Draw a small diagram of a MAC address. Note the OUI. Note how many bits in each section.
In: Computer Science
Java Programming Preferably
Concepts:
Generics
Arrays
Objects
Part I: Write a routine in Java that takes an array, the length of the array, and an element and returns the position of the element in the array. For example, given the array with values [2, 4, 6, 8] and element 6, the routine should return 2 (since counting from 0, 6 occurs at position 2 in the array). Your routine should use generics to enable your routine to be reusable for different element types. Be sure to test your code with a Java compiler before you submit it.
Part II: Write a generic “greater-than” function that (a) takes two objects as arguments, each of which has a “value” method which returns an integer; and (b) returns the argument whose “value” method returns the larger integer. Your generic function should constrain its type argument so that types without a “value” method cannot be used.Please review the test harness example to ensure your program meets the requirements. Find the test harness below;
public class TestGenerics {
public static void main(String[] args) {
MyFirstObject myObj1 = new MyFirstObject();
MySecondObject myObj2 = new MySecondObject();
MyGenerics mg = new MyGenerics();
Integer[] array = {2,4,6,8};
System.out.println( mg.partOne(array, array.length, 6) );
System.out.println( mg.partTwo(myObj1, myObj2) );
}
}
In: Computer Science
Create a C++ integer linked list program that performs the following methods below:
Please create these three source files: intList.h, intList.cpp, & intListTest.cpp.
Implement recursive routines in the intList class to do the following:
Modify main (in IntListTest.cpp) so it does the following:
Steps 3-8 must use recursion.
Please follow requirements.
In: Computer Science
Question 1: The word size of a computer generally indicates the largest integer it can process in a single instruction. Discuss two different word sizes of computer systems and provide a brief comparison of both word size systems.(Discuss in one full page)
Question 2: A computer has RAM of size 64 M words, its instruction set has 32 instructions and 16 registers in the CPU. What is the format and size of each of the following instructions?
ADD R1,R2,R3
Move a, R1
Halt
In: Computer Science
4.31 Implement function duplicate() that takes as input the name (a string) of a file in the current directory and returns True if the file contains duplicate words and False otherwise. duplicate('Duplicates.txt') True duplicate('noDuplicates.txt') False
Please solve using Python Language and without using str.maketrans please. Just simple programming, Thank youuuuu!!!!!
In: Computer Science
. What is the primary difference between UDP and TCP?
33. A router deals with which part of the IP address:
34. A hop in a TCP/IP network refers to:
35. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 4 bits?
36. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 5 bits?
37. What is one of the main purposes of IP version 6 (IP Next Generation)?
38. Address 205.169.85.0 is assigned by ICANN as a corporate IP address. Which of the following statements is true:
In: Computer Science
Write in assembly 8086.
Write a program to input nine numbers in 4*4 array and
prints the maximum value of
each row and then prints the minimum of each column.
In: Computer Science
Question 1:
The following questions contains real numbers for COVID-19 daily report made on 2020-09-07
Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.
Give the table name COVID_REPORT and make “Country_name” as Primary Key.
Question 1:
The following questions contains real numbers for COVID-19 daily report made on 2020-09-07
Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.
Give the table name COVID_REPORT and make “Country_name” as Primary Key.
Country_name |
Continent |
new_cases |
new_deaths |
total_cases |
total_deaths |
Saudi Arabia |
Asia |
895 |
32 |
320827 |
4081 |
Bahrain |
Asia |
676 |
2 |
54771 |
198 |
United Kingdom |
Europe |
2988 |
2 |
347152 |
41551 |
France |
Europe |
7071 |
3 |
324777 |
30701 |
Lebanon |
Asia |
415 |
4 |
20426 |
191 |
Country_name |
Continent |
new_cases |
new_deaths |
total_cases |
total_deaths |
Saudi Arabia |
Asia |
895 |
32 |
320827 |
4081 |
Bahrain |
Asia |
676 |
2 |
54771 |
198 |
United Kingdom |
Europe |
2988 |
2 |
347152 |
41551 |
France |
Europe |
7071 |
3 |
324777 |
30701 |
Lebanon |
Asia |
415 |
4 |
20426 |
191 |
In: Computer Science
To be Completed in C#
Write a program that creates an exception class called ManyCharactersException, designed to be thrown when a string is discovered that has too many characters in it. Consider a program that takes in the last names of users. The driver class of the program reads the names (strings) from the user until the user enters "DONE". If a name is entered that has more than 20 characters, throw the exception. Design the program such that it catches and handles the exception if it is thrown. Handle the exception by printing an appropriate message, and then continue processing more names by getting more inputs from the user. Note: Your program should exit only when the user enters "DONE".
SAMPLE OUTPUT:
Enter strings. When finished enter DONE
Short string
You entered: Short string
Medium size string
You entered: Medium size string
Really really long string, someone stop me!
You entered too many characters
DONE
You entered:
DONE
Good bye!
In: Computer Science
Whenever an exception arises, it terminates the program
execution, which means it stops the execution of the current java
program.
a) Identify and explain how the remedy for the exception is
considered.
b) Implement the above-identified remedy in the java program to
overcome the problem raised in the exceptional case when we try to
open and close the files.
In: Computer Science
In: Computer Science
DHCP Troubleshooting
Review the following technical support email from a junior IT admin:
Facilitation
Dear IT Admin:
I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust?
Thank you, Junior Admin
-- Respond in detail with clarifying questions, suggested approaches and/or possible solutions
In: Computer Science
List two algorithms commonly used to identify a frame for replacement
In: Computer Science
In: Computer Science
What characteristics need to be exhibited by an organization to improve its software process?
In: Computer Science