1. Write an application that inputs five numbers, each between 10 and 100, inclusive. As each number is read, display it only if it’s not a duplicate of a number already read. Provide for the "worst case," in which all five numbers are different. Use the smallest possible array to solve this problem. Display the complete set of unique values input after the user enters each new value. This is a sample run of your program: Enter·an·integer·between·10·and·100:100↵ This·is·the·first·time·100·has·been·entered↵ Enter·an·integer·between·10·and·100:100↵ Enter·an·integer·between·10·and·100:10↵ This·is·the·first·time·10·has·been·entered↵ Enter·an·integer·between·10·and·100:20↵ This·is·the·first·time·20·has·been·entered↵ Enter·an·integer·between·10·and·100:20↵ The·complete·set·of·unique·values·entered·is:↵ Unique·Value·1:·is·100↵ Unique·Value·2:·is·10↵ Unique·Value·3:·is·20

Answers

Answer 1

Answer:

Check the explanation

Explanation:

import java.util.Scanner;

public class DuplicateElimination {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       int arr[] = new int[5];

       int size = 0, n;

       for(int i = 0;i<5;i++){

           System.out.print("Enter an integer between 10 and 100:");

           n = scanner.nextInt();

           if(size==0 || elemanVarmı(arr,size,n)){

               System.out.println("This is the first time "+n+" has been entered");

               arr[size] = n;

               size++;

           }

       }

       System.out.println("The complete set of unique values entered is");

       for(int i = 0;i<size;i++){

           System.out.println("Unique Value "+(i+1)+": is "+arr[i]);

       }

   }

   private static boolean elemanVarmı(int dizi[], int size, int n)

   {

       for (int i = 0; i < size; i++)

       {

           if(dizi[i]==n)

           {

               return false;

           }

       }

       return true;

   }

}

Answer 2

Final answer:

The question is about designing a programming application that takes in up to five integers between 10 and 100 and displays each unique number entered by the user. The program maintains a small array to store the unique numbers and possibly includes functionality to determine the minimum and maximum values from the input, as well as error handling for invalid inputs.

Explanation:

Programming Unique Values Application

The application you're describing involves creating a program that accepts five integers between 10 and 100, inclusive. Each number entered by the user should be checked against the existing list of input numbers to determine if it is a duplicate. If it is not a duplicate, it should then be displayed and added to the list of unique values. To handle this scenario, the program could use an array with a length that corresponds to the maximum number of unique integers, which in the worst case would be five. As the user inputs each number, the program should check if the number is already present in the array. If it isn't, the number should be added to the array, and the current list of unique numbers should be displayed. This helps in avoiding the storage of duplicate numbers and efficiently manages the memory by using the smallest array necessary.

To extend the functionality, as indicated in Exercise 5.2, the same logical structure can be applied to also keep track and display the maximum and minimum value entered by the user at the end of the input sequence. We could also implement error handling to provide feedback if invalid input is given, similar to the approach outlined in Exercise 5.1 for detecting user input mistakes. This kind of functionality often involves iterative loops, array manipulation, and conditional statements to handle the logic.


Related Questions

Which example task should a developer use a trigger rather than a workflow rule for?
A. To set the primary contact on an account record when it is saved
B. To notify an external system that a record has been modified
C. To set the name field of an expense report record to expense and the date when it is saved
D. To send an email to a hiring manager when a candidate accepts a job offer

Answers

Answer:

A. To set the primary contact on an account record when it is saved

Explanation:

After updating a Contact and then you set the Primary checkbox, the contact becomes the primary contact and this then updates the reference in the Parent Account. Triggers are used for this purpose and not workflow rule. In this case there is only one contact at a time that is set as Primary Contacts, and in the case where an Account does not have any Contacts, the first contact that is created is made the primary and the trigger sets that value in reference.

Suppose we have an 8 block cache. Each block of the cache is one word wide. When a given program is executed, the processor reads data from the decimal addresses show below. 4, 7, 10, 11, 4, 8, 12, 7 Show the contents of the cache at the end of the above reading operations if the cache is 4-way set associative. Assume blocks will be filled starting at block position zero and the replacement policy is LRU. Use 4 or [ 4 ] to represent the contents of memory at address 4. If the block is empty, enter [ empty ].

Answers

Answer:

check the attached files below for answer.

Explanation:

Write a modular program that allows the user to enter a word or phrase and determines whether the word or phrase is a palindrome. A palindrome is a word or phrase that reads the same backwards as forwards. Examples include: civic, kayak, mom, noon, racecar, Never odd or even., and Was it a Rat I saw

Answers

Answer:

import java.util.Scanner;

public class num10 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a word");

       String word = in.nextLine();

       String reversed = "";

       //Get the length of the string entered

       int length = word.length();

       //Loop through the string and reverse th string

       for ( int i = length - 1; i >= 0; i-- )

           reversed = reversed + word.charAt(i);

       //Compare the two strings "word" and "reversed"

       if (word.equals(reversed))

           System.out.println(word+" is a palindrome");

       else

           System.out.println(word+" is not a palindrome");

   }

}

Explanation:

Since we know that a palindrome word is a word that reads the same forward and backward, The Idea here is:

To obtain a word from a user.  Use a for loop to reverse the word and store in another variableUse if....else to compare the two strings and determine if they are equal, if they are equal then the word is palindrome.

a text file has student data such that each line of text has a student first name (a non-empty alphabetic string) followed by exam scores (non-negative integers) separated by spaces. the number of scores might be different for each student, and each student has at least one score. see studentdata1, student data2, and student data3 in the drive folder homework. define a function student_minmax(filename) that has one parameter, the name of the file that has the student data, and returns a dictionary. the dictionary has the student names as keys and, as values, a list of two scores, the min and max scores for that student. for example, the call student_minmax('studentdata1.txt') will return the dictionary: {'joe': [5, 10], 'sue': [7, 10]}.

Answers

Answer:

def student_minmax(filename):  

  """

      Description: Reads student names and finds min and max score

      Input: Name of the file that has the student data

      Output: Dictionary with name as key and value is a list with min and max values

  """

  # Dictionary that holds the results

  studentDict = {}

  # Opening and reading file

  with open(filename, "r") as fp:

      # Reading data line by line

      for line in fp:

          # Stripping new line

          line = line.strip()

          # Splitting into fields

          fields = line.split(' ')

          # Getting name and scores

          name = fields[0]

          scores = []

          scoresStr = fields[1:]

          # Converting to integer

          for score in scoresStr:

              scores.append(int(score))

          # Storing in dictionary

          studentDict[name] = []

          studentDict[name].append(min(scores))

          studentDict[name].append(max(scores))

         

  # Returning dictionary

  return studentDict  

 

# Testing function

resDict = student_minmax("d:\\Python\\studentMarks.txt")

# Printing dict

print(resDict)

Explanation:

Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial number. Inside a loop, asks the user for a mathematical operation and a second number. Do the operation with the first number on the second number. Keep track of the result as a 'subtotal' to be used as the first number when going back to the top of the loop. When the user quits, print out the final result and quit the program. See output for an example for the behavior of the program. The operations should be at least

Answers

Answer:

num1 = float(input("Enter the first number: "))

while True:

   print("Add, Subtract, Multiply, Divide, or Quit ?")

   choice = input("Your choice is: ")

   if choice == "Quit":

       break

   num2 = float(input("Enter the second number: "))

   if choice == "Add":

       num1 += + num2

       print("The subtotal is: " + str(num1))

   elif choice == "Subtract":

       num1 -= num2

       print("The subtotal is: " + str(num1))

   elif choice == "Multiply":

       num1 *= num2

       print("The subtotal is: " + str(num1))

   elif choice == "Divide":

       num1 /= num2

       print("The subtotal is: " + str(num1))

print("The final result is: " + str(num1))

Explanation:

Ask the user for the first number

Create a while loop that iterates until specified condition occurs inside the loop

Ask the user for the operation or quitting

If the user chooses quitting, stop the loop. Otherwise, get the second number, perform the operation and print the subtotal

When the loop is done, the user enters Quit, print the final value result

______________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices. Improperly segmented network environment Malicious code or malware Insecure wireless Insecure remote access

Answers

Answer:

Viruses

Explanation:

A virus is an attack with malicious code that can affect the computer and can restrict specific things.

Banks have many different types of accounts often with different rules for fees associated with transactions such as withdrawals. Customers can transfer funds between accounts incurring the appropriate fees associated with withdrawal of funds from one account.Write a program with a base class for a bank account and two derived classes as described belowrepresenting accounts with different rules for withdrawing funds. Also write a function that transfers funds from one account of any type to anotheraccount of any type.A transfer is a withdrawal from one accountand a deposit into the other.

Answers

Answer:

See explaination

Explanation:

// Defination of MoneyMarketAccount CLASS

MoneyMarketAccount::MoneyMarketAccount(string name, double balance)

{

acctName = name;

acctBalance = balance;

}

int MoneyMarketAccount::getNumWithdrawals() const

{

return numWithdrawals;

}

int MoneyMarketAccount::withdraw(double amt)

{

if (amt < 0)

{

cout << "Attempt to withdraw negative amount - program terminated."<< endl;

exit(1);

}

if((numWithdrawals < FREE_WITHDRAWALS) && (amt <= acctBalance)){

acctBalance = acctBalance - amt;

return OK;

}

if((numWithdrawals >= FREE_WITHDRAWALS) &&((amt + WITHDRAWAL_FEE) <= acctBalance)){

acctBalance = acctBalance - (amt + WITHDRAWAL_FEE);

return OK;

}

return INSUFFICIENT_FUNDS;

}

// Defination of CDAccount CLASS

CDAccount::CDAccount(string name, double balance, double rate)

{

acctName = name;

acctBalance = balance;

interestRate = rate/100.0;

}

int CDAccount::withdraw(double amt)

{

if (amt < 0)

{

cout << "Attempt to withdraw negative amount - program terminated."<< endl;

exit(1);

}

double penalty = (PENALTY*interestRate*acctBalance);

if((amt + penalty) <= acctBalance){

acctBalance = acctBalance - (amt + penalty);

return OK:

}

else

return INSUFFICIENT_FUNDS;

}

void transfer (double amt, BankAccount& fromAcct, BankAccount& toAcct)

{

if (amt < 0 || fromAcct.acctBalance < 0 || toAcct < 0)

{

cout << "Attempt to transfer negative amount - program terminated."<< endl;

exit(1);

}

if(fromAcct.withdraw(amt) == OK){ // if withdraw function on fromAcct return OK, then me can withdraw amt from fromAcct

// and deposit in toAcct

toAcct.acctBalance = toAcct.acctBalance + amt;

}

}

Use greedy approach to implement fractional knapsack problem. a. Ask user for knapsack capacity. b. Ask user for n objects weights and profits or read an input.txt that contains n objects weights and profits. c. List objects that maximize the profit and show the maximum profit as output considering knapsack capacity.

Answers

Answer:

see explaination

Explanation:

/*

* To change this license header, choose License Headers in Project Properties.

* To change this template file, choose Tools | Templates

* and open the template in the editor.

*/

package knapsack;

import java.util.*;

/**

*

* atauthor Administrator

*/

public class MyKnapsack {

static int max(int a, int b) { return (a > b)? a : b; }

static int calculate(int W, int wt[], int val[], int n)

{

if (n == 0 || W == 0)

return 0;

if (wt[n-1] > W)

return calculate(W, wt, val, n-1);

else return max( val[n-1] + calculate(W-wt[n-1], wt, val, n-1),

calculate(W, wt, val, n-1)

);

}

public static void main(String[] args)

{

Scanner sc=new Scanner(System.in);

System.out.printf("|Enter value of capacity");

int Capacity =sc.nextInt();

System.out.printf("|Enter value of number of objects");

int n=sc.nextInt();

int profits[] = new int[n];

int weight[] = new int[n];

System.out.printf("|Enter values for profits");

for(int i=0;i<n;i++)

{

profits[i]=sc.nextInt();

}

System.out.printf("|Enter values for weights");

for(int j=0;j<n;j++)

{

weight[j]=sc.nextInt();

}

System.out.println(calculate(Capacity,weight, profits, n));

}

Note: change the at with the sign

}

You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we have 48 bits at our disposal in order to represent a number, in analogy with the IEEE 754 prototype. You are asked to provide: a) The types for evaluating this number b) The width of representation of these numbers (upper and lower) 6 c) The maximu

Answers

Answer:

Check the explanation

Explanation:

The most significant bit is the sign bit (S), with 0 for positive numbers and 1 for negative numbers.

   Normalize significand: 1.0 ? |significand| < 2.0

       Always has a leading pre-binary-point 1 bit, so no need to represent it explicitly (hidden bit)

   The following 9 bits represent exponent (E).(0 TO 511)

       E is : actual exponent + Bias

       Bias = 255;

   The remaining 38 bits represents fraction (F).

Width of representation

smallest value :

   Exponent: 000000001 because 000000000 is reserved

       actual exponent = 1 – 255 = –254

   Fraction: 000…00  \rightarrow significand = 1.0

Kindly check the attached image below to see the concluding solution to the question above.

Which of the following is not regression test case? A. A representative sample of tests that will exercise all software functions B. Additional tests that focus on software functions that are likely to be affected by the change C. Tests that focus on the software components that have been changed D. Low-level components are combined into clusters that perform a specific software sub-function

Answers

Answer:

D. Low-level components are combined into clusters that perform a specific software sub-function

Explanation:

Normally, regression testing are done on a manual basis by simply re-executing a subset of the entire available test cases or it can be done automatically by utilizing playback tools or automated capture. Hence, from the options, a combination of low-level components into clusters that perform a specific sub-function does not align with how regression testing are done either manually or automatically.

Low-level components are combined into clusters that perform a specific software sub-function. Thus option D is correct.

What is a regression test?

Regression testing is a statistical method of finding the relation between variables and is done by use of software such as functional and non-functional. It ensures that the development  of the software are made by utilizing playback tools or capture.

Thus, the options, are a combination of the low-level components into the clusters that perform specific sub-functions.

Find out more information about the regression.

brainly.com/question/13676957.

Write a loop to store the letters “f” through “w” in an array named letters. Then, print the contents of the array to the screen.

Answers

Answer:

#include<iostream>

#include<conio.h>

using namespace std;

main()

{

 

char a[18];

 

int k=102;

for (int j=0; j<18; j++)

{

a[j]=k;  

k=k+1;

 

}

 

cout<<"The Array of characters between f and W is Given below"<<endl;

for (int l=0;l<18;l++)

{

 cout<<a[l]<<endl;

}

getch();  

}

Explanation:

In this program, list of characters has been printed between f and w using for loop as per requirement. An array has been taken with name a and size 18, as there are 18 elements from f to w. As we know that ASCII code of Small f is 102 in decimal, we store that in another variable k. Start loop  and assign ASCII code of each alphabet using 'k' variable to array a. After that array of assigned alphabets has been printed.

Functional side effects: 15) Given the following Java/C++ like code. Assuming function calls (operands) are evaluated from left-to-right, one at a time. a) What outputs are printed to the screen? int a = 4; // global variable int fun1() { a = 2; return 3; } int fun2() { return a; } void main() { int x = fun1() + fun2(); System.out.println("x = " + x); } Answer: x = b) What outputs are printed to the screen? int a = 4; // global variable int fun1() { a = 2; return 3; } int fun2() { return a; } void main() { int x = fun2() + fun1(); System.out.println("x = " + x); } Answer: x =

Answers

Answer:

a. x = 5

b. x = 7

Explanation:

a)

OUTPUT: x = 5

In the main() function, fun1() is evaluated first and it updates the value of the global variable to 2 and returns 3.

The second function returns the value of the global variable 'a' and this variable has value 2.

So,

x = 3 + 2

x = 5

b)

OUTPUT: x = 7

In the main() function, fun2() is evaluated first and it returns 4 because global variable 'a' is initialized with value 4.

The second function fun()1 will returns the value 3.

So,

x = 4 + 3

x = 7

Write a program that illustrates rethrowing an exception. Define methods CISP401Method and CISP401Method2. Method CISP401Method2 should initially throw an exception. Method CISP401Method should call CISP401Method2, catch the exception and rethrow it. Call CISP401Method from method main, and catch the rethrown exception. Print the stack trace of this exception.

Answers

Answer:

See explaination

Explanation:

The code here:

import java.io.*;

public class CISP401V11A5 {

public static void main(String[] args) throws Exception {

try {

CISP401Method();

} catch (Exception e) {

System.out.println("Exception thrown in " + e.getStackTrace()[0].getMethodName() + "\n");

StringWriter sw = new StringWriter();

e.printStackTrace(new PrintWriter(sw));

String exceptionAsString = sw.toString();

String bagBegin = exceptionAsString.substring(0, 19);

String bagEnd = exceptionAsString.substring(19);

System.out.println(bagBegin + ": Exception thrown in " + e.getStackTrace()[0].getMethodName() + bagEnd);

}

}

public static void CISP401Method() throws Exception {

try {

CISP401Method2();

} catch (Exception e) {

throw e;

}

}

public static void CISP401Method2() throws Exception {

throw new Exception();

}

}

See attachment for sample output

he cost of an international call from New York to New Delhi is calculated as follows: connection fee,$1.99; $2.00 for the first three minutes; and $0.45 for each additional minute. Write a program thatprompts the user to input a number. The program should then output the number of minutes the calllasted and output the amount due. Format your output with two decimal places

Answers

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

int main ()

{

// Declare and initialize variables

float connecfee = 1.99;

float first3 = 2.00;

float addmin = 0.45; float cost;

int minutes;

// Prompt user for minutes talked

cout<<"Enter Number of Minutes: ";

cin>>minutes;

// Calculate cost;

if(minutes < 1)

{

cout<<"Enter a number greater than 0";

}

else if(minutes <= 3)

{

// Calculating cost for minutes less than or equal to 3

cost = connecfee + first3 * minutes;

cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;

}

else

{

cost = connecfee + first3 * 3 + addmin * (minutes - 3);

cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;

}

return 0;

}

// End of Program

You have been selected to find the best client-server computing architecture for a Web-based order entry system that is being developed for L.L. Bean. Write a short memo that describes to the project manager your reason for selecting an n-tiered architecture over a two-tiered architecture. In the memo, give some idea as to what different components of the architecture you would include.

Answers

Answer:

The N-tier architecture helps to manage all the components (business layer, presentation layer, and database layer) of an application under one roof.

Explanation:

n-tier client/server architecture logically separates the user interface, database, and procedural code (business logic) into

at least three separate tiers. The business logic resides in the middle tier and may run on one or more servers. The user

interface interacts with the middle-tier by remotely invoking procedures and receiving results. The concept is similar to

the use of database procedures except the middle tier procedures are not limited to the proprietary SQL of an RDBMS.

In addition, the interface, database, and business logic are often physically distributed to run on many different machines. When an n-tier application is distributed effectively, system resources are more efficiently used and applications have better performance.

N-tier client/server is able to scale to thousands of users because it does not have the one-client, one-connection requirement of two-tier client/server.

N-tier client/server applications use middleware to funnel client connections to the database server.

N-tier client/server provides many benefits when working with relational databases. Clients connect to the middle tier

instead of the database; thus shielding the client application developer from the complexity of the database structure. In

addition, by placing the SQL code inside server processes, the client application is shielded from database changes. When changes are made to the database, the middle-tier server process must be modified, but the client applications can remain unaffected. If several client applications share the same server process, the change only needs to be made in one place.

N-tier/client server has been used to create complex applications that would be difficult, if not impossible, to create using a two-tier approach.

This optically active alkene was treated with HBr with and without peroxides. One of these reactions lead to the formation of two products, one of which is not optically active. The other reaction gives a single new product that is optically active. Which of the below statements best explains the observed results

Answers

HBr adds to an optically active alkene via electrophilic addition resulting in 'Markovnikov' regioselectivity without peroxides, and via free radical addition leading to 'anti-Markovnikov' regioselectivity with peroxides, leading to the formation of a mixture that includes an optically inactive product.

The observed reactions are explained by different mechanisms by which HBr adds to an optically active alkene. In the absence of peroxides, the HBr adds through an electrophilic addition mechanism with 'Markovnikov' regioselectivity, resulting in a single optically active product. This is because the more substituent-rich carbon of the double bond preferentially receives the bromine in accordance with Markovnikov's rule.

Conversely, in the presence of peroxides, the HBr adds via a free radical mechanism resulting in 'anti-Markovnikov' regioselectivity. Here, a bromine atom attaches to the less substituted carbon forming two possible products: one optically active and one not, indicating syn and anti addition that produces both cis and trans isomers. The steps involved include radical initiation, propagation, and eventual termination.

) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Answer the following: (i) Approximately how long will it take to handle a data set of 1500 records? Why? (ii) How long will it take to handle a data set of 5000 records? Can you come up with a reason why this will not be entirely accurate but will just be an approximation?

Answers

Answer:

i) The time taken for 1500 records = 15 seconds.

ii) The time taken for 1500 records = 50 seconds.

Explanation:

A is an O(n) algorithm.

An algorithm with O(n) efficiency is described as a linearly increasing algorithm, this mean that the rate at which the input increases is linear to the time needed to compute that algorithm with n inputs.

From the question, it is given that for 1000 records, the time required is: 10 seconds.

Algorithm time taken is O(n)

Hence,

1) For 1,500 records

=> 10/1000 = x/1500

=> 10x1500/1000 = x

x = 15 seconds

Thus, the time taken for 1500 records = 15 seconds.

2) For 5,000 records

=> 10/1000 = x/5000

=> 10x5000/1000 = x

x = 50 seconds

Thus, the time taken for 1500 records = 50 seconds.

This project is to mimic a meeting request system by checking the requesting party’s validity, and the number of people attending. Then it will make a decision as to whether the meeting can take place and display an informative message.

Display a welcome message and then ask the user to enter his/her name Display a personal welcome message by addressing the user by his/her name. Declare a constant and assign a number to it as the Conference Room capacity.

Ask the user how many people are attending the meeting. Display a meaningful message for each of the three different scenarios. The message informs the user whether he/she can have the requested room and also displays the number of people that must be excluded or that can still be invited based on the room capacity. Here are the three scenarios.

people attending are fewer than the Room Capacity
people attending are more than the Room Capacity
people attending are exactly the same as the Room Capacity

The system will keep running until the user quits (meaning all this happens in a loop)

Answers

Answer:

See explaination for the program code

Explanation:

Meeting.java

------

import java.util.Scanner;

public class Meeting {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

final int ROOM_CAPACITY = 100;

int numPeople, diff;

String name;

System.out.println("****** Meeting Organizer ******");

System.out.print("Enter your name: ");

name = input.nextLine();

System.out.println("Welcome " + name);

do{

System.out.print("\nHow many people would attend the meeting? (type 0 to quit): ");

numPeople = input.nextInt();

if(numPeople < 0)

System.out.println("Invalid input!");

else if(numPeople != 0)

{

if(numPeople > ROOM_CAPACITY)

{

diff = numPeople - ROOM_CAPACITY;

System.out.println("Sorry! The room can only accommodate " + ROOM_CAPACITY +" people. ");

System.out.println(diff + " people have to drop off");

}

else if(numPeople < ROOM_CAPACITY)

{

diff = ROOM_CAPACITY - numPeople;

System.out.println("The meeting can take place. You may still invite " + diff + " people");

}

else

{

System.out.println("The meeting can take place. The room is full");

}

}

}while(numPeople != 0);

System.out.println("Goodbye!"); }

}

output

---

****** Meeting Organizer ******

Enter your name: John

Welcome John

How many people would attend the meeting? (type 0 to quit): 40

The meeting can take place. You may still invite 60 people

How many people would attend the meeting? (type 0 to quit): 120

Sorry! The room can only accommodate 100 people.

20 people have to drop off

How many people would attend the meeting? (type 0 to quit): 100

The meeting can take place. The room is full

How many people would attend the meeting? (type 0 to quit): 0

Goodbye!

[1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Primary Key: ____________________________ [2] Please find all the functional dependencies ________________________________________________ _________________________________________________ __________________________________________________ _____________________________________________________ [3] Please find out the second normal form (in relational schema). [4] Please find out the third normal form.

Answers

Answer:

Check the explanation

Explanation:

1. The atomic attributes can't be a primary key because the values in the respective attributes should be unique.

So, the size of the primary key should be more than one.

In order to find the candidate key, let the functional dependencies be obtained.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

Closure of attribute { Emp_ID, Date_Completed } is { Emp_ID, Date_Completed , Name, DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Name , Date_Completed } is { Name, Date_Completed , Emp_ID , DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { DeptID, Date_Completed } is { DeptID, Date_Completed , Emp_ID,, Name, , Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Marketing, Date_Completed } is { Marketing, Date_Completed , Emp_ID,, Name, DeptID , Salary, Course_Name, Course_ID}.

So, the candidate keys are :

{ Emp_ID, Date_Completed }

{ Name , Date_Completed }

{ DeptID, Date_Completed }

{ Marketing, Date_Completed }

Only one candidate key can be a primary key.

So, the primary key chosen be { Emp_ID, Date_Completed }..

2.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

3.

For a relation to be in 2NF, there should be no partial dependencies in the set of functional dependencies.

The first F.D. is

Emp_ID -> Name, DeptID, Marketing, Salary

Here, Emp_ID -> Salary ( decomposition rule ). So, a prime key determining a non-prime key is a partial dependency.

So, a separate table should be made for Emp_ID -> Salary.

The tables are R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

and R2( Emp_ID , Salary)

The following dependencies violate partial dependency as a prime attribute -> prime attribute :

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

The following dependencies violate partial dependency as a non-prime attribute -> non-prime attribute :

Course_ID -> Course Name

Course_Name ->  Course_ID

So, no separate tables should be made.

The functional dependency Date_Completed -> Course_Name has a partial dependency as a prime attribute determines a non-prime attribute.

So, a separate table is made.

The final relational schemas that follows 2NF are :

R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

R2( Emp_ID , Salary)

R3 (Date_Completed, Course_Name, Course_ID)

For a relation to be in 3NF, the functional dependencies should not have any transitive dependencies.

The functional dependencies in R1(Emp_ID, Name, DeptID, Marketing, Date_Completed) is :

Emp_ID -> Name, DeptID, Marketing

This violates the transitive property. So, no table is created.

The functional dependencies in R2 (  Emp_ID , Salary) is :

Emp_ID -> Salary

The functional dependencies in R3 (Date_Completed, Course_Name, Course_ID) are :

Date_Completed -> Course_Name

Course_Name   ->  Course_ID

Here there is a transitive dependency as a non- prime attribute ( Course_Name ) is determining a non-attribute ( Course_ID ).

So, a separate table is made with the concerned attributes.

The relational schemas which support 3NF re :

R1(Emp_ID, Name, DeptID, Course_ID, Marketing, Date_Completed) with candidate key as Emp_ID.

R2 (  Emp_ID , Salary) with candidate key Emp_ID.

R3 (Date_Completed, Course_Name ) with candidate key Date_Completed.

R4 ( Course_Name, Course_ID ).  with candidate keys Course_Name and Course_ID.

Write a method void Print(int LastNumber, int numbersPerLine) that receives two integers

lastnumber and numbersPerLine. The program should print all the numbers from 1 to lastnumber,

numbersperline each line. The last line should contain the remaining numbers.​

Answers

Answer:

Code is in the attached screenshot.

Explanation:

Assumed it was written in Java based on your other question asked.

Write a SELECT statement that returns one row for each category that has products with these columns: The CategoryName column from the Categories table The count of the products in the Products table The list price of the most expensive product in the Products table Sort the result set so the category with the most products appears first.

Answers

Final answer:

A SQL SELECT statement is required to join Categories and Products tables, count the products per category, find the maximum price of products in each category, and sort by the number of products, with the highest number first.

Explanation:

The student has asked for a SELECT statement that retrieves data from two tables, namely Categories and Products. The query should result in each category listed along with the count of products in that category and the price of the most expensive product within that category. Lastly, the result should be sorted so that the category with the highest number of products appears first.

To fulfill these requirements, a SQL statement that joins the two tables on their respective category identifiers, counts the number of products, finds the maximum list price, and sorts the results by the count of products in descending order is needed.

The SELECT statement will look like this:

SELECT
   Categories.CategoryName,
   COUNT(Products.ProductID) AS ProductCount,
   MAX(Products.ListPrice) AS MostExpensiveProduct
FROM
   Categories
JOIN
   Products ON Categories.CategoryID = Products.CategoryID
GROUP BY
   Categories.CategoryName
ORDER BY
   ProductCount DESC;

If I asked you to design a client server application that would work as a progressive slot machine (if you don't know what that is look it up before proceeding) client server application...what three choices would you make for that, why? Is the design much different from the time synchronization server?

Answers

Answer:

Explanation:

Iterative vs Concurrent:

An iterative server handles both the association demand and the exchange engaged with the call itself. Iterative servers are genuinely straightforward and are reasonable for exchanges that don't keep going long.

Be that as it may, if the exchange takes additional time, lines can develop rapidly, when Client A beginnings an exchange with the server, Client B can't make a call until A has wrapped up.

In this way, for extensive exchanges, an alternate kind of server is required — the simultaneous server, Here, Client A has just settled an association with the server, which has then made a youngster server procedure to deal with the exchange. This permits the server to process Client B's solicitation without trusting that An's exchange will finish. Beyond what one youngster server can be begun along these lines. TCP⁄IP gives a simultaneous server program called the IMS™ Listener.

Some idea on on time synchronization is Synchronization of Clocks: Software-Based Solutions

Techniques:

1.time stamps of real-time clocks

2.message passing

3. round-trip time (local measurement)

4.Cristian’s algorithm

5.Berkeley algorithm

6.Network time protocol (Internet)

A system time server isn't something numerous entrepreneurs consider, and timekeeping is generally not a need for organize executives. In any case, legitimate system time synchronization is a fundamental piece of checking a system and settling issues inside it.

Write an application for a condo owner on a Florida Beach. The owner wants an application to be able to accept the season for the rental and the amount of days of the customer wishes to rent the condo. Based on each, the application will determine a final price for the rental.

Answers

Answer:

in_season_price = 120.0

off_season_price = 70.0

price = 0

season = input("Which season you plan to rent \"IN/OFF\" season: ")

days = int(input("Enter the days you want to rent: "))

if season == "IN":

   price = in_season_price * days

elif season == "OFF":

   price = off_season_price * days

print("Rental price is: " + str(price))

Explanation:

Set the prices for in and off season

Ask the user to choose the season and number of days they want to stay

Depending on the user choice calculate the price, multiply the season price with the number of days

Print the total price

g given the signature of a function void ascendingwords(char sentence[], int size), where sentence is an array of characters(i.e. a null terminated string) and size is the amount of memory allocated for the buffer sentence. Complete the function to print the words in the sentence in an ascending order. the user needs to provide the input. for example if the sentence is Programming is Fun. then the function should print the output Fun is Programming

Answers

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

// Function starts here

string ascendingwords(string sentence)

{

// Calculate length of input text

int len = sentence.length() - 1;

// Create a begin and end variable

int begin, end = len + 1;

// Declare and initialize an output string

string output = "";

// Perform iteration while there's still some text in the input string

while(len >= 0)

{

if(sentence[len] == ' ')

{

begin = len + 1;

while(begin != end)

output += sentence[start++];

output += ' ';

end = len;

}

len--;

}

begin = 0;

while(begin != end)

output += sentence[begin++];

return output;

}

// Main method starts here

int main()

{

// Declare string

string sentence;

// Prompt user for input

cout<<"Enter a string: ";

cin>>sentence;

cout <<ascendingwords(sentence);

return 0;

}

Create a class that stores an array of usable error messages. Create an OrderException class that stores one of the messages. Create an application that contains prompts for an item number and quantity. Allow for the possibility of nonnumeric entries as well as out-of-range entries and entries that do not match any of the currently available item numbers. The program should display an appropriate message if an error has occurred. If no errors exist in the entered data, compute the user’s total amount due (quantity times price each) and display it.

Answers

Answer:

Check the explanation

Explanation:

Given below is the code for the question.

import java.util.*;

public class PlaceAnOrder

{

  public static void main(String[] args)

  {

      final int HIGHITEM = 9999;

      final int HIGHQUAN = 12;

      int code;

      int x;

      boolean found;

      final int[] ITEM = {111, 222, 333, 444};

      final double[] PRICE = {0.89, 1.47, 2.43, 5.99};

      int item;

      int quantity;

      double price = 0;

      double totalPrice = 0;

      Scanner input = new Scanner(System.in);

      try{

          System.out.print("Enter Item number: ");

          if(input.hasNextInt()){

              item = input.nextInt();

              if(item < 0)

                  throw new OrderException(OrderMessages.message[2]);

              if(item > HIGHITEM)

                  throw new OrderException(OrderMessages.message[3]);

             

              System.out.print("Enter Item quantity: ");

              if(input.hasNextInt()){

                  quantity = input.nextInt();

                 

                  if(quantity < 1)

                      throw new OrderException(OrderMessages.message[4]);

                  if(quantity > HIGHQUAN)

                      throw new OrderException(OrderMessages.message[5]);

                  found = false;

                  for(int i = 0; i < ITEM.length; i++){

                      if(ITEM[i] == item){

                          found = true;

                          totalPrice = PRICE[i] * quantity;

                          break;

                      }

                  }

                  if(!found)

                      throw new OrderException(OrderMessages.message[6]);

                  System.out.println("Total Amount due: $" + totalPrice);

              }

              else

                  throw new OrderException(OrderMessages.message[1]);

          }

          else

              throw new OrderException(OrderMessages.message[0]);

      }catch(OrderException e){

          System.out.println(e.getMessage());

      }

  }

}

. Write a toString method for this class. The method should return a string containing the base, height and area of the triangle. b. Write an equals method for this class. The method should accept a Triangle object as an argument. It should return true if the argument object contains the same data as the calling object, or false otherwise. c. Write a greaterThan method for this class. The method should accept a Triangle object as an argument. It should return true if the argument object has an area that is greater than the area of the calling object, or false otherwise.

Answers

Answer:

Check the explanation

Explanation:

Circle.java

public class Circle {

private double radius;

public Circle(double r) {

radius = r;

}

public double getArea() {

return Math.PI * radius * radius;

}

public double getRadius() {

return radius;

}

public String toString() {

String str;

str = "Radius: " + radius + "Area: " + getArea();

return str;

}

public boolean equals(Circle c) {

boolean status;

if (c.getRadius() == radius)

status = true;

else

status = false;

return status;

}

public boolean greaterThan(Circle c) {

boolean status;

if (c.getArea() > getArea())

status = true;

else

status = false;

return status;

}

}

I have created a class also to test this class below is the class: -

MainCircle.java

public class MainCircle {

public static void main(String args[]) {

Circle c = new Circle(2.5);

Circle c1 = new Circle(2.5);

Circle c2 = new Circle(4.5);

System.out.println(c);

System.out.println(c1);

System.out.println(c2);

System.out.println("Is c and c1 equal : "+c.equals(c1));

System.out.println("Is c2 greater than c1 : "+c1.greaterThan(c2));

}

}

Output: -

Radius: 2.5Area: 19.634954084936208

Radius: 2.5Area: 19.634954084936208

Radius: 4.5Area: 63.61725123519331

Is c and c1 equal : true

Is c2 greater than c1 : true

Write a Python class named Rectangle constructed by a length and width. methods it should have Area()- this should return the area as a value Perimeter()- this should return the total of all the sides as a value Print()- this should print the rectangle such that "Length X Width" Should ask the user to enter the width and length

Answers

Answer:

class Rectangle:

   def __init__(self, length=1, width=1):

       self.length = length

       self.width = width

   def Area(self):

       return self.length * self.width

   def Perimeter(self):

       return 2 * (self.length + self.width)

   def Print(self):

       print(str(self.length) + " X " + str(self.width))

l = float(input("Enter the length: "))

w = float(input("Enter the width: "))

a = Rectangle(l, w)

print(str(a.Area()) + " " + str(a.Perimeter()))

a.Print()

Explanation:

Create a class called Rectangle

Create its constructor, that sets the length and width

Create a method Area to calculate its area

Create a method Perimeter to calculate its perimeter

Create a Print method that prints the rectangle in the required format

Ask the user for the length and width

Create a Rectangle object

Calculate and print its area and perimeter using the methods from the class

Print the rectangle

Answer:

class Rectangle():

   def __init__(self, l, w):

       self.len = l

       self.wi  = w

   def area(self):

     return self.len*self.wi

   def perimeter(self):

     return self.len+self.len+self.wi+self.wi

   def printing(self):

     print('{} Lenght X Width {}'.format(self.len, self.wi))

length = int(input("enter the length "))

width = int(input("enter the width "))

newRectangle = Rectangle(length, width)

newRectangle.printing()

print("Area is: ")

print(newRectangle.area())

print("The perimeter is: ")

print(newRectangle.perimeter())

Explanation:

The class rectangle is defined with a constructor that sets the length and width

As required the three methods Area, perimeter and printing are also defined

The input function is used to prompt and receive user input for length and width of the rectangle

An object of the Rectangle class is created and initalilized with the values entered by the user for length and width

The three methods are then called to calculate and return their values

5.5 Learning Objective: To demonstrate that the student understands the definition of Big O. To demonstrate that the student understands how to derive the function f(n) which computes how many times the key operation of an algo- rithm is performed as a function of the size of the problem. Instructions: This exercise is graded, so include your solution in your word processing document. Problem: Continuing with the previous exercise, derive a function f(n) which equates to the number of times the key operation is performed as a function of n, where n is the size of pList. State the worst case time complexity of split() in Big O notation. You do not need to formally prove it but explain your answer.

Answers

Answer:

See explaination

Explanation:

Anytime we want to compute time complexity of an algorithm with input size n denoted as T(n).

And then check growth rate of that algorithm with any large number of input n.

We have to first obtain f(n) of that algorithm .

f(n) is total execution time of algorithm in terms of n.

we want write this function with growth rate notation.

we know there are basic three notations

1. big oh(O) notation

2.theta(Θ) notation

3. big omega(Ω) notation

we want explain big oh(O) notation

Here is the formal mathematical definition of Big O.

also called asymptotic upper bound

Let T(n) and f(n) are two positive functions. We write T(n) ∊ O(f(n)), if there are positive constants c and n₀ such that

T(n) ≤ c·f(n) for all n ≥ n₀.

This graph shows a situation where all of the conditions in the definition are exist. (see attachment for graph)

c.fin) T(n) cost no

we can say

T(n) ∊ O(f(n)) means that growth rate of T(n) is not faster than f(n).

example

T(n) = n -1. Using Big O notation this can be written as T(n) ∊ O(n).

let c = 1 and n₀ = 1,

then T(n) = n - 1 ≤ 1·n when n ≥ 1.

Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that allocates three identical printers to these processes, using the priority numbers for deciding the order of allocation.

Answers

Answer:

See explaination

Explanation:

The code

type printer = monitor

var P: array[0…2] of boolean;

X: condition;

procedure acquire (id: integer, printer-id: integer);

begin

if P[0] and P[1] and P[2] then X.wait(id)

if not P[0] then printer-id := 0;

else if not P[1] then printer-id := 1;

else printer-id := 2;

P[printer-id]:=true;

end;

procedure release (printer-id: integer)

begin

P[printer-id]:=false;

X.signal;

end;

begin

P[0] := P[1] := P[2] := false;

end ;

Note:

Monitors are implemented by using queues to keep track of the processes attempting to become active int he monitor. To be active, a monitor must obtain a lock to allow it to execute the monitor code. Processes that are blocked are put in a queue of processes waiting for an unblocking event to occur.

This solution utilizes a monitor to allocate printers to processes based on their unique priority numbers.

To allocate three identical printers to a system of processes P1, P2, ..., Pn, each of which has a unique priority number, we can utilize a monitor structure.
The monitor ensures that higher priority processes get access to the printers before lower priority ones.
Here is a pseudocode example of how such a monitor can be implemented,

monitor PrinterAllocation {
   int availablePrinters = 3;
   condition printerAvailable;
   int[] priorityQueue = new int[n]; // stores process IDs based on priority
   boolean[] waiting = new boolean[n]; // to track waiting processes

   // Function to request a printer
   procedure requestPrinter(int processID, int priority) {
       priorityQueue[priority] = processID;
       waiting[processID] = true;
       while (availablePrinters == 0 || !highestPriority(processID)) {
           printerAvailable.wait();
       }
       waiting[processID] = false;
       availablePrinters--;
   }

   // Function to release a printer
   procedure releasePrinter() {
       availablePrinters++;
       printerAvailable.signalAll();
   }

   // Check if the process has the highest priority among the waiting ones
   boolean highestPriority(int processID) {
       for (int i = 0; i < n; i++) {
           if (waiting[priorityQueue[i]] && priorityQueue[i] != processID) {
               return false;
           }
       }
       return true;
   }
}

In this solution, the monitor uses a condition variable printerAvailable to manage the allocation based on priorities.
The requestPrinter procedure adds processes to the priority queue and waits if no printer is available or if there is a process with a higher priority waiting.
The releasePrinter procedure increases the count of available printers and signals all waiting processes.
The highestPriority function ensures that the highest priority process gets the printer first.

JAVA
Write a function that calculates a total amount of money a worker has made when given the initial salary (per month) and months worked. Every year the worker is at the job, their salary increases by $100 per month.

public static int totalPay(int initial_salary, int months){
}

Answers

Answer:

Answer provided in screenshot, not really too happy with my implementation but it works.

Explanation:

Iterate through months, handling logic for every 12 months to get the raise.

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

What is the coding ?

public class FooCorporation {

   static final double minimumWage = 8.0; // static means that can be accessed without creating an object of the class and instantiating it

   static final int maxHours = 60; // final means constant = cannot be changed after declared

static double basePay=0; // initialize them to zero, at least you know your program won't throw null pointer exception if forgot to set their

                            //values before invoking the method

static int hoursWorked=0;

public static void main(String[] args) {

Scanner in = new Scanner(System.in);

for (int i=1; i<=3; i++, System.out.println()){

System.out.println("For Employee Number: " + i);

System.out.println("Enter Base Pay:");

basePay = in.nextDouble();

System.out.println("Enter Hours Worked:");

hoursWorked = in.nextInt();

salaryCalculation();

}

}

public static void salaryCalculation(){

double totalSalary = 0;

 if ((basePay < minimumWage) || (hoursWorked > maxHours)){

  System.out.println("Error!");

  }

else {  

if (hoursWorked > totalSalary = basePay * 40 + 1.5*basePay*(hoursWorked - 40);

 }

 else {

 totalSalary = basePay * hoursWorked;

  }

  System.out.println("Your total salary is " + totalSalary);

  }

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

To learn more about Java refer to:

https://brainly.com/question/26642771

#SPJ2

Other Questions
If ya could answer these questions about the reproductive system. I'm honestly to lazy to answer them myself. 1. Describe the function of the ovaries and testes.2. Summarize the purpose of the Uterus.3. Explain the functions of the cervix.4. Define gametes and explain why they are essential to reproduction. QUE TRANSA RASA ... CUANDO VAMOS A COTORREAR ? 10 pointsExplain the historical circumstances that led to British attitudes abouttheir empire as shown in the excerpt from An ABC for Baby Patriots.Document 1is for Colonies.Rightly we boast.That of all the great nationsGreat Britain has mostB stands for BattlesBy which England's nameHas for ever been coveredWith glory and fame.E is our EmpireWhere sun ser sets,The larger we make itThe bigger it getsSource: Mrs Ernest Ames An ABC for Banu Parriors Den Petrus Framing's cost formula for its supplies cost is $1,750 per month plus $9 per frame. For the month of March, the company planned for activity of 615 frames, but the actual level of activity was 622 frames. The actual supplies cost for the month was $7,850. The activity variance for supplies cost in March would be closest to: Multiple Choice $63 U $565 U $565 F On November 30, Petrov Co. has $105,400 of accounts receivable and uses the perpetual inventory system. Dec. 4 Sold $6,505 of merchandise (that had cost $4,163) to customers on credit, terms n/30. 9 Sold $14,756 of accounts receivable to Main Bank. Main charges a 2% factoring fee. 17 Received $3,578 cash from customers in payment on their accounts. 27 Borrowed $8,432 cash from Main Bank, pledging $10,962 of accounts receivable as security for the loan. (1) Prepare journal entries to record the above transactions. (2) Which transaction would most likely require a note to the financial statements? If the variance of the water temperature in a lake is 30, how many days should the researcher select to measure the temperature to estimate the true mean within 4 with 95% confidence? Round the intermediate calculations to two decimal places and round up your final answer to the next whole number Your reading plan should include:O. A. a well-organized schedule of your study time for the day.OB. a written list of your long-term goals.OC. getting help with unknown words or confusing phrases.OD. a list of vocabulary words you've been studying recently.< PREVIOUS This is due, in part, to damage from the first episode. The performance of a new drug designed to prevent a second episode is to be tested for its effectiveness in preventing a second episode. In order to do this two groups of people suffering a first episode are selected. There are 163 people in the first group and this group will be administered the new drug. There are 160 people in the second group and this group wil be administered a placebo. After one year, 13% of the first group has a second episode and 14% of the second group has a second episode. Select a 90% confidence interval for the difference in true proportion of the two groups. Despite Aristotle and Plato's differing ideas about government, they shared a Find the volume of this prism A uranium nucleus is traveling at 0.94 c in the positive direction relative to the laboratory when it suddenly splits into two pieces. Piece A is propelled in the forward direction with a speed of 0.43 c relative to the original nucleus. Piece B is sent backward at 0.34 c relative to the original nucleus. Find the velocity of piece A as measured by an observer in the laboratory. Do the same for piece B. Scientists publish a revised list of dangerous greenhouse gases. Which statements describe the importance of thisinformation? Check all that apply.-It confirms the need for oil fracking to produce energy.-It determines the connection this information has to glacier melting.-It assesses how many coal power plants to add in a community.-It supports laws that protect the public from environmental hazards.-It leads to new jobs that search for innovative ways to control emissions. Ribosomes are the site where are produced. A fossil is discovered that has only 12.5% of the carbon-14 that it would have had originally (when the animal was alive). If the half-life of carbon-14 is 5700 years, approximately how old is the fossil? You are given a long length of string and an oscillator that can shake one end of the string at any desired frequency. The oscillator has a display that indicates the frequency. You are asked to design an experiment to study how the velocity of waves on the string depends on the string's tension. You do not have any way to measure time with sufficient accuracy to help in your investigation. A. Describe your experimental setup and procedure, including any additional pieces of equipment you would need and the kind of data you would record. Include enough detail that another student could follow and complete the experiment successfully. B. Describe how you would analyze your data to obtain information about the wave velocity's dependence on tension. 2560 divided by 11 equals what A square pizza box has a width of 24. What it the area of the largest circular pizza that could fit in the box? Which phrases have strong connotations that support the authors purpose Science is seldom advanced in isolation. Watson and Crick could not have arrived at their model of the helix without discovery of the structure of and how they are linked together, X-ray crystallography data, or biochemical analysis of the molar proportions of in double-stranded . Un tringulo issceles ,la altura al lado desigual mide 1 cm mas que longitud de ese lado . Calcula el valor de dicha altura sabiendo que el area es de 6 cm