Apply and elaborate by providing real-life examples on the below mentioned basic concepts that are associated with risk management as per NIST (National Institute of Standards and Technology).
a. TRUST AND TRUSTWORTHINESS
b. ORGANIZATIONAL CULTURE
In: Computer Science
Programming in C (not C++)
The high level goal of this project is to write a program called "wordfreak" that takes "some files" as input, counts how many times each word occurs across them all (considering all letters to be lower case), and writes those words and associated counts to an output file in alphabetical order.
We provide you some example book text files to test your program on. For example, if you ran
$ ./wordfreak aladdin.txt
Then the contents of the output file would be:
$ cat output.txt
a : 49
aback : 1
able : 1
...
required : 1
respectfully : 1
retraced : 1
...
that : 11
the : 126
their : 2
...
you : 20
young : 1
your : 7
The words from all the input files will be counted together. If a word appears 3 times in one input file and 4 times in another, it will be counted 7 times between the two.
Input
wordfreak needs to be able to read input from 3 sources: standard input, files given in argv, and a file given as the environment variable. It should read words from all these that are applicable (always standard in, sometimes the other 2).
A working implementation must be able to accept input entered directly into the terminal, with the end of such input signified by the EOF character (^D (control+d)):
$ ./wordfreak
I can write words here,
and end the file with control plus d
$ cat output.txt
and : 1
can : 1
control : 1
d : 1
end : 1
file : 1
here : 1
i : 1
plus : 1
the : 1
with : 1
words : 1
write : 1
However, it should alternately be able to accept a file piped in to standard input via bash’s operator pipe:
$ cat aladdin.txt | ./wordfreak
It should be noted that your program has no real way to tell which of these two situations is occuring, it just sees information written to standard input. However, by just treating standard input like a file, you will get both of these behaviours.
A working implementation must also accept files as command line arguments:
$ ./wordfreak aladdin.txt iliad.txt odyssey.txt
Finally, a working implementation must also accept an environment variable called WORD_FREAK set to a single file from the command line to be analyzed:
$ WORD_FREAK=aladdin.txt ./wordfreak
And of course, it should be able to do all of these at once
$ cat newton.txt | WORD_FREAK=aladdin.txt ./wordfreak iliad.txt odyssey.txt
Words
Words should be comprised of only alpha characters, and all alpha characters should be taken to be lower case.
For example "POT4TO???" would give the words "pot" and "to". And the word "isn’t" would be read as "isn" and "t". While this isn't necessarily intuitively correct, this is what your code is expected to do:
$ echo "Isn’t that a POT4TO???" | ./wordfreak
$ cat output.txt
a : 1
isn : 1
pot : 1
t : 1
that : 1
to : 1
You are required to store the words in a specific data structure. You should have a binary search tree for each letter 'a' to 'z' that stores the words starting with that letter (and their counts). This can be thought of as a hash function from strings to binary search trees, where the hashing function is just first_letter - 'a'. Note that these BSTs will not likely be balanced; that is fine.
Output
The words should be written to the file alphabetically (the BSTs make this fairly trivial). Each word will give a line of the form "[word][additional space] : [additional space][number]\n". The caveat is that all the colons need to line up. The words are left-aligned and the longest will have a single space between its end and the colon (note "respectfully" in the example below); the numbers are right-aligned and the longest will have a single space between the colon and its beginning (note 126 in the example below).
$ ./wordfreak aladdin.txt
$ cat output.txt
a : 49
...
respectfully : 1
...
the : 126
...
your : 7
The output file should be named output.txt. Note that when opening the file to write to, you will either need to create the file or remove all existing contents, so make use of open()'s O_CREAT and O_TRUNC. Moreover, you will want the file’s permissions to be set so that it can be read. open()’s third argument determines permissions of created files, something like 0644 will make it readable.
restricted to only using the following system calls: open(), close(), read(), write(), and lseek() for performing I/O. You are allowed to use other C library calls (e.g., malloc(), free()). However, all I/O is restricted to the Linux kernel’s direct API support for I/O. You are also allowed to use sprintf() to make formatting easier.
In: Computer Science
Database:
Our AD is Movie Theater.
Create an ER diagram with the following entities: Staff, Ticket,
Movie, Session, Hall, Seat, Director, Actor, Distributor, and
Roles. AND also identify the type of relations
between the entities with notations and explain why you used
it.
**Read the question carefully before you answer**
In: Computer Science
Question 1 (25pts):
Consider the string “data and program analytics”. Write a program to perform the following actions
Question 2 (15 pts):
List1 = [3, 4, 5, 20, 5]
Question 3 (15 pts):
Set1 = {1, 2, 3, 4}, Set2={4, 5, 6}
Question 4 (15 pts):
L = [('',), (), ('apple', 1), (), ("Paul", "Merage', 2020, "MSBA212"), ("d")]
Write a Python program to remove an empty tuple(s) from a list of tuples.
Expected outcome is:
[('',), ('apple', 1), ('Paul', 'Merage', 2020, 'MSBA212'), 'd']
Question 5 (15 pts):
Question 6 (15 pts):
Two given lists [1,2,4,8,5,10] and [2,4,5,8,12,15], write a program to make a list whose elements are intersection of the above given lists.
In: Computer Science
Instructions
[Hint: n%10 returns the last digit and n/10 returns everything except the last digit]
In: Computer Science
Computer Science Question 1: DO NOT USE ANY NON-STANDARD LIBRARY. o All the required libraries have already been included. O DO NOT INCLUDE ANY OTHER LIBRARY INTO THE CODE. o DO NOT ALTER THE NAMES OF THE C FILES PROVIDED. o DO NOT ALTER THE NAMES AND PROTOTYPES OF THE FUNCTIONS.DO NOT ALTER ANY OF THE CODE! JUST ADD WHAT NEEDS TO BE ADDED FOR IT TO WORK! Please copy and paste the whole solution. Please read the code below and complete what it is asking. This is the code: #include <stdio.h> #include <stdlib.h> #include <time.h> #define SIZE 20 // A regular function to check and return the maximum value between two integers int max(int a, int b); // A recursive function for recursively find and return the maximum value in an array of integers int maximumValue(int a[], int size); int main(void) { srand(time(NULL)); int myArray[SIZE]; // COMPLETE THIS PART // ****************** // populate the array with positive random integers less than 100 // COMPLETE THIS PART // ****************** // Print out the elements of the array in one line // COMPLETE THIS PART // ****************** // Find and print out the maximum value in the array by calling the recursive function maximumValue } int max(int a, int b) { // COMPLETE THIS PART // ****************** // if a is greater than or equal to b, return a, otherwise return b } int maximumValue(int a[], int size) { // COMPLETE THIS PART // ****************** // Base case and recursive part using an if-else statement. // Base case: // If there is only one element in the current array, return it. // Recursive part: // Call the max function with two parameters, the first element of the array and maximumValue of the rest of the array.
In: Computer Science
A transport logistics company (using trucks) is planning to purchase 30 laptops for its employees.
(i) Explain (in detail) what is meant by the term “total cost of ownership” in this acquisition?
(ii) For support purposes, you are asked to prepare a plan to prevent users from encountering problems (or even misusing) the new laptops. Select five different end user problem types and describe the common issues and preventative measures.
In: Computer Science
write an essay comparing and contrasting as mentioned below
Radio vs newspapers. what are the similarities and differences?
In: Computer Science
C#
Write a program in C# that prompts the user for a name, Social Security number, hourly pay rate, and number of hours worked. In an attractive format, dis- play all the input data as well as the following: » Gross pay, defined as hourly pay rate times hours worked » Federal withholding tax, defined as 15% of the gross pay » State withholding tax, defined as 5% of the gross pay » Net pay, defined as gross pay minus taxes
In: Computer Science
Part 4: Explain in a couple of paragraphs how public key
encryption can be used to implement a digital signature. Be sure
you are very clear on when a private key is used and when a public
key is used.
Part 5: Generally, a digital signature involves encrypting a
cryptographic hash, or digest, generated from the message. Explain
why we do not encrypt the message itself. You can answer this
question in one sentence.
Part 6: For each of the following scenarios below, tell what type
of encryption is most appropriate and in a sentence or two explain
the reasoning for your choice.
1. Alice wants to send a confidential message to Bill, whom she has
never met and who lives in a distant country.
2. Charlie wants to be sure that no one but he can see the
financial and medical records he has stored on his computer.
3. David needs a way to check that large computer files stored on
corporate servers have not been modified.
4. Eddard uses a "cloud" backup service; he wants to be sure the
operators of the service cannot read his files.
5. Frank needs to send a message to George. The message need not be
confidential, but George must be assured that it actually came from
Frank.
In: Computer Science
Implementing Polynomials using Singly Linked List in C++
5. reverse the order of the terms in a polynomial (see “Additional
Specifications,” below)
III. The Test Class
The main method of your test class will create a Polynomial object
and then read and process a series of operations
The operations are:
1. INSERT X Y
Insert a new term with coefficient X and exponent Y into its proper
place in the polynomial
(insert method : adds terms to the list in descending order of
power)
2. DELETE X Y
Remove the term with coefficient X and exponent Y from the
polynomial
3. REVERSE
Reverse the order of the terms of the polynomial
4. 1st DEV
to find the first derivatives of the polynomial
2nd DEV
to find the
second derivatives of the polynomial
Each operation is to be carried out by calling a method of the
Polynomial class
Each operation read must be “echo printed” to the screen
After each operation, print the updated polynomial by calling the
toString() method
For the Derivatives operation, print the string returned
-----------------------------------------------------------------------------
In: Computer Science
DESIGN A FLOWCHART IN THE APPLICATION FLOWGORITHM
Number Analysis Program Design a program that asks the user to enter a maximum of 20 numbers. The program should store the numbers in an array and then display the following data: -The lowest number in the array. -The highest number in the array. -The total of the numbers in the array. -The average of the numbers in the array.
PLEASE AND THANK YOU
In: Computer Science
subject DBA
use mysql workbench and select my guitar shop database as default schema
Problem8
Write a script that implements the following design in a database named my_web_db:
users downloads Products
*user_id INT * download_id INT * product_id INT
*email_address VARCHAR(100) * user_id INT * product_name VARCHAR(45)
*first_name VARCHAR(45) *download_date DATETIME
*last_name VARCHAR(45) * filename VARCHAR(50)
*product_id INT
Details
Solution fill in the blanks :-
______DATABASE ____________ ;
CREATE DATABASE my_web_db ___________ ;
USE my_web_db;
_________ TABLE _______
user_id INT PRIMARY _______ AUTO_INCREMENT,
email_address VARCHAR(100) UNIQUE,
first_name VARCHAR(45) NOT NULL,
last_name VARCHAR(45) NOT NULL
) ___________ ;
__________ products (
product_id INT ________ AUTO_INCREMENT,
product_name VARCHAR(45) UNIQUE
__________
____________
download_id INT PRIMARY KEY,
____________ INT NOT NULL,
download_date DATETIME NOT NULL,
filename __________ NOT NULL,
product_id INT NOT NULL,
___________ fk_downloads_users
_____________ KEY (user_id )
REFERENCES users (user_id),
_______________
_______________ product_id)
REFERENCES products _______________
) ENGINE = _________ ;
In: Computer Science
what does this code means. Explain each line (briefly)
Book.findOneAndUpdate[{isbn:req.params.isbn},
{$set:{authFName:req .body.authFName,
authLName: req.body.authLName}, {new:true}}
In: Computer Science
Multiples of 2 and 3: write a c++ program Using a while loop, write a program that reads 10 integer numbers. The program shall count how many of them are multiples of 2, how many are multiples of 3, and how many are NOT multiples of either 2 or 3. The output should be similar to the one shown below.
In: Computer Science