Answer:
myVariable = 3 print(myvariable)Runtime error:
NameError: name 'myvariable' is not defined
Explanation:
Runtime error is an error detected when running a program. In the given code example, there is a variable, myVariable initialized with 3 (Line 1). In the second line, we try to print the variable. But instead of placing myVariable in the print function, we put myvariable which is a different variable name (even though the difference is only with one lowercase letter). The Python will capture it as a runtime error as the variable name cannot be defined.
To fix the error, we just need to change the variable name in print statement to myVariable
myVariable = 3 print(myVariable)The runtime error inside a program is the one that happens when the program is being executed after it has been successfully compiled. It's also known as "bugs," which are frequently discovered during the debugging phase first before the software is released.
Code:
Demonstrating the output with a runtime error, including the error message.
a= input("input any value: ")#defining a variable that input value
b= int(input("Enter any number value: "))#defining b variable that input value
s=a+b#defining s variable that adds the inputs value
print(s)#print added value
In the above-given code, when "s" variable "adds" the input values it will give an error message, and to solve these errors we must convert the b variable value into the string, since "a" is a string type variable.
Correction in code:
#Code 1 for demonstrating the output with runtime error, including the error message.
a= input("input any value: ")#defining a variable that input value
b= int(input("Enter any number value: "))#defining b variable that input value
b=str(b)#defining b variable that converts input value into string and hold its value
s=a+b#defining s variable that adds the inputs value
print(s)#print added value
Output:
Please find the attached file.
Learn more:
brainly.com/question/21296934
The students assume the role of a networking intern at Richman Investments, a mid-level financial investment and consulting firm. In this assignment, the students will research malicious code attacks and select one that occurred within the last year. They must write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. They must also explain how they would prevent the attack from recurring on a network under their control.
Answer:
Malicious code: Trojan
Explanation:
Trojan
A Trojan is malicious code that, unlike viruses and worms, cannot reproduce itself and infect files. It is usually in the form of an executable file (.exe, .com) and does not contain any other elements, except for the Trojan's own code. For this reason the only solution is to remove it.
It has several functions -from acting as keyloggers (connecting and transmitting the actions performed on the keyboard) and deleting files to formatting disks. Some contain special functionality that installs Trojan programs, a client-server application that guarantees the developer remote access to your computer. Unlike many (legitimate) programs with similar functions, they are installed without user consent.
Answer:
Malicious code : Spyware
Explanation:
The kind of malicious attack on the the intern in making a research on is Spyware
Spyware gathers information about a users and it activities without them knowing and also without their permission or consent. Type of user information we talking about here are pins, passwords, unstructured messages and payment information.
Spyware attack does only affect desktop browser, it also operate on different platform like a mobile phone having a critical application.
How to prevent spyware.
1.Update your system. Make sure you update your browser and device often.
Give attention to the type of things you download.
2. Using anti-spyware software. The software is the obstruction between you and an attacker.
3. Always be watching your email
4.Always avoid pop-ups.
Consider the three major Vs as Volume, Velocity and Variety along with other Big Data contexts. Match the terms with the short scenarios or frameworks, related to Big Data. A Big Data application that handles very large-sized block of data (64 MB). Variability Big Data, applied to collect data on visitors purchase behavior in a theme park. MapReduce Health systems transmit electronic prescriptions and receive 'no-pickup' messages. Feedback loop processing Sentiment analysis determines if a statement conveys a positive or negative attitude. Volume, Velocity, Variety Programming model to process large data sets in a parallel, distributed manner. Hadoop
Answer:
See explaination
Explanation:
(MapReduce) = Programming Model
(Variability) = Sentiment analysis
(Feedback Loop Processing) = Health Systems transit
(volume, velocity, variety) = Big Data, applied to collect data
(Hadoop) = A Big Data Application that handles very large-sized block of data.
A Personal Fitness Tracker is a wearable device that tracks your physical activity, calories burned, heart rate, sleeping patterns, and so on. One common physical activity that most of these devices track is the number of steps you take each day. If you have downloaded this book's source code from the Computer Science Portal, you will find a file named steps.txt in the Chapter 06 folder. (The Computer Science Portal can be found at www.pearsonhighered.com/gaddis.) The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and each line contains the number of steps taken during a day. (The first line is the number of steps taken on January 1st, the second line is the number of steps taken on January 2nd, and so forth.) Write a program that reads the file, then displays the average number of steps taken for each month. (The data is from a year that was not a leap year, so February has 28 days.)
Answer:
See explaination for the program code.
Explanation:
fh = open('steps.txt', 'r')
lines = fh.readlines()
start = 0
days_in_months = [31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31];
print('{:<7s} {:<10s}'.format('Month', 'Average Steps'))
for m in range(12):
end = start + days_in_months[m]
steps = lines[start:end]
avg = 0
for s in steps:
avg = avg + int(s)
avg = avg // len(steps)
print('{:<7d} {:<10d}'.format(m+1, avg))
start = start + days_in_months[m]
Please kindly check attachment for for the program code.
In this exercise we have to use the knowledge of computational language in python to write the code.
This code can be found in the attached image.
To make it simpler the code is described as:
fh = open('steps.txt', 'r')
lines = fh.readlines()
start = 0
days_in_months = [31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31];
print('{:<7s} {:<10s}'.format('Month', 'Average Steps'))
for m in range(12):
end = start + days_in_months[m]
steps = lines[start:end]
avg = 0
for s in steps:
avg = avg + int(s)
avg = avg // len(steps)
print('{:<7d} {:<10d}'.format(m+1, avg))
start = start + days_in_months[m]
See more about python at brainly.com/question/22841107
The history teacher at your school needs help in grading a True/False test. The students’ IDs and test answers are stored in a file. The first entry in the file contains answers to the test in the form: TFFTFFTTTTFFTFTFTFTT Every other entry in the file is the student ID, followed by a blank, followed by the student’s responses. For example, the entry: ABC54301 TFTFTFTT TFTFTFFTTFT indicates that the student ID is ABC54301 and the answer to question 1 is True, the answer to question 2 is False, and so on. This student did not answer question 9. The exam has 20 questions, and the class has more than 150 students. Each correct answer is awarded two points, each wrong answer gets one point deducted, and no answer gets zero points. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score, followed by the test grade. Assume the following grade scale: 90%–100%, A; 80%–89.99%, B; 70%–79.99%, C; 60%–69.99%, D; and 0%–59.99%, F.
This program assumes that the test data file is formatted as described in your question.
def calculate_score(answers, student_answers):
score = 0
for i in range(len(answers)):
if student_answers[i] == answers[i]:
score += 2
elif student_answers[i] != ' ':
score -= 1
return max(0, score) # Ensure the score is not negative
def calculate_grade(score, total_questions):
percentage = (score / (2 * total_questions)) * 100
if 90 <= percentage <= 100:
return 'A'
elif 80 <= percentage < 90:
return 'B'
elif 70 <= percentage < 80:
return 'C'
elif 60 <= percentage < 70:
return 'D'
else:
return 'F'
def process_test_data(file_path):
with open(file_path, 'r') as file:
data = file.read().split()
answers = data[0]
student_data = data[1:]
total_questions = len(answers)
This response explains how to programmatically grade a True/False test, including reading answers from a file, calculating scores, and assigning grades based on a percentage scale. An example Python code snippet illustrates the process. The final output displays each student's ID, their answers, score, and grade.
You can write a program to help your history teacher grade the True/False test. Here's a step-by-step approach:
Read the test answers and student responses from the file.The first entry contains the correct answers, the subsequent entries contain student IDs and their responses.For each student, calculate the test score based on the given rules: each correct answer gets 2 points, each wrong answer deducts 1 point, and no answer gets 0 points.Calculate the percentage score and determine the letter grade using the given scale.Output the student ID, responses, test score, and grade.Example Code:
def grade_test(filename):This program will read from a file called 'test_answers.txt' and output each student's ID, their answers, score, and grade.
It is possible to force the Hardware Simulator to load a built-in version of chip Xxx. This can be done by: Select one: a. making sure the Xxx.hdl file is not loctaed in the current directory. b. leaving the chip body in the Xxx.hdl file empty. c. stating in the chip header that this is a built-in chip. d. once the chip was implemented by the user, this is not possible.
Answer:
C. Stating in the chip header that this is a built-in chip
Explanation:
The header of an HDL program is as follow:
CHIP chip name
{
IN input pin name
//statements
}
The simulator is using the following logic:
If Xxl.hdl exists
then load it into the simulator
else if Xxl.hdl exists in the built-in chip
then load it into the simulator and chip header
else
display "error message"
Answer:
c. stating in the chip header that this is a built-in chip.
Explanation:
The header of an HDL program is as follows;
CHIP chip name
{
IN input pin name
// statements
}
Syntax:
The stimulator is using the following logic
If Xxx.hdl exists
then load it into the stimulator
else if Xxx.hdl exists in the built-in chips
then load it into the stimulator and the chip header
else
display "error message"
*STATING IN THE CHIP HEADER THAT THIS IS A BUILT-IN CHIP
Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and perform all of the calculations necessary using the variables you define. You should not manually perform any calculation.
Answer:
# the number of pizza is initialised
# to 5
number_of_pizza = 5
# number of slice in each pizza
# is initialised to 8
slice_in_each_pizza = 8
# total number of pizza is calculated
total_number_of_slices = number_of_pizza * slice_in_each_pizza
# number of guest who respond yes
# is initialised to 10
number_of_guest_respond_yes = 10
# additional 3 guest is added to existing guest
number_of_guest_respond_yes += 3
# number of left over slice is gotten by using modulo arithmetic
number_of_left_over_slice = total_number_of_slices % number_of_guest_respond_yes
# the number of left over slice
# is printed which is 1
print(number_of_left_over_slice)
Explanation:
Missing Question Part: Use a variable to store the number of pizzas ordered as 5.
Assuming there are 8 slices in each pizza, use a variable to store the total number of slices calculated using the number of pizzas ordered.
Use another variable to store the number of guests who had responded YES as 10.
Three more people responded YES. Update the corresponding variable using an appropriate expression.
Based on the guest count, set up an expression to determine the number of left-over slices if the slices would be evenly distributed among the guests. Store the result of the expression in a variable.
The program is written in Python and it is well commented.
Enlighten server and client network architecture. support your answer with diagrams and give an example of servers that your computer or mobile is connected currently
Server & Client Network Architecture:
The server-client network can be described as a network where a centralized server (host) provides services to many clients (users). The server is a powerful machine that can handle multiple clients.
There are various types of servers some of them are:
File serverDNS serverApplication serverWeb serverMail serverDatabase serverBenefits of server & client network:
Centralized and securedEnhanced speed and performanceCustomizationExample:
Take the example of hospital patient management system where a centralized server has a huge database and is running the application and many client computers are connected to this server where doctors enter the information about patients and this information is then stored in the server.
13. Question
What are two characteristics of a 5Ghz band wireless network?
Check all that apply.
Answer:
The two major characteristics of the 5GHZ are Fast speed and Short range.
Explanation:
The two major characteristics of the 5GHZ are Fast speed and Short range.
5GHz operates over a great number of unique channels. With the 5GHz, there is less overlap, which means less interference, and this makes it produce a better performance. The 5GHz is a better option as long as the device is close to the router/access point. Thus, it operates at shirt ranges.
The 5GHz band possesses the ability to cut through network disarray and interference to maximize network performance. It has more channels for communication, and usually, there are not as many competing devices on the 5GHz band. Thus, it has a very fast speed.
Write one DDL statement to add a new table Project into exam1. It contains the followingthree columns:-ProjNum of char(3) type, which is the primary key of Project.-Pname of varchar(30) type, which could be null. If it has a value, its first three characters must be 'UH2' or 'UB5'.-Budget of smallmoney type, which cannot be null and must have a minimum of $1,500.
Answer:
Check the explanation
Explanation:
When it comes to database management systems, a query is whichever command that is used in the retrieval of data from a table. In a Structured Query Language (SQL), generally queries are more or less always made by using the SELECT statement.
I have been trying to type it here but it's not working
so kindly check the code in the attached image below
This project involves writing a java program to simulate a blackjack card game. You will use a simple console-based user interface to implement this game.
A simple blackjack card game consists of a player and a dealer. A player is provided with a sum of money with which to play. A player can place a bet between $0 and the amount of money the player has. A player is dealt cards, called a hand. Each card in the hand has a point value. The objective of the game is to get as close to 21 points as possible without exceeding 21 points. A player that goes over is out of the game. The dealer deals cards to itself and a player. The dealer must play by slightly different rules than a player, and the dealer does not place bets. A game proceeds as follows:
A player is dealt two cards face up. If the point total is exactly 21 the player wins immediately. If the total is not 21, the dealer is dealt two cards, one face up and one face down. A player then determines whether to ask the dealer for another card (called a "hit") or to "stay" with his/her current hand. A player may ask for several "hits." When a player decides to "stay" the dealer begins to play. If the dealer has 21 it immediately wins the game. Otherwise, the dealer must take "hits" until the total points in its hand is 17 or over, at which point the dealer must "stay." If the dealer goes over 21 while taking "hits" the game is over and the player wins. If the dealer’s points total exactly 21, the dealer wins immediately. When the dealer and player have finished playing their hands, the one with the highest point total is the winner. Play is repeated until the player decides to quit or runs out of money to bet.
You must use an object-oriented solution for implementing this game.
Answer:i dont know sorry
Explanation:
Consider the Telnet example discussed in Slide 78 in Chapter 3. A few seconds after the user types the letter ‘C’, the user types the letter ‘R’. After typing the letter ‘R’, how many segments are sent, and what is put in the sequence number and acknowledgement fields of the segments?
Answer:
3 Segments,
First segment : seq = 43, ack=80
Second Segment : seq = 80, ack=44
Third Segment: seq = 44, ack=81
Explanation:
Three segments will be sent as soon as the user types the letter ‘C’ and the he waits for a few seconds to type the letter ‘R’.
In our Telnet example, 42 and 79 for the client and server were the starting sequence number. Since the letter 'R' is typed and the starting seq is 42 is incremented by 1 byte. Therefore the sequence number in the first segment is 43 and the acknowlegement number is 80.
The second segment is sent from the server to the client. It echoes back the letter ‘C’. 43 is put in the acknowledgment field and tells the client that it has successfully received everything up through byte 42 and is now waiting for bytes 43 onward. This second segment has the sequence number 79 which is incremented by 1 byte. Therefore the sequence number in the second segment is 80 and the acknowlegement number is 44.
The third segment is sent from the client to the server. Its acknowledges the data it has received from the server. It has 80 in the acknowledgment number field because the client has received the stream of bytes up through byte sequence number 79 and it is now waiting for bytes 80 onward. This is also incremented by 1 byte. Therefore the sequence number in the second segment is 44 and the acknowlegement number is 81.
Final answer:
In a Telnet session, each keystroke is sent as a separate segment. Therefore, typing 'R' after 'C' sends one segment with a sequence number incremented by one from the previous, and an acknowledgment number also increased by one to acknowledge receipt of the previously received segment.
Explanation:
When the user types the letter 'R' after typing 'C' in a Telnet session, generally a single segment is sent for each keystroke because Telnet operates in character mode. In this mode of operation, every character generates a pair of segments: one from the client to the server (the telnet command) and one from the server to the client (the acknowledgment).
The sequence number in the segment sent after typing 'R' would be incremented by one compared to the previous segment's sequence number because each character sent is considered one byte of data. Similarly, the acknowledgment number would be set to one more than the last received segment's sequence number, acknowledging the successful receipt of that segment.
If we assume the initial sequence number is 'X' for the first segment carrying the 'C' and the server acknowledges with 'Y', then for the 'R' segment, the sequence number would be 'X+1' and the acknowledgment field would have 'Y+1' if no other data was sent or received in the interim.
Express the worst case run time of these pseudo-code functions as summations. You do not need to simplify the summations. a) function(A[1...n] a linked-list of n integers) for int i from 1 to n find and remove the minimum integer in A endfor endfunction
Answer:
The answer is "O(n2)"
Explanation:
The worst case is the method that requires so many steps if possible with compiled code sized n. It means the case is also the feature, that achieves an average amount of steps in n component entry information.
In the given code, The total of n integers lists is O(n), which is used in finding complexity. Therefore, O(n)+O(n-1)+ .... +O(1)=O(n2) will also be a general complexity throughout the search and deletion of n minimum elements from the list.g (Locate the largest element) Write the following method that returns the location of the largest element in a two-dimensional array: public static int [] locateLargest(double [][] a) The return value is a one-dimensional array that contains two elements. These two elements indicate the row and column indices of the largest element in the two-dimensional array. Write a test program (the main method) that prompts the user to enter a two-dimensional array and displays the location of the largest element of the array.
Answer:
The method in JAVA is shown below.
static double largest = 0.0;
static int[] idx = new int[2];
public static int r = 20;
public static int c = 20;
public static int[] locateLargest(double[][] a)
{
for(int j=0; j<c; j++)
{
for(int k=0; k<r; k++)
{
if(largest<a[j][k])
{
largest=a[j][k];
idx[0]=k;
idx[1]=j;
}
}
}
return idx;
}
The JAVA program is shown below.
import java.util.Scanner;
import java.lang.*;
class program
{
//static variables declared and initialized as required
static double largest = 0.0;
static int[] idx = new int[2];
public static int r = 20;
public static int c = 20;
public static int[] locateLargest(double[][] a)
{
for(int j=0; j<c; j++)
{
for(int k=0; k<r; k++)
{
if(largest<a[j][k])
{
largest=a[j][k];
idx[0]=k;
idx[1]=j;
}
}
}
return idx;
}
}
public class Main
{
static double[][] arr;
static double input;
public static void main(String[] args){
program ob = new program();
arr = new double[ob.r][ob.c];
Scanner sc = new Scanner(System.in);
for(int j=0; j<ob.c; j++)
{
for(int k=0; k<ob.r; k++)
{
arr[j][k]=0;
}
}
System.out.println("Enter the elements of two dimensional array ");
for(int j=0; j<ob.c; j++)
{
for(int k=0; k<ob.r; k++)
{
input = sc.nextDouble();
if(input>0)
{ arr[j][k] = input;
//System.out.println(arr[j][k]);
}
else
break;
}
break;
}
int[] large_idx = ob.locateLargest(arr);
int row = large_idx[0];
int col = large_idx[1];
double l = arr[col][row];
System.out.println("The largest element in the user entered array is " + l);
}
}
OUTPUT
Enter the elements of two dimensional array
1
2
3
4
5
6
7
8
9
0
The largest element in the user entered array is 9.0
Explanation:
1. The class program contains the locateLargest() method as mentioned in the question.
2. The public class Main contains the main() method.
3. User input for array is taken inside main().
4. This array is passed to the locateLargest() method.
5. This method returns the one dimensional array having row and column indices of the largest element in the array.
6. The indices are used to display the largest element in the main().
Programming Project 6: GUI program
Last program assignment.
You need to create the Graphical User Interface program that allows a user to select their lunch items and have the program calculate the total. Use tkinter to produce a form that looks much like the following. It doesn't need to look exactly like this, but the drinks should all be in a row, the entrees should all be in a row, the desserts should all be in a row, and the 2 buttons should all be in a row. Use the grid layout manager to make all this happen.
Because of the radio buttons, in the program the user can select only one drink. For the entrees and desserts, any combination of selections is possible. Perfect alignment is not a requirement.
For full credit:
Use a class that inherits from Frame to implement your program.
Your program should display all the labels as shown in the image.
the drinks should be radio buttons, all on a row, the other items should be checkboxes in their respective rows.
The correct total rounded to 2 decimal places should appear in the total entry box only when the Calculate Total button is clicked, and the Clear Form button should put the form back into its default state, as shown in the image above..
Arrange the widgets more or less a shown above. I recommend using the grid layout manager for this. .
Here is a possible program run. Oh, and it would help a little if you spelled Total correctly.
Answer:
Explanation:
So i have issues typing it here, because it keeps saying trouble uploading your answer as a result of inappropriate words/links, so i will just make a screenshot of it.......
Just save the the above code in python file and execute it, you should arrive at your answer.
Attached below is the code and sample screenshot of what you should expect
cheers !!!!
Al and Bill are arguing about the performance of their sorting algorithms. Al claims that his O(N log N)-time algorithm is always faster than Bill's O(N2)-time algo- rithm. To settle the issue, they implement and run the two algorithms on many randomly generated data sets. To Al's dismay, they find that if N 〈 1000 the O(N2)- time algorithm actually runs faster, and only when N 〉 1000 the 0(N logN)-time (10 pts.) one is better. Explain why the above scenario is possible
The observed performance difference is due to the constant factors and lower-order terms in the algorithms, affecting the actual running times for different input sizes.
The observed difference in performance between Al's O(N log N)-time algorithm and Bill's O(N^2)-time algorithm is due to the inherent nature of Big O notation.
While Big O provides an upper bound on an algorithm's growth rate as N approaches infinity, it neglects constant factors and lower-order terms, which are crucial for smaller input sizes.
Consequently, for N < 1000, Al's algorithm may have a higher constant factor or additional overhead, causing it to be slower than Bill's algorithm with O(N^2) complexity.
However, as N increases and surpasses 1000, the superior growth rate of Al's O(N log N) algorithm starts to dominate, making it faster than Bill's O(N^2) algorithm.
This discrepancy emphasizes the significance of considering constant factors and lower-order terms when evaluating algorithm performance in real-world scenarios.
Learn more about algorithms here:
https://brainly.com/question/33337820
#SPJ3
Final answer:
Al's O(N log N) sorting algorithm may run slower than Bill's O(N^2) algorithm for small data sets due to the practical influence of constant factors, lower-order terms, and the characteristics of specific programming languages that Big-O notation ignores. Al's algorithm outperforms Bill's only for larger N, where Big-O's highest-order term dominates the run-time.
Explanation:
The scenario where Al's O(N log N)-time sorting algorithm is outperformed by Bill's O(N2)-time algorithm for N < 1000 can be explained by considering the constants and lower-order terms involved in algorithm performance, which are not captured by Big-O notation. Big-O provides an abstract overview of complexity, focusing on the highest-order term, and it tends to ignore constants and lower-order terms. However, these neglected elements can significantly impact the actual run-time in practice, especially for smaller sizes of N.
Moreover, programming languages' execution speeds and overheads for various operations can differ, which might result in a less efficient algorithm (in terms of Big-O) running faster in practice due to language-specific optimizations or lower constant factors. For instance, a simple O(N2) algorithm like bubble sort might have less overhead than a more complex O(N log N) algorithm and can execute faster for small data sets.
Only when data sets grow large enough does the complexity described by Big-O notation become the dominating factor, and Al's algorithm starts to outperform Bill's. It's a classic illustration of why algorithm analysis must consider both theoretical performance and practical implementation details such as constant factors and the characteristics of specific data sets.
1. Write a telephone lookup program. Read a data set of 1, 000 names and telephone numbers from a file that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups.
Answer:
Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't take the symbol
Explanation:
PhoneLookup.java
import java.io.FileReader;
import java.io.IOException;
import java.util.Scanner;
public class PhoneLookup
{
public static void main(String[] args) throws IOException
{
Scanner in = new Scanner(System.in);
System.out.println("Enter the name of the phonebook file: ");
String fileName = in.nextLine();
LookupTable table = new LookupTable();
FileReader reader = new FileReader(fileName);
table.read(new Scanner(reader));
boolean more = true;
while (more)
{
System.out.println("Lookup N)ame, P)hone number, Q)uit?");
String cmd = in.nextLine();
if (cmd.equalsIgnoreCase("Q"))
more = false;
else if (cmd.equalsIgnoreCase("N"))
{
System.out.println("Enter name:");
String n = in.nextLine();
System.out.println("Phone number: " + table.lookup(n));
}
else if (cmd.equalsIgnoreCase("P"))
{
System.out.println("Enter phone number:");
String n = in.nextLine();
System.out.println("Name: " + table.reverseLookup(n));
}
}
}
}
LookupTable.java
import java.util.ArrayList;
import java.util.Collections;
import java.util.Scanner;
/**
A table for lookups and reverse lookups
*/
public class LookupTable
{
private ArrayList<Item> people;
/**
Constructs a LookupTable object.
*/
public LookupTable()
{
people = new ArrayList<Item>();
}
/**
Reads key/value pairs.
"at"param in the scanner for reading the input
*/
public void read(Scanner in)
{
while(in.hasNext()){
String name = in.nextLine();
String number = in.nextLine();
people.add(new Item(name, number));
}
}
/**
Looks up an item in the table.
"at"param k the key to find
"at"return the value with the given key, or null if no
such item was found.
*/
public String lookup(String k)
{
String output = null;
for(Item item: people){
if(k.equals(item.getName())){
output = item.getNumber();
}
}
return output;
}
/**
Looks up an item in the table.
"at"param v the value to find
"at"return the key with the given value, or null if no
such item was found.
*/
public String reverseLookup(String v)
{
String output = null;
for(Item item: people){
if(v.equals(item.getNumber())){
output = item.getName();
}
}
return output;
}
}
Item.java
public class Item {
private String name, number;
public Item(String aName, String aNumber){
name = aName;
number = aNumber;
}
public String getName(){
return name;
}
public String getNumber(){
return number;
}
}
input.txt
Abbott, Amy
408-924-1669
Abeyta, Ric
408-924-2185
Abrams, Arthur
408-924-6120
Abriam-Yago, Kathy
408-924-3159
Accardo, Dan
408-924-2236
Acevedo, Elvira
408-924-5200
Acevedo, Gloria
408-924-6556
Achtenhagen, Stephen
408-924-3522
Kindly check the attached output image below.
You client has stipulated that open-source software is to be used. Is this a functional or non-functional requirement? How early in the life-cycle model can this requirement be handled? Explain your answer.
Answer:
In the beginning of the model
Explanation:
This is believed to be a non functional requirement because the non- functional type of requirement as platform restrictions, reliability and time of response. These requirements are meant to be handled during the beginning of the life cycle model because all planing and analysis should be centered around the fact that customers desires to adopt the open source model.
For each of the following cases, select the type of NoSQL DBMS that would fit best the needs of the situation. a. The database has to support a relatively complex hierarchical internal record structure that may vary for each record. b. The key requirement for the database is to access a specific record as quickly as possible without any concern regarding the internal structure of the record. c. The data are particularly well suitable to be organized as a network of associations between the data items. d. It is important that the DBMS provides quick access to each of the records by a key value, but, in addition, it has to also allow easy access to the components of each record.
Answer:
Check the explanation
Explanation:
(a) There will be a need for the database to support a comparatively complex and complicated hierarchical internal record structure that may vary for each record. Column store NoSQL DBMS
(b)The key requirements for the database are to access a specific record structure as quickly as possible without any concern regarding the internal structure of the record. Key value store NoSQL DBMS
(c) The data are specifically well suited to be organized as a network of connections amid the data items. Graph Base NoSQL DBMS
(d) It is essential that the DBMS offers quick access to each of the records by a key value, but, in addition, it has to also allow easy access to the components of each record. Document store NoSQL DBMS
A prime number is any integer greater than 1 that is evenly divisible only by itself and 1. The Sieve of Eratosthenes is a method of finding prime numbers. It operates as follows: Create a primitive type Boolean array with all elements initialized to true. Array elements with prime indices will remain true. All other array elements will eventually be set to false. Starting with array index 2, determine whether a given element is true. If so, loop through the remainder of the array and set to false every element whose index is a multiple of the index for the element with value true. Then continue the process with the next element with value true. For array index 2, all elements beyond element 2 in the array that have indices which are multiples of 2 (indices 4, 6, 8, 10, etc.) will be set to false; for array index 3, all elements beyond element 3 in the array that have indices which are multiples of 3 (indices 6, 9, 12, 15, etc.) will be set to false; and so on. When this process completes, the array elements that are still true indicate that the index is a prime number. These indices can be displayed. Write an application that uses an array of 1000 elements to determine and display the prime numbers between 2 and 999. Ignore array elements 0 and 1.
Answer:
see explaination
Explanation:
public class test{
public static void main(String[] args){
boolean flag[] = new boolean[1000];
for(int i = 0; i < 1000; i++){
flag[i] = true;
}
for(int i = 2; i < 1000; i++){
if(flag[i] == true){
for(int j = i + 1; j < 1000; j++){
if(j % i == 0) flag[j] = false;
}
}
}
System.out.println("The prime numbers in the range 0 to 1000 are:");
for(int i = 2; i < 1000; i++){
if(flag[i] == true) System.out.print(i + " ");
}
}
}
Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger. a. WinMax b. WiMAX c. EMax d. 802.11b
Similar to Wi-Fi, WiMAX is a kind of hotspot, is designed to provide Internet access to fixed locations (sometimes called hot zones), but the coverage is significantly larger. Thus, the correct option for this question is B.
What is Wi-Fi?Wi-Fi stands for Wireless fidelity. It may be characterized as a wireless technology that is significantly used in order to connect computers, tablets, smartphones, and other devices to the internet. It processes the radio signal sent from a wireless router to a nearby device, which translates the signal into data you can see and use.
According to the context of this question, hotspot also follows the same working principle in order to connect devices like computers, mobile phones, etc, to the internet.
But the problem is that it connects the devices over a short distance. While WiMAX has the capability to connect devices where the coverage is significantly larger.
Therefore, similar to Wi-Fi, WiMAX is a kind of hotspot, is designed to provide Internet access to fixed locations (sometimes called hot zones), but the coverage is significantly larger. Thus, the correct option for this question is B.
To learn more about Wi-Fi, refer to the link:
https://brainly.com/question/13267315
#SPJ5
Final answer:
WiMAX, also known as Worldwide Interoperability for Microwave Access, is designed to provide Internet connectivity over larger areas than Wi-Fi, and is standardized as IEEE 802.16. It uses microwave communications to provide broadband wireless access, especially useful in areas without traditional cable or DSL infrastructure.
Explanation:
Similar to Wi-Fi, which is a wireless local area network technology allowing devices to connect to the Internet, WiMAX (Worldwide Interoperability for Microwave Access) is designed to provide Internet access to fixed locations over much larger coverage areas, sometimes referred to as hotzones.
WiMAX is standardized as IEEE 802.16, providing broadband wireless access (BWA) and enabling the formation of connections over long distances. It is essentially used for providing last mile broadband wireless access and can be a cost-effective alternative to traditional cable or DSL methods. WiMAX has become a valuable technology especially in areas that lack the infrastructure for cable or DSL connections, providing the necessary Internet access using microwave communications.
Write a program that inputs a non negative integer,separates the integer into its digits and prints them separated by tabs each.For example, if the user types in 42339, the program should print:42339
Answer:
tab = ""
number = int(input("Enter a nonnegative integer: "))
while number:
digit = number % 10
if len(str(number)) != 1:
tab += str(digit) + "\t"
else:
tab += str(digit)
number //= 10
print(tab[::-1])
Explanation:
* The code is in Python
- Initialize an empty string to hold the digits
- Ask the user for the input
Inside the loop:
- Get the digits of the number. If the length of the number is not 1 (If it is not the first digit), put a tab between the digits. Otherwise, just put the number (This will get the numbers from the last digit. If number is 123, it gets 3 first, then 2, then 1)
- Print the string in reverse order
The question is about writing a program to separate digits of a non-negative integer and print them with tabs in between. A Python example is provided as a sample solution, where the digits are printed using a loop and tab-separated.
Explanation:The question involves writing a program that takes a non-negative integer as input, separates the individual digits, and prints them separated by tabs. This is a typical programming exercise that can be solved using various programming languages such as Python, Java, or C++. Below is an example of how one might write a simple program in Python to achieve the desired output:
number = input("Enter a non-negative integer: ")This program prompts the user to enter a non-negative integer. It then iterates through each character in the input string (in this case, a number) and prints each digit followed by a tab space.
ABC software company is to develop software for effective counseling for allotment of engineering seats for students with high scores ranking from top colleges. The product has to be upgraded if the common entrance score is to be considered.
Describe the appropriate product development life cycle and the standard skills required.
Answer:
A series of update steps must be done in the required software; for example:
Explanation:
Option 1: add the timestamp at the top of the view :
Open a workbook containing the dashboard in Tableau Desktop, then go to the sheet where you want to show the time of the last data update.
-Select Worksheet> Show Title.
-Double-click on the title.
-In the Edit Title dialog box, select Insert> Data update time, and then click OK.
-Add any field to the filter shelf, leave all other selections blank, and click OK.
-Save the changes.
-Add sheet to dashboard.
Option 2: add the timestamp at the bottom of the view.
Open a workbook containing the dashboard in Tableau Desktop, then go to the sheet where you want to show the time of the last data update.
-Select Worksheet> Show Caption.
-Double-click the subtitle.
-In the Edit Subtitle dialog box, select Insert> Data update time, and then click OK.
-Add any field to the filter shelf, leave all other selections blank, and click OK.
-Save the changes.
-Add the sheet to the dashboard.
-Right-click on the sheet and select Caption to display the update time.
You can modify the size of these sheets in the dashboard to take up the space you consider necessary. They can also be set as floating objects, so they don't alter the size of the rest of the sheets in the view.
In previous counters that you have created, you set the upper limit as the value just past the last digit you wanted displayed. That is not the case with this design. Why is how you set the range different for this design?
Answer:
The Synchronous load is synchronous and the Asynchronous load input is delayed with the counter pulse by one when it counts up.
Explanation:
The Synchronous load is synchronous and when it goes through the input load then the count from the Q outputs will stay the same. The Asynchromous load input is bit different and it delays the counters pulse by one when it counts up. it adds 1 to the pulse when it counts down. This means that it will either add or subtract 1 to the restart/maximum binary count.
Final answer:
The number of digits displayed in calculations holds significance for accuracy and precision.
Explanation:
When working with numbers, the number of **digits** you decide to display or consider is crucial. It is essential to be aware of the **accuracy**, **precision**, and **significant figures** in your calculations.
In terms of displayed values, setting the range differently in certain designs may be to highlight the **significance** of the last digit. This last digit often indicates the level of **error** in the calculation and is crucial for conveying the **precision** of the result. The question posed relates to the design of counters in engineering and why the range setting differs in the given design compared to previous ones. In engineering designs, especially those involving counters that detect voltage changes and display them, the precision of measurement and display is crucial. The decision on how to set the range, or the number of digits displayed, is influenced by the principles of accuracy, precision, and significant figures
You must keep track of some data. Your options are: (1) A linked-list maintained in sorted order. (2) A linked-list of unsorted records. (3) A binary search tree. (4) An array-based list maintained in sorted order. (5) An array-based list of unsorted records
(a) For sorted records, use an array-based sorted list for efficient O(log n) inserts and searches. Linked lists are less optimal.
(b) With random distribution, opt for a balanced binary search tree for O(log n) insertions and searches. Arrays may lack balance.
(a) For the scenario where records are guaranteed to arrive already sorted from lowest to highest, an array-based list maintained in sorted order (Option 4) would be the most efficient choice. This is because inserting into a sorted array is a relatively quick operation, and with records arriving in sorted order, each insert operation can be performed with a time complexity of O(log n), making it efficient. The subsequent searches would also benefit from the sorted order, allowing for a binary search with a time complexity of O(log n), resulting in optimal performance. Linked lists, whether sorted or unsorted, may not provide the same level of efficiency in this context.
(b) In the case where records arrive with values having a uniform random distribution, a binary search tree (Option 3) is a suitable choice. A well-balanced BST can provide an average-case time complexity of O(log n) for both insertions and searches. The random distribution of values helps maintain the balance of the tree, ensuring that the height is minimized. On the other hand, array-based options, even if sorted, may not guarantee a balanced structure, and linked lists may lead to linear search times in the worst case.
The question probable may be:
You must keep track of some data. Your options are:
(1) A linked-list maintained in sorted order.
(2) A linked-list of unsorted records.
(3) A binary search tree.
(4) An array-based list maintained in sorted order.
(5) An array-based list of unsorted records.
For each of the following scenarios, which of these choices would be best? Explain your answer.
(a) The records are guaranteed to arrive already sorted from lowest to highest (i.e., whenever a record is inserted, its key value will always be greater than that of the last record inserted). A total of 1000 inserts will be interspersed with 1000 searches.
(b) The records arrive with values having a uniform random distribution (so the BST is likely to be well balanced). 1,000,000 insertions are performed, followed by 10 searches.
A router receives a packet and determines the outbound link for the packet. When the packet arrives, 2/3 of one other packet is done being transmitted on this outbound link and five other packets are waiting to be transmitted. Packets are transmitted in order of arrival. Suppose all packets are 3,000 bytes, and the link rate is 4 Mbps. What is the queuing delay for the packet
Answer:
Queuing Delay is 0.08 seconds
Explanation:
The answer follows a formula that is relatively easy to use and is detailed below.
Queuing Delay = [(L - x) + (nL)] / R
where,
L is packet length given as 3,000 bytes
x is the currently transmitted packet given as 2/3 * 3,000 = 2,000
n is the number of packets waiting in the Que given as 5
R is the rate of transmission given as 4 Mbps (4 * 10^6 Bps)
We can simply plug in the above information in the equation for computing Queuing Delay.
Lets take the numerator first which would be [(3000 - 2000) + (5 * 3000)]
The numerator would be 16000 bytes. These are being transmitted at 4Mbps. So, 16000*4*5 = 320,000 "bits"
Queuing Delay= 320,000/4000000
Queuing Delay = 0.08 seconds.
As we can see, the formula is quite intuitive to use. You are simply taking the number of packets to be transmitting, incorporating the partially transmitted packet, multiplying by the number of packets and the rate of transmission and then dividing the product by the rate of transmission to compute what the delay in the Que is.
A Grocery store has 184 shelves for bottled goods. Each shelf can hold 27 bottles. How many bottles will the shelves hold in all.
Answer:
4,968
Explanation:
You just have to multiply
Create a program that includes a function called toUpperCamelCase that takes a string (consisting of lowercase words and spaces) and returns the string with all spaces removed. Moreover, the first letter of each word is to be forced to its corresponding uppercase. For example, given "hello world" as the input, the function should return "HelloWorld". The main function should prompt the user to input a string until the user types "Q". For each string input call the function with the string and display the result. (Hint: You may need to use the toupper function defined in the header file.)
Answer:
#include<iostream>
using namespace std;
//method to remove the spaces and convert the first character of each word to uppercase
string
toUpperCameICase (string str)
{
string result;
int i, j;
//loop will continue till end
for (i = 0, j = 0; str[i] != '\0'; i++)
{
if (i == 0) //condition to convert the first character into uppercase
{
if (str[i] >= 'a' && str[i] <= 'z') //condition for lowercase
str[i] = str[i] - 32; //convert to uppercase
}
if (str[i] == ' ') //condition for space
if (str[i + 1] >= 'a' && str[i + 1] <= 'z') //condition to check whether the character after space is lowercase or not
str[i + 1] = str[i + 1] - 32; //convert into uppercase
if (str[i] != ' ') //condition for non sppace character
{
result = result + str[i]; //append the non space character into string
}
}
//return the string
return (result);
}
//driver program
int main ()
{
string str;
char ch;
//infinite loop
while (1)
{
fflush (stdin);
//cout<< endl;
getline (cin, str); //read the string
//print the result
//cout<< endl << "Q";
// cin >> ch; //ask user to continue or not
ch = str[0];
if (ch == 'q' || ch == 'Q') //is user will enter Q then terminatethe loop
break;
cout << toUpperCameICase (str);
cout << endl;
}
return 0;
}
(3 points) Write a program to process two large chunks of data (e.g., a large 3D array and an array of self-defined structures with each structure at least 256 Bytes) respectively. The array elements can be random. The process can be incrementing every element by 1 or others. Try different ways (e.g., stride-k reference, the loop orders or others) to traverse the array elements and simulate the program performance (i.e., running time). Note that you should record the time just before and after the data processing program, not including the data generation or other initiation programs. And you should calculate an average time of at least 5 experiments for each program.
Answer:
Check the explanation
Explanation:
#include <iostream> #include <chrono> using namespace std::chrono; using namespace std; struct X{ int a,b,c,d,e,f,g,h; }; int main(){ // 3D Array of integers 1000 x 1000 x 1000 int data1[10][10][10]; //Array of struct X struct X data2[10000] ; auto start = high_resolution_clock::now(); //stride 1 access data 1 Loop order 1: for(int i=0;i<1000;i++){ for(int j=0;j<1000;j++){ for(int k=0;k<1000;k++){ data1[i][j][k]; } } } auto stop = high_resolution_clock::now(); auto duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 1 Loop Order 1"<<duration.count()<<endl; start = high_resolution_clock::now(); //stride 2 access data 1 Loop order 1: for(int i=0;i<1000;i+=2){ for(int j=0;j<1000;j+=2){ for(int k=0;k<1000;k+=2){ data1[i][j][k]; } } } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 2 Loop Order 1"<<duration.count()<<endl; start = high_resolution_clock::now(); //stride 1 access data 1 Loop order 2: for(int i=0;i<1000;i++){ for(int j=0;j<1000;j++){ for(int k=0;k<1000;k++){ data1[j][i][k]; } } } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 1 Loop Order 2"<<duration.count()<<endl; start = high_resolution_clock::now(); for(int i=0;i<10000;i++){ data2[i]; } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"Struct Array "<<duration.count()<<endl; }
Some Observations on the order:
Stride 1 goes over all the elements of the array Hence takes more time than stride 2 which goes over alternate elements.
Loop order in the row major form takes leads time than column major form!
Struct array takes no time to execute because the structs are not being accessed.
Check the code screenshot and code output in the attached image below.
Answer:
See explaination
Explanation:
#include <iostream> #include <chrono> using namespace std::chrono; using namespace std; struct X{ int a,b,c,d,e,f,g,h; }; int main(){ // 3D Array of integers 1000 x 1000 x 1000 int data1[10][10][10]; //Array of struct X struct X data2[10000] ; auto start = high_resolution_clock::now(); //stride 1 access data 1 Loop order 1: for(int i=0;i<1000;i++){ for(int j=0;j<1000;j++){ for(int k=0;k<1000;k++){ data1[i][j][k]; } } } auto stop = high_resolution_clock::now(); auto duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 1 Loop Order 1"<<duration.count()<<endl; start = high_resolution_clock::now(); //stride 2 access data 1 Loop order 1: for(int i=0;i<1000;i+=2){ for(int j=0;j<1000;j+=2){ for(int k=0;k<1000;k+=2){ data1[i][j][k]; } } } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 2 Loop Order 1"<<duration.count()<<endl; start = high_resolution_clock::now(); //stride 1 access data 1 Loop order 2: for(int i=0;i<1000;i++){ for(int j=0;j<1000;j++){ for(int k=0;k<1000;k++){ data1[j][i][k]; } } } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"3D array Stride 1 Loop Order 2"<<duration.count()<<endl; start = high_resolution_clock::now(); for(int i=0;i<10000;i++){ data2[i]; } stop = high_resolution_clock::now(); duration = duration_cast<microseconds>(stop - start); cout<<"Struct Array "<<duration.count()<<endl; }
Kindly check attachment for screenshot of the source code for proper indentation.
Write a recursive method called repeat that accepts a string s and an integer n as parameters and that returns s concatenated together n times. For example, repeat("hello", 3) returns "hellohellohello", and repeat("ok", 1) returns "ok", and repeat("bye", 0) returns "". String concatenation is an expensive operation, so for an added challenge try to solve this problem while performing fewer than n concatenations.
Answer:
public static String repeat(String text, int repeatCount) {
if(repeatCount < 0) {
throw new IllegalArgumentException("repeat count should be either 0 or a positive value");
}
if(repeatCount == 0) {
return "";
} else {
return text + repeat(text, repeatCount-1);
}
}
Explanation:
Here repeatCount is an int value.
at first we will check if repeatCount is non negative number and if it is code will throw exception.
If the value is 0 then we will return ""
If the value is >0 then recursive function is called again untill the repeatCount value is 0.
The recursive method called repeat in this exercise will be implemented using the Kotlin programming language
fun repeat (s:String, n: Int ) {
repeat(n) {
println("s")
}
}
In the above code, the Kotlin repeat inline function was used to archive the multiple output of the desired string, here is a documentation of how the repeat keyword/function works inline
fun repeat(times: Int, action: (Int) -> Unit)
//Executes the given function action specified number of times.
Learn more about Recursive methods:
https://brainly.com/question/11316313
Repeat Programming Project 5 but in addition ask the user if he or she is a. Sedentary b. Somewhat active (exercise occasionally) c. Active (exercise 3–4 days per week) d. Highly active (exercise every day) If the user answers "Sedentary," then increase the calculated BMR by 20 percent. If the user answers "Somewhat active," then increase the calculated BMR by 30 percent. If the user answers "Active," then increase the calculated BMR by 40 percent. Finally, if the user answers "Highly active," then increase the calculated BMR by 50 percent. Output the number of chocolate bars based on the new BMR value.
Answer:
Explanation:
//C++ program to calculate the number of chocolate bars to consume in order to maintain one's weight.
#include <iostream>
#include <math.h>
using namespace std;
int main() {
float weight,height;
int age,choice;
char gender;
float bmr;
// inputs
cout<<"\n Enter weight(in pounds) : ";
cin>>weight;
cout<<"\n Enter height(in inches) : ";
cin>>height;
cout<<"\n Enter age(in years) : ";
cin>>age;
cout<<"\n Enter gender(M for male , F for female) : ";
cin>>gender;
cout<<"\n Are you :\n 1. Sedentary \n 2. Somewhat active(exercise occasionally)\n 3. Active(exercise 3-4 days per week)\n 4. Highly active(exercise everyday)? ";
cout<<"\n Choice(1-4) ";
cin>>choice;
//calculate bmr based on the gender
if(gender == 'm' || gender == 'M')
{
bmr = 66+(6.3*weight)+(12.9*height)-(6.8*age);
}else if(gender == 'f' || gender == 'F')
{
bmr = 655+(4.3*weight)+(4.7*height)-(4.7*age);
}
// update bmr based on how active the user is
if(choice ==1)
bmr = bmr + (20*bmr)/100;
else if(choice == 2)
bmr = bmr + (30*bmr)/100;
else if(choice ==3)
bmr = bmr + (40*bmr)/100;
else if(choice ==4)
bmr = bmr + (50*bmr)/100;
// output
cout<<"\n The number of chocolate bar that should be consumed = "<<ceil(bmr/230);
return 0;
}
//end of program
The task involves calculating the basal metabolic rate (BMR), adjusting it based on activity level (Sedentary, Somewhat active, Active, Highly active), and then determining the equivalent number of chocolate bars. It emphasizes the importance of considering one's activity level in determining caloric needs.
Explanation:The question involves modifying a programming project to calculate a person's basal metabolic rate (BMR) and then adjusting it based on their level of activity before determining the number of chocolate bars equivalent to the adjusted BMR value. The activity levels are described as Sedentary, Somewhat active, Active, and Highly active, with corresponding increases of 20%, 30%, 40%, and 50% to the calculated BMR respectively.
BMR calculation is critical because it measures how much energy the body needs to perform basic bodily functions such as maintaining temperature, cell production, and nutrient processing at rest. The BMR does not include the energy used during physical activity or digestion. Factors influencing BMR include age, gender, body weight, and muscle mass. Interestingly, lean body mass, which is more metabolically active than fat tissue, is a significant determinant of BMR. Therefore, individuals with more muscle mass have a higher BMR.
To calculate the adjusted BMR based on activity level, one would first calculate the standard BMR and then apply the relevant percentage increase. For example, a sedentary person's BMR would be increased by 20%. This adjusted BMR can then be used to calculate the number of chocolate bars, assuming a typical chocolate bar contains around 250 calories, by dividing the adjusted BMR by the calorie content of the chocolate bars.