Programming question and answers for July 18, 2023
- Q Write a DFA simulator using the C++ programming language. Pleaserefer to the following UDACITY website if you do knot know C++.This is a free online tutorial for learning C++.Read your...
- Q Follow the UML diagram and directions on the attached file tocreate a RectangularPrism class and a RectangularPrismDemoclass.---------------------------------------------------------------------------------------------------------------------------------------RectangularPrism          -length: double     -width: double     -height: double+ RectangularPrism()+ RectangularPrism(l:double,w:double,h:double)+ setLength(l:double):void+ setWidth(w:double):void+ setHeight(h:double):void+getLength():double+getWidth():double+getHeight():double+getVolume():double+getSurfaceArea():double+toString():String---------------------------------------------------------------------------------------------------------------------Create a RectangularPrism...
- Q Error detection/correction CObjective:To check a Hamming code for a single-bit error, and to reportand correct the error(if any)Inputs:1.The maximum length of a Hamming code2.The parity of the check bits (even=0,...
- Q I am trying to write code for a program in Visual Studo usingVisual Basic programming language that computes the factorial of anentered number by using a For Loop. My problem...
- Q The goal is toCreate an array of struct “employeeâ€Fill the array with information read from standard input usingC++ style I/OShuffle the arraySelect 5 employees from the shuffled arraySort the shuffled...
- Q 1. From the statement “Lincoln is the 16th US presidentâ€, we cancome up with the following designs. Which one is mostappropriate?a. Two independent Classes: Lincon and President.b. Two Classes: Lincon...
- Q Complete the method sortSuits(). This method takes oneargument:a deck of cards (Stack<String> deck).It shouldreturn an ArrayList of Stacks, each stack representing all thecards of one suit(i.e., if you have four...
- Q Temperature ConverterCreate a temperature conversion program that will convert thefollowing to Fahrenheit:CelsiusKelvinNewtonYour program should take a character which represents thetemperature to convert from and a value to be converted to...
- Q this is a python code:QUESTION 3:Imagine that the IRA is giving stimulus package in the COVID-19season. The package amount is determined by the number of adults inthe family and the...
- Q Going through a basic tutorial on bringing in data froma URL in Python. So far, I've imported Citi Bike station data andconverted the JSON file to a Python dictionary nameddatadict...import...
- Q “Managing Configuration and Data for Effective ProjectManagement.†The process protocol model consists of thirteen (13)steps from Inception to Feedback.What are the steps?Can any be skipped in this process model?
- Q What is the time complexity of the following code? (inbig-O notaion)sum = 0var = 0product = 0for i = 1 to (n+2){sum = sum + 2ifor j = i to...
- Q Alice is sending message “HIDE†to Bob. Perform encryption anddecryption using RSA algorithm, with the following information:parameters p=11,q=5, e=7Present all the information that you will need to encrypt anddecrypt only...
- Q Write a function softMax_M(Q) to return a 2darray of softmaxfunction values ??ℎ=???ℎ−?∑??=1???ℎ−? for ?=0,1,⋯,?−1,ℎ=0,1,⋯,?−1 ,where ? is a 2darray of floats with shape ( ? , ? ), ??ℎ is...
- Q Write a function softMax(x) to return a 1darray of softmaxfunction values ??=???−?∑?−1?=0???−?fi=exi−m∑j=0K−1exj−m for?=0,2,⋯,?−1i=0,2,⋯,K−1, where ?x is a 1darray of ?K floats, ??xi isthe (?+1)(i+1)-th element of array ?x, and ?m...
- Q Exercise 1Modify the List<T> class of Figure 21.3 in the textbook toinclude a method that recursively searches a linked-list for aspecified value. Ensure that the name of your methodincludes your...
- Q Overloaded ConstructorsAdd a pair of constructors to the Height class that implementthe initializations provided by the two setHeight operations inFigure 7.11. Minimize the total number of statements by having theone...
- Q Python: Implement a grid-maze solving program that usesdepth-first search to solve grids. The agent’s actions are movingin one of four directions: up, down, left, and right.A grid is formatted like...
- Q What are the three types of database design situations?
- Q must use pythonWrite a nested for loopthat displays the following output using the same integer from parta:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1Â Â 2Â Â 1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1Â Â 2Â Â 4Â Â 2Â Â 1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1Â Â 2Â Â 4Â Â 8Â Â 4Â Â 2Â Â 1Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 1Â Â 2Â Â 4Â Â ...
- Q I. Create the class Item with the following members:  1. id, a protected variable of type int  2. name, a protected variable of type string  3. price, a protected variable of type double  4....
- Q Ive been stuck on this problem for a while. any advice would beappreciated.Write a program that takes a date as input and outputs thedate's season. The input is a string...
- Q Write a function in Python 3 (v. 6175+) calledmultiplicity00794. The function should receive alimit number andreturn:• how many multiples of 3 or 5 or 7 there are that are less...
- Q Open selfmodifying.asm in MARS. Before running the code,predict: what will be the result in register $s0when this programis finished running? Now when you run the program, you will see anerror:...
- Q Pell's sequence is the following infinite sequence: 0,1, 2, 5, 12, 29, 70, 169, 408, 985, 2378 ...first element is 0, the second is 1 and each remaining element isthe...
- Q Homework – Zeller’s Algorithm Pt2Zeller’s algorithm computes the day of the week on which a givendate will fall (or fell). You are provided this algorithm inCANVAS. In this task, you...
- Q Please create a Risk Mitigation Plan for thisscenario.Scenario: You are an information technology (IT) intern workingfor Health Network, Inc. (Health Network), a fictitious healthservices organization headquartered in Minneapolis, Minnesota.Health Network...
- Q 1)Given that main memory is composed of only three page framesfor public use and that a seven-page program (with pages a, b, c,d, e, f, g) that requests pages in...
- Q Write a java program that simulates thousands of games and thencalculate the probabilities from the simulation results.Specifically in the game, throw two dice, the possible summationsof the results are: 2,...
- Q Bibi loves to goshopping. One day, one of her favorite stores is offering adiscount. Bibi becomes very interested and decided to shop there.If Bibi’s current total is N Rupiah before...
- Q Given L={words in which the number of a’s are the same as thenumber of b’s}Write a CFG to accept L.Convert the CFG to CNF.Construct a PDA for this CNF.
- Q Hi...I have a proposal to do and I'm writing about ( Hospitalmanagement system )so I have a part about ( Motivation for the research) Ineed someone to write it.
- Q 1. The problem of multiples. Rashid Phumbhra has made importantcontributions to astrological computingbased on the theory of multiples. In this problem you must designan algorithm to identify whether a number...
- Q write a program to find the maximum possible sum such that notwo chosen numbers are adjacent either vertically, horizontally, ordiagonally. code in java
- Q Define a class template called genericStack for storing any datatype in a static stack. Your class template must include aconstructor, a destructor, push, pop, peek, isFull, and isEmptyfunctions (no display...
- Q Can someone write a proposal assignment on the topic \"IndoorMapping\"; 1) Provide me an introductory statement and thesisstatement which will cover all the info we're going to talk aboutin this...
- Q #PythonGiven a dictionarygradeCounts = { \"A\": 8, \"D\": 3, \"B\": 15, \"F\": 2, \"C\": 6 }write the Python statement(s) to print:a) all the keys.b) all the values.c) all the key...
- Q explain the types of solid waste in detail and sources of solidwaste,factors that affects generstion rate of sw with table andproblem.50marksNote:Its for 50 marks i need 10page answer and ownanswer...
- Q In statistics, the mode of a set of values is the value thatoccurs most often or with the greatest frequency. Write a functionthat accepts as arguments the following:An array of...
- Q TestLibrary.javaDesign and implement a class named Book. A book has a serialnumber, a title, an author, and a publisher. Create appropriateconstructor(s) and accessor and mutator methods for the Bookclass.Add a...
- Q JAVA Assignment:Project File Processing.Write a program that will read in from input file one line at atime until end of file and output the number of words in the lineand...
- Q Use Java to:1. Write a method with a Rectangle and a Point as parameters.Without using methods from the Rectangle class, return true if thepoint is inside the rectangle and false...
- Q Q1) Discover ambiguities or omissions in the following statementof requirements for part of a Automated beverage serving system: Anautomated beverage serving system sells several beverages. Usersselect the type of beverage...
- Q Encipher the following emperors’ names using a Shift Cipher withthe given key.Pompeii, key = D. ___________Vespasian, key = P. _________Caligula, key = H. _________Nero, key = T. _____________
- Q IN PYTHONWrite a function called check_inventory(inventory, low) thatpasses a dictionary as inventory and low as an integer, and returnsa sorted list of items that are below an inventory level that...
- Q Should we abandon copyright on internet or does in serve itspurpose ?
- Q In C language,Write a program called minishell that creates two childprocesses:one to execute 'ls -al' and the other to execute‘grep minishell.c’.After the forks, the original parent process waits for bothchild...
- Q Using Python, use the following list (Temperature =[56.2,31.8,81.7,45.6,71.3,62.9,59.0,92.5,95.0,19.2,15.0]) to:- Create a loop to iterate through each of the elements in thetemperature list.- Convert each element of this list to a...
- Q The purpose of this lab:Â Â Wireshark Intro Labis to get students familiar with the use of their VMs andrunning wireshark on their VMs. We also examine Ethernet, IPv4, andTCP addressing at...
- Q A college must track equipment items purchased using specialfunds.Create an Inventory class that represents an equipment item. Anequipment item consists of an 8-alphanumeric inventory number, ashort description of the item,...
- Q C++Part 1: Developing And Testing A Stack TemplateWrite a template, Stack.h, to implement a LIFOstack. Here is the specification for its publicinterface:class Stack{ ... Stack( ); // may have a...
- Q C++ questions, Please make sure to divide your program intofunctions which perform each major task.The game of rock paper scissors is a two player game in whicheach each player picks...
- Q Is P(Σ∗) countable for any finite Σ?
- Q AES has a larger block and key length compared to DES. If weever had to do multiple encryptions with AES because we hadcomputers fast enough to brute force a 128-bit...
- Q For PACMAN game specification2.1Â Â Product Perspective2.2Â Â Product Functions2.3Â Â User Classes and Characteristics2.4Â Â Operating Environment2.5Â Â Design and Implementation Constraints2.6Â Â Assumptions and Dependencies
- Q Write a Java PATRON class with fields that reflect the structureof your patrons table.Write a java FACTORY class with these two methods:getPatron (String patronID) that returns a patron object forthe...
- Q Description: The purpose of the program is tocreate a Java ticket purchasing program that allows for users tolog in, purchase tickets, keep records of tickets purchased, andkeep information about the...
- Q Mr. Smith is thinking about opening a bicycle shop in hishometown. He loves to take his own bike on 50-mile trips with hisfriends, but he believes that any small business...
- Q PLEASE put your answer in a tableWhat are the usages of the following API's/ Macros in contiki?PROCESSuip_debug_ipaddr_printAUTOSTART_PROCESSESPROCESS_THREADPROCESS_WAIT_EVENT_UNTILPROCESS_ENDsimple_udp_registersimple_udp_sendtouip_create_linklocal_allnodes_mcastservreg_hack_register
- Q The following table shows data on the average number ofcustomers processed by several bank service units each day. Thehourly wage rate is $15, the overhead rate is 1.2 times labor...
- Q Complete the redblacktree in Java.Make every Node object have a false isBlack field, allnew node is red by default.In the end of the insert method, set the root node ofyour...
- Q fix all errors in code below: PLEASE DO ASAP, THIS IS INMATLAB%Welcome Messagefprintf('****Welcome to Comida Mexicana De Mentiras****\n');flag =0;while flag ==1% Asking the user for the orderchoice = input('Please enter...
- Q Discuss the main benefits of deploying QNX Operating Systems forapplications.
- Q What single query can get data from 4 tables , using SUM orCOUNT
- Q Using c++ to find all the peaks elements in a 2d array, eachelement has eight neighbours
- Q This requirement can be met by using generic data, the correctmysql coding of script is more important than the data.SQL scripts that return data from your database that has alreadyhad...
- Q Write a C++ programs to:1. Create a class called Student with four (4) private membervariables, name (string), quiz, midterm, final (alldouble type);2. Include all necessary member functions for this class...
- Q JAVA (Tree height)Define a new class named BSTWithHeight that extends BST with thefollowing method:/** Return the height of this binary tree */public int height()Class Name: Exercise25_01
- Q Compare and contrast different storage configuration such asRAID 0, 1, 5, and 6 (and JBOD).
- Q In Java please:2) Part 2: Add a blankPos fieldDear Developer, It seems an overzealous programmer tried to createa Fibonacci slider puzzle from our old code. This brought up thefact there...
- Q What is it called when a malicious program obtains access to anotherwise inaccessible functionality?
- Q Write a research paper of 3- 4 pages minimum APA style on thecomparison of Concurrency Mechanisms in Windsows10, Linux, andAndriod.
- Q What is the basic formula for risk analysis? Apply it to aspecific risk. You may make up the numbers involved.
- Q Q4. Name three areas in which you can increase the availabilityof a SCADA system by introducing redundancy into the design of thesystem.
- Q (Test perfect binary tree)A perfect binary tree is a complete binary tree with all levelsfully filled. Define a new class named BSTWithTestPerfect thatextends BST with the following methods:(Hint: The number...
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!