Two polygons are said to be similar if their corresponding angles are the same or if each pair of corresponding sides has the same ratio. Write the code to test if two rectangles are similar when the length and width of each are provided as integer values. For example:If the rectangles have lengths of 10 and 8, the ratio would be 1.25.

Answers

Answer 1

Here's a C++ program that reads two rectangles' lengths and widths as integer values and tests if they are similar:

#include <iostream>

#include <cmath>

using namespace std;

bool areSimilar(int length1, int width1, int length2, int width2) {

   float lengthRatio = static_cast<float>(length1) / static_cast<float>(length2);

   float widthRatio = static_cast<float>(width1) / static_cast<float>(width2);

   return lengthRatio == widthRatio;

}

int main() {

   int length1, width1, length2, width2;

   cout << "Enter the length and width of the first rectangle: ";

   cin >> length1 >> width1;

   cout << "Enter the length and width of the second rectangle: ";

   cin >> length2 >> width2;

   if (areSimilar(length1, width1, length2, width2)) {

       cout << "The two rectangles are similar." << endl;

   } else {

       cout << "The two rectangles are not similar." << endl;

   }

   return 0;

}

This program defines a function areSimilar that takes the lengths and widths of two rectangles as input and returns a boolean value indicating whether the rectangles are similar. The function calculates the ratios of the lengths and widths and checks if they are equal. If the ratios are equal, the rectangles are considered similar, and the function returns true. Otherwise, the rectangles are not similar, and the function returns false.


Related Questions

A user calls your help desk and says that he is trying to configure his Word document so that the text within his paragraphs is stretched from the left margin to the right margin. What is your advice?

Answers

Answer:

The best answer would be

Explanation:

To access this command ...

Select the Format tab - Properties - Paragraph properties - Bleeds and spaces

What is the difference between phishing and pharming?
A. Phishing is not illegal, pharming is illegal
B. Phishing is the right of the company, where pharming is the right of the individual
C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
D. All of these are correct

Answers

Answer:

Option C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites.

is the correct answer.

Explanation:

Phishing is define as a technique to gain personal information for the purpose of identity theft  that may be used by hackers. They may send you malicious email that may look like legitimate ones but are the ones that trick you.Pharming is defined as the fraudulent practice that  reroutes requests for legitimate websites to false websites. It can even occur by simply clicking the authentic link or type in the website URL.

i hope it will help you!

Which is true of case-based reasoning (CBR)?
a. Each problem and its corresponding solution are stored on a global network.
b. Each case in a database shares a common description and keyword.
c. It matches a new problem with a previously solved problem and its solution.
d. It solves a problem by going through a series of if-then-else rules.

Answers

Answer:

The correct option is Option C: It matches a new problem with a previously solved problem and its solution.

Explanation:

Case-based reasoning (CBR) is used when someone tries to solve new problems based on old problems that were similar. The person applying case-based reasoning would look for the solutions to these similar past problems and try to apply them to the new case. For example, a doctor who tries to treat a patient based on what was successful with a prior patient with a similar problem is applying case-based reasoning. In some instances, these problems are available in a database and ideally, that is how it is conceived, but it would depend on the field and the kind of problems. There is no universal global network dedicated to CBR as a whole (other than generic searches on the internet in general). One example of a specific CBR database is the European Nuclear Preparedness system called PREPARE.

What is the darknet?

(A) An Internet for non-English speaking people
(B) The criminal side of the Internet
(C) An Internet just for law enforcement
(D) The old, IPv4 Internet that is being retired as IPv6 takes over
(E) None of the above

Answers

Answer:

B.

Explanation:

the dark net also known as the dark web is a net for criminals

Why is it important to use flip-flops instead of latches to construct a finite state machine?
A. Flip-flops are the only way to provide the speed necessary for reliable finite state machine operation.
B. The reduced speed of flip-flops is necessary to ensure reliable finite state machine operation.
C. Flip-flops cost less than latches, so you have to use flip-flops to obtain the most economical implementation possible.
D. Flip-flops use less power than latches, so their use is important for optimizing battery life.
E. Flip-flops will never change state more than once per clock cycle, which is essential for designs like finite state machines where the outputs of the machine feed back into the inputs.

Answers

Answer:

The answer are letters D and E.

Explanation:

Because, Flip-flops use less power than latches, so their use is important for optimizing battery life.  Flip-flops will never change state more than once per clock cycle, which is essential for designs like finite state machines where the outputs of the machine feed back into the inputs.

Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switch (exchange) the values of the first and last elements of the array. So, for example, if the array's initial values were: brooklyn queens staten_island manhattan bronx then after your code executed, the array would contain: bronx queens staten_island manhattan brooklyn

Answers

Answer:

Explanation:

Let's do this in python. First we can set a placeholder variable to hold the first element of the array, then we can set that first element to the last element (5th) of that array. Then we set the last element of that array to the placeholder, which has value of the original first element of the array

placeholder = boroughs[0] # in python, 0 is the first element or arra

boroughs[0] = boroughs[-1] # -1 means the last element of the array

boroughs[-1] = placeholder

Write a recursive program that tests if a number is a prime number (returns true) or not (returns false). Use a naïve (simple) algorithm that determines that a number P is not a prime number if remainder of dividing the number P by at least one number Q, Q less than P, is zero. (There exists a Q such that Q< P and P modulo Q is O) and is a prime number otherwise. Use existing Scheme pre-defined functions for checking for remainders. (is-prime-number 19) #t (is-prime-number 27) #f

Answers

Answer:

int is-prime-number(int P){

if (Q == 1) {

     return 1;

} else{

      if (P%Q == 0){

          return 0;

        } else {

           Q = Q - 1;

           is-prime-number(P);

         }

 }

}            

Explanation:

I have defined a simple function by the name of is-prime-number which takes an integer input the number to be tested whether it is prime or not and returns an integer output.if the function returns 1 (which means true) this means that the number is prime otherwise the number is not prime.Now we just need to call this function in our main function and print "Number is prime" if function returns one otherwise print "Number is not prime".Another important point to note here is that we need to define Q as Global variable since we are not passing it as a input to the function but we are using it inside the function so it needs to be declared as a Global variable.

Which of the following statements is true of the term "FTTH"?
1. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
2. It refers to broadband service provided via light-transmitting fiber-optic cables.
3. It refers to the language used to compose Web pages.
4. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
5. It refers to a system that connects end users to the Internet.

Answers

Answer:

2. It refers to broadband service provided via light-transmitting fiber-oprtics cables.

Explanation:

FTTH (which stands for Fiber-To-The-Home) is actually only one of the many similar services available, which all are identified by the acronym FTTx, where X, can be one of the following:

H = Home

C= Curb

B = Building

N= Neighborhood

This type of services are given on an all-passive network, composed only by fiber optic cables and passive splitters, carrying the broadband signal over one single fiber directly to the user, employing wave division multiplexing over a single mode fiber, in the 1310/1550/1625 nm range.

Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit, and worst-fit algorithms place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB (in order)? Rank the algorithms in terms of how efficiently they use memory.

Answers

Answer:

In terms of efficient use of memory: Best-fit is the best (it still have a free memory space of 777KB and all process is completely assigned) followed by First-fit (which have free space of 777KB but available in smaller partition) and then worst-fit (which have free space of 1152KB but a process cannot be assigned). See the detail in the explanation section.

Explanation:

We have six free memory partition: 300KB (F1), 600KB (F2), 350KB (F3), 200KB (F4), 750KB (F5) and 125KB (F6) (in order).

Using First-fit

First-fit means you assign the first available memory that can fit a process to it.

115KB will fit into the first partition. So, F1 will have a remaining free space of 185KB (300 - 115).500KB will fit into the second partition. So, F2 will have a remaining free space of  100KB (600 - 500)358KB will fit into the fifth partition. So, F5 will have a remaining free space of 392KB (750 - 358)200KB will fit into the third partition. So, F3 will have a remaining free space of 150KB (350 -200)375KB will fit into the remaining partition of F5. So, F5 will a remaining free space of 17KB (392 - 375)

Using Best-fit

Best-fit means you assign the best memory available that can fit a process to the process.

115KB will best fit into the last partition (F6). So, F6 will now have a free remaining space of 10KB (125 - 115)500KB will best fit into second partition. So, F2 will now have a free remaining space of 100KB (600 - 500)358KB will best fit into the fifth partition. So, F5 will now have a free remaining space of 392KB (750 - 358)200KB will best fit into the fourth partition and it will occupy the entire space with no remaining space (200 - 200 = 0)375KB will best fit into the remaining space of the fifth partition. So, F5 will now have a free space of 17KB (392 - 375)

Using Worst-fit

Worst-fit means that you assign the largest available memory space to a process.

115KB will be fitted into the fifth partition. So, F5 will now have a free remaining space of 635KB (750 - 115)500KB will be fitted also into the remaining space of the fifth partition. So, F5 will now have a free remaining space of 135KB (635 - 500)358KB will be fitted into the second partition. So, F2 will now have a free remaining space of 242KB (600 - 358)200KB will be fitted into the third partition. So, F3 will now have a free remaining space of 150KB (350 - 200)375KB will not be assigned to any available memory space because none of the available space can contain the 375KB process.

Based on the efficient use of memory, the algorithm are ranked as:

Best fit.First fit.Worst fit.

Given the following data:

M1 = 300 KB.M2 = 600 KB.M3 = 350 KB.M4 = 200 KB.M5 = 750 KB.M6 125 KB.P1 = 115 KB.P2 = 500 KB.P3 = 358 KB.P4 = 200 KB.P5 = 375 KB.

What is a first-fit algorithm?

A first-fit algorithm can be defined as the simplest technique of allocating memory block to processes by assigning the first available memory.

For P1 with a memory size of 115 KB, it would fit into the first memory partition.

[tex]M_1=300-115\\\\M_1=185\;KB[/tex]

For P2 with a memory size of 600 KB, it would fit into the second memory partition.

[tex]M_2=600-500\\\\M_2=100\;KB[/tex]

For P3 with a memory size of 358 KB, it would fit into the fifth memory partition.

[tex]M_5=750-358\\\\M_5=392\;KB[/tex]

For P4 with a memory size of 200 KB, it would fit into the third memory partition.

[tex]M_3=350-200\\\\M_3=150\;KB[/tex]

For P5 with a memory size of 375 KB, it would fit into the remaining fifth memory partition.

[tex]M_5=392 - 375\\\\M_5=17\;KB[/tex]

What is a best-fit algorithm?

A best-fit algorithm can be defined as the technique of allocating memory block to processes by assigning the smallest partition size that can store the process.

For P1 with a memory size of 115 KB, it would best fit into the sixth memory partition.

[tex]M_6=125-115\\\\M_6=10\;KB[/tex]

For P2 with a memory size of 600 KB, it would best fit into the second memory partition.

[tex]M_2=600-500\\\\M_2=100\;KB[/tex]

For P3 with a memory size of 358 KB, it would best fit into the fifth memory partition.

[tex]M_5=750-358\\\\M_5=392\;KB[/tex]

For P4 with a memory size of 200 KB, it would best fit into the fourth memory partition.

[tex]M_3=200-200\\\\M_3=0\;KB[/tex]

For P5 with a memory size of 375 KB, it would best fit into the remaining fifth memory partition.

[tex]M_5=392 - 375\\\\M_5=17\;KB[/tex]

What is a worst-fit algorithm?

A worst-fit algorithm can be defined as the technique of allocating memory block to processes by assigning the largest partition size that can store the process.

For P1 with a memory size of 115 KB, it would fit into the fifth memory partition.

[tex]M_6=750-125\\\\M_6=635\;KB[/tex]

For P2 with a memory size of 500 KB, it would fit into the remaining fifth memory partition.

[tex]M_5=635 - 500\\\\M_5=135\;KB[/tex]

For P3 with a memory size of 358 KB, it would fit into the second memory partition.

[tex]M_5=600 - 358\\\\M_5=242\;KB[/tex]

For P4 with a memory size of 200 KB, it would fit into the third memory partition.

[tex]M_3=350 - 200\\\\M_3=150\;KB[/tex]

For P5 with a memory size of 375 KB, it would best fit into any of the memory partition that is available.

Read more on memory partition here: https://brainly.com/question/24593920

Write a loop that reads in a collection of words and builds a sentence out of all the words by appending each new word to the string being formed. For example, if the three words This, is, one are entered, your sentence would be "this", then "This is", and finally "This is one". Exit your loop when a word that ends with a period is entered or the sentence being formed is longer than 20 words or contains more than 100 letters. Do not append a word if it was previously entered

Answers

Answer:

#section 1

import re

wordcount = 0

lettercount = 0

words = ['This', 'is', 'one','one', 'great','Dream.', 'common', 'hella', 'grade','grace','honesty','diligence','format','young',]

sentence = []

#section 2

for a in words:

   wordcount = wordcount + 1

   for i in a:

       lettercount= lettercount + 1

       

   if a not in sentence:  

       sentence.append(a)

   if lettercount > 100:

       break

   if wordcount > 20:

       break              

   if re.search('(\w+\.$)', a):

       break

 

   

   

sentence = ' '.join(sentence)    

print(sentence)

   

Explanation:

The programming language used is python.

#section 1

The regular expression module is imported because we need to use it to determine if a word entered ends with a full-stop.

Two variables are initialized to hold the number of words and the number of letters and an empty list is created to hold the sentence that is going to be created.

A collection of words are placed in a list in order test the code.

#section 2

Two FOR loops and a group of IF statements are used to check if the words entered satisfy any of the conditions.

The first FOR loop counts the number of words and the second one counts the number of letters.

The first IF statement checks to make sure the word has not been added to the sentence list and adds it if not present, while the next two IF statements check the word count and letter count to ensure that they have not exceeded 20 or 100 respectively and if they exceed, the loop is broken. The last IF statement uses regular expression to check if a word ends with a full-stop and if it does, it breaks the the loop.

Finally, the sentence list is joined and the sentence is printed to the screen.

What is the output of the code corresponding to the following pseudocode? (In the answer options, new lines are separated by commas.) Declare X As Integer Declare Y As Integer For (X = 1; X <=2; X++) For (Y = 3; Y <= 4; Y++) Write X * Y End For(Y) End For(X)

Answers

Answer:

Following are the output of the given question

3 4 6 8

Explanation:

In the following code, firstly, we have declare two integer data type "X" and "Y".

Then, set two for loop in which first one is outer loop and the second one is the inner loop, inner loop starts from 1 and end at 2 and outer loop starts from 3 and end at 4.Then, when the variable X=1 then the condition of the outer loop become true and the check the condition of the inner loop, when Y=3, than the multiplication of X and Y occur and output should be 1*3=3.Then, the value of the X will remain same at time when the value of Y become false. Thrn, second time X=1 and Y=4 and output should be 4.Then, X=2 because Y turns 5 so the inner loop will terminate and than outer loop will execute. Then again Y=3 but X=2 and output should be 6.Then, the value of the X will remain same at time when the value of Y become false. Thrn, second time X=2 and Y=4 and output should be 8.

Finally, all the conditions of the loop become false and the program will terminate.

45, 78, 23, 12, 63, 90, 38, 56, 88, 15 Using the sequential search as described in this chapter, how many comparisons are required to find whether the following items are in the list? (Recall that by comparisons we mean item comparisons, not index comparisons.)
a. 90
b. 14
c. 45
d. 23
e. 5

Answers

Explanation:

By using the sequential search we find the following results.

The first key is 90 and its comparison number is 6. The second key is 14 and its comparison number is 10. The third key is 45 and its comparison number is 1. The fourth key is 23 and its comparison number is 3. The fifth key is 5 and its comparison number is 10.

Write a filter that reads in a sequence of integers and prints the integers, removing repeated values that appear consecutively. For example, if the input is 1 2 2 1 5 1 1 7 7 7 7 1 1 1 1 1 1 1 1 1, your program should print 1 2 1 5 1 7 1.

Answers

Answer:

Following is the code for filter:

public class filter

{ public static void main(String[] args)

{ int x = StdIn.readInt();

System.out.print(" " + x + " ");

while(!StdIn.isEmpty())

{ int y = StdIn.readInt();

    if(y != x)

          System.out.print(" " + y + " ");

    x = y;

    }

    }

    }

Explanation:

A public class filter is used.The main function will accept a single argument as string[], it is also known as java command line argument.Now the Stdln.readInt is used to read the integers in the sequence and store it in integer x.The value stored in variable x will be printed using System.out.print Now unless the Stdln.readInt gets an empty value, check each value of sequence and store in variable y.If y is not equal to previous value x, print it and shift the value of y into x. Repeat the loop again.

i hope it will help you!

Answer:

Computer

Explanation:

Which type of network is designed to facilitate communications between users and applications over large distances? (For example: between the various corporate offices of an international organization that are located in cities all over the world.)

Answers

Answer:

Wide area network (WAN)

Explanation:

The WAN network is a type of network that covers distances of about 100 to about 1,000 kilometers, allowing to provide connectivity to several cities or even an entire country. WAN networks can be developed by a company or an organization for private use, or even by an Internet Service Provider (ISP) to provide connectivity to all its customers. Generally, the WAN network operates point to point, so it can be defined as a switched packet network. These networks, on the other hand, can use radio or satellite communication systems.

A small tourist town is experiencing rapid beach erosion. Based on the information in the animation, what is the best solution to quickly resolve the problem for residents and visitors?
A. Allow residents to install groins.
B. Construct an offshore breakwater.
C. Build a jetty just up current from the town.
D. Invest in beach nourishment.

Answers

Answer:

The answer is Letter A.

Explanation:

Allow residents to install groins.

The best solution to quickly resolve rapid beach erosion in a small tourist town, for residents and visitors, is option D: Invest in beach nourishment.

By choosing beach nourishment, the town directly addresses the loss or lack of sand which is the primary cause of erosion. This method supplements natural processes, augments the beach with additional sand, and is more adaptable to changes in coastal processes. Structures such as groins, breakwaters, and jetties often lead to disruptions in longshore drift, causing sediment buildup on one side but exacerbating erosion on the other, leading to a cycle of continuous construction. The benefit of this "soft" solution is its ability to maintain a natural and recreational beachfront without creating lee-side erosion. Sand nourishment thus provides a more sustainable and less intrusive solution compared to hard structures that can disrupt the natural sediment movement and potentially cause more problems in adjacent areas.

What is VoIP?

A. VoIP uses IP technology to transmit telephone calls

B. VoIP offers the low cost ability to receive personal and business calls via computer

C. VoIP offers the ability to have more than one phone number

D. All of these are correct

Answers

Answer:

D. All of these are correct

Explanation:

VoIP transmits voice data packets over the internet. It is a low-cost option for receiving personal and business calls because it uses existing infrastructure that is the internet to transmit calls, unlike traditional telephone systems that require specialized equipment such as PBXs that are costly.VoIP also offers the ability to have more than one telephone number, as long as the bandwidth is enough, it allows multiple connections at any given time.

If the base address of an array is located at 0x1000FFF4, what would the following instructions be equivalent to (assume this array has the name, my_array)? li $t0, 45 li $s1, 0x1000FFF4 sw $t0, 8($s1) Group of answer choices my_array[0] = 45 my_array[1] = 45 my_array[2] = 45 my_array[8] = 45 my_array[0] = 0x1000FFF4 my_array[1] = 0x1000FFF4 my_array[2] = 0x1000FFF4 my_array[8] = 0x1000FFF4

Answers

Answer:

The correct option to the following question is my_array[2] = 45.

Explanation:

Because the offset '8' which used for the subscript 8 divided by 4 which is 2.

So, that's why my_array[2] = 45 is the correct answer to the following question.

An array is the data type in the programming languages which stores the same type of data at a time whether it an integer type or string type.

Write a Python program where the user enters the number of elements in a list ‘n’ and those ‘n’ numbers that form the list. The user also enters a number ‘m’ by which all the elements of the list are multiplied and printed. You must print both the list before multiplying and the list after multiplied by the number ‘m’.

Answers

Answer:

lst = []

multiple = []

num = int(input('How many numbers: '))

multipleOf = int(input('Enter the number to multiply with: '))

for n in range(num):

 lst.append(n)

 numbers = n * multipleOf

 multiple.append(numbers)

print("elements in given list is :", lst)

print("multiple in given list is :", multiple)

Explanation:

User will enter the number and then enter the number to multiply that list.

A datagram network allows routers to drop packets whenever they need to. The probability of a router discarding a packetis p. Consider the case of a source host connected to the source router, which is connected to the destination router, andthen to the destination host If either of the routers discards a packet, the source host eventually times out and tries again.If both host-router and router- router lines are counted as hops, what is the mean number of(a) hops a packet makes per transmission?(b) transmissions a packet makes?(c) hops required per received packet?

Answers

Answer:

a.) k² - 3k + 3

b.) 1/(1 - k)²

c.) [tex]k^{2}  - 3k + 3 * \frac{1}{(1 - k)^{2} }\\\\= \frac{k^{2} - 3k + 3 }{(1-k)^{2} }[/tex]

Explanation:

a.) A packet can make 1,2 or 3 hops

probability of 1 hop = k  ...(1)

probability of 2 hops = k(1-k)  ...(2)

probability of 3 hops = (1-k)²...(3)

Average number of probabilities = (1 x prob. of 1 hop) + (2 x prob. of 2 hops) + (3 x prob. of 3 hops)

                                                       = (1 × k) + (2 × k × (1 - k)) + (3 × (1-k)²)

                                                       = k + 2k - 2k² + 3(1 + k² - 2k)

∴mean number of hops                = k² - 3k + 3

b.) from (a) above, the mean number of hops when transmitting a packet is k² - 3k + 3

if k = 0 then number of hops is 3

if k = 1 then number of hops is (1 - 3 + 3) = 1

multiple transmissions can be needed if K is between 0 and 1

The probability of successful transmissions through the entire path is (1 - k)²

for one transmission, the probility of success is (1 - k)²

for two transmissions, the probility of success is 2(1 - k)²(1 - (1-k)²)

for three transmissions, the probility of success is 3(1 - k)²(1 - (1-k)²)² and so on

∴ for transmitting a single packet, it makes:

     ∞                             n-1

T = ∑ n(1 - k)²(1 - (1 - k)²)

    n-1

   = 1/(1 - k)²

c.) Mean number of required packet = ( mean number of hops when transmitting a packet × mean number of transmissions by a packet)

from (a) above, mean number of hops when transmitting a packet =  k² - 3k + 3

from (b) above, mean number of transmissions by a packet = 1/(1 - k)²

substituting: mean number of required packet =  [tex]k^{2}  - 3k + 3 * \frac{1}{(1 - k)^{2} }\\\\= \frac{k^{2} - 3k + 3 }{(1-k)^{2} }[/tex]

Final answer:

A packet makes on average (2-p) hops per transmission, with the mean number of transmissions being 1/((1-p)^2), and hence hops required per received packet being (2-p)/((1-p)^2).

Explanation:

Mean Number of Hops and Transmissions for Datagram Networks

To find the mean number of hops per transmission, consider that there are 4 hops possible (source to source router, source router to destination router, destination router to destination, and destination to destination router in the case of a retry). Assuming a retry only occurs when a packet is dropped, and each router has a probability p of dropping a packet, we have, on average, 1 successful hop from source to source router, and with probability 1-p, 1 successful hop from source router to destination router. Therefore, the mean number of hops per transmission would be 1 + (1-p) = 2-p.

For part (b), the number of transmissions a packet makes can be modeled as a geometric distribution with the probability of success being (1-p)^2, since a packet must successfully pass both routers. The mean number of transmissions is the reciprocal of this probability, 1/((1-p)^2).

Part (c) is a combination of parts (a) and (b): it is the product of the mean number of hops per transmission and the mean number of transmissions required for a packet to be successfully received, which equals (2-p)/((1-p)^2).

Today we will be making a Caesar Cipher to encrypt and decrypt messages.A Caesar Cipher is a simple cipher that translates one letter to another via shifting the letter a few spaces in the alphabet. For example:A Caesar Cipher with a shift of 3 would turn A into D, B into E, C into F, and so on.Your task is to use string methods and two user defined functions (an encrypt function and a decrypt function) to produce an encrypted message from a "plaintext" message and a "plaintext" message from an encrypted message.The program should use a menu such as:1. Encrypt2. Decrypt3. ExitThe menu should be displayed in a loop until the user chooses to exit. When the user chooses the Encrypt option, your program should prompt the user to input a "plaintext" string. Then the program should display what the encrypted text would be.When the user chooses the Decrypt option, your program should prompt the user for an encrypted message and then display the "plaintext" version of that message to the user.For this program each message should be a single word and your cipher should use a shift of 3.Any message entered by the user should be capitalized using a user defined function that will take a string in by reference and use the toupper() function from to capitalize each letter of the string.

Answers

Answer:

#include <iostream>

#include <stdio.h>

#include <ctype.h>

using namespace std;

string

encrypt (string text, int s)

{  string resultingString = "";

 for (int i = 0; i < text.length (); i++)

   {      if (!isspace (text[i]))

{

  if (isupper (text[i]))

    resultingString += char (int (text[i] + s - 65) % 26 + 65);

  else

  resultingString += char (int (text[i] + s - 97) % 26 + 97);

}

     else

{

  resultingString += " ";

}

  }

 return resultingString;

}

string

decrypt (string text, int s)

{

 string resultingString = "";

 for (int i = 0; i < text.length (); i++)

   {

     if (!isspace (text[i]))

{

  if (isupper (text[i]))

    resultingString += char (int (text[i] + s - 65) % 26 + 65);

  else

  resultingString += char (int (text[i] + s - 97) % 26 + 97);

}

     else

{

  resultingString += " ";

}

   }

 return resultingString;

}

string upper(string str){

   for (int i=0;i<str.length();i++){

       str[i]=toupper(str[i]);

   }

   return str;

}

int

main ()

{

 string text = "This is test text string";

 

 int s = 3;

 string cipherText = "";

 string decipherText = "";

int menu=-1;

while (menu!=3){

   cout<<"1. Encrypt"<<endl;

   cout<<"2. Decrypt"<<endl;

   cout<<"3. Exit"<<endl;

   cin >>menu;

   cin.ignore();

   if(menu==1){

       cout<<"Enter Plain string "<<endl;

       getline(cin,text);

       text=upper(text);

         cipherText = encrypt (text, s);

           cout << "cipher text: " << cipherText << endl;

   }

   else if(menu==2){

       cout<<"Enter Encrypted string "<<endl;

       getline(cin,cipherText);

               cipherText=upper(cipherText);

         decipherText = decrypt (cipherText, 26 - s);

 cout << "decipher text: " << decipherText << endl;

   }

   else {

       cout<<"Not valid"<<endl;

   }

}

 return 0;

}

Explanation:

Display menu with options 1 encrypt, 2 decrypt, 3 exit. Write a function to translate string to upper case. Iterate through string and for each index use toupper function to translate alphabet to upper case and store it back to current index of string.On exiting from loop return string. Pass upper case string to encrypt function.

In encrypt function pass string by reference and shift value. Create an empty string resultingString. Iterate through string for each character check if its space, if its a space add it to resulting string otherwise using ascii values convert char to its ascii add shift value and subtract 65 (staring ascii value for capital alphabet) take modules with 26 for new character and than add 65 to get alphabet.Now add this alphabet to resulting string. Upon loop completion return resultingString.

For decryption use same function as encryption. We are using cyclic property to decrypt using same function therefor subtract shift from 26 and pass resulting shift value to decrypt function.

Not having the computer echo the password is safer than having it echo an asterisk for each character typed, since the latter discloses the password length to anyone nearby who can see the screen. Assuming that passwords consist of upper and lower case letters and digits only, and that passwords must be a minimum of five characters and a maximum of eight characters, how much safer is not displaying anything?

Answers

Answer:

Up to 99.99958% safer

Explanation:

Assuming the attacker knows the password restrictions (upper and lower case letters and digits only)

Lets calculate the password combinations for each possible length:

Total characters possible: [a-z]+[A-Z]+[0-9] = 62

(A) Passwords of length = 8  ->  [tex]62^8=218,340,105,584,896[/tex]

(B) Passwords of length = 7  ->  [tex]62^7=3,521,614,606,208[/tex]

(C) Passwords of length = 6  ->  [tex]62^6=56,800,235,584[/tex]

(D) Passwords of length = 5  ->  [tex]62^5=916,132,832[/tex]

If length is not known, but between 5 and 8:

(E) Passwords of length = [5-8] ->  

[tex]\sum_{5 \to 8} 62^{n} = \frac{62^9-62^5}{62-1}=221,919,436,559,520[/tex]

Finally, to compare how much safer is to keep the password length hidden, we'll calculate the percentage of (A) to (D) passwords against (E)

The formulas are:  

[tex]1-\frac{(A)}{(E)} *100 = 1.61\% safer[/tex]

[tex]1-\frac{(B)}{(E)} *100 = 98.41\% safer[/tex]

[tex]1-\frac{(C)}{(E)} *100 = 99.97\% safer[/tex]

[tex]1-\frac{(D)}{(E)} *100 = 99.99958\% safer[/tex]

Write definitions for the following two functions using Python:
sumN (and) returns the sum of the first n natural numbers.
sumN Cubes (and) returns the sum of the cubes of the first n natural numbers.
Then use these functions in a program that prompts a user to enter a number ‘n’ and print out the sum of the first n natural numbers, and the sum of the cubes of the first n natural numbers.

Answers

I got to think about this again. Come back later! X=22.78

Two Python functions are defined: sumN to compute the sum of the first n natural numbers, and sumN_Cubes to compute the sum of the cubes of the first n natural numbers. A user is then prompted to input a number 'n', and the program prints out the results of both functions.

Defining Sum Functions in Python

To start with, let's define the two functions as described. The first function sumN will calculate the sum of the first n natural numbers. The second function sumN Cubes will calculate the sum of the cubes of the first n natural numbers. Then we will use these functions in a program that prompts the user for an input and prints out the results.

Here are the Python definitions:

def sumN(n):
   return sum(range(1, n+1))
def sumN_Cubes(n):
   return sum(x**3 for x in range(1, n+1))
n = int(input('Enter a number n: '))
print(f'Sum of the first {n} natural numbers is: {sumN(n)}')
print(f'Sum of the cubes of the first {n} natural numbers is: {sumN_Cubes(n)}')

The program first defines the functions using the def keyword. Then it prompts the user to enter a number and stores it as n. Lastly, it calculates and prints the results using the defined functions.a

What is Scrum?
1. A routine method of deploying deliverables to operations
2. A process for continuously maintaining deployment readiness
3. A lightweight process for cross-functional, self-organized teams
4. A methodology used to deliver usable and reliable solutions to the end user

Answers

Answer:

A lightweight process for cross-functional, self-organized teams.

Explanation: The process in which teams are cross functional and self organizing to complete a particular task. This term is used in software development. Progress towards well defined goal with by emphasizing on teamwork and accountability.

Scrum is option 3. a lightweight process for cross-functional, self-organized teams, emphasizing structured roles and regular, brief meetings.

Option 3. Scrum is a lightweight process for cross-functional, self-organized teams. It is widely used in the IT industry and is a focused and organized approach compared to general agile development. Scrum teams operate using defined roles, such as the Scrum Master, and follow structured activities, including daily stand-up meetings to ensure progress and address obstacles.

The process is characterized by:

Product backlogs that contain evolving requirements.Sprint backlogs that dictate tasks for each sprint, typically shorter than 30 days.Self-organizing teams that coordinate tasks independently with the support of a Scrum Master.Short, daily meetings where team members discuss their progress and challenges.

Throughout the Scrum workflow, the goal is to incrementally develop and deliver functional project components, ensuring continuous improvement and stakeholder collaboration.

Which of the following is a proprietary protocol developed by Microsoft that provides a user with a graphical interface to another computer?
(A) Secure Sockets Layer (SSL)
(B) Layer 2 Tunneling Protocol (L2TP)
(C) Point-to-Point Tunneling Protocol (PPTP)
(D) Remote Desktop Protocol (RDP)

Answers

Answer:

(D) Remote Desktop Protocol (RDP)

Explanation:

Remote Desktop Protocol (RDP) is a networking protocol developed by Microsoft that provides a graphical user interface to another computer. This enables the remote user to interact with the machine as if they were working on it locally. The Secure Socket Layer (SSL) on the other hand, is a cryptographic protocol used in internet security. Then Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) are computer networking protocol used when configuring and setting up Virtual Private Networks (VPNs) which allows a user to access a private network through a public network.

Create two Lists, one is ArrayList and the other one is LinkedList and fill it using 10 state names (e.g., Texas). Sort the list and print it, and then shuffle the lists at random. Please use java.util.Collections class to do sorting and shuffling.

Answers

Answer:

The program to this question can be given as:

Program:

import java.util.*; //import package

public class Main //define class main.

{

public static void main(String[] args) //define main method.

{

ArrayList<String> AL1 = new ArrayList<>(); //create ArrayList object AL1.

LinkedList<String> LL2 = new LinkedList<>(); //create LinkedList object LL2.

AL1.addAll(Arrays.asList("Bihar","Andhra Pradesh","Assam","Chhattisgarh","Arunachal Pradesh","Goa","west bangol","Gujarat","Jharkhand","Karal"));//add elements in ArrayList

LL2.addAll(Arrays.asList("Bihar","Andhra Pradesh","Assam","Chhattisgarh","Arunachal Pradesh","Goa","west bangol","Gujarat","Jharkhand","Karal"));//add elements in LinkedList

Collections.sort(AL1); //sort ArrayList

Collections.sort(LL2); //sort LinkedList

System.out.println("Sorting in ArrayList and LinkedList elements :");

System.out.println("ArrayList :\n" +AL1);

System.out.println("LinkedList :\n"+LL2);

Collections.shuffle(AL1); //shuffle ArrayList

Collections.shuffle(LL2); //shuffle LinkedList

System.out.println("shuffling in ArrayList and LinkedList elements :");

System.out.println("shuffle ArrayList:\n"+AL1);

System.out.println("shuffle LinkedList:\n"+LL2);

}

}

Output:

Sorting in ArrayList and LinkedList elements :

ArrayList :

[Andhra Pradesh, Arunachal Pradesh, Assam, Bihar, Chhattisgarh, Goa, Gujarat, Jharkhand, Karal, west bangol]

LinkedList :

[Andhra Pradesh, Arunachal Pradesh, Assam, Bihar, Chhattisgarh, Goa, Gujarat, Jharkhand, Karal, west bangol]

shuffling in ArrayList and LinkedList elements :

shuffle ArrayList:

[Chhattisgarh, Jharkhand, Gujarat, Goa, west bangol, Andhra Pradesh, Arunachal Pradesh, Assam, Karal, Bihar]

shuffle LinkedList:

[Assam, Karal, Jharkhand, Bihar, Goa, Arunachal Pradesh, Andhra Pradesh, Gujarat, west bangol, Chhattisgarh]

Explanation:

In the above java program firstly we import the package then we define the main method in this method we create the ArrayList and LinkedList object that is AL1 and LL2.

In ArrayList and LinkedList we add state names then we use the sort and shuffle function. and print all values.

The sort function is used to sort array by name. The shuffle function is used to Switching the specified list elements randomly.

Write an expression to detect that the first character of userinput matches firstLetter. 1 import java.util.Scanner; 3 public class CharMatching 4 public static void main (String [] args) { Scanner scnr new Scanner(System.in); String userInput; char firstLetter; userInput = scnr.nextLine(); firstLetter scnr.nextLine().charAt (0); 12 13 14 15 if (/* Your solution goes here * System.out.printin( "Found match: "firstLetter); else t System.out.println("No match: " firstLetter); 17 18 19 20 21 return

Answers

Answer:

if(Character.toUpperCase(firstLetter)==Character.toUpperCase(userInput.charAt(0)))

Explanation:

The given source code is an illustration of characters and strings in Java program.

To complete the code segment, the comment /* Your solution goes here */ in the program, should be replaced with any of the following expressions:

Character.toUpperCase(firstLetter)==Character.toUpperCase(userInput.charAt(0))Character.toLowerCase(firstLetter)==Character.toLowerCase(userInput.charAt(0))

Using the first instruction above

Variable firstLetter will first be converted to upper caseThe first character of userInput will then be extracted using charAt(0)The first character is then converted to upper caseLastly, both characters are compared

So, the complete code (where comments are used to explain each line) is as follows:

//This imports the Scanner library

import java.util.Scanner;

//This defines the program class

public class Main {

//This defines the program method

public static void main (String [] args) {

//This creates a Scanner object

Scanner scnr = new Scanner(System.in);

//This declares variables userInput and firstLetter

String userInput; char firstLetter;

//This gets input for userInput

userInput = scnr.nextLine();

//This gets input for firstLetter

firstLetter = scnr.nextLine().charAt(0);

//This checks if the first letter of userInput matches with variable firstLetter

if (Character.toUpperCase(firstLetter)==Character.toUpperCase(userInput.charAt(0))){

//If yes, found match is printed

System.out.println( "Found match: "+firstLetter); }

else{

//If otherwise, no match is printed

System.out.println("No match: "+ firstLetter);

}

}

}//Program ends here

See attachment for the complete code and the sample run

Read more about java programs at:

https://brainly.com/question/2266606

A mass m is attached to the end of a rope of length r = 3 meters. The rope can only be whirled around at speeds of 1, 10, 20, or 40 meters per second. The rope can withstand a maximum tension of T = 60 Newtons. Write a program where the user enters the value of the mass m, and the program determines the greatest speed at which it can be whirled without breaking the rope.

Answers

Answer:

Explanation:

Let's do this in Python. We know that the formula for the centripetal force caused by whirling the mass is:

[tex]F = m\frac{v^2}{r}[/tex]

where v is the speed (1, 10, 20, 40) and r = 3 m is the rope length.

Then we can use for loop to try calculating the tension force of each speed

def maximum_speed(m):

    for speed in [1, 10, 20, 40]:

         tension_force = m*speed^2/3

         if tension_force > 60:

              return speed

    return speed

Write a program that calculates and displays the number of minutes in a month. This program does not require any user input, and you can assume 30 days are in a month. NOTE: If you want to be an overachiever, you can prompt the user to enter in the number of days in the month since we know that in reality not all months have 30 days.

Answers

Answer:

Code to the answer is shown in the explanation section

Explanation:

import java.util.Scanner;

public class Question {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Please enter the days of the month: ");

     int daysOfMonth = scan.nextInt();

     int minuteOfMonth = daysOfMonth * 60 * 24;

     System.out.println(minuteOfMonth);

   }

}

// 60 represents the number of minutes in one hour

// 24 represents the number of hours in a day

In an If-Then-Else statement, the Else clause marks the beginning of the statements to be executed when the Boolean expression is ________.

Answers

Answer:

False

Explanation:

The definition for the If-Then-Else structure is as follows:

IF (boolean_condition)  

THEN (commands_for_true)  

ELSE (commands_for_false)

When there is an ELSE sentence, its commands are to be executed whenever previous conditions where not evaluated as true .

Final answer:

The correct answer is False. In programming, the Else clause in an If-Then-Else statement is executed when the Boolean expression is false. It's a key component of conditional statements, directing the flow of the program when conditions are not met.

Explanation:

In an If-Then-Else statement, the Else clause marks the beginning of the statements to be executed when the Boolean expression is false. Essentially, the If-Then-Else statement is a form of conditional statement that controls the flow of execution in a program. The structure typically looks like IF X, THEN Y, ELSE Z, where X is the condition, Y is the statement block executed if the condition X evaluates to true, and Z is the statement block executed if the condition X evaluates to false. Here, X is a Boolean expression, indicating a condition that evaluates to either true or false.

An If-Then-Else statement ensures that one out of two possible paths of execution is followed in the program. If the condition in the IF clause is true, the code following the THEN keyword is executed. If the condition is false, the code following the ELSE keyword is executed, hence the critical role of the ELSE clause is to handle the scenario where the condition evaluates as false.

Which of the following is no an example of virtualization software that can be used to install Linux within another operating system?

a. VMWare
b. Microsoft Hyper-V
c. Spiceworks
d. Oracle VirtualBo

Answers

Answer:

C. Spiceworks

Explanation:

Spiceworks is the answer as it is not an example of virtualization software. The other options (VMWare, Microsoft Hyper-V and Oracle VirtualBox) are all example of virtualization software that can be use to install Linux within another operating system.

Final answer:

Spiceworks is not an example of virtualization software; it is used for network monitoring and help desk ticketing.

Explanation:

The student is asking about virtualization software that can be used to install Linux within another operating system. The correct answer is c. Spiceworks. VMWare, Microsoft Hyper-V, and Oracle VirtualBox are all examples of virtualization platforms that allow for the creation and management of virtual machines (VMs) where one can install various operating systems, including Linux. Spiceworks, however, is a software that offers network monitoring and help desk ticketing, not virtualization.

Other Questions
What is the relationship between the sides of a right triangle? Write the vector v in terms of i and j whose magnitude ||v|| and direction 0 are given. ||v|| = 4, 0 = 315 degree v= (Type your answer in terms of i and j. Type an exact answer using radicals as needed. 8 is 25% of what number? Part AWhat volume of 0.210 M K S solution is required to completely react with 175 mL of 0.140 M CO(NO3),? The length of a rectangle is 1.3 feet, and the width is 2.1 feet. What is the perimeter Which statement accurately describes attitudes towards the barrier between Israel and the West Bank? AIt was built by artists to represent a natural landscape feature of the Jordan River as described in early religious texts.BIt is controversial because it places about 9 percent of Palestinian land in Israeli territory,CIt is welcomed by both the Palestinian and Israeli governments, regardless of their political affiliations.DIt is popular in Jordan because it follows the previous border between Israel and Jordan.EIt is internationally recognized as having helped establish peace in the Middle East. Lin is making a window covering for a window that has the shape of a half circle on top of a square of side length 3 feet. How much fabric does she need What is the formula to find the sum of cells a1 a2 and a3 One end of a string is attached to a ball, with the other end held by a student such that the ball is swung in a horizontal circular path of radius R at a constant tangential speed. At a later time, the tension force exerted on the ball remains constant, but the length of the string is decreased to R4. What is the new tangential speed of the ball? a. four times the original speed b. two times the original speed c. Half the original speed d. One-fourth the original speed What is the theme of Ballad of Birmingham by Dudley Randall? 1 A quines les escribiste las postales? 2 Quin le recomend ese plato? 3 Quin nos va a abrir la puerta a esta hora? 4 Quin les sirvi el pescado asado? 5 Quin te llev los entremeses? 6 A quin le ofrece frutas Roberto? his term refers to the wilderness area of Georgia that attracted large numbers of Scots-Irish settlers during the Colonial period. This was the principle that a state government can declare a law of the national government invalid within the borders of the state to what height will a 250g soccer ball rise to if it is kicked directly upwards at 8 meters per second 8. (a) Summarize How did France help Americaduring the Revolution?(b) Make Predictions What do you think mighthave happened if France had not come to theaid of America during the Revolution? WILL GIVE BRAINLIEST TO FASTEST ANSWER!! What did General Washington and the United States have to do to win the Revolutionary War?A. The United States had to really work to just create a government to rule the colonies that were now statesB. They had to make an alliance with the Native Americans to help attack and destroy the British in Canada and then later on in the southern colonies.C. They had be able to continue to fight and cost the British large sums of money, deaths of their soldiers, and drag out the length of time for the fighting to wear them down and turn British public opinionD. Washington knew that the British would only surrender if the Continental army was able to conquer New York City and take it back from the British A machine is purchased on September 30, 2009, for $60,000. Useful life is estimated at four years and no residual value is anticipated. The Double Declining Balance depreciation method is used. The acquiring company's fiscal year ends on December 31. Depreciation for 2010 should be: $15,000 $30,000 $26,250 None of the above. What new technologies helped trigger the industrial revolution 1 - A submarine has a circular porthole with a radius of 0.10 m. If a force of more than 2x106 N is applied, the porthole will fail. What is the maximum pressure that this window can support? To what maximum depth can the submarine dive, assuming that the interior is maintained at atmospheric pressure? Vancouver's population has increased for all of these except