % (withdraw_amount, balance))
# User Input goes here, use if/else conditional statement to call function based on user input

userchoice = input("What would you like to do?\n")

if (userchoice == 'D'):
# here deposit function is called
deposit()
elif userchoice == 'W':
# here withdraw function is called
withdraw()
elif userchoice == 'B':
# here printbalance function is called
balance=printbalance()
print('{:.2f}'.format(balance))
else:
# it ends the program execution
sys.exit()

In: Computer Science