Questions
python3 Continue from the previous function, write a draw_table method which draws a table of data....

python3

Continue from the previous function, write a draw_table method which draws a table of data. For example, consider the following code fragment:

my_table = Table([['Alice', 24], ['Bob', 19]], width=10)
my_table.draw_table()

produces:

|Alice     24        |
|Bob       19        |

Note: the column width is the value set up by the constructor. Insert a space in between columns.

and my previous function is

class Table:
def __init__(self,x, h = None, width=5):
self.x= x
self.h = h
self.w= width
def __str__(self):
return "headers={}, width={}, data={}".format(self.h,self.w,self.x)

In: Computer Science

. Star Smoothie in Summerville, South Carolina specializes in smoothies but also sells light breakfast and...

. Star Smoothie in Summerville, South Carolina specializes in smoothies but also sells light breakfast and lunch items as well as coffee, tea, and soda. The owner noticed that many customers bring their computers to do work while enjoying a smoothie. He wants to support these customers by offering them wireless Internet access. A recent customer survey also indicated that many customers loved the smoothies but were frustrated by the time to wait in line and to wait for the smoothie to be made. One of the employees suggests that an order-ahead application would allow customers to choose and pay for a smoothie from their phones and then just stop in at the specified time to pick them up. The owner wants to integrate support for making and fulfilling such orders. Currently the only forms of communication the shop owners have are a telephone and a credit card machine for payments. The owner has asked you to design a network that will allow customer Internet access, will support the order-ahead idea, and will allow customers to move inventory, finances, and other records to electronic systems.

You have already conducted a needs analysis for the network of the business you are working with. The next step is to translate that understanding of various users in terms of what they need into a specific list of design requirements. This will serve as a checklist for your design. For each item, you should provide a brief description of why that specific requirement is necessary.

Possible examples include:

  • Password-protected guest wireless access: The business wants to allow customers to access the Internet, but does not want general open access. This customer access should not give access to other network resources or computers and should not allow customers to access one another’s computers when logged on.
  • Shared data storage with version control: Employees often collaborate on documents and other materials. Common, shared access is needed for these materials. Employees should know when someone else is working on the materials or when changes have been made to support collaboration without inadvertently losing work.
  • Internet access: All computers on the company network need to be able to access the Internet through a shared modem.

Assignment (3–5 pages):

Create a list consisting of at least ten specific requirements for the network you are designing. Explain each requirement in terms of the needs of the business you have chosen to work with.

In: Computer Science

Consider a library management system and create the problem statement for that. For domain modelling what...

Consider a library management system and create the problem statement for that. For domain modelling what are the domain classes that might be included in a model? What are some of the associations among these classes? What are some of the attributes of each class? Draw a domain model class diagram for this system

In: Computer Science

Question: Conversion Program * This program will ask the user to input meters * After input,...

Question: Conversion Program

* This program will ask the user to input meters

* After input, a menu will be displayed:

* 1. Convert to kilometers

* 2. Convert to inches

* 3. Convert to feet

* 4. Quit

* * The user will select the conversion and the converted answer will be displayed.

* The program should redisplay the menu for another selection.

* Quit program when user selects 4.

Hi, my instructor requirement fix the bug in the code and run the code. I try to do some code but still not running thats are below. Please someone is expert review and fix my problem..

public class MetersConversion {

public static void main(String[] args) {

// Initialize variables

int selection;

double meters;

double kilo;

double inch;

double feet;

// Input the distance in Meters to be Converted

Scanner input = new Scanner(System.in);

System.out.print("Enter distance in meters: " + meters);

selection = input.nextInt();

meters = input.nextDouble();

while (selection); {

System.out.print("1. Convert to kilometers");

System.out.print("2. Convert to inches");

System.out.print("3. Convert to feet");

System.out.print("4. Quit the program\n\n");

if(selection == 1){

kilo = meters * 0.001;

}

else if(selection == 2){

inch = meters * 36.37;

}

else if(selection == 3){

feet = meters * 3.201;

}

else if(selConv == 4){

System.out.println("Bye!");

}

}

}

}

In: Computer Science

Part A: Database research (approx. 200-250 words): (5 Marks) Research Question: Explore history of database systems...

Part A: Database research (approx. 200-250 words):

Research Question: Explore history of database systems and discuss the three most important developments in database development history to date. (1.25 marks each)

Note: Use proper references in the APA style. Your research report must be well presented using proper content organization. (1.25 marks)

In: Computer Science

Conducting a Risk Assessment (10 marks) You will be given a list of organisation in week...

Conducting a Risk Assessment You will be given a list of organisation in week 3 by your lecturer and you can select any one organisation from them. The organisation uses various IT systems for its daily operations. Assume that you are appointed as an IT Systems Auditor for the chosen organisation and you are asked to provide a risk register must come up for the IT systems in the organisation. A brief introduction of the organisation and the IT systems Identify and explain any major risk in the IT systems components Discuss the consequences of the risk Inherent risk assessment, that is the assessed, raw/ untreated risk inherent in a process or activity without doing anything to reduce the likelihood or consequence Mitigate the risk Residual risk assessment, that is the assessed, risk in a process or activity in terms of likelihood and consequence after controls are applied to mitigate the risk. Create a Risk Register based on the risks identified in the IT systems and prioritise of the risk using a standardised framework such as the ANSI B11.0.TR3 Risk Assessment Matrix Given the fact there is no clear prioritisation framework NOR risk appetite framework, the risk register is your professional assessment of the likelihood and consequence of the risks you identify. When preparing your risk register you should think carefully about the assets the chosen organisation may have and how these may be compromised from the perspective of Information Security. The given organisation is Alliance Insurance.

In: Computer Science

The awk commands to print the first and third words (with a space between) from each...

The awk commands to print the first and third words (with a space between) from each line of the input that has the substring 'cat' in the second word (assume all lines have at least three words). Note, words are fields in this case. Your output should be a copy of each input line with the substring 'cat' in the second word and also, with just the first and third words printed. A series of comments that fully describes your awk commands, including a description of the purpose of each function call, and the arguments to each function.
using the command awk -f quest1.awk input.txt where 'input.txt' is the input file..

In: Computer Science

C++ requirements All values must be read in as type double and all calculations need to...

C++ requirements

All values must be read in as type double and all calculations need to be done using type double.

For part 2 you MUST have at least 4 functions, including main. The main function will be the driver of the program. It needs to either do the processing or delegate the work to other functions.

Failure to follow the C++ requirements could reduce the points received from passing the tests.

General overview

This program will convert a set of temperatures from Fahrenheit to Celsius.

Your program will be reading in three double values. The first values are starting and ending temperatures. The third value is the increment value. There is no prompt for the input. There is an error message that can be displayed. This is discussed later.

You need to display output for all of the values between the starting and ending values. First two values are temperatures in Fahrenheit. You need to display all of the values from the first temperature to the last temperature. You increment from one temperature to the next by the increment value (the third value you read in). You need to convert these temperatures to Celsius. You need to output the temperatures as both Fahrenheit and Celsius. The numbers should be 15 characters wide with 3 digits of precision and need to be in fixed format. Do not use tab characters (\t) to output the values.

For part 2 you MUST have at least 4 functions, including main. The main function will be the driver of the program. It needs to either do the processing or delegate the work to other functions.

Obviously the main function will have the same function that you have been using for all of your labs. In addition to need to have a function with the following signature:

double convert(double fahrenheit)

Other functions that you may want to have are:

A function to read in the values

A display function

A display heading function

The headings are also required (see the sample output below).

The conversion from Fahrenheit to Celsius is:

celsius = (fahrenheit - 32) / 1.8

Here is a sample run with valid input:

-30 100 20

The output would be:

     Fahrenheit        Celsius
        -30.000        -34.444
        -10.000        -23.333
         10.000        -12.222
         30.000         -1.111
         50.000         10.000
         70.000         21.111
         90.000         32.222

For data validation you need to make sure the first number read in is less than or equal to the second number. The third number read in must be greater than 0. If this is not the case you need to output the following message and read in three new values:

Starting temperature must be <= ending temperature and increment must be > 0.0

The above message is all one line of output.

You need to keep reading in values and outputting messages until the values are all valid.

Using the following input :

40 30 5
30 40 -5
30 40 5

We get the output:

Starting temperature must be <= ending temperature and increment must be > 0.0
Starting temperature must be <= ending temperature and increment must be > 0.0
     Fahrenheit        Celsius
         30.000         -1.111
         35.000          1.667
         40.000          4.444

Depending on the value for the increment the ending temperature may not be reached. You need to display the temperatures where the value of the Fahrenheit temperature is less than or equal to the ending temperature.

Consider this input:

100.5 110.4 5

The valid output will be:

     Fahrenheit        Celsius
        100.500         38.056
        105.500         40.833

The last Fahrenheit temperature output is 105.5. The next one would have been 110.5, but this is more than the ending temperature of 100.4. This is not an error condition. The output would be as above.

Think about what other tests cases are needed? Do we cover all possible input problems or valid types of input values?

Expected output

There are eight tests. Each test will have a new set of input data. You must match, exactly, the expected output.

You will get yellow highlighted text when you run the tests if your output is not what is expected. This can be because you are not getting the correct result. It could also be because your formatting does not match what is required. The checking that zyBooks does is very exacting and you must match it exactly. More information about what the yellow highlighting means can be found in course "How to use zyBooks" - especially section "1.4 zyLab basics".

Finally, do not include a system("pause"); statement in your program. This will cause your verification steps to fail.

In: Computer Science

VideoDev Ltd is a video and production development company which works for clients across Australia and...

VideoDev Ltd is a video and production development company which works for clients across Australia and New Zealand. The company is considering moving some of its computer infrastructure into the Cloud. The VideoDev Board is contemplating this move as a way to increase the company’s flexibility and responsiveness, as well as to achieve some savings on the cost of maintaining their ICT infrastructure.

VideoDev has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 100 video production, engineering and support staff that work on different projects for clients in Australia and New Zealand. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

VideoDev have a number of application servers in their Sydney and Melbourne datacentres that provide video processing capabilities for their staff. These servers are quite heavily customised and run reasonably heavy workloads while doing video processing. There is often a considerable queue of jobs waiting to be processed, which causes backlogs in getting jobs completed on time. The Board hopes that a move to a cloud based operation may help to relieve these backlogs.   

Another of VideoDev’s initial projects is to provide all their staff with a Standard Desktop Operating Environment (SDOE) on their desktop. This would include providing a standard desktop to any device that their staff may be using, as well as access to office automation, such as email, word processing, spreadsheet capabilities, as well as online storage for their files. The Board want the SDOE to be available on any device that their staff use, whether they are in the office, at home, or deployed at a customer’s office in the field.

VideoDev is considering the use of either Amazon WorkSpaces (https://aws.amazon.com/workspaces/) or Windows Virtual Desktop (https://azure.microsoft.com/en-au/services/virtual-desktop/) as a replacement for their existing desktop environment.

1. Explain how you think that VideoDev could move their video processing to the cloud. You will need to discuss:
a. Explain the differences between the service models IaaS and PaaS
b. What type of service model you would recommend?
c. What are the advantages of, and the issues with, the service model that you recommended for VideoDev’s video processing?
d. What other types of architectural patterns could be used in this deployment?
e. How that move would assist in removing backlogs?

In: Computer Science

Python 3 Function which takes the head Node of a linked list and sorts the list...

Python 3 Function which takes the head Node of a linked list and sorts the list into non-descending order. PARAM: head_node The head of the linked list RETURNS: The node at the head of the sorted linked list. '''

def sort(head_node):

#Code goes here

''' Test code goes here ''

' if __name__ == '__main__':

In: Computer Science

What type of security mechanism(s) are provided when a personal signs a form he has filled...

What type of security mechanism(s) are provided when a personal signs a form he has filled out to apply for a credit card?

In: Computer Science

In your own words explain the difference between two types of cloud computing: Platform as a...

  • In your own words explain the difference between two types of cloud computing: Platform as a service (PaaS) and .Infrastructure as a service (IaaS). Give at least 2 examples of PaaS and 1 example of IaaS AWS solutions implemented by Zillow. Describe main features and benefits of each .

In: Computer Science

What are the system categories that may fall into a data classification (Public, secret, top secret,...

What are the system categories that may fall into a data classification (Public, secret, top secret, etc.) scheme (file server, database server, Windows Active Directory servers, print servers, Web servers, application servers, etc)? How can we classify these systems? Can we have the same type of system in multiple classifications? Why?

In: Computer Science

Understand (1) CPU affinity. (2) What issues may be involved in VM migration?

Understand (1) CPU affinity. (2) What issues may be involved in VM migration?

In: Computer Science

1.  An ISA may be implemented by many different processor circuits. Why is this of value in...

1.  An ISA may be implemented by many different processor circuits. Why is this of value in the marketplace?
2. What data structure is used by the machine code program placed in the instruction memory of a fixed-length instruction representation processor?

3. The bit strings of a machine code program can be thought of as having a type. What is a reasonable name for this type?

In: Computer Science