Share
Explore BrainMass

Files

What is the correct subnet mask for the network?

Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network? a. 0.0.0.0 b. 255.255.0.0 c. 255.255

Modify the Inventory Program in Java

- Modify the Inventory Program to include an Add button, a Delete button, and a Modify button on the GUI. These buttons should allow the user to perform the corresponding actions on the item name, the number of units in stock, and the price of each unit. An item added to the inventory should have an item number one more than the

Price Discrimination

For your convenience, I have attached a formatted MS Word file containing information on the subject of price discrimination, and the conditions under which price discrimination becomes unlawful. I have also also added reference sources to this posting which might prove useful in helping to increase your understanding of the fe

This posting contains a formatted MS Word file, which contains information on a buyer's perception of product and pricing, including value consciousness, price consciousness, and prestige sensitivity.

Buyer's perceptions of a product and its price are an important influence on pricing. Value consciousness, price consciousness, and prestige sensitivity are three ways of describing these perceptions. Discuss how these characteristics influence the buying decision for one of the following products: a new house, an airline ticket

Forensics - P2P network crimes

Do some research on peer-to-peer networks (e.g., you may search "crime activity peer to peer networks", "crime activity P2P", "pornography P2P", "child pornography peer to peer network", etc.). What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a repor

ERD design

Please assist me on designing the ERD from the file attached. Any help will be very much appreciated.

Domain/Key Normal Form

Need help transforming 2 relations into Domain/Key Normal Form. See attached file for full problem description.

Complete New SQL Database

To be used with SQL Server 2005 Express Create a database and name it ITD_GPA. Populate your database with appropriate test data. - Include all of the scripts in a single file called ITD_GPA.SQL - Create at least three related tables in the database. - Create at least two stored procedures and a script to use each of t

Java: Palindrome Using BufferedReader

Write a program that reads in strings of characters and determines if each string is a palindrome. Each string appears on a separate input line. Echo-print each string, followed by " Is a palindrome" if the string is a palindrome or "Is not a palindrome" if the stringis not a palindrome. For example, given the input string Ab

Create Views for ITD640_A database

Please help with the following problem. Using the sample database, write the scripts in a file to create the following views. Include a USES clause at the top of the script file to use the following database. Also include code that checks if the view already exists. If it does, it should be dropped and recreated. 1. Creat

Writing a Query in MS Access

Please see attached file and using LAST_NAME and FIRST NAME in Table_1 to find the matching order_number and pp_number in Table_2 and Table_3. The query should write in such as (sql) SELECT what columns FROM WHAT tables WHERE something or INNER JOIN. The query should run to get the result. When you finish please attach the mdb f

Programming and Coding JS, HTML and MDB Files

Attached are feedback.html, feedbvalidate.js, and eisdb.mdb. Improve the form so that when submitted the fields are checked for input but only complete validation against the email address field is required. Currently an error message arise regardless of what the user does - this should not happen. The user should be able to

Shell Scripting in Knoppix

I am trying to create a script in Knoppix 4.02 (KDE or Kwrite or Kate) based on the following requirements below. I want to create a prompt that will: · Request user specific name · I want Linux to compare it to an established name(Esther) · I want the Linux to find the user specified name or Es

Tax Calculation Program for multiple Stores

I need two separate codes for each request. Thanks. #include <stdio.h> /*Using define macros for assigning tax to different stores */ #define DelMar 7.25 #define Encinitas 7.5 #define LaJolla 7.75 /* Input: ? Del Mar - 7.25% ? Encinitas - 7.5% ? La Jolla - 7.75% Output: The sales tax amount for each store

Website Design

I need to insure that I have the basic skills necessary for designing a web page. Using all of the resources at my disposal, I need to determine what the most effective method for uploading a group of files is. After learning how to utilize the method I've chosen, I have to give detailed steps to use this method.

Effective Web Design

I just need suggestions for this scenario. I need to insure that I have the basic skills necessary for designing a web page. Using all of the resources at my disposal, I need to determine what the most effective method for uploading a group of files is. After learning how to utilize the method I've chosen, I have to give deta

Designing a Database: Which One is More Feasible?

As we start designing a database for implementation should we use the latest and greatest technology? Does the user need a flat-file or object-oriented database? Give an example of each and how it would apply to the basic database designer goo roo.

TCP Connections

Supposed two TCP connections are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link). The transmissions of the files start at the same time. What is the transmission rate that TCP would like to give to each of the connections?

An applet file that prompts the user for an ID number and an age.

I need to write an applet file that prompts the user for an ID number and an age. Create an Exception class and throw an Exception of that class if the ID is not in the range of valid ID numbers (zero through 899), or if the age is not in the range of valid ages (0 through 89). Catch the Exception and then display an appropriate

Automata and Computability Recall

Recall that we may consider circuits that output strings over {0,1} by designating several output gates. Let addn: {0,1}2n&#61614;{0,1}n+1 take the sum of two n bit binary integers and produce the n + 1 bit result. Show that we can compute the addn function with 0(n) size circuits. See attached file for full problem descrip

Automata and Computability

An undirected graph is bipartite if its nodes may divided into two sets so that all edges go from a node in one set to a node in the other set. Show that a graph is bipartite if and only if it doesn't contain a cycle that has an odd number of nodes. See attached file for full problem description.

P2P file-sharing services

List five companies that provide P2P file-sharing services. For each company, what kind of files (that is, content) do they handle?

Some Important Computer Programming Questions

1) A(n) ______ is a short on-screen note associated with the object to which a user is pointing A) maximize button(B) dialog box (C) icon (D) Tooltip 2) In windox XP, the ____ is used to create a new user change or remove and existing user, and change user information. A) Desk top (B) control panel (C) my document window (

Single Source Longest-Path Problem

Single Source Longest-Path Problem ? A longest-path problem can be transformed into a shortest path problem by changing the sign of all weights ? Alternatively, the Bellman-Ford algorithm can be transformed into a "longest path" algorithm by changing the initialization and relaxation procedures Initialization step of

Hierarchical Decomposition

What are some advantages of hierarchical decomposition of programs into modules. See attached file for full problem description.

Attack of the Mobile Viruses

Attack of the Mobile Virusues The spread of the mobile viruses has been slow because the mobile devices lack a prevalent OS like PCs and Windows. As mobile communications become more prevalent, so does the onslaught of viruses. What are the ways a device can become infected and how to prevent it?