In: Computer Science
The Indexed addressing mode can not be used to specify the destination in MSP430 assembly language programs.
Select one:
True
False
In: Computer Science
IN C
Write a function in the form:
void play( int key, int duration) // duration units are tenths of a second
which generates and prints samples of sin(w*t) for t=0,1,2,...,n-1 which represent a tone corresponding to piano key number key, where:
n = (duration/10.0)*8000 w = (2π440rkey-49)/8000 r = 21/12
In the main program call your function to play the first three notes of three blind mice.
In: Computer Science
Give the algorithms in pseudo code of the enqueue and dequeue procedures. Constraint: the structure implementing the queue must only be pointed to by a single field (example: head, tail or number of elements, etc.)
In: Computer Science
DESIGN A FLOWCHART IN FLOWGORITHM AND WRITE THE PSEUDOCODE
Number Analysis Program Design a program that asks the user to enter a series of 20 numbers. The program should store the numbers in an array and then display the following data: The lowest number in the array. The highest number in the array. The total of the numbers in the array. The average of the numbers in the array.
PLEASE AND THANK YOU
In: Computer Science
In: Computer Science
Write a C program that creates 5 threads sends the thread index as an argument to the thread execution procedure/function. Also, the main process/thread joins the newly created threads sequentially one after the other. From the thread procedure print “I am a thread and my index is “ [print the correct index number]. From the main thread after the join print “I am the main thread and just completed joining thread index “ [print the correct index].
In: Computer Science
How do you write JavaScript codes to randomly select five elements by using a single for-loop? How do you display the results to a html page?
var password = [“x”, “y”, “z”, “1”, “2”, “3”, “test”];
Sample output:
zx21y |
In: Computer Science
Using Python, write a program that meets the following requirements:
In: Computer Science
How to diagram and describe how messages are actually encapsulated and decapsulated as they are sent from one host across two routers to another host. Only include the 2 host and 2 routers - no switches
host a ----------------router --------------router----------host b
In: Computer Science
Study PC operating system such as windows and linux etc and mobile operating system such as Android and iOS, find out whether there are functions and features that are provided in PC OS but not in mobile OS, and if there is any, analyze why these functions and features are not provided by these mobile OS. In your opinion for the future development will PC operating system and mobile operating system be the same or different? Give the details.
In: Computer Science
Create following webpage in HTML :
1. Login Page This is the first page the user should see. The user can login, signup, or continue as a guest. Your task is to implement the following features: a) Signup form This form should collect the information required for creating a new account on your movie database website. At the least, it should collect an email address, username, avatar image/graphic, first name, last name, and a password. You can ask for more user details in the form such as date of birth. The form should ask the user to enter their password twice, to ensure that it is entered properly. After the signup, the user should be redirected to the same page (login page). The purpose of this is to let the user login after signup.
b) Login form This form should collect the user’s email and password to login. We will implement the logic to login in future assignments. After login, the user should be redirected to the Home page.
c) Continue as guest option This option should redirect the user to the Home page.
In: Computer Science
(a) What is the difference between synchronous and asynchronous stream ciphers.
(b) Who was Horst Feistel?
(c) What is the main weakness of affine ciphers?
(d) What is the Kerckhoffs’ principle?
(e) Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
In: Computer Science
(Using Java) create a class that can identify a palindrome.
A palindrome is defined as
- A string of characters that reads the same from left to right as
its does from right to left
- Example: Anna, Civic, Kayak, Level, Madam
- To recognize a palindrome, a queue can be used in conjunction
with a stack
o A stack can be used to reverse the order of occurrences
o A queue can be used to preserve the order of occurrences
Hints: Use Stack class in JAVA library:
https://docs.oracle.com/javase/7/docs/api/java/util/Stack.html
Regard linked list in JAVA Library as
queue:http://docs.oracle.com/javase/7/docs/api/java/util/LinkedList.html
In: Computer Science
DES
(a) What does Lucifer have in common with the DES?
(b) What are the sizes of the block and key space of the DES?
(c) What does EFF stand for and what does it have to do with the DES?
(d) What is DESX?
(e) What is the key size of DES? What is the block size of DES? How many rounds are there in DES?
In: Computer Science