Homework Help for Computer Science

2,808 results

Today, computing is an integral and a very visible aspect of our everyday life. Learn the essentials of the design and development of computing sofware and hardware

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
royalfaizal4 asked for the first time
Avatar image
1morris asked for the first time
in Computer ScienceΒ·
29 Dec 2023

n less than or equal to 5 print in the printers not weird okay if n is even and in the inclusive range of 6 to 20 print weird os alif n greater than or equal to 6 and n less than or equal to 20 arena weird okay if n is even and greater than 20 are now is a leaf in greater than 20 print not we are having oh in the program okay okay in the input again foreign coding practice videos music so people in the diagram in the diagram in the diagram okay in the ground level starting point is foreign first first start learning in the box is music foreign apple colon print i in the syntax within our soul driver first in the line of programming here thank you a p p l e one two three four five foreign laughter music foreign music foreign foreign for i

Β 

plus i is foreign nah yes enter number one enter number two enter number three printers foreign foreign music foreign foreign 30 40 50 list cooler 10 20 30 40 50 storage okay first a equal to our list syria foreign range zero comma one comma two comma 3 comma four either range foreign foreign plus str i plus 1 okay enter num foreign nah is tri integer stringer cast casting okay in the first line enter num zero of i equal to first apple subscribe zero plus one upper enter numb one i equal to one now first i equal to zero equal to one now enter num internal i plus one plus one two one plus one two obviously enter num two options foreign music foreign foreign print yeah foreign foreign fifty okay print some sorry some foreign 20 30 40 50. okay foreign equal to 20 okay sum equal to sum plus some more updated value on the 10 upper 10 plus 20. sum equal to 30. i equal to 30. i equal to 30. sum equal to sum plus i someone updated value 30 plus 30 some more value 60. 60 plus 40. 50 plus 50. 50 is only foreign music foreign integer okay input number five options just just easy now foreign foreign i pray foreign foreign foreign foreign we 'll give up nested for loop programmable foreign foreign okay for j in range variables variable okay foreign foreign music foreign foreign foreign foreign foreign foreign enter for j in range 1 comma 3 print j comma apple even is other i equal to one another j equal to 1 comma two are equal to one another j equal to one line okay um foreign print jain naporta subscribe now one two three characters day comma um day one day today day one day to day three week two day one day two day three foreign foreign thank you week one day one day to day three week s no week one day on day to day three week two day one day today foreign foreign foreign foreign foreign foreign foreign music m equal to ifri double quotation in the double quotations foreign syria foreign in range one comma five times foreign for j in range foreign foreign okay now um print okay one comma i plus 1. either result foreign foreign in the line seriously foreign foreign n equal to if um foreign two two plus one and three upper range print j comma end equal to double quotations foreign foreign syria number foreign again again next video foreign foreign usually used when the number of iteration is foreign foreign while i equal to equal to 0. i equal to equal to zero iode value on a zero zero equal to equal to 0. foreign again um foreign foreign foreign foreign foreign foreign foreign foreign foreign something drone border foreign foreign print a number from one to five using while loop okay one two five ounces while i less than 5 print i oil i less than 5 print line the program in the programs again first i equal to oil cooler one less than 5. true of alsa 1 less than 5 true oppo print i upper valley yeah while okay um now foreign print ed i equal to i plus one i equal to i plus 1 upon already one one plus one is while i less than five oil two less than five true of also print is equal to i plus 1 are your value on a already two upper two plus one another value 3 0 character hippo i equal to i equal to 3. okay 3 less than 5r true of alpha is foreign while by your value five i less than 500 per 5 less than 5 1 fully power in the statements foreign music foreign foreign print i comma end equal to every double uh string photograph s in the program explains foreign 10 plus 10 value 10 and the 10 order value 20 pi equal to 20. 20 less than 200. true of also either 20 less than 200 true um 20 plus 10. foreign equal to sorry i equal to 200 plus tendency of i equal to 210 is less than 200 are 210 less than or equal to 200 i bring fully conditions either true or false 210 is write a program to print first 10 natural numbers in reverse order reverse order numbers i equal to 10 oil i equal to equal to zero okay while i greater than zero zero average print i equal to i minus 1. ten nine eight seven six five four three two one and print diagram foreign foreign i greater than 0 9 greater than 0 over true of also 9 greater than 0. again write a program to find the factorial of a number or a number or a factorials ebola five into four into three into two into one is five into four into three into one reverse is two into one two it is not two word factorial three factorial three into two into one equal to six three over factorial for six okay is foreign fact star fact into i i equal to i minus 1. foreign music foreign music 1 into iod value in a three one into three factors current value foreign foreign into i fact into i factor the current value three three into if three into two another factor the current value six okay factor the current value six okay i equal to i equal to i minus one is foreign zero characters while other while zero greater than zero in the condition s foreign started python line the collections open file new file save us document python folder collection examples duplicate members okay ipo list print type type of yeah foreign up and lastly foreign foreign foreign hippo specifications insert in the earth foreign allowed it is one two three four five six values okay position either index position zero zero zero one two three four five either index position if zero one two three four five okay zero okay friend okay not print a dot insert 0 comma eleven position zero zero under positions foreign printers foreign a dot pop up foreign foreign foreign foreign foreign foreign b is growing a b equal to b 11 23. a dot a dot extend b reported in either print is foreign music foreign foreign music foreign foreign foreign do not allow duplicate duplicate values will be removed duplicated in the curly braces foreign a of 0 equal to 12. set object does not support item assignments a dot add the main number is foreign music foreign foreign foreign okay okay in the order foreign music okay dictionary dictionary do not allow duplicate duplicate values will be will overwrite existing value first dictionary a equal to bracket open money name colon emc either not dictionary key s the value is a key value print yeah foreign one location location music for the codec okay now okay okay no no no no sorry sorry music foreign students in buddha subscribe students and the list type foreign okay well values and the values in the dictionary modification af equal to 100. run is foreign foreign music pop anyway foreign syria is not defined yeah okay output okay python order for collections for collection data types list double set dictionary python functions in the python functions foreign foreign again new file in the files in our document line or the python folder functions e function is def painter i 've been selling our function create content okay colon enter print ing okay in the in the syntax functions music um foreign foreign foreign foreign foreign input and then b equal to in put okay bro print a plus b prime in the program is foreign music foreign foreign foreign foreign program depending the first line learning foreign foreign addiction entry entropy 30. music in the first functions okay in the functions foreign foreign foreign foreign community functions and the message foreign print message output in a message foreign foreign foreign foreign message colon comma msg important is msg equal to foreign foreign foreign get the integer number from user and pass it to the function call to find even r r let the function print whether the number is even or odd is foreign enter if number mod 2 equal to equal to 0 sprint even number order number two or divided even else print i 'll sprint or okay wow okay functions foreign lyric if num or two equal to equal to 0. 10 yeah print and get in our number password foreign foreign foreign a equal to 10. ipo indirectly a equal to 10 and fully program is foreign ipana the number is if b mod 2 equal to equal to 0 print foreign else print odd put another program is find even a rodents music foreign enter a column foreign in the program s get input for a and b and pass it to the function called print range let the function print numbers from a to b now yes foreign print i originally folder in the functional print foreign okay well in the 111 default entrepreneur every planet r1 comma r24 right parameter foreign foreign foreign foreign input input enter a foreign input enter b ippo in the printed um foreign hippo even in the function are called in the functions foreign foreign foreign file save us document python folder return examples foreign painter okay print i am painder painter prime program foreign hippo return of windows statement s return i am painter is in the paint report foreign apple a equal to ten minutes reporting here for variable foreign valuable s i am a painter msg equal to i am painter other than that is value of a value of n function create return tendency a equal to value of a insulin the functional hypo call contract value print directly yeah foreign foreign people okay set yes username emc as password one to three okay first username password yes username equal to emc s password equal to one two three username input added the password equal to password equal to input okay create a function called validate validated and the validate functions depth validate function open moneygram if s underscore username username username equal to equal to union and s underscore password equal to password okay print correct else print wrong okay okay enter value for username enter value for password okay okay username username password one two three is username equal to equal to your name and s underscore password equal to equal to password print correct okay nothing function yeah emc one two three characters okay foreign directly functions should return true or false okay return true return true render foreign false equal to validate print a if um foreign equal to password is foreign everybody function ah okay def add irregular print value number

Avatar image
deepusureshnufc asked for the first time
Avatar image
karthikrajan039 asked for the first time
Avatar image
moorthytemptemp asked for the first time

Assessment Brief- Assessment 3- Group Project Unit Code/Description ICT102 – Networking Course/Subject Bachelor of Information Technology Semester September Intake - 2023 Unit Learning Outcomes Addressed 2, 4 Assessment Objective The objective of this assessment is to evaluate student’s ability to design and configure a network using a network simulator for a given scenario and configuring routers, switches, firewalls, and other network components based on specific requirements. Assessment Title/Type Assessment 3: Group Project Due Date Week 11, Friday, 5.00 PM Weighting 40% Instructions to Students See the assessment description in below Format/Structure MS Word or PDF for the report Word/Page limit Length of 500 words for the report, font Calibri 12 Referencing Style American Psychological Association (APA) Submission Guidelines β€’ All work must be submitted on Moodle by the due date β€’ Only one member of each group needs to submit β€’ A PDF or Ms Word file must be submitted which includes all required steps, discussion and evidence of completion of tasks Plagiarism and Academic Integrity At CIHE, we take academic integrity seriously and expect all students to maintain the highest standards of honesty and ethical behaviour in their academic work. As a student, it is your responsibility to ensure that all your academic endeavors are conducted with integrity and in accordance with the principles of honesty, fairness, and respect for intellectual property. Please refer to β€œCIHE Student Academic Integrity and Honesty Policy” in the Moodle for details. Late Submission Policy An assessment item submitted after the assessment due date, without an approved extension or without approved mitigating circumstances, will be penalised. The standard penalty is the reduction of the mark allocated to the assessment item by 10% of the total mark applicable for the assessment item, for each day or part day that the item is late. Assessment items submitted more than ten days after the assessment due date are awarded zero marks. ASSESSMENT DESCRIPTION: This assignment is group-based. Each group will have 3-4 students. You can continue with the same group as for the previous assessment. In this assignment you will be designing and configuring a network for a university that has a Class B IP address of 148.23.0.0/16. There are two faculties and each faculty requires two separate subnets: one for staff and another for students. The faculty names and the number of hosts in each subnet are given below: β€’ Faculty of Arts: 400 students and 200 staff members β€’ Faculty of IT: 600 students and 300 staff members Part 0 Declare team members contributions in the table below: Team Member Contribution (%) Responsibilities for the Project Part 1 Divide the allocated address space between department subnets as per requirements. Summarize the IP subnets and masks in a table like this: Faculty Network Address Host IP Address Range Subnet Mask Arts - Students Arts - Staff IT – Students IT - Staff Part 2 Construct the following network topology in GNS3 or Packet Tracer simulator. Ensure that all the hostnames and network addresses are well labelled. Fig. 1. Network design Part 3 Configure the router using the assigned hostnames and IP address. Part 4 Setup Virtual PC (VPC) in each of the four subnets as shown above. The virtual PC’s provide lightweight PC environment to execute tools such as ping, and trace route. For each faculty create two VPCs for students and two VPCs for staff. Each VPC should be able to ping the other VPC in the same subnet. Part 5 Configure the access control list (ACL) on Router01 such that any traffic from Students’ subnets are blocked from entering the staff subnet. Traffic to and from other subnets should pass through. Pinging staff VPCs (in both faculties) from students’ VPCs should fail. In other words, student in each faculty should not be able to ping any staff computer in any faculty. Students can only ping students VPCs in any faculty. Staff members can ping any VPC (staff and students in any faculty). Part 6 Configure DHCP services on Router01 such that all VPCs can get IP addresses dynamically assigned. Part 7 Use the following checklist to ensure you network is configured correctly. Test βœ” IT student VPC cannot ping IT staff VPC IT student VPC cannot ping Arts staff VPC IT student VPC can ping Arts VPC Arts student VPC can ping IT student VPC IT staff VPC can ping Arts staff VPC Arts staff VPC can ping IT staff VPC IT staff VPC can ping IT student VPC IT staff VPC can ping Arts student VPC Arts staff VPC can ping IT student VPC Arts staff VPC can ping Arts student VPC For each of your routers make sure to save your running configuration using the command write mem For the VPCs use the save filename command to save the configurations to a file. Finally save the GNS3 (or Packet Tracer) project, i.e., the topology together with the startup configs. Zip the GNS3 (or Packet Tracer) project folder and submit it on Moodle with your report. Make sure your submission is complete and has all the necessary files to run the simulation. ASSESSMENT SUBMISSION: The assignment must be submitted online in Moodle. The submission must include a Zip file for the GNS3 (or Packet Tracer) project and an MS Word or PDF file for the report. Only one member of each team must submit the files. The name of all team members and their contribution level (percentage) must be shown on the first page of the report (use the table provided in Part 0). The report must include annotated screenshots as evidence for completion of each part. You need to have a separate section for each part and briefly explain what you did for that part, and then insert screenshots for the steps taken to complete that part. Each screenshot must have a short annotation (one line or two). In all screenshots, the date and time of the computer must be clearly shown in the corner (look at the sample below). Make sure the date and time of your computer is correct. In order to receive a mark for your submission, it is mandatory to present a demo of your project to your lecturer during week 12. Failure to do so will result in a zero mark for your submission. The lecturer has the discretion to adjust team contributions based on individual contributions to the demo. It is important to demonstrate your active participation and contribution to the project during the demo to ensure fair grading and assessment. Note: If you miss either the report or the GNS3 (or Packet Tracer) file, you won’t receive any mark. Marking Rubric Criteria Poor (025%) Fair (25-50%) Good (50-75%) Excellent (75-100%) Part 1 - Subnetting (6 marks) Allocation of IP addresses is wrong and need major revision The allocated address space is divided between faculty subnets as per requirements but there are some errors The IP subnets are summarized in the table The allocated address space is divided between faculty subnets as per requirements but there are minor errors The IP subnets are summarized in the table The allocated address space is divided between faculty subnets as per requirements The IP subnets are summarized in the table Part 2 - Network Diagram (4 marks) Network diagram is wrong and needs significant improvement The network topology is constructed in GNS3 or Packet Tracer simulator Poor labelling for the hostnames and network addresses The network topology is constructed in GNS3 or Packet Tracer simulator Labelling of the hostnames and network addresses needs improvement The network topology is constructed in GNS3 or Packet Tracer simulator All the hostnames and network addresses are well labelled Part 3 – Router Configuration (6 marks) The router configuration needs major improvements to address the requirements The router configuration needs minor improvements to address the requirements Few evidence is included for router configuration The router is correctly configured Some evidence is included to show the configuration of the router The router is correctly configured Enough evidence is included to show the configuration of the router Part 4 – Setting up VPCs (8 marks) Configuration of virtual PCs needs significant improvements Some virtual PCs are correctly configured and tested using ping Few evidence is included to show the configuration of PCs and successful pings Most of virtual PCs are correctly configured and tested using ping Some evidence is included to show the configuration of PCs and successful pings All virtual PCs are correctly configured and tested using ping Enough evidence is included to show the configuration of PCs and successful pings Part 5 - Configuring the Access Control List Configuration of the access control list (ACL) needs major improvement Configuration of the access control list (ACL) needs minor improvement The access control list (ACL) is configured to manage traffic according to requirements The access control list (ACL) is appropriately configured to manage traffic according to requirements (6 marks) Few screenshots are added to show successful and unsuccessful pings Some screenshots are added to show successful and unsuccessful pings Enough screenshots are added to show successful and unsuccessful pings Part 6 - DHCP (6 marks) DHCP configuration needs major improvements DHCP configuration needs minor improvements Some screenshots have been added to show IP address allocation DHCP is appropriately configured to automatically allocate IP addresses to VPCs Some screenshots have been added to show IP address allocation DHCP is appropriately configured to automatically allocate IP addresses to VPCs Enough screenshots have been added to show IP address allocation Part 7 - Checklist (2 marks) 0-2 entries of the checklist are completed and match with screenshots 3-5 entries of the checklist are completed and match with screenshots 6-8 entries of the checklist are completed and match with screenshots All entries of the checklist are completed and match with screenshots Language (2 marks) The report is badly structured and written, containing numerous grammatical and spelling errors. The language is often confusing and inappropriate for the intended audience. The report structure and writing need improvements. It contains some grammatical and spelling errors. The language is sometimes imprecise or inappropriate for the intended audience. The report is adequately structured, clearly written, and mostly free of grammatical and spelling errors. The language is appropriate for the intended audience. The report is well-structured, clearly written, and free of grammatical and spelling errors. The language is sophisticated, precise, and appropriate for the intended audience.

Avatar image
priyaarumugam796 asked for the first time
Avatar image
fadxiyaxuseen09 asked for the first time
Avatar image
jodh1503 asked for the first time
Avatar image
muqsith257 asked for the first time
in Computer ScienceΒ·
23 Nov 2023
P_01: Introduction to Python Programming | Python for Beginners Jenny's Lectures CS IT Introduction to Python Programming Language

Python is currently the most popular programming language and also the fastest growing one. The concept of Python was introduced in 1989 and it is being used widely in machine learning, data science, and artificial intelligence.

Main Areas of Python
  • Machine learning
  • Data science
  • Artificial intelligence

Python is used by big companies like Facebook and Twitter for managing and processing large amounts of data.

The language is easy to learn and has a wide range of applications. It supports multiple paradigms including object-oriented, procedural, and functional programming.

Python has been used in almost every area of programming, including by big companies like Google and YouTube.

The language is open source and has a huge community with many inbuilt packages, modules, and functions that can be used in programs without having to write them from scratch.

Python has many discussion forums where users can post queries and get answers. Frameworks like Django and Flask are available for web development.

Career Opportunities in Python

Python offers numerous career opportunities with an average salary ranging from 8 to 12 per nm. It's no wonder why this language is so popular. In the upcoming video, we will first explore the history of Python. As the saying goes, "know your enemy before going to battle." We will be using the latest version of Python 3.x, as Python 2.x is now obsolete and no longer supported since January 2020. So, let's focus on the latest version and explore the many career opportunities that Python has to offer.

Features and Application Areas of Python

If you areΒ 

Avatar image
ccheran113 asked for the first time

Start filling in the gaps now
Log in