Programming question and answers for July 20, 2023
- Q PYTHON- create a queue class that uses a LINKEDLIST in order tostore data. this queue will call on a linkedlist classclass Queue: def __init__(self): self.items =...
- Q Considering our personal and professional reliance ontechnology, how has mobile technology positively and negativelyimpacted business?How can social media negatively impact your careergoals? What are the positive attributes of social media...
- Q this is a workplace skill assignment.You have been promoted to Evening Team Lead at a datacenter. You have reviewed the current infrastructure to ensure thatoperational procedures, maintenance and support of...
- Q // JavaLanguage. You need to write a program that asks the user for an arraysize, and then asks the user to enter that many integers. Yourprogram will then print out...
- Q Briefly describe the operation of TCP/IP in theprocess of sending a message from port 3 on host A to port 1 onhost B.
- Q A) What happens when a software Interrupt occurs? Writesteps briefly? Â Â B) Differentiate between maskable and non-maskableinterrupts?C) How are the multiplexed bus of 8086demultiplexed?D) Find the address range when a 2K...
- Q What are three of your favorite Web 2.0 technologies or Websites? Explain what is so great about each of them and how theymight be improved.(Dont copy previous answers)
- Q This is based on LinkedLists. Please complete the methods max()and threshold(). I'd greatly appreciate it. There is a typemismatch in my first method and I dont know how to get...
- Q Question #1The commented codes in the Driver class are either causing asyntax error or run time error. Make sure to identify the erroryourself without running it.predict the output once you...
- Q 1- Write a class called MedicalStaff that is aPerson (the class that you wrote in last lab). A MedicalStaff hasspecialty (i.e. Orthopedic, cardiology, etc.).2- Then write two classes:Doctor class has...
- Q Write a function that plots the following trajectory equationsusing python turtle graphics.x = v*sin(A)*ty = v*cos(A)*t -.5*(9.8)*t**2Loop through t starting at 0 and increment by .1 until y<=0.(hint, while loop)...
- Q You must program the game called MaDi which is described below.There is a board of NxN (the size N is defined by the user and mustbe a number greater than...
- Q The centered average of a list of numbers is the arithmetic meanof all the numbers in the list, except for the smallest and largestvalues. If the list has multiple copies...
- Q CODE IN JAVACreate a new class named Task1. In its main function, useScanner to read integers from the keyboard with the method nextInt.Use a try catch block to capture non-integer...
- Q To get some practice with recursion.You can do all this in one driver program.Write a recursive method to compute the result of the Fibonaccisequence:Fibonacci(N) = Fibonacci(N -1) +Fibonacci(N-2)N == 0...
- Q Describe how the Round Robin Scheduling algorithmworks. Explain the differences of working procedure betweenpreemptive and non-preemptive version of this algorithm.
- Q Task 1Please import the “admit.csv†into Rstudio.In this dataset,we know the GRE score,the GPA,and the rankof400 applicants for a graduate program. We also know if each of the candidates is...
- Q 1. What is the average waiting time for Processes If theOperating System uses the Shortest-Job-First (SJF) SchedulingAlgorithm?(P1=5 ms, P2=10 ms, P3=15 ms)2. How many page faults occur in the Optimum...
- Q Write a Python program:The function is named validity(). It receives 2 floating pointparameters, min and max, from the program that invoked it. Thefunction asks the user to enter a float...
- Q Describe how the Shortest Job First (SJF)Schedulingalgorithm works. Explain the differences of working procedurebetween preemptive and non-preemptive version of thisalgorithm.
- Q Design two sub- classes of Employee...SalariedEmployee andHourlyEmployee. A salaried employee has an annual salary attribute.An hourly employee has an hourly pay rate attribute, an hoursworked attribute, and an earnings attribute....
- Q Please provide PPT(powerpoint presentation) with these topicswhich will cover these microservices, blockchain, and cloudcomputing can be used together in a software architecture( 3-5slides should be fine). Thanks.
- Q Consider the following circuit to control a moving walkway.Every 2 seconds, the circuit examines two weight sensors anddecides if the walkway will travel Northward or Southward or beturned off. There...
- Q [C#] Randomly generate two numbers that user chooses and thenask the user what the answer is when some operator is applied. Ifuser is correct, they will be congratulated. If they...
- Q Write a C++ program to find least common multiple (LCM) of two,three and four integer values. The integer values are entered fromthe keyboard and the outputs are printed to the...
- Q Q) Find the instructor earning the second highest salary. (Don’tuse ORDER BY and LIMIT in your solution.) in MySQLhere is the table I am using named Instructor with the following...
- Q 1.Where does SANS get all of the information aboutattacks that are occurring?2. What type of training or certification does SANSprovide?
- Q (Python3)Write a function friend_besties() that calculates the \"besties\"(i.e. degree-one friends) of a given individual in a socialnetwork. The function takes two arguments:individual, an individual in the social network, in the...
- Q Let A ={x|x ∈ N∧x < 15}, B ={x|x ∈ Z∧x < 20∧x >−4∧x/2 ∈ Z}, C = {x|x ∈N∧x2 ∈ A}.Calculate the following expressionsusing the counting tools we have...
- Q 1. Write a query in SQL to find the full name of the “Actorsâ€who appeared in the movie titled Star Wars (using JOIN ).2.Write a SQL query to find the...
- Q Show how the Splaying techniques (Zig, Zag, Zig-Zag, Zag-Zig,Zig-Zig, Zag-Zag) works in Splay Trees Insertion and deletion withexamples.
- Q JavaScript is executed all on the client side within thebrowser. What kind of tasks or applications do you think is best tobe executed completely on the client side, without communicatingwith...
- Q Programming Language Required: CWrite a multithreaded program in C (not c++)using the pthread library and dynamic memory(malloc) thatmultiplies two matrices together. The numbers in the matrices mustbe read in from...
- Q What is the relationship between RedHat and Fedora?
- Q (Prime Numbers) An integer is said to be prime if it isdivisible by only 1 and itself. For example, 2, 3, 5 and 7 areprime, but 4, 6, 8 and...
- Q Write a function convert_date that takes an integer as aparameter and returns three integer values representing the inputconverted into days, month and year (see the functiondocstring).Write a program namedt03.py that...
- Q URGENT:USING C++:You are given a main.cpp and a Schedule.h file. You are to write a Schedule.cpp file that implements the missing pieces from Schedule.h. // ************************************// ************* main.cpp ************// ************************************#include...
- Q Why is it possible that when viewing images in an phone forensicextraction we may see multiple images that are visually thesame?
- Q Explain the permissions for the following files:1 drwx------ 6 monette staff 4096 Nov 18 2013 twelve2 -rw------- 1 kliu student 2495 Sep 10 2013 who.txta) What type of file is...
- Q injava,write code that defines a class named Cat The class shouldhave breed, name and weight as attributes.include setters and getters for the methods for eachattribute.include a toString method that prints...
- Q Create a system to simulate vehicles at an intersection. Assumethat there is one lane going in each of four directions, withstoplights facing each direction. Vary the arrival average ofvehicles in...
- Q goal of this function will be to add an element to an alreadyexisting array in C/C++.bool add(structure dir[], int& size, const char nm[], constchar ph[]){//code here}add = function namestructure =...
- Q Interpret and explain the causes of healthcare databreachesIdentify and summarize information regarding databasethreats.Where can you find information about healthcare databasethreats?
- Q Design a class named Message to represent a sentence or phrase.The class will contain: • a private string data field to hold thesentence or phrase. • A no-arg constructor with...
- Q PYTHON. Create a function that accepts a filename wherein each line there is a name of a type of bird. use a pythondictionary in order to count the # of...
- Q Benefits Plus is health insurance company that pays medical andhospital claims of the policy holders.In order to havepolicyholder’s claims processed,policy holders must submit a claim form. All claims are eithermailed...
- Q In Java pleaseConsider the following problem: There are threepegs, denoted A, B, and C, and N disks of different sizes.Originally, all the disks are on peg A, stacked in decreasing...
- Q Task 1Write a program that allocates an array large enough to hold 5student test scores. Once all the scores are entered, the arrayshould be passed to a function that sorts...
- Q Find the integer a such thata≡-43mod23and-22≤a≤0.a≡17mod29 and-14≤a≤14.a≡-11mod21 and 90≤a≤110.
- Q For this lab, you will be writing method definitions. Thesemethod definitions will be based on method calls I have alreadywritten for you. Do all of the following steps in order....
- Q using lunix or C programming to answer this lab please fill inthe blanks with the answere being highlighted, so i canunderstand.First, type the following command:Â Â Â Â Â Â Â Â Â Â Â Â sortemployeeWhat is the order that employee...
- Q In Systems Analysis and Design, how do Functional andStructural modeling differ, in what ways, and why are they alwaystogether in Analysis?
- Q How do you see the impact of technologies like TelePresence onthe workplace? On personal human interactions? Are you in supportof more or less face-to-face (FTF) interactions? Explain youranswer. If you...
- Q Research the Windows PowerShell commands for manipulating thefirewall and construct a command that lists all the firewall ruleson a system with the output containing the information and headersbelow:Rule nameTCP portEnabled
- Q Write a program in MIPS to find the largest element of anarray, the array size should be less than or equal to 10.Has to be extremely basic, cannot use stuff...
- Q Write a program that inputs three integers in the range[1..13] that represent a hand of three cards. Your program shouldoutput an English evaluation of the hand.In the output, cards will...
- Q Assignment: (Save this file as A7-1.cpp) Write a program tocalculate the gross pay for an assembly line employee that worksfor a company that pays all assembly line workers $7.50 hour....
- Q Assume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and...
- Q need mainly the php file and how to do the \"value\" portionuse pregmatch to verify proper format in the php file ifable.Create an HTML form that will accept four fields:...
- Q Write a C++ program that inputs three integers in the range[1..13] that represent a hand of three cards. Your program shouldoutput an English evaluation of the hand.In the output, cards...
- Q In python,Part 1: Estimate the value of e.e is defined as  as n goes to infinity. So the largerthe value of n, the closer you should get to e.math.e is defined...
- Q A third degree polynomial equation (a cubic equation) is of theform p(x) = c3x 3 + c2x2 + c1x + c0, where x andthe four coefficients are integers for this...
- Q What are the trade-offs between speed, volatility, accessmethod, portability, cost, and capacity with regard to storage forcomputers.Specifically the relationship between cost and capacity.
- Q Enterprise ArchitectureDescribe the Application Structure viewpoint in terms ofStakeholders, Concerns, Purpose and Scope. [ 10 marks ] 1page / 250 words
- Q Assume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and...
- Q Design a program that will ask the user to input two integernumbers and then perform the basic arithmetic operations such asaddition and subtraction. Each calculation is done by a separatefunction....
- Q *******************In Pythonplease*******************(1) Prompt the user to enter a string of theirchoosing. Store the text in a string. Output the string. (1 pt)Enter a sample text:we'll continue our quest in space....
- Q Assume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and...
- Q 4. In the key change operation of 20.15.7 Key Changes, supposethe manager simply transmitted delta2 = oldkey XOR newkey to theagent.Suppose an eavesdropper discovers delta2 and also knows a fewbits...
- Q Report for Movie: PrometheusWhat AI techniques/methods/devices/applications were mentionedin the movie and How accurate are the AI predictions on the movieset in our present time? Or, how realistic are those predictions...
- Q An advisory practice was the target of an attack, whereby themalware allowed the fraudster to gain access to an adviser’s logindetails for all systems he had used recently. The fraudster...
- Q ssume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and...
- Q A publisher needs to create a database based on thefollowing requirements:The publisher publishes different books. Each book hasan ISBN, name, author(s) name, edition number, category, and price.Each book has a...
- Q The devices designed for the purpose of addressing security inthe network generate a number of logs during the continuousmonitoring of the network. Discuss in detail the different types oflogs created...
- Q The devices designed for the purpose of addressing security inthe network generate a number of logs during the continuousmonitoring of the network. Discuss in detail the different types oflogs created...
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!