Questions
2. What is the cause of thrashing? 3. How does the system detect thrashing? 4. Once...

2. What is the cause of thrashing? 3. How does the system detect thrashing? 4. Once it detects thrashing, what can the system do to eliminate this problem?

In: Computer Science

For C++ Assume that word is a variable of type string that has been assigned a...

For C++

Assume that word is a variable of type string that has been assigned a value. Assume furthermore that this value always contains the letters "dr" followed by at least two other letters. For example: "undramatic", "dreck", "android", "no-drip".

Assume that there is another variable declared, drWord, also of type string. Write the statements needed so that the 4-character substring word of the value of word starting with "dr" is assigned to drWord. So, if the value of word were "George slew the dragon" your code would assign the value "drag" to drWord.

In: Computer Science

State whether each of the following are true or false. 1.1 A TPS uses simple procedures...

State whether each of the following are true or false.

1.1 A TPS uses simple procedures to record and store day-to-day transactions.

1.2       contemporary information systems are interfacing with customers and suppliers using electronic commerce technology, CRM, and SCM over the internet.

1.3 processes represent the data acquired from an information system.

1.4 All stakeholders of an information system share the same perspective of the system.

1.5 An executive information system (EIS) is a highly interactive IT system that allows you to first view highly summarized information and then choose how you would like to see greater detail, which may alert you to potential problems or opportunities.

1.6 The CIO is responsible for overseeing an organization’s information resource.

1.7 ESS/ EIS is normally developed to assist the operation level decision making.

1.8 Software quality assurance lays considerable stress on getting the design right prior to coding.

1.9 EDI allows computer-to-computer exchange of standardized documents between two organizations and lowers transaction costs.

1.10 Information systems must interface effectively and efficiently with other information systems, both within the business and increasingly with other businesses’ information systems.

In: Computer Science

Consider the problem statement for an "Online Auction System" to be developed: New users can register...

Consider the problem statement for an "Online Auction System" to be developed: New users can register to the system through an online process. By registering a user agrees to abide by different pre-defined terms and conditions as specified by the system. Any registered user can access the different features of the system authorized to him / her, after he authenticates himself through the login screen. An authenticated user can put items in the system for auction. Authenticated users can place bid for an item. Once auction is over, the item will be sold to the user placing the maximum bid. Payments are to be made by third party payment services, which, of course, is guaranteed to be secure. The user selling the item will be responsible for its shipping. If the seller thinks he's getting a good price, he can, however, sell the item at any point of time to the maximum bidder available. Read the Requirement Specifications thoroughly and answer the following questions:
i. Identify the ambiguous, inconsistent and incomplete statements
ii. Identify different function requirements to be obtained from a system
iii. Identify the possible non-functional requirements that could be identified from the requirements specifications.

In: Computer Science

I am having trouble writing these queries in MYSQL. Using the schema listed below, please write...

I am having trouble writing these queries in MYSQL. Using the schema listed below, please write the following queries in MYSQL:

1) Find the Content and the Reviewer Name for each comment, about “ACADEMY DINOSAUR” only if the same reviewer has commented about “ACE GOLDFINGER” too.

2) Retrieve the title of all the Movies in Japanese without any comment, ordered alphabetically.

3) Find all the movie titles where an actor called “TOM” or an actor called “BEN" acted, where there was another actor called “MARY” acting too.

Schema:

Consider a movie relational database schema description provided below which is used to manage a movie database, where:

A movie can have 0 or more actors

A movie can have 1 or more categories

A movie has 1 and only one language

Rating is one of these values: 'G','PG','PG-13','R','NC-17'

People can comment about the movies on a webpage, and the comments are stored in the comments table. The reviewer_name is introduced by the person on each comment, so we don't have a table with “reviewers”. A reviewer can create any number of comments about a movie. The comments will have a score about the movie with values from 0 to 100.

Note, the last update fields are going to be stored as a “timestamp”.

IMPORTANT: 2 entries in the same relation can have the same lastupdate, so, for example, 2 movies can have the same lastupdate value.

The relations are:

ACTOR (actor_id, first_name, last_name, last_update)

LANGUAGE (language_id, name, last_update)

CATEGORY (category_id, name, last_update)

FILM (film_id, title, description, release_year, language_id, length, rating, last_update)

FILM_ACTOR(actor_id, film_id, last_update)

FILM_CATEGORY (film_id, category_id, last_update)

COMMENTS (review_id, film_id, reviewer_name, comment, score, last_update)

In: Computer Science

I have a decimal fraction: 76.234567x10^-14 I need to convert this number to binary. I know...

I have a decimal fraction: 76.234567x10^-14

I need to convert this number to binary. I know you can multiply the number by 2 constantly to get the binary number, but that will take forever to do, even converting it to hex with x16 takes a long time, is there any easier way to convert this?

Show all steps and work please.

In: Computer Science

Assign 07 - Linux Forensics Learning Objectives and Outcomes Research information about Linux forensic investigations and...

Assign 07 - Linux Forensics

Learning Objectives and Outcomes

  • Research information about Linux forensic investigations and appropriate tools.
  • Identify and describe three Web sites that provide highly relevant information to Linux forensic investigations.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.

Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.

For this assignment:

  1. Research Web sites that provide information or tools for Linux forensic investigations.
  2. Write a report that describes three of the most promising Web sites in detail and discusses why these resources might be helpful in a forensic examination.

Required Resources

  • Course textbook
  • Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 1–2 pages

In: Computer Science

Python: I want to make the following code to prompt the user if want to run...

Python: I want to make the following code to prompt the user if want to run the software again. I am new to python, so i do not know if it works like c++. If can explain that would be much appreciated

base = float(input("Enter base of the triagle: "))

Triangle_Right = float(input("Enter right side of the triagle: "))

Triangle_Left = float(input("Enter left side of the triagle: "))

height = float(input("Enter the height of the triangle: "))

perimiter = base + Triangle_Right + Triangle_Left

area = (base*height)/2

print("The perimiter is =", perimiter)

print("The area is =", area)


In: Computer Science

        What are the goals to design a software? What is software elegance? List four (4)...

  1.         What are the goals to design a software? What is software elegance? List four (4) software elegance criteria and simple explain them.                                                          

In: Computer Science

Modify the method so that the item with the highest key is not only returned by...

Modify the method so that the item with the highest key is not only returned by the method but is also removed from the array.

Call the method removeMax().

// highArray.java
// demonstrates array class with high-level interface
// to run this program: C>java HighArrayApp
////////////////////////////////////////////////////////////////
class HighArray {
    private long[] a; // ref to array a
    private int nElems; // number of data items

    //-----------------------------------------------------------
    public HighArray(int max) // constructor
    {
        a = new long[max]; // create the array
        nElems = 0; // no items yet
    }

    //-----------------------------------------------------------
    public boolean find(long searchKey) { // find specified value
        int j;
        for (j = 0; j < nElems; j++) // for each element,
            if (a[j] == searchKey) // found item?
                break; // exit loop before end
        if (j == nElems) // gone to end?
            return false; // yes, can't find it
        else
            return true; // no, found it
    } // end find()

    //-----------------------------------------------------------
    public void insert(long value) // put element into array
    {
        a[nElems] = value; // insert it
        nElems++; // increment size
    }

    //-----------------------------------------------------------
    public boolean delete(long value) {
        int j;
        for (j = 0; j < nElems; j++) // look for it
            if (value == a[j])
                break;
        if (j == nElems) // can't find it
            return false;
        else // found it
        {
            for (int k = j; k < nElems; k++) // move higher ones down
                a[k] = a[k + 1];
            nElems--; // decrement size
            return true;
        }
    } // end delete()

    //-----------------------------------------------------------
    public void display() // displays array contents
    {
        for (int j = 0; j < nElems; j++) // for each element,
            System.out.print(a[j] + " "); // display it
        System.out.println("");
    }

    public long getMax() {
        if (nElems == 0) {
            return -1;
        } else {
            long max = a[0];
            for (int i = 0; i < nElems; i++) {
                if (a[i] > max) {
                    max = a[i];
                }
            }
            return max;
        }
    }
//-----------------------------------------------------------
} // end class HighArray

////////////////////////////////////////////////////////////////
class HighArrayApp {
    public static void main(String[] args) {
        int maxSize = 100; // array size
        HighArray arr; // reference to array
        arr = new HighArray(maxSize); // create the array
        arr.insert(77); // insert 10 items
        arr.insert(99);
        arr.insert(44);
        arr.insert(55);
        arr.insert(22);
        arr.insert(88);
        arr.insert(11);
        arr.insert(00);
        arr.insert(66);
        arr.insert(33);
        arr.display(); // display items
        int searchKey = 35; // search for item
        if (arr.find(searchKey))
            System.out.println("Found " + searchKey);
        else
            System.out.println("Can't find " + searchKey);
        arr.delete(00); // delete 3 items
        arr.delete(55);
        arr.delete(99);
        arr.display(); // display items again

        System.out.println("Max in array is " + arr.getMax());
    } // end main()
} // end class HighArrayApp

In: Computer Science

Assuming you are working in a team for a company, do you think there are any...

Assuming you are working in a team for a company, do you think there are any ethical issue if you know that one of the team members is actually interviewing with other company. The team member does not want to inform the team of his or her intention to leave until he or she gets an offer. Do you think it is ethical that you also decide to act ignorant about it and not telling your team lead or manager of this fact ? Let's assume your team also have a deadline coming up, it will more than likely be too late for the team manager to find a replacement for the team member that wanting to get away.

In: Computer Science

***** please don't copy and paste and don't use handwriting ***** Q1: Data Modelling is the...

***** please don't copy and paste and don't use handwriting *****

Q1: Data Modelling is the primary step in the process of database design. Compare and contrast Conceptual data model versus Physical data model. Illustrates with help of example to list down data (entities), relationship among data and constraints on data.

Q2:What strategic competitive benefits do you see in a company’s use of extranets?

In: Computer Science

Think about and design an application that applies 5G technology. For example, an automatic driving system....

Think about and design an application that applies 5G
technology. For example, an automatic driving system.
Explain how this system works and how 5G helps it to be
successful
Prepare a presentation with ppt slides

okay just send the paper work only

In: Computer Science

How would you code players taking turns, while having a score system. Please add examples in...

How would you code players taking turns, while having a score system. Please add examples in C++.

In: Computer Science

PYTHON Program Problem Statement: Write a Python program that processes information related to a rectangle and...

PYTHON Program

Problem Statement: Write a Python program that processes information related to a rectangle and prints/displays the computed values.

The program will behave as in the following example. Note that in the two lines, Enter length and Enter width, the program does not display 10.0 or 8.0. They are values typed in by the user and read in by the program. The first two lines are text displayed by the program informing the user what the program does.

This program reads in the length and width of a rectangle. It then prints the area and perimeter of the rectangle.

Enter length: 10.0
Enter width: 8.0

Length 10.0 width 8.0 area 80.0 perimeter 36.0

  1. Create two pieces of data (other than what we have above) that would serve as input to the program; then write down what the output would be. We show a sample first. (We are ignoring here the first two lines of text that would always be displayed.)

    Sample Input 0: Length 20 width 5
    Expected Output for the above data
    Length 20.0 width 5.0 area 100.0 perimeter 50.0

    Create your own data now.

    Input 1: length width Expected Output for the above data

    Input 2: length width Expected Output for the above data

  2. Before proceeding, get OK from your instructor or the tutor.

  3. Using the Input-Processing-Output approach, write down the pseudo code for the program.

  1. Before proceeding, get OK from your instructor or the tutor.

  2. Convert the pseudo code to Python code. Use ideas from below.

Pseudo code

Input an integer into x
Input a number with a decimal point into x Set x to a + b
Set x to a * b
Print a, b, c
Print weight and mass annotated
Print a message

Python code

x = int(input(‘Enter a number: ‘))
x = float(input(‘Enter a number: ‘))
x = a + b
x = a * b
print(a, b, c)
print(‘weight is’, weight, ‘mass is’, mass) print(‘whatever message you want’)

  1. Test and debug the program. For testing, use the data you created in Step 1.

  2. Show your source program and demonstrate it to your instructor. Get his/her signature below.

In: Computer Science