I WANT THIS CODE TO BE SIMPLE BECAUSE I AM NEW TO CODING AND I WANT TO KNOW THE DETAILS! straight C Program. write a quiz game where a number of questions are asked and the user will win each time he answers right. and he loses each time he answers wrong.
the type of questions asked can be about sports or anything else. You can put 5 quiz questions.
It should only include the following: #include <stdio.h> and #include <stdlib.h>
because it is a simple code.
In: Computer Science
Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure systems to poorly designed defense missile control systems. When these industrial control systems, military weapon control systems, or air control transportation systems are designed without security built into the software, their security vulnerabilities are paramount to the national security, economy, and human health.
Do research on the latest prominent software vulnerabilities and share your literature review findings with the class.
In: Computer Science
In: Computer Science
how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv"); or fopen("Stores.csv", "r"); and making into a html table? It print but it keeps saying Notice: Undefined offset: , Notice: Undefined offset: 2, etc at the top.
Acme,Walmart,Ross,BJs,Target,Marshalls,Foot Locker,Giant,Charming Charlie
142,160,28,10,5,3,60,0.28,3167
175,180,18,8,4,1,12,0.43,4033
129,132,13,6,3,1,41,0.33,1471
138,140,17,7,3,1,22,0.46,3204
232,240,25,8,4,3,5,2.05,3613
135,140,18,7,4,3,9,0.57,3028
150,160,20,8,4,3,18,4.00,3131
207,225,22,8,4,2,16,2.22,5158
271,285,30,10,5,2,30,0.53,5702
89,90,10,5,3,1,43,0.30,2054
153,157,22,8,3,3,18,0.38,4127
87,90,16,7,3,1,50,0.65,1445
234,238,25,8,4,2,2,1.61,2087
106,116,20,8,4,1,13,0.22,2818
175,180,22,8,4,2,15,2.06,3917
165,170,17,8,4,2,33,0.46,2220
166,170,23,9,4,2,37,0.27,3498
136,140,19,7,3,1,22,0.63,3607
148,160,17,7,3,2,13,0.36,3648
151,153,19,8,4,2,24,0.34,3561
180,190,24,9,4,2,10,1.55,4681
293,305,26,8,4,3,6,0.46,7088
167,170,20,9,4,2,46,0.46,3482
190,193,22,9,5,2,37,0.48,3920
184,190,21,9,5,2,27,1.30,4162
157,165,20,8,4,2,7,0.30,3785
110,115,16,8,4,1,26,0.29,3103
135,145,18,7,4,1,35,0.43,3363
567,625,64,11,4,4,4,0.85,12192
180,185,20,8,4,2,11,1.00,3831
183,188,17,7,3,2,16,3.00,3564
185,193,20,9,3,2,56,6.49,3765
152,155,17,8,4,1,33,0.70,3361
148,153,13,6,3,2,22,0.39,3950
152,159,15,7,3,1,25,0.59,3055
146,150,16,7,3,1,31,0.36,2950
170,190,24,10,3,2,33,0.57,3346
127,130,20,8,4,1,65,0.40,3334
265,270,36,10,6,3,33,1.20,5853
157,163,18,8,4,2,12,1.13,3982
128,135,17,9,4,1,25,0.52,3374
110,120,15,8,4,2,11,0.59,3119
123,130,18,8,4,2,43,0.39,3268
212,230,39,12,5,3,202,4.29,3648
145,145,18,8,4,2,44,0.22,2783
129,135,10,6,3,1,15,1.00,2438
143,145,21,7,4,2,10,1.20,3529
247,252,29,9,4,2,4,1.25,4626
111,120,15,8,3,1,97,1.11,3205
133,145,26,7,3,1,42,0.36,3059
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<!-- title for web page -->
<title>Stores</title>
<link rel="stylesheet" href="style.css">
</head>
<body>
<h1>Stores</h1>
<table>
<?php
$Stores = file("homes.csv");
foreach($Stores as $key => $data) {
$Stores[$key] = explode(",", $data);
}
foreach($Stores as $key => $data)
print "".$Homes[$key][0]. "";
print "".$Homes[$key][1]. "";
print "".$Homes[$key][2]. "";
print "".$Homes[$key][3]. "";
print "".$Homes[$key][4]. "";
print "".$Homes[$key][5]. "";
print "".$Homes[$key][6]. "";
print "".$Homes[$key][7]. "";
print "".$Homes[$key][8]. "";
print "";
}
print "";
?>
In: Computer Science
Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating where it would be located/placed and how each component of the system functions. .
In: Computer Science
What are the most effective problem-solving techniques available to software engineers today, and how do they facilitate the software engineering process? Please provide examples and explain who the main stakeholders are and what their responsibilities in the software engineering process are.
In: Computer Science
Discuss the content (type of data and files) of a database which could be useful at Accra Institute Technology(AIT).
In: Computer Science
In: Computer Science
What are the pattern elements for the Facade Design Pattern?
In: Computer Science
Articles which explain the importance of information security in achieving organisational goals and objectives
In: Computer Science
Recall from Homework 2 that you are the chief robot designer for U.S. Robots and Mechanical Men, Inc., and you are working on designs for the following robots:
(a) A delivery robot that will carry supplies to different departments in a hospital.
(b) A supply robot that will carry heavy loads across loose soil and sand.
(c) A security robot that has to secure a wooded, hilly, area.
(d) A butler robot that will greet guests in a home and bring them drinks.
For each robot, describe what sensors you will equip it with, justifying your choices. Remember that, despite its monopoly, U.S. Robots and Mechanical Men, Inc. is a business, so you need to think carefully about the cost/benefit ratio of the sensors
In: Computer Science
• Local Security Policies Use Local Security Policy to administer security settings of a single Windows machine (either client or server).
Please provide step by step screen shots so I can see how it is done, and i will try it on my side.
Thank you
In: Computer Science
Normalization
This is a Database Development problem. Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)
Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.
Business Rules:
1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.
2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.
3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.
4. An attorney can only accept cases in their currently assigned department.
5. A client can have many open cases with our law firm at any one time.
6. Each client’s case is assigned to an attorney who specializes in that case’s form of law
In: Computer Science
NOTE: The first three are rules and do not have to be solved. Just there for the master theorem.
Master Theorem. Let T(n) = aT(n/b) + f(n) for some constants a ≥ 1, b > 1.
(Rule 1). If f(n) = O(n logb a− ) for some constant > 0, then T(n) = Θ(n logb a ).
(Rule 2). If f(n) = Θ(n logb a ), then T(n) = Θ(n logb a log n).
(Rule 3). If f(n) = Ω(n logb a+ ) for some constant > 0, and af(n/b) ≤ cf(n) for some constant c < 1, for all large n, then T(n) = Θ(f(n)).
1. Consider the recurrences: T(n) = 2T(n/2) + n log n. Either solve it using the Master method as given above, or explain why it can’t be solved using the Master method. If it can not be solved using Master method, use Recurrence tree method to solve it. Show your steps. If you use extended version of Master theorem to solve the same problem, does the solution thus obtained agree with the solution obtained by recurrence method?
In: Computer Science
Use C++ language Create a program which will ask the user to input three songs for a playlist (you may use TV shows or movies, if you prefer). Declare three strings to store each of the songs. Use getline to receive the input. Display output which lists each of the songs (or movies or tv shows), on separate lines, with a title on the first line: My Playlist. Insert three lines of comments at the beginning of the program for your name, today's date, and my playlist on the third line.
In: Computer Science