Pseudo code:
Q: ryption techniques have different advantages and disadvantages. What considerations must be made…
A: Below the Symmetric and asymmetric encryption techniques have different advantages and disadvantages
Q: When executing map-reduce jobs, Hadoop performs data locality optimization. Describe what is meant…
A: In hadoop the data locality is the process of transferred or moved the computation close to the…
Q: Computer Science Need help with PHP coding, I want to create a simple web that read a GitHub…
A: PHP coding, I want to create a simple web that read a GitHub repository and download the content in…
Q: Describe and explain in DETAILED the attacks on cryptosystems (reaction paper). Thank you.
A: A cryptosystem attack is a method of circumventing the security of cryptographic system by finding a…
Q: 25)The numbers used in the mailbox addresses in the LMC are what data type and range? a. whole…
A: LMC or Little Man Computer is a simplified computer prototype to help explain the computer hardware…
Q: Consider the following network address: 209.15.6.0/28 a. How many subnets are there in this network?…
A: Given - Network Address - 209.15.6.0 / 28 prefix = 28 a. The first octet is 209 at a given…
Q: A______ file consists of one or more lines of non-formatted characters А Answer:
A: A computer file is a computer resource for recording data in a computer storage device primarily…
Q: Build a html form with the following elements Find: a text box for the user to key in text he/she…
A: The solution has been provided in as simple manner as could be, and the explanation of important…
Q: 2. Create a program that will compute for your grade. Use LBYEC2A Grading system. Lab Activities:…
A: If else statements need to be used to print grades and total grade has to be calculated using given…
Q: Determine whether the following propositional forms are logically equivalent. Show your proof and…
A: We are going to prove if the given two propositional forms are equivalent or not. Please refer to…
Q: Build an abstract class named Salary that has the following: -One abstract method named…
A: Code: abstract class Salary{ abstract void calculateSalary(); void MinimumSalary() {…
Q: Provide an explanation as to what the commercial advantages of having a data-driven website are?
A: Answer:- A data-driven website is one that its administrators can simply and rapidly update in…
Q: Define the cryptographic hash function (CFH). What are the optimal characteristics of a…
A: In cryptography, a cryptographic hash function is a mathematical function. It (Cryptographic Hash…
Q: In multiprocess systems, how are semaphores used to guarantee that there is mutual exclusion between…
A: Introduction: In this section, we must describe how semaphores are utilized in multiprocessor…
Q: 2. Conversions: This set of problems involves conversions of a value in one unit to another unit.…
A: Step 1 : Start Step 2 : In the main function , print the user interface. Take user input for the…
Q: What is the difference in senary (base 6)?
A: The answer is
Q: How are deep learning methods used to Arduino? How might this approach be utilized to teach flight…
A: Deep Learning is a more sophisticated machine learning method based on brain cell activity…
Q: Why Usability Engineering?
A: Usability engineering: Usability engineering is a field of study that focuses on making interactive…
Q: 20)Memory is composed of _. a. 1-bit cells and each cell is addressable b. rows of 8-bit cells where…
A: Memory is made up of Large number of cells. Memory is made up of bits arranged in a two-dimensional…
Q: What are the circumstances that cause a system to get stuck in a stalemate?
A: Introduction: Stalemate: In chess, stalemate is a position in which a player cannot make any move…
Q: . Assume we want to use bloom filtering to filter product numbers. Assume we are only interested in…
A: Answer is given below-
Q: What is the difference between a hash function and a keyed hash function? With a real-time example,…
A: Hash function: As we all know, there is no such thing as a 100 percent efficient hash function. The…
Q: Which wireless security standard is susceptible to brute force attack? I O WPA O WEP ORSA O WPA2
A: Answer the above questions are as follows:
Q: Provide a brief description of 4GLs.
A: Answer
Q: For example, consider the situation of a page fault. What part of the operating system do they have…
A: Extending a considerable distance away from a surface or area: As an illustration, a vast cavern, a…
Q: into two parts: an initial network ID portion that identifies individual networks, followed by a…
A: The answer is
Q: How can semantics be represented in natural language processing systems?
A: Semantic Analysis is a branch of Natural Language Processing (NLP) that seeks to understand the…
Q: What precisely is a system model? When developing the foundational models, what should be taken into…
A: NOTE :- Below i explain the answer in my own words by which you understand it well. System…
Q: There are distinctions between hard and symbolic linkages.
A: There are difference between hard and symbolic linkages.
Q: Asymmetric encryption systems, such as those used in public key cryptography, offer numerous…
A: Foundation: Public-key cryptography is another name for it.It encrypts and decodes a message using…
Q: hen it comes to message authentication, what sorts of assaults are dealt with and h
A: Lets see the solution.
Q: void func( ______ ); int main() { double…
A: Given Code :- void func(______________); int main() { double aData[6][4]; func(&aData[4][1]);…
Q: Create an Excel spreadsheet that shows the Return on Investment (ROI) estimates that will be used to…
A: Here we make a simple data to calculate Return on Investment (ROI) : given below we create a excel…
Q: When it comes to public key cryptography, how many asymmetric encryption methods are there to choose…
A: Introduction: It takes two keys to operate on a public key system: one for encryption and another…
Q: 1. If we have the following java code: Bug bug = new Bug(); Bug spider = new Arachnid("red",…
A: => here given the code of java snippet , and in the question ask for output. => i provide my…
Q: Using technology and information resources, can you look into problems with your information system?
A: When it comes to information systems, the following are some of the issues: There was not enough…
Q: Lets say i have a module that outputs a 32 bit number. I want to gr 24-28
A: The answer is
Q: erence between processor consistency and FIFO consistency, and how do you ac
A: Below the difference between processor consistency and FIFO consistency
Q: ollowing the Function Design Recipe, create a complete function named get_consonant_cluster that…
A: According to the Question below the Solution: Output:
Q: Given the code segment below, what is the value that is passed to func() given the function call?…
A: aData is an array of doubles which can store 15 doubles and holding 10 values currently Also given…
Q: Please answer as substantial as possible. What is the importance of drafting these following…
A: The importance of drafting the Data gathering protocol A data collection protocol describes the…
Q: Give a brief explanation of what the Solution Explorer window does.
A: Windows Explorer is the file manager used by Windows 95 and later versions. It allows users to…
Q: Examine how technology affects health-care data systems.
A: Affect of technology on Healthcare data systems.
Q: there a fundamental difference in the way tuples and lists are created an
A: Lets see the solution.
Q: Consider "Amazon Alexa" as a real-world use case example and compare the major features of M2M and…
A: An IoT-focused strategy has the following advantages and potential: IoT is the superior alternative…
Q: Three processes share five resources of the same kind to form a system. Each operation requires a…
A: Introduction: Deadlock is defined as a circumstance in which one member of a group, including…
Q: xamine how information and communication technology (ICT) may be util nhance organizational…
A: Lets see the solution.
Q: esign the restaurant’s menu as an XML file. It should store the different dishes available, along…
A: The XML code has been written in step 2 and the hierarchy tree has been attached in step 3. You can…
Q: Give an example of a feature of a CASE tool.
A: CASE tools: Computer Aided Software Engineering tools are also known as CASE tools. CASE tools are…
Q: When comparing the ARM architecture with the core i3 architecture, what are the most significant…
A: Introduction: The ARM architecture is designed to be as functional as possible while using the least…
Step by step
Solved in 2 steps with 4 images
- Given a text file containing the availability of food items, write a program that reads the information from the text file and outputs the available food items. The program first reads the name of the text file from the user. The program then reads the text file, stores the information into four separate arrays, and outputs the available food items in the following format: name (category) -- description Assume the text file contains the category, name, description, and availability of at least one food item, separated by a tab character. Ex: If the input of the program is: food.txt and the contents of food.txt are: Sandwiches Ham sandwich Classic ham sandwich Available Sandwiches Chicken salad sandwich Chicken salad sandwich Not available Sandwiches Cheeseburger Classic cheeseburger Not available Salads Caesar salad Chunks of romaine heart lettuce dressed with lemon juice Available Salads Asian salad Mixed greens with ginger dressing, sprinkled with sesame Not available Drinks Water…Given a text file containing the availability of food items, write a program that reads the information from the text file and outputs the available food items. The program first reads the name of the text file from the user. The program then reads the text file, stores the information into four separate arrays, and outputs the available food items in the following format: name (category) -- description Assume the text file contains the category, name, description, and availability of at least one food item, separated by a tab character. Ex: If the input of the program is: food.txt and the contents of food.txt are: Sandwiches Ham sandwich Classic ham sandwich Available Sandwiches Chicken salad sandwich Chicken salad sandwich Not available Sandwiches Cheeseburger Classic cheeseburger Not available Salads Caesar salad Chunks of romaine heart lettuce dressed with lemon juice Available Salads Asian salad Mixed greens with ginger dressing, sprinkled with sesame Not available Drinks Water…write a function called fillArrayFromFilethat will read numbers from a file that contains one double per line into an array(up to the size of the array) and then returns the number of doubles successfully readfrom the file. You may assume that the file contains valid doubles
- Create a new file in C++ and save it as lab12_XYZ.cpp Consider rolling two six-sided dice. While the result of each throw is independent of all rolls that have come before, we can still calculate the odds of rolling any given number between 2 and 12. This program will calculate those odds by generating a large number (100,000) of random values (i.e. "rolling the dice") and storing the results in an array. When all values have been rolled, we will display the results (counts and odds to 2 decimal places) to the user. x x 2 3 4 5 6 7 8 9 10 11 12 //value for sum of 2 dice rolls +---+---+---+---+---+---+---+---+---+---+--- | | | | | | | | | | | | | | //counters for number of times value is rolled +---+---+---+---+---+---+---+---+---+---+---+---+---+ 0 1 2 3 4 5 6 7 8 9 10 11 12 //array index In Lab 5, sample code was provided for generating a random number. In this lab, I've provided a header file…DataFile.txt contains the information of poker cards. 1. C: clubs (lowest), D: diamonds, H: hearts, S: spades (highest) 2. 2 (lowest), 3, 4, 5, 6, 7, 8, 9, 10, J, Q, K, A 3. No Joker cards 4. Any C cards are lower than any D cards. DataFile Content (You can write the file specification into your program.) : H4,C8,HJ,C9,D10,D5,DK,D2,S7,DJ,H3,H6,S10,HK,DQ,C2,CJ,C4,CQ,D8,C3,SA,S2,HQ,S8, C6,D9,S3,SQ,C5,S4,H5,SJ,D3,H8,CK,S6,D7,S9,H2,CA,C7,H7,DA,D4,H9,D6,HA,H10,S5,C10 H4, D5, HK, D2 H4, HK, SK C9,C10 1. Create a list by dynamic allocated array and set the size to 20 2. Read the first 20 cards in the first line of the file, the put them one by one into the list by implementing and using putItem(). The list must be kept sorted in ascending order. Then print out all the cards in the list in one line separating by commas. 3. Then delete the cards indicated in the second line of the file by using deleteItem() Then print out all the cards in the list in one line separating by commas. 4. Then put…C++ A teacher is requiring her students to line up in alphabetical order, according to their first names..For example, in one class Chapel, Christine would be at the front and Uhura, Nyota would be last. The program will get the names from a file using getline since the file name includes spaces. The names should be read in until there is no more data to read. The program should prompt the user for the file name and read the data from the file. Note that these names might include spaces; handle your input accordingly. The expected output is two names; do not show the entire file. Do not use arrays or sorting for this problem.
- Can you help me write the following C++ program: Add a search command to the file viewer created. Thiscommand asks the user for a string and finds the first line that containsthat string. The search starts at the first line that is currently displayedand stops at the end of the file. If the string is found, then the file willbe scrolled down so that when it is redisplayed, the line that contains thestring is the first line at the top of the window.If the string is not found, the program prints the following error messageat the top of the screen:ERROR: string X was not foundwhere X is replaced by the string entered by the user. In that case, theprogram redisplays the lines that the user was viewing before the searchcommand was executed.Modify the program as little as possible. Make sure you assign new responsibilities to the most appropriate components. Use the C++ string operation find. The file viewer code is given below: // FileViewer.cpp #include "FileViewer.h" using namespace…Given a file with data for names and marks you will read them into two arrays You will then display the data, do a linear search and report if found, sort the data, do a binary search. Be sure to test for found and not found in your main program. Read Data Write a function that reads in data from a file using the prototype below. The function can define and open the file, read the names and marks into the arrays and keep track of how many names there are in numElts, and then closes the file. The list of names and marks can be found at the end of the lab and copied into a text file. void getNames(string names[], int marks[], int& numElts); Display Data Write a function to display the contents of names and marks using the prototype given below. void displayData(const string names[], const int marks[], int numElts); Linear Search Write the searchList function given the prototype below so that it searches for a given name. The functions returns and int which is…Given a file with data for names and marks you will read them into two arrays You will then display the data, do a linear search and report if found, sort the data, do a binary search. Be sure to test for found and not found in your main program. Read Data Write a function that reads in data from a file using the prototype below. The function can define and open the file, read the names and marks into the arrays and keep track of how many names there are in numElts, and then closes the file. The list of names and marks can be found at the end of the lab and copied into a text file. void getNames(string names[], int marks[], int& numElts); Display Data Write a function to display the contents of names and marks using the prototype given below. void displayData(const string names[], const int marks[], int numElts); Linear Search Write the searchList function given the prototype below so that it searches for a given name. The functions returns and int which is the…
- Read Data Write a function that reads in data from a file using the prototype below. The function can define and open the file, read the names and marks into the arrays and keep track of how many names there are in numElts, and then closes the file. The list of names and marks can be found at the end of the lab and copied into a text file. void getNames(string names[], int marks[], int& numElts); Display Data Write a function to display the contents of names and marks using the prototype given below. void displayData(const string names[], const int marks[], int numElts); Linear Search Write the searchList function given the prototype below so that it searches for a given name. The functions returns and int which is the index of the name found. The main program will decide if -1 is returned then it will say name is not found otherwise it will write out the name and the mark for that name. int linearSearch(const string list[], int numElts, string value);…Doubly Linked List This assignment asks you to sort the letters in an input file and print the sorted letters to an output file (or standard output) which will be the solution. Your program, called codesolve, will take the following command line arguments: % codesolve [-o output_file_name] input_file_name Read the letters in from the input file and convert them to upper case if they are not already in uppercase. If the output_file_name is given with the -o option, the program will output the sorted letters to the given output file; otherwise, the output shall be to standard output. In addition to parsing and processing the command line arguments, your program needs to do the following: You need to construct a doubly linked list as you read from input. Each node in the list will link to the one in front of it and the one behind it if they exist. They will have NULL for the previous pointer if they are first in the list. They will have NULL for the next pointer if they are last in the…Assignment 7 A: These are the instructions and the sample outputs are included in pictures. Language is C++ Rare Collection. We can make arrays of custom objects just like we’ve done with ints and strings. While it’s possible to make both 1D and 2D arrays of objects (and more), for this assignment we’ll start you out with just one dimensional arrays.Your parents have asked you to develop a program to help them organize the collectionof rare CDs they currently have sitting in their car’s glove box. To do this, you will first create an AudioCD class. It should have the following private attributes. String cdTitle String[4] artists int releaseYear String genre float condition Your class should also have the following methods: Default Constructor: Initializes the five attributes to the following default values:◦ cdTitle = “”◦ artists = {“”, “”, “”, “”}◦ releaseYear = 1980◦ genre = “”◦ condition = 0.0 Overloaded Constructor: Initializes the five attributes based on values passed…