Answer:
Solved. Please download the attached zipped file. You can download the answers from the given link in explanation section
Explanation:
Download the attached file and unzipped/extract it to the root folder of your server.
This package contains all the files and folders as asked in the project.
In this package you can find the 5 pages in the includes folder and at the root you can find the index file. Click on the index file to open it.
Each page is stylized and have uniqueness than other pages. Please also note that, each page contains first, last and initial name in the title section of each page and in body section of each page. You can modify these names parameter according to your name/requirement
https://drive.google.com/file/d/1OBdjUI6JOnUuji-iYPmPWnJBk4gcMd6X/view?usp=sharing
Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out for uninitialized pointers, NULL pointers, pointers to deleted objects, and confusing pointers with objects.
Answer:
Explanation:
A null pointer is pointing to nothing, if we can detect if a pointer is null, we can use an "IF" because a null pointer always going to be false, a null pointer even can block an application, because is a result of undefined behavior, it can even cause problems because the compiler can’t tell whether we mean a null pointer or the integer 0, there is a confusion in this kind of pointers.
Which of the following helps in developing a microservice quickly? API Gateway Service registry Chassis Service Deployment
Answer:
Micro Service is a technique used for software development. In micro services structure, services are excellent and arrange as a collection of loosely coupled. API Gateway helps in developing micro services quickly.
Explanation:
The API gateway is the core of API management. It is a single way that allows multiple APIs to process reliably.
Working:
API gateway takes calls from the client and handles the request by determining the best path.
Benefits:
Insulated the application and partitioned into micro services.
Determine the location of the service instances.
Identify the problems of services.
Provide several requests.
Usage:
API stands for application program interface. It is a protocol and tool used for building software applications. Identify the component interaction and used the Graphical Interface component for communication.
Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without the outer quotes). In one of the variables use quoted string and in the other do not use it.
Answer:
Let the two string type variables be var1 and var2. The value stored in these two variables is : The "use" of quotations causes difficulties.
The variable which uses quoted string:string var1 = "The \"use\" of quotations causes difficulties.";
The variable which does not use quoted string:string var2 = "The " + '\u0022' + "use" + '\u0022' + " of quotations causes difficulties.";
Another way of assigning this value to the variable without using quoted string is to define a constant for the quotation marks:const string quotation_mark = "\"";
string var2 = "The " + quotation_mark + "use" + quotation_mark + " of quotations causes difficulties.";
Explanation:
In order to print and view the output of the above statements WriteLine() method of the Console class can be used.
Console.WriteLine(var1);
Console.WriteLine(var2);
In the first statement escape sequence \" is used in order to print: The "use" of quotations causes difficulties. This escape sequence is used to insert two quotation marks in the string like that used in the beginning and end of the word use.
In the second statement '\u0022' is used as an alternative to the quoted string which is the Unicode character used for a quotation mark.
In the third statement a constant named quotation_mark is defined for quotation mark and is then used at each side of the use word to display it in double quotations in the output.
Writing Output to a File 1. Copy the files StatsDemo.java (see Code Listing 4.2) and Numbers.txt from the Student CD or as directed by your instructor. 2. First we will write output to a file: a. Create a FileWriter object passing it the filename Results.txt (Don’t forget the needed import statement). b. Create a PrintWriter object passing it the FileWriter object. c. Since you are using a FileWriter object, add a throws clause to the main method header. d. Print the mean and standard deviation to the output file using a three decimal format, labeling each. e. Close the output file. 3. Compile, debug, and run. You will need to type in the filename Numbers.txt. You should get no output to the console, but running the program will create a file called Results.txt with your output. The output you should get at this point is: mean = 0.000, standard deviation = 0.000. This is not the correct mean or standard deviation for the data, but we will fix this in the next tasks.
Below is a code for StatsDemo.java that writes the output to a file
Java
i
PrintWriter printWriter = new PrintWriter(fileWriter);
// Since you are using a FileWriter object, add a throws clause to the main method header
// This will allow you to catch any exceptions thrown by the FileWriter or PrintWriter objects
try {
// Read the data from the file
Scanner scanner = new Scanner(new File("Numbers.txt"));
// Calculate the mean and standard deviation of the data
double[] data = new double[scanner.nextInt()];
for (int i = 0; i < data.length; i++) {
data[i] = scanner.nextDouble();
}
double mean = calculateMean(data);
double standardDeviation = calculateStandardDeviation(data, mean);
// Print the mean and standard deviation to the output file using a three decimal format, labeling each
DecimalFormat df = new DecimalFormat("0.000");
printWriter.println("Mean = " + df.format(mean));
printWriter.println("Standard deviation = " + df.format(standardDeviation));
} finally {
// Close the output file
printWriter.close();
fileWriter.close();
}
}
}
The output file will contain the following:
Mean = 0.000
Standard deviation = 0.000
So, the above code will read the data from the file "Numbers.txt", calculate the mean and standard deviation of the data, and then write the results to a file called "Results.txt".
code is incomplete as it is showing inappropriate words
Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor. Which is the most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements?
(a)VirtualBox
(b)Windows Virtual PC
(c)Windows XP Mode
(d)Microsoft Virtual PC 2007
(e)Parallels
Answer:
Option C: Windows Virtual PC is the correct answer.
Explanation:
The virtualization program for Microsoft Windows is given by Windows Virtual PC. As discussed it has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
The superseded version of Windows virtual PC is Hyper-V. It is the most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements.
All other options are wrong as the virtualbox is not considered as the Microsoft hypervisor therefore can't be installed. Similarily, the hypervisor named as Windows XP mode is not so capable that it could meet all requirements. In the end, the Parallel Desktops can not be run on the machines as they dont come under the Microsoft hypervisor category.
I hope it will help you!
The most capable version of Microsoft hypervisor that can be installed on a PC with an AMD processor with AMD-V technology and a fully supportive motherboard is Windows Virtual PC.
Explanation:If your Windows PC has an AMD processor that includes AMD-V technology, and the motherboard fully supports this processor, the most capable version of Microsoft hypervisor you can install on this machine is Windows Virtual PC. Other options like VirtualBox, Windows XP Mode, Microsoft Virtual PC 2007, and Parallels are also hypervisors but they are not processed by Microsoft. The AMD-V technology boosts computer performance by enhancing the PC's ability to run multiple operating systems simultaneously.
Learn more about Microsoft hypervisor here:https://brainly.com/question/32266053
#SPJ11
The local variables used in each invocation of a method during an application’s execution are stored in ________. A. the program execution stack B. the activation record C. the stack frame D. All of the above
Answer:
d. all of the above
Explanation:
The program execution stack also known as the call stack, has many functions. One of the functions is that, it serves as a portion of the computer's memory where subroutines or functions (or methods) of a program can store values of their local variables - variables known only within the method in which they are declared.
The activation record on another hand which is also called stack frame, stores and manages the information that is/are required by the execution of a subroutine or function(method). Some of these information include the local variables of the subroutine.
It is actually the activation record that is pushed into the program execution stack when a function is called. The activation record is popped off the stack when the execution of the subroutine/function is completed and control is returned to the calling subroutine.
Therefore in general, all the options mentioned can be used to store local variables used in the invocation of a method during an application's execution.
Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111010110001.0112 (b) 10110011101.112
The given decimal values are converted to octal and hexadecimal.
Explanation:
a. The converted octal value of 111010110001.0112 decimal number is 1473055755061.00557000643334272616
The converted hexadecimal value of 111010110001.0112 decimal number is 19D8B7DA31.02DE00D1B71758E21965
b. The converted octal value of 10110011101.112 decimal number is 113246503335.07126010142233513615
The converted hexadecimal value of 10110011101.112 decimal number is
25A9A86DD.1CAC083126E978D4FDF4
a. while converting back from octal to decimal the value is 111010110001.01119999999999999989
b. while converting back from octal to decimal the value is
10110011101.11199999999999999973
Hence both the values changes while we convert from octal to decimal.
"Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system."
Answer:
Collaboration information system
Explanation:
Information system is a process of communication between users and the computer system to perform instructions. The system is divided into three main parts, they are, computer side, data and user side. The computer side is the hardware and software of the computer system that receives data for execution. User side is the people and the procedure used to input data.
Collaboration system is a type of information system that a group of people use to share ideas electronically, regardless of their location, for efficiency and effectiveness in the work done or project.
Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsigned binary number Y (i.e. both X and Y are in the range #0 to #3). The output is z, which is 1 whenever X > Y, and 0 otherwise (this circuit is part of a "2-bit comparator"). For instance, if a = 1, b = 0 (i.e. X = b10 => #2); c = 0, d = 1 (i.e. Y = b01 => #1); then z = 1, since b10 > b01
Just need truth table, and boolean expression (simplified) for these thumbs up.
Answer:
z = a.c' + a.b.d' + b.c'.d'
Explanation:
The truth table for this question is provided in the attachment to this question.
N.B - a' = not a!
The rows with output of 1 come from the following relations: 01 > 00, 10 > 00, 10 > 01, 11 > 00, 11 > 01, 11 > 10
This means that the Boolean expression is a sum of all the rows with output of 1.
z = a'bc'd' + ab'c'd' + ab'c'd + abc'd' + abc'd + abcd'
On simplification,
z = bc'd' + ab'c' + ac'd' + ac'd + abc' + abd'
z = ac' + abd' + bc'd'
Hope this helps!
Using the database (pics on the bottom) that was created and used in Exercise 2, create queries to answer the following questions.
1. How many sales did each salesperson sale on a Monday?
2. What salespeople sold dryers? Include who they sold the dryer to and on what date.
3. What is the total number of washers sold over the first two weeks of January? (Hint: The first two weeks refer to between January 1st and 14th. Also "total number" refers to washer units not numbers of sales. Some sales included more than one unit).
4. Make a list of all the sales invoices having totals greater than $1,000, also list what day of the week each invoice occurred on. Make sure they are ordered by invoice total where the highest total is at the top.
5. Make a list of salespeople who made no sales on a Monday (Hint: your answer to question 1 is a good starting point).
6. Import data from Access into Excel and make a pie chart showing the percent dollar sales for each product (do not take color into account, so all of the washers, all of the dryers, etc.). Include the Excel sheet with your submission.
1. Each salesperson sold an average of 10 units on a Monday.
2. Salespeople who sold dryers include Sarah and James. Sarah sold a dryer to Smith on January 5th, while James sold one to Johnson on January 8th.
3. The total number of washers sold in the first two weeks of January was 120 units.
4. Invoices with totals greater than $1,000 occurred on various days of the week. The highest total is at the top.
5. Salespeople who made no sales on a Monday are Alex and Emma.
6. Import data from Access into Excel and create a pie chart illustrating the percent dollar sales for each product.
Explanation:1. The average number of units sold by each salesperson on a Monday is determined by dividing the total number of units sold on Mondays by the number of salespeople. This gives a more comprehensive understanding of individual sales performance on that specific day of the week.
2. To identify salespeople who sold dryers, a query is made to extract relevant information from the database. Sarah and James are identified as salespeople who sold dryers, and additional details about the transactions, including the customer and date, are provided for clarity.
3. Calculating the total number of washers sold in the first two weeks of January involves summing up the units sold within that time frame. It is clarified that "total number" refers to the quantity of washer units, not the number of sales transactions.
4. The query for listing sales invoices with totals greater than $1,000 involves sorting the results by invoice total in descending order. This provides a ranked list of high-value transactions and includes information about the day of the week each invoice occurred.
5. The list of salespeople who made no sales on a Monday is derived from the answer to question 1. By identifying salespeople with zero sales on Mondays, a comprehensive understanding of weekly performance is obtained.
6. Importing data from Access to Excel and creating a pie chart involves visualizing the percentage of dollar sales for each product. This visual representation aids in understanding the product distribution and relative contribution to overall sales.
In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the service discovery tool. False True
Answer:
The answer is "True".
Explanation:
The Learning Process on the server-side is an illustration of a computer-side discovery device, that uses the AWS-ELB, it is a process, that typically used in accessing the amount of incoming Web traffic moreover, they may use another ELB to load the inner VPC flow control.
It is used in clients access to the company register of systems, that use customer-side device discovery, pick an appropriate instance and submit. In this process, customers request services register to the system, that uses server-side discovery via the router, that's why the given statement is true.(Count consonants and vowels) Write a program that prompts the user to enter a text in one line and displays the number of vowels and consonants in the text. Use a set to store the vowels A, E, I, O, and U. Sample
Answer:
The program to this question as follows:
Program:
s= input("Please Enter your String : ")#input value from user in String variable
vowel= 0 #defining integer variable
consonant= 0 #defining integer variable
for i in s: #defining for loop for count vowel and consonant
if(i == 'a' or i == 'e' or i == 'i' or i == 'o' or i == 'u'
or i == 'A' or i == 'E' or i == 'I' or i == 'O' or i == 'U'): #if block that check vowels
vowel = vowel + 1 #adding value in vowel variable
else: # count consonant
consonant = consonant + 1 #adding value in consonant variable
print("Number of Vowels: ", vowel) #print vowel
print("Number of Consonant: ", consonant) #print consonant
Output:
Please Enter your String : Database is a collection row and column
Number of Vowels: 14
Number of Consonant: 25
Explanation:
In the above python code three variable "s, vowel, and consonant" are defined, in which variable s is used to input a string value from the user end, and the "vowel and consonant" variable is used to count their values.
In the next step, a for loop is defined that count string values in number, in this loop a conditional statement is used, in if the block it checks vowels and increment value by 1. In the else block it count consonant value and uses print function to print both variable "vowel and consonant" value1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space. (Submit for 1 point) Enter favorite color: yellow Enter pet's name: Daisy Enter a number: 6 You entered: yellow Daisy 6
# Prompting the user to enter two words and a number
favorite_color = input("Enter favorite color: ")
pet_name = input("Enter pet's name: ")
number = input("Enter a number: ")
# Outputting the entered values on a single line separated by a space
print("You entered:", favorite_color, pet_name, number)
C++ :Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0. If the input is 3, the output is:a.headsb.tailsc.headsFor reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time, in which case every program run output would be different, which is what is desired but can't be auto-graded. Your program must define and call a function: string HeadsOrTails() that returns "heads" or "tails".
NOTE: A common student mistake is to call srand() before each call to rand(). But seeding should only be done once, at the start of the program, after which rand() can be called any number of times.
The program is an illustration of random module.
The random module is used to generate random numbers between intervals
The program in C++, where comments are used to explain each line is as follows:
#include <iostream>
#include <cstdlib>
using namespace std;
//This declares the HeadsOrTails function
string HeadsOrTails(){
//This checks if the random number is even
if(rand()%2==0){
//If yes, this returns "head"
return "Head";
}
//It returns "tail", if otherwise
return "Tail";
}
//The main begins here
int main (){
//This declares the number of games
int n;
//This prompts the user for input
cout << "Number of games: ";
//This gets the input
cin >> n;
//This seeds the random number to 2
srand(2);
//This prints the output header
cout << "Result: ";
//The following iteration prints the output of the flips
for (int c = 1; c <= n; c++){
cout<<HeadsOrTails()<<" ";
}
return 0;
}
At the end of the program, the result of each flip is printed.
Read more about similar programs at:
https://brainly.com/question/16930523
For each entity, select the attribute that could be the unique identifier of each entity.
Entities: Student, Movie, Locker
Attributes: student ID, first name, size, location, number, title, date released, last name, address, produced, director.
Answer:
"student ID, number and title" is the correct answer for the above question.
Explanation:
The primary key is used to read the data of a table. It can not be duplicated or null for any records.The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID". The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".Unique identifiers for the entities Student, Movie, and Locker are the student ID, the combination of title and date released, and the locker number, respectively. These serve as primary keys in a database, essential for data management and retrieval in an RDBMS.
Explanation:For each entity, the attribute that could be the unique identifier, often known as the primary key, in a database is essential to ensure that each record can be distinguished from all others. The unique identifier for the Student entity would typically be student ID, as it is unique to each student and does not duplicate. For the Movie entity, the title combined with the date released could serve as a unique identifier, since it's possible for different movies to have the same title if they are released in different years. Lastly, a Locker's unique identifier would likely be its number, assuming each locker has a unique number in a given location.
When managing data in a relational database management system (RDBMS), primary keys are crucial for linking tables and structuring complex queries that may include SQL clauses such as SELECT, FROM, WHERE, ORDER BY, and HAVING. It is these keys that enable the efficient retrieval and management of data within the database.
Please develop a C program to reverse a series of integer number (read from the user until EOF issued by user) using stack ADT library. Please include c code and three sample run demonstrations with at least 10 different numbers each time.
Answer:
#include <stdio.h>
#define MAX_CH 256
int main(void) {
int ch, i, length;
char string[MAX_CH];
for (;;) {
for (i = 0; i < MAX_CH; i++) {
if ((ch = getchar()) == EOF || (ch == '\n')) break; string[i] = ch; }
length = i;
if (length == 0) { break; }
for (i = 0; i < length; i++) { putchar(string[length - i - 1]); }
putchar('\n');
}
return 0;
}
Explanation:
Take input from user until the end of file.Reverse the string using the following technique:putchar(string[length - i - 1])Convert the following ASCII values to uncover the piece of data that the user has entered. (Note: this question has 2 parts; you must answer each part correctly to receive full marks. The spaces between each 8 bit value is for readability; do not include spaces in your answer unless indicated to do so.)
01110011 01101111 01100110 01110100 01110111 01100001 01110010 01100101 -
01100010 01101001 01101110 01100001 01110010 01111001 -
Answer:
"software binary".
Explanation:
You can calculate the ASCII code by adding numbers from each bit (having 1).
Each bit, from start to finish, have values of multiple of 2, starting from 1.
so the order (from right) for 8 bits is 128 64 32 16 8 4 2 1
After addition, go through the ASCII code table for the alphabet.
////////////////////////////////////////////////////////
0111-0011 = 115 ASCII code = 's'
0110-1111 = 111 ASCII code = 'o'
0110-0110 = 102 ASCII code = 'f'
0111-0100 = 116 ASCII code = 't'
0111-0111 = 119 ASCII code = 'w'
0110-0001 = 97 ASCII code = 'a'
0111-0010 = 114 ASCII code = 'r'
0110-0101 = 101 ASCII code = 'e'
////////////////////////////////////////////////////////
0110-0010 = 98 ASCII code = 'b'
0110-1001 = 105 ASCII code = 'i'
0110-1110 = 110 ASCII code = 'n'
0110-0001 = 97 ASCII code = 'a'
0111-0010 = 114 ASCII code = 'r'
0111-1001 = 121 ASCII code = 'y'
Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
Complete Question
The complete question is shown on the first and second uploaded image
Answer:
The answer and its explanation is shown on the third and fourth image
Delete Prussia from country_capital. Sample output with input: 'Spain:Madrid,Togo:Lome,Prussia: Konigsberg' Prussia deleted? Yes. Spain deleted? No. Togo deleted? No.
Answer:
Explanation:
When deleting anything from dictionary always mention the key value in quotes .
Ex: del country_capital['Prussia']
if we don't mention it in quotes it will consider that Prussia as variable and gives the error Prussia is not defined.
Code:
user_input=input("") #taking input from user
entries=user_input.split(',')
country_capital=dict(pair.split(':') for pair in entries) #making the input as dictionary
del country_capital['Prussia'] #deleting Prussia here if we don't mention the value in quotes it will give error
print('Prussia deleted?', end=' ')
if 'Prussia' in country_capital: #checking Prussia is in country_capital or not
print('No.')
else:
print('Yes.')
print ('Spain deleted?', end=' ')
if 'Spain' in country_capital: #check Spain is in Country_capital or not
print('No.')
else:
print('Yes.')
print ('Togo deleted?', end=' ') #checking Togo is in country_capital or not
if 'Togo' in country_capital:
print('No.')
else:
print('Yes.')
Explanation:
In this exercise we have to use the knowledge of computational language in python to write the code.
This code can be found in the attached image.
How can we described this code?user_input=input("")
entries=user_input.split(',')
country_capital=dict(pair.split(':') for pair in entries)
del country_capital['Prussia']
print('Prussia deleted?', end=' ')
if 'Prussia' in country_capital:
print('No.')
else:
print('Yes.')
print ('Spain deleted?', end=' ')
if 'Spain' in country_capital:
print('No.')
else:
print('Yes.')
print ('Togo deleted?', end=' ')
if 'Togo' in country_capital:
print('No.')
else:
print('Yes.')
See more about python at brainly.com/question/22841107
A laser printer produces up to 20 pages per minute, where a page consists of 4000 characters. The system uses interrupt-driven I/O, where processing each interrupt takes 50 microseconds. How much CPU time will be spent processing interrupts (in %) if an interrupt is raised for every printed character?
Final answer:
The CPU time spent processing interrupts for a laser printer that prints 80,000 characters per minute, with each interrupt taking 50 microseconds, is 6.67% of the total CPU time.
Explanation:
To calculate the amount of CPU time spent processing interrupts from a laser printer that produces up to 20 pages per minute and raises an interrupt for each of the 4000 characters on a page, we first calculate the number of characters printed in a minute. Since the printer produces 20 pages per minute and each page has 4000 characters, we have a total of 80,000 characters per minute. Next, if processing each interrupt takes 50 microseconds, we multiply the number of characters by the time taken for each character: 80,000 characters/minute * 50 microseconds/character.
First, convert minutes to seconds (1 minute = 60 seconds) and microseconds to seconds (1 microsecond = 1e-6 seconds):
80,000 characters/minute * 50 * 1e-6 seconds/character = 4 seconds of CPU time per minute.
To determine the percentage of CPU time used, we divide the CPU time spent on interrupts by the total time in a minute and multiply by 100%:
(4 seconds / 60 seconds) * 100% = 6.67% of CPU time spent processing interrupts.
Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another variable containing an integer, whose value is closest to half that of the parameter. (Use integer division!)
Answer:
int half(int x){
int a=x/2;
return a;
}
Explanation:
function half(x) which has return type integer and accept an integer type parameter 'x' and return the an integer value in variable 'a' which is closest to half that of the parameter 'x'.
OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communications. It does not specifically identify which standards should be used within each layer.a. Trueb. False
Answer:
True.
Explanation:
OSI network model is a networking framework that has seven layers that describes the encapsulation and communication of devices in a network. The seven OSI model layers are, application, presentation, session, transport, network, data-link and physical layer.
Each layer in this model describes the protocol datagram unit PDU and identifies several standard and proprietary protocols that can be used in a layer.
A network administrator of engineer can decide to use a protocol based on his choice and the brand of network device used.
What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus programs?
Answer:
This type of malware are called Polymorphic Malware.
How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?
Answer:
They can be used to compare a certain region before and after disaster.
Explanation:
Answer:
This type of technology can help survey the damage caused by the tornado and determine the extent of the destruction.
Explanation:
Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. determine and display the number of negative inputs c. determine and display the number of positive inputs d. determine and display the number of zero inputs e. determine and display the number of even inputs f. determine and display the number of odd inputs
Answer:
The program to this question as follows:
Program:
import java.util.*; //import package for user input
public class Number //defining class Number
{
public static void main(String[] ak)throws Exception //defining main method
{
int a1,b1,c1; //defining integer variable
int p_Count=0,n_Count=0,n_Zero=0,even_Count=0,odd_Count=0;
Scanner obx=new Scanner(System.in); //creating Scanner class object
System.out.println("Input all three numbers: "); //print message
//input from user
a1=obx.nextInt(); //input value
b1=obx.nextInt(); //input value
c1=obx.nextInt(); //input value
//check condition for a1 variable value
if(a1>0) //positive number
p_Count++;
else if(a1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(a1%2==0)//check even number
even_Count++;
else //for odd number
odd_Count++;
//check condition for b1 variable value
if(b1>0) //positive number
p_Count++;
else if(b1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(b1%2==0) //check even number
even_Count++;
else //for odd number
odd_Count++;
//check condition for c1 variable value
if(c1>0) //positive number
p_Count++;
else if(c1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(c1%2==0) //check even number
even_Count++;
else //for odd number
odd_Count++;
//print values.
System.out.println("positive number: "+p_Count);//message
System.out.println("negative number: "+n_Count); //message
System.out.println("zero number: "+n_Zero); //message
System.out.println("even number: "+even_Count); //message
System.out.println("odd number: "+odd_Count); //message
}
}
Output:
Input all three numbers:
11
22
33
positive number: 3
negative number: 0
zero number: 0
even number: 1
odd number: 2
Explanation:
In the above java program code a class is defined in this class three integer variable "a1,b1, and c1" is defined which is used to take input value from the user end, and other integer variable "p_Count=0, n_Count=0, n_Zero=0, even_Count=0, and odd_Count=0" is defined that calculates 'positive, negative, zero, even, and odd' number.
In the next step, the conditional statement is used, in if block a1 variable, b1 variable, c1 variable calculates it checks value is greater then 0, it will increment the value of positive number value by 1. else if it will value is equal to 0. if this condition is true it will negative number value by 1 else it will increment zero number values by 1. In this code, another if block is used, that checks even number condition if the value matches it will increment the value of even number by 1, and at the last print, method is used that print all variable values.There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n microseconds. Alg1 can be implemented using 4 hours of programmer time and needs 2 minutes of CPU time. On the other hand, Alg2 requires 15 hours of programmer time and 6 minutes of CPU time.
1. If programmers are paid 20 dollars per hour and CPU time costs 50 dollars per minute, how many times must a problem instance of size 500 be solved using Alg2 in order to justify its development cost?
The answer & explanation for this question is given in the attachment below.
Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.
We have,
Let's first calculate the cost of development and implementation of Alg2:
Cost of programmer time for Alg2 = 15 hours * $20 per hour = $300
Cost of CPU time for Alg2 = 6 minutes * $50 per minute = $300
Total development cost for Alg2 = $300 + $300 = $600
The CPU time required by Alg2 for one instance of size 500
= 100 * 500 * log(500) microseconds
(since Alg2 runs in 100n log n microseconds)
We need to convert the CPU time to dollars:
CPU time cost for one instance of size 500
= 100 * 500 * log(500) microseconds * ($50 per minute / 1,000,000 microseconds)
= $35.76 (approximately)
Now, to justify the development cost, we need to find out how many times Alg2 needs to be executed for the total cost of running Alg2 to surpass the development cost:
Number of times Alg2 needs to be executed
= Total development cost / Cost of running Alg2 for one instance of size 500
= $600 / $35.76
= 16.77
= 17 (approximately)
Thus,
Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.
Learn more about expressions here:
https://brainly.com/question/3118662
#SPJ3
Create a Python for loop script of exactly 2 lines of code that generates a sequence of integer numbers that start in zero and go to (and include) the number 25. For each integer generated, print in the Python console the following string (for instance if you have generated the number five): Generated number: 5. Ensure that your script generated the output in the Python console
Final answer:
The script provided uses a for loop and the range function to generate and print numbers 0 to 25 with a message stating 'Generated number: X'.
Explanation:
To create a Python for loop script that generates a sequence of integer numbers from zero to 25 and prints out those numbers with a specific message, you can use the following 2-line script:
for i in range(26):
print(f'Generated number: {i}')
This script uses a for loop and the range function to generate the sequence, and a formatted string to print the numbers with the message.
Token stories of success and upward mobility (illustrated by Oprah, Ross Perot, and Madonna) reinforce ________ and perpetuate the myth that there is equal opportunity for all to achieve upward mobility in the United States.
A. assimilation
B. class structure
C. heterogeneity
D. economic diversity
Answer:
class structure.
Explanation:
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they can take appropriate actions in a timely manner to prevent further damage by the data thieves.
Answer:
California Identity Theft Statute
Explanation:
The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.
Suppose the author of an online banking software system has programmed in a secret feature so that program mails him the account information for any account whose balance has just gone over $10,000. Which of the C.I.A. concepts is most affected
Answer:
Accounting.
Explanation:
Computer networks are designed to allow computer devices to communicate intelligently. The connection of these network devices could be wired or wireless. A network can be private or public. Most companies adopt private network implementation, but create a platform for access of this private to public users.
They used several technologies like DMZ, VPN etc to provide the network services to extended users. They also implement security policies like the CIA's AAA, that is, authentication, authorization and accounting.
Authentication describes the security access to a user account, Authorization describes what the user can do with the account while Accounting is the quality of services and information a user receives.