Write a program that accepts an ISBN number and displays whether it is valid or not. An ISBN (International Standard Book Number) is a ten digit code which uniquely identifies a book. The first nine digits represent Group, Publisher and Title of the book and the last digit is used as a checksum (to check whether the given ISBN is valid). Each of the digits can take any value between 0 and 9. In addition, the last digit may also take a value X (stands for 10). To verify an ISBN, calculate 10 times the first digit, plus 9 times the second digit, plus 8 times the third and so on until we add 1 time the last digit. If the number 11 can divide the sum (no remainder), the code is a valid ISBN.

Answers

Answer 1

Answer:

is_isbn = True

total = 0

number = input("Enter the ISBN: ")

if len(number) != 10:

   is_isbn = False

for i in range(9):

   if 0 <= int(number[i]) <= 9:

       total += int(number[i]) * (10 - i)

   else:

       is_isbn = False

if number[9] != 'X' and int(number[9]) > 9:

   is_isbn = False

if number[9] == 'X':

   total += 10

else:

   total += int(number[9])

if total % 11 != 0:

   is_isbn = False

if is_isbn:

   print("It is a valid ISBN")

else:

   print("It is NOT a valid ISBN")

Explanation:

Initialize the variables, total and is_isbn - keeps the value for the number if it is valid or not

Ask the user for the ISBN number

If number's length is less than 10, it is not valid, set is_isbn to false

Then, make calculation to verify the ISBN

Check the last digit, if it is not "X" and greater than 10, it is not valid, set is_isbn to false

Again, check the last digit, if it is "X", add 10 to the total, otherwise add its value

Check if total can divide 11 with no remainder. If not, it is not valid, set is_isbn to false

Finally, depending on the is_isbn variable, print the result


Related Questions

Suppose we have an 8 block cache. Each block of the cache is one word wide. When a given program is executed, the processor reads data from the decimal addresses show below. 4, 7, 10, 11, 4, 8, 12, 7 Show the contents of the cache at the end of the above reading operations if the cache is 4-way set associative. Assume blocks will be filled starting at block position zero and the replacement policy is LRU. Use 4 or [ 4 ] to represent the contents of memory at address 4. If the block is empty, enter [ empty ].

Answers

Answer:

check the attached files below for answer.

Explanation:

. Write a toString method for this class. The method should return a string containing the base, height and area of the triangle. b. Write an equals method for this class. The method should accept a Triangle object as an argument. It should return true if the argument object contains the same data as the calling object, or false otherwise. c. Write a greaterThan method for this class. The method should accept a Triangle object as an argument. It should return true if the argument object has an area that is greater than the area of the calling object, or false otherwise.

Answers

Answer:

Check the explanation

Explanation:

Circle.java

public class Circle {

private double radius;

public Circle(double r) {

radius = r;

}

public double getArea() {

return Math.PI * radius * radius;

}

public double getRadius() {

return radius;

}

public String toString() {

String str;

str = "Radius: " + radius + "Area: " + getArea();

return str;

}

public boolean equals(Circle c) {

boolean status;

if (c.getRadius() == radius)

status = true;

else

status = false;

return status;

}

public boolean greaterThan(Circle c) {

boolean status;

if (c.getArea() > getArea())

status = true;

else

status = false;

return status;

}

}

I have created a class also to test this class below is the class: -

MainCircle.java

public class MainCircle {

public static void main(String args[]) {

Circle c = new Circle(2.5);

Circle c1 = new Circle(2.5);

Circle c2 = new Circle(4.5);

System.out.println(c);

System.out.println(c1);

System.out.println(c2);

System.out.println("Is c and c1 equal : "+c.equals(c1));

System.out.println("Is c2 greater than c1 : "+c1.greaterThan(c2));

}

}

Output: -

Radius: 2.5Area: 19.634954084936208

Radius: 2.5Area: 19.634954084936208

Radius: 4.5Area: 63.61725123519331

Is c and c1 equal : true

Is c2 greater than c1 : true

JAVA
Write a function that calculates a total amount of money a worker has made when given the initial salary (per month) and months worked. Every year the worker is at the job, their salary increases by $100 per month.

public static int totalPay(int initial_salary, int months){
}

Answers

Answer:

Answer provided in screenshot, not really too happy with my implementation but it works.

Explanation:

Iterate through months, handling logic for every 12 months to get the raise.

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

What is the coding ?

public class FooCorporation {

   static final double minimumWage = 8.0; // static means that can be accessed without creating an object of the class and instantiating it

   static final int maxHours = 60; // final means constant = cannot be changed after declared

static double basePay=0; // initialize them to zero, at least you know your program won't throw null pointer exception if forgot to set their

                            //values before invoking the method

static int hoursWorked=0;

public static void main(String[] args) {

Scanner in = new Scanner(System.in);

for (int i=1; i<=3; i++, System.out.println()){

System.out.println("For Employee Number: " + i);

System.out.println("Enter Base Pay:");

basePay = in.nextDouble();

System.out.println("Enter Hours Worked:");

hoursWorked = in.nextInt();

salaryCalculation();

}

}

public static void salaryCalculation(){

double totalSalary = 0;

 if ((basePay < minimumWage) || (hoursWorked > maxHours)){

  System.out.println("Error!");

  }

else {  

if (hoursWorked > totalSalary = basePay * 40 + 1.5*basePay*(hoursWorked - 40);

 }

 else {

 totalSalary = basePay * hoursWorked;

  }

  System.out.println("Your total salary is " + totalSalary);

  }

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

To learn more about Java refer to:

https://brainly.com/question/26642771

#SPJ2

he cost of an international call from New York to New Delhi is calculated as follows: connection fee,$1.99; $2.00 for the first three minutes; and $0.45 for each additional minute. Write a program thatprompts the user to input a number. The program should then output the number of minutes the calllasted and output the amount due. Format your output with two decimal places

Answers

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

int main ()

{

// Declare and initialize variables

float connecfee = 1.99;

float first3 = 2.00;

float addmin = 0.45; float cost;

int minutes;

// Prompt user for minutes talked

cout<<"Enter Number of Minutes: ";

cin>>minutes;

// Calculate cost;

if(minutes < 1)

{

cout<<"Enter a number greater than 0";

}

else if(minutes <= 3)

{

// Calculating cost for minutes less than or equal to 3

cost = connecfee + first3 * minutes;

cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;

}

else

{

cost = connecfee + first3 * 3 + addmin * (minutes - 3);

cout<<"Talk time of "<<minutes<<" minutes costs "<<cost;

}

return 0;

}

// End of Program

a text file has student data such that each line of text has a student first name (a non-empty alphabetic string) followed by exam scores (non-negative integers) separated by spaces. the number of scores might be different for each student, and each student has at least one score. see studentdata1, student data2, and student data3 in the drive folder homework. define a function student_minmax(filename) that has one parameter, the name of the file that has the student data, and returns a dictionary. the dictionary has the student names as keys and, as values, a list of two scores, the min and max scores for that student. for example, the call student_minmax('studentdata1.txt') will return the dictionary: {'joe': [5, 10], 'sue': [7, 10]}.

Answers

Answer:

def student_minmax(filename):  

  """

      Description: Reads student names and finds min and max score

      Input: Name of the file that has the student data

      Output: Dictionary with name as key and value is a list with min and max values

  """

  # Dictionary that holds the results

  studentDict = {}

  # Opening and reading file

  with open(filename, "r") as fp:

      # Reading data line by line

      for line in fp:

          # Stripping new line

          line = line.strip()

          # Splitting into fields

          fields = line.split(' ')

          # Getting name and scores

          name = fields[0]

          scores = []

          scoresStr = fields[1:]

          # Converting to integer

          for score in scoresStr:

              scores.append(int(score))

          # Storing in dictionary

          studentDict[name] = []

          studentDict[name].append(min(scores))

          studentDict[name].append(max(scores))

         

  # Returning dictionary

  return studentDict  

 

# Testing function

resDict = student_minmax("d:\\Python\\studentMarks.txt")

# Printing dict

print(resDict)

Explanation:

______________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices. Improperly segmented network environment Malicious code or malware Insecure wireless Insecure remote access

Answers

Answer:

Viruses

Explanation:

A virus is an attack with malicious code that can affect the computer and can restrict specific things.

Which of the following is not regression test case? A. A representative sample of tests that will exercise all software functions B. Additional tests that focus on software functions that are likely to be affected by the change C. Tests that focus on the software components that have been changed D. Low-level components are combined into clusters that perform a specific software sub-function

Answers

Answer:

D. Low-level components are combined into clusters that perform a specific software sub-function

Explanation:

Normally, regression testing are done on a manual basis by simply re-executing a subset of the entire available test cases or it can be done automatically by utilizing playback tools or automated capture. Hence, from the options, a combination of low-level components into clusters that perform a specific sub-function does not align with how regression testing are done either manually or automatically.

Low-level components are combined into clusters that perform a specific software sub-function. Thus option D is correct.

What is a regression test?

Regression testing is a statistical method of finding the relation between variables and is done by use of software such as functional and non-functional. It ensures that the development  of the software are made by utilizing playback tools or capture.

Thus, the options, are a combination of the low-level components into the clusters that perform specific sub-functions.

Find out more information about the regression.

brainly.com/question/13676957.

If I asked you to design a client server application that would work as a progressive slot machine (if you don't know what that is look it up before proceeding) client server application...what three choices would you make for that, why? Is the design much different from the time synchronization server?

Answers

Answer:

Explanation:

Iterative vs Concurrent:

An iterative server handles both the association demand and the exchange engaged with the call itself. Iterative servers are genuinely straightforward and are reasonable for exchanges that don't keep going long.

Be that as it may, if the exchange takes additional time, lines can develop rapidly, when Client A beginnings an exchange with the server, Client B can't make a call until A has wrapped up.

In this way, for extensive exchanges, an alternate kind of server is required — the simultaneous server, Here, Client A has just settled an association with the server, which has then made a youngster server procedure to deal with the exchange. This permits the server to process Client B's solicitation without trusting that An's exchange will finish. Beyond what one youngster server can be begun along these lines. TCP⁄IP gives a simultaneous server program called the IMS™ Listener.

Some idea on on time synchronization is Synchronization of Clocks: Software-Based Solutions

Techniques:

1.time stamps of real-time clocks

2.message passing

3. round-trip time (local measurement)

4.Cristian’s algorithm

5.Berkeley algorithm

6.Network time protocol (Internet)

A system time server isn't something numerous entrepreneurs consider, and timekeeping is generally not a need for organize executives. In any case, legitimate system time synchronization is a fundamental piece of checking a system and settling issues inside it.

[1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Primary Key: ____________________________ [2] Please find all the functional dependencies ________________________________________________ _________________________________________________ __________________________________________________ _____________________________________________________ [3] Please find out the second normal form (in relational schema). [4] Please find out the third normal form.

Answers

Answer:

Check the explanation

Explanation:

1. The atomic attributes can't be a primary key because the values in the respective attributes should be unique.

So, the size of the primary key should be more than one.

In order to find the candidate key, let the functional dependencies be obtained.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

Closure of attribute { Emp_ID, Date_Completed } is { Emp_ID, Date_Completed , Name, DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Name , Date_Completed } is { Name, Date_Completed , Emp_ID , DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { DeptID, Date_Completed } is { DeptID, Date_Completed , Emp_ID,, Name, , Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Marketing, Date_Completed } is { Marketing, Date_Completed , Emp_ID,, Name, DeptID , Salary, Course_Name, Course_ID}.

So, the candidate keys are :

{ Emp_ID, Date_Completed }

{ Name , Date_Completed }

{ DeptID, Date_Completed }

{ Marketing, Date_Completed }

Only one candidate key can be a primary key.

So, the primary key chosen be { Emp_ID, Date_Completed }..

2.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

3.

For a relation to be in 2NF, there should be no partial dependencies in the set of functional dependencies.

The first F.D. is

Emp_ID -> Name, DeptID, Marketing, Salary

Here, Emp_ID -> Salary ( decomposition rule ). So, a prime key determining a non-prime key is a partial dependency.

So, a separate table should be made for Emp_ID -> Salary.

The tables are R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

and R2( Emp_ID , Salary)

The following dependencies violate partial dependency as a prime attribute -> prime attribute :

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

The following dependencies violate partial dependency as a non-prime attribute -> non-prime attribute :

Course_ID -> Course Name

Course_Name ->  Course_ID

So, no separate tables should be made.

The functional dependency Date_Completed -> Course_Name has a partial dependency as a prime attribute determines a non-prime attribute.

So, a separate table is made.

The final relational schemas that follows 2NF are :

R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

R2( Emp_ID , Salary)

R3 (Date_Completed, Course_Name, Course_ID)

For a relation to be in 3NF, the functional dependencies should not have any transitive dependencies.

The functional dependencies in R1(Emp_ID, Name, DeptID, Marketing, Date_Completed) is :

Emp_ID -> Name, DeptID, Marketing

This violates the transitive property. So, no table is created.

The functional dependencies in R2 (  Emp_ID , Salary) is :

Emp_ID -> Salary

The functional dependencies in R3 (Date_Completed, Course_Name, Course_ID) are :

Date_Completed -> Course_Name

Course_Name   ->  Course_ID

Here there is a transitive dependency as a non- prime attribute ( Course_Name ) is determining a non-attribute ( Course_ID ).

So, a separate table is made with the concerned attributes.

The relational schemas which support 3NF re :

R1(Emp_ID, Name, DeptID, Course_ID, Marketing, Date_Completed) with candidate key as Emp_ID.

R2 (  Emp_ID , Salary) with candidate key Emp_ID.

R3 (Date_Completed, Course_Name ) with candidate key Date_Completed.

R4 ( Course_Name, Course_ID ).  with candidate keys Course_Name and Course_ID.

Write a loop to store the letters “f” through “w” in an array named letters. Then, print the contents of the array to the screen.

Answers

Answer:

#include<iostream>

#include<conio.h>

using namespace std;

main()

{

 

char a[18];

 

int k=102;

for (int j=0; j<18; j++)

{

a[j]=k;  

k=k+1;

 

}

 

cout<<"The Array of characters between f and W is Given below"<<endl;

for (int l=0;l<18;l++)

{

 cout<<a[l]<<endl;

}

getch();  

}

Explanation:

In this program, list of characters has been printed between f and w using for loop as per requirement. An array has been taken with name a and size 18, as there are 18 elements from f to w. As we know that ASCII code of Small f is 102 in decimal, we store that in another variable k. Start loop  and assign ASCII code of each alphabet using 'k' variable to array a. After that array of assigned alphabets has been printed.

Write a method void Print(int LastNumber, int numbersPerLine) that receives two integers

lastnumber and numbersPerLine. The program should print all the numbers from 1 to lastnumber,

numbersperline each line. The last line should contain the remaining numbers.​

Answers

Answer:

Code is in the attached screenshot.

Explanation:

Assumed it was written in Java based on your other question asked.

This project is to mimic a meeting request system by checking the requesting party’s validity, and the number of people attending. Then it will make a decision as to whether the meeting can take place and display an informative message.

Display a welcome message and then ask the user to enter his/her name Display a personal welcome message by addressing the user by his/her name. Declare a constant and assign a number to it as the Conference Room capacity.

Ask the user how many people are attending the meeting. Display a meaningful message for each of the three different scenarios. The message informs the user whether he/she can have the requested room and also displays the number of people that must be excluded or that can still be invited based on the room capacity. Here are the three scenarios.

people attending are fewer than the Room Capacity
people attending are more than the Room Capacity
people attending are exactly the same as the Room Capacity

The system will keep running until the user quits (meaning all this happens in a loop)

Answers

Answer:

See explaination for the program code

Explanation:

Meeting.java

------

import java.util.Scanner;

public class Meeting {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

final int ROOM_CAPACITY = 100;

int numPeople, diff;

String name;

System.out.println("****** Meeting Organizer ******");

System.out.print("Enter your name: ");

name = input.nextLine();

System.out.println("Welcome " + name);

do{

System.out.print("\nHow many people would attend the meeting? (type 0 to quit): ");

numPeople = input.nextInt();

if(numPeople < 0)

System.out.println("Invalid input!");

else if(numPeople != 0)

{

if(numPeople > ROOM_CAPACITY)

{

diff = numPeople - ROOM_CAPACITY;

System.out.println("Sorry! The room can only accommodate " + ROOM_CAPACITY +" people. ");

System.out.println(diff + " people have to drop off");

}

else if(numPeople < ROOM_CAPACITY)

{

diff = ROOM_CAPACITY - numPeople;

System.out.println("The meeting can take place. You may still invite " + diff + " people");

}

else

{

System.out.println("The meeting can take place. The room is full");

}

}

}while(numPeople != 0);

System.out.println("Goodbye!"); }

}

output

---

****** Meeting Organizer ******

Enter your name: John

Welcome John

How many people would attend the meeting? (type 0 to quit): 40

The meeting can take place. You may still invite 60 people

How many people would attend the meeting? (type 0 to quit): 120

Sorry! The room can only accommodate 100 people.

20 people have to drop off

How many people would attend the meeting? (type 0 to quit): 100

The meeting can take place. The room is full

How many people would attend the meeting? (type 0 to quit): 0

Goodbye!

What is the purpose of the Excel Function Reference?
to look up functions and their purposes
to add customized functions to the list
to delete functions from the list
to sort and organize functions in the list

Answers

Answer:

To look up functions and their purposes

Explanation:

Edg

Answer:

a on edge

Explanation:

just took the question

Write a SELECT statement that returns one row for each category that has products with these columns: The CategoryName column from the Categories table The count of the products in the Products table The list price of the most expensive product in the Products table Sort the result set so the category with the most products appears first.

Answers

Final answer:

A SQL SELECT statement is required to join Categories and Products tables, count the products per category, find the maximum price of products in each category, and sort by the number of products, with the highest number first.

Explanation:

The student has asked for a SELECT statement that retrieves data from two tables, namely Categories and Products. The query should result in each category listed along with the count of products in that category and the price of the most expensive product within that category. Lastly, the result should be sorted so that the category with the highest number of products appears first.

To fulfill these requirements, a SQL statement that joins the two tables on their respective category identifiers, counts the number of products, finds the maximum list price, and sorts the results by the count of products in descending order is needed.

The SELECT statement will look like this:

SELECT
   Categories.CategoryName,
   COUNT(Products.ProductID) AS ProductCount,
   MAX(Products.ListPrice) AS MostExpensiveProduct
FROM
   Categories
JOIN
   Products ON Categories.CategoryID = Products.CategoryID
GROUP BY
   Categories.CategoryName
ORDER BY
   ProductCount DESC;

5.5 Learning Objective: To demonstrate that the student understands the definition of Big O. To demonstrate that the student understands how to derive the function f(n) which computes how many times the key operation of an algo- rithm is performed as a function of the size of the problem. Instructions: This exercise is graded, so include your solution in your word processing document. Problem: Continuing with the previous exercise, derive a function f(n) which equates to the number of times the key operation is performed as a function of n, where n is the size of pList. State the worst case time complexity of split() in Big O notation. You do not need to formally prove it but explain your answer.

Answers

Answer:

See explaination

Explanation:

Anytime we want to compute time complexity of an algorithm with input size n denoted as T(n).

And then check growth rate of that algorithm with any large number of input n.

We have to first obtain f(n) of that algorithm .

f(n) is total execution time of algorithm in terms of n.

we want write this function with growth rate notation.

we know there are basic three notations

1. big oh(O) notation

2.theta(Θ) notation

3. big omega(Ω) notation

we want explain big oh(O) notation

Here is the formal mathematical definition of Big O.

also called asymptotic upper bound

Let T(n) and f(n) are two positive functions. We write T(n) ∊ O(f(n)), if there are positive constants c and n₀ such that

T(n) ≤ c·f(n) for all n ≥ n₀.

This graph shows a situation where all of the conditions in the definition are exist. (see attachment for graph)

c.fin) T(n) cost no

we can say

T(n) ∊ O(f(n)) means that growth rate of T(n) is not faster than f(n).

example

T(n) = n -1. Using Big O notation this can be written as T(n) ∊ O(n).

let c = 1 and n₀ = 1,

then T(n) = n - 1 ≤ 1·n when n ≥ 1.

g given the signature of a function void ascendingwords(char sentence[], int size), where sentence is an array of characters(i.e. a null terminated string) and size is the amount of memory allocated for the buffer sentence. Complete the function to print the words in the sentence in an ascending order. the user needs to provide the input. for example if the sentence is Programming is Fun. then the function should print the output Fun is Programming

Answers

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

// Function starts here

string ascendingwords(string sentence)

{

// Calculate length of input text

int len = sentence.length() - 1;

// Create a begin and end variable

int begin, end = len + 1;

// Declare and initialize an output string

string output = "";

// Perform iteration while there's still some text in the input string

while(len >= 0)

{

if(sentence[len] == ' ')

{

begin = len + 1;

while(begin != end)

output += sentence[start++];

output += ' ';

end = len;

}

len--;

}

begin = 0;

while(begin != end)

output += sentence[begin++];

return output;

}

// Main method starts here

int main()

{

// Declare string

string sentence;

// Prompt user for input

cout<<"Enter a string: ";

cin>>sentence;

cout <<ascendingwords(sentence);

return 0;

}

You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we have 48 bits at our disposal in order to represent a number, in analogy with the IEEE 754 prototype. You are asked to provide: a) The types for evaluating this number b) The width of representation of these numbers (upper and lower) 6 c) The maximu

Answers

Answer:

Check the explanation

Explanation:

The most significant bit is the sign bit (S), with 0 for positive numbers and 1 for negative numbers.

   Normalize significand: 1.0 ? |significand| < 2.0

       Always has a leading pre-binary-point 1 bit, so no need to represent it explicitly (hidden bit)

   The following 9 bits represent exponent (E).(0 TO 511)

       E is : actual exponent + Bias

       Bias = 255;

   The remaining 38 bits represents fraction (F).

Width of representation

smallest value :

   Exponent: 000000001 because 000000000 is reserved

       actual exponent = 1 – 255 = –254

   Fraction: 000…00  \rightarrow significand = 1.0

Kindly check the attached image below to see the concluding solution to the question above.

Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that allocates three identical printers to these processes, using the priority numbers for deciding the order of allocation.

Answers

Answer:

See explaination

Explanation:

The code

type printer = monitor

var P: array[0…2] of boolean;

X: condition;

procedure acquire (id: integer, printer-id: integer);

begin

if P[0] and P[1] and P[2] then X.wait(id)

if not P[0] then printer-id := 0;

else if not P[1] then printer-id := 1;

else printer-id := 2;

P[printer-id]:=true;

end;

procedure release (printer-id: integer)

begin

P[printer-id]:=false;

X.signal;

end;

begin

P[0] := P[1] := P[2] := false;

end ;

Note:

Monitors are implemented by using queues to keep track of the processes attempting to become active int he monitor. To be active, a monitor must obtain a lock to allow it to execute the monitor code. Processes that are blocked are put in a queue of processes waiting for an unblocking event to occur.

This solution utilizes a monitor to allocate printers to processes based on their unique priority numbers.

To allocate three identical printers to a system of processes P1, P2, ..., Pn, each of which has a unique priority number, we can utilize a monitor structure.
The monitor ensures that higher priority processes get access to the printers before lower priority ones.
Here is a pseudocode example of how such a monitor can be implemented,

monitor PrinterAllocation {
   int availablePrinters = 3;
   condition printerAvailable;
   int[] priorityQueue = new int[n]; // stores process IDs based on priority
   boolean[] waiting = new boolean[n]; // to track waiting processes

   // Function to request a printer
   procedure requestPrinter(int processID, int priority) {
       priorityQueue[priority] = processID;
       waiting[processID] = true;
       while (availablePrinters == 0 || !highestPriority(processID)) {
           printerAvailable.wait();
       }
       waiting[processID] = false;
       availablePrinters--;
   }

   // Function to release a printer
   procedure releasePrinter() {
       availablePrinters++;
       printerAvailable.signalAll();
   }

   // Check if the process has the highest priority among the waiting ones
   boolean highestPriority(int processID) {
       for (int i = 0; i < n; i++) {
           if (waiting[priorityQueue[i]] && priorityQueue[i] != processID) {
               return false;
           }
       }
       return true;
   }
}

In this solution, the monitor uses a condition variable printerAvailable to manage the allocation based on priorities.
The requestPrinter procedure adds processes to the priority queue and waits if no printer is available or if there is a process with a higher priority waiting.
The releasePrinter procedure increases the count of available printers and signals all waiting processes.
The highestPriority function ensures that the highest priority process gets the printer first.

Which example task should a developer use a trigger rather than a workflow rule for?
A. To set the primary contact on an account record when it is saved
B. To notify an external system that a record has been modified
C. To set the name field of an expense report record to expense and the date when it is saved
D. To send an email to a hiring manager when a candidate accepts a job offer

Answers

Answer:

A. To set the primary contact on an account record when it is saved

Explanation:

After updating a Contact and then you set the Primary checkbox, the contact becomes the primary contact and this then updates the reference in the Parent Account. Triggers are used for this purpose and not workflow rule. In this case there is only one contact at a time that is set as Primary Contacts, and in the case where an Account does not have any Contacts, the first contact that is created is made the primary and the trigger sets that value in reference.

Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial number. Inside a loop, asks the user for a mathematical operation and a second number. Do the operation with the first number on the second number. Keep track of the result as a 'subtotal' to be used as the first number when going back to the top of the loop. When the user quits, print out the final result and quit the program. See output for an example for the behavior of the program. The operations should be at least

Answers

Answer:

num1 = float(input("Enter the first number: "))

while True:

   print("Add, Subtract, Multiply, Divide, or Quit ?")

   choice = input("Your choice is: ")

   if choice == "Quit":

       break

   num2 = float(input("Enter the second number: "))

   if choice == "Add":

       num1 += + num2

       print("The subtotal is: " + str(num1))

   elif choice == "Subtract":

       num1 -= num2

       print("The subtotal is: " + str(num1))

   elif choice == "Multiply":

       num1 *= num2

       print("The subtotal is: " + str(num1))

   elif choice == "Divide":

       num1 /= num2

       print("The subtotal is: " + str(num1))

print("The final result is: " + str(num1))

Explanation:

Ask the user for the first number

Create a while loop that iterates until specified condition occurs inside the loop

Ask the user for the operation or quitting

If the user chooses quitting, stop the loop. Otherwise, get the second number, perform the operation and print the subtotal

When the loop is done, the user enters Quit, print the final value result

You have been selected to find the best client-server computing architecture for a Web-based order entry system that is being developed for L.L. Bean. Write a short memo that describes to the project manager your reason for selecting an n-tiered architecture over a two-tiered architecture. In the memo, give some idea as to what different components of the architecture you would include.

Answers

Answer:

The N-tier architecture helps to manage all the components (business layer, presentation layer, and database layer) of an application under one roof.

Explanation:

n-tier client/server architecture logically separates the user interface, database, and procedural code (business logic) into

at least three separate tiers. The business logic resides in the middle tier and may run on one or more servers. The user

interface interacts with the middle-tier by remotely invoking procedures and receiving results. The concept is similar to

the use of database procedures except the middle tier procedures are not limited to the proprietary SQL of an RDBMS.

In addition, the interface, database, and business logic are often physically distributed to run on many different machines. When an n-tier application is distributed effectively, system resources are more efficiently used and applications have better performance.

N-tier client/server is able to scale to thousands of users because it does not have the one-client, one-connection requirement of two-tier client/server.

N-tier client/server applications use middleware to funnel client connections to the database server.

N-tier client/server provides many benefits when working with relational databases. Clients connect to the middle tier

instead of the database; thus shielding the client application developer from the complexity of the database structure. In

addition, by placing the SQL code inside server processes, the client application is shielded from database changes. When changes are made to the database, the middle-tier server process must be modified, but the client applications can remain unaffected. If several client applications share the same server process, the change only needs to be made in one place.

N-tier/client server has been used to create complex applications that would be difficult, if not impossible, to create using a two-tier approach.

Create a class that stores an array of usable error messages. Create an OrderException class that stores one of the messages. Create an application that contains prompts for an item number and quantity. Allow for the possibility of nonnumeric entries as well as out-of-range entries and entries that do not match any of the currently available item numbers. The program should display an appropriate message if an error has occurred. If no errors exist in the entered data, compute the user’s total amount due (quantity times price each) and display it.

Answers

Answer:

Check the explanation

Explanation:

Given below is the code for the question.

import java.util.*;

public class PlaceAnOrder

{

  public static void main(String[] args)

  {

      final int HIGHITEM = 9999;

      final int HIGHQUAN = 12;

      int code;

      int x;

      boolean found;

      final int[] ITEM = {111, 222, 333, 444};

      final double[] PRICE = {0.89, 1.47, 2.43, 5.99};

      int item;

      int quantity;

      double price = 0;

      double totalPrice = 0;

      Scanner input = new Scanner(System.in);

      try{

          System.out.print("Enter Item number: ");

          if(input.hasNextInt()){

              item = input.nextInt();

              if(item < 0)

                  throw new OrderException(OrderMessages.message[2]);

              if(item > HIGHITEM)

                  throw new OrderException(OrderMessages.message[3]);

             

              System.out.print("Enter Item quantity: ");

              if(input.hasNextInt()){

                  quantity = input.nextInt();

                 

                  if(quantity < 1)

                      throw new OrderException(OrderMessages.message[4]);

                  if(quantity > HIGHQUAN)

                      throw new OrderException(OrderMessages.message[5]);

                  found = false;

                  for(int i = 0; i < ITEM.length; i++){

                      if(ITEM[i] == item){

                          found = true;

                          totalPrice = PRICE[i] * quantity;

                          break;

                      }

                  }

                  if(!found)

                      throw new OrderException(OrderMessages.message[6]);

                  System.out.println("Total Amount due: $" + totalPrice);

              }

              else

                  throw new OrderException(OrderMessages.message[1]);

          }

          else

              throw new OrderException(OrderMessages.message[0]);

      }catch(OrderException e){

          System.out.println(e.getMessage());

      }

  }

}

Write an application for a condo owner on a Florida Beach. The owner wants an application to be able to accept the season for the rental and the amount of days of the customer wishes to rent the condo. Based on each, the application will determine a final price for the rental.

Answers

Answer:

in_season_price = 120.0

off_season_price = 70.0

price = 0

season = input("Which season you plan to rent \"IN/OFF\" season: ")

days = int(input("Enter the days you want to rent: "))

if season == "IN":

   price = in_season_price * days

elif season == "OFF":

   price = off_season_price * days

print("Rental price is: " + str(price))

Explanation:

Set the prices for in and off season

Ask the user to choose the season and number of days they want to stay

Depending on the user choice calculate the price, multiply the season price with the number of days

Print the total price

Use greedy approach to implement fractional knapsack problem. a. Ask user for knapsack capacity. b. Ask user for n objects weights and profits or read an input.txt that contains n objects weights and profits. c. List objects that maximize the profit and show the maximum profit as output considering knapsack capacity.

Answers

Answer:

see explaination

Explanation:

/*

* To change this license header, choose License Headers in Project Properties.

* To change this template file, choose Tools | Templates

* and open the template in the editor.

*/

package knapsack;

import java.util.*;

/**

*

* atauthor Administrator

*/

public class MyKnapsack {

static int max(int a, int b) { return (a > b)? a : b; }

static int calculate(int W, int wt[], int val[], int n)

{

if (n == 0 || W == 0)

return 0;

if (wt[n-1] > W)

return calculate(W, wt, val, n-1);

else return max( val[n-1] + calculate(W-wt[n-1], wt, val, n-1),

calculate(W, wt, val, n-1)

);

}

public static void main(String[] args)

{

Scanner sc=new Scanner(System.in);

System.out.printf("|Enter value of capacity");

int Capacity =sc.nextInt();

System.out.printf("|Enter value of number of objects");

int n=sc.nextInt();

int profits[] = new int[n];

int weight[] = new int[n];

System.out.printf("|Enter values for profits");

for(int i=0;i<n;i++)

{

profits[i]=sc.nextInt();

}

System.out.printf("|Enter values for weights");

for(int j=0;j<n;j++)

{

weight[j]=sc.nextInt();

}

System.out.println(calculate(Capacity,weight, profits, n));

}

Note: change the at with the sign

}

) Suppose algorithm A takes 10 seconds to handle a data set of 1000 records. Suppose the algorithm A is of complexity O(n2). Answer the following: (i) Approximately how long will it take to handle a data set of 1500 records? Why? (ii) How long will it take to handle a data set of 5000 records? Can you come up with a reason why this will not be entirely accurate but will just be an approximation?

Answers

Answer:

i) The time taken for 1500 records = 15 seconds.

ii) The time taken for 1500 records = 50 seconds.

Explanation:

A is an O(n) algorithm.

An algorithm with O(n) efficiency is described as a linearly increasing algorithm, this mean that the rate at which the input increases is linear to the time needed to compute that algorithm with n inputs.

From the question, it is given that for 1000 records, the time required is: 10 seconds.

Algorithm time taken is O(n)

Hence,

1) For 1,500 records

=> 10/1000 = x/1500

=> 10x1500/1000 = x

x = 15 seconds

Thus, the time taken for 1500 records = 15 seconds.

2) For 5,000 records

=> 10/1000 = x/5000

=> 10x5000/1000 = x

x = 50 seconds

Thus, the time taken for 1500 records = 50 seconds.

Banks have many different types of accounts often with different rules for fees associated with transactions such as withdrawals. Customers can transfer funds between accounts incurring the appropriate fees associated with withdrawal of funds from one account.Write a program with a base class for a bank account and two derived classes as described belowrepresenting accounts with different rules for withdrawing funds. Also write a function that transfers funds from one account of any type to anotheraccount of any type.A transfer is a withdrawal from one accountand a deposit into the other.

Answers

Answer:

See explaination

Explanation:

// Defination of MoneyMarketAccount CLASS

MoneyMarketAccount::MoneyMarketAccount(string name, double balance)

{

acctName = name;

acctBalance = balance;

}

int MoneyMarketAccount::getNumWithdrawals() const

{

return numWithdrawals;

}

int MoneyMarketAccount::withdraw(double amt)

{

if (amt < 0)

{

cout << "Attempt to withdraw negative amount - program terminated."<< endl;

exit(1);

}

if((numWithdrawals < FREE_WITHDRAWALS) && (amt <= acctBalance)){

acctBalance = acctBalance - amt;

return OK;

}

if((numWithdrawals >= FREE_WITHDRAWALS) &&((amt + WITHDRAWAL_FEE) <= acctBalance)){

acctBalance = acctBalance - (amt + WITHDRAWAL_FEE);

return OK;

}

return INSUFFICIENT_FUNDS;

}

// Defination of CDAccount CLASS

CDAccount::CDAccount(string name, double balance, double rate)

{

acctName = name;

acctBalance = balance;

interestRate = rate/100.0;

}

int CDAccount::withdraw(double amt)

{

if (amt < 0)

{

cout << "Attempt to withdraw negative amount - program terminated."<< endl;

exit(1);

}

double penalty = (PENALTY*interestRate*acctBalance);

if((amt + penalty) <= acctBalance){

acctBalance = acctBalance - (amt + penalty);

return OK:

}

else

return INSUFFICIENT_FUNDS;

}

void transfer (double amt, BankAccount& fromAcct, BankAccount& toAcct)

{

if (amt < 0 || fromAcct.acctBalance < 0 || toAcct < 0)

{

cout << "Attempt to transfer negative amount - program terminated."<< endl;

exit(1);

}

if(fromAcct.withdraw(amt) == OK){ // if withdraw function on fromAcct return OK, then me can withdraw amt from fromAcct

// and deposit in toAcct

toAcct.acctBalance = toAcct.acctBalance + amt;

}

}

Write a program that illustrates rethrowing an exception. Define methods CISP401Method and CISP401Method2. Method CISP401Method2 should initially throw an exception. Method CISP401Method should call CISP401Method2, catch the exception and rethrow it. Call CISP401Method from method main, and catch the rethrown exception. Print the stack trace of this exception.

Answers

Answer:

See explaination

Explanation:

The code here:

import java.io.*;

public class CISP401V11A5 {

public static void main(String[] args) throws Exception {

try {

CISP401Method();

} catch (Exception e) {

System.out.println("Exception thrown in " + e.getStackTrace()[0].getMethodName() + "\n");

StringWriter sw = new StringWriter();

e.printStackTrace(new PrintWriter(sw));

String exceptionAsString = sw.toString();

String bagBegin = exceptionAsString.substring(0, 19);

String bagEnd = exceptionAsString.substring(19);

System.out.println(bagBegin + ": Exception thrown in " + e.getStackTrace()[0].getMethodName() + bagEnd);

}

}

public static void CISP401Method() throws Exception {

try {

CISP401Method2();

} catch (Exception e) {

throw e;

}

}

public static void CISP401Method2() throws Exception {

throw new Exception();

}

}

See attachment for sample output

Write a modular program that allows the user to enter a word or phrase and determines whether the word or phrase is a palindrome. A palindrome is a word or phrase that reads the same backwards as forwards. Examples include: civic, kayak, mom, noon, racecar, Never odd or even., and Was it a Rat I saw

Answers

Answer:

import java.util.Scanner;

public class num10 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a word");

       String word = in.nextLine();

       String reversed = "";

       //Get the length of the string entered

       int length = word.length();

       //Loop through the string and reverse th string

       for ( int i = length - 1; i >= 0; i-- )

           reversed = reversed + word.charAt(i);

       //Compare the two strings "word" and "reversed"

       if (word.equals(reversed))

           System.out.println(word+" is a palindrome");

       else

           System.out.println(word+" is not a palindrome");

   }

}

Explanation:

Since we know that a palindrome word is a word that reads the same forward and backward, The Idea here is:

To obtain a word from a user.  Use a for loop to reverse the word and store in another variableUse if....else to compare the two strings and determine if they are equal, if they are equal then the word is palindrome.

This optically active alkene was treated with HBr with and without peroxides. One of these reactions lead to the formation of two products, one of which is not optically active. The other reaction gives a single new product that is optically active. Which of the below statements best explains the observed results

Answers

HBr adds to an optically active alkene via electrophilic addition resulting in 'Markovnikov' regioselectivity without peroxides, and via free radical addition leading to 'anti-Markovnikov' regioselectivity with peroxides, leading to the formation of a mixture that includes an optically inactive product.

The observed reactions are explained by different mechanisms by which HBr adds to an optically active alkene. In the absence of peroxides, the HBr adds through an electrophilic addition mechanism with 'Markovnikov' regioselectivity, resulting in a single optically active product. This is because the more substituent-rich carbon of the double bond preferentially receives the bromine in accordance with Markovnikov's rule.

Conversely, in the presence of peroxides, the HBr adds via a free radical mechanism resulting in 'anti-Markovnikov' regioselectivity. Here, a bromine atom attaches to the less substituted carbon forming two possible products: one optically active and one not, indicating syn and anti addition that produces both cis and trans isomers. The steps involved include radical initiation, propagation, and eventual termination.

Write a Python class named Rectangle constructed by a length and width. methods it should have Area()- this should return the area as a value Perimeter()- this should return the total of all the sides as a value Print()- this should print the rectangle such that "Length X Width" Should ask the user to enter the width and length

Answers

Answer:

class Rectangle:

   def __init__(self, length=1, width=1):

       self.length = length

       self.width = width

   def Area(self):

       return self.length * self.width

   def Perimeter(self):

       return 2 * (self.length + self.width)

   def Print(self):

       print(str(self.length) + " X " + str(self.width))

l = float(input("Enter the length: "))

w = float(input("Enter the width: "))

a = Rectangle(l, w)

print(str(a.Area()) + " " + str(a.Perimeter()))

a.Print()

Explanation:

Create a class called Rectangle

Create its constructor, that sets the length and width

Create a method Area to calculate its area

Create a method Perimeter to calculate its perimeter

Create a Print method that prints the rectangle in the required format

Ask the user for the length and width

Create a Rectangle object

Calculate and print its area and perimeter using the methods from the class

Print the rectangle

Answer:

class Rectangle():

   def __init__(self, l, w):

       self.len = l

       self.wi  = w

   def area(self):

     return self.len*self.wi

   def perimeter(self):

     return self.len+self.len+self.wi+self.wi

   def printing(self):

     print('{} Lenght X Width {}'.format(self.len, self.wi))

length = int(input("enter the length "))

width = int(input("enter the width "))

newRectangle = Rectangle(length, width)

newRectangle.printing()

print("Area is: ")

print(newRectangle.area())

print("The perimeter is: ")

print(newRectangle.perimeter())

Explanation:

The class rectangle is defined with a constructor that sets the length and width

As required the three methods Area, perimeter and printing are also defined

The input function is used to prompt and receive user input for length and width of the rectangle

An object of the Rectangle class is created and initalilized with the values entered by the user for length and width

The three methods are then called to calculate and return their values

Other Questions
Given a 30-60-90 triangle with a long leg of 9 inches, determine the length of the hypotenuse The National Industrial Recovery Act set up the National Recovery Administration which: a.was an economic policy later adopted successfully in Hitlers Germany. b.encouraged "cutthroat" competition between businesses. c.established codes that set standards for production, prices, and wages in several industries. d.established codes that continued the open-shop policies of the 1920s. e.was never passed. In 1860 how many southern states seceded from union? What allowed the allies to win the war n mice, an allele for apricot (a) eyes is recessive to an allele for brown (A) eyes. At an independently assorting locus, an allele for tan (t) coat color is recessive to an allele for black (T) coat color. A mouse that is homozygous for brown eyes and black coat color is crossed with a mouse having apricot eyes and a tan coat. The resulting F1 are intercrossed to produce the F2. What is the probability of an F2 mouse having a black coat and apricot eyes? Liposomes consist of ________ bilayers that enclose an aqueous compartment where drugs can be contained for delivery to specific tissues if target proteins are present. Liposomes consist of ________ bilayers that enclose an aqueous compartment where drugs can be contained for delivery to specific tissues if target proteins are present. Membrane protein Cholesterol Phospholipids Detergents Each point on the edge of a circle is equidistant from the center of the circle. The center of a circle is located at (6,3). Which pointon the y-axis could be on the edge of the circle if the distance from the center of the circle to the edge is 10 units? In July, one of the processing departments at Okamura Corporation had beginning work in process inventory of $23,000 and ending work in process inventory of $28,000. During the month, the cost of units transferred out from the department was $158,000. In the department's cost reconciliation report for July, the total cost to be accounted for under the weighted-average method would be: What ordered pair corresponds to point G? All of the following EXCEPT which are names used in place of trial court of generaljurisdiction?a. appellate courtb. high courtcircuit courtd. superior court Nadia says the hypotenuse of this right triangle has a length of 73 because the Pythagorean theorem states that (28+45)^2=73^2.Which best describes Nadias solution?She is correct because she applied the Pythagorean theorem properly and her arithmetic is accurate. She is incorrect because she should have used 45 as the length of the hypotenuse. She is incorrect because she should have squared each leg length and then found the sum.She is correct because the hypotenuse is the longest side of the triangle. both japan and germany committed crimes against humanity true or false? 3/4 + 1/2=7/8-3/8 =5/6 1/4 =4/6/1/4 =178.96 - 25.78 =10.25 - 110.25 + 1110.25 =2.789 * 1.458 =56.64/S = The point A(4, 1) is reflected over the x-axis. Use a mapping to find the coordinates of A. A(4, 1) A(4, 1) A(4, 1) A(4, 1) An investor knows the total assets and total liabilities of a company, but they are not sure how much of the assets and liabilities are current versus long-term. Based on this, the investor could calculate Please answer ASAP. What is the negative angle of rotation for the angle with positive angleof rotation 270? QR is tangent to circle P at point Q.Circle P is shown. Line segment P Q is a radius. Line segment Q R is a tangent that intersects the circle at point Q. A line is drawn from point R to point P and goes through a point on the circle. Angle Q P R is 53 degrees.What is the measure of angle R?37539097 Jack Black is an actor famous for how he can manipulate his body to make audiences laugh. true or false Cousin Throckmorton is playing with the clothesline. One end of the clothesline is attached to a vertical post. Throcky holds the other end loosely in his hand, so that the speed of waves on the clothesline is a relatively slow 0.740m/s . He finds several frequencies at which he can oscillate his end of the clothesline so that a light clothespin 43.0cm from the post doesn't move. What are these frequencies? A local farm market buys fresh fruits and vegetables from local farmers. It buys peaches from one farmer at a cost of $1.00 per pound and sells them for $2.00 per pound. The demand for peaches during the season is normally distributed with a mean of 40 pounds per day and a daily standard deviation of 6 pounds. At the end of each business day, any unsold peaches are purchased by local restaurants for $0.40 per pound (in U.S. dollars): Enter your answers to one decimal place. Determine the service level. The service level is Number %. What is the optimal stocking level for the service level deterimined in (a)