## Discuss and interpret your results about the effectiveness for MR1 and MR2.

1. Write a program which accepts a list of integers which may contain duplicated integers, and which outputs the input list as a sorted list in ascending order without duplication (the same program as specified in Assignment 1). You can use either Ruby, C, C++, C# or Java to implement your program (referred to as P).
2. Design a test suite of 10 test cases (referred to as TC). Each test case has not more than 20 integers.
3. Test P against TC to make sure that your P passes every test case of TC prior to continuing the other tasks.
4. Manually construct two non-equivalent mutants for P (referred to M1 and M2).
5. Choose 2 MRs that you developed in Assignment 1 (referred to as MR1 and MR2).
6. Compute the effectiveness for MR1 and MR2 using M1, M2 and the test cases in TC as their source test cases.

7.You are required to submit a report which must contain at least the followings items:

1. Program listing of P.
2. A description of all elements of TC.
3. A description of the mutated statements in P for mutants M1 and M2. Note that you need not to give the complete program listings for mutants M1 and M2. You are only required to point out which statements in P are changed and how are they changed to construct M1 and M2.
4. Explain the process that you applied to guarantee that your M1 and M2 are non- equivalent mutants.
5. Explain with sufficient details on how the effectiveness for MR1 and MR2 are calculated, using the metric of expected ratio of violations.
6. Discuss and interpret your results about the effectiveness for MR1 and MR2.

### Decode the received word polynomial r (x) = c(x) + e(x).

Using the elements of GF(24), the generator polynomial of the triple-errorvcorrecting Reed-Solomon code, RS(15, 9), is obtained. For the construction of GF(24), the primitive polynomial p(x) . x4 + x2 + 1 is used. Assume….

### write a program that allows the user to enter a binary tree in a parenthesized prefix format and then allows it to be categorized and allows various features of that tree to be displayed.

CMSC 350 Project 3 The third programming project involves writing a program that allows the user to enter a binary tree in a parenthesized prefix format and then allows it….

### write a 3750-word report outlining vehicular network security concerns. You must use multiple, fully published sources and cite them all.

Go online and find 5-10 papers that are published between 2015-present on the topic of managing security in the cloud. The document must contain details on the questions below: • What….