In the context of designing a system that offers a file management capability, e.g., OneDrive, there are some constraints on the acceptable file names. The following three characters {*,$, :} in addition to spaces are not allowed in file names. If any of these four characters appears in a file name, it is replaced by a hyphen (-). Examples: "new file" → "new-file" "important$file" → "important-file" "abcdefghijklm.txt" → "abc-def-gh-ij-klm.txt" "exam.doc" → "exam.doc" i. Design an algorithm that takes a file name as a string and returns a modified name replacing the prohibited characters with hyphens. Use pseudocode to describe your algorithm. Define all operations that are used in your algorithm. ii. What is the runtime complexity of your algorithm?
Q: phthon code for one time pad cipher to be able to encrypt and decrypt words entered in english using…
A: Python: Python is a high level, general purpose programming language. It supports both procedural…
Q: Look at the assaults that are being launched from inside the academic community. If you have any…
A: Think about how higher education is being attacked within. If you have any recommendations for…
Q: QUESTION 23 According to Nyquist–Shannon sampling theorem, the sampling rate should be ............…
A: As you have posted only question 23 so I solved it.
Q: 1. The AD1CHS register selects the input pins to be connected to the SHA. [T/F] 2. The AD1PCFG…
A: To state True or false for Q.1: The AD1CHS register selects the input pins to be connected to the…
Q: Explanations of the DNS should include such topics as authoritative and root servers, DNS entries,…
A: DNS files ( zone files)The headings that live on reliable DNS servers give information about a…
Q: Why do we use a variety of visual tools, and what do we hope to accomplish with them? Give an…
A: Intro Visual aids may take the form of anything from static images like photographs or diagrams to…
Q: Assembler instructions may be rearranged to mitigate pipeline security risks. Is there a difference…
A: The hardware does not allow some instruction combinations (two instructions in the pipeline require…
Q: void loop() { measureULTRASONIC (); if (distance <= 200) moving_speed= map (distance, 0, 200, 40,…
A: We need to fix the error of the given code. **Since the given code is a hardware specific code,…
Q: Using a computer language to read from and write to a relational database
A: SQL (Structured Query Language) is a computer language used to manage relational databases and…
Q: Request iteration in DNS, the difference between authoritative and root servers, and the format of…
A: Introduction: Iterated and non-iterated requests, authoritative and root servers, and DNS records…
Q: Advantages and drawbacks exist for both object-oriented and procedural programming languages.
A: Object-oriented programming is a programming model which is based upon the concept of objects which…
Q: If a cloud service suffers a data breach, would it be feasible to make a change in how that service…
A: Answer Yes, it is a feasible to make changes to the security of a cloud service in the event of a…
Q: Why is it beneficial to learn about the origins of computers, the inner workings of computer…
A: One of the most significant inventions of the 20th century is the electronic computer. Computer,…
Q: This graph only has 7 vertices. The graph should have 9 vertices.How would I change the graph to…
A: We have to redraw the graph with 9 vertices, and following the desired properties.
Q: Write a section of Python code (not an entire function) that: Asks the user to input a number…
A: Introduction: Algorithm Step 1- Start Step 2 - Ask the user Step 3- if conditions Step 4- print…
Q: his is for SQL Give me a list of all of our vendors (by their name) and, if they have an invoice,…
A: Note: Since you have not provided complete vendor and invoice table data. So I am creating/taking…
Q: A computer system contains a big endian byte addressable memory system with 8 separate memory…
A: Disclaimer: “Since you have posted a question with multiple sub-parts, we will solve the first three…
Q: It would be very appreciated if you could elaborate on the function of the authentication procedure.…
A: Introduction: Verifying a user's identity is the process of authentication. With this method,…
Q: Compared to other types of data, why does video need a larger quantity of storage space?
A: Compared to the other types of data such as audio, images, pdf files etc. The video needs a large…
Q: Write a function NumberOfPennies() that returns the total number of pennies given a number of…
A:
Q: Explain how object-oriented and procedural programming la vary from one another in terms of their…
A: Object oriented programming The object oriented programming works with the objects(that shows the…
Q: Please send me answer within 10 min!! I will rate you good for sure!! Please send me typed answer!
A: For q1, I have provided C++ CODE along with CODE SCREENSHOT and OUTPUT…
Q: Do you know what a "poison packet assault" is or how to defend against one? Give some instances to…
A: ARP Poisoning, After successful ARP spoofing, the hacker changes the company's ARP table so that it…
Q: How do database rows break up the information they contain?
A: Data is kept as a row in a table in a database:Data is often saved as rows in a table. Small pieces…
Q: What are the top three distinguishing characteristics of an object-oriented language?
A: Object-oriented language In order to create programming program, object-oriented language (OOL), a…
Q: Given a time in 12-hour notation, write a function that displays it in 24-hour notation.
A: In this question we have to write a function in programming language which converts the time in…
Q: Each kind of distributed database system, whether it be homogenous or federated, comes with its own…
A: Expounded Upon: Heterogeneous database systems like federated distributed database systems and other…
Q: s. While watching television you might have experienced blurring and flickering of the image that…
A: Smart TVs require regular over-the-air updates. In some cases, your TV screen might flicker due to…
Q: 6. a) Compute the following permutations. P(10,3) P(20, 18) P(5,5) b) Compute the following…
A: Answer a) P(10, 3): P(10, 3) is a permutation of 10 items taken 3 at a time. the Formula to…
Q: Using string methods, write expressions that do the following: e. Convert "PyThOn" to lowercase…
A: Dear Student, The expression is given below -
Q: Question 13 sum .Design an FSM and Develop a Verilog design module for the sequence detector using a…
A: The definition of a finite state machine is, the term finite state machine (FSM) is also known as…
Q: Explain in detail about Mobile IP. TELL THE DETAILED STEPWISE SOLUTION WITH ALL STEPS AND…
A: What is Mobile Internet Protocol Mobile IP is nothing but it is a extension of Internet Protocol…
Q: State whether the following statements is User Requirement, Process oriented Functional Requirement,…
A: Solution for the above question, INTRODUCTION:User requirements are typically written when…
Q: Outline the development history of a programming language.
A: It is required of us to write an essay about the development of a programming language. A…
Q: Define Fibonacci Numbers? What is the ultimate goal of using the Fibonacci numbers recurrence?
A: Fibonacci numbers are a sequence that begins with 0 and continues indefinitely until the last number…
Q: Put DNS data into sensible categories. Provide a brief paragraph explaining the context of each…
A: The following must be included in your answers to the questions: List the various types of DNS…
Q: Question 2. (a) Give the definition of a tree. Definition. A tree is a graph that ... (b) Give a…
A: A tree is a data structure that is used to store information in a hierarchical way. It consists of…
Q: Write a second Convert Tolnches() with two double parameters, numFeet and numInches, that returns…
A: Functions : A function is a set of statements that take inputs, do some specific computation, and…
Q: N=9 CRIBRAR文文 (大大大大大大大 23*****45 678***901 2345*6789 012***345 67*****89 ******* 大大大大大卖卖卖
A: We need to write a C code for the given pattern.
Q: Algorithm 1: Question 2.1 1 numbers [1,2,3,4,5); 2 stack-new Stack(); 3 queue = new Queue(); 4…
A: Required: Algorithm 1: Question 2.1 number = [1, 2, 3, 4, 5]; stack = new Stack(); queue = new…
Q: How do I add this to the code as it is one of the requirements for existence in the code (Do you…
A: The given Java program is as follows: import java.util.*; public class Main{ static String name,…
Q: Explain the weiler-atherton polygon algorithm in detail. Can you give me an example of a procedure…
A: There is a chance that the formula discovered by Wailer and Atherton is a polygon-clipping formula.…
Q: Do you know what a "poison packet assault" is or how to defend against one? Give some instances to…
A: Introduction: Local Area Network (LAN) ARP Poisoning is a kind of cyberattack that involves…
Q: If there is no client and server sides of a communication session, how do you feel about that…
A: A dialogue session, also known as a communication session, is an immersive information exchange…
Q: Full explain this question and text typing work onl
A: Given infix notation expression : 15 * ( 2 * 4 ) - 3 * 5 + 1 In postfix notation, an expression is…
Q: Private terms are those one of which signifies a perfection and the other of which denies a…
A: Private terms are those one of which signifies a perfection and the other of which denies a…
Q: 11(ii) Using pumping lemma for context-free-languages prove that the language L={w: 2na(w) = n(w) =…
A: Here is the solution of the problem.We need solve the pumping lemma for context free languages. see…
Q: What are tress and graphs and how are they used in algorithm to solve problems? Explain what type…
A: The following solution is
Q: What is the signal to send through the medium if the sequence of bits to carry is 1110010101
A: Manchester encoding is a method of encoding digital data in which the data bit to be transmitted is…
Q: How one can exploit spatial reuse in optimizing memory bandwidth on a GPU
A: Answer:
Step by step
Solved in 3 steps
- Memory Allocation: Select all of the following statements that are true. The basic idea of contiguous allocation is that each process is contained in a single contiguous section of memory. When using a single-partition allocation scheme, the main memory is usually divided into three partitions. Memory partitioning schemes allow for multiprogramming. When applying the multiple-partition allocation scheme "Fixed Partitions", all partitions always have the same size. When applying the multiple-partition allocation scheme "Variable Partitions", the FirstFit allocation strategy performs best in practice. The Buddy system is prone to internal fragmentation.Program language: C++ A publishing company markets both hardcopy and eBook versions of its work. Create a class publication that stores the title and price of a publication. From this class derive two classes: book, which adds a page count, and digital, which adds a storage capacity in MG bytes. Each of these classes should have a getdata() function to get its data from the user at the keyboard and put a putdata() function to display its data. Add a base class sales that hold an array of three floats so that it can record the dollar sales of a particular publication for the last three months. Include a getData() function to get three sales amounts from the user and a putdata() function to display the sales figures. Modify the book and digital classes so they are derived from both publication and sales. An object of the class book or digital should input and output sales data along with its other data. Write the main function to create a book object and a digital object and test their…Problem 2: Organizing Apps A smart phone model allows users to organize their apps in sets related to the apps purposes. Here is a data definition to represent an app set in DrRacket: 4: An AppSet is one of: *: -- Folder *: -- Apps ;; A Folder is a (make-folder String) (define-struct folder [title]) A + Apps is a (make-apps String AppSet) (define-struct apps [app-name others]) • Draw the class diagram that represents this data definition. You may draw this as ASCII-art and include it in your submission, if you wish. Or you can just draw it on paper and not submit it. Regardless, we think it will help you in visualizing how the data is organized. Convert this data definition into Java. Make sure you use the same names for data types and for the fields, as are used in the DrRacket data definitions, converted into Java style conventions. Make sure that the constructor arguments are given in the same order as shown. Include in your examples the following sets: - a "Travel" set with "Uber"…
- Language: C++ Create a class called publication that stores the title (char array) and price (float) of a publication. From this class derive two classes: book, which adds a page count (int) and tape, which adds a playing time in minutes (float). Each of the three classes should have a getdata() function to get its data from the user using input from the keyboard and a putdata() function to display the data.Write a main function that creates an array of pointers to publication. In a loop, ask the user for data about a particular type of book or tape to hold data. Put the pointer to the object in the array. When the user has finished entering data for all the books and tapes, display the resulting data for all the books and tapes entered, using a for loop and a single statement such as: pubarr[j] -> putdata(); To display the data from each object in the array.C++ You must create a header file for each task with implementation as the execute task. Together with the header and implementation, you create a test program whose main function demonstrates that your functions work as they should. (Main.cpp and main.h) Two files, A and B, are sorted. Based on the files, create a file that contains all the elements in sorted order. This operation is called a merge. Input files A and B are sorted Output: File C contains all values from A and B in sorted orderpython only** define the following function: This function must set the value of a task in a checklist to True. It will accept two parameters: the checklist object to add to, and the name of the task to mark as completed. In addition to changing the task value, it must return the (now modified) checklist object that it was given. if the task name provided is not in the checklist, this function must print a specific message and must return None. Define completeTask with 2 parameters Use def to define completeTask with 2 parameters Use a return statement Within the definition of completeTask with 2 parameters, use return _ in at least one place. Do not use any kind of loop Within the definition of completeTask with 2 parameters, do not use any kind of loop.
- CPU Scheduling Algorithm Simulator in C++Instructions:Create a .zip file consisting of code, output files, readme file .The readme file should explain briefly your code. The simulator will consists of following classes:(i) Process: The data members of this class should store process id, arrival time in the ready queue,CPU burst time, completion time, turn around time, waiting time, and response time. The memberfunctions of this class should assign values to the data members and print them. A constructorshould also be used.(ii) Process_Creator: This class will create an array of processes and assign a random arrival timeand burst time to each process. Data members, constructor and member functions can be writtenaccordingly.(iii) Scheduler: This class will implement the scheduling algorithm. The class will maintain a readyqueue of infinite capacity (i.e., any number of processes can be accommodated in the queue). Theready queue should be implemented using the min-Heap data structure…Python only** define the following function: 1. This function must add a task to a checklist, setting its initial value to False. It will accept two parameters: the checklist object to add to, and the task name to add. In addition to adding the task, it must return the (now modified) checklist object that it was given. There is one issue, however: a task cannot be added to a checklist if the name requested is already being used by another task in that checklist. In that case, this function must print a specific message and must return None Define addTask with 2 parameters Use def to define addTask with 2 parameters Use a return statement Within the definition of addTask with 2 parameters, use return _ in at least one place. Do not use any kind of loop Within the definition of addTask with 2 parameters, do not use any kind of loop.Topical Information Use C++. This lab should provide you with practice in file handling, stream formatting, and some string manipulation. Classes might come in handy, too. Program Information Write a program that reads a list of enrollments from a file and prints a class roster for the teacher. Make the class roster line up as neatly as you can and still fit on the screen. You can choose the actual values to use for your data. Make sure to do enough sets of data to well test your program! (Empty data set, normal data set, data with large values, data with short values, etc.) Also, your program can't know ahead of time how many people are enrolled in the class... Don't forget to read the file's name from the user and protect your program against any errors that may occur during the opening of the file. Try to use functions to break up the program into more manageable pieces. As an example, you might have the data file contain: # name # student number # address1 # address2 # phone number…
- PSC Oct 13 waynekizzo 7:20 X 2Topical Information Use C++. This lab will help you practice with dynamic memory (NOT mixed with classes). Program Information One statistic of interest to many researchers is the median of a set of data. The median is the value in the middle. (This is NOT the average, mind you.) Being in the middle, of course implies that the data are in order (sorted). If there are an odd number of data items, the middle is simple to find. If there are an even number of data items, you are supposed to take the average of the two middle values. You'll need to find the median of a set of data from a file. You don't know how many data are in the file, of course. You'll have to count the data, then read them in to sort, then find the median, and finally print it (the median) out. Do NOT use any more memory than is necessary!!Sorting Project 1/3 (C++ Programming) Data Structures I need to know what are the three function codes for this project. I need three functions to generate 30 files. Write three functions that each generate 10 unique dataset files of integers separated by a comma ",". E.g., 34, 32421, 124124, 67, 92, ... The sizes of these 10 datasets are (n) – 1000, 4000, 8000, 10000, 40000, 80000, 100000, 400000, 800000, 1000000. One function should generate random integers between 0 to 1,000,000 as the elements of each dataset. Another function should generate a file with a sorted list of integers from smallest to largest. The final function should generate a file with a reverse sorted list with values going from largest to smallest. E.g., 1000Sorted file will have 0 to 999, 1000Reverse.txt will have 999 to 0, and 1000Random.txt will have random numbers between 0 to 1,000,000. These functions should not take any input arguments and should have the signature: void GenerateSortedInputFiles(), void…