Programming question and answers for July 19, 2023
- Q int50+20 * (50/4) /4
- Q Are the security needs of small businesses different than thoseof a larger corporation? Please support your answers.
- Q Discuss the importance of having security policies in place.
- Q Develop an algorithm for INSERTION SORT. Give the pseudo-codeversion. Convert your pseudo-code into a Java program.
- Q the following lists the nodes in a binary tree in two differentorders:Preorder : A B C D E F G H I J K L MInorder : C E D...
- Q Define Artificial intelligence and explain that role it couldhave in healthcare in the future
- Q Write a program in C that sorts 3 given numbers, defined as(a,b,c) from highest to lowest.I already have this code finding the maximum. Need to just addthe sorting code onto...
- Q Changes in the economy have determined that for the EZ shippingcompany, a surcharge will be assessed on all packages that meetcertain criteria. The surcharge is a function of thecharacteristics of...
- Q 1- Definition and introduction of its layer2- Explain the network functions3- Explain the data transfer method in the network4- Mention the protocols if there is and explain them5- Network positives...
- Q In Java:Write a program that prompts the user to enter a positive numberuntil the user input a negative number. In the end, the programoutputs the sum of all the positive...
- Q Write the header and the implementation files (.h and .cppseparately) for a class called Course, and asimple program to test it (C++), according to the followingspecifications:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Your class has 3 member...
- Q Bus ticket reservation project in java using class,inheritance,interface
- Q Some of the encoding techniques used over fiber areManchester, 4B5B, and 8B10B. Whatare these encoding methods?
- Q Similar to in HW1, you'll implement a left shift of decimals ina string, with combining of multiple like digits into a singledigit of double the value. The main difference between...
- Q DBMS Create/Insert/Update SQLI need the create, insert, and update SQL statement for thistable as if it were being added to MySQL (please give explanationsfor each line of SQL code and...
- Q 1. Consider the loop from Section 8.3 of your textbook.prefixes = 'JKLMNOPQ'suffix = 'ack'for letter in prefixes:print(letter + suffix)Put this code into a Python script and run it. Notice that...
- Q Write an assembly language program that repeatedly prompts theuser to enter signed decimal integer numbers. The program should berun from the command prompt, output a text prompt to the screen,and...
- Q 1) Load the data from lab6_precipitation.csv into a numpy array;2) Make a numpy array with the years 1916-2016 and dtype=int; 3)Make a numpy array with the months 1-12 and dtype=int;...
- Q (Five Users - DOIO – Two Device drivers – TwoDisks)1.- In this assignment you will implement a simulation of theinteraction of user programs with the OS to execute an I/Ooperation...
- Q Using Python Shell 2.7, create a file calledAssignment6_1.pyCreate an array based on a basic arrayCreate a for loop that will print the arrayindex the array, print out the indexappend an...
- Q Discuss how to use R programming to solve the following problem.You’re not just writing the R code, you are also discussing theprocess.Given a person’s full name in the format of...
- Q Lab 3.1Create your objects in the stack (not on the heap). Add a friendfunction, kilotopound, which will convertkilograms to pounds. Change your weight mutator to ask whetherweight is input in...
- Q 7.7 Ch 7 Program: Online shopping cart (continued) (C)This program extends the earlier \"Online shopping cart\" program.(Consider first saving your earlier program).(1) Extend the ItemToPurchase struct to contain a new...
- Q Encryption vs. Encoding/ObfuscationGive a detailed paper discussing the differences between encryptionand encoding. Expand upon the use of these in the execution ofmalware. Discuss the different forms of encryption, their history,and...
- Q Complete a 250-400-word description of the purpose of a RADIUSserver and how RADIUS accomplishes authentication and authorizationof remote connections.
- Q Write a SQL statement which joins the parts table with thesupplier table and lists the part_name, supplier_name for all partsin the part table. The supplier_id column in the suppliers table...
- Q Please Use matlab and show command window. Please go through allstepsUsing a Dialog button with 3 buttons have the user chose one ofthe 3 anonymous functions below to be used...
- Q Suppose Alice and Bob have RSA public keys in a file on aserver. They communicate regularly, using authenticated,confidential message. Eve wants to read the messages but is unableto crack the...
- Q Consider the \"typical-case\" performace for the searchalgorithsms. In orther words the average number of comparisonsneeded over all possible positions where the elements can befound.a) used to locate and element in...
- Q The world of wireless and mobile devices is evolvingday-to-day, with many individuals relying solely on their wirelessdevices in the workplace and in the home. The growing use of mobiledevices demands...
- Q Suppose the program counter (PC) is set to 0x2000FFFC. Is itpossible to use the jump (j) MIPS assembly instruction to jumpdirectly to the instruction at 0x10003000? If yes, write thecorresponding...
- Q def vend():Â Â Â Â a = {'key': '0', 'item': 'choc','price': 1.50, 'stock': (2)}Â Â Â Â b = {'key': '1', 'item': 'pop', 'price':1.75, 'stock': 1}Â Â Â Â c = {'key': '2', 'item': 'chips','price': 2.00, 'stock': 3}Â Â Â Â d = {'key': '3', 'item':...
- Q C++Project OrganizationCreate a project called Project1 and then name and organize thefollowing programs under it.Part 1 CircleAreaYou are going to write a program to compute and output the areaof a...
- Q Write a parallel program using Pthread based on given sequentialsolution. Please set the thread number as 10 in your code.Given Sequential Solution:#include <stdlib.h>#include <stdio.h>#include <string.h>#define MAX 10240int total = 0;int...
- Q Use Lagrange interpolation to find the polynomial p3(x) ofdegree 3 or less, that agree with the following data: p3(−1) = 3,p3(0) = −4, p3(1) = 5, and p3(2) = −6.Using...
- Q What is the general principle behind software testing?Explain.
- Q Discuss tradeoffs between using the C++ STL list and vector.
- Q Using the Titanic passenger dataset (titanic.csv). Is it betterto split on gender or Pclass (1 or not 1)? Compute information gainfor each option and say which is best. Submit the...
- Q Please give me your knowledge about;Which requirements (groups) in the requirements in the SRS wouldbenefit from formalization?
- Q def num_to_digit_rec(num, base): \"\"\" Return a list of digits for num with given base; Return an empty list [] if base < 2 or num <= 0 \"\"\" # Write...
- Q Write a program to implement linked list data structure thatwill have following functions:a. Append a node in the listb. Insert a node in the listc. Delete a node from the...
- Q Write a program that prompts for and reads in the two sidelengths of a right triangle (floating point numbers) and then callsa float-valued function, hypot1, that calculates and returns thelength...
- Q In this assignment we are not allowed to make changes to Graph.hit cannot be changed! I need help with the Graph.cpp and theDriver.cpp.Your assignment is to implement a sparse adjacency...
- Q How to reverse linked list below,thank you!#include <stdlib.h>#include <stdio.h>struct list{int data;struct list *next;};typedef struct list node;typedef node *link;int main(){link ptr,head;int num,i;head = ( link ) malloc(sizeof(node));ptr = head;printf(\"enter 10 data...
- Q A computer manufacturer offers the possibility of purchasingcomputers via the Internet. The customer can select a computer onthe manufacture’s web page. The computers are classified intoservers, desktops and portables. The...
- Q a) TCP/IP what is the name of the packets at the data linklayer?b) What are the two identifiers to locate a process in otherpart of the world so we can...
- Q C++ Code Writing prompt:Grade Calculation: Write a program that asks the user to enterin a number greater than or equal to zero and less than or equal to100. If they...
- Q 5. Virtualization and cloud computing are rapidly expanding intothe enterprise as viable solutions. Discuss the connections betweenthese two technologies and the security implications of a virtualnetwork infrastructure in the cloud...
- Q This is c++ code.Create a file sort.cpp. to mixfunctions with the selection sort algorithm:·Write a function intleast(vector<string> strs, int start)to return the index ofthe smallest value in the vector. You...
- Q rite a java program that uses the methods written in thissection to do the following:Prompt the user for a number of gradesusing the getValidInput method. Ensure the number of grades...
- Q C++Given vector<float> vec;Using a ranged for loop, modify each value in vector to cubeand subtract 12.5
- Q rite a method with the following header:public static void showGradeDistribution(int a, int b, int c,int d,int f)It should print a graph (using asterisks) for each of theletters entered in the...
- Q Write a program that prompts the user to input a string. Theprogram then uses the function substr to remove all the vowels fromthe string. For example, if str=â€Thereâ€, thenafter removing...
- Q Consider the following table showing multiple transactions. Findall frequent itemsets using Apriori, then list all the strongassociation rules knowing that min_sup count = 2, and min_conf =60%.TIDItemsT1T2T3T4T5T6A, B, D, EA,...
- Q Design a complete program that asks the user to enter a seriesof 20 numbers. The program should store the numbers in an array andthen display each of the following data:I....
- Q 4. Write a multithreaded program that calculates variousstatistical values for a list of numbers. This program will bepassed a series of numbers on the command line and will then createfive...
- Q Evaluate (3b/2+c)*(6b-a) by writing the code in assembly.where a=2, b=3 and c=5.Write the equivalent C++ code in assembly language.if (bx<= ax) && ( cx >dx ){ax = 5;dx = 6;}NOTE:...
- Q In C++ using a single dimensional arrayCreate a program that uses a for loop to input the day, the hightemperature, and low temperature for each day of the week. The...
- Q Health Care Options, Inc.Health Care Options, Inc. (HCO) is a home-health care facilitylocated in the heart of the Blue Ridge Mountains. It supports localresidents within a 50-mile radius by providing...
- Q Specifications:Write a Java program called LifeRaft.java that will do all ofthe following:Display a titleAsk the user to enter the following values:The type of plane(Boeing 747 or Airbus A300)The number of...
- Q Write a C++ program to read characters from the keyboarduntil a '#' character is read. Then the program will find and printthe number of uppercase letters read from thekeyboard.
- Q Modify the HighArray class to implement the method specifiedbelow, which reads integer data from a file to fill the array. Thefirst integer read from the file should indicate the number...
- Q Hi i have this for a practical tomorrow (C++):a) Write a function vector merge(vector a, vector b) that mergestwo vectors, alternating elements from both vectors. If one vectoris shorter than...
- Q I need to write a method that sorts a provided Linked list withbubble sort and using ONLY Java List Iterator Methods (LinkBelow)https://docs.oracle.com/javase/8/docs/api/java/util/ListIterator.html    public static <E extends Comparable<? superE>> void bubbleSort(List<E> c)...
- Q what is a good hash function for ID numbers of format\"LM-0001312\", \"LM-04341313\", \"LM-4205114\"
- Q in bluej java Writing Classes and Methods, Modulo operator,Integer Division, if-statements, Iteration
- Q Penetration testing (or pentesting) is an important part ofkeeping networks and systems safe from those who would attack them.However, because similar methods are used by attackers andpenetration testers alike, some...
- Q 6a) (6 pts. each) Find the decimal represented by the 32-bitsingle precision floating point number for the hexadecimal valueC47CD000.
- Q Define a class Shoe with the followingproperties & methods.ForGender – r/w property (legal values: M or F– define a public enum in the class)Brand – r/w property (string)US_ShoeSize – r/w...
- Q linuxTo install packages you will need root privelages. Totemporarily perform an action with root privileges you use the sudocommand demonstrated in item 6 below. In your own words, explainthe purpose...
- Q Describe how typical RESTful services respond to requests.
- Q Microsoft Visual C++ Assembly languageProblem 3. Write a program that uses a loop tocalculate the first seven values of the Fibonacci number sequence,described by the following formula: Fib(1) = 1,...
- Q Write a bash script to find all the files ending with .crecursively for every directory in your current working directory,then copy each one to a folder called programs, need handleduplicates...
- Q python 3We would like to add cursor-based APIs to the array-backed listAPI. To this end, we are including a cursor attribute, and tworelated methods. cursor_set will set the cursor to...
- Q C++The program will call the start_game function with argument O orX to indicate first player and will keep track of the next playerwhile players take turns marking the board until...
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!