Answer:
// This program is written in C++ programming language
// Comments are used for explanatory purpose
// Program starts here
#include<iostream>
using namespace std;
int main ()
{
// Declare and initialize variables
float connecfee = 1.99;
float first3 = 2.00;
float addmin = 0.45; float cost;
int minutes;
// Prompt user for minutes talked
cout<<"Enter Number of Minutes: ";
cin>>minutes;
// Calculate cost;
if(minutes < 1)
{
cout<<"Enter a number greater than 0";
}
else if(minutes <= 3)
{
// Calculating cost for minutes less than or equal to 3
cost = connecfee + first3 * minutes;
cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;
}
else
{
cost = connecfee + first3 * 3 + addmin * (minutes - 3);
cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;
}
return 0;
}
// End of Program
Give the Linux bash pipelined command that would take the output of the "cat /etc/passwd" command (that lists the contents of the system "password" file) and give us the single number showing how many accounts are configured in this file and store this information into the variable NUM_ACCOUNTS. Put only single spaces between commands, flags, piping operators, etc.
Answer:
See attached solution
Explanation:
For the description below, develop an E-R diagram:
A book is identified by its ISBN number, and it has a title, a price, and a date of publication. It is published by a publisher, each of which has its own ID number and a name. Each book has exactly one publisher, but one publisher typically publishes multiple books over time. A book is written by one or multiple authors. Each author is identified by an author number and has a name and date of birth. Each author has either one or multiple books; in addition, occasionally data are needed also regarding prospective authors who have not yet published any books. A book can be part of a series, which is also identified as a book and has its own 2 ISBN number. One book can belong to several sets and a set consists of at least one but potentially many books.
An E-R diagram for a library database would include entities for books, publishers, authors, and series, with relationships defined between them. A many-to-many relationship between authors and books, as well as books and series, requires the use of Junction Tables to effectively manage these complex relationships.
Development of an E-R Diagram Based on a Description
A book is identified by its ISBN number, and it has a title, price, and date of publication. Each book is published by a publisher that has a unique ID number and name. There is a one-to-many relationship between publishers and books since each book has exactly one publisher, but a publisher can publish multiple books. Conversely, a book is written by authors, and each author has an author number, name, and date of birth, indicating a many-to-many relationship between authors and books. To address this, we introduce a Junction Table to split the many-to-many into two one-to-many relationships. Each author could have written multiple books, and each book could have multiple authors.
Furthermore, books can be part of a series, with a series being identified as a book with its own ISBN number. A single book can belong to multiple series, creating a many-to-many relationship between books and series. Again, a Junction Table is needed to properly manage this relationship. The database also includes information about prospective authors who haven't published books yet, signifying the importance of having an authors' table regardless of publication status.
The Entity Relationship Modeling (ERM) process begins with determining the purpose of the database and listing all the necessary entities. These entities are then connected through relationships, with Junction Tables being used to resolve many-to-many relationships. Important attributes and keys for each entity are identified, ensuring that adequate information is recorded and can be retrieved effectively.
how your requirements as high-level flowcharts (15 points) Create UML document to represent your idea. you can also include word file or pdf to explain what you are trying to do in simple words. (15 points) Inheritance (20 points) 2 level hierarchy using subclass, superclass concepts like, person, employee, manager Interface (10 points) At least one interface that can be extended later like Polymorphism (20 points) Method overloading Method overriding Constructor overloading Constructor overriding Object oriented programming concepts (30 points) Proper testing methods Use of Static methods Use of Array/ArrayList Use of Loops Data Validations Try/Catch Block for exception handling
Answer:
We will use hierarchical concepts,superclass and manager interference and use of object oriented programing in python and java and we need to create and call functions as well to solve that problem.
Suppose that the data mining task is to cluster points (with (x, y) representing location) into three clusters, where the points are A1(4, 8), A2(2, 4), A3(1, 7), B1(5, 4), B2(5, 7), B3(6, 6), C1(3, 7), C2(7, 8). The distance function is Euclidean distance. Suppose initially we assign A1, B1, and C1as the center of each cluster, respectively. Please use the k-means algorithmand show your R code.(a)the three cluster centers after the first round of execution. (b)the final points in the three clusters after the algorithm stops.
Answer:
Explanation:
K- is the working procedure:
It takes n no. of predefined cluster as input and data points.
It also randomly initiate n centers of the clusters.
In this case the initial centers are given.
Steps you can follow
Step 1. Find distance of each data points from each centers.
Step 2. Assign each data point to the cluster with whose center is nearest to this data point.
Step 3. After assigning all data points calculate center of the cluster by taking mean of data points in cluster.
repeat above steps until the center in previous iteration and next iteration become same.
A1(4,8), A2(2, 4), A3(1, 7), B1(5, 4), B2(5,7), B3(6, 6), C1(3, 7), C2(7,8)
Centers are X1=A1, X2=B1, X3=C1
A1 will be assigned to cluster1, B1 will be assigned to cluster2 ,C1 will be assigned to cluster3.
Go through the attachment for the solution.
The k-means algorithm is used to cluster data points into partitions based on their attributes, using the Euclidean distance function. After the first round of execution, the cluster centers are A1(4, 8), B1(5, 4), and C1(3, 7). The final points in the three clusters after the algorithm stops may include A1(4, 8), A2(2, 4), A3(1, 7), B1(5, 4), B2(5, 7), B3(6, 6), C1(3, 7), and C2(7, 8).
Explanation:The k-means algorithm is used to cluster data points into partitions based on their attributes. In this case, we are clustering points in a two-dimensional space (x, y) into three clusters using the Euclidean distance function. The k-means algorithm involves initializing the cluster centers, iteratively recalculating the centroids, and reassigning the data points to the new centroids. The algorithm continues until convergence or a certain number of iterations.
(a) After the first round of execution, the three cluster centers are A1(4, 8), B1(5, 4), and C1(3, 7).
(b) The final points in the three clusters after the algorithm stops might be A1(4, 8), A2(2, 4), A3(1, 7) in one cluster, B1(5, 4), B2(5, 7), B3(6, 6) in another cluster, and C1(3, 7), C2(7, 8) in the third cluster. The exact assignment of points to clusters may vary depending on the distance calculations and convergence criteria used in the algorithm.
Write a CREATE TABLE statement for the DEPARTMENT table. Save and Run this statement. 2. Write a CREATE TABLE statement for the EMPLOYEE table including constraints. Email is required and is an alternate key Cascade updates but not deletions from DEPARTMENT to EMPLOYEE. Save and Run this statement. 3. Write a CREATE TABLE statement for PROJECT table. - Cascade updates but not deletions from DEPARTMENT to PROJECT
Answer:
Check the explanation
Explanation:
Please find the sql statements (as numbered in the question) below:
1. DEPARTMENT TABLE
CREATE TABLE DEPARTMENT (
DepartmentName varchar (50),
BudgetCode varchar (50),
OfficeNumber varchar (50),
OfficeNumber varchar (50),
Phone varchar (50)
);
2. EMPLOYEE TABLE
CREATE TABLE EMPLOYEE (
EmployeeNumber varchar (50),
FirstName varchar (50),
LastName varchar (50),
Phone varchar (50),
Email varchar (50) NOT NULL UNIQUE,
DepartmentName varchar (50) FOREIGN KEY REFERENCES DEPARTMENT(DepartmentName) ON UPDATE CASCADE
);
3. PROJECT TABLE
CREATE TABLE PROJECT (
ProjectID varchar (50),
Name varchar (50),
MaxHours FLOAT,
Date() AS StartDate,
Date() AS EndDate,
DepartmentName varchar (50) FOREIGN KEY REFERENCES DEPARTMENT(DepartmentName) ON UPDATE CASCADE
);
Consider a disk queue with requests for I/O to blocks on cylinders.
98 183 37 122 14 124 65 67
Considering SSTF (shortest seek time first) scheduling, the total number of head movements is, if the disk head is initially at 53 is?
A. 224
B. 236
C. 240
D. 200
Use the single-server drive-up bank teller operation referred to in Problems 1 and 2 to determine the following operating characteristics for the system: a.) The probability that no customers are in the system. b.) The average number of customers waiting. c.) The average number of customers in the system. d.) The average time a customer spends waiting. e.) The average time a customer spends in the system. f.) The probability that arriving customers will have to wait for service.
Answer:
This question is incomplete, here's the complete question:
1. Willow Brook National Bank operates a drive-up teller window that allows customers to complete bank transactions without getting out of their cars. On weekday mornings, arrivals to the drive-up teller window occur at random, with an arrival rate of 24 customers per hour or 0.4 customers per minute. 3. Use the single-server drive-up bank teller operation referred to in Problems 1 to determine the following operating characteristics for the system: a.) The probability that no customers are in the system. b.) The average number of customers waiting. c.) The average number of customers in the system. d.) The average time a customer spends waiting. e.) The average time a customer spends in the system. f.) The probability that arriving customers will have to wait for service.
Explanation:
Arrival rate \lambda = 24 customers per hour or 0.4 customers per minute
Service rate \mu = 36 customers per hour or 0.6 customers per minute (from problem 1)
a.) The probability that no customers are in the system , P0 = 1 - \lambda / \mu
= 1 - (24/36) = 1/3 = 0.3333
b.) The average number of customers waiting
Lq = \lambda^2 / [\mu(\mu - \lambda)] = 242 / [36 * (36 - 24)] = 1.33
c.) The average number of customers in the system.
L = Lq + \lambda / \mu = 1.33 + (24/36) = 2
d.) The average time a customer spends waiting.
Wq = \lambda / [\mu(\mu - \lambda)] = 24 / [36 * (36 - 24)] = 0.0555 hr = 3.33 min
e.) The average time a customer spends in the system
W = Wq + 1/\mu = 0.0555 + (1/36) = 0.0833 hr = 5 min
f.) The probability that arriving customers will have to wait for service.
= 1 - P0 = 1 - 0.3333 = 0.6667
Consider a demand-paging system with the following time-measured utilizations: CPU utilization 20% Paging disk 97.7% Other I/O devices 5% For each of the following, indicate whether it will (or is likely to) improve CPU utilization. Explain your answers. a. Install a faster CPU. b. Install a bigger paging disk. c. Increase the degree of multiprogramming. d. Decrease the degree of multiprogramming. e. Install more main memory. f. Install a faster hard disk or multiple controllers with multiple hard disks. g. Add prepaging to the page-fetch algorithms. h. Increase the page size.
Answer:
see explaination please
Explanation:
a. Install a faster CPU. Answer:NO
Optional: a faster CPU reduces the CPU utilizationfurther since the CPU will spend more time waiting for a process toenter in the ready queue.
b. Install a bigger paging disk. Answer:NO
Optional: the size of the paging disk does not affect theamount of memory that is needed to reduce the pagefaults.
c. Increase the degree of multiprogramming Answer:NO
Since each process would have fewer frames available andthe page fault rate would increase
d. Decrease the degree of multiprogramming.Answer: YES
Optional: by suspending some of the processes, the otherprocesses will have more frames in order to bring their pages inthem, hence reducing the page faults.
e. Install more main memory. Answer:Likely
Optional: more pages can remain resident and do notrequire paging to or from the disks.
f. Install a faster hard disk or multiplecontrollers with multiple hard disks. Answer:Likely
(Optional)
g. Add prepaging to the page-fetchalgorithms.Answer: Likely
(Optional.)
h. Increase the page size. Answer:NO
Since each process would have fewer frames available and the page fault rate would increase
You created several workbooks (Accounting, Finance, Management, and Marketing) in the same folder as the main workbook SchoolOfBusiness. What formula correctly links to cell D20 in the Fall 2018 worksheet within the Finance workbook?
Answer:
='[Finance.xlsx]Fall2018'!$D$20
Explanation:
The formula that will correctly links to cell D20 in the Fall 2018 worksheet within the Finance workbook is given as:
='[Finance.xlsx]Fall2018'!$D$20
This will perform the operation and produce the required output.
Write a Bare Bones program that takes as input two variables X and Y. (Again, assume these values are set before your program begins to execute.) Your program should place a 0 in the variable Z if the variable X is less than or equal to Y, and your program should place a 1 in the variable Z if the variable X is greater than Y.
Answer:
import java.util.Scanner;
public class num8 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter first number");
int X = in.nextInt();
System.out.println("Enter second number");
int Y = in.nextInt();
int Z;
if(X <= Y){
Z = 0;
}
else if(X >= Y){
Z = 1;
}
}
}
Explanation:
The program is implemented in JavaIn order to set the values for X and Y, The Scanner class is used to receive and store the values in the variables (Although the questions says you should assume these values are set)The if conditional statement is used to assign values (either 0 or 1) to variable Z as required by the question.Answer:
#The program sets Z to 0 if the X <= Y. otherwise sets Z to 1 , if the X > Y.
clear Z; # sets Z to 0
clear U; # sets U to 0
clear V; # sets v to 0
clear T; # sets T to 0
while Y not 0 # repeat until Y times
# process to decrement Y by 1
while Y not 0
incr U;
decr Y;
decr U;
while U not 0
incr Y;
decr U;
#process to decrement X by 1
while X not 0
incr V
decr X;
while V not 0
decr V;
while V not 0
incr T;
decr V;
while T not 0
incr X
decr T
#end of main while loop
#after running the main while loop, X will be positive and non - zero number, # #if X > Y. otherwise X and Y will be zero.
#process to increment Z by 1, if X is positive and non - zero number
while X not 0
while X not 0
decr X;
incr Z;
#end of while
Explanation:
The program is totakes in as input two variables X and Y.
The main function of the program is to return or place a 0 in the variable Z if the variable X is less than or equal to Y, and place a 1 in the variable Z if the variable X is greater than Y.
When these conditions are met, end program.
Consider a one-way authentication technique based on asymmetric encryption: A --> B: IDA B --> A: R1 A --> B: E(PRa, R1) Explain the protocol. What type of attack is this protocol susceptible to?
Answer:
See explaination
Explanation:
A protocol in computing can be defined as a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. You can think of a protocol as a spoken language.
Please kindly check attachment for for the details of the answer.
Here, A-->B : ID means protocol is issued authentic A to B.
Then B--> A : R1 here, R1 take care about only A can encrypt R1 ensure that only A can take authentication challenge.Last A--> B : E (PRa, R1) here, A's public key is take care to decrypt.(b). According to the question it is based on asymmetric key encryption technique, Let us assume any third-party K could use the given below assumption:
Let us suppose A sign a message, and this message, K show to any other party D.so, in this case if A used public or private key for authentication and signature.Then, in this case attacks occurrence chance is happen, so man middle attack will be happen.Learn more about:
https://brainly.com/question/17495888
Write a program that calculates the balance of a savings account at the end of a period of time. It should ask the user for the annual interest rate, the starting balance, and the number of months that have passed since the account was established. A loop should then iterate once for every month, performing the following: A) Ask the user for the amount deposited into the account during the month. (Do not accept negative numbers.) This amount should be added to the balance. B) Ask the user for the amount withdrawn from the account during the month. (Do not accept negative numbers.) This amount should be subtracted from the balance. C) Calculate the monthly interest. The monthly interest rate is the annual interest rate divided by twelve. Multiply the monthly interest rate by the balance, and add the result to the balance. After the last iteration, the program should display the ending balance, the total amount of deposits, the total amount of withdrawals, and the total interest earned.
Answer:
Check the explanation
Explanation:
# include <iostream>
#include<iomanip>
using namespace std;
int main ()
{double start,balance,rate,deposit=0,withdraw=0,amt,sum,totInterest=0,interest;
int i;
cout<<setprecision(2)<<fixed;
cout<<"Enter starting balance: ";
cin>>balance;
start=balance;
cout<<"Enter annual interest rate: ";
cin>>rate;
rate/=12.;
for(i=1;i<=3;i++)
{cout<<"For month "<<i<<endl;
sum=balance;
cout<<"Enter total amount deposit: ";
cin>>amt;
while(amt<0)
{cout<<"Must not be negative-retry\n";
cout<<"Enter total amount deposit: ";
cin>>amt;
}
deposit+=amt;
balance+=amt;
cout<<"Enter total amount withdrawn: ";
cin>>amt;
while(amt<0||amt>balance)
{cout<<"Must not be negative, or greater than balance ($"<<balance<<")-retry\n";
cout<<"Enter total amount withdrawn: ";
cin>>amt;
}
withdraw+=amt;
balance-=amt;
interest=(sum+balance)/2.*rate;
totInterest+=interest;
balance+=interest;
}
cout<<"Starting balance at the beginning of the three month period: $"<<start<<endl;
cout<<"total deposits made during the three months: $"<<deposit<<endl;
cout<<"total withdrawals made during the three months: $"<<withdraw<<endl;
cout<<"total interest posted to the account during the three months $"<<totInterest<<endl;
cout<<"final balance: $"<<balance<<endl;
system("pause");
return 0;
}
Kindly check the output in the attached image below.
Task 1 – File Input
The first piece of information we need is a text file’s name and location. Ask the user through the console what the file’s name and location are. After that, please ensure that the file does exist and at the given location. If the file does not exist or cannot be read, please return a message to the user stating that and ask them to enter another name and location.
Finally, if the file can be read then simply copy/read every line from the file. The contents of this file will be used in the next task.
Task 2 – File Output
Ask the user, through the console, what the name of the copy of the previous file should be called and where it should be saved. Check to see if a file with the same name already exists at the location given and if one does ask the user if they want to overwrite the file that already exists or if they would like to change the name and location of the new file. If they wish to change the name and location, go through the process of getting their input again through the console and checking if the newly given name and location are taken already too.
If they want to overwrite or no file already exists in the given location with the given name, then place the copied contents of the file that was read in the first task into this new file.
After successfully copying the contents of the first file into the second file, print to the console the name and location of both of those files.
A sample text file named "textfile.txt" has been supplied in case you need a file to test the above code on. The contents of that file is the declaration of independence.
Answer:
Check the explanation
Explanation:
using System;
using System.IO;
public class Program
{
public static void Main()
{
string[] lines;
Console.WriteLine("enter name of the file");
String fileName=Console.ReadLine();
Console.WriteLine("enter path of the file");
String filePath=Console.ReadLine();
using (StreamReader streamReader = File.OpenText(filePath))
{
String text = streamReader.ReadToEnd();
lines = File.ReadAllLines(filePath);
}
Console.WriteLine("Enter path of the file to write");
String outputFilePath = Console.ReadLine();
bool fileExist = File.Exists(outputFilePath);
if (fileExist)
{
overWriteOrChangeFileName(outputFilePath);
}
else
{
File.Create(outputFilePath);
File.WriteAllLines(outputFilePath, lines);
}
Console.Write("Input file Path"+filePath);
Console.Write("output file path"+outputFilePath);
void overWriteOrChangeFileName(String filePathtoCheck){
Console.WriteLine("File exists. Do you want to overwrite the file or do you want to change the location and file name of the new file.Press Y to overwrite and press C to change the location and filename");
String userInput=Console.ReadLine();
if(userInput.Equals("Y")){
File.WriteAllLines(outputFilePath, lines);
}else{
Console.WriteLine("enter new path of the file including filename");
String NewFileName=Console.ReadLine();
outputFilePath=NewFileName;
if(File.Exists(outputFilePath)){
overWriteOrChangeFileName(outputFilePath);
}
else
{
File.Create(outputFilePath);
File.WriteAllLines(outputFilePath, lines);
}
}
}
}
}
3. Write a script that uses an anonymous block of PL/SQL code that attempts to insert a new flight into the flights table for flight_number 165. Check to see whether there is a sequence being used for flight_id and then adjust your INSERT statement accordingly. Remember, you can use select statements to determine which values are appropriate to insert. If the insert is successful, the procedure should display this message:
Answer:
We will use script in oracle and SQl(Structured Query Language) and use of algorithms like cipher for encryption to insert a new flight into the flights table for the flight number 165 and that Cipher will show the desired message.
What is technology??
Answer:
Technology is the skills, methods, and processes used to achieve goals. People can use technology to: Produce goods or services. Carry out goals, such as scientific investigation or sending a spaceship to the moon. Solve problems, such as disease or famine.
Explanation:
Good Luck!
Technology refers to the application of scientific knowledge, tools, and techniques for practical purposes.
Technology involves the creation, development, and utilization of various systems, methods, processes, and devices to solve problems, improve efficiency, enhance productivity, and achieve specific goals in different domains.
Technology encompasses a wide range of fields and disciplines, including engineering, computer science, electronics, telecommunications, biotechnology, information technology, and more. It involves the design, production, and utilization of tangible and intangible artifacts, such as machinery, software, infrastructure, systems, algorithms, and networks.
Technology is constantly evolving and advancing, driven by research, innovation, and human creativity. It plays a significant role in shaping societies, economies, and cultures, influencing various aspects of our lives.
Overall, technology encompasses the tools, knowledge, and systems that enable the practical application of scientific understanding to address challenges, improve efficiency, and enhance human experiences in the modern world.
Learn more about Technology here:
https://brainly.com/question/9171028
#SPJ6
Modify the definition of the throttle class on page 35, to create a new throttle ADT, which allows the user of the ADT to specify the number of shift levels when creating objects of that class. You don't need to provide an implementation of the new throttle ADT, just the class definition.
Answer:
seeexplaination
Explanation:
Code(header file):
#ifndef THROTTLESHIFTLVEL_H
#define THROTTLESHIFTLVEL_H
class throttle
{
int position;
public:
throttle()
{
position = 0;
}
// specify the number of shift levels when creating objects
throttle(int level)
{
position = level;
}
void shut_off()
{
position = 0;
}
void shift(int amount)
{
if(amount >= 0)
position = position + amount;
}
double flow() const
{
return position;
}
bool is_on() const
{
if (position > 0)
return true;
else
false;
}
};
#endif
Please kindly check attachment for screenshot
Final answer:
To create a new throttle ADT with a customizable number of shift levels, define the class with an additional parameter in the constructor. Provide methods for shifting the throttle to a specific level and releasing it.
Explanation:
The modified definition of the throttle class to create a new throttle ADT, which allows the user to specify the number of shift levels, can be written as follows:
class Throttle:
def __init__(self, shift_levels):
self.shift_levels = shift_levels
def shift(self, level):
# shift the throttle to the specified level
pass
def release(self):
# release the throttle
pass
Employee Payroll Summary: PYTHON 3 CODE WITHOUT USING ARRAY AND CORRECT INDENTATION WITH ALL VARIABLES DECLARED WINDOWS
For this assignment, you will write a program that reads employee work data from a text file, and then calculates payroll information based on this file. The text file contains one line of text for each employee. Each line consists of the following data (delimited by tabs):
employee’s name
employee’s hourly wage rate
hours worked Monday
hours worked Tuesday
hours worked Wednesday
hours worked Thursday
hours worked Friday
Answer:
Check the explanation
Explanation:
If raw_input() shows some error in Python v3 then call input() instead of raw_input().
def menu():
option = 'n'
while option not in ['r','p','d','h','l','q']:
print("Menu of choices:")
print("\t(r)ead employee data")
print("\t(p)rint employee payroll")
print("\t(d)isplay an employee by name")
print("\tfind (h)ighest paid employee")
print("\tfind (l)owest paid employee")
print("\t(q)uit")
option = input("Please enter your choice: ")
if option not in ['r','p','d','h','q']:
print("Invalid choice. Please try again\n")
return option
def readEmployees(names,wages,hours):
fileRead = 0
try:
filename = input("Enter the file name: ")
f = open(filename,"r")
for line in f:
values = line.split("\t")
names.append(values[0])
wages.append(float(values[1]))
i=0
total = 0
while i < 5:
total = total + float(values[2+i])
i = i+1
hours.append(total)
fileRead = 1
f.close()
except ValueError:
print("Bad data in file " + filename)
except IOError:
print("Error reading file " + filename)
return fileRead
def printPayroll(names,wages,hours):
print("")
print("Name"+" "+"Hours"+" "+"Pay")
print("----"+" "+"-----"+" "+"---")
i = 0
sortedNames = names
sortedNames.sort()
totalpay = 0
for name in sortedNames:
i = names.index(name)
pay = hours[i] * wages[i]
name = names[i]
totalpay = totalpay + pay
name = repr(name).ljust(10)
name = name.replace("'","")
print( name + repr(hours[i]).ljust(9) + repr(pay).ljust(6))
i = i + 1
print("\nTotal payroll = $" + str(totalpay))
def displayName(names,wages,hours):
name = ""
i=0
size = len(names)
name = input("Enter the employee's name: ")
while i < size:
if names[i].lower() == name.lower():
wage = wages[i]
hour = hours[i]
break
i = i +1
if i == size:
print("Employee not found")
else:
print(name + " worked " + str(hour) + " hours at $" + str(wage) + " per hour, and earned $" + str(wage * hour) + "\n")
def showHighLow(names,wages,hours, ind):
highestIndex = 0
if ind == 'h':
i =1
size = len(names)
wage = 0;
while i < size:
wage = hours[i] * wages[i]
if wage > (hours[highestIndex] * wages[highestIndex]):
highestIndex = i
i = i + 1
print(names[highestIndex] + " earned $" + str(hours[highestIndex] * wages[highestIndex]) + "\n")
elif ind == 'l':
lowestIndex = 0;
i =1
size = len(names)
wage = 0;
while i < size:
wage = hours[i] * wages[i]
if wage < (hours[lowestIndex] * wages[lowestIndex]):
lowestIndex = i
i = i + 1
print(names[lowestIndex] + " earned $" + str(hours[lowestIndex] * wages[lowestIndex]) + "\n")
def main():
option = 'n'
names = list()
wages = list()
hours = list()
fileRead = 0
while option != 'q':
option = menu()
if option == 'r':
fileRead = readEmployees(names,wages,hours)
elif option == 'p':
if fileRead == 0:
print("Employee data has not been read.")
print("Please read the file before making this choice")
else:
printPayroll(names,wages,hours)
elif option == 'd':
if fileRead == 0:
print("Employee data has not been read.")
print("Please read the file before making this choice")
else:
displayName(names,wages,hours)
elif option == 'h':
if fileRead == 0:
print("Employee data has not been read.")
print("Please read the file before making this choice")
else:
showHighLow(names,wages,hours,'h')
elif option == 'l':
if fileRead == 0:
print("Employee data has not been read.")
print("Please read the file before making this choice")
else:
showHighLow(names,wages,hours,'l')
elif option == 'q':
print("GoodBye")
if __name__ == "__main__":
main()
Kindly check the OUTPUT in the attached image below.
JAVA
Given an array of Student names, create and return an array of Student objects.
I wrote some code but I'm not sure if I'm doing this right (see the attachment).
Answer:
Answer is in the attached screenshot!
Explanation:
Iterate through the given input strings, create a student class with the given name, assign the output array to the value of the class created from the given input string. Finally, return the array.
1) a) Create an unambiguous grammar which generates basic mathematical expressions (using numbers and the four operators , -, *, /). Without parentheses, parsing and mathematically evaluating expressions created by this string should give the result you'd get while following the order of operations. For now, you may abstract "number" as a single terminal, n. In the order of operations, * and / should be given precendence over and -. Aside from that, evaluation should occur from left to right. So 8/4*2 would result in 4, not 1. 1 2*3 would be 7. 4 3*5-6/2*4 would be 4 15-6/2*4
Answer:
Explanation:
CHECK THE ANSWER IN THE ATTACHMENT CORNNER
Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: averages.txt : contains the overall average of the entire array, then the average of each row reverse.txt : contains the original values but each row is reversed flipped.txt : contains the original values but is flipped top to bottom (first row is now the last row etc.) If the dimensions of array are symmetric (NxN), create a diagonal.txt: contains the array mirrored on the diagonal
Answer:
see explaination
Explanation:
#include <iostream>
#include <fstream>
#include <iomanip>
using namespace std;
int main()
{
string filename, file1, file2, file3, file4;
cout << "Enter the filename : ";
getline(cin, filename);
int row, col;
ifstream ifile;
ifile.open(filename.c_str());
if(!ifile)
{
cout << "File does not exist." << endl;
}
else
{
ifile >> row >> col;
float mat[row][col], diag[row][col];
for(int i=0; i<row; i++)
{
for(int j=0; j<col; j++)
ifile >> mat[i][j];
}
cout << "Enter the filename to save averages : ";
getline(cin, file1);
ofstream avgFile(file1.c_str(), std::fstream::in | std::fstream::out | std::fstream::app);
float t_avg = 0, avg = 0;
for(int i=0; i<row; i++)
{
avg = 0;
for(int j=0; j<col; j++)
{
avg += mat[i][j];
}
t_avg += avg;
avg = avg/col;
avgFile << std::fixed << std::setprecision(1) << "Row " << i+1 << " average: " << avg << endl;
}
t_avg = t_avg / (row*col);
avgFile << std::fixed << std::setprecision(1) << "Total average: " << t_avg << endl;
cout << "Enter the filename to store reverse matrix : ";
getline(cin, file2);
ofstream revFile(file2.c_str(), std::fstream::in | std::fstream::out | std::fstream::app);
for(int i=0; i<row; i++)
{
for(int j=col-1; j>=0; j--)
{
revFile << std::fixed << std::setprecision(1) << mat[i][j] << " ";
}
revFile << endl;
}
cout << "Enter the filename to store flipped matrix : ";
getline(cin, file3);
ofstream flipFile(file3.c_str(), std::fstream::in | std::fstream::out | std::fstream::app);
for(int i=row-1; i>=0; i--)
{
for(int j=0; j<col; j++)
{
flipFile << std::fixed << std::setprecision(1) << mat[i][j] << " ";
}
flipFile << endl;
}
cout << "Enter the filename to store diagonal matrix : ";
getline(cin, file4);
ofstream diagFile(file4.c_str(), std::fstream::in | std::fstream::out | std::fstream::app);
for(int i=0; i<row; i++)
{
for(int j=0; j<col; j++)
{
diag[j][i] = mat[i][j];
}
}
for(int i=0; i<col; i++)
{
for(int j=0; j<row; j++)
{
diagFile << std::fixed << std::setprecision(1) << diag[i][j] << " ";
}
diagFile << endl;
}
}
return 0;
}
Write a program that accepts an ISBN number and displays whether it is valid or not. An ISBN (International Standard Book Number) is a ten digit code which uniquely identifies a book. The first nine digits represent Group, Publisher and Title of the book and the last digit is used as a checksum (to check whether the given ISBN is valid). Each of the digits can take any value between 0 and 9. In addition, the last digit may also take a value X (stands for 10). To verify an ISBN, calculate 10 times the first digit, plus 9 times the second digit, plus 8 times the third and so on until we add 1 time the last digit. If the number 11 can divide the sum (no remainder), the code is a valid ISBN.
Answer:
is_isbn = True
total = 0
number = input("Enter the ISBN: ")
if len(number) != 10:
is_isbn = False
for i in range(9):
if 0 <= int(number[i]) <= 9:
total += int(number[i]) * (10 - i)
else:
is_isbn = False
if number[9] != 'X' and int(number[9]) > 9:
is_isbn = False
if number[9] == 'X':
total += 10
else:
total += int(number[9])
if total % 11 != 0:
is_isbn = False
if is_isbn:
print("It is a valid ISBN")
else:
print("It is NOT a valid ISBN")
Explanation:
Initialize the variables, total and is_isbn - keeps the value for the number if it is valid or not
Ask the user for the ISBN number
If number's length is less than 10, it is not valid, set is_isbn to false
Then, make calculation to verify the ISBN
Check the last digit, if it is not "X" and greater than 10, it is not valid, set is_isbn to false
Again, check the last digit, if it is "X", add 10 to the total, otherwise add its value
Check if total can divide 11 with no remainder. If not, it is not valid, set is_isbn to false
Finally, depending on the is_isbn variable, print the result
Create a class CitiesAndCountries with at least three methods: class CitiesAndCountries: def add_country(self, country_name): """ :param country_name: name of new country :return: True if added, False if duplicate """ def add_city(self, country_name, city_name): """ :param country_name: must be a country in the already defined countries :param city_name: name of new city. :return: True if added, False if not added """ def find_city(self, city_name): """ :param city_name: get all cities with that name, in all different countries :return: list of countries which have a city with that name, empty list if none """
Answer:
Check the explanation
Explanation:
class CitiesAndCountries:
"""
This is the class which maintains a dictionary of the Countries with the cites in them.
"""
def __init__(self):
"""
Constructor for the class CitiesAndCountries.
It defines a dictionary to store the names of the countries and a list of the cities which are in them
Example of the the following dictionary when it is populated:
citiesandcountries = {"india":["bhopal", "mumbai", "nagpur"], "usa":["new york", "seatlle"]
Keeping the names in lowercase helps in search
"""
self.citiesandcountries = {} # This is the dictionary which stores the information
def add_country(self, country_name):
"""
The add_country function to add countries to our list.
:param country_name: Name of the country to add to the dictionary
:return: True if added to the dictionary, False if it is already present in the dictionary
"""
if country_name.lower() not in self.citiesandcountries.keys():
self.citiesandcountries[country_name.lower()] = [] # Storing the country name in lower case helps in
# searching
return True
else: # You could omit the else statement and directly return False, but it adds to readability.
return False
def add_city(self, country_name, city_name):
"""
This function adds the cities names to the dictionary corresponding to their countries.
:param country_name: Country to which the city belongs
:param city_name: Name of the city to be added
:return: True if the country is present in the dictionary and the city is added to the list, else False
"""
if country_name.lower() in self.citiesandcountries.keys():
self.citiesandcountries[country_name.lower()].append(city_name.lower())
return True
else:
return False
def find_city(self, city_name):
"""
This function is used to retrive a list of countries where the city with the given name is present
:param city_name: Name of the city.
:return: A list of all the countries where the city if present.
"""
countries_with_city = []
for country in self.citiesandcountries.keys():
if city_name.lower() in self.citiesandcountries[country]:
countries_with_city.append(country.title())
return countries_with_city
A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the program name for the System Information utility?
Answer:
Windows includes a tool called Microsoft System Information (Msinfo32.exe). This tool gathers information about your computer and displays a comprehensive view of your hardware, system components, and software environment, which you can use to diagnose computer issues.
Explanation:
(Temperature Conversions) Write a program that converts integer Fahrenheit temperatures from 0 to 212 degrees to floating-point Celsius temperatures with 3 digits of precision. Perform the calculation using the formula celsius = 5.0 / 9.0 * ( fahrenheit - 32 ); The output should be printed in two right-justified columns of 10 characters each, and the Celsius temperatures should be preceded by a sign for both positive and negative values.
Answer:
#include <stdio.h>
int main()
{
//Store temp in Fahrenheit
int temp_fahrenheit;
//store temp in Celsius
float temp_celsius;
printf("\nTemperature conversion from Fahrenheit to Celsius is given below: \n\n");
printf("\n%10s\t%12s\n\n", "Fahrenheit", "Celsius");
//For loop to convert
temp_fahrenheit=0;
while(temp_fahrenheit <= 212)
{
temp_celsius = 5.0 / 9.0 *(temp_fahrenheit - 32);
printf("%10d\t%12.3f\n", temp_fahrenheit, temp_celsius);
temp_fahrenheit++;
}
return 0;
}
Explanation:
The program above used a while loop for its implementation.
It is a temperature conversion program that converts integer Fahrenheit temperatures from 0 to 212 degrees to floating-point Celsius temperatures with 3 digits of precision.
This can be calculated or the calculation was Perform using the formula celsius = 5.0 / 9.0 * ( fahrenheit - 32 ).
The expected output was later printed in two right-justified columns of 10 characters each, and the Celsius temperatures was preceded by a sign for both positive and negative values.
10 10 105 Each process is assigned a numerical priority, with a higher number indicating a higher relative priority. In addition to the process listed above, the system also has an idle task (which consumes no CPU resources and is identified as P idle). This task has priority 0 and is scheduled whenever the system has no other available processes to run. The length of a time quantum is 10 units. If a process is preempted by a higher-priority process, the preempted process is placed at the end of the queue. (Hint: Draw a Gantt chart.) (a) What is the turnaround time for each process? (25 pts) (b) What is the waiting time for each process? (25 pts)
Answer:
see explaination and attachment
Explanation:
We can say that a Gantt chart is a visual view of tasks scheduled over time. Gantt charts are used for planning projects of all sizes and they are a useful way of showing what work is scheduled to be done on a specific day.
see attachment for the detailed step by step solution.
Hex value 0xC29C3480 represents an IEEE-754 single-precision (32 bit) floating-point number. Work out the equivalent decimal number. Show all workings (e.g. converting exponent and mantissa).
Answer:
According to IEEE-754 standard,equivalent decimal of 32 bit floating point number is 78.1025390625
Explanation:
To convert the 32 bit floating point number from hexadecimal to decimal, following steps will be completed.
1. Convert this hexadecimal value "C29C3480" into binary number. Each digit in hexadecimal will convert into 4 bits of binary.
There
C= 1100
2 = 0010
9 = 1001
C = 1100
3 = 0011
4= 0100
8 = 1000
0 = 0000
So the number will be converted as given below:
1100 0010 1001 1100 0011 0100 1000 0000
2. Arrange the bits in order
1 = Sign bit = 32nd bit
10000101 = Exponent bits = From 31st to 23rd bits
00111000011010010000000 = Fraction bits= From 22nd to 0th bit
As the 32nd bit, which is sign bit, is 1, so given number is negative.
3. Convert the Exponent bits into decimal values
10000101 = 1x2⁷+0x2⁶+0x2⁵+0x2⁴+0x2³+1x2²+0x2¹+1x2⁰
= 1x2⁷ + 1x2² + 1x2⁰
= 128 + 4 + 1 = 133
4. Calculate Exponent Bias
exponent bias = 2ⁿ⁻¹ - 1
there n is total number of bits in exponent value of 32 bit number, Now in this question n=8, because there are total 8 bits in exponent.
so, exponent bias = 2⁸⁻¹ - 1 = 2⁷-1= 128-1= 127
e = decimal value of exponent - exponent bias
e = 133 - 127 = 6
5. Convert Fraction part into Decimal
Mantissa=0x2⁻¹+0x2⁻²+1x2⁻³+1x2⁻⁴+1x2⁻⁵+0x2⁻⁶+0x2⁻⁷+0x2⁻⁸+0x2⁻⁹+1x2⁻¹⁰+1x2⁻¹¹+0x2⁻¹²+1x2⁻¹³+0x2⁻¹⁴+0x2⁻¹⁵+1x2⁻¹⁶+0x2⁻¹⁷+0x2⁻¹⁸+0x2⁻¹⁹+0x2⁻²⁰+0x2⁻²¹+0x2⁻²²+0x2⁻²³
= 1x2⁻³+1x2⁻⁴+1x2⁻⁵+1x2⁻¹⁰+1x2⁻¹¹+1x2⁻¹³+1x2⁻¹⁶
= 0.125 + 0.0625 + 0.03125 + 0.0009765625 + 0.00048828125 + 0.00012207031 + 0.00001525878
Mantissa = 0.22035217284
6. Convert the number into decimal
Decimal number = (-1)^s x (1+Mantissa) x 2^e
there
s is the sign bit which is 1,
and
e =6.
so,
decimal number = (-1)^1 x (1+0.22035217284 ) x 2⁶
= -1 x 1.22035217284 x 64
= -78.1025390625
For the following two transactions and the initial table values as shown complete the missing blanks in the transaction log below:
Part_ID
Desrption
OnHand
OnOrder
57
Assembled Foo
5
0
987
Foo Fastener
12
7
989
Foo Half
7
0
BEGIN TRANSACTION;
UPDATE Part SET OnHand = OnHand + 7, OnOrder = OnOrder – 7 WHERE Part_ID = 987;
COMMIT;
BEGIN TRANSACTION;
UPDATE Part SET OnHand = OnHand - 4 WHERE Part_ID = 987;
UPDATE Part SET OnHand = OnHand - 2 WHERE Part_ID = 989;
UPDATE Part SET OnHand = OnHand + 1 WHERE Part_ID = 57;
COMMIT
TRL_ID
TRX_ID
PREV_PTR
NEXT_PTR
OPERATION
TABLE
ROW ID
ATTRIBUTE
BEFORE VALUE
AFTER VALUE
1787
109
NULL
START
****
1788
109
1787
UPDATE
PART
987
OnHand
12
1789
109
UPDATE
PART
987
OnOrder
7
1790
109
NULL
COMMIT
****
1791
110
NULL
START
****
Final answer:
The provided transaction log represents updates made to the 'Part' table in a database, recording the details of each transaction and the changes made to specific rows.
Explanation:
The transaction log provided represents a series of updates made to the 'Part' table in a database. Each transaction is recorded with a unique 'TRL_ID' and 'TRX_ID'. The 'OPERATION' column indicates the type of operation performed (e.g., START, UPDATE, COMMIT). The 'TABLE' column specifies the table that was updated, and the 'ROW ID' column represents the specific row that was modified. The 'BEFORE VALUE' and 'AFTER VALUE' columns show the original and final values of the updated attribute.
Given a collection of n nuts, and a collection of n bolts, each arranged in an increasing order of size, give an O(n) time algorithm to check if there is a nut and a bolt that have the same size. You can assume that the sizes of the nuts and bolts are stored in the arrays NUTS[1::n] and BOLTS[1::n], respectively, where NUTS[1] < < NUTS[n] and BOLTS[1] < < BOLTS[n]. Note that you only need to report whether or not a match exists; you do not need to report all matches.
To check for a matching pair of nuts and bolts in O(n) time, perform a linear scan using two indices since the arrays are sorted. Increment the indices appropriately and return true if a match is found before either index exceeds n, otherwise return false.
To solve the problem of finding if there is a matching pair of nuts and bolts in an O(n) time complexity, you can employ a simple linear scan. Since the arrays NUTS and BOLTS are both sorted in increasing order, you can iterate over them simultaneously to check for a match.
Algorithm:
Initialize two indices, i and j, to 1.While i and j are both less than or equal to n, compare NUTS[i] with BOLTS[j]:If NUTS[i] is equal to BOLTS[j], a match is found, and you can return true.If NUTS[i] is less than BOLTS[j], increment i to check the next nut.If BOLTS[j] is less than NUTS[i], increment j to check the next bolt.If no match is found by the time either i or j exceeds n, return false as no matching pair exists.This algorithm is guaranteed to run in O(n) since each list is traversed at most once.
Write an application that prompts a user for a month, day, and year. Display a message that specifies whether the entered date is not this year, in an earlier month this year, in a later month this year, or this month. Save the file as PastPresentFuture.java.
Answer:
See explaination
Explanation:
The program code
PastPresentFuture.java
import java.util.*;
import java.time.LocalDate;
public class PastPresentFuture
{
public static void main(String args[])
{
/*Initializing an array with days of month in a sequence, february with 28 days - it would be changed afterwards if the year entered is a leap year.*/
int daysOfmonth[]={31,28,31,30,31,30,31,31,30,31,30,31};
LocalDate today=LocalDate.now();
int mo,da,yr;
int todayMo,todayDa,todayYr;
//storing the values of today's day,month & year in 3 variables
todayMo=today.getMonthValue();
todayDa=today.getDayOfMonth();
todayYr=today.getYear();
//taking inputs of day,month & year from console which would be used later for checking
Scanner input=new Scanner(System.in);
System.out.println(":::Program to find whether a date is in past/present/future:::");
System.out.print("Enter month::");
mo=input.nextInt();
System.out.print("Enter day::");
da=input.nextInt();
System.out.print("Enter year::");
yr=input.nextInt();
/*finding whether the entered year is leap year or not based on standard logic and making the days of february to 29 if it is a leap year.*/
if(yr%100==0)
{
if(yr%400==0)
daysOfmonth[1]++;
}
else
{
if(yr%4==0)
daysOfmonth[1]++;
}
System.out.print("The date you entered -- ");
/*checking if the month value is between 1 to 12 and day entered is with in the boundary limits of the respective month using the array initialized above.
if the date entered is invalid, we are informing the user about the same and stopping the program.*/
if(!(mo>=1 && mo<=12 && da>=0 && da<=daysOfmonth[mo-1]))
{
System.out.println("invalid !!");
System.exit(0);
}
//logic to print the 4 statements as per the question
if(yr!=todayYr)
System.out.println(yr+" not this year.");
else
if(mo<todayMo)
System.out.println("month "+mo+" in an earlier month this year.");
else
if(mo>todayMo)
System.out.println("month "+mo+" in a later month this year.");
else
System.out.println("month "+mo+" is this month.");
}
}
Create a function, str_replace, that takes 2 arguments: int list and index in list is a list of single digit integers index is the index that will be checked - such as with int_list[index] Function replicates purpose of task "replace items in a list" above and replaces an integer with a string "small" or "large" return int_list
Answer:
def str_replace(int_list, index):
if int_list[index] < 7:
int_list[index] = "small"
elif int_list[index] > 7:
int_list[index] = "large"
return int_list
Explanation:
I believe you forgot to mention the comparison value. I checked if the integer at the given index is smaller/greater than 7. If that is not your number to check, you may just change the value.
Create a function called def str_replace that takes two parameters, an integer list and an index
Check if the number in given index is smaller than 7. If it is replace the number with "small".
Check if the number in given index is greater than 7. If it is replace the number with "large".
Return the list
The str_replace function replaces an integer in a list with 'small' or 'large' depending on the value. It demonstrates basic list manipulation and conditional logic in programming.
The str_replace function is designed to take a list of integers and an index. The function will check the value at the given index, and if the integer is less than 5, it will be replaced with the string "small"; if the integer is 5 or greater, it will be replaced with the string "large". This is a basic operation in programming, often related to the concept of list manipulation and conditional statements. Here's a step-by-step example in Python:
def str_replace(int_list, index):