Write a function that takes an array of integers and its size as parameters and prints the two largest values in the array. In this question, the largest value and the second largest value cannot be the same, even if the largest value occurs multiple times.

Answers

Answer 1

Answer:

Following are the program in c++ language  

#include <iostream> // header file

using namespace std; // namespace

void largest(int a[], int size); // function declaration

int main() // main method

{

int arr[30],n,count1=0; // variable declaration

cout<<" enter the size elements in array:";

cin>>n; // read the input by user

cout<<"enter array elements:";

for(int k=0;k<n;k++) // iterating over the loop

cin>>arr[k]; // read the elements in the array

largest(arr,n); // calling function largest

return 0;

}

void largest(int a[], int n1) // function definition

{

int i, maximum, second,count=0; // variable declaration

if(n1<2) // checkiing the condition

{

cout<<"invalid input"; // print the message

return;

}

else

{

maximum =INT8_MIN; // store the minimum value of an object

second=INT8_MIN; //store the minimum value of an object

for(i = 0;i<n1; i ++) // iterating over the loop

{

if (a[i]>maximum) // comparing the condition

{

second = maximum; // store the maximum value in the second variable

maximum = a[i];

count++; // increment the count

}

else if (a[i] > second && a[i] != maximum)

{

second = a[i];

count++;

}

}

}

if(count<2)

{

cout<<"Maximum value:"<<maximum; // display the maximum value

cout<<" all the value are equal";

}

else

{

cout<<"Maximum value:"<<maximum; // display the maximum value

cout<<"Second largest:"<<second;// display the  second maximum value

}

}

Output:

enter the size elements in array:4

enter array elements:5

47

58

8

Maximum value:58 Second largest:47

Explanation:

Following are the description of program

In this program, we create a function largest which calculated the largest and the second largest element in the array.Firstly check the size of elements in the if block. If the size is less then 2 then an invalid messages will be printed on console otherwise the control moves to the else block.In the else block it stores the minimum value of an object in a maximum and second variable by using INT8_MIN function. After that iterating the loop and find the largest and second-largest element in the array .In this loop, we used the if-else block and find the largest and second-largest element.Finally, print the largest and second-largest elements in the array

Related Questions

_____ allow you to logically separate ports in switches to create subdomains without wiring your network as physical subdomains. This is particularly helpful in office situations where seating does not determine the role of the user.

Answers

Answer:

The correct answer for the following question is VLAN.

Explanation:

It stands for Virtue Logical Area Network which allows you to group port on a switch logically. VLANs can be extend across (a period of time) multiple switches means you used to express on port that you're in that VLAN by changing the VLAN number.

We have the ability to improve our security with VLANs by controlling what VLAN is accessing with the other network of VLANs. So that this network is particularly helpful in office situation to create subdomain without wiring physical domain as your network.

Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the tool can she use to protect the link?

Answers

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

Assume all memory accesses are cache hit. 20% of the Load instructions are followed by a dependent computational instruction, and 30% of the computational instructions are also followed by a dependent computational instruction. 20% of the branch instructions are unconditional, while 80% are conditional. 40% of the conditional branches are taken, 60% are not taken. The penalty for taking the branch is one cycle. If data forwarding is allowed, what is the instruction throughput for pipelined execution?

Answers

Answer:

i hope it will help you!

Explanation:

1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaining security?
2. Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.

Answers

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

Explanation:

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

Identifying threats through potential incidents is key to proactively securing systems against cyber-attacks. Penetration testing plays a crucial role by uncovering vulnerabilities and informing incident response enhancements, ultimately strengthening an organization's security framework.

Importance of Threat Identification in Security

Identifying potential incidents, which represent threats that have not yet occurred, is critical for maintaining security. Identifying a threat helps in proactive risk management, allowing organizations to implement protective measures before an incident occurs. Recognizing threats is essential because it allows for the design of robust systems that can defend against potential cyber-attacks and avoid vulnerabilities that could be exploited.

Role of Penetration Testing in Incident Management

Penetration testing is a simulated cyberattack used to test the robustness of a system against real-world attack scenarios. By finding and exploiting vulnerabilities, security analysts can identify weak points in an organization's networks and systems. Results from penetration testing can then inform improvements in the incident response process, by recommending security enhancements to mitigate identified risks, and by preparing organizations to respond more effectively to future incidents.

Utilization of Penetration Testing Results

The use of penetration test results is integral in strengthening the incident response process. By understanding the vulnerabilities and the methods by which a system can be compromised, organizations can better plan for and respond to incidents, thus enhancing their overall security posture. Furthermore, penetration testing educates users about security practices, contributes to the continuous surveillance and upgrading of security infrastructure, and underlines the importance of avoiding complacency in cybersecurity.

ted must send highly sensitive data over his pptp connection. what feature of pptp will give him the confidence that his data wont be stolen in route

Answers

Answer:

Encryption

Explanation:

PPTP (Point to Point Tunneling Protocol) is an old way of implementing networks, PPTP uses Generic routing encapsulation tunnel to encapsulate data sent on the network and Microsoft Point to Point Encryption (MPPE) those encryption mechanism ensures that data/packets sent through the network are encrypted.

To print the number of elements in the array named ar, you can write :

A.System.out.println(length);

B.System.out.println(ar.length());

C.System.out.println(ar.length);

D.System.out.println(ar.length-1);

Answers

Answer:

Option c is correct.

Example :

public class Subject

{

public static void main(String [] args)

{

int ar[]={5,4,6,7,8};

System.out.println("the number of array elements are: ",ar.length);

}

}

Explanation:

The above program is created in java language in which Subject is a class name.Inside Subject class , there is main method.

Inside the main method, there is An array named 'ar' which data type is an integer and we have assigned the value to this array.

in the next line, we are printing the total no. of the element in the array with the length function which displays the length of an array or variable.

Consider the following short paragraph:
On a computer with a single core CPU, attempting to program real concurrency between two processes (as opposed to apparent concurrency) is impossible, because the CPU can in actuality only do one thing at a time. To fake the user into thinking that more than one process is running at the same time, the CPU can, for example, switch back and forth between running each process very quickly.
Choose one of the following statements about this paragraph:
a) It is all trueb) It is all falsec) Some of it is true, and some of it is false

Answers

Answer:

Option (A) is the correct answer

Explanation:

Single-core CPU is a term used for the microprocessor which has only one processing unit. in single-core CPU the chip has only one core or a single core which can process only one task at a time.

Single-core CPU can switch between other processes using time-slicing pretending it has a multicore processor.

Hence the most appropriate answer is option (A).

A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False

Answers

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

In Python,The sum of the elements in a tuple can be recusively calculated as follows:The sum of the elements in a tuple of size 0 is 0Otherwise, the sum is the value of the first element added to the sum of the rest of the elementsWrite a function named sum that accepts a tuple as an argument and returns the sum of the elements in the tuple.

Answers

Answer:

Following are the program in the Python Programming Language.

# Define the function

def Sum(tu):

# Check if the tuple contain 0

 if len(tu)==0:

#Then, Return 0

   return 0

#Otherwise

 else:

#call the recursive function

   return tu[0]+Sum(tu[1:])

#Set tuple type variable

tu=(2,5,1,8,10)

#print and call the function

print("The sum of tuple is:",Sum(tu))

Output:

The sum of tuple is: 26

Explanation:

Here, we define a function "sum()" and pass an argument "tu" which stores the tuple type value, inside the function.

Set the if conditional statement to check condition is the length of the tuple is 0 then, return 0.Otherwise, call and return the sum of the tuple which is recursively calculated and close the function.

Finally, set the tuple type variable "tu" and initialize the value in it then, print and call the function sum.

Final answer:

A recursive function in Python can be written to calculate the sum of the elements of a tuple by adding the first element to the sum of the remaining elements until an empty tuple is reached, which has a sum of 0.

Explanation:

In Python, tuples are immutable sequences of elements, typically used to store collections of heterogeneous data. A recursive function for summing the elements of a tuple can be defined by considering the base case of an empty tuple having a sum of 0. If the tuple is not empty, the sum is computed by adding the first element of the tuple to the sum of the remaining tuple elements.

The recursive function defined below takes a tuple as an argument and calculates the sum of its elements:

   def sum_of_elements(a_tuple):
       if not a_tuple:  # Base case: empty tuple
           return 0
       else:
           return a_tuple[0] + sum_of_elements(a_tuple[1:])  # Recursive case

This recursive approach is an example of how tuples can be processed in Python. It leverages the fact that tuples can be indexed and sliced, and we are able to recursively reduce the problem size by considering the tuple without its first element.

Algonac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Algonac Systems uses _____ to access information from different departments.

Answers

Answer:

ADD ME ON TIK TOK @ madison.beautiful.dancer

Explanation:

Algonac Systems uses a Logical Access Control system for accessing departmental information, which includes identification through specific names and codes, enhancing security and efficiency.

Algonac Systems, a software start-up company, uses a Logical Access Control system to access information from different departments. This system requires employees to input specific names and their respective codes to gain entry to various areas of data. This method falls under the identification component of access control systems, where technological restrictions such as usernames and passwords are employed to control access to computers and networks.

The logical access control method at Algonac Systems is designed to enhance security by ensuring that only authorized personnel have access to sensitive information and department-specific data. By incorporating unique identifiers for each department, Algonac Systems maintains organized and secure databases, streamlining the process for employees to reach relevant data. This efficiency is crucial for the company's operations, as it allows employees to report and retrieve data through user-friendly interfaces regardless of their location.

Access Control Systems consist of several parts including identification, authentication, authorization, and audit. In the case of Algonac Systems, they rely heavily on the component of identification where employees use assigned names and codes, which correlates to the database system where information is organized and accessed through unique identifiers, ensuring secure and efficient retrieval of data.

What does the following loop do?int[] a = {6, 1, 9, 5, 12, 3};int len = a.length;int x = 0;for (int i = 0; i < len; i++)if (a[i] % 2 == 0) x++;System.out.println(x);1. Sums the even elements in a.2. Finds the largest value in a.3. Counts the even elements in a.4. Finds the smallest value in a.

Answers

Answer:  

The answer is "Option 3"  

Explanation:  

The description of the above java code can be given as:  

In the given code an array initialized elements in the next line an integer variable that is "len" is define this variable holds a length of the array and another variable "x" is defined that holds value 0.  Then we use loop in loop a conditional statement is used that checks in array if any number is even. If this condition is true so the value of x variable increases by 1 and prints its value.  

If you pass the array ar to the method m() like this, m(ar); the element ar[0] :
A. will be changed by the method m()
B. cannot be changed by the method m()
C. may be changed by the method m(), but not necessarily
D. None of these

Answers

Answer: (B)

Explanation:

Any changes on array made inside the function m() will only affect the ar[] present inside the function that means its scope is only within the function. The original array ar[] outside the fuction's scope won't change.

Give pseudocode for an algorithm that removes all negative values from an array, preserving the order of the remaining elements.

Answers

Answer:

Begin.

WRITE  ''enter test array''

READ test array

test [ ] = new_int [ ] { enter test array here, separated by comma}

int [ ] positives = Arrays.stream(test). filter(x -> x >= 0).toArray();

System. out. println( " Positive array");

for (int i : positives) {

      System.out.print(i+ "\t");  }

WRITE  positive array

End

Explanation

The pseudocode for the  alogirithm has been simplified above, it is implemented in Java 8

Which one of the following is not possible to view in the debug logs?

A. Workflow formula evaluation results
B. Assignment rules
C. Formula field calculations
D. Validation rules
E. Resources used by Apex Script

Answers

Answer:

Formula field calculations

Explanation:

We can use debug logs to track events in our company, these events are generated if active users have trace indicators.

A debug log can register information about database operations, system processes and errors, in addition, we can see Resources used by Apex, Workflow Rules, Assignment Rule, HTTP calls, and Apex errors, validation rules. The only one we cannot see is Formula field calculations.

How does the practice of storing personal genetic data in privately owned computer databases raise issues affecting information ownership and property-rights?

Answers

Answer:company privacy policy change, third party access, non-effective laws, database hacking

Explanation:

Company privacy policy:company privacy policy protecting consumer information may not be strong enough, and may also change unfavourably in the future depending on certain factors.

Third party access: company may be pressurized by law enforcement/government to release genetic data for state purposes.

Non-effective laws: state laws guarding genetic information of individuals might not be broad enough as to be effective.

Database hacking: company/private database might be a victim of computer hacking.

Using Structured Query Language (SQL), create a query that gets the following data from the sakila database:

Actor Last Name, Actor First Name, Film Title
For all actors with a last name that begins with M
In alphabetical order by Actor's Last Name

Answers

Queries to get data from sakila database using Structured Query Languange (SQL):

Assuming that you have created a Database already, with tables in it, containing at least 50 records and these fields:

ACTOR_LASTNAME, ACTOR_FIRSTNAME, FILM_TITLE

Take note that the database and table name is both "sakila".

1. We can fetch, display or get data using SELECT command or query. Let's type the command like this:

SELECT ACTOR_LASTNAME, ACTOR_FIRSTNAME, FILM_TITLE FROM sakila  

The command above is called SELECT command that would allow you to display records inside your table. Normally SQL programmers would execute SELECT * command, but since we are just required to display three (3) columns only, then we could just select the column names for our data display. Your columns are: SELECT ACTOR_LASTNAME, ACTOR_FIRSTNAME and FILM_TITLE.

2. For the second command or query, we can execute this:

SELECT ACTOR_LASTNAME FROM sakila WHERE ACTOR_LASTNAME 'M%' ORDER BY ACTOR_LASTNAME .

The select where command is like a conditional statement (IF). Where is the statement used to display ACTOR_LASTNAME field starting with letter M. The ORDER BY command is the arrangement of the names in alphabetical order.  

A data is a ____ large scale collection of data that contains and organizes all of an organizations data in one place.

Answers

Answer:

"Warehouse" is the correct answer for the given question.

Explanation:

The warehouse is the process that organized the data of the organizations or large data in one place. In the Data Warehouse, it organized and integrated the data from an organization or other sources in the one placed.

The main aim of Warehouse is to organized the data in one place which is used for the process of decision-making activity. The following are the function of the warehouse which is given below.

Extraction of data. Cleaning of data. Transformation of the data. Loading the data. Updating the data.

A rectangular range of cells with headings to describe the cells' contents is referred to as a?

A. bar chart.
B. complex formula.
C. table.
D. sparkline.

Answers

Answer:

Table

Explanation:

A table of information is a set of rows and columns. It is a way of displaying information.

For example if we want to organize the information in the rows and columns then we should make the table. These rows and columns are formed cells and cells gathers to make a table.

A rectangular range of cells with headings to describe the cells' contents is referred to as a Table.

How can this requirement be met? Universal Containers provide access to Salesforce for their Sales, Service and Marketing Teams. Management wants to ensure that when Users log in, their Home Tab provides access to Links and Documentation that are specifically relevant to their job function.
A. Create separate Home Page Custom Components and Layouts; assign to User by Role.
B. Expose specific elements within a Home Page Custom Component determined by Profile.
C. Create separate Home Page Custom Components and Layouts; assign to User by Profile
D. Expose specific elements within a Home Page Custom Component determined by Role.

Answers

Good luck and I hope u can find the right answer

What kind of app or technology would you like to create?  Why ?


Answers

Answer:

i would like to create an app that reminds old people or people with cancer to take their medications....

Explanation:

why: i would like to make this because my friends sister was 7 and had died from cancer due to not taking her medication...also i would like to because older people tend to forget or the have Alzheimer Disease and/or dementia and they cant remember to take their pills.

Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)
A. Files
B. Registry keys
C. Conditional constructs
D. GET/POST parameters

Answers

Answer: A. Files and B. Registry Keys

Explanation: Files are susceptible to insecure direct object reference attack.Files whether in a hard or soft copies can be highly susceptible to insecure direct object reference attack,by hacking through the internet or by tempering, detachment or copying of it for personal selfish gains.

Registry Keys if not properly secured are highly susceptible to insecure direct object reference attack,through detachment and used for personal selfish gains.

This program finds the sum and average of three numbers. What are the proper codes for Lines a and b?
number1=10
number2=20
number3=30
sum=number1+number2+number3
print ("Number1 is equal to " ,number1)
print ("Number2 is equal to ", number2)
print ("Number3 is equal to ", number3)
print ("The sum is ",sum)
Line a
Line b

Answers

Answer:

The Proper codes in Line a and Line b is given below

average=Sum/3  

print (" Average is = ", average)

Explanation:

In the given question it calculated the sum but the program does not calculate the average of the 3 numbers.The average of the 3 number is calculated by using average=Sum/3   statement so we add this code in Line a then After that print the value of average by using the print function so we add this code in Line b.

Answer:

The codes in line A and line B are given below:

average=sum divided by 3

Explanation:

Describe how tuples can be useful with loops over lists and dictionaries, and give Python code examples. Create your own code examples.

Answers

Answer:

The explained gives the merits of tuples over the lists and dictionaries.

Explanation:

Tuples can be used to store the related attributes in a single object without creating a custom class, or without creating parallel lists..

For example, if we want to store the name and marks of a student together, We can store it in a list of tuples simply:

data = [('Jack', 90), ('Rochell', 56), ('Amy', 75)]

# to print each person's info:

for (name, marks) in data:

       print(name, 'has', marks, 'marks')

# the zip function is used to zip 2 lists together..

Suppose the above data was in 2 parallel lists:

names = ['Jack', 'Rochell', 'Amy']

marks = [90, 56, 75]

# then we can print same output using below syntax:

for (name, marks) in zip(names, marks):

       print(name, 'has', marks, 'marks')

# The enumerate function assigns the indices to individual elements of list..

# If we wanted to give a index to each student, we could do below:

for (index, name) in enumerate(names):

       print(index, ':', name)

       

# The items method is used in dictionary, Where it returns the key value pair of

# the dictionary in tuple format

# If the above tuple list was in dictionary format like below:

marksDict = {'Jack': 90, 'Rochell': 56, 'Amy': 75}

# Then using the dictionary, we can print same output with below code:

for (name, marks) in marksDict.items():

       print(name, 'has', marks, 'marks')

Tuples are useful for looping over lists and dictionaries because of their immutability and hashable properties. They help maintain data integrity and efficiency.

Tuples are immutable sequences in Python, and they are often used when looping over lists and dictionaries to maintain data integrity and utilize their hashable properties in dictionaries.
Here are some examples,

Looping with Tuples Over Lists

When looping over a list of tuples, you can easily unpack the elements for use within the loop.
Here's a simple example,

students = [("John", 85), ("Jane", 92), ("Dave", 78)]

for name, score in students:
   print(f"Student: {name}, Score: {score}")

This code will output:

Student: John, Score: 85
Student: Jane, Score: 92
Student: Dave, Score: 78

Looping with Tuples Over Dictionaries

In dictionaries, tuples can be useful as keys because they are immutable and hashable. You can also convert dictionary items into tuples to easily iterate over them.
Here's an example,

grades = {"John": 85, "Jane": 92, "Dave": 78}

for name, score in grades.items():
   print(f"Student: {name}, Score: {score}")

This code will produce the same output as the previous example. Using tuples in this way helps preserve data integrity and allows for efficient key-value pair iteration.

An organization is granted the block 130.56.0.0/16. The administrator wants to create 1024 subnets.


A. Find the subnet mask.

B. Find the number of addresses in each subnet.

C. Find the first and last addresses in subnet 1.

D. Find the first and last addresses in subnet 1024.

Answers

Answer:

A. 255.255.255.192

B. 62 address

C. First 130.56.0.1 and last 130.56.0.62

D. First 130.56.255.193 and last 130.56.255.254

Explanation:

A. We have a class b address, we know that because end in 130.56.0.0/16

We want 1024 subsets this is equal 2^10 = 1024.

Then we sum both decimal number 10 + 16 = 26, we can represent in subnet mask like 255.255.255.192.

B. We already have used 26 bits, in total 32, we must use the rest of the bits for the address

32 - 26 = 6

2^6 = 64, but we use two per subnet cannot be allocated and subnet mask.

We have in total 62 address.

C. We have 62 address for logic the last address is 130.56.0.62, and the first one is 130.56.0.1, because we cannot use the 130.56.0.0

D. We could represent these address from this mask 255.255.255.192 where  First address is 130.56.255.193 and the last 130.56.255.254.

Consider the following base and derived class declarations: class BaseClass { public: void BaseAlpha(); private: void BaseBeta(); float baseField; }; class DerivedClass : public BaseClass { public: void DerivedAlpha(); void DerivedBeta(); private: int derivedField; }; For each class, do the following:

a) List all private data members.
b) List all private data members that the class's member functions can reference directly.
c) List all functions that the class's member functions can invoke.
d) List all member functions that a client of the class may invoke.

Answers

Final answer:

The private data members of BaseClass and DerivedClass are baseField and derivedField, respectively. Member functions of BaseClass can directly reference baseField and call BaseAlpha(), while DerivedClass member functions can access derivedField and can invoke DerivedAlpha(), DerivedBeta(), and the inherited BaseAlpha(). Clients may call BaseAlpha() for BaseClass and DerivedAlpha(), DerivedBeta(), and the inherited BaseAlpha() for DerivedClass.

Explanation:

Private Data Members and Member Functions in C++ Classes

In the given C++ classes, the private data members and member functions that can be accessed are:

BaseClass

a) Private data members: float baseField

b) Can reference directly: float baseField

c) Member functions can invoke: void BaseAlpha()

d) Client may invoke: void BaseAlpha()

DerivedClass

a) Private data members: int derivedField

b) Can reference directly: int derivedField

c) Member functions can invoke: void DerivedAlpha(), void DerivedBeta(), and inherited void BaseAlpha()

d) Client may invoke: void DerivedAlpha(), void DerivedBeta(), and inherited void BaseAlpha()

Note that private member functions are not listed as they cannot be accessed outside of the class definition. Also, the derived class has access to all of its own members as well as the public and protected members of its base class.

(1) Create three files to submit:
ItemToPurchase.h - Class declaration
ItemToPurchase.cpp - Class definition
main.cpp - main() function
Build the ItemToPurchase class with the following specifications:
Default constructorPublic class functions (mutators & accessors)
SetName() & GetName() (2 pts)
SetPrice() & GetPrice() (2 pts)
SetQuantity() & GetQuantity() (2 pts)
Private data members
string itemName - Initialized in default constructor to "none"
int itemPrice - Initialized in default constructor to 0
int itemQuantity - Initialized in default constructor to 0

Answers

Answer:

We have the files and codes below with appropriate comments

Explanation:

ItemToPurchase.h:

#pragma once

#ifndef ITEMTOPURCHASE_H_INCLUDED

#define ITEMTOPURCHASE_H_INCLUDED

#include<string>

#include <iostream>

using namespace std;

class ItemToPurchase

{

public:

    //Declaration of default constructor

    ItemToPurchase();

    //Declaration of SetName function

    void SetName(string ItemName);

    //Declaration of SetPrice function

    void SetPrice(int itemPrice);

    //Declaration of SetQuantity function

    void SetQuantity(int itemQuantity);

    //Declaration of GetName function

    string GetName();

    //Declaration of GetPrice function

    int GetPrice();

    //Declaration of GetQuantity function

    int GetQuantity();

private:

    //Declaration of itemName as

    //type of string

    string itemName;

    //Declaration of itemPrice as

    //type of integer

    int itemPrice;

    //Declaration of itemQuantity as

    //type of integer

    int itemQuantity;

};

#endif

ItemToPurchase.cpp:

#include <iostream>

#include <string>

#include "ItemToPurchase.h"

using namespace std;

//Implementation of default constructor

ItemToPurchase::ItemToPurchase()

{

    itemName = "none";

    itemPrice = 0;

    itemQuantity = 0;

}

//Implementation of SetName function

void ItemToPurchase::SetName(string name)

{

    itemName = name;

}

//Implementation of SetPrice function

void ItemToPurchase::SetPrice(int itemPrice)

{

    this->itemPrice = itemPrice;

}

//Implementation of SetQuantity function

void ItemToPurchase::SetQuantity(int itemQuantity)

{

    this->itemQuantity = itemQuantity;

}

//Implementation of GetName function

string ItemToPurchase::GetName()

{

    return itemName;

}

//Implementation of GetPrice function

int ItemToPurchase::GetPrice()

{

    return itemPrice;

}

//Implementation of GetQuantity function

int ItemToPurchase::GetQuantity()

{

    return itemQuantity;

}

main.cpp:

#include<iostream>

#include<string>

#include "ItemToPurchase.h"

using namespace std;

int main()

{

    //Declaration of ItemToPurchase class objects

    ItemToPurchase item1Cart, item2Cart;

    string itemName;

    //create a variable names like itemPrice

    //itemQuantity,totalCost as type of integer

    int itemPrice;

    int itemQuantity;

    int totalCost = 0;

    //Display statement for Item1

    cout << "Item 1:" << endl;

    cout << "Enter the item name : " << endl;

    //call the getline function

    getline(cin, itemName);

    //Display statememt

    cout << "Enter the item price : " << endl;

    cin >> itemPrice;

    cout << "Enter the item quantity : " << endl;

    cin >> itemQuantity;

    item1Cart.SetName(itemName);

    item1Cart.SetPrice(itemPrice);

    item1Cart.SetQuantity(itemQuantity);

    //call cin.ignore() function

    cin.ignore();

    //Display statement for Item 2

    cout << endl;

    cout << "Item 2:" << endl;

    cout << "Enter the item name : " << endl;

    getline(cin, itemName);

    cout << "Enter the item price : " << endl;

    cin >> itemPrice;

    cout << "Enter the item quantity : " << endl;

    cin >> itemQuantity;

    item2Cart.SetName(itemName);

    item2Cart.SetPrice(itemPrice);

    item2Cart.SetQuantity(itemQuantity);

    //Display statement

    cout << "TOTAL COST : " << endl;

    cout << item1Cart.GetName() << " " << item1Cart.GetQuantity() << " @ $" << item1Cart.GetPrice() << " = " << (item1Cart.GetQuantity()*item1Cart.GetPrice()) << endl;

    cout << item2Cart.GetName() << " " << item2Cart.GetQuantity() << " @ $" << item2Cart.GetPrice() << " = " << (item2Cart.GetQuantity()*item2Cart.GetPrice()) << endl;

    totalCost = (item1Cart.GetQuantity()*item1Cart.GetPrice()) + (item2Cart.GetQuantity()*item2Cart.GetPrice());

    cout << endl;

    cout << "Total : $" << totalCost << endl;

    return 0;

}

Examine the evolution of the World Wide Web (WWW) in terms of the need for a general-purpose markup language. Provide your perspective with cited sources on the need for XML and why it has gained traction on its own and in relationship to other evolutionary languages.

Answers

WWW is used to browse for view the webpage basically content is normally displayed as HTML pages.

In any browser's webpage irrespective of language been used output content display as HTML pages only.

Explanation:

In other methods is used XML format where it is opened and closed tag for every word editing XML file is very useful.XML tools are ready is available where end-user can edit or create by for example notepad++ extraIt is a language designed to store the data in a specific format and easily process and used by a coding language or web pages.

A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a file. The program should output the unique words and their frequencies in alphabetical order. Variations are to track sequences of two words and their frequencies, or n words and their frequencies. Below is an example file along with the program input and output: example.txt

Answers

Answer:

Python file with appropriate comments given below

Explanation:

#Take the input file name

filename=input('Enter the input file name: ')

#Open the input file

inputFile = open(filename,"r+")

#Define the dictionary.

list={}

#Read and split the file using for loop

for word in inputFile.read().split():

  #Check the word to be or not in file.

  if word not in list:

     list[word] = 1

  #increment by 1

  else:

     list[word] += 1

#Close the file.

inputFile.close();

#print a line

print();

#The word are sorted as per their ASCII value.

fori in sorted(list):

  #print the unique words and their

  #frequencies in alphabetical order.

  print("{0} {1} ".format(i, list[i]));

The program which produces a sorted output of words and frequency based on a read on text file is written in python 3 thus :

filename = input('Enter the your file name : ')

#accepts user input for name of file

input_file = open(filename,"r+")

#open input file in read mode

list= dict()

#initialize an empty dictionary

for word in input_file.read().split():

#Read each line and split the file using for loop

if word not in list:

list[word] = 1

#increment by 1

else:

list[word] += 1

#if word already exists in dictionary increase frequency by 1, if not assign a frequency of 1

input_file.close();

#close the file

for i in sorted(list):

print("{0} {1} ".format(i, list[i]));

#loop through and display the word and its corresponding frequency

Learn more : https://brainly.com/question/19114739

Write a function which sorts the queue in order from the smallest value to the largest value. This should be a modified version of bubble sort.

Answers

Answer:

#include <iostream>

using namespace std;

void swap(int *a,int *b){    //function to interchange values of 2 variables

   int temp=*a;

   *a=*b;

   *b=temp;

}

void sort(int queue[],int n)

{

   int i,j;

   for(i=0;i<n;i++)      //to implement bubble sort

   {

       for(j=0;j<n-i-1;j++)

       {

           if(queue[j]>queue[j+1])

               swap(queue[j],queue[j+1]);    //to swap values of these 2 variables

       }

   }

}

int main()

{

   int queue[]={6,4,2,9,5,1};

   int n=sizeof(queue)/4;  //to find length of array

   sort(queue,n);

   for(int i=0;i<n;i++)

       cout<<queue[i]<<" ";

   return 0;

}

OUTPUT :

1 2 4 5 6 9

Explanation:

In the above code, Queue is implemented using an array and then passed to a function sort, so that the queue can be sorted in ascending order. In the sort function, in each pass 2 adjacent values are compared and if lower index value is greater than the higher one they are swapped using a swap function that is created to interchange the values of 2 variables.

Role based access control

a. Oracle Label Security is an implementation of RBAC in the Oracle DBMS.
b. A well-formed transaction is a series of operations that transition a system from one consistent state to another consistent state.
c. Information tends to becomes over classified
d. Is better in situation in which we want to assign the rights not to the people, but to the specific job

Answers

Answer:

Is better in situation in which we want to assign the rights not to the people, but to the specific job

Explanation:

Definition

In an organization  to assigned the role in the network access based with in organization we RBAC.

Its model consists of

usersrolespermissions sessions

Therefore, we can say that, RBAC is better in situation in which we want to assign the rights not to the people, but to the specific job

Other Questions
Read the following excerpt about water availability to living organisms.Water covers 75 percent of Earth. 97 percent of water on Earth is salt water. Only 3 percent of water is available as fresh water, but most of this water is locked up in solid glaciers and polar ice caps.Based on this information, which is the best approximation of the amount of water on the planet that is available for animals to drink?1 percent3 percent10 percent75 percent An attitude of constantly seeking ways to improve company operations, including customer service, product quality, product features, the production process, and employee interactions, is called: Select one: a. Continuous improvement. b. Customer orientation. c. Just-in-time. d. Theory of constraints. e. Total quality measurement. Lana is trying to find an equation for a line that passes through (5, 2) and is parallel to 3x + 2y = 15. Explain the steps that Lana could take to determine the equation. A) Write 3x + 2y = 15 in slope-intercept form. Then, substitute the slope of that line and the point (5, 2) into the point-slope formula. B) Write 3x + 2y = 15 in slope-intercept form. Then, substitute the reciprocal of the slope of that line and the point (5, 2) into the point-slope formula. C) Write 3x + 2y = 15 in slope-intercept form. Then, substitute the opposite reciprocal of the slope of that line and the point (5, 2) into the point-slope formula. D) Write 3x + 2y = 15 in slope-intercept form. Then, substitute the opposite reciprocal of the slope of that line and the point (0, 0) into the point-slope formula. Assume that a simple random sample has been selected from a normally distributed population and test the given claim. Identify the null and alternative hypotheses, test statistic, P-value, critical value(s). and state the final conclusion that addresses the original claim. A safety administration conducted crash tests of child booster seats for cars. Listed below are results from those tests, with the measurements given in hie (standard head injury condition units). The safety requirement is that the hic measurement should be less than 1000 hic. Use a 0.05 significance level to test the claim that the sample is from a population with a mean less than 1000 hic. Do the results suggest that all of the child booster seats meet the specified requirement? 697 759 1266 621 569 432What are the hypothesesIdentify the test statisticIdentify the P-value.The critical value(s) is(are)State the final conclusion that addressses the original claimWhat do the results suggest about the child booster seats eeting the specific requirement? suppose your sat score is 2040 a college with an average sat score for admitted students of which of these would most likely be your best opinion a. 1640b. 2060c. 1220 d. 1480 Two points are located at (2,3) and (8,-5) complete the equations below to show how you can use the pythagorean theorem to find the distance between these two points What was the result of the 1902 Anthracite Coal Strike? What is the difference between acceleration and linear acceleration? To lock down security settings on an individual system on a network, what would you use? We discussed the different types of intermolecular forces in this lesson. Which type would you expect to find in CO2? Which of the following is found in plasma? A. Water B. Oxygen C. Hormones D. All of the above PA4-3 (Algo) Selecting Cost Drivers, Assigning Costs Using Activity Rates [LO 4-1, 4-3, 4-4, 4-6 ] Harbour Company makes two models of electronic tablets, the Home and the Work. Basic production information follows: Home Work Direct materials cost per unit $ 39 $ 63 Direct labor cost per unit 23 33 Sales price per unit 354 570 Expected production per month 730 units 470 units Harbour has monthly overhead of $184,260, which is divided into the following cost pools: Setup costs $ 72,540 Quality control 58,520 Maintenance 53,200 Total $ 184,260 The company has also compiled the following information about the chosen cost drivers: Home Work Total Number of setups 37 56 93 Number of inspections 300 365 665 Number of machine hours 1,600 1,200 2,800 Required: 1. Suppose Harbour uses a traditional costing system with machine hours as the cost driver. Determine the amount of overhead assigned to each product line. (Do not round intermediate calculations and round your final answers to the nearest whole dollar amount.) Which phrase refers to the inherent power of the state to protect persons legally incapable of protecting themselves? define thermodynamics ??? Saunjani states that only 7,500 women graduated with degrees in computer science last year yet women make up 85% of all consumer purchases and use social media at a rate 600% more than men. How do you feel about these statistics? Sonja is riding her bike. She takes her feetoff the pedals to freewheel down a hill.Describe the energy transfers that take place as the bike travels down the hill,Ignore friction and air resistance. If 84 grams of sodium chloride reacts with an excess amount of magnesium oxide, how many grams of sodium oxide will be produced Central to Renaissance thought was a(n)__________.a. fascination with the ancient world. b. deeply religious desire to withdraw from the world. c. desire to re-create the glory of Byzantium. d. appreciation for the art and thought of the middle ages. e. appreciation of secular Confucian thought that had been brought about by closer ties to China. 2.73 A fan within an insulated duct delivers moist air at the duct exit at 358C, 50% relative humidity, and a volumetric flow rate of 0.4 m3 /s. At steady state, the power input to the fan is 1.7 kW. The pressure in the duct is nearly 1 atm throughout. Using the psychrometric chart, determine the temperature, in 8C, and relative humidity at the duct inlet. Uber and Lyft customers often complain about the practice of ""surge"" or ""prime-time"" pricing used by these companies during periods of peak demand. This is an example of a __________ pricing policy. Steam Workshop Downloader