Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

By making use of pseudocode, show the programming statements that will

accept two values from a user. These two values should be added together, and

the result displayed on the screen


Create a class called 'Octal' that has data members for integer and decimal, a

constructor to initialize the object to some constant value using at least one implicit

and another explicit way of initialization, member function to add three Octal objects

along with also have at least one default argument, suitable member function to

display octal value in interger.decimal format. Write a main function to create three

Octal objects, add them and display the result in interger.decimal format.


A HighSchool application has two classes: the Person base class and the Student child

class. Using inheritance, create two new classes, Teacher and CollegeStudent. A

Teacher will be like Person but will have additional properties such as salary (the

amount the teacher earns) and subject (e.g. “Computer Science”, “Chemistry”,

“English”, “Other”) .Teacher class having a method displayDetails() to display all the

information about a teacher. The CollegeStudent class will derive from the Student

class by adding a year (current level in college) and major (e.g. “Electrical

Engineering”, “Communications”, “Undeclared”). CollegeStudent class having a

method printDetails() to display details about collegestudents.Create object of

Teacher and CollegeStudent class and call the method.


Using the stages of an attack below , give two examples of what an attacker would do if the attacker is to achieve the attack


Stages to focus on


a. Reconnaissance


b. Weaponisation


c. Delivery


d. Exploitation


e. Installation

An attack can impact individuals in the home and individuals working in organizations in different ways.


Considering the statement above , describe any two possible individual or personal cyber impacts using examples

On the form, create two combo boxes, to allow a user to select between three



different printers and years. When a user has selected a printer and year and clicked



the submit button, display the amount of ink cartridges used for that year. Use the



following table for the printers and yearly cartridges used:



2018 2019 2020



HP Deskjesk 650 10 35 20



Epson K750 15 22 12



Canon Z100 30 31 33



Q.1.2 You are also required to create a menu system which will allow the user to exit the



application under the file menu. Under the tool’s menu, allow the form submission



and an option to display the yearly ink cartridges used for each printer. The layout



of the form is left to your discretion. Marks will be allocated to the presentation and



effectiveness of the layout, but the following layout is displayed for your



convenience.

Note: No global declarations





Call the functions in main through menu







Implement the following :





Circular singlyLinked List with following functions :





1)insert_at_head(node* & head, int val);





2)insert_at_tail(node* & head, int val);





3)display(node* head) ;





4)insert_at_pos(node* & head, int val,int pos);





5)delete_at_head(node* & head);





6)delete_at_tail(node* & head);





7)delete_at_pos(node* & head, int pos)

Write a Java GUI application that will keep track of a company’s products. The application must


contain the product id, product name and the product price.


Q.3.1 On the form, create three text fields to capture the product details and a non‐


editable text area to display the product details. Create a submit button that


when clicked will save the product details to a Products.txt file. Also include a


search button that will allow a user to search for a product based on the product


id.


Q.3.2 Create a sequential file (products.txt) that contains data for the following fields:


 The product id


 The product name


 The product price

Using 4 suitable examples , briefly discuss the conflicts of privacy and security ideals

Write a program to find the student details who got slot on a specific counselling date based on the student’s Cutoff marks, Age, HSC and SSLC marks.


LATEST TUTORIALS
APPROVED BY CLIENTS