python
Q: What do the symbols * and & mean, when they are placed in front of an identifier?Explain with an...
A: Note: There are multiple questions are given in one question. According to the rule, you will get th...
Q: Operation System:
A: Given :
Q: 1. Consider memory storage of a 32-bit word stored at memory word 42 in a byte- addressable memory. ...
A: NOTE: ACCOEDING TO COMPANY POLICY WE CANNOT SOLVE MORE THAN THIS. YOU CAN RESUBMIT THE QUESTION AGAI...
Q: Intro to Python Programming
A: Solution:
Q: Quiz # 01 Money Withdraw The following questions may be used to help identify the use cases for a sy...
A: Given: Money Withdraw The following questions may be used to help identify the use cases for a syste...
Q: Need any c++ OOP game or managment project / program Thanks
A: Given:- Need any c++ OOP game or managment project / program Thanks
Q: If you have the following node declaration:struct Node {int number;struct Node * next;};typedef stru...
A: Program code: #include <stdio.h> #include <stdlib.h> //struct store linked list node str...
Q: What are three advantages of organic light-emitting diode (OLED) displays compared to LCD displays?
A: OLED: OLED stands for (Organic Light Emitting Diodes), it is known as organic because it made from ...
Q: Question 5 i. List some reasons why it is worthwhile to study assembly language programming. ii. Sec...
A: The following is the solution
Q: What are three examples of server platforms?
A: A family of servers that includes the hardware and operating system. For example, the Windows server...
Q: 2. Write an algorithm and draw a flowchart to check a number it is positive or negative, if it is po...
A: To write an algorithm and draw a flowchart to check a number it is positive or negative, if it is po...
Q: 4. Specify the size of a ROM that you could use to program each of the following combinational circu...
A: a) First of all, ROM is constructed with the decoder. Design 16 adder/subtractor: we need three inp...
Q: Dry run the following code. You have to complete the iterations and fill the table: #include using ...
A: Given that m and n values are 10, in a single loop, using two indices, if the addition of two index ...
Q: Computer Science Question
A: Note: As per our guidelines we can able to solve only three subdivisions at a time, In which D secti...
Q: Problem 2) Extract diagonal elements of a square matrix and put into a column array. As an example, ...
A: Given:
Q: Describe the intent of 5 of these website types: Information and research, sharing of media, bookmar...
A: step: 1 of 20 The purpose of different types of websites is mentioned below:Informational and Resear...
Q: Please solve this problem in java language
A: import java.lang.Math; public class SumSquireRoot { public static void main(String[] args) { ...
Q: Direction: Given the C++ codes below about stack, write the output in the boxes. Push(10) Push(12) P...
A: Stack follows the LIFO rule. LIFO stands for “Last In First Out”. That is the element inserted at la...
Q: what are User-defined data types ?
A: Given: what are User-defined data types ?
Q: Securing a network from attacks means a network administrator is watching traffic and user activity....
A: import csv #Create Empty Dictionarydicta = {} #Ask user for file namefl = input("Enter filename: ") ...
Q: Project Tasks: (attach this page to your report as the front page) Task 1: (Design the circuit): ...
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 PART PER QUESTION. YOU CAN RESUBMIT THE QUESTI...
Q: Python Programming2. Write a class named Pet, which should have the following data attributes:(a). _...
A: Answer: Python Code: File: Pet.py ''' Python program that reads Pets information from user and displ...
Q: Given the following summation. 1(1)= + +.+ |(i)= - 1+v2 VZ+V3 +Vi+1 Write a java program that prints...
A: /* (summation) write a program to compute the following summation input = I = 625 output I(652)...
Q: In object-oriented design approach everything is in terms of objects. How a large (or complex) objec...
A: Object-Oriented DecompositionDecomposition means that dividing an outsized complicated system into a...
Q: hello, i need help with this homework question for my intro to c++ course. We are on the topic of ar...
A: GIVEN: Write a c++ program with function definition for a function named sumLessThanX which does the...
Q: You are asked to write a program for a company that allows the manager to enter the salaries of 8 em...
A: PROGRAM CODE: #include <iostream> // include header file for input output...
Q: what the answer What is the concept of Von Neumann computer? Describe major components of a digital...
A: Note: As per the guidelines can answer the first three questions. Please re-submit the other questio...
Q: Write use case scenario for e commerce site.
A: USE CASE DIAGRAM OF E-COMMERCE SITE: The use cases in e-commerce site are Browse catalog Place req...
Q: One of the advantages of Mobile GIS is that O a. It is very complex with object representation b. It...
A: Ans 1). b). It offers open data access in support of field staff.
Q: This is the code I have so far, just need help with the areas that say "***". #include <string>...
A: #include<iostream> // for string input#include<string> // Access input output streamusin...
Q: Which of the listed languages have corresponding Turing machines that accept them, but no PDA exists...
A: Turing Machine was unreal by Alan Mathison Turing in 1936 and it's wont to settle for algorithmic de...
Q: Which of he following is not a system software?APC DOSB LinuxCMAC OS XDDatabase system
A: Which of the following is not a system software?
Q: Use C++ nested for loops to print numbers 0, 1, 2, ..., userNum as shown below, with each number ind...
A:
Q: Write the Java socket program for the Server. (class name: Server_12345) And Write the Java socket p...
A: Code: Socket Server package com.journaldev.socket; import java.io.IOException;import java.io.Object...
Q: ecuring a network from attacks means a network administrator is watching traffic and user activity. ...
A: Answer: Solution: required code has been added below along with the output. Comments have been place...
Q: I am doing thesis about implementing Artificial Intelligence in Health Care system. What TOPICS shou...
A: I am doing thesis about implementing Artificial Intelligence in Health Care system. What TOPICS shou...
Q: NEED CODE IN ASSEMBLY LANGUAGE AND CODE MUST BE MASM615 COMPATIBLE AND PLEASE RUN PROGRAM ON DOSBOX ...
A: .model small ;following macro is used to print a message;argument msg is the strig to printprintm...
Q: 1) Consider the following Java program. Describe what it does in response to specific operations of ...
A: mouse event : Events are central to programming for the graphical user interface. A GUI program does...
Q: java program: University of Bahrain College of Information Technology Department of Computer Science...
A: A). Source Code: import java.util.Arrays; import java.util.EmptyStackException; import java.util.Ite...
Q: Graph Theory Graph Theory in Urban Services Discuss how Graph Theory is utilized to various urban se...
A: A designated services in which a municipality provides public services such as water, drainage, and ...
Q: CSE Quiz What are three applications of IBM Watson? What is spread sheet? Write a Python Program to ...
A: IBM Watson is a computer program designed to focus primarily on questionnaires. This computer progra...
Q: Suppose you can compute \varphi(n)φ(n) for any integer nn quickly by access to some alien technology...
A: The following is the solution
Q: 3. Using script file in MATLAB/OCTAVE to, I need the answer of A only ****P=3
A: a option will calculate to 0, script is given in step 2.
Q: Write a C program that reads the exam data for each student from a file named grades.txt. Each line...
A: #include <iostream> #include <fstream> using namespace std; int main () { char name[10];...
Q: breadth first search algorithm and depth first search algorithm
A: BREADTH FIRST SEARCH: Breadth first search is basically the algorithm that is used for the purpose ...
Q: Your manager has read about XSS attacks and is wondering what can be done toprotect against them for...
A: Your manager has read about XSS attacks and is wondering what can be done to protect against them fo...
Q: Explain the following schedule development tools and concepts Gantt,critical path method ,critical c...
A: Gantt Chart:- A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt chart...
Q: What are three applications of computers and information systems in your daily life?
A: A computer information system is a system made out of individuals and computers that cycles or decip...
Q: A digital computer has a memory unit of 64K X 16 and a cache memory of 1K words. The cache uses dire...
A: Given : A digital computer has a memory unit of 64K X 16 and a cachememory of 1K words. The cache us...
Q: Can you help me with the codes required for this assignment? the programming langauge is Java. (Sort...
A: Given: Can you help me with the codes required for this assignment? the programming langauge is Java...
Two words are anagrams if they contain all of the same letters, but in a
different order. For example, “evil” and “live” are anagrams because each contains
one ‘e’, one ‘i’, one ‘l’, and one ‘v’. Create a program in python that reads two strings from
the user, determines whether or not they are anagrams.
Step by step
Solved in 3 steps with 3 images
- Using Javascript and HTML: An interesting application of computers is drawing graphs and bar charts (sometimes called histograms). Write a script that reads five numbers between 1 and 30. For each number read, output HTML5 text that displays a line containing the same number of adjacent asterisks. For example, if your program reads the number 5, it should out HTML5 test that displays *****.A cryptogram is a coded message using alphabet substitution. For example, the letter "A" in the cryptogram might stand for the letter “Ż." You are to write a program that allows the program user to decipher cryptograms, like the following one. Your program should allow the user to change one letter and display the change, then change another letter and display the change etc. Here is a sample cryptogram to be decoded. String crypto.Part1 = "EKBQUDUHJ XK BCA AYGADDAMB KGENAHUEB UP" String crypto.Part2 = "BCA ZUQDR FDEIA BCA KBEWQK PUG UOQ PEODBK." String crypto.Part3 = "CUZALAQ PQXAMRK UOQ EODBK DXA MUB IM BCA" String crypto.Part4 = "KBEQK FOB XM UOQKADLAK."Write a program which reads string and rewrite it in alphabetical order. For example, the word STRING should be written as GINRST.
- Many user-created passwords are simple and easy to guess. Write a program that takes a simple password and makes it stronger by replacing characters using the key below, and by appending "q*s" to the end of the input string. You may assume that the string does not contain spaces and will always contain less than 50 characters. i becomes ! a becomes @ m becomes M B becomes 8 o becomes . Language is CPlease &-. Write a Java program to check if a given string is a palindrome or not. A palindrome is a word, phrase, number, or other sequence of characters that reads the same backward as forward, ignoring spaces, punctuation, and capitalization. For example, "racecar" and "Madam" are palindromes, while "hello" and "Java" are not. Your program should take a string as input and return true if it's a palindrome, and false otherwise. Ik.?Make Camel Case. Create a program that reads a multi-word phrase, and prints the Camel Case equivalent. For example, for input “total account balance” the program shall output “totalAccountBalance”.Notice that the first word is in lowercase (even if it contains uppercase letters). The rest of the words, only their initials are capitalized.
- in java Strings itemToFind and inputItem are read from input. Integer wordCount is initialized with 1. Write a while loop that iterates until inputItem is equal to "Done". In each iteration of the loop: Increment wordCount if inputItem is equal to itemToFind. Read string inputItem from input. Click here for example Note: Assume that input has at least two strings. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 import java.util.Scanner; public class SimpleWhileLoop { publicstaticvoidmain(String[] args) { Scannerscnr=newScanner(System.in); StringitemToFind; StringinputItem; intwordCount; itemToFind=scnr.next(); inputItem=scnr.next(); wordCount=1; /* Your code goes here */ System.out.println(itemToFind+" occurs "+wordCount+" time(s)."); } }Write a program that reads a string and checks the longest substring starting with "a" and ending with "z" included in it. Note that, the substring cannot contain another a or another z in it. For example: Ifs="bcd bbccdd badefgze tabdz", the longest substring is: 6A string is a palindrome if it reads the same from front to back as it does from back to front (e.g. "kayak", "rotator" and "noon" are palindromes). When determining whether an alphanumeric string is a palindrome, we often ignore spaces, punctuation and case in the string (e.g. "A man, a plan, a canal --Panama!" is also considered a palindrome). Write a complete C program to read a string, echo it to the screen, determine whether it is a palindrome, and write a message indicating whether it is or isn't. Your main function should prompt for the string, read the string, print it, call the clean function (to remove all spaces, punctuation, and turn uppercase letters into lowercase letters), print the new string, then call the reverse function (to place the characters into reverse order) and print the new string resulting. In the final step, you will compare the result of the reverse function with the original string and print a message if the string is a palindrome or not. The clean…
- Many user-created passwords are simple and easy to guess. Write a program that takes a simple password and makes it stronger by replacing characters using the key below, and by appending "!" to the end of the input string. i becomes 1 a becomes @ m becomes M B becomes 8 s becomes $ Ex: If the input is: mypassword the output is: Myp@$$word! Hint: Python strings are immutable, but support string concatenation. Store and build the stronger password in the given password variable.Java Program A string is a palindrome if it is identical forward and backward. For example “anna”,“ civic”, “level” and “hannah” are all examples of palindromic words.Write a programt thatreads a string from the user and uses a loop to determines whether or not it is appalindrome Display the result, including a meaningful output message.Biologists use a sequence of letters A, C, T, and G to model a genome. A gene is a substring of a genome that starts after a triplet ATG and ends before a triplet TAG, TAA, or TGA. Furthermore, the length of a gene string is a multiple of 3 and the gene does not contain any of the triplets ATG, TAG, TAA, and TGA. Write a program that prompts the user to enter a genome and displays all genes in the genome. If no gene is found in the input sequence, displays no gene.