2-3-4 tree code with insertion and deletion in JAVA

1. Task Trace the operation of a 2-3-4 Tree (The instructor’s correct way) given the following operations: insert(47) insert(43) insert(23) insert(90) insert(95) insert(27) insert(67) insert(80) insert(88) insert(29) insert(59) insert(24) insert(69) insert(44) insert(71) insert(61) insert(99) insert(42) insert(38) Next, Delete the following items sequentially. delete(27) delete(38) delete(44) delete(95) delete(88) delete(59) Starting with an empty tree, perform the … Read more

lab03

You need to submit a detailed lab report, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply attaching code without any explanation will not receive credits.

3lab

Please complete the Lab and follow the detailed below.  You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply … Read more

Lab8

 Weekly Learning and Reflection  In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all … Read more

Lab 7

 Write this reflection for the lab:     In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the … Read more

Proj 1

Please follow the project Action Item and Provide   Take a screenshot of the terminal window showing the content of the passwd file.  Weekly Learning and Reflection  In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this project. Summarize what you … Read more

Read the chapter:

Provide an overview of the article:  ans:  Describe LSB Steganography: ans: It is often difficult and time consuming to detect steganography. What are some clues for a forensic analyst to discover the presence of steganography? (might need some additional research / Google searchers) ans: Visit https://www.spammimic.com/ / research the company Describe what this website does:  … Read more

LAB 6

 Write this reflection for the lab:  In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers … Read more

toastmasterstool box using python or java.

   Toastmaster Toolbox You are tasked with designing, documenting, and implementing a Toastmasters Toolbox  system. This system is intended to aid a presenter during a Toastmasters speech. The core features that are required of this system are described below. You are responsible for the  details of the system.  Core Features:  Facial Expression Analysis • The … Read more

java splay tree program

 In addition to requiring you to get splay trees to work, I also want you to learn some basic things about Java Strings, so you will build trees of Strings instead of int’s. For example, you will need to use compareTo (or compareToIgnoreCase – we will need to discuss which) to compare two Strings. Add … Read more