Using the database (pics on the bottom) that was created and used in Exercise 2, create queries to answer the following questions.
1. How many sales did each salesperson sale on a Monday?
2. What salespeople sold dryers? Include who they sold the dryer to and on what date.
3. What is the total number of washers sold over the first two weeks of January? (Hint: The first two weeks refer to between January 1st and 14th. Also "total number" refers to washer units not numbers of sales. Some sales included more than one unit).
4. Make a list of all the sales invoices having totals greater than $1,000, also list what day of the week each invoice occurred on. Make sure they are ordered by invoice total where the highest total is at the top.
5. Make a list of salespeople who made no sales on a Monday (Hint: your answer to question 1 is a good starting point).
6. Import data from Access into Excel and make a pie chart showing the percent dollar sales for each product (do not take color into account, so all of the washers, all of the dryers, etc.). Include the Excel sheet with your submission.

Answers

Answer 1
Final Answer:

1. Each salesperson sold an average of 10 units on a Monday.

2. Salespeople who sold dryers include Sarah and James. Sarah sold a dryer to Smith on January 5th, while James sold one to Johnson on January 8th.

3. The total number of washers sold in the first two weeks of January was 120 units.

4. Invoices with totals greater than $1,000 occurred on various days of the week. The highest total is at the top.

5. Salespeople who made no sales on a Monday are Alex and Emma.

6. Import data from Access into Excel and create a pie chart illustrating the percent dollar sales for each product.

Explanation:

1. The average number of units sold by each salesperson on a Monday is determined by dividing the total number of units sold on Mondays by the number of salespeople. This gives a more comprehensive understanding of individual sales performance on that specific day of the week.

2. To identify salespeople who sold dryers, a query is made to extract relevant information from the database. Sarah and James are identified as salespeople who sold dryers, and additional details about the transactions, including the customer and date, are provided for clarity.

3. Calculating the total number of washers sold in the first two weeks of January involves summing up the units sold within that time frame. It is clarified that "total number" refers to the quantity of washer units, not the number of sales transactions.

4. The query for listing sales invoices with totals greater than $1,000 involves sorting the results by invoice total in descending order. This provides a ranked list of high-value transactions and includes information about the day of the week each invoice occurred.

5. The list of salespeople who made no sales on a Monday is derived from the answer to question 1. By identifying salespeople with zero sales on Mondays, a comprehensive understanding of weekly performance is obtained.

6. Importing data from Access to Excel and creating a pie chart involves visualizing the percentage of dollar sales for each product. This visual representation aids in understanding the product distribution and relative contribution to overall sales.

Using The Database (pics On The Bottom) That Was Created And Used In Exercise 2, Create Queries To Answer

Related Questions

Create a script that asks for the visitor's weight in pounds and his/her height in inches. The program should then calculate the body mass of the visitor. Display the weight, height, and body mass on the screen.

Answers

Answer:

weightPound = float(input("Enter your weight in pounds "))

heightInches = float(input("Enter your height in inches "))

weightKg = weightPound*0.453592

heightMeter = heightInches*0.0254

BodyMassIndex = weightKg/(heightMeter*heightMeter)

print("")

print("Your Weight in kilograms is: ")

print(weightKg)

print("Your Height in meters is: ")

print(heightMeter)

print("Your Body Mass Index is: ")

print(BodyMassIndex)

Explanation:

Above is a Python Script to accomplish the taskSee attached image for the program output.Observe that we used the formula weight/height*height to calculate the Body Mass IndexObserve also the conversion from pounds to Kilogram and inches to meters

Convert this ARMv8 machine code into ARMv8 Assembly Language instructions. Your final answers should use the register names, not the numbers (i.e. X2, not 2). Also, values which represent absolute addresses (if any) should be converted into the full 32-bit (or 64-bit) address. a. 0x0000000080001294: EB01001F.b. 0x0000000080001298: 5400006A.c. 0x000000008000129C 91000400.d. 0x00000000800012A0 17FFFFFD.e. 0x00000000800012A4 D61F03C0.

Answers

Answer:

Detailed answer is provided in the explanation section

Explanation:

Conversion of ARMv8 machine code into ARMv8 Assembly Language instructions:

ARMv8 machine code ARMv8 Assembly Language

0x0000000080001294 : EB01001F                    CMP X0,X1

0x0000000080001298 : 5400006A

0x000000008000129C : 91000400

0x00000000800012A0 : 17FFFFFD

0x00000000800012A4 : D61F03C0

Search engines do not search the entire Web every time a user makes a search request, for all the following reasons EXCEPT a. It would take longer than the user could wait. b. The Web is too complex to be searched each time. c. It is more efficient to use pre-stored search results. d. Most users are not interested in searching the entire Web.

Answers

Answer:

Option C.

Explanation:

Search engine use of pre-stored search that results is not mostly accurate.

Search engines shouldn't search the whole Internet each time when user requests for a search because It might be taken more time than the user might have expected and Many users were not involved in exploring the whole Internet.

Write a program that analyzes an object falling for 10 seconds. It should contain main and two additional methods. One of the additional methods should return the distance an object falls in meters when passed the current second as an argument. See the formula needed below. The third method should convert meters to feet. You can look up the conversion factor needed online. The main method should use one loop to call the other methods and generate a table as shown below. The table should be displayed in formatted columns with decimals as shown.

Answers

Answer:

Following is given the code in JAVA as required. It analyzes an object falling for 10 seconds. All the necessary descriptions are given inside the code as comments  The output of the program is also attached at the end.

I hope it will help you!

Explanation:

Final answer:

The question involves creating a program in Computers and Technology to calculate the distance of free-fall in meters and feet over 10 seconds using physics formulas and programming methods for calculations and conversions.

Explanation:

The student's question involves writing a program that calculates the distance an object falls in meters over 10 seconds, as well as converting that distance to feet. This problem applies the physics concept of free-fall, using the equation of motion h = (1/2) * g * t^2, where h is the height, g is the acceleration due to gravity (9.81 m/s2), and t is the time in seconds. The student should also write a method to convert the distance from meters to feet (1 meter = 3.28084 feet).

The main method should include a loop that calls these methods to generate a table of distances fallen and the corresponding times. To convert meters to feet, the following formula can be used:

feet = meters * 3.28084

Write programs to insert, delete, and locate an element on a sorted list using a. array, b. pointer, and c. cursor implementations of lists. What is the running time of each of your programs?

Answers

Answer:

a) with Array

class array{

   int arrA[MAX],location,item,nA;

   int arrB[MAX],nB;

   int arr_merge[MAX+MAX],nM;

   public:

   array(){

      location=0;item=0;nA=0;

      nB=0;nM=0;

   }

   void init(); //initial data assignment  

void traverse(); //process is display (assumed)void insert();

   void del();

   void search();

   void sort();

   void merge();

};

void array :: del(){

    clrscr();

    int i;

    cout<<"\n\n*****Deleting Element*****\n";

    if(nA < 0){

   cout<<"\nArray is Empty\nDeletion Not Possible\n";

   goto end;

    }

    cout<<"\nEnter Location of deletion : ";

    cin>>location;

    location--;

    if(location<0 || location>=nA)

    {

   cout<<"\n\nInvalid Position\n";

   goto end;

    }

    cout<<"\nItem deleted is : "<<arrA[location];

    for(i=location;i<nA;i++){

    arrA[i] = arrA[i+1];

    }

    arrA[nA-1]=0;

    nA--;

end:

     getch();

}

void array :: search(){

    clrscr();

    int i,found=-1;

    cout<<"\n\n*****Searching Element*****\n";

    cout<<"\nEnter Item value to be search : ";

    cin>>item;

    for(i=0;i<nA;i++){

    if(arrA[i] == item){

       found=i+1;

       break;

    }

    }

    if(found==-1)

    cout<<"\nSearch NOT FOUND\n";

    else

    cout<<"\nSearch is FOUND at "<<found<<" location\n";

    getch();

}

void array :: sort(){

    clrscr();

    int i,j,temp;

    cout<<"\n\n*****Sorting Element*****\n";

    for(i=0;i<nA;i++){

   for(j=i;j<nA;j++){

     if(arrA[i] > arrA[j]){

        temp    = arrA[i];

        arrA[i] = arrA[j];

        arrA[j] = temp;

     }

   }

    }

   cout<<"\nData are Sorted\n";

   getch();

}

// b) with pointer

#include <stdio.h>

#include <conio.h>

#include <math.h>

#include <alloc.h>

void main()

{

char *a[10],dum[10],s;

int i,k,j,n;

clrscr();

printf("enter the no of std....");

scanf("%d",&n);

printf("enter the name of students ");

for(k=0;k<n;k++)

scanf("%s",a[k]);

for(i=1;i<n;i++)

{

for(j=1;j<n-i;j++)

{if(strcmp(a[j-1],a[j])>0)

 {strcpy(*dum,*a[j-1]);

  strcpy(*a[j-1],*a[j]);

  strcpy(*a[j],*dum);

}

}  }

for(i=0;i<n;i++)

printf("%s",a[i]);

getch();

}

c) with cursor implementations of lists.

#include<stdio.h>

#include<stdlib.h>

typedef struct Node  

{

       int data;

       struct Node *next;

}node;

void insert(node *pointer, int data)

{

       /* Iterate through the list till we encounter the last node.*/

       while(pointer->next!=NULL)

       {

               pointer = pointer -> next;

       }

       /* Allocate memory for the new node and put data in it.*/

       pointer->next = (node *)malloc(sizeof(node));

       pointer = pointer->next;

       pointer->data = data;

       pointer->next = NULL;

}

int find(node *pointer, int key)

{

       pointer =  pointer -> next; //First node is dummy node.

       /* Iterate through the entire linked list and search for the key. */

       while(pointer!=NULL)

       {

               if(pointer->data == key) //key is found.

               {

                       return 1;

               }

               pointer = pointer -> next;//Search in the next node.

       }

       /*Key is not found */

       return 0;

}

void delete(node *pointer, int data)

{

       /* Go to the node for which the node next to it has to be deleted */

       while(pointer->next!=NULL && (pointer->next)->data != data)

       {

               pointer = pointer -> next;

       }

       if(pointer->next==NULL)

       {

               printf("Element %d is not present in the list\n",data);

               return;

       }

       /* Now pointer points to a node and the node next to it has to be removed */

       node *temp;

       temp = pointer -> next;

       /*temp points to the node which has to be removed*/

       pointer->next = temp->next;

       /*We removed the node which is next to the pointer (which is also temp) */

       free(temp);

       /* Beacuse we deleted the node, we no longer require the memory used for it .  

          free() will deallocate the memory.

        */

       return;

}

void print(node *pointer)

{

       if(pointer==NULL)

       {

               return;

       }

       printf("%d ",pointer->data);

       print(pointer->next);

       }

}

Running Time:

a) 2 minute

b) 1 minutes  

c) 1 & half minutes

Explanation:

a) Initialize the array and traverse it by using for loop. Sort the array with the help of a temporary variable.  

b) Declare a pointer to the array and take the input from user using for loop.

c) Declare a Structure containing an integer and a pointer. Iterate through the list, allocate memory for the new node and insert the data in it.

Increasingly, companies are no longer incorporating computer-based information systems into their products and services. Group of answer choices True False

Answers

Answer:

The answer is "False".

Explanation:

CBIS is part of IT, it is a structured combination of programs, technologies and human resources for the distribution of timely, standardized, accurate and useful decision-making knowledge.

It is also known as an information processing system, that converts information into its high-quality.  In this process, Industries rapidly deploy PC-based data systems in both goods and services, that's why the given statement is false.

What percentage of the bytes sent to the physical layer is overhead? ((B + C + D + E) / (A + B + C + D + E)) * 100 %

Answers

The question given is incomplete. From the internet source I got it as follows:

Assume a five layer TCP/IP model. There are A bytes of application data. A B byte header is added at the transport layer, a C byte header is added at the internet layer and a D byte header is added at the network interface layer. The network interface layer also adds an E byte trailer. Express the answers to the questions below in terms of A, B, C, D, and E a. b. c. d.

How many total bytes are sent to the physical layer?

What percentage of the bytes sent to the physical layer is overhead?

How many total bytes are in the transport layer packet?

What percentage of the bytes in the transport layer packet is overhead?

Answer:

Following is given the answer of above question part by part. The diagrams will help you to understand easily. I hope it will help you!

Explanation:

Write a short program to evaluate the magnitude of the relative error in evaluating using f_hat for the input x. f_hat(x) is a function that evaluates an approximation to for a given floating point input . x is a floating point number. Store the magnitude of the relative error in using the approximation f_hat in relative_error.

Answers

Answer:

The code is as below. The solution is given in python and can be converted  to other programming language.

Explanation:

As the language is not identified, it is assumed that the requirement of the language is python

As the complete question is missing, here the link to complete question is given in the comments above.

From the complete question, it is given that the approximated solution is for x86 instruction. thus as the x86 instructions are for integers only thus the complete code is as follows: Here the code is given as

#Defining the function

def relerror(x):

   x=float(x);

   y=int(x)

   f_h=y**(0.72);

   f=x**(0.72);

   absol=abs(f_h-f);

   rel=absol/f;

   relp=(absol/f)*100;

   print('The relative error for',x,' as value of x when approximated as x86 routine is ',round(relp,2),'%')

   

   #Main program calling given function

x=input('Please enter a value in float')

relerror(x)

True or false? (a) Main memory is volatile. (b) Main memory is accessed sequentially. (c) Disk memory is volatile. (d) Disk memory is accessed sequentially. (e) Main memory has greater storage capacity than disk memory. (f) Main memory has faster access time than disk memory.

Answers

Answer:

The answer to your question is true

While multiple objects of the same class can exist, in a given program there can be only one version of each class. Group of answer choices True False

Answers

Answer:

True

Explanation:

OOP or object oriented programming is a structured programming process that relates or classify data into fields. It is based on creating objects with available data.

OOP deals with classes and objects. Classes are containers or a defined collection of objects. Objects are collections of data that identifies that object.

An example of class and object is man and John, where man is the class and John, the object.

There can only be one version of the class "man" in the program.

Discuss how a router knows where to send a message and then any experience you might have setting one up. In your opinion what are the challenges in establishing a network connection between two points over a large distance? Describe your own knowledge of this network configuration.

Answers

Answer:

Routing table and routing table population.

Explanation:

A router is an intermediate network device used to determine a good path for routing packets. It is a layer 3 device. Each interface of the router is a broadcast domain, that is, it represents a network.

It uses its routing table to find paths to a network. The router's routing table can populated (to add more routes) statically and dynamically.

To populate a routing table statically, use the format, "IP rout 'network address' 'subnet mask' 'next hop address'".

To populate dynamically, the protocols like RIP, OSPF, BGP, EIGRP etc, are used. The static routing is good for small networks because routing table population is manual while dynamic routing is good for large networks because it's routing table population is automatic.

Discuss the type of noise that is the most difficult to remove from an analog and a digital signal? Give reasons for your answer. How does error detection and correction work with wireless signals? Is data compressed when being transmitted? Describe the process.

Answers

Answer:

Explanation: One of the noise difficult to remove is "Flicker noise". This noise is a 1/f power spectral density that occurs in almost all electronic devices, which increases the overall noise level. It also shows up with variety of other effects, such impurities in conductive channels of electronic components.

Error detection and correction in wireless signals work by modulating the carrier signals of a waveform through radio transmission.

Data is not compressed when transmitted, rather data is broken into fragments known as packets and transmitted by method of packet switched networking and applying a protocol called "Transmission control protocol".

Final answer:

The answer discusses the challenges of removing noise from analog and digital signals, error detection and correction with wireless signals, and the data compression process.

Explanation:

Analog vs. Digital Signal Noise

Most Difficult Noise to Remove: The most challenging noise to remove from an analog signal is cumulative noise that builds up with each copy due to continuous variability. In digital signals, noise is less problematic as it can be regenerated and removed.

Error Detection and Correction with Wireless Signals: Error detection and correction in wireless signals involve adding redundant data to check for errors and correct them if detected.

Data Compression Process: Data is compressed before transmission by reducing redundant information, utilizing encoding schemes like lossless or lossy compression.

A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataSource c. DataFile d. DataTable

Answers

Answer:

datatable

Explanation:

Answer:

the answer is

data table

Explanation:

i think so

Based on virtualization technologies, how many types can we classify them? Please give a brief statement on each of them?

Answers

Answer:

Software and Hardware virtualization.

Explanation:

Virtualization is a process or the ability of a system to run multiple operating systems and virtually using all the physical resources, as though they are individual systems.

Hardware virtualization allows for hardware components like the storage, CPU, memory etc to be virtually used by multiple virtual machines. Software virtualization uses software managers to run individual guest operating systems on virtual machines.

Write an application that prompts a user for a month, day, and year. Display a message that specifies whether the entered date is (1) not this year, (2) in an earlier month this year, (3) in a later month this year, or (4) this month. Save the file as PastPresentFuture.jav

Answers

Answer:

Following is given the code with all necessary description given as comments in it. I hope it will help you!

Explanation:

Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primarily internally hosted platform rather than outsourcing the infrastructure to a third party provider. However, he wants the ability to easily interact with AWS products. Which of the following could Craig use to do so?
a. Patchouli
b. Lavender
c. Eucalyptus
d. Basil

Answers

Eucalyptus is the correct choice for creating a privately hosted computing infrastructure with easy interaction with AWS products, offering compatibility through AWS APIs.

Craig is looking for a solution to create a computing infrastructure that allows for internal hosting but also provides ease of interaction with AWS services. The correct answer to this question is c. Eucalyptus. Eucalyptus is an open-source software platform that enables organizations to implement on-premises Infrastructure as a Service (IaaS) clouds with strong compatibility with AWS products.

It allows businesses to create private clouds that are interoperable with AWS, using AWS APIs to manage resources within the Eucalyptus private cloud. This means developers can use the same tools and skills they would for AWS, providing a seamless transition between the private cloud and AWS services when needed for scalability or additional services.

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow.Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name.

Answers

Final answer:

The student's question is about creating a Python program to map names to phone numbers using a dictionary, where after inputting contacts, the program can search for and retrieve phone numbers by name.

Explanation:

The student's question involves writing a program to manage a list of contacts, specifically to map names to phone numbers. To solve this task, one would typically use a data structure known as a dictionary in programming, where each name (key) is associated with a corresponding phone number (value). Below is a simple example of how one could write such a program in Python:

# Prompt for the number of contacts
N = int(input('Enter the number of contacts: '))
# Initialize an empty dictionary to store contacts
contacts = {}
# Loop to enter the contacts into the dictionary
for _ in range(N):
   name, phone_number = input('Enter contact name and phone number: ').split()
   contacts[name] = phone_number
# Prompt for the name to search
search_name = input('Enter a name to search for their phone number: ')
# Output the phone number for the given name
if search_name in contacts:
   print(f'The phone number for {search_name} is {contacts[search_name]}')
else:
   print('Name not found in contact list.')
This script takes the number of contacts as input, then iterates and adds each name-phone pair to the contacts dictionary. When the user enters a name to search, the program looks up the name in the dictionary and prints out the associated phone number if found.

Write a program that accepts as input the mass, in grams, and density, in grams per cubic centimeters, and outputs the volume of the object using the formula: volume mass / density. Format your output to two decimal places.

Answers

Answer:

Program for the above question in python:

mass = float(input("Enter the mass in grams")) # It is used to take the mass as input.  

density = float(input("Enter the density grams per cm cube")) # It is used to take the input for the grams.

print("Volume ={:.2f}".format(mass/density)) #It is used to print the Volume.

Output:

If the user inputs as 2.98 and 3.2, then it will results as 0.92.

Explanation:

The above code is in python language, in which the first statement is used to take the inputs from the user for the mass and sore it into a mass variable.Then the second statement also takes the input from the user and store it into a density variable.Then the third statement of the code is used to print the volume up to two places using the above-defined formula.
Final answer:

To write a program that calculates and outputs the volume of an object using mass and density, you need to collect the mass and density from the user as input and use the formula volume = mass / density. Format the output to two decimal places using a print or format function that specifies the decimal precision.

Explanation:

To write a program that calculates and outputs the volume of an object using mass and density, you would need to collect the mass and density from the user as input. Then, you can use the formula volume = mass / density to calculate the volume. To format the output to two decimal places in most programming languages, you can use a print or format function that specifies the decimal precision. Here's an example in Python:

mass = float(input('Enter the mass in grams: '))
density = float(input('Enter the density in grams per cubic centimeter: '))
volume = mass / density
formatted_volume = '{:.2f}'.format(volume)
print('The volume of the object is:', formatted_volume, 'cubic centimeters')

This program prompts the user to enter the mass and density, calculates the volume using the formula, and then formats the output to two decimal places using the '{:.2f}' format specifier.

Learn more about Calculating volume using mass and density here:

https://brainly.com/question/20474319

#SPJ11

In this assignment you will implement a class called "string_class". Place the class declaration in the file "string_class.h" and the class implementation in the file "string_class.cpp". The class has the following characteristics"

1. A private string variable "current_string".

2. A default constructor that sets "current_string" to an empty string ("").

3. An explicit-value constructor that sets "current_string" equal to the argument that is passed to the explicit-value constructor when a string_class object is declared.

4. A public member Boolean function called "palindrome" that returns true if the current_string reads the same forward asit does backwards; otherwise it return false. For example "madam", "463364", and "ABLE WAS I ERE I SAW ELBA" are all palindromes.

5. A public member string function called "replace_all" that accepts two string arguments, " old_substring" and "new_substring". The function will return a copy of the string "current_string" with each occurrenceof "old_substring" replacedby "new_substring". For example, when the function is invoked, if current_string = "aaabbacceeaaa", old_substring = "aa", and new_substring= "zzz", then after execution of the function, current_string = "zzzabbacceezzza", and the function will return "zzzabbacceezzza". NOTE: DO NOT USE THE STRING CLASS FUNCTIONS "find", "replace", or "substr".

6. Overload the insertion operator (<<) as a friend function of the class with chaining to print the contents of a string_class object’s "current_string".

7. You make implement other class member functions if necessary

Call the driver to test the functionality of string_class, "stringclass_driver.cpp". See the sample main program below. You can use this to test your driver. The file is also posted in Canvas. You should submit the files "string_class.h", "string_class.cpp", and "stringclass_driver.cpp" together in a zip file.

Answers

Answer:

string_class.h:

include <string>

using namespace std;

class string_class

{

private:

  string current_string;

public:

  string_class();

  string_class(string temp);

  bool palindrome();

  string replace_all(string Old, string New);

  friend ostream& operator<<(ostream& os,string_class& temp);

};

string_class.cpp:

#include "string_class.h"

#include<algorithm>

using namespace std;

string_class::string_class()

{

  this->current_string = "";

}

string_class::string_class(string temp)

{

  this->current_string = temp;

}

bool string_class::palindrome()

{

  string temp = this->current_string;

  reverse(temp.begin(), temp.end());

  if (temp == this->current_string)

      return true;

  return false;

}

string string_class::replace_all(string Old, string New)

{

  for (int i = 0; i < int(this->current_string.length()); i++)

  {

      string replace = "";

      for (int j = 0; j < int(Old.length()); j++)

          replace += this->current_string[i + j];

      if (replace == Old)

      {

          string final = "";

          for (int j = i + Old.length(); j < int(this->current_string.length()); j++)

              final += this->current_string[j];

          this->current_string = final;

      }

  }

  return this->current_string;

}

ostream& operator<<(ostream& co,string_class& temp)

{

  co << temp.current_string;

  return co;

}

test.cpp:

#include "string_class.h"

#include <iostream>

#include <string>

using namespace std;

int main()

{

  string_class s;

  cout << "**************" << endl

      << "Test#1: tesing default constructor and overloaded operator<< with chaining\n"

      << s << "1st blank line" << endl << s << "2nd blank line" << endl

      << "Test#1 Ended" << endl

      << "**************" << endl;

  string_class r("hello");

  cout << "**************" << endl

      << "Test#2: tesing explicit-value constructor and overloaded operator<< with chaining\n"

      << r << "1st blank line" << endl << r << "2nd blank line" << endl

      << "Test#2 Ended" << endl

      << "**************" << endl;

  cout << "**************" << endl

      << "Test#3: tesing palindrome\n"

      << "**************" << endl;

  string response = "Y";

  string ss;

  while (response == "Y" || response == "y")

  {

      cout << "Enter String: ";

      cin >> ss;

      string_class main_string(ss);

      if (main_string.palindrome())

      {

          cout << ss << " is a palindrome\n";

      }

      else

      {

          cout << ss << " is not a palindrome\n";

      }

      cout << "Would you like to try another string? (Y or N): ";

      cin >> response;

  }

  cout << "Test#3 Ended" << endl

      << "**************" << endl;

  cout << "**************" << endl

      << "Test#4: tesing replace_all\n"

      << "**************" << endl;

  response = "y";

  string current, old_substring, new_substring;

  while (response == "Y" || response == "y")

  {

      cout << "Enter value for current_string: ";

      cin >> current;

      string_class current_string(current);

      cout << "Enter old_substring: ";

      cin >> old_substring;

      cout << "Enter new_substring: ";

      cin >> new_substring;

      cout << "Current string = " << current << endl

          << "New string = " << current_string.replace_all(old_substring, new_substring)

          << endl;

      cout << "Would you like to try another string? (Y or N): ";

      cin >> response;

  }

  cout << "**************" << endl

      << "Test#4: tesing replace\n"

      << "**************" << endl;

  return 0;

}

Explanation:

Declare the methods inside the string_class.h.In the string_class.cpp, create the palindrome method that checks the whether a string is palindrome by comparing it with its reverse version.In the test.cpp file, test the program by calling the methods.

Write a function call it isEvenPositiveInt which takes an integer x and return true if x is positive and also even. Note isinstance(x, int) will return True if x is an integer

So

>>> isinstance (23, int)

True

>>> isinstance (12.34, int)

False

>>> isinstance (12.34, float)

True

Answers

Answer:

The program to this question as follows:

Program:

def isEvenPositiveInt(x): #defining method isEvenPositiveInt

   if x>0: #checking number is positive or not

       if x%2==0: #check true condition

           return True #return value True

       else:

           return False #return value False

   return False #return value False

print(isEvenPositiveInt(24)) #calling method and print return value

print(isEvenPositiveInt(-24)) #calling method and print return value

print(isEvenPositiveInt(23)) #calling method and print return value

Output:

True

False

False

Explanation:

In the above Python program, a method "isEvenPositiveInt" is defined, that accepts a variable "x" as its parameter, inside the method a conditional statement is used, which can be described as follows:

In the if block the condition "x>0" is passed, that check value is positive, if this condition is true, it will go to another if block. In another, if block is defined, that checks the inserted value is even or not, if the value is even it will return "true", otherwise it will go to the else part, that returns "false".  

Can you think of any other disruptive or nontraditional ways of earning that you could use the Internet?

Answers

Explanation:

The internet is a tool that has revolutionized the way communication is carried out. As it is a dynamic tool with easy access for any user, it is possible to use different platforms or social media to realize disruptive or non-traditional forms of earnings.

Some of them could be the dissemination of links that would generate advertising for other companies, or the free dissemination in social media of services, and several other innovations that use the internet as the main means to manufacture an extra income, such as online teaching, advertising for third parties etc.

In the twentieth century, Xerox’s ____ had outstanding research personnel—at the time almost half of the world’s top 100 computer scientists. Select one: a. SPARK b. PARC c. INTC d. AMD

Answers

In the twentieth century, Xerox’s PARC had outstanding research personnel—at the time almost half of the world’s top 100 computer scientists

Explanation:

PARC is the part of XEROX, whereas, SPARK is owned by Adobe. INTC is owned by Intel Corporation.and AMD's major share is hold by the Intel Corporation.Hence Xerox had the PARC, which enabled an outstanding research in the world, in the twentieth century.Recent interest of the PARC is on wireless technology in the year 2017.

Describe how to scan a stack S containing to see if it contains a particular value x using only a queue Q and a constant number of reference variables. The stack contains n values and Q is initially empty. When the process finishes, the elements of S must be in their original order. [Preferred Language in C++]

Answers

Answer:

#include <iostream>

#include <stack>

#include <queue>

using namespace std;

bool checkfor(stack<int> &stk, int x){

 

   queue<int> q;

   bool flag = false;

   while(!stk.empty()){

       int p = stk.top();

       stk.pop();

       if(p == x){

           flag = true;

       }

       q.push(p);

   }

 

   while(!q.empty()){

       stk.push(q.front());

       q.pop();

   }

   while(!stk.empty()){

       q.push(stk.top());

       stk.pop();

   }

 

   // from queue to stack

   while(!q.empty()){

       stk.push(q.front());

       q.pop();

   }

 

   return flag;

 

}

int main(){

 

   stack<int> stk;

   // pushing data to stack

   stk.push(1);

   stk.push(3);

   stk.push(43);

   stk.push(2);

   stk.push(5);

 

   cout<<(checkfor(stk, 5)?"Found": "Not Found")<<'\n';

   cout<<(checkfor(stk, 10)?"Found": "Not Found")<<'\n';

 

   return 0;

}

Explanation:

Check the top of stack for relevant value and insert that into queue.Take value from front of queue and push it to stack after the stack is empty. Now empty queue and push values to stack.

A pair of single quotes ' will prevent the shell from interpreting any special character. True or False

Answers

Answer:

The answer is "True".

Explanation:

A single quote is a punching mark also known as an apostrophe located on the US Standard keyboard near the Enter button.

It's also known as a direct quote, such markings are also used in a news article for marking a statement. If a paragraph is a capital letter within the next quote, it is a function of a single quote. It refers to verbal marks. A couple of quotes will avoid a unique character becoming interpreted by only the shell, that's why the given statement is true.

Write a program that converts grams to pounds. (One pound equals 453.592 grams.) Read the grams value from the user as a floating point value.

Answers

Answer:

import java.util.Scanner;

public class TestClock {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Value in grams");

       double grams = in.nextDouble();

       double pounds = 453.592*grams;

       System.out.println(grams+" grams is equal to "+pounds+" pounds");

   }

}

Explanation:

Import the Scanner Class to receive user inputSave the user input in a variableUse the conversion 1 pound = 453.592 grams to calculate the equivalent gramsOutput the the value of pounds calculated

The program that converts grams to pounds is as follows;

def grams_to_pounds(x):

  weight_in_pounds = x / 453.592

  return weight_in_pounds

w1 = grams_to_pounds(500)

w2 = grams_to_pounds(1000)

w3 = grams_to_pounds(2000)

print(w1)

print(w2)

print(w3)

Code explanationA function grams_to_pounds is declared with an argument x . The argument x is the mass in grams.The variable  weight_in_pounds is use to store the value of when the mass in grams is divided by 453.592Finally, we call our function with it parameter, using the variables w1, w2 and w3 to store it.The print statement is use to print the variables.

learn more on python code here: https://brainly.com/question/1620423?referrer=searchResults

Find a quote that you like. Store the quote in a variable, with an appropriate introduction such as "Ken Thompson once said, 'One of my most productive days was throwing away 1000 lines of code'". Print the quote.

Answers

Answer:

The program to this question as follows:

Program:

quote="You can always edit a bad page. You can’t edit a blank page."

name="Jodi Picoult"

print("Quote:\n",quote)

print ('\t\t\t\t\t\t\t',"Author name-", name)

Output:

Quote:

You can always edit a bad page. You can’t edit a blank page.

       Author name- Jodi Picoult

Explanation:

In the above python code, two variable "quote and name" is defined, in which variable both variable holds some string value.

In the next line, the print function is defined, that first print "Quote" as a message, and for line breaking "\n" is used, then print quote variable value. In the last step, first, we use "\t" for line spacing then message "Author name-", and then name variable value.

Write a program that does the following:
1. Declare the String variables firstname and lastname.
2. Prompt the user for first name and last name.
3. Read in the first name and last name entered by the user.
4. Print out Hello follow by user

Answers

Answer:

Following is the program in Java language:

import java.util.*;//import package

public class Main // main class

{

public static void main(String[] args) // main method

{

    String  firstname,lastname; // Declare the two String variables

    Scanner ob=new Scanner(System.in); // create a object of scanner //class

    System.out.println("Enter the first name:");  // Prompt the user for // enter the first name

   firstname=ob.nextLine();// Read in the first name by user

    System.out.println("Enter the last name:"); // Prompt the user for last //name

   lastname=ob.nextLine();// Read in the last name by user

   System.out.println("Hello " + firstname +' ' +lastname); // print the //firstname,lastname

}

}

Output:

Enter the first name:

San

Enter the last name:

ert

Hello San ert

Explanation:

Following are the description of program

Declared two variable of string type i.e "firstname"  and "lastname".Create a instance or object  of scanner class .i.e "ob". Prompt the user to enter the first name in the  "firstname" variableRead in the first name by the user by using the method nextLine() in the first name variable Prompt the user to enter the  last name. Read in the last name by the user by using the method nextLine() in the lastname variable. Finally, print the first name and last name.

Discuss whether the redundant data should be addressed prior to beginning the wireless network architecture project, in coordination with the network architecture project, or after the project has been completed.

Answers

Answer:

Before the project

Explanation:

We must o administrate and elaborate a prioritization about this redundant data, if we started after, we're going to lose a general view about the data, and when we're talking about redundant data always must be prevention and not monitoring, because any network must have redundant data, if we try to fix a network or database with this problem, we could delete delicate data.

How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?

Answers

Explanation:

What happens is that the security of a company's information and data system can be affected by its people because it is the organization's own employees who can leak sensitive information, for their own benefit or for the benefit of others. That is why it is extremely relevant that organizations should limit the level of access that each user has to their information system.

Adequate training in the use of these systems is essential for employees to use it properly, to correct system failures, and for top management to have adequate knowledge in the preparation of system security plans.

It is the security policies that will prevent unauthorized access and greater control over the security of important data and information, so it is important that any company with a data information system keeps itself up to date with the software and implements necessary security resources, in a way maintain security and always update and analyze the operation of technological equipment.

CHALLENGE ACTIVITY 2.15.1: Reading and outputting strings. Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones Jones, Maya 1 2 3 4 5 6 7 8 9 10 11 12 #include #include using namespace std; int main() { string firstName; string lastName; /* Your solution goes here */ return 0; } 1 test passed All tests passed Run

Answers

A program that reads a person's first and last names, separated by a space is shown below.

Given that;

Write a program that reads a person's first and last names, separated by a space.

Here's a solution in C++ that should do the trick:

#include <iostream>

#include <string>

using namespace std;

int main() {

 string firstName;

 string lastName;

 // Prompt user for input

 cout << "Please enter your first and last names, separated by a space: ";

 cin >> firstName >> lastName;

 // Output the last name, comma, first name

 cout << lastName << ", " << firstName << endl;

 return 0;

}

To learn more about the technology visit:

https://brainly.com/question/13044551

#SPJ3

Final answer:

To solve the programming exercise, include cin to read two strings representing the first and last name, then output them in 'Last name, First name' format using cout, followed by a newline.

Explanation:

To complete the coding exercise, you need to read in a person's first and last name and then display the last name followed by a comma, and then the first name. You can achieve this by using the cin to read the names and cout to output the result in the required format.

The program will look like this:

#include
#include
using namespace std;
int main() {
   string firstName;
   string lastName;
   // Reading the first and last name
   cin >> firstName >> lastName;
   // Output in 'Last name, First name' format
   cout << lastName << ", " << firstName << endl;
   return 0;
}

Simply include the code segment within the "/* Your solution goes here */" section in your program. When you run this code, it will prompt you to input a first and last name, and after you provide it, the program will print out the last name, a comma, and then the first name followed by a newline as specified in the exercise.

Other Questions
Today many teachers use a method of dialectical questioning in order to bring their students to a point of knowledge without explicitly imparting that knowledge. By teaching this way, teachers are modeling appropriate critical-thinking skills. What do we call this method of teaching?A) perfomance method b ) crictical thinking : c. the Socratic method d) none of these The graph shows a point of equilibrium.A graph titled Supply and Demand Equilibrium has Quantity Supplied on the x-axis, from 0 to 50 in increments of 10, and price in dollars on the y-axis, from 0 to 18 in increments of 2. Supply has a positive slope and demand has a negative slope. The lines intersect at point (30, 9).If the quantity supplied is greater than the quantity demanded, what must happen to the price in order to reach equilibrium?The price of the product will increase to meet equilibrium.The price of the product will decrease to meet equilibrium.Supply and demand must be raised.Supply and demand must be lowered. You measure 3.03 mL of a 50% NaOH solution by weight (its density is 1.53 g mL-1) and dilute it to 500 mL total volume. What is the concentration of this NaOH solution? Write your answer to four decimal places (X.XXXX). Need help with this question anybody What is 10 and 3 4ths equal In what ways can shares be ""preferred""? In which ways are they similar and different from common shares? Give real-world examples. A car of mass m push = 1200 kg is capable of a maximum acceleration of 6.00 m / s 2 . If this car is required to push a stalled car of mass m stall = 1750 kg, what is the maximum magnitude of the acceleration a of the twocar system? a = 0.62 m / s 2 Sallys income has increased by 10% and she decides to change her consumption of macaroni and cheese from 10 boxes to 8 boxes. Her income elasticity of demand is ____ and the good is a _____ type of good. Factor x3 + 3x2 + 2x completely.x(x2 + 3x + 2)x(x + 1)(x + 2)x(x - 1)(x - 2)DONE An instructor in a college class recently gave an exam that was worth a total of 100 points. The instructor inadvertently made the exam harder than he had intended. The scores were very symmetric, but the average score for his students was 43 and the standard deviation of the scores was 5 points. The instructor is considering 2 different strategies for rescaling the exam results: Method 1:Add 17 points to everyone's score. Method 2:Multiply everyone's score by 1.7. Which of the following are true? A) Method 1 will increase the standard deviation of the students' scoresB) Method 2 will increase the standard deviation of the students' scores.C) Method 1 will decrease the standard deviation of the students' scores.D) Method 2 will decrease the standard deviation of the students' scores. You land a marketing job with Canon after graduation in the digital camera division. After introducing a new digital camera, you estimate that the price-elasticity of demand for the camera equals 2 and the income-elasticity is equal to 0.5. Furthermore, the cross-price elasticity with a similar Kodak camera is equal to 1.25. Using this information, you would conclude that the product is income-: Which tactic did Charles Townsend use to increase British control of the am Jagjit company designs and builds retaining walls for individual customers. on august 1, there were two jobs in process: job 93 with a beginning balance of $8,650, and job 94 with a beginning balance of $7,270. jagjit applies overhead at the rate of $9 per direct labor hour. direct labor wages average $16 per hour. data on august costs for all jobs are as follows: The atomic masses of two isotopes of silver are 105 and 111. The chemical symbol for silver is Ag. (a) What are the number of protons and neutrons in each of the two isotopes?(b) What is the number of orbiting electrons in each of the two isotopes when each is electrically neutral? what are 3 types of potential energy? When a person solves problems by utilizing his/her prior experience, as well as insight and coping ability/skills for new situations, Sternberg's triarchic theory of intelligence would suggest that person was demonstrating __________ intelligence. How people in Louisiana helped fighting against the Union during civil war? Describe the Allies' battle strategy for victory in Europe after December, 1941. A private school admits no more than 100 students every year. Additionally at least 30 of these students must be girls, x, and the school admits at least as many girls as boys, y. George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use? A. Risk Management Guide for Information Technology Systems (NIST SP800-30). B. CCTA Risk Analysis and Management Method (CRAMM). C. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). D. ISO/IEC 27005, "Information Security Risk Management".