In: Computer Science
TABLEAU QUESTIONS!
Create a calculated field Age that derives the age (as of the time of the trip) of the rider
using their birth year. If the birth year is not available (i.e. NULL), Age should be NULL.
Create a viz in a worksheet named “Number of Trips by Age” that shows the number of
trips for riders of every age. Use any appropriate chart type for this viz. In this viz,
exclude any data for unknown (NULL) ages. (Recommendation: use column chart)
Categorize the age of the rider into 4-6 categories using a calculated field named Age
Category. One of the categories should be comprised of all unknown ages.
Create a viz in a worksheet named “Average Trip Duration by Age Category” that shows
the average trip duration for every one of your age categories. You can use any
appropriate chart type for this viz. (Recommendation: use bar chart)
Parameterize one of the limits of your age categories. Make sure that your parameter is
of the appropriate data type (Integer) and the range of its value is set appropriately. Create a new calculated field named Age Category 2 that implements the parameterized categorization.
Create a viz in a worksheet named “Interactive Number of Trips by Age Category” that shows the number of trips for all of your age categories and shows the parameter control, so the viewer can change it. Use any appropriate chart type for this viz. (Recommendation: use bar chart or pie chart)
In: Computer Science
Your nonprofit organization wishes to increase the efficiency of its fundraising efforts. What sort of data might be useful to achieve this goal? How might BI tools be used to analyze this data?
In: Computer Science
Given an array of Student type and size 10, create a linked list of students by linking students with an odd index first and then linking students with an even index. Write a loop to print out the students in the linked list
#include<iostream>
#include<string>
#include<fstream>
using namespace std;
const int NUM = 10;
struct Student{
string fName;
string lName;
Student * next;
};
int main() {
Student stuArr[NUM];
ifstream myfile;
myfile.open("Test.txt");
for(int i = 0; i < NUM; i++)
{
myfile>>stuArr[i].fName;
myfile>>stuArr[i].lName;
stuArr[i].next = 0;
}
In: Computer Science
Implement in C++ Design a BookstoreManager class which creates a dynamic array of type Book (don’t use vectors), and provide an implementation for the following operations on books in the array
1)isEmpty() returns true if the array is empty, otherwise false
2)isFull() returns true if the array is full, otherwise false
3)listSize() prints the number of books in the array
4)print() prints the content of the array
5)insert(Book) asks the user to enter new book info, and it adds the book to the array in sorted order if the array is full, it’ll double the size of the array
6)remove(Book) asks the user to enter ISBN info, and it removes the book from the array; shifts the other elements up in the array. Prints “Not Found” if the search fails.
7) removePublisher(string) asks the user to enter the publisher's name, and it removes all the books with the same publisher from the array; shifts the other elements up in the array. Prints “Not Found” if the search fails.
8) search(Book) asks the user to enter ISBN, and prints the content of the book prints “Not Found”, if the book is not found
In: Computer Science
We ran across this one in the OECD healthcare data. The country names had numbers appended, which served as footnotes in the original spreadsheet but looked dumb when we used them as index labels. The question is how to eliminate them. A short version of the country names is
`names = ['Australia 1', 'Canada 2', 'Chile 3', 'United States 1']`
Do each of these in a separate code cell:
1. Set `us = names[-1]` and call the `rsplit()` method on us.
What do you get?
2. Consult the documentation for `rsplit` to split `us` into two
pieces, the country name and the number 1. How would you extract
just the country name?
3. Use a loop to strip the numbers from all of the elements of
`names`.
4. Use a list comprehension to strip the numbers from all of the
elements of `names`.
In: Computer Science
What are device control threats? and a few examples.
In: Computer Science
int main(int argc, char *argv[]){ int fd1, fd2; char buffer[100]; long int n1; if(((fd1 = open(argv[1], O_RDONLY)) == -1) || ((fd2 = open(argv[2], O_CREAT|O_WRONLY|O_TRUNC,0700)) == -1)){ perror("file problem "); exit(1); } while((n1=read(fd1, buffer, 512) > 0)) if(write(fd2, buffer, n1) != n1){ perror("writing problem "); exit(3); } // Case of an error exit from the loop if(n1 == -1){ perror("Reading problem "); exit(2); } close(fd2); exit(0); }
Could anyone fix the two issues in the while loop, so the ouput can be "writing problem : Bad file descriptor"
In: Computer Science
You are working with clients for a new opt-in email
process on their existing website. They wish to allow customers to
“opt in” to receiving emails from them and you are designing the
screen(s) and database(s) or files they need to store the
information they collect from the customers. (Note: you do not
actually have to design the screens or databases!)
Please draft up ten (10) interview questions that you
might ask the clients about the project, to give you a better idea
of what they want. Be sure to include close-ended questions, a
couple open-ended questions, and at least one probing question. You
will need to read
your textbook and/or do some research on the internet about
effective interview questions and techniques.
Make your original posting of ten interview questions
with a brief introductory statement that you would make to your
client (for example, “Hello Mrs. ____, let’s start out our
analysis……etc).
You have complete leeway as to the questions
themselves but make sure they’re relevant to a new project of
allowing customers to opt-in on their website with their email
address, and that they would get you started on your
analysis.
In: Computer Science
It is common to use a configuration management system to control product scope. Research the web and share five common tools and why they should be considered as part of an Integrated Change Control process.
In: Computer Science
Prove the following:
When replacing the key in a node of a heap with a key that is greater than one, or greater than both, of its children, then sifting that node down (trading places with its smallest child) until it is less than all of its children will produce a heap.
In: Computer Science
How can we transform a "synchronous" web method to "asynchronous" web methods?
In: Computer Science
Write a C++ program to open and read a text file and count each unique token (word) by creating a new data type, struct, and by managing a vector of struct objects, passing the vector into and out of a function.
Declare a struct TokenFreq that consists of two data members: (1) string value; and (2) int freq; Obviously, an object of this struct will be used to store a specific token and its frequency. For example, the following object word stores the token "dream" and its frequency 100:
TokenFreq word;
word.value="dream";
word.freq=100;
Implement the function vector<TokenFreq> getTokenFreq( string inFile_name); This function reads the specified input file line by line, identifies all the unique tokens in the file and the frequency of each token. It stores all the identified (token, freq) pairs in a vector and returns this vector to the calling function. Don't forget to close the file before exiting the function.
#include <iostream>
#include <string>
#include <fstream>
#include <vector>
#include <cstring>
using namespace std;
struct TokenFreq
{
string value;
int freq;
};
vector<TokenFreq> getTokenFreq(string inFile_Name)
{
}
int main()
{
}
In: Computer Science
C# PLEASE
Lab7B: For this lab, you’re going to write a program that prompts the user for the number of GPAs to enter. The program should then prompt the user to enter the specified number of GPAs. Finally, the program should print out the graduation standing of the students based on their GPAs. Your program should behave like the sample output below.
Sample #1:
Enter the number of GPAs: 5
GPA #0: 3.97
GPA #1: 3.5
GPA #2: 3.499
GPA #3: 3.71
GPA #4: 1.9
Student #0: Summa Pum Laude
Student #1: Pum Laude
Student #2: Graduating
Student #3: Magna Pum Laude
Student #4: Not graduating
Sample #2:
Enter the number of GPAs: 7
GPA #0: 0.03 GPA #1: 4.0
GPA #2: 3.32 GPA #3: 2.81
GPA #4: 3.75 GPA #5: 3.85
GPA #6: 2.3
Student #0: Not graduating
Student #1: Summa Pum Laude
Student #2: Graduating
Student #3: Graduating
Student #4: Magna Pum Laude
Student #5: Magna Pum Laude
Student #6: Graduating
In: Computer Science
Handling Competition among Processes in computer science
In: Computer Science