Write a program which increments from 0 to 20 and display results in Decimal on the console 2-b) Modify above program to increment from 0 to 20 and display results in Binary on the console

Answers

Answer 1

Answer:

This program is written in C++

Comment are used to explain difficult lines

The first program that prints 0 to 20 (in decimal) starts here

#include<iostream>

int main()

{

//Print From 0 to 20

for(int i = 0;i<21;i++)

{

 std::cout<<i<<'\n';

}

}

The modified program to print 0 to 20 in hexadecimal starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables to use in conversion;

int tempvar, i=1,remain;

//Declare a char array of length 50 to hold result

char result[50];

//Print 0

cout<<"0"<<endl;

// Iterate from 1 to 20

for(int digit = 1; digit<21; digit++)

{

//Start Conversion Process

//Initialize tempvar to digit (1 to 20)

tempvar = digit;

while(tempvar!=0)

{

//Divide tempvar by 16 and get remainder

remain = tempvar%16;

if(remain<10)

{

 result[i++]=remain + 48;

}

else

{

 result[i++] = remain + 55;

}

//Get new value of tempvar by dividing it by 16

tempvar/=16;

}

//Print result

for(int l=i-1;l>0;l--)

{

cout<<result[l];

}

i=1;

cout<<endl;  

}

return 0;

}

//The Program Ends Here

See Attachments for program 1 and 2; program 2 is the modified version of 1


Related Questions

Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();

Answers

Answer:

The csharp program to compute square roots of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeRoots()  

{  

StreamWriter writer1 = new StreamWriter("roots.txt");  

double root;  

for (int n=1; n<=max; n++)  

{  

root = Math.Sqrt(n);  

writer1.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeRoots();  

}  

}

The program to compute squares of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeSquares()  

{  

StreamWriter writer2 = new StreamWriter("squares.txt");  

long root;  

for (int n = 1; n <= max; n++)  

{  

root = n*n;  

writer2.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeSquares();  

}  

}  

Explanation:

1. An integer variable, max, is declared to hold the maximum value to compute square root and square.

2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer1 = new StreamWriter("roots.txt");

3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.

4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer2 = new StreamWriter("squares.txt");

5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.

6. Both the methods are declared static.

7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.

8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.

9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.

10. The csharp language is purely object-oriented language and hence all the code is written inside a class.

a. Create a console-based application named Desks that computes the price of a desk and whose Main() method calls the following methods:
• A method to accept the number of drawers in the desk as input from the keyboard. This method returns the number of drawers to the Main() method.
• A method to accept as input and return the type of wood—‘m’ for mahogany, ‘o’ for oak, or ‘p’ for pine.
• A method that accepts the number of drawers and wood type, and calculates the cost of the desk based on the following:
• Pine desks are $100.
• Oak desks are $140.
• All other woods are $180.
• A $30 surcharge is added for each drawer.
• This method returns the cost to the Main() method.
• A method to display all the details and the final price.
b. Create a GUI application named DesksGUI that accepts desk order data from TextBox

Answers

Answer:

Explanation:

Code:-

using System;

using System.Linq;

using System.Collections;

using System.Collections.Generic;

public class Test{

public static int no_drawer(){

Console.WriteLine("Enter the number of drawers : ");

return Int32.Parse(Console.ReadLine());

}

public static char wood_type(){

Console.WriteLine("Enter the type of woods('m' for mahogany, 'o' for oak, or 'p' for pine) : ");

return Console.ReadLine()[0];

}

public static double final_cost(int d,char ch){

double cost = 0.0;

if (ch == 'p') cost += d*100;

else if (ch == 'o') cost += d*140;

else cost += d*180;

cost += d*30;

return cost;

}

public static void display(int d,char ch,double p){

Console.WriteLine("Number of drawers : "+d);

if (ch == 'p')

Console.WriteLine("Type of Wood Chosen : pine");

else if (ch == '0')

Console.WriteLine("Type of Wood Chosen : oak");

else if (ch == 'm')

Console.WriteLine("Type of Wood Chosen : mahogany");

else

Console.WriteLine("Type of Wood Chosen : other");

Console.WriteLine("Total Cost is : "+p);

}

public static void Main(){

int drawers = no_drawer();

char ch_wood = wood_type();

double res = final_cost(drawers,ch_wood);

display(drawers, ch_wood,res);

}

}

cheers i hope this helped !!!

You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

Create two classes. The first, named Sale, holds data for a sales transaction. Its private data members include the day of the month, amount of the sale, and the salesperson's ID number. The second class, named Salesperson, holds data for a salesperson, and its private data members include each salesperson's ID number and last name. Each class includes a constructor to which you can pass the field values. Create a friend function named display()that is a friend of both classes and displays the date of sale, the amount, and the salesperson ID and name. Write a short main()demonstration program to test your classes and friend function.Sample Run
Sale #103 on 12/25/2016 for $559.95 sold by #103 Woods
Sale #106 on 11/15/2016 for $359.95 sold by #106 Hansen

Answers

Answer:

A C++ program was used in creating two classes. the code is stated below.

Explanation:

Solution

The C++ program is executed below:

#include<iostream>

using namespace std;

//declare class (will be define later)

class Salesperson;

//class Sale

class Sale

{

  //private members of class

  private:

      string day;

      double amtOfSale;

      int salesPersonId;

 //public methods

  public:

      //constructor that takes day,amount of sale and salesPersonId as parameters

      Sale(string date,double sale,int id)

      {

          //set the private members to the initial values passed

          day=date;

          amtOfSale=sale;

          salesPersonId=id;

      }    

      //declare a friend function that takes objects of the two classes as parameters

      friend void display(Sale,Salesperson);

};  

//define class Salesperson

class Salesperson

{

  //private members of the class

  private:

      int salesPersonId;

      string lastName;    

  //public methods

  public:

      //constructor that takes name and id as parameters

      Salesperson(int id,string name)

      {

          //set the members of the class with the parameters passed

          salesPersonId=id;

          lastName=name;

      }  

      //declare a friend function that takes objects of the two classes as parameters

      friend void display(Sale,Salesperson);

};

//define the friend funtion

void display(Sale saleObj,Salesperson personObj)

{

  //display the sales info using the objects of the two classes

  cout<<"\nSale #"<<saleObj.salesPersonId<<" on "<<saleObj.day<<" for $"<<saleObj.amtOfSale<<" sold by #"<<personObj.salesPersonId<<" "<<personObj.lastName;

}  

int main()

{

  //create object for Sale class and pass default values

  Sale sObj1("12/25/2016",559.95,103);

  //create object for Salesperson class and pass default values

  Salesperson pObj1(103,"Woods");

 

  //create another object for Sale class and pass default values

  Sale sObj2("11/15/2016",359.95,106);

  //create another object for Salesperson class and pass default values

  Salesperson pObj2(106,"Hansen");

  //using the friend function dislay the sales info

  display(sObj1,pObj1);

  display(sObj2,pObj2);

  return 0;

}

3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
pseudocode and explain your logic.​

Answers

Answer:

No, it can't be verified with a pseudocode.

Explanation:

We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.

Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.

In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).

Implement the method remove_all in the ArrayList class which takes the parameter x and removes all occurences of x from the list.

E.g., calling remove_all('a') on an ArrayList with contents ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a'] should result in the updated ArrayList ['b','r','c','d','b','r']

Answers

Answer:

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

Explanation:

The code is written in python

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

I declared a variable a and stored the list of value.

a = [x for x in a if x != 'a']

I used list comprehension to loop through the array and find any value that is not 'a' .

print(a)

I printed every value that is not 'a' in the array.

Which statement most aptly defines the term networking?

Answers

Answer: We need more info.

Explanation:

A small airline has just purchased a computer for its new automated reservations system. You have been asked to develop the new system. You are to write an application to assign seats on each flight of the airline’s only plane (capacity: 10 seats).
Your application should display the following alternatives: Please type 1 for First Class and Please type 2 for Economy.
If the user types 1, your application should assign a seat in the firstclass section (seats 1–5).
If the user types 2, your application should assign a seat in the economy section (seats 6–10).
Your application should then display a boarding pass indicating the person’s seat number and whether it is in the first-class or economy section of the plane.
Use a one-dimensional array of primitive type boolean to represent the seating chart of the plane. Initialize all the elements of the array to false to indicate that all the seats are empty. As each seat is assigned, set the corresponding elements of the array to true to indicate that the seat is no longer available.
Your application should never assign a seat that has already been assigned. When the economy section is full, your application should ask the person if it is acceptable to be placed in the first-class section (and vice versa). If yes, make the appropriate seat assignment. If no, display the message "Next flight leaves in 3 hours."

Answers

Answer:

Here is the simple JAVA program.

import java.util.Scanner;   // to take input from user

public class AirlineReservationSystem {  //airline reservation class

 public static void main(String[] args) {  //start of main() function body

Scanner input=new Scanner(System.in);   //Scanner class instance

int first_class=0;  //stores the first class seat numbers

int eco_class=5; //holds the economy class seat numbers

int quit;  //used to quit the reservation system  

System.out.println("Welcome to the AIRLINE RESERVATION SYSTEM!");  // displays welcome message

do{   //start of do while loop  

//displays following messages for user to make choice between 2 sections

System.out.println("Please type 1 for First Class ");

System.out.println("Please type 2 for Economy ");

int choice=input.nextInt();  //takes the choice from user

switch(choice){ // takes choice of user from first class or economy section

 case 1:  //when user enters first class as choice

   first_class++;  

//increments count of first class by 1 every time user reserves a seat in first //class

if (first_class<=5){  // the seats in first class section should be between 1-5

//displays message of seat reserved in first class

  System.out.println("Your seat is assigned in First Class.");    

System.out.println("Your seat number is "+first_class);  

//assigns seat number in first class    }      

   else{

// displays following message when number of seats in first class exceed 5

System.out.println("No seat is available in First Class");

//asks user if he wants to placed in economy class when there is no seat //available in first class

System.out.println("Do you want to be placed at the Economy section?(1.yes\t2.no)");

  int full=input.nextInt();  //reads yes or no (1 or 2) from user

    if (full==1){  //if user entered 1

  System.out.println("Enter 1 to return to main menu to reserve a seat in Economy class.");

    }  // asks user to press 1 to go to main menu

    else{  //displays following message if user enters 2

  System.out.println("Next flight leaves in 3 hours.");}   }

   break;

case 2:  //when the user choose to reserve seat in economy class

                        eco_class++;  

//increments count of first class by 1 every time user reserves a seat in //economy class

//the seats of economy class ranges from 6 to 10  

if ((eco_class>5)&&(eco_class<=10)){  

//display message about economy class seat reservation

System.out.println("Your seat is assigned in Economy Class.");

//assigns seat number in economy class    

  System.out.println("Your seat number is "+eco_class);  }  

   else{

// displays following message when number of seats in economy class //exceed 10

System.out.println("No seat is available in Economy Class");

//asks user if he wants to placed in first class when there is no seat //available in economy class

System.out.println("Do you want to be placed at the First class section?(1.yes\t2.no)");  

  int full=input.nextInt(); //reads yes or no (1 or 2) from user

    if (full==1){ //if user entered 1

  System.out.println("Enter 1 to return to main menu to reserve a seat in business class.");  

// asks user to press 1 to go to main menu }

    else{  //displays following message if user enters 2

  System.out.println("Next flight leaves in 3 hours."); }} }

System.out.println("1.main menu\t2.quit");  

quit=input.nextInt();

//if user presses 2 it reads that value from user and store it in quit variable

 }while (quit==1);  //the loop stops when user chooses quit

 System.out.println("Bye! Have a nice day!"); }  }  

//displays message when user quits the reservation system

Explanation:

The program is well explained in the comments mentioned with each line of the program. The program uses switch statement for the user to make choice between first and economy class. If the user selects first class, then his seat is reserved in first class and a seat number is generated to user. The range of first class seats is from 1 to 5. When this range is exceeded the  person is asked if he wants to be placed in economy class. If the user presses one then the person is asked to go back to main menu and reserve seat in economy class. If user enters 2 then the system exits. Same flow goes with the economy class seat reservation. The do while loop keeps executing until the user quits the system. If the user presses 2 to quit, the system exits after displaying bye message.

how do you unblock websites on a school chromebook?​

Answers

Answer:

use proxies, if you cant, then you cant unblock anything thats already blocked

Explanation:

You can't unblock anything on a school chromebook. So it's best to find website alternatives, things your school might use, like Giggl. It's a website with a built in web browser you can do almost anything, watch videos you can't on your school chromebook, netflix, hulu, vumoo, and even nasty sites... just don't go on those though. You can't play a lot of games and some sites are blocked as well. If you want people to send you videos that you can watch in a separate browser, i suggest using pad let. It is a app to post things like pictures or status' but people like me and my friends use it to talk to each other,  you can send gifs, voice recordings, and take pictures. I hope this helps you.

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.

Answers

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50

Answers

Answer:

You didn't specify the language so I did it in C#

Explanation:

The management wants to you to calculate a 95% confidence interval for the average relative skill of all teams in 2013-2015. To construct a confidence interval, you will need the mean and standard error of the relative skill level in these years. The code block below calculates the mean and the standard deviation. Your edits will calculate the standard error and the confidence interval. Make the following edits to the code block below:Replace ??SD_VARIABLE?? with the variable name representing the standard deviation of relative skill of all teams from your years. (Hint: the standard deviation variable is in the code block below)Replace ??CL?? with the confidence level of the confidence interval.Replace ??MEAN_VARIABLE?? with the variable name representing the mean relative skill of all teams from your years. (Hint: the mean variable is in the code block below)Replace ??SE_VARIABLE?? with the variable name representing the standard error. (Hint: the standard error variable is in the code block below)The management also wants you to calculate the probability that a team in the league has a relative skill level less than that of the team that you picked. Assuming that the relative skill of teams is Normally distributed, Python methods for a Normal distribution can be used to answer this question. The code block below uses two of these Python methods. Your task is to identify the correct Python method and report the probability.print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")print("------------------------------------------------------------------------------------------------------------")# Mean relative skill of all teams from the years 2013-2015mean = your_years_leagues_df['elo_n'].mean()# Standard deviation of the relative skill of all teams from the years 2013-2015stdev = your_years_leagues_df['elo_n'].std()n = len(your_years_leagues_df)#Confidence interval# ---- TODO: make your edits here ----stderr = ??SD_Variable?? (n ** 0.5)conf_int_95 = st.norm.interval(??CL??,??MEAN_VARIABLE??,??SE_VARIABLE??)print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")print("\n")print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")print("----------------------------------------------------------------------------------------------------------------------------------------------------------")mean_elo_your_team = your_team_df['elo_n'].mean()choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)# Pick the correct answer.print("Which of the two choices is correct?")print("Choice 1 =", round(choice1,4))print("Choice 2 =", round(choice2,4))

Answers

Answer:

Explanation:

print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")

print("------------------------------------------------------------------------------------------------------------")

# Mean relative skill of all teams from the years 2013-2015

mean = your_years_leagues_df['elo_n'].mean()

# Standard deviation of the relative skill of all teams from the years 2013-2015

stdev = your_years_leagues_df['elo_n'].std()

n = len(your_years_leagues_df)

#Confidence interval

stderr = stdev/(n ** 0.5) # variable stdev is the calculated the standard deviation of the relative skill of all teams from the years 2013-2015

# Calculate the confidence interval

# Confidence level is 95% => 0.95

# variable mean is the calculated the mean relative skill of all teams from the years 2013-20154

# variable stderr is the calculated the standard error

conf_int_95 = st.norm.interval(0.95, mean, stderr)

print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)

print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")

print("\n")

print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")

print("----------------------------------------------------------------------------------------------------------------------------------------------------------")

mean_elo_your_team = your_team_df['elo_n'].mean()

# Calculates the probability a Team has Average Relative Skill GREATER than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015

choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)

# Calculates the probability a Team has Average Relative Skill LESS than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015

choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)

# Pick the correct answer.

print("Which of the two choices is correct?")

print("Choice 1 =", round(choice1,4))

print("Choice 2 =", round(choice2,4)) # This is correct

A computer needs both hardware and to be useful

Answers

Answer:

software

Explanation:

software is the other major component to hardware

Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)

Answers

Answer:

Following are the statement in C++ Programming language

cout<<setw(4);// set the width

cout<<number; // print the number with the width of 4

Explanation:

The  setw() is setting  according to the width defined as the argument to the function .The setw()  is under the ios header library .It means its definition is under the ios header file .

Following are the syntax to defined the setw() function that are given below

 setw(int k)

For example

include <iomanip>   // header file

#include <ios>   // header file

#include <iostream>   // header file

using namespace std;   // namespace

int main()   // main function

{    

   int number = 60;// variable declaration  

   cout << "previous width:" << number; // print  

   cout << " After setting the width"<< setw(4);  

   cout << number;     // display number

   return 0;  

}

Write down the result of each expression in the output column and specify the datatype of the result.Datatype should follow the Java Standards. If the output is a String, surround it with " ";if the output is char surround it with ‘ ’. Floats should have an ‘f’ or ‘F’ at the end, longs should have an ‘L’ or ‘l’ at the end (generally avoid using lowercase ‘l’ because it can be confusing).

Answers

Answer:

Kindly check the explanation section.

Explanation:

Below are the expression given in the question and the corresponding output and Datatype.

(1). Expression = 7/2 + 9.2/2.

Output = 7.6, Datatype = double

(2). Expression = 3.4 + 2 5 f.

Output = 5.9, Datatype = double.

(3). Expression = "whale" . Substring (2,5).

Output = "ale" , Datatype = string.

(4). Expression= (int) 9.2 + 6.0 f.

Output = 15.0 f, Datatype = float.

(5). Expression = (2 <= 1) && (5! = 2) || (8 + 5!= 13).

Output = false, Datatype = boolean

(6) Expression =1.5 f == 1.5?.

Output: “false” , Datatype : “true ”

Output = “false”,

Datatype= String.

(7). Expression = “joey”.charAtt(4).

Output = error, Datatype = error“.

(8). Expression = madmax”.

indexOf(“a”) + 7.

Output: 8 , Datatype = int.

(9). Expression = 2 + 3 + “catdog” + 1 + 2.

Output = “5catdog12”, Datatype = String.

(10). Expression = String.format(“%3.3f”,7.89672).

output = “7.897”, datatype = String.

(11). Expression = “captain”.indexOf(“a”, 2).

Output = 4, datatype = int.

(12). true ? ++3: 3++.

Output = error, dataty = error.

(13). Expression = new String[]{“tony”,“josh”}[0].

Output = “tony”, Datatype = String.

(14). Expression = “patrick”.substring(2) +“lucky”.substring(4).

Output = “tricky”, Datatype = String.

(15). Expression = “popFizz”.indexOf(“o”) + 2.4+ 6L.

Output9.4, Datatype = double.

(16). Expression = “pizza”.indexOf(“z”).

Output = 2, Datatype = int.

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Answers

Answer: Provided in the explanation section

Explanation:

The question says :

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Solution:

Here, our fundamental aim is to look for the content which is having single space between different sentences. As it sentences finishing with . Going before with single and various spaces we have to channel and match just e the sentences which are finishing with ". "

For this we use order called "GREP" in Unix. "GREP " represents worldwide quest for standard articulation. This order is utilized inquiry and print the lines that are coordinating with determined string or an example. The example or indicated string that we have to look through we call it as customary articulation.

Syntax of GREP:

GREP [OPTIONS] PATTERN [FILE_NAME]

​​​​​​For our solution please follow the command

GREP "*\•\s$" userNotes.txt

Now it will display a all the lines having . Followed by single space.

a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours

Answers

Answer: provided in the explanation section

Explanation:

Network Merging and Acquisitions

Environment:

· 400 Windows Servers

· 8000 Windows client devices (laptops running Windows os)

· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.

· Unix servers(Other environment to be merged)

· host resolution they use is BIND

A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.

Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.

Quick & Dirty IPSEC Tunnel

When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.  

Main problems with quick and dirty IPSEC tunnels are

Maintaining network lists manually.

manual maintenance of route injection into the IGP.

Probable single points of failure.

Using SD-WAN As Acquisition Network Glue:

Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers

1. Easily managed redundant plumbing :

SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.

2. IGP integration:

When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.

3. Segment isolation:

An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.

Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.

4. Service chaining:

Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.

Drawbacks Of The SD-WAN Approach

A few drawbacks in using SD-WAN as a network merger tool come to mind.

Cost:

The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.

Remote hands:

In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network

Perhaps not quick and dirty enough:

The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.

To Conclude:

Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.

If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.

SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.

Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|

Answers

Answer:

...............................................

Explanation:

............................................................

Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.

Go to the tab on the ribbon and the group.

Click Themes and select one.

Go into the workbook, make the changes, and return to the Themes gallery.

Select to save the changes.

Answers

Answer:

C, A, and B.

or

3, 1, and 2

Explanation:

In that order

The first will be to adjust the workbook. then there should be a theme that needs to be selected. And then next is to Select the tab and the box of ribbon on which the theme needs to be presented.

Thus, options C, A, and B are correct.

What is a theme?

A theme is made up of window colors, music, and desktop backdrop images. A theme is a collection of window accent colors, noises, and desktop backdrop images. If you don't want to customize your computer cover image, window highlight colors, home screen widget, etc., you can use a theme.

Make the adjustments that are required in the workbook, then go back to the motif gallery.

Choose a theme by clicking Themes.

Go to the tab and box on the ribbon.

A theme often consists of a selection of forms and colors for the window design, the visual control components, and the window. Therefore, options C, A, and B are the correct options.

Learn more about the theme, here:

https://brainly.com/question/12461938

#SPJ3

Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two books. For example, if the first book's title is "The Adventures of Tom Sawyer" and the second book's title is "The Adventures of Huckleberry Finn", the concatenated title will be "The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn". Assume the book class is defined as: class Book { public Book(string title) { Title

Answers

next time m8 mmmmmdsaasd

The Sleeping-Barber Problem:

A barbershop consists of a waiting room with n > 0 chairs and the barber room containing the barber chair.

If there are no customers to be served, then the barber sleeps.

If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.

If the barber is busy but chairs are available, then the customer sits in one of the free chairs.

If the barber is asleep, then the customer wakes up the barber and the shaving process begins.

After they finish, the customer leaves and the barber start shaving another customer, if there are any in the waiting room. Otherwise he goes to sleep.

Answers

Answer:

Explanation:

Following are the Semaphores:

Customers: Counts waiting customers;

Barbers: Number of idle barbers (0 or 1)

mutex: Used for mutual exclusion.

Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves

Shared data variable:

count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.

// shared data

semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;

int count_cust= 0;

void barber() {

while(true) { //shop is always open

wait(customers); //sleep when there are no waiting customers

wait(mutex); //mutex for accessing customers1

count_cust= count_cust-1; //customer left

signal(barbers);

signal(mutex);

cut_hair();

}

}

void customer() {

wait(mutex); //mutex for accessing count_cust

if (count_cust< n) {

count_cust= count_cust+1; //new customer

signal(customers); signal(mutex);

wait(barbers); //wait for available barbers get_haircut();

}

else { //do nothing (leave) when all chairs are used. signal(mutex);

}

}

cut_hair(){ waiting(cutting);

}

get_haircut(){

get hair cut for some time; signal(cutting);

}

Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter a 5 digit integer as input and does the following tasksThe program checks whether the input number is a palindrome or not and prints the result of this palindrome check. A number is a palindrome if it reads the same backward as forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611; whereas 12312, 55565, 45545 and 11621 are not a palindrome. Your program should print "The number is palindrome" or "The number is not palindrome" after checking the input number.The program checks whether the input number has 5 digits or not and prints the error message "Invalid number" if the input number is not a 5 digit one.I posted my code below, I think I have a good start with reversing the number but I'm not sure how to implement the portion of how to actually check if it is a palindrome.import java.util.Scanner;public class Problem2 {public static void main(String[] args){int number;
Scanner scanner = new Scanner(System.in);System.out.println("Enter a positive integer between 1 and 5 digits long that you would like to test for a palindrome: ");num = in.nextInt();for( ;num != 0; ){reversenum = reversenum * 10;reversenum = reversenum + num%10;num = num/10;

Answers

Answer:

import java.util.Scanner;

import java.util.regex.*;

public class Problem2 {

   public static void main(String[] args)

   {

       int number;

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter a positive integer with exactly 5 digits long that you would like to test for a palindrome: ");

       String str = scanner.nextLine();

       int len = str.length();

       

       if (!Pattern.matches("^[1-9]\\d{4}$", str)) {

           System.out.println("Invalid number");

       } else {

           boolean isPalindrome = true;

           for(int i=0; i<len/2; i++) {

               if (str.charAt(i) != str.charAt(len-i-1)) {

                   isPalindrome = false;

                   break;

               }

           }

           if (isPalindrome) {

              System.out.println("The number is palindrome");  

           } else {

              System.out.println("The number is not palindrome");  

           }

       }        

   }

}

Explanation:

Even though the problem talks about numbers, a palindrome check is more about strings, so that's how I'd handle it. I check the validity of the input using a regular expression (note how I don't allow the number to start with a zero, you can change that if you want), and then I check for palindrome to iterating to only halfway the string, and checking the i-th position ffrom the start against the i-th position from the end. If there is no match, the loop is aborted.

See that also for even-length palindromes this will work.

by applying styles formats are being applied ?
A. The same
B. Different
C. Various
D. Similar

Answers

Answer:

A

Explanation:

The same formats are being applied.

Answer:

A

Explanation:

Let's take the letters in a keyboard. If I were to type a document; there are several word format I can chose like Calibre, Times New Roman, Gothic etc. However for each word format I can make the words bold or italicized which are styles.

// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary

start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop


Answers

Answer:

The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)

Comments are used to explain difficult lines

#Python Program starts here

#Prompt user for monthly pay

pay = float(input("Enter Monthly Pay: "))

#Prompt user for rent

rent = float(input("Enter Rent: "))

#Prompt user for utilities

utilities = float(input("Enter Utilities: "))

#Prompt user for groceries

groceries = float(input("Enter Groceries: "))

#Calculate discretionary

discretionary = pay - rent - utilities - groceries

#Print discretionary

print("Discretionary: ")

print(discretionary)

#Python Program ends here

//C++ Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float pay, rent, utilities, groceries, discretionary;

//Prompt user for input

cout<<"Enter Monthly Pay: ";

cin>>pay;

cout<<"Enter Rent: ";

cin>>rent;

cout<<"Enter Utilities: ";

cin>>utilities;

cout<<"Enter Groceries: ";

cin>>groceries;

//Calculate discretionary

discretionary = pay - rent - utilities - groceries;

//Print discretionary

cout<<"Discretionary: "<<discretionary;

return 0;

 

}

//C++ Program ends here

"What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel

Answers

Answer:

i think phone

hope this helps u stay safe

Explanation:

NAT preserves and safeguards IP addresses that have been lawfully registered. Translation of network addresses with security. NAT enables users to browse the internet more discreetly and securely by hiding the device's IP address from the wireless site even when sending and receiving traffic.

What is NAT outer feature provides basic security?

NAT can also offer security and confidentiality. NAT shields the private device from outside access by transferring data packets from public to private addresses. Unwanted data has a harder time slipping through the cracks, since the router organizes the data to make sure everything gets to where it should.

Therefore, NAT outer feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel.

Learn more about router here:

https://brainly.com/question/29869351

#SPJ5

Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person’s BMI is calculated with the following formula:

BMI = weight x 703 / height2

where weight is measured in pounds and heightis measured in inches. The program should ask the user to enterhis/her weight and height. The program should display a message indicating whether the person has optimal weight, is underweight, or is overweight. A sedentary person’s weight is considered optimal if his or her BMI is between18.5 and 25. If the BMI is less than 18.5, the person is considered underweight. If the BMI valueis greater than 25, the person is considered overweight

Answers

Answer:

This program is written using C++

Comments are used to explain difficult lines

Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float BMI, Height,Weight;

// Prompt user for inputs

cout<<"Ener Height (in inches): ";

cin>>Height;

cout<<"Enter Weight (in pounds): ";

cin>>Weight;

//Calculate BMI

BMI = (Weight * 703)/(Height * Height);

cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;

//Test and print whether user is underweight, overweight or optimal

if(BMI>=18.5&&BMI<=25)

{

 cout<<"You have an optimal weight";

}

else if(BMI<18.5)

{

 cout<<"You are underweight";

}

else if(BMI>25)

{

 cout<<"You are overweight";

}  

return 0;

 

}

See attachment for .cpp source file

What is the name of the FOLDER in which the file named "script" is contained?

Answers

Answer:

The default location for local logon scripts is

the Systemroot\System32\Repl\Imports\Scripts folder

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.

Answers

Explanation:

Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies.  They uses technology to render services.

Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.

How policies on encryption could be implemented to prevent cyber attacks by:

Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.

1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.

2. Rules on encryption of sensitive messages and back up data.

3. rules on encryption of Log in details and passwords

Cyclic Redundancy Check (CRC) is an effective error detection mechanism. Suppose you have data bits of 10010011011 and divisor is 10011. As per the given information, what is encoding bits at the sender side? Similarly, at the receiver end ensure syndrome value is zero. Follow all necessary steps to complete calculation at both ends.

Answers

Answer:

I've asked the same question bro..if you get answer share with me too

Explanation:

Other Questions
Please someone solve this, this is my third time reposting this question so yea please be quick ya1. Koti vend de la vian de. Il est un....(a) boulanger(b) boucher(c) boulangere(d) boucher Select the correct answer from the drop-down menu.Which expression represents the quotient of this model?-x-2X-2-X + 2x+2quotient: Plot a point on the coordinate plane to represent each of the ratio values How did President Franklin D. Roosevelt increase the powers of thepresidency? A population has a standard deviation of 5.5. What is the standard error of the sampling distribution if the sample size is 81? How did the elections of 1937 benefit the Indians? A cylinder has a base radius of 6 centimeters and a height of 20 centimeters. What isits volume in cubic centimeters, to the nearest tenths place? In two the three sentences, explain how you find the value that would complete the ordered pair if the point is on thegraph of f(x) = 4x - 6?(3,_____) Put these fraction in order of size smallest to largest : 7/10, 2/3, 4/5, 11/15 If $4500 earns $120 simple interest at a flat rate of 2% p.a., calculate the duration of the investment.Please help me with understanding the steps to getting the answer as well as the solution. Thx Matt paid $6.65 to download 7 song . What is the unit rate The formula for calculating annual insurance premiums isA. p = 20B. p = 2dbC. p = 2d1D. p = 120 Plastic Company purchased 100 percent of Spoon Company's voting common stock for $648,000 on January 1, 20X4. At that date, Spoon reported assets of $690,000 and liabilities of $230,000. The book values and fair values of Spoon's assets were equal except for land, which had a fair value $108,000 more than book value, and equipment, which had a fair value $80,000 more than book value. The remaining economic life of all depreciable assets at January 1,20x4, was five years. Spoon reported net income of $68,000 and paid dividends of $34,000 in 20X4 Required Compute the amount of investment income to be reported by Plastic for 20X4 What is the slope of the line described by the equation below?y= 10x + 2A. -10B. 10C. 2O D. -2 PLEASE HELP ME WITH THIS & IT DUE tomorrow.ONLY DO 2 AND 3!!!!PLEASE AND THANK YOU!!! Measurements of the sodium content in samples of two brands of chocolate bar yield the following results (in grams):Brand A: 34.36 31.26 37.36 28.52 33.14 32.74 34.34 34.33 34.95Brand B: 41.08 38.22 39.59 38.82 36.24 37.73 35.03 39.22 34.13 34.33 34.98 29.64 40.60 Let formula415.mml represent the population mean for Brand B and let formula417.mml represent the population mean for Brand A.Find a 98% confidence interval for the difference formula419.mml. Round down the degrees of freedom to the nearest integer and round the answers to three decimal places. which story premise is the best example of magical realism ?A. Duke has to win the snowboarding competition in order to save his school.B. Aliens from outer space invade earth , and only capybara man can stop them. C. A wizard plunders an ancient dungeon for the secret of how to tame dragons. D. A horse who was once a movie star struggles to bring his career back to life. PLEASE HELP ME IF YOU CAN!Many states use a lottery such as Powerball. Game tickets select 5white balls numbered from 1 to 69 and one red ball numbered from 1 to 26. Suppose a person wanted to purchase a lottery ticket every minute, each one with a new combination of numbers. At that rate, how many days would it take to purchase all possible ticket combinations? find the value of root 121 + 3 over root 125