Computer Science Homework Help

Stuck in a question? Need homework help? Ask your question and get your homework done!

*Your Question
  • Question Subject
At least 10 characters
All Questions
Answered Questions
Verified Answers

Use the method of eigenfunction expansions to solve the following heat flow problem with external heat source in a one-dimensional rod:
∂u=2∂2u+e−(x+t) 00, ∂t ∂x2
u(0, t) = 0, u(π, t) = 0, u(x, 0) = −x.
You can use the provided formula sheets.

anonymous
. 
Finite Mathematics / Applied Calculus
0

The gently curves lines right running right or left in the enamel which extend from the DEJ
to the enamel surface in the picture are called:

shaynatasani
0

begin at birth when children first start to recognize speech sounds and the meanings of the sounds they respresent

Isbell Zella
0

Most crisis involving barricade situations occur outside of the home are unplanned and involve males

Christina Monroe
0

"Please write a program in Java to sort and search hotel booking information. The public interface of BookingManager is described below, along with a ready-to-use class BookingInfo. Please follow the requirements in the description for each method to complete this class. Please also write a tester class to thoroughly test the four methods given in BookingManager.
The BookingManager class should contain the following public methods:
1. public ArrayList readBookings(string pathName) throws IOException:
a. Read all the booking information from the binary file in the local file system as specified by the parameter pathName and return an ArrayList of BookingInfo.
b. We assume that each record in the binary file has a fixed length of 60 bytes, with start date stored in the first 20 bytes, end date in next 20 bytes, and id in the last 20 bytes.
c. We assume that all the dates in the file are in the format of YYYY-MM-DD. There could be an arbitrary number of records in the file.
2. public ArrayList sortBookings(ArrayList inputList):
a. Write code that implements the merge sort algorithm to sort all the booking information in inputList by start date in a way that recent info shows first. The method returns the list of sorted bookings.
3. Public ArrayList removeConflicts(ArrayList inputList):
a. Use the sorted list of booking info (inputList) to find if there are pairs of bookings with conflict. Having a conflict means that a booking has a start date before the end date of another booking. Whenever there is a conflict, remove the later one. The method returns a new list of booking info with no conflicts.
4. public void saveBookingInfo(String pathName, ArrayList sortedList) throws IOException:
a. Use RandomAccessFile to save all the ordered booking info from the sortedList to the given pathName on the disk.
5. public ArrayList bookingSearch(String pathName, Date minDate, Date maxDate) throws IOException:
a. Given the date range [minDate, maxDate] (both inclusive) and the pathname of the file that stores the sorted booking info, use binary search to find and return an ArrayList of all the booking info within this date range without loading all the booking info in the file into memory (i.e., do NOT attempt to read all booking info into an array/ArrayList and then perform the search there). If no booking info falls in the date range, the method returns an empty list. As a hint, one way to complete this method is to adapt the binary search algorithm (for arrays) taught in class to the setting of random access files. To retrieve the booking info in a range, you may use binary search to locate within the range the booking info with the given minDate (or if such a booking info does not exist, the first booking info that has a start date that is higher than minDate in the file) and then visit the subsequent records until the date is out of the given range or the end of the file is reached.
b. Tips: 1.Use RandomAccessFile().seek(long pos) to do random access;
2. Use RandomAccessFile().length() to get the size of file (number of bytes)."

anonymous
. 
Programming
0

/Users/hangli/Library/Containers/com.tencent.xinWeChat/Data/Library/Application Support/com.tencent.xinWeChat/2.0b4.0.9/382ac4943618ebd89e8e0fc941e400ce/Message/MessageTemp/76a93ba031a30de2fa2e00578d4ff020/OpenData/Assignment 4 Instructions(拖移项目).pdf

maochenwang0
0

hich of the following practices could lead to Professional misconduct?


Charting interventions in advance to save time




Documenting incorrect data




Not charting the correct time that events took place




All of the above

Kiranpreet kaur
0

Which of the following statements about documenting is not true?


It involves recording the interventions carried out to meet the patient's needs.




When completed in a proper way, it reflects the nursing process.




It is necessary to prove that nursing care was provided




Nursing documentation can be accepted in written format only.

Kiranpreet kaur
1

Which of the following practices could lead to Professional misconduct?


Charting interventions in advance to save time




Documenting incorrect data




Not charting the correct time that events took place




All of the above

Kiranpreet kaur
0

Professional misconduct can be defined as


Verbally, physically, emotionally, or sexually abusing a patient


Failing to keep records as required


Failing to meet a standard of practice of the profession




All of the above

Kiranpreet kaur
0

Apache Spark in Java

I have a dataframe with thousands of rows a few columns:

Dataset students = spark.read().format("csv").option("inferSchema", "true").option("header", true).option("sep", ",").load(students_file);

| StudentName | StudentID | GPA | Admitted | Program
--------------------------------------------------------------------------
| (String) | (Integer) | (Double) | (Boolean) | (String)

I need to do queries

How do I filter students belonging to the program "X",
Who has the highest GPA,
Which students were admitted, and how many ?

anonymous
. 
Computer Science
1

Write the necessary lines of code to take the sender’s email address, password, recipient’s email address, subject and message from the console using the input() and getpass() functions. Additionally, write a message “I love Computer Networks” and pass it to your body email and subsequently end the message. Lastly, choose yahoo as your mail server.

masithembe dyosi
. 
Computer Science
1

Write a C++ code to create a one-dimensional (integer type) array of Size N. Create a menu-based
approach and solve the following.
i) Number of occurrences of a given number in the array. [2 Marks]
ii) Remove the duplicate elements in the array. [2 Marks]
iii) Second Largest and Second Smallest element in the array. [2 Marks]
iv) Search an element in an array. [2 Marks]
v) Sorting the array elements in ascending or descending based on user choice. [6 Marks]
For one dimensional array creation -

Lereng Moroeng
. 
Computer Science
1

Controller of a car has three control switches, Accelerator (A), Brake (B) and Clutch (C). A Car runs if A is pressed and either (B and C are not pressed) or C is pressed and B is not pressed. When the switch C alone is pressed then the car will be in running state. If all the three switches are pressed together then we can’t predict the result. In all other cases, car will be in off state. Design a circuit to implement this scenario using Universal gates. Simulate the circuit with Virtual Lab and verify the output for all possible inputs.

20TUCS141 NITHISHKUMAR B.
. 
Computer Science
1

(PYTHON) You have been hired to help write the software for an automatic change dispenser, the kind you see
attached to a cash register that automatically dispenses the right coins depending on the amount of
change that’s owed to the customer. Write a program that first prompts for a number from 0 to 99
(representing the amount of change that is due) and then outputs the number of quarters, dimes,
nickels, and pennies that should be dispensed

laughalot33
. 
Computer Science
0

(PYTHON) You have been hired to help write the software for an automatic change dispenser, the kind you see
attached to a cash register that automatically dispenses the right coins depending on the amount of
change that’s owed to the customer. Write a program that first prompts for a number from 0 to 99
(representing the amount of change that is due) and then outputs the number of quarters, dimes,
nickels, and pennies that should be dispensed

laughalot33
. 
Computer Science
0

(PYTHON) You have been hired to help write the software for an automatic change dispenser, the kind you see
attached to a cash register that automatically dispenses the right coins depending on the amount of
change that’s owed to the customer. Write a program that first prompts for a number from 0 to 99
(representing the amount of change that is due) and then outputs the number of quarters, dimes,
nickels, and pennies that should be dispensed

anonymous
. 
Computer Science
0

Write a C++ code to create a one-dimensional (integer type) array of Size N. Create a menu-based
approach and solve the following.
i) Number of occurrences of a given number in the array. [2 Marks]
ii) Remove the duplicate elements in the array. [2 Marks]
iii) Second Largest and Second Smallest element in the array. [2 Marks]
iv) Search an element in an array. [2 Marks]
v) Sorting the array elements in ascending or descending based on user choice. [6 Marks]
For one dimensional array creation -

Palesa Thetele
. 
Computer Science
1

write a paper that theoretically and empirically compares two strategies for inserting n values into a heap. Insert the n values one at a time into the heap using the push method. Use the heapify algorithm to create a heap with n values. You do not have to determine the function for the exact number of operations in the best and worst cases. However, you should be very thoughtful and intentional about the input you use to try to elicit counts that are close to the best and worst cases.

bicha raj
. 
Computer Science
1

1. In the context of prime field GF(23), answer the following questions.
(a) What are the elements of this prime field?
(b) What is the additive inverse of 13 in this field?
(c) What is the multiplicative inverse of 13 in this field?
2. In the context of extension field GF(25), answer the following questions:
(a) Represent A(x) = 18 in the above field. (Note: It will be a polynomial)
(b) Represent B(x) = 16 in the same field.
(c) Determine A(x)+B(x) (as a polynomial) and express as an integer.
3. Using Table 4.2, of GF(28), determine the multiplicative inverses of 5D16 and 4F16.
Also, determine the AES S-box substitutions for these two 8-bits (use Table 4.3). Note: this is just a
table look. No math is needed.
4. Given the following 128-bits (expressed as Hexa characters) as input to the AES
ShiftRows sublayer (just for one round), determine the 128-bit output (as 32 Hexa characters):
(B5D2C7B1F8E0682337485D6A8B0C8F99). (Hint: Refer to matrix 4.1 on page 104 of the textbook. First, arrange the input data into a matrix of bytes. For example, the 1st two characters, Hexa "B5" become a single byte representing the byte 10110101.
This is represented by B0 in the table (i.e., Byte 0). Similarly, the next two characters in the input, Hexa "D2" become a single byte 11010010. This is
indicated by B1 (i.e., Byte 1) in the table. Then shift the elements in each row as shown in 4.1. Express the output as a matrix or as a sequential string reading column-wise.

Anthony Irungu
. 
Computer Science
1
Suggested Answers (0)
In order to post an answer you need toLogin or Sign up
In order to post an
answer you need to
Login or Sign up
In order to post an answer you
need to Login or Sign up