Answer:
import java.util.Arrays; import java.util.Random; public class Main { public static void main(String[] args) { int [] testArray = {}; buildArray(testArray, 12); } public static void buildArray(int [] arr, int size){ arr = new int[size]; Random rand = new Random(); for(int i=0; i < size; i++){ arr[i] = rand.nextInt(90) + 10; } System.out.println(Arrays.toString(arr)); } }Explanation:
The solution code is written in Java.
Firstly, create a method buildArray that takes two parameters, an array and an array size (Line 10).
In the method, use the input size to build an array with size-length (Line 11). Next, create a Random object and use a for loop to repeatedly generate a random integer using the Random object nextInt method. The expression rand.nextInt(90) + 10 will return an integer between 10 - 99. Each generated random integer is assigned as the value for one array item (Line 16).
At last, print out the array to terminal (Line 19).
In the main program, we can test the method by passing an empty array and a value 12 as array size (Line 7). We will get a sample array as follow:
[81, 36, 15, 20, 32, 84, 10, 13, 98, 12, 45, 45]
These are the characteristics of good blogs.
use corporate jargon and abbreviations
use industry-specific vocabulary
updated frequently
use a friendly, professional tone
enable users to edit corporate documents
Answer:
Updated Frequently
Use a friendly, professional tone.
Explanation:
A blog can be defined as an informal journal posted on a webpage either by an individual or group of people. A blog is written online and updated regularly.
There can be many purposes of writing a blog; it varies according to the writer. A blogger may write to express his/her feelings, views, etc. Or they can also write to share information related to anything such as education, etc.
The characteristics of a good blog are that it is updated regularly and written in a friendly and professional tone. A blog should be different from the existing ones, they should share the information which can not be found on other blogs.
Thus the correct answer is option third and fourth.
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer per line and the code works correctly in that case. If any of the lines don't contain just an integer, than this code fails. Fix this code so that it ignores any lines that don't contain integers instead of raising an exception. Do this with try/except blocks. Your code should still return the list of integers from the lines that contain integers.
Answer:
Check the explanation
Explanation:
def get_list_of_integers_from_file(filename):
int_list=[]
for line in open(filename).readlines():
try:
int_list.append(int(line))
except:
continue
return int_list
print(get_list_of_integers_from_file('file.txt'))
File.txt:
Kindly check the output below.
In this exercise we have to use the knowledge of computational language in python to write the code.
This code can be found in the attached image.
To make it simpler the code is described as:
def get_list_of_integers_from_file(filename):
int_list=[]
for line in open(filename).readlines():
try:
int_list.append(int(line))
except:
continue
return int_list
print(get_list_of_integers_from_file('file.txt'))
See more about python at brainly.com/question/22841107
in c Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character. Assume that the list will always contain less than 20 words. Each word will always contain less than 10 characters and no spaces.
Answer:
see explaination
Explanation:
//Include required header file.
#include <stdio.h>
//Define the function isWordContainChar() having the
//required parameters.
int isWordContainChar(char* req_word, char search_char)
{
//Declare required variable.
int i;
//Start a for loop to traverse the string given in
//the function parameter.
for(i = 0; req_word[i] != '\0' ; i++)
{
//If the current character in the gievn word is
//matched with the character which needs to be
//found in the word, then return 1.
if(req_word[i] == search_char)
{
return 1;
}
}
//Otherwise, return 0.
return 0;
}
//Start the execution of the main() method.
int main(void)
{
//Declare the required variables.
int num_words, index, word_index;
char str_word[20][10];
char searchCharacter;
//Prompt the user to enter the number of words.
scanf("%d", &num_words);
//Prompt the user to enter the required words using a
//for loop and store them into an array.
for(index = 0; index < num_words; index++)
{
scanf("%s", str_word[index]);
}
//Prompt the user to enter a required character which
//needs to be found in a word.
scanf(" %c", &searchCharacter);
//Traverse the words stored in the array using a for
//loop.
for(index = 0; index < num_words; index++)
{
//Call the function isWordContainChar() with
//required arguments in rach iteration and if the
//value returned by this function is not 0, then
//display the current string in the array.
if(isWordContainChar(str_word[index],
searchCharacter) != 0)
{
printf("%s\n", str_word[index]);
}
}
return 0;
}
Write a script that will generate random integers in the range from
0 to 50, and print them, until one is finally generated that is greater
than 25. The script should print how many attempts it took.
Answer:
Explanation:
Let's do this in Python, we shall use the package random to generate a random double between 0 and 1. Then we multiply it with 50 and covert to integer to get a random integer between 0 and 50. Place a While function with condition to stop when it's greater than 25
from random import random
attempts = 1
random_int = int(random()*50)
print(random_int)
print("This is attempt " + attempts)
while random_int <= 25:
attempts += 1
random_int = int(random()*50)
print(random_int)
print("This is attempt " + attempts)
escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. Justify your response with at least one credible source.Explain which of these features you would consider to be the most beneficial if you were a member of the IT team supporting a network. Justify your response with at least one credible source.
Answer:
Due to Brainly's policy on answering questions, posting links as "credible source." is prohibited, but you can let me know in case you'll still want to know the "credible source."
Explanation:
The three improvements you think came about with the introduction of intrusion prevention technology are:
1.The prevention of intruders from attacking the database
2.The data is protected and is more secured as the intruders are removed from the network.
3.The data is not changed and misused as hackers cannot access it
The best feature which is can be termed as the most beneficial is that data is not changed neither can it be misused as the company's data is secured and protected from the outside world and the data can be used effectively and efficiently without any major changes.This means the company does not suffer any losses due to hacking of data.
Write a SQL query to find the population of the planet named 'Caprica' -- 10 points Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama' -- 10 points Find the name and population of the planets with a population larger than 2,600,000,000 -- 10 points Find the first name, last name, and age of people from bsg_people whose age is NULL -- 12 points
The question is incomplete! Complete question along with answer and step by step explanation is provided below.
Please find the attached question.
Answer:
a) SQL Query:
SELECT population
FROM bsg_planets
WHERE name='Caprica';
b) SQL Query:
SELECT fname, lname, age
FROM bsg_people
WHERE lname!='Adama';
c) SQL Query:
SELECT name, population
FROM bsg_planets
WHERE population > 2600000000
d) SQL Query:
SELECT fname, lname, age
FROM bsg_people
WHERE age IS NULL;
Explanation:
a) Write a SQL query to find the population of the planet named 'Caprica'
Syntax:
SELECT Column
FROM TableName
WHERE Condition;
For the given case,
Column = population
TableName = bsg_planets
Condition = name='Caprica'
SQL Query:
SELECT population
FROM bsg_planets
WHERE name='Caprica';
Therefore, the above SQL query finds the population of the planet named 'Caprica' from the table bsg_planets.
b) Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama'
Syntax:
SELECT Column1, Column2, Column3
FROM TableName
WHERE Condition;
For the given case,
Column1 = fname
Column2 = lname
Column3 = age
TableName = bsg_people
Condition = lname!='Adama'
SQL Query:
SELECT fname, lname, age
FROM bsg_people
WHERE lname!='Adama';
Therefore, the above SQL query finds the first name, last name and age of people whose last name is not 'Adama' from the table bsg_people.
c) Find the name and population of the planets with a population larger than 2,600,000,000
Syntax:
SELECT Column1, Column2
FROM TableName
WHERE Condition;
For the given case,
Column1 = name
Column2 = population
TableName = bsg_planets
Condition = population > 2600000000
SQL Query:
SELECT name, population
FROM bsg_planets
WHERE population > 2600000000
Therefore, the above SQL query finds the name and population of the planets with a population larger than 2,600,000,000 from the table bsg_planets.
d) Find the first name, last name, and age of people from bsg_people whose age is NULL
Syntax:
SELECT Column1, Column2, Column3
FROM TableName
WHERE Condition;
For the given case,
Column1 = fname
Column2 = lname
Column3 = age
TableName = bsg_people
Condition = age IS NULL
SQL Query:
SELECT fname, lname, age
FROM bsg_people
WHERE age IS NULL;
Therefore, the above SQL query finds the first name, last name and age of people whose age is NULL from the table bsg_people.
Answer:
SQL Query : select population from bsg_planets where name='Caprica';
SQL Query : select fname,lname,age from bsg_people where lname!='Adama';
SQL Query : select name,population from bsg_planets where population > 2600000000;
SQL Query : select fname,lname,age from bsg_people where age='NULL';
Explanation:
using MySQL Workbench.
SQL Query : select population from bsg_planets where name='Caprica';
Because this sql query will return the population from bsg_planets where the name is Caprica;
SQL Query : select fname,lname,age from bsg_people where lname!='Adama';
Because this SQL query will return the first name ,last name and age from the bsg_people where last name is not adama.
SQL Query : select name,population from bsg_planets where population > 2600000000;
Because this SQL query will return the name and population where population is greater than 2600000000
SQL Query : select fname,lname,age from bsg_people where age='NULL';
Because this SQL query will return the first name ,last name and age from the bsg_people where age is NULL.
Write which of the ovals (A, B, C, or D) is placed around code that best meets the criteria as a student-developed algorithm. Explain your answer using the criteria in the scoring guide.
Answer:
The answer to this question can be defined as follows:
Explanation:
In the given question, some information is missing, that attachment of the image files code, So, the code to the question can add in an image file, and explanation to this question can be described as follows:
In option 4, In drawSquare method, it is positioned across the abstraction, as it is across a method, that compresses many lines of code all in one. In option 1, The moveTo method is the rule. Throughout in option 4, and in option 2, is a request to function, which is defined in option 3, that is the for-loop.Which of the following statements are true?All the methods in HashSet are inherited from the Collection interface.All the methods in Set are inherited from the Collection interface.All the concrete classes of Collection have at least two constructors. One is the no-arg constructor that constructs an empty collection. The other constructs instances from a collection.All the methods in LinkedHashSet are inherited from the Collection interface.All the methods in TreeSet are inherited from the Collection interface.
Answer:
All the methods in HashSet are inherited from the Collection interface.
All the methods in LinkedHashSet are inherited from the Collection interface.
All the methods in Set are inherited from the Collection interface.
Explanation:
These listed statements are true;
1. All the methods in HashSet are inherited from the Collection interface. True
2. All the methods in LinkedHashSet are inherited from the Collection interface. This is also true
3. All the methods in Set are inherited from the Collection interface. Also this statement is true.
The methods in HashSet, Set, LinkedHashSet, and TreeSet are all inherited from the Collection interface. Not all concrete classes of Collection have at least two constructors, not all of them. It's generally the interfaces that inherit from Collection.
Explanation:The following are true regarding the described Java Collection Framework elements:
All the methods in HashSet are inherited from the Collection interface. This is true because HashSet implements the Set interface, which in turn extends the Collection interface. Therefore, HashSet has all the methods inherited from the Collection interface.All the methods in Set are inherited from the Collection interface. The Set interface extends the Collection interface in Java, meaning all the methods declared in Collection interface are available in Set, thus this statement is true.All concrete classes of Collection have at least two constructors. Not all concrete classes in the Collection Framework have two constructors. For example, Queue implementations typically only have a no-arg constructor, making this statement false.All the methods in LinkedHashSet are inherited from the Collection interface. LinkedHashSet is a subclass of HashSet, which in turn is a Set, so all methods in LinkedHashSet are inherited from the Collection interface.All the methods in TreeSet are inherited from the Collection interface. TreeSet implements the SortedSet interface, which extends Set that in turn extends Collection, thus all methods from Collection are available, making this statement true.Learn more about Java Collection Framework here:https://brainly.com/question/32088746
#SPJ3
XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them?
Answer:
SaaS is the correct answer to the given question .
Explanation:
The saas is known as "software as a service is a model " In the software as a service is a model the software is authorized and distributed only when software is approved on a subscription basis also it is distributed in the centralized manner .
The cost of software as a service is a model is not so expensive as compared to the other model also the software as a service model is more Integrated and extensible as compared to the other model of the cloud delivery.According to the given question only the SaaS i.e " software as a service " model is best to implement cloud delivery.Final answer:
XYZ's real estate firm should adopt a Software-as-a-Service (SaaS) cloud delivery model to tackle growth-related IT and marketing cost increases, ensuring scalability, reliability, and a focus on core business activities.
Explanation:
For a large real estate firm like XYZ, which is experiencing rapid growth and increasing IT and marketing costs, the most suited cloud delivery model would be Software-as-a-Service (SaaS). This model provides access to applications over the internet with flexibility and scalability. SaaS applications are updated regularly in the cloud, offering enhanced responsiveness without the need for XYZ to bear the costs of server provisioning, software installation, and maintenance.
Using SaaS for their CRM and email servers allows for a cost-effective approach with a subscription-based model that adjusts easily with the company's growth. Additionally, given the criticality of these tools for XYZ, the SaaS model will ensure uptime and reliability while delivering sophisticated features and functionalities that cater to the firm's understanding of the real estate market and customer needs.
Moreover, as echoed in the cases of Scandic Hotels and Zalando, relying on cloud services will enable XYZ to focus on their core business activities and customer engagement without being bogged down by the complexities of IT infrastructure management.
In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain order. However, we also point out that deadlock is possible in this situation if two threads simultaneously invoke the transaction () function. Fix the transaction () function to prevent deadlocks.
Answer:
See Explaination
Explanation:
Separating this critical section into two sections:
void transaction(Account from, Account to, double amount)
{
Semaphore lock1, lock2;
lock1 = getLock(from);
lock2 = getLock(to);
wait(lock1);
withdraw(from, amount);
signal(lock1);
wait(lock2);
deposit(to, amount);
signal(lock2);
}
will be the best solution in the real world, because separating this critical section doesn't lead to any unwanted state between them (that is, there will never be a situation, where there is more money withdrawn, than it is possible).
The simple solution to leave the critical section in one piece, is to ensure that lock order is the same in all transactions. In this case you can sort the locks and choose the smaller one for locking first.
The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16, 8, 4, 2, 1) has a length of 6 and the hailstone sequence in example 2 (8, 4, 2, 1) has a length of 4. Write the method hailstoneLength(int n), which returns the length of the hailstone sequence that starts with n. /** Returns the length of a hailstone sequence that starts with n, * as described in part (a). * Precondition: n > 0 */ public static int hailstoneLength(int n)
Answer:
Following are the program to this question:
#include <iostream> //defining header file
using namespace std;
int hailstoneLength(int n) //defining method hailstoneLength
{
int t=1; //defining integer variable assign
while(n!=1) //define a loop that checks value is not equal to 1
{
if(n%2==0) // check even number condition
{
n=n/2; // divide the value by 2 and store its remainder value in n
t++; //increment value of t by 1.
}
else
{
n=n*3+1; //calculate and hold value in n
t++; //increment value of t variable by 1
}
}
return t; //return value
}
int main() //defining main method
{
int n; //defining integer variable
cout<<"Enter any number: "; //print message
cin>> n; //input value
cout<<hailstoneLength(n); //call method and print its value
return 0;
}
Output:
Enter any number: 3
8
Explanation:
Program description can be given as follows:
In the given C++ language program an integer method "hailstoneLength", is declared, that accepts an integer variable "n" in its parameter. Inside the method, an integer variable t is declared, that assign a value that is 1, in the next line, a while loop is declared, that uses if block to check even condition if number is even it divide by 2 and increment t variable value by 1. If the number is odd it will multiply the value by 3 and add 1 and increment t by 1 then it will go to if block to check value again. when value of n is not equal to 1 it will return t variable value. In the main method, an integer variable "n" is used that call the method and print its return value.Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?
Answer:
The answer is No, the gains or benefit do not exceed the risk because, even if the data of the user seem very vital, the damage it would have on the long will affect the organisation in a negative way.
Explanation:
From the example given, stating that in situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not
I would say that NO, the benefits do not outweigh the risk that will be enough to keep the user information because, just as the user data is important, but the damage it would yield or have could affect the organization on the long run.
Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.
Answer:
Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle
Explanation:
See attached image
Final answer:
An IP addressing scheme for ElectroMyCycle involves using private addresses for internal networks with a combination of manual and dynamic addressing, public addresses for the DMZ, and route summarization at the router connecting to the ISP.
Explanation:
To design an IP addressing scheme for ElectroMyCycle, one must consider both the size of the network and the security requirements. The following is a tentative plan:
Headquarters: Use private addressing (e.g., 192.168.1.0/24) because these IP addresses do not need to be routable to the Internet. Dynamic addressing through DHCP can be applied here for ease of management.
Production Facility: Use a separate block of private addresses (e.g., 192.168.2.0/24) and manual addressing for fixed assets like servers, while dynamic addressing can be used for employee devices.
Sales Offices: Smaller subnets of private addresses (e.g., 192.168.3.0/28) with dynamic addressing would be appropriate.
DMZ (Demilitarized Zone): This area, which contains public-facing servers, should use public IP addresses for accessibility from the Internet. Manual addressing is recommended for these critical assets.
Route summarization can occur at the router connecting the headquarters to the ISP, summarizing the multiple private subnets into a single entry in the routing table to simplify the routing process and reduce overhead.
3. Show the stack with all activation record instances (with all fields), when execution reaches position 1 in the following skeletal program. Assume bigsub is at level 1. 15 pts function bigsub() { var bigl1; function a(flag, ap1) { var al1; function b() { var bl1, bl2; ... a(false, bl2); ... } // end of b ... if (flag) b(); else c(ap1, al1); ... } // end of a function c(cp1, cp2) { function d(dp1, dp2) { var dl1; ... <------------------------1 } // end of d ... d(cp1, cp2); } // end of c ... a(true, bigl1); ... } // end of bigsub The calling sequence for this program for execution to reach d is bigsub calls a a calls b b calls a a calls c c calls d
To analyze the stack with all activation record instances when execution reaches position 1 (inside function `d`) in the provided program, we need to trace through the sequence of function calls and their respective activation records. Let's break down the steps leading up to this point:
1. Initial Setup:
- `bigsub()` is the main function being executed.
- `bigsub()` calls `a(true, bigl1)`.
2. Execution Flow:
- `bigsub()` calls `a(true, bigl1)`.
- Inside `a(flag, ap1)`:
- `flag` is `true`.
- `a()` then calls `b()`.
- Inside `b()`:
- `b()` defines local variables `bl1` and `bl2`.
- `b()` calls `a(false, bl2)`.
- Back inside `a(flag, ap1)` (after returning from `b()`):
- Since `flag` is `true`, the `else` block in `a()` is not executed.
- Therefore, `a()` does not call `c()`.
- `a(true, bigl1)` completes execution.
3. Execution Flow after `a(true, bigl1)`:
- `bigsub()` resumes execution after `a(true, bigl1)`.
- No further significant function calls are made before the stack reaches `c(cp1, cp2)`.
4. Execution Reaches `c(cp1, cp2)`:
- Inside `c(cp1, cp2)`:
- `c()` defines the function `d(dp1, dp2)`.
- `c()` then calls `d(cp1, cp2)`.
5. Execution Inside `d(dp1, dp2)` (Position 1):
- Execution reaches the start of function `d(dp1, dp2)`.
Now, let's summarize the stack and activation records at this point:
- Stack Layout:
1. `d(dp1, dp2)` activation record (current execution point)
- Fields: `dp1`, `dp2`, `dl1` (local to `d()`)
2. `c(cp1, cp2)` activation record
- Fields: `cp1`, `cp2`
- Contains function `d(dp1, dp2)` within its scope
3. `a(flag, ap1)` activation record
- Fields: `flag`, `ap1`, `al1`
- Contains the call to `c(cp1, cp2)` within its scope
4. `bigsub()` activation record
- No specific fields needed for this context; serves as the outermost scope
- Additional Notes:
- Each activation record (or stack frame) corresponds to a particular function call instance and contains its local variables and parameters.
- The scope of each function determines which inner functions and variables are accessible within that context.
- `d(dp1, dp2)`'s activation record is the current active frame when execution reaches position 1 inside `d()`, and it contains the local variables (`dp1`, `dp2`, `dl1`) defined within `d()`.
Write a program that asks the user to input a set of floating-point values. When the user enters a value that is not a number, give the user a second chance to enter the value. After two chances, quit reading input. Add all correctly specified values and print the sum when the user is done entering data. Use exception handling to detect improper inputs.
Answer:
Check the explanation
Explanation:
// include the necessary packages
import java.io.*;
import java.util.*;
// Declare a class
public class DataReader
{
// Start the main method.
public static void main(String[] args)
{
// create the object of scanner class.
Scanner scan = new Scanner(System.in);
// Declare variables.
boolean done = false;
boolean done1 = false;
float sum = 0;
double v;
int count = 0;
// start the while loop
while (!done1)
{
// start the do while loop
do
{
// prompt the user to enter the value.
System.out.println("Value:");
// start the try block
try
{
// input number
v = scan.nextDouble();
// calculate the sum
sum = (float) (sum + v);
}
// start the catch block
catch (Exception nfe)
{
// input a character variable(\n)
String ch = scan.nextLine();
// display the statement.
System.out.println(
"Input Error. Try again.");
// count the value.
count++;
break;
}
}
// end do while loop
while (!done);
// Check whether the value of count
// greater than 2 or not.
if (count >= 2)
{
// display the statement on console.
System.out.println("Sum: " + sum);
done1 = true;
}
}
}
}
Sample Output:
Value:
12
Value:
12
Value:
ten
Input Error. Try again.
Value:
5
Value:
nine
Input Error. Try again.
Sum: 29.0
Answer:
See Explaination for program code
Explanation:
Code below
import java.io.*;
import java.util.*;
// Declare a class
public class DataReader
{
// Start the main method.
public static void main(String[] args)
{
// create the object of scanner class.
Scanner scan = new Scanner(System.in);
// Declare variables.
boolean done = false;
boolean done1 = false;
float sum = 0;
double v;
int count = 0;
// start the while loop
while (!done1)
{
// start the do while loop
do
{
// prompt the user to enter the value.
System.out.println("Value:");
// start the try block
try
{
// input number
v = scan.nextDouble();
// calculate the sum
sum = (float) (sum + v);
}
// start the catch block
catch (Exception nfe)
{
// input a character variable(\n)
String ch = scan.nextLine();
// display the statement.
System.out.println(
"Input Error. Try again.");
// count the value.
count++;
break;
}
}
// end do while loop
while (!done);
// Check whether the value of count
// greater than 2 or not.
if (count >= 2)
{
// display the statement on console.
System.out.println("Sum: " + sum);
done1 = true;
}
}
}
}
Arrays enable the representation of a number of similar items (in terms of their datatypes). They represent these items in an ordered list. Consider the features of arrays and respond to the following: In what programming situations would the use of an array be beneficial? What situations would not warrant the use of an array? Provide an example explaining why? Imagine a programming structure that would deal with these problems. What characteristics should the structure possess? Research the concept of class ArrayList in Java. Describe the advantage of using the ArrayList class over an array. Also discuss in what circumstances you should use one over the other. Please use examples to justify your answers.
Answer:
Check the explanation
Explanation:
When there is a need to initialize a lot of element of same data types,tht time we use arrays.
We have to use array whenever it involves simple programs and cases,
dx:saving age of 100 childrans of sametype
When all the ele,ents are of different data type,we hould not use arrays,even when we initialize at runtime,we dont need arrays.i.e when size is not fixed
Linked list can be used instead of arrays
ArrayList:It provides methods for creating, searching, manipulating, and sorting arrays, thereby serving as the base class for all arrays in the common language runtime.
Advantages:
Readymade properties availaible ,so lot of writing and remembering the code can be avoided.
Provide the reference for other arrays
Helps in faster execution
the eight bytes in the words y and z. If a byte is the code for a decimal number, output it to the console. Otherwise, simply ignore it and examine the next byte. The program must be a loop. That means that you must write a loop that will execute eight times to examine each byte, output if necessary, and continue. End the program as usual with a syscall 10. After completing the program answer this question: What numbers are output?
Answer:
See explaination
Explanation:
MIPS PROGRAM :-
.data
y: .word 0x32774b33
z: .word 0x2a276c39
y_prompt: .asciiz "Y= "
z_prompt: .asciiz "Z= "
new_line: .asciiz "\n"
.text
main:
la $s0, y
la $s1, z
li $t0, 8
loop:
beqz $t0, END_OF_LOOP
# checking fo y word
lb $t1, 0($s0)
#checking for whether the byte is decimal or not
li $t2, '0'
bltu $t1, $t2, check_for_z
li $t2, '9'
bltu $t2, $t1, check_for_z
#print new line
li $v0, 4
la $a0, new_line
syscall
#print y prompt
li $v0, 4
la $a0, y_prompt
syscall
#print the value
li $v0, 1
add $a0, $zero, $t1
syscall
check_for_z:
# checking fo z word
lb $t1, 0($s1)
#checking for whether the byte is decimal or not
li $t2, '0'
bltu $t1, $t2, next_element
li $t2, '9'
bltu $t2, $t1, next_element
#print new line
li $v0, 4
la $a0, new_line
syscall
#print y prompt
li $v0, 4
la $a0, z_prompt
syscall
#print the value
li $v0, 1
add $a0, $zero, $t1
syscall
next_element:
addi $s0, $s0, 1
addi $s1, $s1, 1
#decrease the counter
addi $t0, $t0, -1
j loop
END_OF_LOOP:
li $v0,10
syscall
1.3 Code Practice edhisive
Answer:
edhesive
Explanation:
The question is related to the practice of ethical guidelines in software engineering, focusing on the importance of following a professional code of conduct. This college-level topic is covered by resources such as CK-12, LibreTexts, and IEEE-CS/ACM Joint Task Force, providing exercises, ethical frameworks, and science practices essential in a computer science curriculum.
Explanation:The Code Practice edhesive refers to exercises and ethical guidelines in software engineering. The exercise appears to be related to the application of the Software Engineering Code of Ethics and Professional Practice, which is essential for aspiring software engineers to learn and follow to ensure they act responsibly and professionally in their field.
In the context of computer science and technology education, such practices are commonly used to instill a sense of ethical responsibility and to prepare students to face various real-world scenarios that they may encounter in their professional careers. The content referenced from CK-12, LibreTexts, and the IEEE-CS/ACM Joint Task Force provides essential guidelines, exercises, and anecdotal historical investigations that enrich the learning experience.
Furthermore, understanding Science Practices through different exercises, including sections on the scientific method, the role of models, and the appropriate use of mathematics, is crucial in developing a well-rounded software engineering skill set. Materials shared under various licenses offer exercises and solutions to reinforce these concepts.
Which of the following is NOT correct concerning database design?
1. Identify all fields needed to produce the required information
2. Organize each piece of data into its largest useful part
3. Group related fields into tables
4. Determine each table’s primary key
Final answer:
The incorrect statement regarding database design is the directive to organize each piece of data into its largest useful part as data should actually be in the smallest useful part to avoid redundancy and maintain normalization.
Explanation:
The statement that is NOT correct concerning database design is Organize each piece of data into its largest useful part. Instead, data should be organized into the smallest useful part, to ensure normalization and avoid redundancy. The design process includes determining the purpose of the database, identifying fields, grouping related fields into tables, and establishing primary and foreign keys to ensure relationships between tables.
The purpose of the primary key is to ensure that each record in a table is unique, which is crucial to maintain data integrity. A good design also considers the use of foreign keys to link tables together and maintain referential integrity. The goal is to prevent redundant data, which avoids wasting space and reduces the occurrence of data entry errors.
4.24 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text. Ex: If the input is:
The program that takes in a line of text as input, and outputs that line of text in reverse is given in the explanation part below.
What is programming?The implementation of logic to facilitate specified computing operations and functionality is known as programming.
It occurs in one or more languages that vary according to application, domain, and programming model.
The goal of programming is to find a set of instructions that will automate the execution of a task that may be as complex as an operating system on a computer, mostly to solve a specific problem.
import java.util.Scanner;
public class LabProgram
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String line;
while (true)
{
line = in.nextLine();
if (line.equals("quit") || line.equals("Quit") || line.equals("q")) break;
for (int i = 0; i < line.length(); i++) {
System.out.print(line.charAt(line.length() - i - 1));
}
System.out.println();
}
}
}
Thus, above mentioned is the program for the given scenario.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ5
Implement the function create_prefix_lists(list) that will return a sequence of lists, each containing a prefix of list. All the lists should be collected as one big list. For example, for [2, 4, 6, 8, 10] the function should return [[], [2], [2, 4], [2, 4, 6], [2, 4, 6, 8], [2, 4, 6, 8, 10]]. Note: recursion can not be used for this solution, if you are familiar with the concept.
Answer:
The below code was written in Python language, kindly let me know if you'll want to see the implementation done in another language.
Explanation:
As python is tab specific, you need align the as per the screenshot of the code that I have attached below the code and text version of the code is also provided.
Code:
======
result = []
def create_prefix_lists(lst):
for i in range(len(lst)):
l = []
for j in range(i):
l.append(lst[j])
result.append(l)
result.append(lst)
return result
lis = [2,4,6,8,10]
print create_prefix_lists(lis)
Code indentation screen and code output can be seen in the attached images below:
====================
Answer:
See Explaination
Explanation:
code below
import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
public class Prefix_test_check {
public static void create_prefix_lists(List elementList) {
if (elementList.size() > 0) {
Collections.sort(elementList);
List newArrayList = new ArrayList();
newArrayList.add("[");
System.out.print(newArrayList);
System.out.print(",");
newArrayList.clear();
int counterDataObj = 0;
for (int iObjectData = 0; iObjectData < elementList.size(); iObjectData++) {
newArrayList.add(elementList.get(iObjectData));
counterDataObj++;
if (counterDataObj == elementList.size()) {
System.out.print(newArrayList);
System.out.print("]");
} else {
System.out.print(newArrayList);
if (counterDataObj != elementList.size()) {
System.out.print(",");
}
}
}
} else {
List emptyDataList = new ArrayList();
emptyDataList.add("]");
System.out.print(emptyDataList);
}
}
public static void main(String args[]) {
List elementList = new ArrayList();
elementList.add(2);
elementList.add(4);
elementList.add(6);
elementList.add(8);
elementList.add(10);
create_prefix_lists(elementList);
}
}
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). c
Final answer:
A program can calculate the estimated monthly mortgage using the formula (currentPrice * 0.051) / 12 and determine the percentage change in house prices to analyze market trends.
Explanation:
Sites like Zillow provide summaries of house prices to give accurate estimates of home values. When writing a program to output a summary of the current price, last month's price, and the estimated monthly mortgage, one can use the formula provided in the question to calculate the mortgage. The estimated monthly mortgage is computed using the formula (currentPrice * 0.051) / 12. It's also important to note that the percentage change in house prices is an important metric when analyzing real estate data, which can be computed as [(current price - last month's price) / last month's price] * 100. This will help in understanding the real estate market trends.
Write a menu-driven program for a user to store information about the media collection they own. This requires using an array of struct type called Media. Every element in the array represents one media item in a person's collection. Represent the information as an array of structs that needs to able to hold up to 100 media entries. However, the actual number of entries is probably much smaller so the program needs to keep track of how many actual entries are in the collection.
Answer:
Check Explanation and attachment.
Explanation:
Since the site does not allow me to submit my work(for you to easily copy and paste it), I will post some additional attachments.
Please, note that there is category, unique ID, description for each media item.
#include <stdio.h>
#include <string.h>
struct Media {
int id;
int year;
char title[250];
char description[250];
char category[50];
};
void show_menu();
void add_item(struct Media arr[], int *c);
void print_all(struct Media arr[], int c);
void print_category(struct Media arr[], int c);
void delete_entry(struct Media arr[], int *c);
int main() {
struct Media collection[100];
int ch, count = 0;
// loop until user wants to quit
while (1) {
show_menu(); // display the menu
printf("Enter your choice: ");
scanf("%d", &ch);
if (ch == 1)
add_item(collection, &count);
else if (ch == 2)
print_all(collection, count);
else if (ch == 3)
print_category(collection, count);
else if (ch == 4)
delete_entry(collection, &count);
else if (ch == 0)
break;
else
printf("Invalid choice. Try again!\n");
}
return 0;
}
void show_menu() {
printf("1. Add a media item to the collection\n");
printf("2. Print all media in the collection\n");
printf("3. Print all media in a given category\n");
printf("4. Delete an entry\n");
printf("0. Quit\n");
}
void add_item(struct Media arr[], int *cnt) {
Design a program that will take an unsorted list of names and use the Insertion Sort algorithm to sort them. The program then asks the user to enter names to see if they are on the list. The program will use the recursive Binary Search algorithm to see if the name is in the list. The search should be enclosed in a loop so that the user can ask for names until they enter the sentinel value 'quit'
Answer:
Check the explanation
Explanation:
Program:
from modules import binSearch
from modules import insertionSort
unsort_list=['Paul', 'Aaron', 'Jacob', 'James', 'Bill', 'Sara', 'Cathy', 'Barbara', 'Amy', 'Jill']
print("The list of unsorted items are given below")
for i in unsort_list:
print(i)
insertionSort(unsort_list)
print("The list of sorted items are given below")
for i in unsort_list:
print(i)
while True:
userInput=raw_input("Enter the search string or quit to exit.. ")
if userInput == "quit":
print("quitting...")
break
else:
if binSearch(unsort_list, 0, len(unsort_list), userInput) != False:
print("%s was found." %userInput)
else:
print("%s was not found" %userInput)
USER> cat modules.py
def insertionSort(listarray):
"""This api in this module sorts the list in insertion sort algorithm"""
length=len(listarray)
currentIndex =1
while currentIndex < length:
index=currentIndex
placeFoundFlag=False
while index > 0 and placeFoundFlag == False:
if listarray[index] < listarray[index-1]:
temp=listarray[index-1]
listarray[index-1]=listarray[index]
listarray[index]=temp
index=index-1
else:
placeFoundFlag=True
currentIndex=currentIndex+1
def binSearch (listarray, init, lisLen, searchString):
"""This api in thie module search the given string from a given list"""
#check the starting position for the list array
if lisLen >= init:
#find the center point to start the search
mid = init + int((lisLen - init)/2)
#check if the string matches with the mid point index
if listarray[mid] == searchString:
return listarray[mid]
#now we will search recursively the left half of the array
elif listarray[mid] > searchString :
return binSearch(listarray, init, mid-1, searchString)
#now we will search recursively the right half of the array
else:
return binSearch(listarray, mid+1, lisLen, searchString)
else:
#string now found, return False
return False
Output:
The list of unsorted items are given below
Paul
Aaron
Jacob
James
Bill
Sara
Cathy
Barbara
Amy
Jill
The list of sorted items are given below
Aaron
Amy
Barbara
Bill
Cathy
Jacob
James
Jill
Paul
Sara
Enter the search string or quit to exit.. Amy
Amy was found.
Enter the search string or quit to exit.. AAron
AAron was not found
Enter the search string or quit to exit.. James
James was found.
Enter the search string or quit to exit.. Irvinf
Irvinf was not found
Enter the search string or quit to exit.. quit
quitting...
Kindly check the code output below.
Answer:
See explaination for program code
Explanation:
Code below:
def insertion_sort(names_list):
"""
function to sort name list using insertion sort
"""
for i in range(1, len(names_list)):
val = names_list[i]
temp = i
while temp > 0 and names_list[temp-1] > val:
names_list[temp] = names_list[temp-1]
temp = temp-1
names_list[temp] = val
def recursive_binary_search(names_list, left, right, search):
"""
function to search name in given list
"""
if right >= left:
# getting mid value
mid_index = int(left + (right - left)/2)
# comparing case insensitive name
if names_list[mid_index].lower() == search.lower():
# returning true if name found
return True
# shifting right left value as per comparing
elif names_list[mid_index].lower() > search.lower():
# calling function resursively
return recursive_binary_search(names_list, left, mid_index-1, search)
else:
return recursive_binary_search(names_list, mid_index+1, right, search)
else:
return False
def main():
# TODO: please feel free to add more name in below list
names = [
"Rakesh",
"Rahul",
"Amit",
"Gunjan",
"Alisha",
"Roy",
"Amrita"
]
print("sorting names....")
insertion_sort(names)
print("names sorted..")
while 1:
name = input("Enter name to search or quit to exit: ")
if name.lower() == 'quit':
break
# searhing name and based on result printing output
result = recursive_binary_search(names, 0, len(names)-1, name)
if result:
print("Name %s found in list" % name)
else:
print("Name %s not found in list" % name)
Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
To be a digital media coordinator, Claire needs a bachelor’s degree in (psychology, public relations, finance) , digital media, or a related field. She also needs to have knowledge of (computer programming, computer coding, search engine optimization) and emerging digital technologies.
To pursue a career as a Digital Media Coordinator, Claire should have a bachelor's degree in a relevant field.
Claire should have a good understanding of emerging digital technologies and trends. This includes staying up-to-date with the latest developments in digital media platforms, social media, and online advertising. Familiarity with digital marketing techniques and tools is essential.
Claire should be able to analyze digital media data and performance metrics. This includes using tools like Analytics to measure the effectiveness of digital campaigns and make data-driven decisions. Strong written and verbal communication skills are important for creating and conveying digital media content effectively. Claire may be responsible for writing web content, social media posts, or email campaigns.
Learn more about Digital Media Coordinator, here:
https://brainly.com/question/24032108
#SPJ3
Final answer:
Claire needs a bachelor's degree in public relations or a related field, knowledge of SEO, and practical experience in strategic communication. She should highlight her communication experiences and skills such as content creation and media planning. Starting as a communication technician can lead to more advanced roles.
Explanation:
To pursue a career as a digital media coordinator, Claire should ideally have a bachelor’s degree in public relations, digital media, or a related field such as marketing or communication studies. It is also essential for her to possess knowledge of search engine optimization (SEO) and stay updated on emerging digital technologies. Practical experience, whether through internships, work placements, or personal projects, is highly valued in this field; not only do they demonstrate Claire's skill set, but also her understanding of the practical aspects of strategic communication.
Claire should emphasize her communication major experience and any hands-on involvement she had with social media campaigns, event planning, or creating digital content. These experiences could range from managing social media accounts for a student organization to participating in a campaign focus group. Highlighting skills such as content creation, analytics, audience engagement, and media planning in her cover letter and application materials will be beneficial.
Starting as a communication technician could be a stepping stone in Claire's career, eventually leading up to a managerial role in public relations or advertising. To stay competitive and prepared for job opportunities, Claire should also consider developing a comprehensive portfolio that showcases her skills in business communication and strategic planning.
In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports are affected and what are the recommended remediations? Why is it important to perform penetration testing on networks and individual servers?
Answer:
Check the explanation
Explanation:
If Zenmap SYN scan did not work in your lab, then that means the application could not locate the network you were attempting to scan, i.e. 10.20.1.0/24. Recall that in Section 2.
Part 2. You added a Route for 10.20.1.0 to be routed via the 172.30.0.1 gateway. That route you added to communicate with the 10.20.1.0 network is a temporary route and will be replaced each time.
The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs. To provide additional products for hardware manufacturers to sell. To give the user less versatility in using the computer. To maximize the productivity of the computer system user. To maximize the productivity of a computer system by operating it in the most efficient manner.
Answer:
To provide a software interface between the hardware and the application programs.
Explanation:
An operating system is a system software that is responsible to manage the hardware and software on our computer. Operating system play the role as a coordinator to handle how different software interact or communicate with hardware and produce a desired output to user. Operating system will also manage computer resources such as central processing unit (cpu), memory and storage required by software to perform its task. The common operating system exist in the today market includes Microsoft Windows, Mac OS X, and Linux.
This program has one small difference that will make it run a little differently. Again though, remember:
All your code outside the draw loop is run first, one time
All your code inside the draw loop is run over and over forever
What will this program do? Write your prediction below.
Answer:
Answer:
Add the following code after the line 3 that is:
numItems = numItems - 1;
Explanation:
In the following question, some information in the question is missing that is code block.
0 var numItems = promptNum("How many items?");
1 var total = 0;
2 while (numItems > 0){
3 total = total + promptNum("Enter next item price");
4 }
5 console.log("The total is" + total);
In the following scenario, Tiffany is developing a program to help with the handling of bake sales and she not write that part which is essential.
There would become an incorrect condition that requires any increment/decrement operations stating that perhaps the condition variable will be incorrect. Because there has to be the variable "numItems" operation because it engages in the while loop condition.
Read more on Brainly.com - https://brainly.com/question/15009132#readmore
Explanation:
Modify class fraction to keep track of the number of the objects currently in memory Let the user input a denominator, and then generate all combinations of two such fractions that are between 0 and 1, and multiply them together. Create fractions and arrays dynamically based on the user input. Only positive fractions. No need to reduce. No vectors allowed. The well-formatted ou
Answer:
See explaination
Explanation:
#include <iostream>
#include <iomanip>
using namespace std;
int main() {
int dem,i,j;
cout<<"Enter denominator value"<<endl;
cin>>dem;
int** arr=new int*[dem];
for(i=0;i<dem;i++)
{
if(i!=0)
cout<<setw(5)<<i<<"/"<<dem;
cout<<"\t";
}
cout<<endl;
for(i=1;i<dem;i++)
{ cout<<setw(5)<<i<<"/"<<dem<<"\t";
arr[i] = new int[dem];
for(j=1;j<dem;j++)
{
cout<<setw(5)<<i*j<<"/"<<dem<<"\t";
}
cout<<endl;
}
return 0;
}
Which character goes at the end of a line of code that starts with if?
Answer:
Explanation:
tttttttttttt