Modeling an Object as a Java Class

1. Model a real-life object as a Java class with at least one attribute and an instance method. Write a main method to create an instance of the class, assign a value to the attribute, call your method, and demonstrate that the value of the attribute changed and that the method successfully completed what it was supposed to do.

Be sure to create a program different from any of the programs already posted by your classmates or the examples in-class materials.

2. Reply to another student’s post. Modify the student’s class to add another attribute and a method that fits (is consistent with) the object the class is modeling, or suggest a different version of the code. Write the main method to demonstrate the correct functionality of the additions. As you reply to the other students, try to reply to a post that does not have a reply yet, and if not; try to reply to a post with a fewer number of replies.

Be sure to create a program different from any of the programs already posted by your classmates or the examples in the class materials.

As you answer these questions, use proper Java naming convention (Camel case), name the class, attribute, and method in a meaningful way to represent the business meaning, and add comments to the Java code as applicable.

The deliverables are the Java code and the documentation. The documentation is a single Microsoft Word document, or PDF containing the screenshot of the results obtained by running the code.

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

Introduction to Linux

Disregard the wix website information.

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

Module 1 Discussion

How can the practice of information security be described as both an art and a science? How does the view of security as a social science influence its practice?
Post your initial substantive response early and check back often to continue the discussion. Be sure to respond to at least two posts from other students or your instructor.
Respond to two or more of your classmate’s postings in any of the following ways:
Build on something your classmate said.
Explain why and how you see things differently.
Ask a probing or clarifying question.
Share an insight from having read your classmate’s posting.
Offer and support an opinion.
Expand on your classmate’s posting.

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

RStudio programming

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

RStudio programming

need to hold RStudio
ONLY do 1236
the Q1 need use 3 data files
Q2 need to use date file is
Fifa analysis is in the extra data
there r 3 data zips,
Final exam include questions
extra data and Handwriting are the extra data needed

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

it 401- manal

All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism). The Assignment must be submitted in (WORD format only). Use 2 to 4 References and write it in the last page by APA style. I want new words, No plagiarism “Please make it 0% percentage (we want put it the solution with the Cove page🙏)

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

C Programming Question

Will send all the files once the question is accepted
In this assignment you will design a widely used file compression technique called Huffamn Encoding using binary trees and linked list, which is used in JPEG compression as well as in MP3 audio compression. The algorithm was invented by David A. Huffman in 1952 when he was a Ph.D. student at MIT
Learning Goals :In this assignment you will work with
Binary trees
Linked list
BackgroundASCII Encoding :Many programming languages use ASCII (which stands for American Standard Code for Information Interchange) coding to represent characters. In ASCII coding, every character is encoded (represented) with the same number of bits (8-bits) per character. Since there are 256 different values that can be represented with 8-bits, there are potentially 256 different characters in the ASCII character set.
With an ASCII encoding (8 bits per character) the 13 character string “go go gophers” requires 104 bits. The string “go go gophers” would be written (coded numerically) as 103 111 32 103 111 32 103 111 112 104 101 114 115. This would be written as the following stream of bits (the spaces would not be written, just the 0’s and 1’s) 1100111 1101111 1100000 1100111 1101111 1000000 1100111 1101111 1110000 1101000 1100101 1110010 1110011Since there are only eight different characters in “go go gophers”, it’s possible to use only 3 bits to encode the different characters. By using three bits per character, the string “go go gophers” uses a total of 39 bits instead of 104 bits.
Now the string “go go gophers” would be encoded as 0 1 7 0 1 7 0 1 2 3 4 5 6 or, as bits: 000 001 111 000 001 111 000 001 010 011 100 101 110 111Huffman Encoding:However, even in this improved coding scheme, we used the same number of bits to represent each character, irrespective of how often a character appears in our string. Even more bits can be saved if we use fewer than three bits to encode characters like g, o, and space that occur frequently and more than three bits to encode characters like e, h, p, r, and s that occur less frequently in “go go gophers”. This is the basic idea behind Huffman coding: to use fewer bits for characters that occur more frequently.
To start, we have to count the occurrence of every character in the string/data that we want to encode. Store occurrence of each character and sort them by their frequency. Begin with a forest of trees. All trees initially consist of one node, with the weight of the tree equal to the weight of the character in the node. Characters that occur most frequently have the highest weights. Characters that occur least frequently have the smallest weights.
We’ll use the string go go gophers as an example. Initially we have the forest shown below. The nodes are shown with a weight/count that represents the number of times the node’s character occurs. We will use sorted linked list whose nodes will point to the respective root tree node. Thus we are representing order of the tree nodes by putting them in an ordered linked list. Each node in the list points to the indivisual tree node. Node pointing to tree node ‘e’ is the head of the list.

We maintain ordered list of items arranged according to their weights. If the two nodes of the list have same weight, a leaf node(associated with an ASCII character) is ordered first. If both nodes are leaf nodes, they are ordered according to their ASCII coding. If both nodes are non-leaf nodes, they are ordered according to the creation times of the nodes.
We always pick the first two items in the list, here, nodes for characters ‘e’ and ‘h’. We create a new tree whose root is weighted by the sum of the weights chosen. Although the newly created node has the same weight as Space, it is ordered after Space in the list because Space is an ASCII character.

Choosing the first two (minimal) nodes in the list yields another tree with weight 2 as shown below. There are now six trees in the forest of trees that will eventually build an encoding tree.

Again we must choose the first two (minimal) nodes in the list. The lowest weight is the ‘e’-node/tree with weight equal to 1. There are three trees with weight 2; the one chosen corresponds to an ASCII character because of the way we order the nodes in the list. The new tree has a weight of 3, which will be placed last in the linked list according to our ordering strategy.

Now there are two trees with weight equal to 2. These are joined into a new tree whose weight is 4. There are four trees left, one whose weight is 4 and three with a weight of 3.

The first two minimal (weight 3) trees in the list are joined into a tree whose weight is 6. There are three trees left.

The minimal trees have weights of 3 and 4; these are joined into a tree with weight 7.

Finally, the last two trees are joined into a final tree whose weight is 13, the sum of the two weights 6 and 7. This tree is the tree we used to illustrate Huffman coding above.

To build the code for every character, we start from the root node and travel to every leaf node corresoinding to the character. We denote every left branch as ‘0’ and every right branch as ‘1’. (Note that ‘0’ and ‘1’ are characters and not bits). We obtain the code for every character according as shown in the table mentioned below :
| Character | Binary code |
| ——— | ———- |
| ‘ ‘ | 101 |
| ‘e’ | 1100 |
| ‘g’ | 00 |
| ‘h’ | 1101 |
| ‘o’ | 01 |
| ‘p’ | 1110 |
| ‘r’ | 1111 |
| ‘s’ | 100 |
Header InformationTo compress the string/file, we read one character at a time and write the sequence of bits that encodes each character. We must also store some initial information in the compressed file that will be used by the uncompression/unhuffing program. Basically we must store the tree used to compress the original file. This tree is used by the uncompression program. We can store the tree at the beginning of the file. We will do a pre-order traversal of the binary tree generated in the previous step, writing each node visited. We must differentiate leaf nodes from internal/non-leaf nodes. One way to do this is write a single bit for each node, say 1 for leaf and 0 for non-leaf. For leaf nodes, you will also need to write the ASCII character stored. For non-leaf nodes there’s no information that needs to be written, just the bit that indicates there’s an internal node. There should also be a 0 bit at the end to signify end of the tree information.
Encoding tree for string go go gophers can be represented as following using pre-order traversal :
001g1o001s1 001e1h01p1r0
Here ASCII character 1 is written before each leaf node followed by character stored at the leaf node, character 0 is written for a non leaf node and 0 is added at the end to signify end of the tree.
We can further reduce total number of bits if we use bits 1 and 0 in place of ASCII characters ‘1’ and ‘0’ to represent leaf and non leaf nodes and the end of the tree. Note that ASCII characters stored at each lead are still written using 8 bits.
In particular, it is not possible to write just one single bit to a file, minimum unit of memory you can access in C is a byte. We should accumulate 8 bits in a buffer and then write it to the file. If we are writing the above data for tree, first three bits in the first byte would be 001 followed by 5 most significant bits of ASCII value of character ‘g’. Remaining 3 bits of character ‘g’ would go as first three most significant bits of the second byte.
If the binary representation of ASCII value of character ‘g’ is 01100111 and ‘o’ is 01101111, first two bytes would be
00101100 11110110
(note that space is provided between two bytes only for clarity; in the file itself all of those bits would be consecutive.)
The last byte may not contain 8 meaningful bits, you should pad remaining it with 0 bits in remaining places.
You can look at the function given here which accumulates bits and writes a byte to a file.
What you have to do?We have provided the starter code that creates an array asciiCount of size ASCII_SIZE which stores the count of each character at the index of that character’s ASCII value. Value of ASCII_SIZE is 256, defined in huffman.h file.
e.g if input file contains character ‘a’ three times and ASCII value of ‘a’ is 97, asciiCount[97] will store value 3.
To create and maintain the sorted list of trees according to their weight, you should implement a linked list, with each node containing the count and and an address that points to the root of binary tree.i You should only create tree nodes for characters having non zero count in array asciiCount. We have also given you sample header file which has structure definitions that you will need to implement binary tree and linked list. You have the flexibility, however to design or modify all the files.
You will have to use bit-wise operations for generating the header information. You should use “<>” , “|” and “

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

Programming Question

I need help with Exam 3 multiple questions ( I send you questions and you reply with answer)
TopicsDictionaries, Chapter 11: pages 328-331, 334-335Classes, chapter 14. Pages 374-382, 388, , 392, 394, 396. Ignore UML diagrams. Ignore “properties” as per page 398.Class definition, private attributes, methods. Object instantiation, explicit constructor (__init__ method): study program Bank2 (canvas files folder nov16-18-OOP). Use of decorator (Program Bank1)Composition of classes: study program Bank4Concepts of information hiding, data encapsulation, interface, implementation , pages 392, 394, 396Subclasses and inheritance, chapter 15: pages 414, 416, 418, 420Study program Bank5 (in canvas files folder nov23-OOP): definition of subclass, superclass, constructor of a subclass, method overriding, inheritance, polymorphism, isinstanceGraphical User Interface, Chapter 18.Understand the Python features involved in GUI programmingRoot (ignore root.mainloop), page 513Study Frame, Button, p.515Ignore padding argument: frame = ttk.Frame(root, padding=”10 10 10 10″)Ignore: frame.pack(fill = tk.BOTH, expand =True)Study Page 517: callback functions, event handlingStudy Page 523: subclass Investment of class Frame: its constructor, callback functionIgnore the method ”grid”, the “for child” loop

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

Dining Philosophers Problem (I wrote the code)

The file of the assignment details is attached. I wrote the full code, but I’m having segmentation fault I couldn’t fix (I think it’s from q.h file for the queue), and I need your help to fix it.
The code is supposed to use the files: threads.h, tcb.h, sem.h, q.h, and proj-5.c (which has the main). I attached all the files. There’s also file called “tests”, that has some test cases and the expected output.
Thank you!

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer

complating 2 program design

im gonna attach all 2 programs but because i cantr attach a zipfile now ill put it in word then ill send a zip file with all the c filesfor the book requests project:
in the project there is a add_to function that add the new book to the end of the list, i want you to change that so it is:
A daycare center would like to maintain a list of book requests from the teachers for their classroom libraries. Each book was stored with the title, author’s first name, last name, price, and classroom. Modify add_to_end function in book.c : a. Instead of adding to the end of the linked list, a book is added to an ordered linked list. A book is added to an ordered linked list by author’s last name and then by author’s first name. The list remains ordered after the new request is added. If two books have the same author, the order doesn’t matter. For example, a book by Ashley Spires should be before a book by Whee Winn in the list; a book by Elizabeth Spires should be after a book by Ashely Spires in the list.

For the second project( cars2.c):
Modify it so that it uses quick sort (qsort)to sorts the cars by city mpg. Name your program car2.c. Instead of using the sorting function i wrote in the program, use the quick sort library function and implement the comparison function.

This question has been answered by our writers. You can buy the answer below or order your 0% plagiarized answer