Questions
Build an application using HTML, CSS, javascript, json. It is not necessary for backend to be...

Build an application using HTML, CSS, javascript, json. It is not necessary for backend to be working but the frontend should be good. App should to simple and useful in our day to day life. For eg- grocery shopping list or alarm or weather forecast or reminder.

In: Computer Science

**Java** - Creating from scratch. Original code hasn't been created yet. Design a class named Octagon...

**Java** - Creating from scratch. Original code hasn't been created yet.

Design a class named Octagon that extends GeometricObject class and implements the Comparable and Cloneable interface. Assume that all eight sides of the octagon are of equal size. The area can be computed using following formula:

Write a test program that creates an Octagon object with side values 5 and display its area and perimeter. Create a new object using clone method and compare the two objects using compareTo method.

In: Computer Science

The application of lexical analysis techniques in text editor You should cover: 1) What is the...


The application of lexical analysis techniques in text editor

You should cover:
1) What is the problem?
2) What is the compiler construction techniques used to solve the problem
3) How to solve the problem using the compiling techniques.

In: Computer Science

Describe the data breach incident and the primary causes of the data breach.

Describe the data breach incident and the primary causes of the data breach.

In: Computer Science

Windows PowerShell Log in as Tawny Madison and create a directory called c:\users\tmadison\research and within it,...

Windows PowerShell

Log in as Tawny Madison and create a directory called c:\users\tmadison\research and within it, another directory called departmental meeting minutes. Set the permissions on the departmental meeting minutes directory so that the user tmadison can read and modify it, any other members of the research group can only read it, and no one else can do anything with it. (If someone is listed as belonging to both the research group and another group, they should still be allowed to read it.)

This is what I have so far:

1) New-Item -Path “c:\users\tmadison\research\departmental meeting minutes” -ItemType “directory”

2) Icacls “c:\users\tmadison\research\departmental meeting minutes” /grant “user”:r

I used New-Item to create the directory but I'm having trouble setting up permissions for the directory "departmental meeting minutes".

These are the permissions I need to set up using PowerShell.

"tmadison" Owner = Read & Modify

"research" Group = Read Only

Everyone else = Cannot do anything with it

In: Computer Science

Write a 250- to 350-word paper discussing the key aspects of how Windows will fit into...

Write a 250- to 350-word paper discussing the key aspects of how Windows will fit into your proposed corporate environment.Focus on Servers and the role they will play

In: Computer Science

Explain Sampling Terminology, Methods of Selecting Random Samples, Introduction to Estimation. Explain Sampling Distribution, Confidence Interval...

Explain Sampling Terminology, Methods of Selecting Random Samples, Introduction to Estimation.

Explain Sampling Distribution, Confidence Interval for a Mean, Total, Proportion, Standard Deviation, Difference between Means, Sample size selection.

In: Computer Science

How do you use header files on a program? I need to separate my program into...

How do you use header files on a program?

I need to separate my program into header files/need to use header files for this program.Their needs to be 2-3 files one of which is the menu. thanks!

#include
#include
#include

using namespace std;

const int maxrecs = 5;

struct Teletype

{

string name;
string phoneNo;

Teletype *nextaddr;

};

void display(Teletype *);
void populate(Teletype *);
void modify(Teletype *head, string name);
void insertAtMid(Teletype *, string, string);
void deleteAtMid(Teletype *, string);
int find(Teletype *, string);
bool is_phone_no(string);

int main()

{

Teletype *list, *current;

string name;
string phoneNo;
int menu;

list = new Teletype; //new reserves space and returns the adress to the list

current = list;

for (int i = 0; i < maxrecs - 1; i++)
{
populate(current);
current->nextaddr = new Teletype;
current = current->nextaddr;
}

populate(current);
current->nextaddr = NULL;
cout << "The contents of the linked list is: " << endl;
display(list);

cout << "\nPlease select a number from the menu: " << endl;
cout << "(1)Insert new Structure on the linked list." << endl;
cout << "(2)Modify an existing structure in the Linked list." << endl;
cout << "(3)Delete an existing structure in the Linked list." << endl;
cout << "(4)Find an existing Structure from the Linked list." << endl;
cout << "(5)Exit the program." << endl;

cin >> menu;

switch (menu)
{
case 1: cout << "Enter Name and number" << endl;
cin >> name >> phoneNo;
insertAtMid(list, name, phoneNo);
cout << "The contents of the link list after inserting: " << endl;
display(list);
break;
case 2: cout << "\nName of the person you need to modify: ";
cin >> name;
modify(list, name);
display(list);
break;
case 3: cout << endl;
cout << "Enter Name " << endl;
cin >> name;
deleteAtMid(list, name);
cout << endl;
cout << "The contents of the linked list after deleting is: " << endl;
display(list);
break;
case 4: cout << endl<< endl;
cout << "Enter a name (last, first): ";
getline(cin, name); // getline because of the namespace
if (!find(list, name))
{
cout << "The name is not in the current phone list" << endl;
}
break;
case 5: break;
}

return 0;

}

void insertAtMid(Teletype *head, string name, string phone)
{
Teletype *tmp = new Teletype();
tmp->name = name;
tmp->phoneNo = phone;
tmp->nextaddr = head->nextaddr;
head->nextaddr = tmp;
}

void deleteAtMid(Teletype *head, string name)
{
while (head->nextaddr != NULL)
{
if (head->nextaddr->name == name)
{
Teletype *del = head->nextaddr;
head->nextaddr = head->nextaddr->nextaddr;
delete del;
}
head = head->nextaddr;
}
}

void display(Teletype *contents)
{
while (contents != NULL)
{
cout << endl
<< setw(30) << contents->name << setw(20) << contents->phoneNo;
contents = contents->nextaddr;
}
}

int find(Teletype *contents, string name)
{
int found = 0;
while (contents != NULL)
{
if (contents->name == name)
{
found = 1;
cout << setw(30) << contents->name << setw(20) << contents->phoneNo;
break;
}
else
{
contents = contents->nextaddr;
}
}
cout << endl;
return found;
}

void modify(Teletype *head, string name)
{
string phone;
while (head->nextaddr != NULL)
{
if (head->nextaddr->name == name)
{
cout << "Enter new name and phoneNumber: ";
cin >> name >> phone;
head->nextaddr->name = name;
head->nextaddr->phoneNo = phone;
return;
}
head = head->nextaddr;
}
cout << "No suchrecord found\n";
}

bool is_phone_no(string phoneNo)
{
for (auto it = phoneNo.begin(); it != phoneNo.end(); it++)
{
if (*it > '9' || *it < '0')
return false;
}
return true;
}

void populate(Teletype *record)
{
cout << "Enter a name: ";
getline(cin, record->name);
string phoneNo;
while (true)
{
cout << "Enter the phone number: ";
getline(cin, phoneNo);
try
{
if (!is_phone_no(phoneNo))
{
throw "Exception caught! Invalid phone number\n";
}
record->phoneNo = phoneNo;
break;
}
catch (const char *e)
{
cout << e;
}
}

return;
}

In: Computer Science

The Delta Insurance Company is having a policyholder subsystem which has started giving trouble. Over the...

The Delta Insurance Company is having a policyholder subsystem which has started giving trouble. Over the years, the application evolved from using fixed length, multi-record type files to using a hierarchic database to using a relational database. The programs did not change much, but the data structures changed radically. Program code was patched to provide for the new data structure. The amount of people-time allocated to policyholder maintenance grew 15% per year over the last five years and is now costing as much per year as it did in 1980 to develop the original application. No one ever considered reevaluating the subsystem for redevelopment, but they would like to now. Upon inspection, the documentation was found to be up-to-date and includes flow charts and data flow diagrams. There are no current diagrams of the data structure. There are also no historical files of decisions or of changes. Apply the concepts of change management to discuss how should the company get this application in order? What type( s) of maintenance should they consider for the next set of changes?

In: Computer Science

Write Matlab code that solves (dy/dt)= yt^3 - 1.5y on the interval t= 0 to 2...

Write Matlab code that solves (dy/dt)= yt^3 - 1.5y on the interval t= 0 to 2 where y(0) = 1. As well as (dy/dx) = (1+4x)y^.5 on the interval x = 0 to 1 where y(0) = 1 using Matlab functions that solve any ODE using the below methods

  • Midpoint Method
  • Huens Method

Functions need to call:

  • Error desired
  • number of iterations
  • Step size
  • Initial Interval
  • y(0)

And return

  • Result
  • Error of that result

In: Computer Science

Write Matlab code that solves (dy/dt)= yt^3 - 1.5y on the interval t= 0 to 2...

Write Matlab code that solves (dy/dt)= yt^3 - 1.5y on the interval t= 0 to 2 where y(0) = 1. As well as (dy/dx) = (1+4x)y^.5 on the interval x = 0 to 1 where y(0) = 1 using Matlab functions that solve any ODE using the below method

  • Runge-Kutta Method 4th Order

Functions need to call:

  • Error desired
  • number of iterations
  • Step size
  • Initial Interval
  • y(0)

And return

  • Result
  • Error of that result

In: Computer Science

Please perform the following tasks using a Timer Control: When an NO Push Button (I:0/0) is...

Please perform the following tasks using a Timer Control:

  1. When an NO Push Button (I:0/0) is pressed (I0) and released, a Pilot Light (O:0/0) will be on and after 7 seconds (T4:0), a single-active cylinder will be pushed forward.
  2. The piston will remain at its position for another 5 seconds (T4:1) and then it will automatically retract. The pilot light will be off and the timer will also be automatically reset. The whole cycle can then be repeated.

In: Computer Science

Security Controls to Protect Assets What are the control measures currently in use to protect against...

Security Controls to Protect Assets

What are the control measures currently in use to protect against payroll fraud?
What are the vulnerabilities related to payroll fraud found by the risk assessment team?

Please make copy paste available

Must be 250 words

In: Computer Science

(a) Write a stack class that is based on a linked list. It can be just...

(a) Write a stack class that is based on a linked list. It can be just pop(), push(), and anything you need for those methods or testing.

(b) Write a queue class that is based on a linked list. As above, it can be just enqueue() and dequeue(), as well as anything you need for those methods or testing.

(c) Write some test cases, trying to include edge cases. Why did you choose those tests? Did you get the results you expected?

In: Computer Science

RCS (Revision Control System), a configuration management tool, adopts a reverse delta approach for storing multiple...

RCS (Revision Control System), a configuration management tool, adopts a reverse delta approach for storing multiple versions of a file. To optimize storage, RCS only stores the latest version of each configuration item and the differences between each version. For example, assume a file has three revisions—1.1, 1.2, and 1.3. RCS stores the file as of version 1.3, then the differences between 1.2 and 1.3, and finally the differences between 1.1 and 1.2. When a new version is created, say 1.4, the difference between 1.3 and 1.4 is computed and stored, and the 1.3 version is deleted and replaced by 1.4. Do you think RCS is able to apply Version Control in this case? Research the internet and find the pros and cons of this tool as a configuration management tool. Also, suggest some other tool that could be used for this scenario.

In: Computer Science