Consider that a school “ABC” hired you as a programmer to maintain the record of its Students and Teachers. You need to develop a system in C++ to enter the data and show it as and when required. Keeping in the view above scenario, you are required to write a C++ program that can display the information of any specific Teacher or the Student. It will contain following three classes: 1. Person 2. Teacher 3. Student 4. where a Person should be the base class and Teacher and Student should be its derived classes. You are required to use the concept of Polymorphism to generate the sample output. Consider following class table for above scenario. Class Data Members Member Functions Person • Name • Age • Gender • Address • Phone • Default Constructor • Setter and getter functions for all the data member. • A function to save information of a person • A function to display information of a person Teacher • Qualification • Salary • Default Constructor • Setter and getter functions for all the data members • A function to save information of a Teacher • A function to display information of a Teacher. Student • Previous Education • Obtained marks • Total Marks • Default Constructor • Setter and getter functions for all the data members • A function to save information of a Student. • A function to display information of a Student. Solution Guidelines: Create three classes: Person as a base class and Teacher and Student as derived classes. You have to create the default constructor for each class. You have to create the setter and getter functions for each attribute of Person class. You have to create Save_Information function for each class as mentioned in the table. You have to create Display_Information function for each class as mentioned in the table. You have to use concept of Polymorphism to generate the sample output. Sample Output:
3 topics
Assignment Content
- In class, we learned how to write the introduction and conclusion of the Literature Review section, which includes:
- Introduction (6 sentences on p. 10a)
- Review of Literature (using notes on p. 13a – ONE objective summary is graded already — apply feedback)
- Analysis of Literature (compare and contrast activity on p. 16a)
- For this submission: You will submit your full draft of the Literature Review in a WORD document.
- YOU MUST CHECK YOUR SIMILARITY prior to submission here.
- Grading:
- Title Page = 10 pts
- Literature Review: Intro, Review of Literature, and Analysis of Literature WITH in-text citations and correct level headings:
- Introduction = 15 pts
- Review of Literature = 40 pts
- Analysis of Literature = 20 pts
- References page with ALL four research articles listed = 15 pts
Computer Architecture.
My topic:-
High Performance Computing (HPC) architectures
Requirements (Rubric) are attached as pdf here.
Data types
Respond to the discussions below with 150 words or more.
Abstract data types (ADTs) exist only conceptually, and do not have any concrete existence in a language. Their purpose is to define behavior and state management (Abstract data type, 2021). Queues are an example of an ADT. General purpose data structures are a class level implementation of the abstract data type that is a collection of data values, their relationships, and the operations that can be applied to said data (Data structure, 2021). These do exist in the form of code. Data types are a concrete instance of a class in the form of defined class objects. To put this into simpler terms, it is an attribute of data which tells the computer how the data is intended to be used (Data type, 2021). An integer is an example of a common data type. Each one of these terms is defined differently, but they all work together. Abstract data types define operations, general purpose data structures implement said operations, and data types classify data by values and operations. If a data type cannot specify any sort of concrete implementation, then it is an abstract data type. Data structures are an efficient way to store said data. Examples of data structures include Linked Lists. Let’s take a closer look at the ADT and data structure examples: queues and linked lists. A queue is an interface, which means that it needs a concrete class for declaration (GeeksforGeeks, 2020). This is what makes a queue an abstract data type. One of the most common classes that queues use to declare data is a linked list. A linked list is the implementation of a linear data structure where the elements are linked using pointers and addresses (GeeksforGeeks, 2021). Queues do not have concrete implementation and linked lists do. So, while a Linked List can act as the physical implementation of a queue, a queue must rely on a data structure for implementation. The distinction may seem subtle at first, but the difference is important.
INTRO TO. OMPUTERS
2 assignments due tonight
Exp19_PowerPoint_Ch03_Cap_Bryce_Adventure_Camp
Exp19_PowerPoint_Ch03_Cap_Bryce_Adventure_Camp
Project Description:
Bryce Adventure Camp is a successful outdoor retreat dedicated to the appreciation of the splendor and inspiration of nature for good health. The operation has been so successful in its two years of operation that the owners opened retreats in two additional locations. They now want to open another retreat so even more people can enjoy the exhilaration of nature in magnificent settings. They are meeting with officers of a venture capital corporation, that offers funding for unique opportunities. The representatives have asked for an overview of Bryce Adventure Camp’s philosophy, services and activities, sales for this year and last year, a year-to-year comparison, and charts showing the increase. The owners of Bryce Adventure Camp asked you for help in preparing the presentation for the meeting.
discussion
There are a lot of resources that will be helpful when it comes to CSS and JavaScript. Share at least 2 of those resources here and include the URL as well as a short review of what it has that you found you could reference in this work.
Machine Learning Model Training 2.
Assignment 3: Machine Learning Model Training 2
• Two multi-part, multiple-choice questions.
• AI in Healthcare with Phase 2 data set (HTML file)
• Details of the Q1 & Q2 m/c questions are shown in the attached question files.
• Lecture notes on Machine Learning in Healthcare for your reference
BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY
TOPIC: Networks, Privacy, and Security Presentation
Assessment Description
The purpose of this assignment is to explore legal and ethical issues related to networks, privacy, and security, as well as to research specific types of privacy and security threats and the measures that employee users should take to maintain privacy and security within an organization.
Assume you are part of the IT security team in your organization. Research one common employee IT privacy and security issues and ways that employee users can protect themselves and the business from privacy and security breaches and risks. Some common risks to business include:
- Lack of password management
- Electronic storage and transfer of information
- Privilege abuse by employees
- Use of unapproved hardware and software
- Data mishandling
- Equipment misuse (including hardware and systems)
- Knowledge misuse
- Unapproved workarounds
- Securing company data and information on personal employee devices (e.g., cell phones, tablets)
- Collaboration with third-party service providers
- Social engineering
- Phishing attacks
Summarize your research findings and educate employees about the identified IT privacy and security issues.
Create a PowerPoint presentation with a minimum of six slides that addresses the following:
- Define the employee privacy/security issue and explain why it could be a risk for an organization.
- Provide a specific workplace scenario to illustrate the employee privacy/security issue.
- Discuss the legal and ethical implications the privacy/security issue presents for the employee, the company, and the customer.
- Describe the negative impact the employee privacy/security issue could present to the organization in terms of its overall effect on accounting, finance, marketing, management, economics, and general business operations.
- Discuss the ways that employee users can protect themselves and the business from these types of privacy and security breaches and risks.
- Discuss specific policies, strategies, and techniques that could be employed by the organization and the employee to minimize the identified employee privacy/security issue.
- Discuss how to educate employees about the identified IT privacy and security risks.
- Include speaker notes at the bottom of each slide.
Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.
You are required to submit this assignment to LopesWrite to check for Plagiarism .
answer please
Please answer question 6 and 7