Create programs in Visual Basic which perform each of the following: Explain the different design choices (syntax) for option in each language Document the programs using Flowcharts Each programs source code must be included – label each with the language used
a) Nested two-way selection statements
b) Multiple-way selection statement
c) Iterative Statements – Counter controlled and Logic controlled
d) After the Counter Controlled Iterative successfully completes – Display “This was a success” on the screen.
In: Computer Science
(3) -> The arrival of packets at an Ethernet adapter of a web
server is described by a Poisson process with a rate of 100 packets
per second . Packets that arrive to the Ethernet adapter described
in the above problem (3) are queued up in a buffer until processed
by the Interrupt Service Routine (ISR). Assuming that the ISR
service time per packet is exponential with an average of 9.6
milliseconds. Answer the following questions:
(a) What is the capacity of the Ethernet adapter?
(b) Write down the probability distribution of the number of
packets at the Ethernet adapter (either queued or being
transmitted).
(c) How many packets do you expect to find waiting in the buffer of
the adapter at any point in time (on average)?
(d) What is the average waiting time in the buffer (i.e., how long
is a packet buffered untilthe ISR starts processing it)?
(e) What is the slowdown caused by queuing at the Ethernet
adapter?
In: Computer Science
Part (a) Repeatedly prompt for a number and sum it. When the sum just exceeds 100, stop the prompting and display the sum at the end. You must not display the sum while the user in typing in numbers. (You do not need a counter but you will need some way of terminating the loop)
Part(b)Same as the previous question but additionally displays the average of the numbers when the loop terminates. You will need a counter but not as a loop terminator.
Can you do part a and b on separate codes and both in C#. Thank you :)
In: Computer Science
Project Name: Desktop Virtualization with Directory via Workspaces
Technology: Cloud Computing
Market: Desktop Replacement, Thin Client
AWS: Workspaces, WorkDocs, Directory Services (Microsoft AD, Simple AD, etc.), VPC
Intended Services to Provision:
Virtual Desktop (Windows)
Design:
Your goal is to document the process of setting up an example for desktop virtualization.
Important Note:
At this stage in the course we are beginning to architect, configure, and deploy real services in the public cloud (specifically AWS). When you are beginning designing and deploying services, documentation can be of great help as replicating exact configurations can at times be challenging. Note: When we do not replicate a configuration exactly, we can be creating security issues (assuming we had a “secure” or robust design initially). Another reason to develop good documentation is that it gives a good idea of what should be happening with systems and it can be reviewed and refined over time so that the quality of your designs and configurations increases as you practice.
Questions to Answer:
What can you accomplish using Workspaces on AWS for general purpose computing?
Explain the primary challenges that desktop virtualization in this manner solves.
What tradeoffs do these solutions make with a traditional desktop environment?
What are some of the primary considerations that you would make if you were the IT director / manager at an organization considering deploying workspaces as their primary end user “desktop”?
Lastly, make notes / comments regarding performance and security considerations that you consider important.
In what ways can WorkDocs be used to add additional functionality to WorkSpaces?
What directory services options do you have to be able to use along with your Workspace? How would you select between the available directory service options.
As organizations continue adoption of compute services running on a variety of public clouds, what are some aspects to consider with regard to virtual desktop for general purpose computing (keep performance and security ideas at the forefront).
Practical:
Configure a Workspace on AWS.
Create a directory for login.
(Note: The AWS Workspaces wizard combines these configuration stages.)
Login to your Workspace via your preferred client (note: Native clients perform better / more reliability, i.e. use Linux, Windows, and Mac OS client rather than the web client.
Use your Workspace for a few minutes to complete a task that you have to complete today.
Comment on how you feel about using Workspaces for general purpose computing and on specific usage (i.e engineering, architecture, accounting, etc.).
[Include your documentation below]
Deliverable(s):
Use this document as a base and include your ideas here. Submit and upload in Canvas in the assignment area for this project.
Remember that the better the quality of your documentation, the greater the likelihood that you can reproduce a configuration for deploying a production system or rebuilding your production infrastructure after a disaster.
*** Note: Be sure to utilize Free Tier eligible or a low cost option of your choice. After your workload has been designed, deployed, tested, and documented, be sure to delete, decommission instances so as to not be continually charged for services.
In: Computer Science
What are two benefits of using Mobile Application Management (MAM) for organizations that allow Bring Your Own Device (BYOD)
In: Computer Science
In the code cell below, use two input() commands to collect two positive, non-zero integers from the user. These values represent the starting and ending values of a range (you may assume that the first value is always strictly less than the second value).
Next, use a loop to examine and count every integer in the range (including the starting and ending values) that contains at least one 7 among its digits. When your loop ends, print the total number of integers that contain at least one 7 and no other output.
For example, the input values 42 and 75 would produce the result 9 (within that range, we have the numbers 47, 57, 67, 70, 71, 72, 73, 74, and 75).
for example:
# Assume that my_number already has a value
number_string = str(my_number)
if 7 in number_string: # Add the rest of your code below...
In: Computer Science
Figure 5-35 shows that Mifflin-St Jeor formulas for calculating a person's basal metabolic rate (BMR), which is the minimum number of calories needed to keep his or her body functioning while resting for 24 hours. A personal trainer at a local health club wants a program that displays a client's BMR. a. Create an IPO chart for the problem, and then desk check the algorithm twice. For the first desk-check, display the BMR for a 25 year old male whose weight and height are 175 pounds and 6 feet, respectively. For the second desk check, display the BMR for a 31 year old female whose weight and height are 130 pounds and 5.5 feet, respectively. b. List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in figure 5-27. Then code the algorithm into a program. c. Desk check the program using the same data used to desk-check the algorithm. d. Display the BMR in fixed point notation with no decimal places. Test the program using the same data used to desk-check the program.
heres the chart
BMR formulas
Males = (10 x weight in kg)+ (6.25 x height in cm) - (5 x age in years) + 5
Females = (10 x weight in kg) + (6.25 x height in cm) - (5 x age in years) - 161
note: one kilogram equals 2.2 pounds one inch equals 2.54 centimeters
The programming language is c++
In: Computer Science
Using Arduino
a) write a program that uses two potentiometers to adjust the values displayed on the serial monitor. Have the two values displayed side by side via the serial monitor and each range from 0 to 255
In: Computer Science
What challenges or issues could MDM or MAM present for employees
In: Computer Science
GVC_E(V,E)
1. C =Φ
2. while ( E≠ Φ)
3. do
4. { select an edge (u,v)∈E;
5. C = C∪{u}∪{v};
6. delete u and v from V and edges with u or v as an endpoint from E;
7. }
8. for each u∈C
9. { if C\{u} is a valid cover;
10. C = C\{u};
11. }
How can I complete the pseudo code on line 4 and line 8 by adding a heuristic specifying how to select a node
In: Computer Science
c++
using class...
define operator overloading and give simple example how we can use
operator overloading by writing simple program in which different
operators are used to add, subtract, multiply and division.
In: Computer Science
Please Use your keyboard (Don't use handwriting) Thank you..
I need new and unique answers, please. (Use your own words, don't copy and paste)
IT243
Course name: System Analysis and Design
***********Please i need more details and more Explain**********
Q2:
As the project sponsor, you suggested that your company that runs multiple local supermarkets should provide an online shopping service to increase sales during COVID-19 pandemic. Write a system request to propose this project.
System request |
|
Project Sponsor |
|
Business Need |
|
Business Requirements |
|
Business Value |
|
Special Issues or Constraints |
Q3:
Assume the following scenario:
A small company needs to develop an information system for the Finance and Accounting Department. As an analyst which process model would you prefer and why?
Q4:
There are three techniques which help users discover their needs for the new system, list and compare these techniques in terms of impactful changes. Also, explain BPR.
I need new and unique answers, please. (Use your own words, don't copy and paste)
I need new and unique answers, please. (Use your own words, don't copy and paste)
In: Computer Science
Computer Security
Sara is using RSA crypto-system with the following setup: p = 11 and q = 3. Sara publish his Public Key: (n, e) = (33, 3).
a. Find n, Ф(n).
b. Calculate Sara’s private key.
c. Nora wants to send the message M = 13 to Sara. Using Sara’s public and private keys, calculate the ciphertext C, and the value for Message R, when Sara recovers the message.
d. Deem wants to set up his own public and private keys. She chooses p = 23 and q = 19 with e = 283. Find her private and public keys. Note show all steps to find the good value for d.
In: Computer Science
Windows PowerShell Scripting
Please answer using a switch statement. I have asked this question already and it was wrong. Thank you and I will upvote.
1) Write a PowerShell script that displays the total count of each type (dll, txt, log) of files in c:\windows using switch statement.
In: Computer Science
A JavaFX UI class has a button named 'btnOk' that needs to call a void method with no parameters named 'displayResults' when it is clicked. Write the complete lambda-expression statement to set up the btnOk event handler to do this.
In: Computer Science