Category: C++

  • C# Question

    You are tasked with designing and deploying a scalable, secure, and maintainable RESTful Web API for managing tourism data (regions and walking trails) using ASP.NET Core Web API and .NET 7.

    Explain how you would architect this system from development to deployment by addressing the following:

    1. Design the API using domain-driven principles, clearly distinguishing between Domain Models and DTOs, and justify how the Repository Pattern and Dependency Injection improve maintainability and testability.
    2. Implement database integration using Entity Framework Core, including migrations, connection configuration, and database creation, while ensuring smooth version control and schema evolution.
    3. Configure authentication and authorization using Microsoft Identity and JWT tokens, and explain how role-based authorization can be enforced across endpoints and integrated into Swagger UI for secure testing.
    4. Demonstrate how Automapper can be used to efficiently map between models, and evaluate its impact on performance and code readability in large-scale APIs.
    5. Apply asynchronous programming (async/await) to improve API responsiveness and scalability under high request loads, and analyze potential pitfalls such as deadlocks or improper async usage.
    6. Integrate logging and monitoring using Serilog to track application behavior, errors, and security events, and explain how structured logging improves debugging and production maintenance.
    7. Enhance API usability by implementing filtering, sorting, and pagination, and justify how these features improve performance and user experience for large datasets.
    8. Propose a testing and documentation strategy using Swagger UI and Postman, ensuring the API is easy to consume, secure to test, and ready for deployment in multiple environments.

    Finally, critically evaluate how all these components work together to create a production-ready enterprise Web API, and identify potential scalability, security, and maintainability challenges that may arise over time.

    Requirements: complete

  • C++ Question

    Class Assignment 2-

    Completed the two programs and submit your source code and output for pointsimage.png

    Requirements: as needed

  • Why we are use #include in c++ and what is the function of c…

    Why we are use #include in c++ and what is the function of c++

    Requirements:

  • Lab 3: Smart Campus SRBS ICT + EA Plan

    Smart Campus Study Room Booking ICT + EA Plan

    Goal: Design a Smart Campus Study Room Booking solution and document it as an ICT plan + Enterprise Architecture (EA) blueprint. Your plan should show (1) what users need, (2) what technology is required, (3) how the network supports it, and (4) how everything fits together using an EA view.

    What to Submit

    In this plan, please based on the learning of this week, submit one PDF or Word document with these required sections:

    • User story list (58 items)
    • ICT components mapped (hardware + software)
    • Network plan (LAN/Wi-Fi, media choices, security)
    • EA blueprint (Business/Data/Application/Technology)
    • Short explanation: packet switching + protocols (TCP/IP concept)
    • One page final recommendation summary

    Tips – Your submission may consider the following these headings

    Step 1 User stories (needs)

    Step 2 Hardware mapping using 4-block model

    Step 3 Software mapping

    Step 4 Network plan

    Step 5 Packet switching + protocol explanation

    Step 6 EA blueprint

    Step 7 Recommendation summary

    Requirements: as needed

  • Lab 3: Smart Campus SRBS ICT + EA Plan

    Smart Campus Study Room Booking ICT + EA Plan

    Goal: Design a Smart Campus Study Room Booking solution and document it as an ICT plan + Enterprise Architecture (EA) blueprint. Your plan should show (1) what users need, (2) what technology is required, (3) how the network supports it, and (4) how everything fits together using an EA view.

    What to Submit

    In this plan, please based on the learning of this week, submit one PDF or Word document with these required sections:

    • User story list (58 items)
    • ICT components mapped (hardware + software)
    • Network plan (LAN/Wi-Fi, media choices, security)
    • EA blueprint (Business/Data/Application/Technology)
    • Short explanation: packet switching + protocols (TCP/IP concept)
    • One page final recommendation summary

    Tips – Your submission may consider the following these headings

    Step 1 User stories (needs)

    Step 2 Hardware mapping using 4-block model

    Step 3 Software mapping

    Step 4 Network plan

    Step 5 Packet switching + protocol explanation

    Step 6 EA blueprint

    Step 7 Recommendation summary

    Requirements: as needed

  • wants learning the basic for c++??

    Requirements:   |   .doc file

  • Assignment 4 CET

    Assignment details are as follows:

    Assignment: Implementing Hash Tables and Collision Resolution

    Part 1: Hash Function Basics

    1. Write a program to implement a simple hash function using the modulus operator (key % table_size).
    2. Insert a sequence of integer keys into an array of size 10.
    3. Show where each key is placed, both with no collisions handled and with linear probing.
    • Example input: [15, 25, 35, 45]
    • Students should demonstrate step-by-step placement.

    Part 2: Separate Chaining

    1. Implement a hash table with separate chaining using linked lists.
    2. Support the following operations:
    • put(key, value)
    • get(key)
    • contains(key)
    • remove(key)
    1. Test the program by inserting at least 10 keys that produce collisions and demonstrate successful retrieval.

    Part 3: Open Addressing Linear Probing

    1. Implement the same hash table using open addressing with linear probing.
    2. Insert values into the table and handle collisions using linear probing.
    3. Write test cases where clustering occurs and show the runtime effect when searching for an element.

    Part 4: Open Addressing Quadratic Probing

    1. Modify the open addressing implementation to use quadratic probing.
    2. Test with the same set of inputs as in Part 3, comparing the distribution of keys in the table.
    3. Highlight cases where quadratic probing fails to find empty slots even though space is available.

    Part 5: Analysis Questions (Short Answer)

    Students should explain:

    1. The difference between separate chaining and open addressing.
    2. What causes primary clustering in linear probing, and how quadratic probing tries to fix it.
    3. Why choosing a prime table size is important for quadratic probing.
    4. Given a sequence of insertions, identify the load factor and decide when resizing should occur.

    Deliverables

    • Code: Implementations of chaining, linear probing, and quadratic probing.
    • Report (23 pages):
    • Screenshots of program execution with example input/output.
    • Written answers to analysis questions.
    • A short discussion of which method they would choose for a real-world application and why.