[ad_1]
Get college assignment help at uniessay writers Dear Sorry for bothering you the ASSIGNMENT DETAILS in attached file(just details) but the question is: writte a Safe Management Python script it should be Well commented and built with sub procedures. Not a whole one procedure script and should be fully configurable. The script executable should be parameterized from the command line. thank you
Create an array of 26 components to do the letter count for the 26 letters in the alphabet and a variable for the line count. (You may wish to call these variables letterCount and lineCount respectively.)
hi I attached my homework again just please tell me how mush it will cost me so I can attached agin with the payment because it’s the third time I attached it Thanks
What are the potential problems of a “Deny-All” policy?
Computing A Raise File Salary.java contains most of a program that takes as input an employee’s salary and a rating of the employee’s performance and computes the raise for the employee. This is similar to question #3 in the pre-lab, except that the performance rating here is being entered as a String—the three possible ratings are “Excellent”, “Good”, and “Poor”. As in the pre-lab, an employee who is rated excellent will receive a 6% raise, one rated good will receive a 4% raise, and one rated poor will receive a 1.5% raise. Add the if… else… statements to program Salary to make it run as described above. Note that you will have to use the equals method of the String class (not the relational operator ==) to compare two strings (see Section 5.3, Comparing Data). // *************************************************************** // Salary.java // // Computes the amount of a raise and the new // salary for an employee. The current salary // and a performance rating (a String: “Excellent”, // “Good” or “Poor”) are input. // ************************************************************* import java.util.Scanner; import java.text.NumberFormat; public class Salary { public static void main (String[] args) { double currentSalary; // employee’s current salary double raise; // amount of the raise double newSalary; // new salary for the employee String rating; // performance rating Scanner scan = new Scanner(System.in); System.out.print (“Enter the current salary: “); currentSalary = scan.nextDouble(); System.out.print (“Enter the performance rating (Excellent, Good, or Poor): “); rating = scan.next(); // Compute the raise using if … newSalary = currentSalary raise; // Print the results NumberFormat money = NumberFormat.getCurrencyInstance(); System.out.println(); System.out.println(“Current Salary: ” money.format(currentSalary)); System.out.println(“Amount of your raise: ” money.format(raise)); System.out.println(“Your new salary: ” money.format(newSalary)); System.out.println(); } }
Counting and Looping The program in LoveCS.java prints “I love Computer Science!!” 10 times. Copy it to your directory and compile and run it to see how it works. Then modify it as follows: // **************************************************************** // LoveCS.java // // Use a while loop to print many messages declaring your // passion for computer science // **************************************************************** public class LoveCS { public static void main(String[] args) { final int LIMIT = 10; in count = 1; while (count <= LIMIT) { System.out.println("I love Computer Science!!"); count ; } } } 1. Instead of using constant LIMIT, ask the user how many times the message should be printed. You will need to declare a variable to store the user's response and use that variable to control the loop. (Remember that all caps is used only for constants!) 2. Number each line in the output, and add a message at the end of the loop that says how many times the message was printed. So if the user enters 3, your program should print this: 1 I love Computer Science!! 2 I love Computer Science!! 3 I love Computer Science!! Printed this message 3 times 3. If the message is printed N times, compute and print the sum of the numbers from 1 to N. So for the example above, the last line would now read: Printed this message 3 times. The sum of the numbers from 1 to 3 is 6. Note that you will need to add a variable to hold the sum.
Powers of 2 File PowersOf2.java contains a skeleton of a program to read in an integer from the user and print out that many powers of 2, starting with 20. 1. Using the comments as a guide, complete the program so that it prints out the number of powers of 2 that the user requests. Do not use Math.pow to compute the powers of 2! Instead, compute each power from the previous one (how do you get 2n from 2n–1?). For example, if the user enters 4, your program should print this: Here are the first 4 powers of 2: 1 2 4 8 2. Modify the program so that instead of just printing the powers, you print which power each is, e.g.: Here are the first 4 powers of 2: 2^0 = 1 2^1 = 2 2^2 = 4 2^3 = 8 // **************************************************************** // PowersOf2.java // // Print out as many powers of 2 as the user requests // // **************************************************************** import java.util.Scanner; public class PowersOf2 { public static void main(String[] args) { int numPowersOf2; //How many powers of 2 to compute int nextPowerOf2 = 1; //Current power of 2 int exponent; //Exponent for current power of 2 — this //also serves as a counter for the loop Scanner scan = new Scanner(System.in); System.out.println(“How many powers of 2 would you like printed?”); numPowersOf2 = scan.nextInt(); //print a message saying how many powers of 2 will be printed //initialize exponent — the first thing printed is 2 to the what? while ( ) { //print out current power of 2 //find next power of 2 — how do you get this from the last one? //increment exponent } } }
Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single statement that assigns a new value to the first element of the array. This new value should be equal to twice the value stored in the last element of the array. Do not modify any values in the array other than the first element.
Design an algorithm that will read through the file and calculate the numbers of married men, single men, married women and single women, For all single men under 30, display “Bachelor
Write a C program generates a multiplication table of 10 X 10, then print the result in output file called out1.txt 2. Write a program to generate following patterns a., b, c. and d., remember you need to ask user how large the pattern needs to be? (Rows and columns) are the same. Then print the result into an output file called out2.txt a. * ** *** **** ***** ****** ******* ******** ********* ********** b. ********** ********* ******** ******* ****** ***** **** *** ** * c. ********** ********* ******** ******* ****** ***** **** *** ** * d. * ** *** **** ***** ****** ******* ******** ********* **********
Get college assignment help at uniessay writers 1. Data is said to be interrelated when all of the data is stored in the same database and multiple users can access it at the same time. True False 2. To be considered a true DBMS, a database product should be able to obtain access to data without writing a specialized computer program. True False 3. Which of the following orientation features does not qualify a system as using true database technology? A. Relational B. Object C. Network navigation D. File orientation A database table consists of the following columns: employee’s name, SS#, job-title, hiring-date, years-in-job, base-salary. A bonus calculation program, a personnel promotion application program, and a payroll application program all use this table. To implement a policy change in personnel promotion, the following column is added to the table: highest-college-degree. This new column is not used by the payroll program or by the bonus calculation program. 4. The ability to add the new column without requiring changes to all of the application programs strongly relates to the following feature of modern database systems: A. Nonprocedural programming B. Transaction processing C. Data independence D. Data sharing 5. In the project operation of relational algebra, when a subset of columns is retrieved and the resulting table contains duplicate rows, the project operator will automatically remove the duplicate rows. True False In the table Employee, each row contains data about an employee. The primary key is Empno. The attribute Empdeptno is a foreign key referring to the department number (Deptno. of the table Department. The combination of columns Prstno, Prstempno is a candidate key. There could be other candidate keys. Prstempno is the Empno in table Employee of the employee working on project number Prstno, which refers to Projno in the table Project. The meaning of Prstasgtno is left undefined. 6. Which of the following columns or combination of columns may not be a candidate key of the table Projstaff? A. Prstno, Prstempno B. Prstasgtno C. Prstno, Prstempno, Prsthours D. Prstno, Prstasgtno 7. If the combination Prstno, Prstempno is chosen as the primary key for table Projstaff, setting Prstno to null in some row would be: A. A violation of the entity integrity rule B. A violation of the referential integrity rule C. A violation of the entity integrity rule and of the referential integrity rule D. None of the above 8. The relationship connecting Employee to Project and expressing that an employee works on a project (Link table Projstaff) is: A. 1-M from employee to project B. 1-M from project to employee C. M-N D. Self-referencing 9. The Intersection of a table of N rows and of a table of M rows (M<=N) has the following number of rows: A. M N B. A number in the range N to M N C. N D. A number in the range 0 to M 10. The number of administrators is: A. Always the same as the number of departments B. Always smaller than the number of departments C. Smaller than or equal to the number of departments D. Larger than or equal to the number of departments 11. In reviewing an ERD for consistency, the property of uniqueness applies to: A. Entity type names B. Attribute names within entity types and relationships C. Attribute names in a subtype D. All of the above 12. Since a room does not have a separate identity from the building it is physically located in, in terms of an ERD it can be said that there is a(n) ___________________ between the room and the building. ________________________________________ 13. Generalization hierarchies must have both disjointness and completeness constraints. True False The following data are in the tables Employee (primary key: Empno) and Department (primary key: Deptno). The questions refer to row numbers of this table. The first row of each table is row #1. Empdeptno in table Employee is a foreign key that refers to Deptno in the table Department. Deptmgr in the table Department is a foreign key that refers to Empno in the table Employee. 14. Which of the following statements is true? A. Row #7 of table Employee violates neither the entity integrity rule nor the referential integrity rule. B. Row #7 of table Employee violates the entity integrity rule. C. Row #7 of table Employee violates the referential integrity rule. D. Row #7 of table Employee violates both the entity integrity rule and the referential integrity rule. 15. A(n) _________________ is an operator that includes in the result table the matching rows of the input tables and the nonmatching rows from the designated input table. ________________________________________ 16. When you split one table into two smaller tables to achieve 2NF, you can no longer derive the functional dependencies of the original table. True False The table STUDENTA has the following meaning. A student may have several majors and several minors; the choice of majors and minors is independent of each other. Each student has a unique name. The table has only one candidate key. STUDENTA 17. The table STUDENTA satisfies the following normal form (choose the highest NF): A. 1NF B. 2NF C. 3NF D. 4NF 18. Deleting the second row from the table STUDENTA causes: A. an update anomaly B. a deletion anomaly C. an insertion anomaly D. no loss of information The table STUDENTB has the following meaning. A student may have one major only and several minors; the choice of the major and of minors is independent of each other. Each student has a unique name. The table has only one candidate key. STUDENTB 19. The table STUDENTB satisfies the following normal form (choose the highest NF): A. 1NF B. 2NF C. 3NF D. 4NF The table STUDENTD has the following meaning. A student may have several majors and several minors. In the table only one minor corresponds to a given major, and only one major corresponds to a given minor. Each student has a unique name. STUDENTD 20. The table STUDENTD satisfies the following normal form (choose the highest NF): A. 2NF B. 3NF C. BCNF D. 4NF 21. Even if a database is to be used mostly for querying data, with little or no change to the data, the highest degree of normalization should still be implemented. True False Name is the unique candidate key in the table STUDENT. Each row in the table describes a different student. A student may only have one major and one minor. The choice of a major is independent of the choice of a minor STUDENT 22. The table schema STUDENT is replaced by the following two tables' schemas: A. Some information is lost in this transformation and some meaningless information is provided B. The new tables provide the same information as the old ones with less data duplication C. The new tables provide the same information as the old ones with more data duplication D. None of the above 23. In the table STUDENTB, when Green replaces her MATH major by a PHYSICS major, the following anomaly is evidenced: A. update anomaly B. insertion anomaly C. deletion anomaly D. none of the above Name is the unique candidate key in the table STUDENTC. Each row in the table describes a different student. A student may only have one major and one minor. To each major corresponds a unique minor. STUDENTC 24. The table STUDENTC contains many more rows than shown. It is replaced by the following two tables with appropriate distribution of data to the new tables. A. Some information is lost in this transformation and some meaningless information is provided B. The new tables provide the same information as the old one with less data duplication C. The new tables provide the same information as the old one with more data duplication D. None of the above 25. Normalization techniques may be used in database development to improve the design that results from the Entity Relationship approach, but you cannot directly build database tables from the functional dependencies. True False
which of the following is an appropriate scientific hypothesis?
Dear my question in attached file I need detailed explanations about each step (add comments in the shell scripts) and please provide me with input/output values which explain the results thank you
For a string of bits S. let S’ denote the complimentary string obtained by changing all the 0s to 1s and all the 1s to the 0s( equivalently S’=S xor 111111….). show that if a DES(data encryption standard) key K encrypts P(plaintext) to C(cipher text) then K’ encrypts P’ to C’. Is it possible to show this using cryptool? If possible dont use mathematical proof otherwise show the mathematical proof.
What business factors are causing Google to move slowly in opening up its databases? Do you agree with its go-slow strategy? Why or why not?
Design and implement an application that produces a multiplication table, showing the results of multiplying the integers 1 through 12 by themselves.
set up a recurrence relation describing the value returned by the algorithm. Get an answer in O() terms. result := 0 for i:=1 to n do for j:=ceiling(sqrt(i)) to n do for k:=1 to ceiling(log(i j)) do result
1. In your own words, explain how methods with multiple parameters are declared. Identify two rules that must be adhered to when declaring a method with multiple parameters
this is due at 11pm tonight 1. (10 points) Accept as input the following: Your weight, height, and target body mass index (BMI) and the program should report the number of lbs you need to gain or lose to reach your target BMI. Note: if you are your target BMI, provide the user with a congratulations message. 2. (10 points) Accept as input an arbitrary series of positive numbers and once finished (user needs to type in -1) report the third lowest number seen. 3. (10 points) Accept 10 numbers between 1 and 10000 and determine whether each number is a palindrome. (palindrome – a sequence of numbers or characters which reads the same forwards or backwards) 4. (10 points) Display all prime numbers between 10000 and 50000. A prime number is a number which cannot be divided by any other number other than 1 and itself. (Hint: look only at odd numbers) Part II: Follow through! (60 points) For this part of the assignment, you will translate the following pseudocode into Java code for each question provided. You will need to create a Netbeans project to answer this part of the homework, and please note the names of the files in each question. 1. (20 points) From your own pseudocode in Part I: question 3 (Palindrome.java) 2. (20 points) Please accomplish the following pseudocode as listed (MultipleCongrats.java): a. Ask the user for a number b. Read in a number c. Determine if the number read is greater than 0 i. If it is equal to or less than 0, go back to a ii. If it is greater than 0 1. Print “Congratulations!” on a line by itself the given number of times 3. (20 points) Please accomplish the following pseudocode as listed (Calculator.java): a. Ask the user for the first number b. Read in a number (first) c. Determine if the number read is greater than 0 i. If it is greater than 0, go to d ii. If not, go back to a d. Ask the user for a second number e. Read in a number (second) f. Determine if the number read is greater than 0 i. If it is greater than 0, go to g ii. If not, go back to d g. Ask the user to enter a number representing the calculation performed: h. (0 , 1 -, 2 , 3 *, 4%) i. Read in a number (operation) j. Determine if the number read is one of the options i. If it is, 1. Determine if the calculation is possible (can’t divide or % by zero) a. If not possible, print the reason why b. Print the result of the application if possible ii. If not, go back to g Turn-In Instructions: Rename the project by right clicking the project name inside Netbeans and selecting rename using your last name followed by your first name followed by the text “-HomeworkX” where X is the number of the homework. Then, zip the Netbeans directory (which should result in a directory named using your last name followed by your first name followed by the text “-HomeworkX” where X is the number of the homework) and turn-in via blackboard by the due date
“Dear my question in attached file please I need detailed explanations about each step (add comments in the shell scripts) thank you”
let’s assume that someone does trile encryption by using EEE with CBC on the inside. suppose an attacker modifies bit x of cipher text block n. how does this affect the decrypted plaintext?
The post Dear Sorry for bothering you the ASSIGNMENT DETAILS in attached file(just appeared first on uniessay writers.
[ad_2]
Source link