Questions
Subject - Software Engineering Give a brief background about what is behavior driven development (BDD) and...

Subject - Software Engineering

Give a brief background about what is behavior driven development (BDD) and how it is relevant in a Software Engineering context?

In: Computer Science

ICT description and importance of ICT

ICT description and importance of ICT

In: Computer Science

Design a memory management scheme for a 48 bit architecture, using various types of paging and/or...

Design a memory management scheme for a 48 bit architecture, using various types of paging and/or segmentation. You should include a clear translation scheme from a 48 bit logical address to a 48 bit physical address including a picture that shows this translation procedure. Then highlight its advantages and disadvantages.

In: Computer Science

What are two types of encryption for wireless networks? Which encryption standard is considered to be...

  1. What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why?

  2. The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________.

  3. Why should you disable the SSID on a wireless network?

  4. What is an evil twin attack?

  5. Why would you disable a Bluetooth device when you are in a public place?

  6. What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or rooting a device?

  7. What is a remote wipe? Why would you execute a remote wipe?

In: Computer Science

Write the MATLAB code to Create a new figure. Define a theta array such that ?...

Write the MATLAB code to Create a new figure. Define a theta array such that ? 2 ≤ ? ≤ 9? 2 with increment of ? 10 ; Create a sixmember array of ones called r. Create a new polar plot of ? versus r

In: Computer Science

matlab code to graph an ecg

matlab code to graph an ecg

In: Computer Science

Assignment #3 Introduction to C Programming – COP 3223 Objectives To reinforce the use of If-Else...

Assignment #3

Introduction to C Programming – COP 3223

Objectives

  1. To reinforce the use of If-Else statements
  2. To learn how to use while loops

Introduction: Mission to Mars

Your friend has been playing a new Mars Colony simulator nonstop! They are always talking about how cool it would be if they could be a on the first real-life mission to Mars! To amuse your friend, you have decided to create a series of programs about the possible first colony on Mars.

Problem: Where Can We Get the Best Deal? (marssupplier.c)

Now that we know how much fuel we need and how much equipment we can take, we need to determine which supplier will give us the best deal on what we need to purchase. We will poll a number of suppliers to see what kind of pricing they can give us and select the supplier who has the best deal.

In this program, we want to ask the user for information about suppliers. We can assume that there will be at least one supplier, but we will not know ahead of time how many suppliers there might be. After each supplier’s information, ask the user if there is another supplier to consider.

For each supplier, ask the user for the deal that the supplier is willing to offer. Keep track of the best possible deal and which supplier (identified as a number: 1, 2, 3, etc.) is offering it. After all the suppliers have been considered, tell the user which supplier offered the best deal.

Input Specification

  1. The user will use ‘Y’ to indicate there is at least one more supplier to consider.
  2. The user will use ‘N’ to indicate that there are no more suppliers to consider.
  3. Each suppliers’ price will be a positive real number.

Output Specification

For each supplier, prompt the user with:

What is the price for supplier #X?

To ask about additional suppliers, prompt the user with:

Is there another supplier to consider?

For the final print out, tell the user which supplier they should select, including the best price rounded to two decimal places:

Supplier #X had the best price at $Y.YY.

Output Samples

Below are some sample outputs of running the program. Note that these samples are NOT a comprehensive test. You should test your program with different data than is shown here based on the specifications given above. In the sample run below, for clarity and ease of reading, the user input is given in italics while the program output is in bold. (Note: When you actually run your program no bold or italics should appear at all. These are simply used in this description for clarity’s sake.)

Sample Run 1

What is the price for supplier #1?

500.49

Is there another supplier to consider?

N

Supplier #1 had the best price at $500.49.

Sample Run 2

What is the price for supplier #1?

250.39

Is there another supplier to consider?

Y

What is the price for supplier #2?

500.49

Is there another supplier to consider?

Y

What is the price for supplier #3?

178.72

Is there another supplier to consider?

Y

What is the price for supplier #4?

300.00

Is there another supplier to consider?

N

Supplier #3 had the best price at $178.72.

In: Computer Science

Using pseudocode design a number guessing game program. The program should generate a random number and...

Using pseudocode design a number guessing game program. The program should generate a random number and then ask the user to guess the number. Each time the user enters his or her guess, the program should indicate it was too high or too low. The game is over when the user correctly guesses the number. When the game ends, the program should display the number of guesses that the user made.

In: Computer Science

3. Write a script that generates two random numbers between -5 and 25, calculates their average,...

3. Write a script that generates two random numbers between -5 and 25, calculates their average, and if the average is greater than 10 then prints “High Average” else prints “Low Average”. You can use $RANDOM to generate the random numbers.

4. Write a script using the for-loop construct that counts the number of directories looping through the files in the directory name provided by the user on a prompt by the script.

In: Computer Science

You will be writing a program to calculate the cost of an online movie order. Write...

You will be writing a program to calculate the cost of an online movie order.

Write a program that calculates and prints the cost of viewing something through the CNR Cable Company’s on demand. The company offers three levels of viewing: TV, Movies that are New Releases and Movies (not considered new releases). Its rates vary depending on what is to be viewed.

The rates are computed as follows:

TV: Free

New Releases: 6.99

Movies (not new releases): The cost is based on the year the movie was released before 1960: 2.99 1960 – 1979: 3.99 1980 – 1999: 4.99 after 2000: 5.99

Your program should prompt the user to enter the title of the item to be viewed (string) and a type of viewing code (type char). A type code of t or T means TV; a type code of n or N means new release; a type code of m or M means a non-new release Movie. Treat any other character as an error. Your program should output the title, type of viewing, and the amount due from the viewer, formatted neatly. When printing the type of viewing you must print the description (i.e. New Release) NOT the code (i.e. n). For the non-new release movies, the customer must give the year the movie was released. Therefore, to calculate the bill, you must ask the user to input the year. The program MUST utilize functions and MUST contain at least one if statement and at least one switch statement. Functions should be written for the following tasks:  Output instructions  Prompt for and accept the movie name  Prompt for and accept the movie type (single character code)  Calculate the charge  Output the movie name, type description, and total charge

In: Computer Science

1. Open Microsoft Word 2. On the first line, type the words Word VBA Test Bed...

1. Open Microsoft Word

2. On the first line, type the words Word VBA Test Bed

3. Save the document as WordVBATestBed.docm. (It is vital that this is a macro-enabled document.)

4. Ensure that the Developer Tab is visible.

5. Ensure that the Visual Basic Editor is setup in accordance with pages 87 and 88 in the textbook.

6. Insert a module into this document.

7. Add the Option Base 1 instruction under Option Explicit.

4. Using the Visual Basic Editor, create a VBA procedure named create_object that does the following: a. Creates a variable of the Object type. b. Using the Set command, assign the third word of the first paragraph of the active document to the variable. c. Using appropriate methods, make the object bold. d. When you test the procedure, the third word of your document (test) should be bold.

It just needs to have "Option Explicit" at the beginning.

In: Computer Science

Please re-write paragraphs. 1.) The last methodology is the radical method. What’s involved in this method...

Please re-write paragraphs.

1.) The last methodology is the radical method. What’s involved in this method is the radical changes of traditional way of doing things. In using the radical method is where we would incorporate what is known a “(BPR) which stands for Business Process Reengineering”. (Valacich & George, 2020, p. 165) This is where an organization looks for and puts the new ways into play and the business can do this by accepting the new technologies of today’s world. The advantages of the radical methodology are there is a (less need for as many employees as before when using the other methods, there will be a dramatic change in the relationship with the customers, the processes are more efficient and effective to use and understand in which will increase the organizations revenue in the future.) (Valacich & George, 2020) The advantages of using disruptive technologies are that it can help the business with its everyday operations. The way in which it can do so is by (allowing users to share data between one another, there are many different support tools to help aid upper management to achieve daily goals). The new technologies provide access so that employees can work from home to get their workload done, all users that have access will have access to “interactive communication technologies that allow complex messaging capabilities, automatic identification and tracking technology knows where things are, and high-performance computing can provide real-time updating” (Valacich & George, 2020, p. 167) The disadvantages of using the radical method are wasted resources and or the business just doesn't get out there more because they won't try the new way of doing things in today's world with the disruptive technologies.

2.) On the above slide I chose to include a diagram on determining systems requirements in which it shows that it happens during the analysis phase. The three methodologies that I just discussed have to do with requirements determination when deciding what way to take the organization when transforming from traditional/contemporary way to the new and improved radical method way of doing things in today’s new world of new technologies.

3.) My recommendation for Pine Valley Furniture Webstore’s method in determining the requirements for gathering are to use the traditional and contemporary methods still with slowly advancing themselves into the radical method which is the new way of doing things and the disruptive technologies that it has to build the business more faster, efficient, and effective. I feel that the business would do great with keeping some of their old procedures and processes by adding a little technology at a time until they can fully get used to it and have it become totally efficient and effective for them. I myself like the new technologies of today because they are effective, efficient, and faster than doing it the traditional or contemporary method. These new technologies help advance businesses all the time because they can market and advertise better which means more business for them which turns into revenue. I feel that once they have the system requirements that they want and need for their Student Furniture Webstore such as the “System Layout and Navigation Characteristics, Web Store and Site Management System Capabilities, Customer and Inventory Information, and System Prototype Evolution” then they can slowly go into the radical method by adding the new technologies that they think would help them be more efficient and effective without harming them.

4.) On the above slide I chose to include an image of what happens in the prototyping method. (Valacich & George, 2020, p. 163) When using prototyping to build a good system many analysts like this method because they get back a lot of valuable feedback from the users. This allows the software to keep being redone over and over again until it does to what the business wants and needs. The problem can be easily identified and put into play as an actual working system that can be used to be able to revise no matter what. I really like this way because of being able to redo it at any point in time. I think this would be a great effective way for the new Student Furniture Web Store to be created with the use of modern technologies.

5.) On the above slide shows the diagram of the Level-0 Data Flow Diagram. Figure 7-22 (Valacich & George, 2020, p. 203) I included the diagram so that when I explain it you can see how it all works and flows from one thing to another. The Data Flow Diagram is a representation of “overall data flows into, through, and out of an information system. DFDs rely on four symbols to represent the four conceptual components of a process model: data flows, data stores, processes, and sources/sinks.” (Valacich & George, 2020, p. 205) There are six points on this diagram that flow from the customer looking at the item with making a “product item request” and then selecting the item which then goes into the shopping cart with a cart ID and profile of what the item is, there is also a way to remove an item incase you no longer want it, and there has to be a request for the cart to be able to put items into it. After an item is chosen then it has to be checked out and processed for the order, for number 5.0 on the diagram it shows add/modify account profile and this is so the customer can make any changes such as address or payment information updates plus this is where the customer information is kept track of. The last thing is the order status request this is where the order number is found with the status of the order request flows into the order number and that information flows into the “purchasing fulfillment system” and at the end of that is where you can see your order number along with return code if the item needs to be returned. The Level-0 diagram really helps in seeing how an ordering system works when your using online sales. This is exactly what your doing when you order something online. This diagram captures how an order is placed when done online.

In: Computer Science

Please do this in C#. Stay on the Screen! Animation in video games is just like...

Please do this in C#. Stay on the Screen! Animation in video games is just like animation in movies – it’s drawn image by image (called “frames”). Before the game can draw a frame, it needs to update the position of the objects based on their velocities (among other things). To do that is relatively simple: add the velocity to the position of the object each frame.

For this program, imagine we want to track an object and detect if it goes off the left or right side of the screen (that is, it’s X position is less than 0 and greater than the width of the screen, say, 100). Write a program that asks the user for the starting X and Y position of the object as well as the starting X and Y velocity, then prints out its position each frame until the object moves off of the screen. Design (pseudocode) and implement (source code) for this program.

Sample run 1:

Enter the starting X position: 50

Enter the starting Y position: 50

Enter the starting X velocity: 4.7

Enter the starting Y velocity: 2

X:50    Y:50

X:54.7 Y:52

X:59.4 Y:54

X:64.1 Y:56

X:68.8 Y:58

X:73.5 Y:60

X:78.2 Y:62

X:82.9 Y:64

X:87.6 Y:66

X:92.3 Y:68

X:97    Y:70

X:101.7 Y:72

In: Computer Science

How many registers are there in ARM CPU for programmer to use? Which registers can you...

How many registers are there in ARM CPU for programmer to use?

Which registers can you use for general computation?

Which register are special purpose, and cannot be used for general computation?

What is the size, i.e. number of bits, each of these general purpose registers can hold?

Which are most useful flags in the current program status register?

In: Computer Science

For each problem below, write a java program to solve it, name your programs as PA2_1.java...

For each problem below, write a java program to solve it, name your programs as PA2_1.java and PA2_2.java.

1. We have a steam heating boiler whose bursting pressure is known, but we of course want to use it only at pressures well below this limit. Our engineers recommend a safety factor of 3; that is, we should never exceed a pressure that is one-third of the rated bursting pressure. Write a java program that reads in the rated bursting pressure and the current pressure, and determines if the boiler is operating at a safe pressure.

For example: Enter the rated bursting pressure of the boiler (psi): 625 Enter the current pressure (psi): 137.8 The maximum safe pressure is 208.3 psi. The current pressure is safe.

or Enter the rated bursting pressure of the boiler (psi): 625 Enter the current pressure (psi): 250 The maximum safe pressure is 208.3 psi. WARNING! The current pressure is not safe.

Hint: Use three variables: burst_psi current_psi, and max_safe_psi

In: Computer Science