Answer:
Explanation:
Code:-
using System;
using System.Linq;
using System.Collections;
using System.Collections.Generic;
public class Test{
public static int no_drawer(){
Console.WriteLine("Enter the number of drawers : ");
return Int32.Parse(Console.ReadLine());
}
public static char wood_type(){
Console.WriteLine("Enter the type of woods('m' for mahogany, 'o' for oak, or 'p' for pine) : ");
return Console.ReadLine()[0];
}
public static double final_cost(int d,char ch){
double cost = 0.0;
if (ch == 'p') cost += d*100;
else if (ch == 'o') cost += d*140;
else cost += d*180;
cost += d*30;
return cost;
}
public static void display(int d,char ch,double p){
Console.WriteLine("Number of drawers : "+d);
if (ch == 'p')
Console.WriteLine("Type of Wood Chosen : pine");
else if (ch == '0')
Console.WriteLine("Type of Wood Chosen : oak");
else if (ch == 'm')
Console.WriteLine("Type of Wood Chosen : mahogany");
else
Console.WriteLine("Type of Wood Chosen : other");
Console.WriteLine("Total Cost is : "+p);
}
public static void Main(){
int drawers = no_drawer();
char ch_wood = wood_type();
double res = final_cost(drawers,ch_wood);
display(drawers, ch_wood,res);
}
}
cheers i hope this helped !!!
A computer needs both hardware and to be useful
Answer:
software
Explanation:
software is the other major component to hardware
Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)
Answer:
Following are the statement in C++ Programming language
cout<<setw(4);// set the width
cout<<number; // print the number with the width of 4
Explanation:
The setw() is setting according to the width defined as the argument to the function .The setw() is under the ios header library .It means its definition is under the ios header file .
Following are the syntax to defined the setw() function that are given below
setw(int k)
For example
include <iomanip> // header file
#include <ios> // header file
#include <iostream> // header file
using namespace std; // namespace
int main() // main function
{
int number = 60;// variable declaration
cout << "previous width:" << number; // print
cout << " After setting the width"<< setw(4);
cout << number; // display number
return 0;
}
To improve visual effects and semantic context in your presentation, you can get and add a snapshot from a desktop running application or an internet resource in a slide using __________Immersive Reader
(1 Point)
(D) Screen Clipping
(B) Smart Art
(C) Online Pictures
(A) 3D Models
Answer:
D. Screen Clipping
Explanation:
Screen clipping is a feature or application integrated into operating systems to grab or capture a snapshot of the current open window on the desktop. It could be an inbuilt feature like "Snipping Tool" which is seen in the Windows operating system by default (from Windows 7 and upward); this feature is however not restricted to only Windows operating systems. It could also be a third party app to capture onscreen processes.
Smart Art is a visual representation of data and information which is made by choosing a layout that best suits the information you are projecting.
Online Pictures
are ready resources (photographs) which are already available online; they have to be downloaded to be used.
3D Models is the process of creating and developing a mathematical representation of data and information in three dimensions using specialized software. This help bring the data and information to life
All these options (A - D) are good ways of enhancing a presentation. However, to get a snapshot of an onscreen process from the desktop, Option D (Screen Clipping) is the correct answer
Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two books. For example, if the first book's title is "The Adventures of Tom Sawyer" and the second book's title is "The Adventures of Huckleberry Finn", the concatenated title will be "The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn". Assume the book class is defined as: class Book { public Book(string title) { Title
next time m8 mmmmmdsaasd
What is the name of the FOLDER in which the file named "script" is contained?
Answer:
The default location for local logon scripts is
the Systemroot\System32\Repl\Imports\Scripts folder
Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of the segment if all data is sent in only one segment?
Answer:
501.
Explanation:
In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.
The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.
In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).
However, assuming the same data was sent in five (5) segments. The sequence number would be;
First segment (1st) = 501.
Second segment (2nd) = 1501.
Third segment (3rd) = 2501.
Fourth segment (4th) = 3501.
Fifth segment (5th) = 4501.
Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person’s BMI is calculated with the following formula:
BMI = weight x 703 / height2
where weight is measured in pounds and heightis measured in inches. The program should ask the user to enterhis/her weight and height. The program should display a message indicating whether the person has optimal weight, is underweight, or is overweight. A sedentary person’s weight is considered optimal if his or her BMI is between18.5 and 25. If the BMI is less than 18.5, the person is considered underweight. If the BMI valueis greater than 25, the person is considered overweight
Answer:
This program is written using C++
Comments are used to explain difficult lines
Program starts here
#include<iostream>
using namespace std;
int main()
{
//Declare variables
float BMI, Height,Weight;
// Prompt user for inputs
cout<<"Ener Height (in inches): ";
cin>>Height;
cout<<"Enter Weight (in pounds): ";
cin>>Weight;
//Calculate BMI
BMI = (Weight * 703)/(Height * Height);
cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;
//Test and print whether user is underweight, overweight or optimal
if(BMI>=18.5&&BMI<=25)
{
cout<<"You have an optimal weight";
}
else if(BMI<18.5)
{
cout<<"You are underweight";
}
else if(BMI>25)
{
cout<<"You are overweight";
}
return 0;
}
See attachment for .cpp source file
Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|
Answer:
...............................................
Explanation:
............................................................
by applying styles formats are being applied ?
A. The same
B. Different
C. Various
D. Similar
Answer:
A
Explanation:
The same formats are being applied.
Answer:
A
Explanation:
Let's take the letters in a keyboard. If I were to type a document; there are several word format I can chose like Calibre, Times New Roman, Gothic etc. However for each word format I can make the words bold or italicized which are styles.
You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.
Answer: provided in the explanation section
Explanation:
Given that:
Assume D(k) =║ true it is [1 : : : k] is valid sequence words or false otherwise
To determine D(n)now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.
So, from here we have that D(k) is given by the following recorance relation:
D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise
Algorithm:
Valid sentence (s,k)
D [1 : : : k] ∦ array of boolean variable.
for a ← 1 to m
do ;
d(0) ← false
for b ← 0 to a - j
for b ← 0 to a - j
do;
if D[b] ∧ DICT s([b + 1 : : : a])
d (a) ← True
(b). Algorithm Output
if D[k] = = True
stack = temp stack ∦stack is used to print the strings in order
c = k
while C > 0
stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c
P = W (p) - 1
output stack
= 0 =
cheers i hope this helps !!!
Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();
Answer:
The csharp program to compute square roots of numbers and write to a file is as follows.
class Program
{
static long max = 1000000;
static void writeRoots()
{
StreamWriter writer1 = new StreamWriter("roots.txt");
double root;
for (int n=1; n<=max; n++)
{
root = Math.Sqrt(n);
writer1.WriteLine(root);
}
}
static void Main(string[] args)
{
writeRoots();
}
}
The program to compute squares of numbers and write to a file is as follows.
class Program
{
static long max = 1000000;
static void writeSquares()
{
StreamWriter writer2 = new StreamWriter("squares.txt");
long root;
for (int n = 1; n <= max; n++)
{
root = n*n;
writer2.WriteLine(root);
}
}
static void Main(string[] args)
{
writeSquares();
}
}
Explanation:
1. An integer variable, max, is declared to hold the maximum value to compute square root and square.
2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.
StreamWriter writer1 = new StreamWriter("roots.txt");
3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.
4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.
StreamWriter writer2 = new StreamWriter("squares.txt");
5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.
6. Both the methods are declared static.
7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.
8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.
9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.
10. The csharp language is purely object-oriented language and hence all the code is written inside a class.
Cyclic Redundancy Check (CRC) is an effective error detection mechanism. Suppose you have data bits of 10010011011 and divisor is 10011. As per the given information, what is encoding bits at the sender side? Similarly, at the receiver end ensure syndrome value is zero. Follow all necessary steps to complete calculation at both ends.
Answer:
I've asked the same question bro..if you get answer share with me too
Explanation:
Implement the method remove_all in the ArrayList class which takes the parameter x and removes all occurences of x from the list.
E.g., calling remove_all('a') on an ArrayList with contents ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a'] should result in the updated ArrayList ['b','r','c','d','b','r']
Answer:
a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']
a = [x for x in a if x != 'a']
print(a)
Explanation:
The code is written in python
a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']
a = [x for x in a if x != 'a']
print(a)
a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']
I declared a variable a and stored the list of value.
a = [x for x in a if x != 'a']
I used list comprehension to loop through the array and find any value that is not 'a' .
print(a)
I printed every value that is not 'a' in the array.
A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.
Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!
Answer:
To answer this question, i prepared a pseudocode and a program written in python;
Pseudocode begins here:
1. Start
2. Input montlySales
3. If monthlySales < 100000
3.1. Display Nothing
4. Else
4.1 Display “You earned a $5000 bonus!”
4.2 If monthlySales > 1.25 * 90000
4.2.1 Display “All employees get one day off!”
5. Stop
Python Program starts here (See attachment for proper view of the program):
#Prompt user for input
monthlySales = float(input("Monthly Sales: "))
#Check monthlySales
if monthlySales < 100000:
print("")
else:
print("You earned a $5,000 bonus")
if monthlySales > 1.25 * 90000:
print("All Employees get the day off")
Explanation:
To answer this question, a conditional if statement is needed.
The pseudocode (and the program) starts by prompting user for input;
Then, the user input is first compared with 100,000
If it's less than 100,000; then nothing is displayes
However, if it is at least 100,000
"You earned a $5,000 bonus" is displayed
It further checks if the user input is greater than 125% of 90,000
If yes, "All Employees get the day off" is displayed else, nothing is displayed.
The pseudocode (and the program) stops execution, afterwards
Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.
Answer:
mylist = [] #Create an empty list
i = 0 # initialize counter to 0
b = int(input("Enter into list: ")) # prompt user for input
while not(b == 0): #test if input is not 0
mylist.append(b) #insert input into list if it's not 0
i = i + 1 #increment counter
b = int(input("Enter into list: ")) #prompt user for input
#save sorted list in a newlist
newlist = sorted(mylist)
#print element on separate lines
for ind in newlist:
print(ind)
#End of program
Explanation:
Line 1 of the program creates an empty list named mylist
Line 2, initializes a counter variable i to 0
Line 3 prompts user for input
Line 4 to 7 iterates until user input is 0
Line 9 sorts the list and saves the sorted list into a new list
Line 11 & 12 prints the each element of the list on separate lines
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
Explanation:
Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies. They uses technology to render services.
Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.
How policies on encryption could be implemented to prevent cyber attacks by:
Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.
1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.
2. Rules on encryption of sensitive messages and back up data.
3. rules on encryption of Log in details and passwords
Which of the following statements is true? The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. NetWitness Investigator is available at no charge while Wireshark is a commercial product.
Answer:
Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.
Explanation:
Wireshark is a computer software that was Initially released in the year 1998. The software was written in language (programming language) such as the C++ and the C programming language.
Originally, the main author of the Wireshark software is a man named Gerald Combs.
Wireshark is used in analyzing network protocols and software troubleshooting
Infomation such as antennae signal strengths can also be gotten by using Wireshark.
Hence, "Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues." Is the correct Option.
Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50
Answer:
You didn't specify the language so I did it in C#
Explanation:
This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours
Answer: provided in the explanation section
Explanation:
Network Merging and Acquisitions
Environment:
· 400 Windows Servers
· 8000 Windows client devices (laptops running Windows os)
· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.
· Unix servers(Other environment to be merged)
· host resolution they use is BIND
A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.
Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.
Quick & Dirty IPSEC Tunnel
When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.
Main problems with quick and dirty IPSEC tunnels are
Maintaining network lists manually.
manual maintenance of route injection into the IGP.
Probable single points of failure.
Using SD-WAN As Acquisition Network Glue:
Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers
1. Easily managed redundant plumbing :
SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.
2. IGP integration:
When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.
3. Segment isolation:
An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.
Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.
4. Service chaining:
Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.
Drawbacks Of The SD-WAN Approach
A few drawbacks in using SD-WAN as a network merger tool come to mind.
Cost:
The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.
Remote hands:
In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network
Perhaps not quick and dirty enough:
The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.
To Conclude:
Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.
If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.
SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.
how do you unblock websites on a school chromebook?
Answer:
use proxies, if you cant, then you cant unblock anything thats already blocked
Explanation:
You can't unblock anything on a school chromebook. So it's best to find website alternatives, things your school might use, like Giggl. It's a website with a built in web browser you can do almost anything, watch videos you can't on your school chromebook, netflix, hulu, vumoo, and even nasty sites... just don't go on those though. You can't play a lot of games and some sites are blocked as well. If you want people to send you videos that you can watch in a separate browser, i suggest using pad let. It is a app to post things like pictures or status' but people like me and my friends use it to talk to each other, you can send gifs, voice recordings, and take pictures. I hope this helps you.
Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.
Go to the tab on the ribbon and the group.
Click Themes and select one.
Go into the workbook, make the changes, and return to the Themes gallery.
Select to save the changes.
Answer:
C, A, and B.
or
3, 1, and 2
Explanation:
In that order
The first will be to adjust the workbook. then there should be a theme that needs to be selected. And then next is to Select the tab and the box of ribbon on which the theme needs to be presented.
Thus, options C, A, and B are correct.
What is a theme?A theme is made up of window colors, music, and desktop backdrop images. A theme is a collection of window accent colors, noises, and desktop backdrop images. If you don't want to customize your computer cover image, window highlight colors, home screen widget, etc., you can use a theme.
Make the adjustments that are required in the workbook, then go back to the motif gallery.
Choose a theme by clicking Themes.
Go to the tab and box on the ribbon.
A theme often consists of a selection of forms and colors for the window design, the visual control components, and the window. Therefore, options C, A, and B are the correct options.
Learn more about the theme, here:
https://brainly.com/question/12461938
#SPJ3
You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?
Answer: Provided in the explanation section
Explanation:
The question says :
You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?
Solution:
Here, our fundamental aim is to look for the content which is having single space between different sentences. As it sentences finishing with . Going before with single and various spaces we have to channel and match just e the sentences which are finishing with ". "
For this we use order called "GREP" in Unix. "GREP " represents worldwide quest for standard articulation. This order is utilized inquiry and print the lines that are coordinating with determined string or an example. The example or indicated string that we have to look through we call it as customary articulation.
Syntax of GREP:
GREP [OPTIONS] PATTERN [FILE_NAME]
For our solution please follow the command
GREP "*\•\s$" userNotes.txt
Now it will display a all the lines having . Followed by single space.
Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter a 5 digit integer as input and does the following tasksThe program checks whether the input number is a palindrome or not and prints the result of this palindrome check. A number is a palindrome if it reads the same backward as forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611; whereas 12312, 55565, 45545 and 11621 are not a palindrome. Your program should print "The number is palindrome" or "The number is not palindrome" after checking the input number.The program checks whether the input number has 5 digits or not and prints the error message "Invalid number" if the input number is not a 5 digit one.I posted my code below, I think I have a good start with reversing the number but I'm not sure how to implement the portion of how to actually check if it is a palindrome.import java.util.Scanner;public class Problem2 {public static void main(String[] args){int number;
Scanner scanner = new Scanner(System.in);System.out.println("Enter a positive integer between 1 and 5 digits long that you would like to test for a palindrome: ");num = in.nextInt();for( ;num != 0; ){reversenum = reversenum * 10;reversenum = reversenum + num%10;num = num/10;
Answer:
import java.util.Scanner;
import java.util.regex.*;
public class Problem2 {
public static void main(String[] args)
{
int number;
Scanner scanner = new Scanner(System.in);
System.out.println("Enter a positive integer with exactly 5 digits long that you would like to test for a palindrome: ");
String str = scanner.nextLine();
int len = str.length();
if (!Pattern.matches("^[1-9]\\d{4}$", str)) {
System.out.println("Invalid number");
} else {
boolean isPalindrome = true;
for(int i=0; i<len/2; i++) {
if (str.charAt(i) != str.charAt(len-i-1)) {
isPalindrome = false;
break;
}
}
if (isPalindrome) {
System.out.println("The number is palindrome");
} else {
System.out.println("The number is not palindrome");
}
}
}
}
Explanation:
Even though the problem talks about numbers, a palindrome check is more about strings, so that's how I'd handle it. I check the validity of the input using a regular expression (note how I don't allow the number to start with a zero, you can change that if you want), and then I check for palindrome to iterating to only halfway the string, and checking the i-th position ffrom the start against the i-th position from the end. If there is no match, the loop is aborted.
See that also for even-length palindromes this will work.
The management wants to you to calculate a 95% confidence interval for the average relative skill of all teams in 2013-2015. To construct a confidence interval, you will need the mean and standard error of the relative skill level in these years. The code block below calculates the mean and the standard deviation. Your edits will calculate the standard error and the confidence interval. Make the following edits to the code block below:Replace ??SD_VARIABLE?? with the variable name representing the standard deviation of relative skill of all teams from your years. (Hint: the standard deviation variable is in the code block below)Replace ??CL?? with the confidence level of the confidence interval.Replace ??MEAN_VARIABLE?? with the variable name representing the mean relative skill of all teams from your years. (Hint: the mean variable is in the code block below)Replace ??SE_VARIABLE?? with the variable name representing the standard error. (Hint: the standard error variable is in the code block below)The management also wants you to calculate the probability that a team in the league has a relative skill level less than that of the team that you picked. Assuming that the relative skill of teams is Normally distributed, Python methods for a Normal distribution can be used to answer this question. The code block below uses two of these Python methods. Your task is to identify the correct Python method and report the probability.print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")print("------------------------------------------------------------------------------------------------------------")# Mean relative skill of all teams from the years 2013-2015mean = your_years_leagues_df['elo_n'].mean()# Standard deviation of the relative skill of all teams from the years 2013-2015stdev = your_years_leagues_df['elo_n'].std()n = len(your_years_leagues_df)#Confidence interval# ---- TODO: make your edits here ----stderr = ??SD_Variable?? (n ** 0.5)conf_int_95 = st.norm.interval(??CL??,??MEAN_VARIABLE??,??SE_VARIABLE??)print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")print("\n")print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")print("----------------------------------------------------------------------------------------------------------------------------------------------------------")mean_elo_your_team = your_team_df['elo_n'].mean()choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)# Pick the correct answer.print("Which of the two choices is correct?")print("Choice 1 =", round(choice1,4))print("Choice 2 =", round(choice2,4))
Answer:
Explanation:
print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")
print("------------------------------------------------------------------------------------------------------------")
# Mean relative skill of all teams from the years 2013-2015
mean = your_years_leagues_df['elo_n'].mean()
# Standard deviation of the relative skill of all teams from the years 2013-2015
stdev = your_years_leagues_df['elo_n'].std()
n = len(your_years_leagues_df)
#Confidence interval
stderr = stdev/(n ** 0.5) # variable stdev is the calculated the standard deviation of the relative skill of all teams from the years 2013-2015
# Calculate the confidence interval
# Confidence level is 95% => 0.95
# variable mean is the calculated the mean relative skill of all teams from the years 2013-20154
# variable stderr is the calculated the standard error
conf_int_95 = st.norm.interval(0.95, mean, stderr)
print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)
print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")
print("\n")
print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")
print("----------------------------------------------------------------------------------------------------------------------------------------------------------")
mean_elo_your_team = your_team_df['elo_n'].mean()
# Calculates the probability a Team has Average Relative Skill GREATER than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015
choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)
# Calculates the probability a Team has Average Relative Skill LESS than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015
choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)
# Pick the correct answer.
print("Which of the two choices is correct?")
print("Choice 1 =", round(choice1,4))
print("Choice 2 =", round(choice2,4)) # This is correct
Create two classes. The first, named Sale, holds data for a sales transaction. Its private data members include the day of the month, amount of the sale, and the salesperson's ID number. The second class, named Salesperson, holds data for a salesperson, and its private data members include each salesperson's ID number and last name. Each class includes a constructor to which you can pass the field values. Create a friend function named display()that is a friend of both classes and displays the date of sale, the amount, and the salesperson ID and name. Write a short main()demonstration program to test your classes and friend function.Sample Run
Sale #103 on 12/25/2016 for $559.95 sold by #103 Woods
Sale #106 on 11/15/2016 for $359.95 sold by #106 Hansen
Answer:
A C++ program was used in creating two classes. the code is stated below.
Explanation:
Solution
The C++ program is executed below:
#include<iostream>
using namespace std;
//declare class (will be define later)
class Salesperson;
//class Sale
class Sale
{
//private members of class
private:
string day;
double amtOfSale;
int salesPersonId;
//public methods
public:
//constructor that takes day,amount of sale and salesPersonId as parameters
Sale(string date,double sale,int id)
{
//set the private members to the initial values passed
day=date;
amtOfSale=sale;
salesPersonId=id;
}
//declare a friend function that takes objects of the two classes as parameters
friend void display(Sale,Salesperson);
};
//define class Salesperson
class Salesperson
{
//private members of the class
private:
int salesPersonId;
string lastName;
//public methods
public:
//constructor that takes name and id as parameters
Salesperson(int id,string name)
{
//set the members of the class with the parameters passed
salesPersonId=id;
lastName=name;
}
//declare a friend function that takes objects of the two classes as parameters
friend void display(Sale,Salesperson);
};
//define the friend funtion
void display(Sale saleObj,Salesperson personObj)
{
//display the sales info using the objects of the two classes
cout<<"\nSale #"<<saleObj.salesPersonId<<" on "<<saleObj.day<<" for $"<<saleObj.amtOfSale<<" sold by #"<<personObj.salesPersonId<<" "<<personObj.lastName;
}
int main()
{
//create object for Sale class and pass default values
Sale sObj1("12/25/2016",559.95,103);
//create object for Salesperson class and pass default values
Salesperson pObj1(103,"Woods");
//create another object for Sale class and pass default values
Sale sObj2("11/15/2016",359.95,106);
//create another object for Salesperson class and pass default values
Salesperson pObj2(106,"Hansen");
//using the friend function dislay the sales info
display(sObj1,pObj1);
display(sObj2,pObj2);
return 0;
}
A small airline has just purchased a computer for its new automated reservations system. You have been asked to develop the new system. You are to write an application to assign seats on each flight of the airline’s only plane (capacity: 10 seats).
Your application should display the following alternatives: Please type 1 for First Class and Please type 2 for Economy.
If the user types 1, your application should assign a seat in the firstclass section (seats 1–5).
If the user types 2, your application should assign a seat in the economy section (seats 6–10).
Your application should then display a boarding pass indicating the person’s seat number and whether it is in the first-class or economy section of the plane.
Use a one-dimensional array of primitive type boolean to represent the seating chart of the plane. Initialize all the elements of the array to false to indicate that all the seats are empty. As each seat is assigned, set the corresponding elements of the array to true to indicate that the seat is no longer available.
Your application should never assign a seat that has already been assigned. When the economy section is full, your application should ask the person if it is acceptable to be placed in the first-class section (and vice versa). If yes, make the appropriate seat assignment. If no, display the message "Next flight leaves in 3 hours."
Answer:
Here is the simple JAVA program.
import java.util.Scanner; // to take input from user
public class AirlineReservationSystem { //airline reservation class
public static void main(String[] args) { //start of main() function body
Scanner input=new Scanner(System.in); //Scanner class instance
int first_class=0; //stores the first class seat numbers
int eco_class=5; //holds the economy class seat numbers
int quit; //used to quit the reservation system
System.out.println("Welcome to the AIRLINE RESERVATION SYSTEM!"); // displays welcome message
do{ //start of do while loop
//displays following messages for user to make choice between 2 sections
System.out.println("Please type 1 for First Class ");
System.out.println("Please type 2 for Economy ");
int choice=input.nextInt(); //takes the choice from user
switch(choice){ // takes choice of user from first class or economy section
case 1: //when user enters first class as choice
first_class++;
//increments count of first class by 1 every time user reserves a seat in first //class
if (first_class<=5){ // the seats in first class section should be between 1-5
//displays message of seat reserved in first class
System.out.println("Your seat is assigned in First Class.");
System.out.println("Your seat number is "+first_class);
//assigns seat number in first class }
else{
// displays following message when number of seats in first class exceed 5
System.out.println("No seat is available in First Class");
//asks user if he wants to placed in economy class when there is no seat //available in first class
System.out.println("Do you want to be placed at the Economy section?(1.yes\t2.no)");
int full=input.nextInt(); //reads yes or no (1 or 2) from user
if (full==1){ //if user entered 1
System.out.println("Enter 1 to return to main menu to reserve a seat in Economy class.");
} // asks user to press 1 to go to main menu
else{ //displays following message if user enters 2
System.out.println("Next flight leaves in 3 hours.");} }
break;
case 2: //when the user choose to reserve seat in economy class
eco_class++;
//increments count of first class by 1 every time user reserves a seat in //economy class
//the seats of economy class ranges from 6 to 10
if ((eco_class>5)&&(eco_class<=10)){
//display message about economy class seat reservation
System.out.println("Your seat is assigned in Economy Class.");
//assigns seat number in economy class
System.out.println("Your seat number is "+eco_class); }
else{
// displays following message when number of seats in economy class //exceed 10
System.out.println("No seat is available in Economy Class");
//asks user if he wants to placed in first class when there is no seat //available in economy class
System.out.println("Do you want to be placed at the First class section?(1.yes\t2.no)");
int full=input.nextInt(); //reads yes or no (1 or 2) from user
if (full==1){ //if user entered 1
System.out.println("Enter 1 to return to main menu to reserve a seat in business class.");
// asks user to press 1 to go to main menu }
else{ //displays following message if user enters 2
System.out.println("Next flight leaves in 3 hours."); }} }
System.out.println("1.main menu\t2.quit");
quit=input.nextInt();
//if user presses 2 it reads that value from user and store it in quit variable
}while (quit==1); //the loop stops when user chooses quit
System.out.println("Bye! Have a nice day!"); } }
//displays message when user quits the reservation system
Explanation:
The program is well explained in the comments mentioned with each line of the program. The program uses switch statement for the user to make choice between first and economy class. If the user selects first class, then his seat is reserved in first class and a seat number is generated to user. The range of first class seats is from 1 to 5. When this range is exceeded the person is asked if he wants to be placed in economy class. If the user presses one then the person is asked to go back to main menu and reserve seat in economy class. If user enters 2 then the system exits. Same flow goes with the economy class seat reservation. The do while loop keeps executing until the user quits the system. If the user presses 2 to quit, the system exits after displaying bye message.
a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.
Explanation:
Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.
However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.
// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary
start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop
Answer:
The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)
Comments are used to explain difficult lines
#Python Program starts here
#Prompt user for monthly pay
pay = float(input("Enter Monthly Pay: "))
#Prompt user for rent
rent = float(input("Enter Rent: "))
#Prompt user for utilities
utilities = float(input("Enter Utilities: "))
#Prompt user for groceries
groceries = float(input("Enter Groceries: "))
#Calculate discretionary
discretionary = pay - rent - utilities - groceries
#Print discretionary
print("Discretionary: ")
print(discretionary)
#Python Program ends here
//C++ Program starts here
#include<iostream>
using namespace std;
int main()
{
//Declare variables
float pay, rent, utilities, groceries, discretionary;
//Prompt user for input
cout<<"Enter Monthly Pay: ";
cin>>pay;
cout<<"Enter Rent: ";
cin>>rent;
cout<<"Enter Utilities: ";
cin>>utilities;
cout<<"Enter Groceries: ";
cin>>groceries;
//Calculate discretionary
discretionary = pay - rent - utilities - groceries;
//Print discretionary
cout<<"Discretionary: "<<discretionary;
return 0;
}
//C++ Program ends here
3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
pseudocode and explain your logic.
Answer:
No, it can't be verified with a pseudocode.
Explanation:
We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.
Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.
In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).
The Sleeping-Barber Problem:
A barbershop consists of a waiting room with n > 0 chairs and the barber room containing the barber chair.
If there are no customers to be served, then the barber sleeps.
If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.
If the barber is busy but chairs are available, then the customer sits in one of the free chairs.
If the barber is asleep, then the customer wakes up the barber and the shaving process begins.
After they finish, the customer leaves and the barber start shaving another customer, if there are any in the waiting room. Otherwise he goes to sleep.
Answer:
Explanation:
Following are the Semaphores:
Customers: Counts waiting customers;
Barbers: Number of idle barbers (0 or 1)
mutex: Used for mutual exclusion.
Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves
Shared data variable:
count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.
// shared data
semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;
int count_cust= 0;
void barber() {
while(true) { //shop is always open
wait(customers); //sleep when there are no waiting customers
wait(mutex); //mutex for accessing customers1
count_cust= count_cust-1; //customer left
signal(barbers);
signal(mutex);
cut_hair();
}
}
void customer() {
wait(mutex); //mutex for accessing count_cust
if (count_cust< n) {
count_cust= count_cust+1; //new customer
signal(customers); signal(mutex);
wait(barbers); //wait for available barbers get_haircut();
}
else { //do nothing (leave) when all chairs are used. signal(mutex);
}
}
cut_hair(){ waiting(cutting);
}
get_haircut(){
get hair cut for some time; signal(cutting);
}