QuestionAnswered step-by-stepQuestion: ENSURE WORK IS ORIGINAL OR I WILL REJECT AND REPORT YOU…Question:ENSURE WORK IS ORIGINAL OR I WILL REJECT AND REPORT YOU TO THE SUPPORT INSTANTLYPLEASE DON’T COPY FROM OTHERS’ ANSWERS BECAUSE ALL ARE WRONG!!!!!!! PLEASE FOLLOW THE PROVIDED INSTRUCTION! ONLY A PROFESSIONAL SHOULD ANSWER OTHERS PLEASE DON’T WASTE MY TIME DON’T WRITE USELESS OR MEANINGLESS COMMENTS UNLESS YOU ARE ABLE TO SOLVE IT Please analyze this file with all the tools you have learned and submit your analysis. Image transcription textpublic class LumberChecker { // ToDo:Create a public static final EPSILON withvalue 0.0625 // i.e. one-sixte… Show more The function odds is to return the list of alternate elements of its input. For example, odds[a, b, c, d, e] = [a, c, e] and odds[a, b] = [a]. Code odds using (a) ordinary ML lists ] (b) lazy lists [5 marks] (c) mutable lists (as an imperative operation so that odds has type ‘a mlist -> unit for a suitable datatype ‘a mlist of mutable lists, to be described) [6 marks] 6 Foundations of Computer Science What does O(g(n)) imply, and what’s its relevance to programming? (Describe both advantages and barriers.) [5 marks] Consider the subsequent Tip of ‘a; amusing flatten (Tip x) = x Discrete Mathematics State and prove the Chinese Remainder Theorem concerning the simultaneous answer of a pair of congruences to co-prime moduli and the individuality of that answer. [10 marks] as a MATCH, WRONG, or a match ELSEWHERE in the secret wordCareful:For example, for guess STUNS and secret BRATStne last char should match and the first oneshould not be an ELSEWHERE since there are not two S charactersin the secret word.”’ def update_state(game_state, next_guess):”’Update the game state given the next guess.Evaluates the guess against the secret word.Calls update on the keyboard state.Checks for a win or loss.Updates the letters seen.”’Image transcription textGet the average Hamming Distancesfor various key lengths # resulting theobtaining the key size. # T… Show moredef print_intro():print(“Welcome to cs7ndle”)print(“Guess the secret word!”)green = set_color(‘Green’, ‘green’)yellow = set_color(‘Yellow’, ‘yellow’)grey = set_color(‘Grey’, ‘grey’)print(f”{green} letters are in the correct spot.”)print(f”{yellow} letters are in the word, but in the wrong spot.”)print(f”{grey} letters are not in the word.”) Image transcription textpublic double getwidth() { return width;public void setWidth (double width) {this width = width; public … Show moredef init():game_state = { }game_state[‘stage’] = PLAYINGgame_state[‘secret_word’] = random.choice(cs7ndle_data.possible_answers)game_state[‘guess_list’] = [ ]game_state[‘score_list’] = [ ]game_state[‘seen_letters’] = set()game_state[‘keyboard_state’] = { c : NOT_GUESSED for c in ALPHABET }return game_state An early form of public key encryption worked as follows. A man or woman, R, wishing to acquire mystery messages, selected two huge primes, p and q additionally co-high to p – 1 and q – 1, and posted their product, n = p × q. Another individual, S, wishing to send a message m to R, encoded it as s = mn(mod n). Show how to calculate inverses a and b in order that ap = 1(mod q – 1) and bq = 1(mod p – 1Image transcription textimport json import requests #Uncomment this and add your own keyfor the pset: # KEY = # Call… Show more1. Define a relation F on S by means of (f, g) ? F ?? ?n ? N. F(n) 6 g(n). Show that F is a partial order. Define a relation G on S by using (f, g) ? G ?? X n?N f(n)10-n 6 X n?N g(n)10-n . Show that G is a complete order and that it contains F. [ four CST.98.1.5 SECTION D 9 Programming in Java A whole Java application may use the equal call for several different methods or variables. Java has some of features that allow the user to prevent such re-use of names from causing chaos. Describe those underneath the headings: (averting ambiguity when referring to the names of classes. [10 Programming in Java Write fragments of Java definitions, declarations or code to gain every of the following effects. between four strings. The initial three strings to call the boundary strategy areintended to hinder. These strings are everything unblocked when the fourth call is made.int barrierCount = 0;void synchronized boundary() tosses InterruptedException {barrierCount ++;in the event that (barrierCount < 4) {stand by();} else Image transcription textstorage display value variable nametype format label variable label a01 int%8 . 0g household numbe... Show morenotifyAll();Game Description:SaveMonkeys is a 2D game in a 10 x 10 lattice labyrinth map. Sadly, due to bushfire, the guide will be in fire after a period limit. The objective is to move the player to save all Monkeys in the guide and leave the guide at the leave entryway inside as far as possible.To improve on the plan, accept every development, or a stage, of the play equivalents to one time unit. The labyrinth map comprises e following things:Ø The game can be played in the text UI in which the collaboration is empowered by composing catchphrases, for example "u" for up and "d" for down.Ø In the GUI, a "Heap" button to stack a saved game.It is suggested that implment the 'motor' ogame first. Then, at that point, ought to keep in touch with some unit tests to make sure that the game rationale works accurately.Then can utilize JavaFX to add a graphical UI (GUI) to the game, which shows the 2D board and permits the client to play the game. Should utilize JavaFX, no other Java GUI libraries. Image transcription textdef main( ) : print_intro( ) game_state =init( ) update_display(game_state) while(game_state [ ' stage' ] ==... Show more a spotless partition between the back-end (game motor) and front-end (GUI) classes utilizing different Java bundle names, as portrayed previously;Begin by drawing a couple of paper portrays GUI intend to construct. Snap a picture of each e sixty four bits of x in the contrary order. Define a category that could be able to representing easy related lists, where each list-node includes a string. You ought to show the way to traverse such lists, build them and how to opposite a listing. In the case of the Image transcription textThe following diagram represents a fulldatabase for a university, this diagramwill help you build your qu... Show morelisting reversing code please provide versions, one in all which creates the reversed listing by means of converting guidelines inside the input list, and some other which leaves the authentic listing undamaged and allocates sparkling space for the reversed version. (c) Cause a line to appear in the window of an applet running from the lowest left of the window in the which the running gadget can use to enhance the efficiency of demand paging. Suppose the page desk for the currently executing manner is as follows. All values are decimal, and indexes are numbered from zero. Addresses are reminiscence byte addresses. Image transcription text2. Eastern and Western are countriesthat currently produce electronics andfood. Each country has 1... Show more The page offset is 10 bits. Virtual Page # Valid bit Reference bit Modify bit Page Frame # 0 1 1 zero four 1 1 1 1 7 2 0 zero 0 - three 1 zero zero 2 4 zero zero zero - 5 1 0 1 zero Describe precisely how, in general, a virtual deal with generated through the CPU is translated right into a bodily cope with, with the useful resource of a diagram. To what physical deal with (if any) would the subsequent digital addresses correspond? (a) 1052 (b) 2221 (c) 5499 [Consider the own family of 1-dimensional Gabor wavelets, parameterised for place x0, size a, and frequency µ0. Their functional shape is: f(x) = e -iµ0x e -(x-x0) 2 /a2 and their Fourier Transform is: F(µ) = e -ix0µ e -(µ-µ0) 2a 2 (a) Image transcription textMethods Modifiers virtual void set (int member_id) ; // Setsthe membership attribute to either zero or a five-digit integer.void setRef (int value); // Sets the *#libRef** attri... Show more}}Variable Description: Data Table:a01 mid b2_01 b2_02 b2_03 b2_04 b2_05 b2_06 b2_07 b2_08 b2_09 b2_10 b2_11 b2_12a b2_12b b2_13 b2_141 4 1 2004 1 2 2 1 1 1 8 2 5 9999 2 3 1 1998 66 9 6 1 1 1 13 2 1 9999 3 4 1 1999 66 3 0.4 2 2 1 2010 215 3 1 2001 1 2 2 1 1 1 10 2 5 9999 17 3 1 2000 1 2 4 1 1 1 12 2 7 9999 17 4 1 2005 1 2 2 1 1 1 7 2 1 9999 19 3 1 2001 1 2 1 1 1 7 10 2 7 9999 19 4 1 2007 1 2 0.5 1 2 1 2011 621 3 2 2 22 2 1 2009 66 1 1 1 1 5 2 2 5 9999 22 3 2 3 23 3 1 2003 1 1 0.5 2 2 1 2007 1023 4 1 2006 66 1 0.5 1 1 1 3 1 5 9999 36 3 1 2001 66 2 1 2 2 1 2007 636 4 1 2004 66 3 3 1 1 1 7 2 1 9999 36 5 1 2010 66 2 1 1 1 5 1 2 5 9999 37 3 1 2010 66 1 0.5 1 1 1 6 1 1 9999 38 4 1 2008 1 1 0.5 1 1 5 4 2 1 9999 40 3 1 2010 66 2 0.25 1 1 5 1 2 1 9999 41 4 1 2006 66 2 0.25 1 1 1 5 1 5 9999 41 5 1 2007 66 2 0.25 1 1 5 4 1 5 6 9999 48 5 1 2011 66 1 0.3 2 1 1 66 9 50 2 1 2010 66 1 0.25 1 1 5 1 2 1 9999 50 4 1 2011 66 1 0.25 2 1 1 66 2 1 9999 Image transcription text5. A class at BCU contains 43students. Each of them takescomputing or electronics ... Show moresignificance o unpredictable modifier. Make sense of whetheryou really want to utilize it with your new impleentation of getNext. [2 marks]technique is planned to implment an obstruction for synchronizationbetween four strings. The initial three strings to call the boundary strategy areintended to hinder. These strings are everything unblocked when the fourth call is made.int barrierCount = 0;void synchronized boundary() tosses InterruptedException {barrierCount ++;in the event that (barrierCount < 4) {stand by();} else {notifyAll(); def update_display(game_state):''' Reprints the display based on the current state '''guess_list = game_state['guess_list']score_list = game_state['score_list']secret_word = game_state['secret_word']print()for (guess, scores) in zip(guess_list, score_list):print_word(guess, [score_to_color(a) for a in scores])for i in range(MAX_GUESSES - len(guess_list)):print_word("_" * WORD_LENGTH, ['white'] * WORD_LENGTH )print()print_keyboard(game_state['keyboard_state'])print()if game_state['stage'] == WON:print('You guessed it!!')elif game_state['stage'] == LOST:print(f'You lose! The word was {secret_word}') def is_valid_guess(guess):''' Makes sure guess is an allowed one'''if len(guess) != WORD_LENGTH:print(f"The word must be {WORD_LENGTH} letters long!")return False# These lists are disjoint, so need to check both. valid_words is really# valid_words that are not possible answers.if guess not in cs7ndle_data.valid_words and guess not in cs7ndle_data.possible_answers:print(f"The word {guess} is not a valid word!")return Falsereturn TrueImage transcription text#!/usr/bin/python from blessings importTerminal import sys, getopt, socketfrom functions import * BU... Show more Make sense of how free factors (andespecially their update) can now be impleented. [4 marks](e) Java regularly holds neighborhood factors in stack edges and occasion factors onthe load. Consider a Java-like language with settled classes, and a potentialprogram structure:class C {int f(int x){ class D { int addx(int y) { return x+y; }void updtx(int y) { x = y; }}...b. Work out Pearson's relationship coefficient (?) between the factors Weight and Head in the babyanth.complete information outline utilizing the accompanying equation. Incorporate the relationship esteem you determined in a remark.?=S(????h??-????h?¯¯¯¯¯¯¯¯¯¯)(?????-????¯¯¯¯¯¯¯)??=1vs(????h??-????h?¯¯¯¯¯¯¯¯¯¯)2??=1vs(?????-????¯¯¯¯¯¯¯)2??=1In the above condition, ? is the quantity of infants or columns in the babyanth information outline ? = 1,2 Image transcription textDOG - 3 x 262 + 14 x 26 +6 = 2398CAT - 2 x 262 + 0 x 26 + 19 = 1371 ZZZ-+ 25 x 262 + 25 x 26 + 25... Show more (tm < 3) { ty--; tm += 12; } return 365 * ty + ty / 4 - ty / 100 + ty / 400 + (153 * tm - 457) / 5 + m_day - 306; } Compare the cost of on-premises and cloud options for over five years using AWS OR AZURE free calculator to determine savings and how you arrive at them and remember to adhere to the format provided in the graphs. Use graphical representation of your results to compare the cost of on-premises and cloud options. Analyze the economic implications and show savings and how you arrive at them. Give code "Submission Files" and provide the screenshot of the working project in QRS format Image transcription textCryptanalysis of the Repeated KeyXOR Cipher 1. In the home directory,where the xor_demopy sc... Show more// Publication readPublication(istream& istr);Publication getNextRec(ifstream& ifstr);int main() { sdds::sdds_test = true; Publication pd; revert2Orignal(); pd = readPublication(cin); if (!cin) { cin.clear(); cin.ignore(1000, 'n'); } else { cout << "This is not supposed to be printed!" << endl; }endl << "Seneca Weekly" << endl << "2022/13/17" << col_end << endl << "------------------------------" << endl; pd = readPublication(cin); if (!cin) { cin.clear();// Publication readPublication(istream& istr);Publication getNextRec(ifstream& ifstr);int main() { sdds::sdds_test = true; Publication pd; revert2Orignal(); pd = readPublication(cin); if (!cin) { cin.clear(); cin.ignore(1000, 'n'); } else { cout << "This is not supposed to be printed!" << endl; }endl << "Seneca Weekly" << endl << "2022/13/17" << col_end << endl << "------------------------------" << endl; pd = readPublication(cin); if (!cin) { cin.clear();Image transcription textpublic double getwidth() { return width;public void setWidth (double width) {this width = width; public ... Show more else { cout << "This is not supposed to be printed!" << endl; }/////////////////////////////////////////////////////////////////#include
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more