By making use of pseudocode, show the programming statements that will
accept two values from a user. These two values should be added together, and
the result displayed on the screen
Create a class called 'Octal' that has data members for integer and decimal, a
constructor to initialize the object to some constant value using at least one implicit
and another explicit way of initialization, member function to add three Octal objects
along with also have at least one default argument, suitable member function to
display octal value in interger.decimal format. Write a main function to create three
Octal objects, add them and display the result in interger.decimal format.
A HighSchool application has two classes: the Person base class and the Student child
class. Using inheritance, create two new classes, Teacher and CollegeStudent. A
Teacher will be like Person but will have additional properties such as salary (the
amount the teacher earns) and subject (e.g. “Computer Science”, “Chemistry”,
“English”, “Other”) .Teacher class having a method displayDetails() to display all the
information about a teacher. The CollegeStudent class will derive from the Student
class by adding a year (current level in college) and major (e.g. “Electrical
Engineering”, “Communications”, “Undeclared”). CollegeStudent class having a
method printDetails() to display details about collegestudents.Create object of
Teacher and CollegeStudent class and call the method.
Using the stages of an attack below , give two examples of what an attacker would do if the attacker is to achieve the attack
Stages to focus on
a. Reconnaissance
b. Weaponisation
c. Delivery
d. Exploitation
e. Installation
An attack can impact individuals in the home and individuals working in organizations in different ways.
Considering the statement above , describe any two possible individual or personal cyber impacts using examples
On the form, create two combo boxes, to allow a user to select between three
different printers and years. When a user has selected a printer and year and clicked
the submit button, display the amount of ink cartridges used for that year. Use the
following table for the printers and yearly cartridges used:
2018 2019 2020
HP Deskjesk 650 10 35 20
Epson K750 15 22 12
Canon Z100 30 31 33
Q.1.2 You are also required to create a menu system which will allow the user to exit the
application under the file menu. Under the tool’s menu, allow the form submission
and an option to display the yearly ink cartridges used for each printer. The layout
of the form is left to your discretion. Marks will be allocated to the presentation and
effectiveness of the layout, but the following layout is displayed for your
convenience.
Note: No global declarations
Call the functions in main through menu
Implement the following :
Circular singlyLinked List with following functions :
1)insert_at_head(node* & head, int val);
2)insert_at_tail(node* & head, int val);
3)display(node* head) ;
4)insert_at_pos(node* & head, int val,int pos);
5)delete_at_head(node* & head);
6)delete_at_tail(node* & head);
7)delete_at_pos(node* & head, int pos)
Write a Java GUI application that will keep track of a company’s products. The application must
contain the product id, product name and the product price.
Q.3.1 On the form, create three text fields to capture the product details and a non‐
editable text area to display the product details. Create a submit button that
when clicked will save the product details to a Products.txt file. Also include a
search button that will allow a user to search for a product based on the product
id.
Q.3.2 Create a sequential file (products.txt) that contains data for the following fields:
The product id
The product name
The product price
Using 4 suitable examples , briefly discuss the conflicts of privacy and security ideals
Write a program to find the student details who got slot on a specific counselling date based on the student’s Cutoff marks, Age, HSC and SSLC marks.