Questions
COURSE : IT Enterprise systems Consider the following enterprise scenario and answer the following questions. ABC...

COURSE : IT Enterprise systems

Consider the following enterprise scenario and answer the following questions. ABC is a wholesale company that sells electrical equipment and provides a website from which customers can inquiry about products and identify what they want to buy. When costumers order electrical equipment, they place their order on the ABC website. ABC does not own or hold any equipment as inventory. Rather, the ABC orders the equipment from the appropriate supplier and ranges for the equipment to be shipped directly from the supplier to the customers. The customers pay ABC and receive receipts. The ABC also pays the suppliers and keeps the excess as revenues.

  1. Create a value chain REA model that represents the flow of ABC's resources between the sales/collection process with other business processes.
  2. Create a business process level REA model for ABC's sales/collection process. Be sure to include all relevant entities, relationships, and attributes.

note: NEED A UNIQUE ANSWER AND NO HANDWRITING PLEASE..

THANK YOU

In: Computer Science

Q1. The following is an X.509 certificate. Certificate: Data: Version: 3 (0x2) Serial Number: 3d:0e:98:b2:bf:af:fa:9e:99:91:05:64:69:6e:11:2a Signature...

Q1. The following is an X.509 certificate.

Certificate:

Data:

Version: 3 (0x2)

Serial Number:

3d:0e:98:b2:bf:af:fa:9e:99:91:05:64:69:6e:11:2a

Signature Algorithm: sha256WithRSAEncryption

Issuer: C=US, O=Symantec Corporation,

OU=Symantec Trust Network,

CN=Symantec Class 3 EV SSL CA - G3

Validity

Not Before: Aug 14 00:00:00 2017 GMT

Not After : Sep 13 23:59:59 2018 GMT

Subject: ... C=US/postalCode=22230, ST=Virginia,

L=Arlington/street=4201 Wilson Blvd,

O=National Science Foundation, OU=DIS,

CN=www.nsf.gov

Subject Public Key Info:

Public Key Algorithm: rsaEncryption

Public-Key: (2048 bit)

Modulus:

00:ca:fb:26:78:06:25:b1:9e:67:1d:69:0b:10:06:

cf:25:b6:7d:de:8e:56:80:e1:1c:38:52:62:43:fd:

...

Exponent: 65537 (0x10001)

Signature Algorithm: sha256WithRSAEncryption

4b:0d:62:11:b4:dc:78:09:12:c1:1b:24:ff:98:43:58:1c:54:

0a:34:be:8f:3f:12:8f:17:4a:fe:5b:26:13:1a:5f:a7:87:ad:

...

ba:2c:10:c7:bc:8b:2c:15:6e:0c:d2:d0:8b:74:52:c8:ed:05:

0b:9b:62:41

(a) Who issues the certificate?

(b) Who is the owner of the certificate?

(c) Who generated the signature on this certificate, and how can this signature be verified?

(d) The public key contained in this certificate is based on the RSA algorithm. Using the RSA algorithm, to encrypt a message M, we calculate Me mod n. What is the value of e and n in this public key? If a number is too large, you only need to write down its first four bytes.

(e) Before issuing the certificate, the CA needs to do a verification regarding the subject field. What is the main purpose of a certificate, i.e. why a subject needs a certificate? What has been the steps taken by the CA to verify the subject in this case?

In: Computer Science

For a mass storage device e.g. a hard disk or solid state disk give an example...

For a mass storage device e.g. a hard disk or solid state disk give an example of data processing when:

  • sustained rate was used
  • burst rate was "triggered"

In: Computer Science

6.23 LAB: Python insert/update sqlite3 datafiles Given is a Python program that connects to a sqlite...

6.23 LAB: Python insert/update sqlite3 datafiles

Given is a Python program that connects to a sqlite database and has one table called writers with two columnns:

  • name - the name of a writer
  • num - the number of works the writer has written

The writers table originally has the following data:

name, num
Jane Austen,6
Charles Dickens,20
Ernest Hemingway,9
Jack Kerouac,22
F. Scott Fitzgerald,8
Mary Shelley,7
Charlotte Bronte,5
Mark Twain,11
Agatha Christie,73
Ian Flemming,14
J.K. Rowling,14
Stephen King,54
Oscar Wilde,1

Update the Python program to ask the user if they want to update entries or add new entries. If the name entered already exists in the writers table then the database record is updated, overwriting the original contents. If the name does not exist in the writers table, then add a new record with the writer's name and number of works. The following TODO sections must be completed.

  • Check if a writer exists in the writers table
  • If the writer exists in the table, locate an entry to be updated by writer's name and update the writer's value for num
  • If the writer does not exist in the table, add a new entry in the writers table and provide the value for name and num

Ex: If the input is:

y
J.K. Rowling
30
y
Elton John
y
62
n

The output is:

(ID, Name, Num)
(1, 'Jane Austen', 6)
(2, 'Charles Dickens', 20)
(3, 'Ernest Hemingway', 9)
(4, 'Jack Kerouac', 22)
(5, 'F. Scott Fitzgerald', 8)
(6, 'Mary Shelley', 7)
(7, 'Charlotte Bronte', 5)
(8, 'Mark Twain', 11)
(9, 'Agatha Christie', 73)
(10, 'Ian Flemming', 14)
(11, 'J.K. Rowling', 30)
(12, 'Stephen King', 54)
(13, 'Oscar Wilde', 1)
(14, 'Elton John', 62)

In: Computer Science

Based on your project scenario that has been suggested by you or by your instructor and...

Based on your project scenario that has been suggested by you or by your instructor and approved by your instructor, answer the following questions.

Project Title:

Scenario Overview:

Q1

  1. In one page, create the project charter.
  2. Create the project scope statement.

Q2

Using any project management tool,

  1. Identify the project milestones and draw Gantt chart.
  2. Draw AOA network diagram.
  3. Identify all paths including the critical path for the project.
  4. In one page, create the Lessons-Learned report.

In: Computer Science

Write the functions necessary to simulate a gambling game with the following rules: The winner is...

Write the functions necessary to simulate a gambling game with the following rules:

The winner is the player who has a total closest to 9 without going over.

1. The player "rolls" 2 dice (6 sided dice)

2. The computer "rolls" 2 dice (6 sided dice)

3. The user is asked whether they want to roll one more time. If they indicate they do, another dice is rolled and added to the player's total.

4. A message is printed indicating the winner. In the case of a tie, the player wins. If both the computer and player go over 9, the computer wins.

5. YOU MAY ASSUME THAT THE USER ENTERS A VALID INTEGER (1 or 2) AS THEIR CHOICE.

You may NOT change the main function except to insert the if statement and print statements as indicated.

# define functions
def rollDice():
# function returns a random number between 1 and 6


def userWon(t1, t2):
# function accepts player total and computer total
# function returns true if player wins
# function returns false if computer wins


def main():
# each player rolls two Dice
player = rollDice() + rollDice()
computer = rollDice() + rollDice()
# ask the player if they want to roll again
again = int(input("Please enter 1 to roll again. Enter 2 to hold."))
# roll again if needed and add to player's total
if again == 1:
player = player + rollDice()

# insert your if statement here to determine the winner
# and your appropriate print statements

main()

In: Computer Science

Company XYZ has recently deployed a Distributed System for its operations ,but its CEO complains of...

Company XYZ has recently deployed a Distributed System for its operations ,but its CEO complains of increased expenses and delays, can you list two of the pitfalls of Distributes Systems that the system has fallen into?

In: Computer Science

Do you think ERP solutions are suitable for SIS University, and if so, how, or if...

Do you think ERP solutions are suitable for SIS University, and if so, how, or if not, why?

In: Computer Science

Write a java code to ask the user for a string, and assuming the user enters...

Write a java code to ask the user for a string, and assuming the user enters a string containing character "a", your java program must convert all "a" to "b" in the string so for example if user types : "AMAZON" , your program must convert it to "BMBZON"

the driver program must ask :

enter a string containing "a" or "A"

--------- (user enters string)

then it should say;

HERE IS YOUR NEW STRING

---------- (string with all a's converted to b.)

important : all a's should be b and even for capital letters (i.e. A to B).

In: Computer Science

6.13 Lab: Patient Class - process an array of Patient objects This program will create an...

6.13 Lab: Patient Class - process an array of Patient objects

This program will create an array of 100 Patient objects and it will read data from an input file (patient.txt) into this array. Then it will display on the screen the following:

  • 1. The names of the underweight patients.
  • 2. The names of the overweight patients.
  • 3. The names of the obese patients.

Finally, it writes to another file (patientReport.txt) a table as shown below:

Weight Status Report
==================== === ====== ====== =============
Name                 Age Height Weight Status
==================== === ====== ====== =============
Jane North            25   66     120   Normal
Tim South             64   72     251   Obese
.
.
.
==================== === ====== ====== =============
Number of patients: 5

Assume that a name has at most 20 characters (for formatting). Write several small functions (stand-alone functions). Each function should solve a specific part of the problem.

On each line in the input file there are four items: age, height, weight, and name, as shown below:

25 66 120 Jane North    
64 72 251 Tim South

Prompt the user to enter the name of the input file. Generate the name of the output file by adding the word "Report" to the input file's name.

  • If the input file name is patient.txt, the output file name will be patientReport.txt
  • If the input file name is newPatients.txt, the output file name will be newPatientsReport.txt

Display the output file's name as shown below:

Report saved in:  patientReport.txt

If the user enters the incorrect name for the input file, display the following message and terminate the program:

Input file: patients.txt not found!

Here is a sample output:

Showing patients with the "Underweight" status:
Tim South
Linda East
Paul West
Victor Smith
Tom Baker

Showing patients with the "Overweight" status:
none
Showing patients with the "Obese" status:
none
Report saved in:  patient1Report.txt

Main.cpp:

#include "Patient.h"
#include <iostream>
#include <iomanip>
#include <fstream>
#include <string>
using namespace std;

const int MAX_SIZE = 100;

/* Write your code here:
declare the function you are going to call in this program
*/

int main()
{
Patient patArr[MAX_SIZE];
int size = 0;

string fileName;
cout << "Please enter the input file's name: ";
cin >> fileName;
cout << endl;
/* Write your code here:
function calls
*/
return 0;   
}

/* Write your code here:
function definitions
*/

/*
OUTPUT:

*/

Patient.h:

/*
Specification file for the Patient class
*/

#ifndef PATIENT_H
#define PATIENT_H
#include <string>

using std:: string;


class Patient
{
private:

string name;
double height;
int age;
int weight;

public:
// constructors
Patient();

Patient(string name, int age, double height, int weight);
// setters
void setName(string name);

void setHeight(double height);

void setAge(int age);

void setWeight(int weight);

//getters
string getName() const;

double getHeight() const;

int getAge() const;

int getWeight() const;

// other functions: declare display and weightStatus

void display() const;

string weightStatus() const;
};

#endif

Patient.cpp:

/*
Implementation file for the Patient class.
*/

#include "Patient.h"
#include <iostream>
#include <iomanip>
#include <string>
using namespace std;

/*******
This is the default constructor; it sets everything to 0 or "".
*/
Patient::Patient()
{

name = "";
height = 0;
age = 0;
weight = 0;
}

/*******
This is an overloaded constructor.
It sets the variables according to the parameters.
*/
Patient::Patient(string name, int age, double height, int weight)
{

this->name = name;
this->height = height;
this->age = age;
this->weight = weight;

}

void Patient::setName(string name)
{
this->name = name;
}

void Patient::setHeight(double height)
{
this->height = height;
}

void Patient::setAge(int age)
{
this->age = age;
}

void Patient::setWeight(int weight)
{
this->weight = weight;
}

string Patient::getName() const
{
return this->name;
}

double Patient::getHeight() const
{
return this->height;
}

int Patient::getAge() const
{
return this->age;
}

int Patient::getWeight() const
{
return this->weight;
}

/*******
This function displays the member variables
in a neat format.
*/
void Patient::display() const
{
cout << fixed;
cout << " Name: " << getName() << endl;
cout << " Age: " << getAge() << endl;
cout << " Height: " << setprecision(0) << getHeight() << " inches" << endl;
cout << " Weight: " << getWeight() << " pounds" << endl;
cout << "Weight Status: " << weightStatus() << endl;
}

/*******
This function calculates the BMI using the following formula:
BMI = (weight in pounds * 703) / (height in inches)^2
Then, it returns a string reflecting the weight status according to the BMI:
<18.5 = underweight
18.5 - 24.9 = normal
25 - 29.9 = overweight
>=30 = obese
*/
string Patient::weightStatus() const
{
double bmi;
string stat = "";

if (height > 0)
{
bmi = (getWeight() * 703) / (getHeight() * getHeight());

if (bmi < 18.5)
{
stat = "Underweight";
}
else if (bmi >= 18.5 && bmi <= 24.9)
{
stat = "Normal";
}
else if (bmi >= 25 && bmi <= 29.9)
{
stat = "Overweight";
}
else
{
stat = "Obese";
}
}


return stat;
}

In: Computer Science

Write the functions needed by the main function that is given. multiply2nums should accept 2 values...

Write the functions needed by the main function that is given.

multiply2nums should accept 2 values and return the product (answer you get when you multiply).

greeting should accept one value and print an appropriate greeting using that value. For example, if you sent "Steven" to the greeting function, it should print "Hello, Steven"

DO NOT CHANGE ANYTHING IN main()

def main():
user = input("Please enter your name ")
greeting(user)
try:
num1 = int(input("Please enter an integer "))
num2 = int(input("please enter another integer "))
result = multiply2nums(num1,num2)
print("The product of your two numbers is ",result)
except:
print("Error found in input")


main()

In: Computer Science

In this assignment, you will implement a Polynomial linked list, the coefficients and exponents of the...

In this assignment, you will implement a Polynomial linked list, the coefficients and exponents of the polynomial are defined as a node. The following 2 classes should be defined.

p1=23x 9 + 18x 7+3 1. Class Node ● Private member variables: coefficient (double), exponents (integer), and next pointer. ● Setter and getter functions to set and get all member variables ● constructor 2. Class PolynomialLinkedList ● Private member variable to represent linked list (head) ● Constructor ● Public Function to create a Node ● Public function to insert the Node to the linked list (sorted polynomial according to the exponent). ● Public function to print the polynomial in the elegant format: 23x 9 + 18x 7+3 ● Overloaded public function to allow adding two polynomials poly3=poly1+poly2 (23x 9 + 9x 7+3)+(2x 4+3x 7+8x 2 -6) =23x 9 +12 x 7+2x 4+8x 2 -3 ● Overloaded public function to allow negating (!) the sign of any polynomial poly3=!poly1 2x 4+3x 7+8x 2 -6 =- 2x 4 -3x 7+8x 2+6 ● Overloaded public function to allow multiplying two polynomials ● Public function to evaluate polynomial based on an input If x=1, then the value of this polynomial 2x 4+3x 7+8x 2 -6 should be 2(1) 4+3(1) 7+8(1) 2 -6 =7

Main menu to test the following tasks ○ cout << "1. Create polynomial \n"; ○ cout << "2. Print polynomial \n"; ○ cout << "3. Add two polynomilas \n"; ○ cout << "4. Negate polynomial \n"; ○ cout << "5. Multiply two polynomials \n "; ○ cout << "6. Evaluate polynomial \n "; ○ cout << "7. Exit \n";

In: Computer Science

What happened at Revlon?

What happened at Revlon?

In: Computer Science

Consider the following un-normalized relational table on an online retail store orders and payments information: An...

Consider the following un-normalized relational table on an online retail store orders and payments information:

An online retail store would like to create a database to keep track of its sales activities. Information recorded in the database supposed to include customer number that identifies each customer, customer’s first name, last name, unique order number of orders a customer made, the date when an order was made, unique product number of products included in orders, product description, sequence number listing the sequence when a product is included in each order as well as the quantity for each product made in each order. The retail store would also like to store the payment information such as a credit card number of credit card that was being charge to, payment date and the amount paid. The online retail store allows customer to pay using any one of the credit cards the customers own, as long as the credit card is valid.

A database designer created the following relational schema:

CUSTORDER(custNum, custFName, custLName, orderNum, orderDate, prodNum, prodDesc, itemNum, quantity, cCardNum, paymentDate, amountPaid)

Decompose the relational schema into the smallest number of relational schemas each one in forth normal form (4NF) and to explain or justify that each schema is in 4NF. To justify that the relational schemas obtained from the decomposition are in 4NF you must find all functional and multivalued dependencies valid in each relational schema, you must find the minimal keys, and then apply the definitions to support your justification. Note, that a relational schema is in 4NF when it is in BCNF and it does not have any nontrivial multivalued dependencies. It means, that first, you have to prove that a schema is in BCNF and later show that it has no nontrivial multivalued dependencies. Please keep in mind that the smallest number of 4NF relational schemas is expected

In: Computer Science

Create your own programming application and give a brief description of the system.

Create your own programming application and give a brief description of the system.

In: Computer Science