implement algorithm AdaptiveGreedy( set of objects ) pre-cond: The input consists of a set of objects. post-cond: The output consists of an optimal subset of them.
Q: Why does scope expand throughout the design phase of an IT system?
A: Answer for the design phase scope in IT system is given below
Q: use the text and code : cipher.txt xun gmr jznqymxu qzhhxzupmur ytmq dnvhq vavpncd vlvhpq mq…
A: Python which refers to the one it is a high-level, general-purpose programming language. Its design…
Q: To what do information system designers owe the root causes of scope creep?
A: Information System Design approaches will be used to complete the project. A project is a client's…
Q: It's important to weigh the pros and cons of using wireless solutions. For the sake of the network,…
A: Answer:
Q: One I/O mechanism absent from this hypothetical computer is the Interrupt. How might this affect the…
A: Without an Interrupt, the system would not be able to respond quickly to external events, such as…
Q: What Disruptors and Interrupts Are Different From One Another? Any and all hardware interruptions…
A: What separates an interruptor from a disrupter? A signal that requests immediate action is known as…
Q: In what ways do Windows 7 and Windows 10 vary, as outlined in Document 5?
A: Even with the positive advancements in the Windows platform version, Windows 7 is a still one of the…
Q: Advanced computer technology is to thank for this development. How can we prove that computer use in…
A: Introduction Computers have been resilient since their introduction, but they are now ubiquitous; we…
Q: What weaknesses exist in the security architecture?
A: The security architecture considers security domains, the positioning of security-relevant elements…
Q: Specifically in the realm of cryptography, what are the key differences between symmetric and…
A: Asymmetric and symmetric keys differ in the following ways: Encryption using Symmetric Keys.…
Q: 11 2 5 4 4 6 1
A:
Q: What are the benefits and drawbacks of various authentication techniques in terms of protecting user…
A: Advantages and disadvantages of different authentication procedures in terms of security: Active…
Q: 3. Write a program that calculates the position, adds a noise, and estimates the speed using the…
A: Required: Don't Reject this question instead skip it. Use MATLAB TO implement this question. Only do…
Q: Exists the concept of "hacking"? Exist any methods for preventing oneself from being a hacker…
A: Response: - Hacking is the effort to gain access to a computer's internal private network or system.…
Q: The Feistel cipher is a standard implementation of the cipher type. Why not use a modern block…
A: Introduction: Feistel Cipher: Block cyphers like DES employ the Feistel Cipher paradigm. Not a block…
Q: It is possible to draw parallels between TCP and UDP, two distinct protocols. Using your expertise…
A: TCP vs UDP: TCP/IP (TCP)UDP user (UDP)TCP is a connection-oriented protocol, thus devices must…
Q: The organizational, administrative, and technical components of the information system?
A: I was given: Which elements of the information system are regarded as its managerial, technological,…
Q: How many abstraction layers does TCP/IP have?
A: The four levels of the original T/I model are the application layer, the transport layer, the…
Q: Where have you seen vulnerabilities and exposures in cybersecurity in the real world?
A: Cybersecurity plays a very crucial role in today's world. It is basically refers to the security of…
Q: A team averaging 106 points is likely to do very well during the regular season. The coach of your…
A: Answer: from scipy.stats import ttest_1sampimport numpy as npmean_pts =…
Q: block cipher's hardware can be summed up as follows. How does it work, and what are the key…
A: Check below mention step 2 for explanation
Q: Let's start by defining the various types of cyberattacks and what a cybersecurity breach is.
A: Introduction: The practise of defending against malicious assaults on computer systems, servers,…
Q: Find out the five (5) errors (syntax or logical) in the following C++ program by indicating the line…
A: code - #include <iostream> using namespace std; int main(){ int number; int odds=0,evens=0;…
Q: Algorithm for Testing Membership Input : a group G acting on f~ = { 1,2 ..... n }; a permutation g…
A: given data: Input : a group G acting on f~ = { 1,2 ..... n };a permutation g of f~ = { 1,2 ..... n…
Q: java code to Represents a Program of Study, a list of courses taken and planned, for an individual…
A: A list of Course objects is kept in an unordered fashion by the ProgramOfStudy class. We will now…
Q: There are three types of multivibrators: astable, bistable, and monostable. Define each of these…
A: A Multivibrator is an electronic circuit which is used wherever two states of voltages are required.…
Q: What does the term "snafu" mean? What kinds of interrupts are there, and why aren't there any…
A: Interrupt: Any event that causes the programme to halt (or stop) and the CPU control to switch to…
Q: Would you make use of the internet to bring about a new era of technological development?
A: The Internet is likely the most powerful enabler of innovation links across individuals,…
Q: Identity fraud is a prevalent kind of cybercrime. How might identity thieves use the Internet to…
A: Your personal information may be obtained in a variety of ways, like overhearing you on the phone…
Q: To receive full marks on this function, your solution must not remove any keys from the parameter…
A: In this question we have to write and complete a function called update_amounts which takes a…
Q: How do these three characteristics distinguish TCP from UDP?
A: TCP: A three-way handshake facilitates the establishment of a TCP connection. It involves initiating…
Q: Algorithm for Enumerating All Elements Input : a permutation group G; a base and strong generating…
A: Algorithm for Enumerating All Elements:
Q: List the features that every language for writing software must have. Crucial Features: Constant…
A: The use of ADTs is made simple for programmers by object-oriented programming languages like Java.…
Q: What, specifically, is a port scan?
A: A port scan finds open network ports. Because ports are where information is sent and received,…
Q: What are the benefits and drawbacks of moving data between locations via a serial bus as opposed to…
A: Servers use authentication when they need to know who is looking at their information or visiting…
Q: write a program that calculates the sum of primes between two given numbers in PASCA
A: Algorithm: Set sum to 0 Input two given numbers from the keyboard/user Iterate loop for i from…
Q: Where should we focus our attention in terms of current cybercrime trends? How prepared are you to…
A: Cybercrime involves a computer, network, or networked device. Cybercriminals or hackers that desire…
Q: Can you explain the function of Bayes' Theorem in picture resizing programs?
A: Preparing a picture: This method allows us to resize the image. The purpose of this cycle is to…
Q: How the business of Disney World has changed as a result of the digital economy, particularly mobile…
A: Internet-based technologies: A range of tools that let people communicate and access information on…
Q: Take into account the databases of the Internal Revenue Service, the Bureau of Motor Vehicles in…
A: Capturing data in each databaseThe Internal Revenue Service (IRS) is a government agency responsible…
Q: Describe the primary difference between recurrent and non-recurrent neural network processing.
A: A recurrent neural network (RNN) and a non-recurrent neural network (NN) are two of the most…
Q: Please describe how a company may prevent hackers from obtaining access to its accounts, as well as…
A: A proficient programmer with knowledge of computer operating systems is a hacker. Explanation:…
Q: Why is wear leveling important for SSDs?
A: Wear leveling: Wear leveling is used to spread erase-write operations uniformly throughout the whole…
Q: There are various varieties of cyberattacks. Where can I get information on internet safety?
A: What are cyberattacks and cybersecurity?Cyber security uses cyber-attack protection systems,…
Q: Write an algorithm for the following problem. The input consist of three integers a, b, and w.…
A: Set a_count to 0 and b_count to 0. These variables will keep track of the number of a-dollar and…
Q: Are there any regulatory hurdles associated with cellular phone usage that companies need to be…
A: Because technology is not always fault-free, you could run into a variety of issues that you can fix…
Q: you had to define an OS, how would you? Does a comprehensive description o
A: If you had to define an OS, how would you? Does a comprehensive description of the batch OS exist?…
Q: QUESTION 3 (9 Design an algorithm that generates a maze that contains no path from start to finish…
A: To make mazes, think about using Kruskal's algorithm as follows: Give each potential wall a random…
Q: Which measures do you believe to be paramount when it comes to securing information both while in…
A: Introduction: Data must be encrypted in order to be protected while it is being used or being…
Q: Which of the following best sums up your perspective on the significance of safeguarding data while…
A: Encryption is required to safeguard data while it is in use or in transit. Always utilize encryption…
OOPs
In today's technology-driven world, computer programming skills are in high demand. The object-oriented programming (OOP) approach is very much useful while designing and maintaining software programs. Object-oriented programming (OOP) is a basic programming paradigm that almost every developer has used at some stage in their career.
Constructor
The easiest way to think of a constructor in object-oriented programming (OOP) languages is:
implement
algorithm AdaptiveGreedy( set of objects )
pre-cond: The input consists of a set of objects.
post-cond: The output consists of an optimal subset of them.
Step by step
Solved in 2 steps
- class BinaryImage: def __init__(self): pass def compute_histogram(self, image): """Computes the histogram of the input image takes as input: image: a grey scale image returns a histogram as a list""" hist = [0]*256 return hist def find_otsu_threshold(self, hist): """analyses a histogram it to find the otsu's threshold assuming that the input hstogram is bimodal histogram takes as input hist: a bimodal histogram returns: an optimal threshold value (otsu's threshold)""" threshold = 0 return threshold def binarize(self, image): """Comptues the binary image of the the input image based on histogram analysis and thresholding take as input image: an grey scale image returns: a binary image""" bin_img = image.copy() return…Define a class name ComparableCircle that extends Circle and implements Comparable interface. Draw the UML diagram and implement the compareTo() method to compare the circles on the basis of area. Write a test class to find the larger of two instances of ComparableCircle objects.1 in java write code: in java write code for particle swarm optimization which has adds a forth force closer to nest. calculate the direction the particles must move to be in the centre.
- Objects enable the design practice of --------------—although they may know how to communicate with one another across well- defined interfaces, they normally are not allowed to know how other objects are implemented.Deeper access is better from a programming perspective than shallower access; avoid making a judgment only on the basis of performance.Crack the crag def crag_score(dice): Crag (see the Wikipedia page for the scoring table needed in this problem) is a dice game similar to the more popular games of Yahtzee and Poker dice in style and spirit, but with much simpler combinatorics of roll value calculation due to this game using only three dice. Players repeatedly roll three dice and assign the resulting patterns to scoring categories so that once some roll has been assigned to a category, that category is considered to have been spent and cannot be used again for any future roll. These tactical choices between safety and risk-taking give this game a little bit more tactical flair on top of merely relying on the favours of Lady Luck for rolling the bones. Given the list of pips of the three dice of the first roll, this function should compute and return the highest possible score available when all categories of the scoring table are still available for you to choose from, so that all that matters is maximizing this…
- Here you can find the java code and photo of challenge: import java.io.*;import java.math.*;import java.security.*;import java.text.*;import java.util.*;import java.util.concurrent.*;import java.util.function.*;import java.util.regex.*;import java.util.stream.*; public class Solution { public static class DirectedGraph {/* Adjacency List representation of the given graph */private Map<Integer, List<Integer>> adjList = new HashMap<Integer, List<Integer>>(); public String toString() {StringBuffer s = new StringBuffer();for (Integer v : adjList.keySet())s.append("\n " + v + " -> " + adjList.get(v));return s.toString();} public void add(Integer vertex) {if (adjList.containsKey(vertex))return;adjList.put(vertex, new ArrayList<Integer>());} public void add(Integer source, Integer dest) {add(source);add(dest);adjList.get(source).add(dest);} /* Indegree of each vertex as a Map<Vertex, IndegreeValue> */public Map<Integer, Integer> inDegree()…The cognitive walkthrough is a formalized way of imagining people’s thoughts and actions when they use an interface for the first time. During a cognitive walkthrough the evaluator needs to ask four questions as below Is the effect of the action the same as the user’s goal at that point? Will users see that the action is available? iii. Once users have found the correct action, will they know it is the one they need? After the action is taken, will users understand the feedback they get? Given below is an action sequence for creating a customized voicemail message on an iPhone. Tap Voicemail. Tap Greeting. Tap Custom. ‘ Tap Record and speak your greeting. When you finish, tap Stop. To listen to your greeting, tap Play. To re-record, repeat steps 4 and 5. Tap Save. Imagine an iPhone interface and create a report of the cognitive walkthrough for the above mentioned task in context with the review questions.c++ or java or in pseudo code with explaining note: if anything is unclear or seems left out make an assumption and document your assumption Implement an algorithm for assigning seats within a movie theater tofulfill reservation requests. Assume the movie theater has the seatingarrangement of 10 rows x 20 seats, as illustrated to the below.The purpose is to design and write a seat assignmentprogram to maximize both customer satisfaction and customersafety. For the purpose of public safety, assume that a buffer of three seats inbetween Input DescriptionYou will be given a file that contains one line of input for eachreservation request. The order of the lines in the file reflects the order inwhich the reservation requests were received. Each line in the file will becomprised of a reservation identifier, followed by a space, and then thenumber of seats requested. The reservation identifier will have theformat: R####. See the Example Input File Rows section for anexample of the input…
- The Family of Logarithmic Functions Write a Learning Log entry about the family of functions y = logb(x). Include the descriptive statements your team has come up with and any others that you think should be added from the class discussion. As you write, think about which statements are very clear to you and which need further clarification.implementing a simple binary search tree capable of storing and retrieving student information. The class should have private member variables (each separated by a tab): student's id number - an integer student's name - a string student's declared major The class should have private member functions as a minimum: openFile - opens the input file testFile - tests the input file has been opened properly readFile - reads in one student's information closeFile - close the input file insert - inserts the students information into the proper place in the tree structure search - search for the student id entered by the user inorder - traverses the tree structure prompt - prompts the user for a student id number validate - validate the user input value display - display the contents of the binary tree results - student id found or not found result The class should have public member functions class constructor (if needed) driver - order of execution The input file layout:student id…Implementing a simple binary search tree capable of storing and retrieving student information. The class should have private member variables (each separated by a tab): student's id number - an integer student's name - a string student's declared major The class should have private member functions as a minimum: openFile - opens the input file testFile - tests the input file has been opened properly readFile - reads in one student's information closeFile - close the input file insert - inserts the students information into the proper place in the tree structure search - search for the student id entered by the user inorder - traverses the tree structure prompt - prompts the user for a student id number validate - validate the user input value display - display the contents of the binary tree results - student id found or not found result The class should have public member functions class constructor (if needed) driver - order of execution The input file layout:student id…