. Draw state diagrams of the control software for: A telephone answering system that records incoming messages and displays the number of accepted messages on an LED. The system should allow the telephone customer to dial in from any location, type a sequence of numbers (identified as tones), and play any recorded messages.
Q: Input: marks > 9 Output: minimum mark of top 10% top = floor(n/10) for a = 0; . at+ if (0 0){ == for...
A: Time complexity of above code is n^3
Q: Why would a problem cause the current command to be retried?
A: Why functions fail to complete : Now and again, a capacity could exit rashly because of an inward mi...
Q: Explain why it is important that software products are developed and delivered quickly ?
A: The answer is given below
Q: At least three FPU special-purpose registers should be mentioned.
A: According to the information given:- We have to define three FPU special-purpose registers.
Q: Explain why it is important that software products are developed and delivered quickly ?
A: There are various reasons for developing software faster. The first is that it saves money, as compa...
Q: Write a C program containing a recursive function that will get the whole number quotient result of ...
A: Please refer to the following steps for the complete solution to the problem above.
Q: What will be the output of the given program class A { int m-20, n=30; void display() System.out.pri...
A: EXPLANATION: In the definition of the main function, the object of class B is created. Then for the...
Q: I am trying to figure out why the sum at the end of my Java code is not working correctly. It keeps ...
A: the answer is given below:-
Q: Define the term "virtual machine" and explain why it is necessary.
A: Virtual Machine: It is a machine created on a physical hardware system (off-premises) that acts as a...
Q: Build a high-level ETL pipeline with source as an API service covering all the below-listed conditio...
A: Build a high-level ETL pipeline with source as an API service covering all the below-listed conditio...
Q: PARALLEL AND DISTRUBUTED COMPUTING write code in c++
A: CODE:- In C++ program of multiplication of matrix n*n. #include <iostream> using namespace s...
Q: Recall the problem of finding the median of an array of an unsorted list. How fast can one complete ...
A: Solution: Recurrence relation: Let the problem be: finding the Kth largest element in an unsorte...
Q: Define the term "virtual machine" and explain why it is necessary.
A: Introduction: A virtual machine is created on a physical hardware system (off-premises) that acts as...
Q: Explain the process of recognising the various sorts of instructions in the context of a simple comp...
A: Introduction: An instruction is a rule that is created to perform some operation and generate an out...
Q: Answer all or don't answer at all (it's urgent so) Subject : Operating System Read research pa...
A: Worse is better : The worse is better is-better plan theory, initially depicted in Richard Gabriel'...
Q: Why does peer to peer network is suitable for home? Explain it well.
A: the answer is given below:-
Q: What is the SI/DH register's code?
A: Introduction: The 16-bit index registers are called SI (Source Index) registers. It is used to condu...
Q: 2'gn → n'g 2
A:
Q: 1. Naming agreement: In order to insure compliance of all projects done for this course with my curr...
A: Answer: Step 1 Here our task is to create 2 classes that will manipulate some geometrical objects....
Q: Write a C program containing a recursive function that will get the whole number quotient result of ...
A: Program Code: #include<stdio.h>int quotient(int a,int b){ int q; q=a/b; return q;}main(){ int ...
Q: Develop a class diagram for following description:
A: A class diagram is used to visualize the design of the system. It uses various relationships between...
Q: Create a python program Solve the problem statement below You will write a program to analyze charac...
A: try: with open('test.txt') as f: wordCount, upperCount, lowerCount, digitCount, spaceCou...
Q: Consider the adjacency matrix below. Upload a picture (it can be hand drawn) of the adjacency list o...
A: Given Adjacency Matrix:-
Q: Explain why it is important that software products are developed and delivered quickly ?
A: Answer : most of the time client cannot wait for a long time for he's product to be developed and de...
Q: Using doc function, determine what the dot-forward slash (./) operator does.
A: . is a current list shorthand and is used in Linux and Unix to create an integrated program for the ...
Q: 22. Write a Python program to input coordinates of two 2-D points P, Q and then find the distance be...
A: Write a Python program to input coordinates of two 2-D points P, Q and then find the distance betwee...
Q: Buffers are used to minimise access latency between various levels of the memory hierarchy. List the...
A: check further steps for the answer :
Q: What is a view? How do you define a view? Does the data described in a view definition ever exist in...
A: A view is a virtual table through which a selective portion of the data from one or more tables can ...
Q: the IEEE-754 single precision real number after encodingt the real decimal number-76.0625? = IEEE-75...
A: IEEE 754 numbers are divided into two types:- 1) Single precision 2) Double precision Lets disc...
Q: What are the Operational CharactérlIstics, Revision Characteristics and Transition Characteristics a...
A: Introduction: Software engineering: It is a process of analyzing user requirements and then designi...
Q: Write a program that counts the number of basic steps needed for sorting an array of integer numbers...
A: Given :- Write a program that counts the number of basic steps needed for sorting an array of integ...
Q: What is role based access (RBAC)?
A: Answer : As the name define that Access will be restrict to the user control in the organization.
Q: What are some of the benefits of paging?
A: Virtual memory can be configured using non-contiguous memory allocation method known as Paging. In p...
Q: differences between security knowledge framework(SKF) and Simple Risk in terms of vulnerability asse...
A: what are the similarities and differences between security knowledge framework(SKF) and Simple Ris...
Q: Write a C program to implement TSP problem using branch and bound technique.
A: Program Code: #include<stdio.h>#include<conio.h>int a[10][10],visited[10],n,cost=0;void ...
Q: Consider the following vectors, which you can copy and paste directly into Matlab or octave online. ...
A: Dear Student, To create such a tridiagonal matrix you can easily use diag command to create this the...
Q: In an outbound PDU packet, what does source port: 80 and destination port: 1027 means?
A: The Outbound PDU Details tab shows similar information for outgoing packets. This tab only applies i...
Q: 2. Open Visual Studio IDE. 3. Create new project and named the project as GreetingApp and the class ...
A: import java.util.Scanner; class SeatReservation{ public static void main (String[] args){ ...
Q: The value of the keyboard flag byte is returned by which INT 16h function
A: Hi there, Please find your solution below, I hope you would find my solution useful and helpful. Tha...
Q: When invoking external assembly language processes from C++, why is it vital to use name decoration?
A: Introduction: Every programming language has its naming convention, which may or may not be compatib...
Q: What is the average seek time of a driver?
A: what is the average seek time of a driver
Q: Develop a c programm that reads a text file (input1.txt) containing a list of sentences and, for eac...
A: import re def open_file(): ##method to open a file while(True): text = raw_input("Ente...
Q: chy. List the probable buffers required between the L1 and L2 caches, as well as between the L2 cach...
A: L1 is "level-1" cache memory, usually built onto the microprocessor chip itself. L2 (that is, level-...
Q: Consider the "Account" standard object in Salesforce, verify that it contains a field named “Name". ...
A: SOQL is similar to the SELECT Statement in SQL (Structured Query Language). Using SOQL one can searc...
Q: Which fibre is utilised to protect the inner core and prevent the cable from straining in fiber-opti...
A: Introduction: Fiber optic cable is a form of network cable that is commonly used to carry data. It i...
Q: Which file system(s) in Microsoft's Windows operating system support 16-bit Unicode filenames?
A: Microsoft's Windows operating system supports 16-bit Unicode filenames on file systems that support ...
Q: What does it signify when a language has a naming convention?
A: Introduction: Things are named according to a naming standard.
Q: write a java program to print the mirror image of right angled in x-direction after taking number of...
A: Required:- Write a Java program to print the mirror image of right-angled in x-direction after takin...
Q: Define the term "virtual machine" and explain why it is necessary.
A: A virtual machine (VM) is a software that creates an abstract computer environment within which a gu...
Q: What will be the output of the given program class A { int m-20, n-D30; void display() System.out.pr...
A: Task :- write the output for given Java code snippet.
. Draw state diagrams of the control software for:
A telephone answering system that records incoming messages and displays the number of accepted messages on an LED. The system should allow the telephone customer to dial in from any location, type a sequence of numbers (identified as tones), and play any recorded messages.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
- Moon effect. Some people believe that the Moon controls their activities. If the Moon moves from being directly on the opposite side of Earth from you to being directly overhead, by what percentage does (a) the Moon's gravitational pull on you increase and (b) your weight (as measured on a scale) decrease? Assume that the Earth-Moon (center-to-center) distance is 3.82 x 10° m, Earth's radius is 6.37 x 106 m, Moon's mass is 7.36 x 1022 kg, and Earth's mass is 5.98 x 1024 kg. (a) Number 6.89 Units percent (b) Number i 6.8713e-4 Units percentCircuit Assignment (Digital Logic) You have been hired by a home security company to design and implement a home alarm system. The logic of the system is as follows: Once the alarm system has been armed, it is to sound if the front door is opened, or (the back door is opened and window is opened). Design the necessary circuit using use any method to implement the situation above. Your circuit should have 4 inputs (A-alarm, F=front door, B-back door, W= window). A=1 means the system is Armed. F-1 means Front door is open. B-1 means Back door is open. W=1 means Window is open. There should be one output S. When S= 1 the alarm should sound, otherwise the alarm is silence. Submit these 3 items: 1- Create the formula, S = ... in terms of the variables 2 - Create the truth table, 3- Draw the Circuit. (You can use the zyBooks tool to build the circuit and screen shot the circuit image.)Language : C Jojo remembered going to a cave with his best friend Lili before the coronavirus pandemic.There, he saw several Stalactites hanging from the /cave’s ceiling. Stalactite is a type offormation that hangs from the ceiling of caves.Jojo noticed an interesting fact about the stalactites. The stalactite formation in thiscave forms a pattern. He wonders how will the formation look like if the cave is of adifferent size. He has asked your help to visualize this formation. Format Input :A single line with an integer N denoting the size of the cave Format Output :A size N formation of stalactites. Do not print extra spaces behind the last ‘*’ character in each line. Constraints : • 1 ≤ N ≤ 12 Sample Input 1 :2 Sample Output 1*** *Sample Input 2 :3 Sample Output 2 :******* * * * *
- PLZ help with the following: A computer freezes at odd times. At first you suspected the power supply or overheating, but you have eliminated overheating and replaced the power supply without solving the problem.What do you do next? A friend has asked you to help him find out if his computer is capable of overclocking. How can you direct him?(Mechanics) The deflection at any point along the centerline of a cantilevered beam, such as the one used for a balcony (see Figure 5.15), when a load is distributed evenly along the beam is given by this formula: d=wx224EI(x2+6l24lx) d is the deflection at location x (ft). xisthedistancefromthesecuredend( ft).wistheweightplacedattheendofthebeam( lbs/ft).listhebeamlength( ft). Eisthemodulesofelasticity( lbs/f t 2 ).Iisthesecondmomentofinertia( f t 4 ). For the beam shown in Figure 5.15, the second moment of inertia is determined as follows: l=bh312 b is the beam’s base. h is the beam’s height. Using these formulas, write, compile, and run a C++ program that determines and displays a table of the deflection for a cantilevered pine beam at half-foot increments along its length, using the following data: w=200lbs/ftl=3ftE=187.2106lb/ft2b=.2fth=.3ftExplain "motion input." Give instances of motion input's various applications in medical, military, sports, and entertainment.
- Draw the control flow graph of the code.Pseudo code in picture 2(write like this)Software Engernning Question: (JUST NEED DIAGRAMS) Consider a Vehicle Maintenance System where a customer can come for inspecting his/her vehicle. The mechanic will inspect the vehicle and be paid for it. They will store the inspection result in the inspection record. Based on the record, the mechanics can repair the vehicle too if the customer wants and be paid for it. The owner can order parts to the vendor if there is any shortage in the inventory. The customer will pay bill for inspection and repair. Draw a Data Flow Diagram (Level 0 and 1) for the system. Then for any one of the process, show the level 2 data flow diagram.
- Example (2.3). A voltmeter is used to measure a voltage of 9 V. the following measurements are made: 8.9, 8.8 , 9.1 , 9.2 , 8.9 calculate the precision of the third reading.Question-1 Friend's Party Circle: There are a few friends living in the same area. They have a party every weekend and the place of party change each week. It is always a difficult task to select a place which is nearest for everyone. They all decided advantage of Computer Science to solve this problem. to take Names of friends are Ahmed, Rehman, Careem, Basit, Dawood, Ghani, and Farid. Ahmed lives at 5 minutes’walk from rehman and at 10 minutes' walk from Careem. Careem lives at 3 minutes' walk from Dawood. Rehman lives at 4 minutes' walk from Basit and 2 minutes' walk from Dawood. Dawood lives at two minutes' walk from Farid. Ghani lives at 2 minutes' walk from Basit. b. In above directed graph G. You are required to devise an algorithm to find all possible paths.This exercise is for a simplified supermarket cash register system. The normal procedure for using the cash register is as follows:• A customer arrives at the checkout with items to pay.• The cashier records the identification number of each item, as well as the quantity if it is greater than one.• The checkout displays the price of each item and its description.• When all purchases are recorded, the cashier signals the end of the sale.• The cash register displays the total purchases.• The customer chooses his method of payment:✓ cash: the cashier collects the money received; the cashier indicates the currency to be returned to the customer;✓ check: the cashier checks the creditworthiness of the customer by transmitting a request to an authorization center via the cashier;✓ credit card: a bank terminal is part of the cash register. It transmits an authorization request to an authorization center according to the type of card.• The cash register registers the sale and prints a receipt.•…