Complete a Problem Solving discussion in Word. Your Problem Solving discussion should include Problem Statement, Problem Analysis, Program Design, Program Code and Program Test. For the Program Code section, use Raptor to code
1. Alberta Einstein teaches a business class at Podunk University. To evaluate the students in this class, she has given three tests. It is now the end of the semester and Alberta asks you to create a program that inputs each student’s test scores and outputs the average score for each student and the overall class average. (Hint: The outer loop should allow for Ms. Einstein to input all the students, one by one, and the inner loop should accept the three test scores and compute the average for each student.)
In: Computer Science
ICMP time expired error messages have two meaning? 1.) TTL expired is one reason 2.) what is the other time expired reason? explain fully with an example if possible.
In: Computer Science
C Programming: Write a program that will guess an integer that the user has picked. Imagine that the user will write down a positive integer x on a piece of paper and your program will repeatedly ask questions in order to guess what x is, and the user replies honestly. Your program will start by asking for an int n, and you must have 1 ≤ x ≤ n. After that, the program will successively guess what x is, and the user must tell the computer if x is equal to the guess (entering ’e’), larger than the guess (entering ’l’), or smaller than the guess (entering ’s’). Your program will guess by maintaining a lower bound (initially 1) and upper bound (initially n) and pick the largest integer equal to or smaller than1 the midpoint of the lower bound and upper bound. If the user responds with ’l’ indicating that x is larger, the guess becomes the new lower bound plus one. If the user responds with ’s’ indicating that x is smaller, the guess becomes the new upper bound minus one. If the user responds with ’e’ indicating that x is the guess, your program will report the number of guesses made and terminate execution:
Example 1)
Enter n: 50
Is your number 25? l
Is your number 38? l
Is your number 44? s
Is your number 41? e
Your number must be 41. I used 4 guesses.
Example 2) Enter n: 9
Is your number 5? s
Is your number 2? l
Is your number 3? s
Error: that’s not possible.
Example 3)
Enter n: -2
Error: n must be positive.
Example 4)
Enter n: 9
Is your number 5? m
Error: invalid input.
Example 5) Enter n: a
Error: invalid input.
In: Computer Science
uestion 2
Transform the following “C” program into assembly for
the 6808 Microcontroller.
Remember when converting this “C” code to
follow
best practices
covered in DEF in terms of implementing subroutines in
assembly
o
This means that parameters are passed on the stack to
subroutines
o
Return values are passed back on the stack
o
You clean up the stack after every use (every
subroutine call) to prepare it for the next call
Keep in mind that once your translated this program
into assembly – you can step through it to ensure that it behaves
correctly and calculates the
expected results.
/*
-------------------------------------------------------------
PURPOSE: This program will take 2 operand values
and
calculate the sum and difference of the
values
-------------------------------------------------------------
*/
// This function calculates the sum of 2 operands
called "A" and "B"
Int
calculateSum(
int
A,
int
B)
{
return
(A + B);
}
// This function calculates the difference between 2
operands by negating B and adding it to A
int
calculateDifference(
int
A,
int
B)
{
return
(calculateSum(A, -B));
// reuse the calculateSum function
}
void
main(
void
)
{
int
firstOperand = 18;
// to be stored at address $80 within the
6808
int
secondOperand = 8;
// to be stored at address $81 within the
6808
int
sum = 0;
// to be stored at address $84 within the
6808
int
difference = 0;
// to be stored at address $86 within the
6808
// call the calculateSum function in order to
calculate the total and store it in the "sum" variable
sum = calculateSum(firstOperand,
secondOperand);
// call the calculateDifference function in order to
calculate the difference and store it in the "difference"
}
please help I need the code in assembly
In: Computer Science
In python, how do I define a function (check_domain) which takes a email (string) and domain name (string) as input. using slice, it will return true if the email address' domain same matches the input domain name. For example, when input are ”[email protected]” and ”msn.com”, the function you defined should return True. When input are ”[email protected]” and ”hotmail.com”, it should return False
In: Computer Science
java
Write method that takes a 2D square array and two integer values that represent the indices of the two columns. Method swaps the first two columns.
int[][] in = {{1,2,3}, {3,2,4}, {4,2,7}};
would output 213234247
public static void swap(int[][] in, int index1, int index2) {
In: Computer Science
(For C++) Assume that sentence is a variable of type string that has been assigned a value . Assume furthermore that this value is a string consisting of words separated by single space characters with a period at the end. For example: "This is a possible value of sentence."
Assume that there is another variable declared , secondWord, also of type string . Write the statements needed so that the second word of the value of sentence is assigned to secondWord. So, if the value of sentence were "Broccoli is delicious." your code would assign the value "is" to secondWord.
In: Computer Science
List the relational operators recognized by Python, and explain their meanings
In: Computer Science
Explain Business Intelligence in one page or less. Focus upon the concept that ‘BI’ is an umbrella term and explain what the components of a ‘BI’ system are and what its architecture and purpose are.
In: Computer Science
Given the following list of values, perform a binary search for the indicated search item. Use the binary search algorithm on pg. 1026 of our textbook. Show the values of first, last and middle, and the number of comparisons made after each iteration of the loop. Your should create a table like the following to show your work, where first and last are the values of the variables at the beginning of the loop, and mid is the midpoint used during that iteration, list[mid] is the value in the list at the midpoint, and No. of key comparisons should be the number of comparisons made during this iteration by the algorithm:
Iteration first last mid list[mid] No. of key comparisons 1 0 12 ? ? ?
List:
[ 2, 3, 4, 4, 5, 7, 10, 14, 15, 17, 22, 23, 24 ]
Searching for value: 3
In: Computer Science
Language: Python
Create a graph and then set initial and goal states such that the number of nodes visited for BFS is smaller than that in DFS. Now modify the initial and goal state such that the number of nodes visited for BFS is larger than that in DFS.
In: Computer Science
Write a program, which will act as a simple four-function calculator. That is, it will read a number, read an operator, read another number, then do the operation. The calculator works with integers and uses four functions: +, -, *, and /. After the first operation is completed, the program will read another operator and uses the result of the previous operation as the first value for the next operation. If the user enters either an upper- or lower-case C the result is cleared and then the user starts entering a new number. If the user enters an X, the calculator is turned off. The various input values (i.e. numbers, operators, commands) will be followed by the ENTER key. Your program should prompt the user on what the user is to do. The commands C and X may be entered in place of an operator.
NOTES:
The person using the calculator has a terrible time using a keyboard and may not always enter a valid operator. If this happens the program should ask for another operator. Regardless of the math operation attempted, the program must not die. If the math operation would cause a fatal error in your program you should check for it and issue an error message rather than attempting the operation.
Please write the code for C programming, not C++ or Java
In: Computer Science
USE PYTHON ONLY
Please write a Python program to let you or the user play the game of rolling a dice and winning/losing money. Initially, you have 100 dollars in your account. You place a bet to roll the dice. The game will be stopped if your bet is zero. First, dealer would roll the dice and get a number from random.randint(1, 6). Then, you would roll the dice and get a number from random.randint(1, 6). Now, compare your number with dealer’s number to see whether you won or lose the bet. If you lose, the bet would be deducted from your account. If you won, the bet would be added to your account. If it’s a tie, your account is not touched. Then, continue the game of putting your bet until your bet is zero. The game is to continue even when you have zero or negative amount of money. You must test your game program 3 times with at least 10 rounds for each game. The output of your test case #1 may like as follows: Welcome to the Rolling Dice Game of TM
1 =============================================. Now, you have 100 dollars to play the game.
2 =============================================. Enter your bet to roll the dice (enter 0 to quit): 10 Dealer got 1 , and you got 5 . You won 10 dollars. Now, you have 110 dollars.
3 =============================================. Enter your bet to roll the dice (enter 0 to quit): 5 Dealer got 5 , and you got 3 . You lost 5 dollars. Now, you have 105 dollars.
4 =============================================. Enter your bet to roll the dice (enter 0 to quit): 30 Dealer got 3 , and you got 3 . It's a tie. Now, you have 105 dollars.
5 =============================================. Enter your bet to roll the dice (enter 0 to quit): 200 Dealer got 3 , and you got 4 . You won 200 dollars. Now, you have 305 dollars.
6 =============================================. Enter your bet to roll the dice (enter 0 to quit): 100 Dealer got 4 , and you got 1 . You lost 100 dollars. Now, you have 205 dollars.
7 =============================================. Enter your bet to roll the dice (enter 0 to quit): 205 Dealer got 2 , and you got 6 . You won 205 dollars. Now, you have 410 dollars.
8 =============================================. Enter your bet to roll the dice (enter 0 to quit): 400 Dealer got 3 , and you got 6 . You won 400 dollars. Now, you have 810 dollars.
9 =============================================. Enter your bet to roll the dice (enter 0 to quit): 500 Dealer got 4 , and you got 1 . You lost 500 dollars. Now, you have 310 dollars.
10 =============================================. Enter your bet to roll the dice (enter 0 to quit): 310 Dealer got 6 , and you got 2 . You lost 310 dollars. Now, you have 0 dollars.
11 =============================================. Enter your bet to roll the dice (enter 0 to quit): 10 Dealer got 3 , and you got 6 . You won 10 dollars. Now, you have 10 dollars.
12 =============================================. Enter your bet to roll the dice (enter 0 to quit): 40 Dealer got 3 , and you got 1 . You lost 40 dollars. Now, you have -30 dollars.
13 =============================================. Enter your bet to roll the dice (enter 0 to quit): 0
14 =============================================. Thank you for playing the Rolling Dice Game of TM
15 =============================================.
In: Computer Science
Network Analysis and Theory
a) In your opinion what are the biggest threats to a network in terms of security and why?
b) Describe what you would do to protect a network from attack, mention any appliances or products you can recommend.
In: Computer Science
Risk analysis is one way to monitor security in an organization.
Risk analysis can be a time- consuming process; it involves a
number
of steps, some of which require “educated guessing.” Nevertheless,
the process alone raises awareness of security issues even if no
immediate actions are taken as a result. The steps are:
i. Identify assets (infrastructure, people, hardware, software, reputation, etc.).
For the rest of this list, we’ll concentrate on a single asset.
ii. Determine vulnerability (what event or events might happen to the asset. For example, the building could catch fire, the website could be hacked, etc.).
For the rest of this list, we’ll concentrate on a single asset vulnerable to a single event.
ii. Estimate the probability per year of this event (based on past data, expert estimates, etc.). Take current security measures into account.
iv. Estimate the expected cost if this event occurs (cost to repair or replace, cost of lost business, etc.).
v. Compute risk exposure 5 cost estimate 3 probability estimate.
vi. Identify any additional security measure X that would help protect against this event, determine what it would cost, and do a calculation of the risk exposure with the additional security measure X in place.
vii. Do a cost-benefit analysis:
(Risk exposure without X – Risk exposure with X) − Cost of X
You have a small web-based business that uses a single server to manage your webpage and your customer information. Over the past four years, your website has been hacked and taken down twice. You estimate that the cost of this event is $600 to clean the server and reload the webpage and $12,000 in lost business while the server is down.
You could purchase a backup server for a cost of $3,000, which you estimate would reduce the probability per year of losing your website to 0.2. Would this be a cost- effective security measure?
What if you reevaluate the probability per year with the backup server to be 0.3. Does this change your answer?
In: Computer Science