Q3/Write c++ program to find summation and average for 20 students , that have this information: st_names, dep, stage, year of study 2020_2021, degrees of five subjects(0.R. , prog. , E, Ar, Math.). use structure.
Q: What exactly is a Compiler?
A: Compiler: The compiler is a program that translates source code into an executable form.
Q: What are the benefits and uses of packages? computer science
A: Packages: A package is a namespace that organizes a collection of classes and interfaces that are…
Q: Explain why XML is extensible.
A: XML stands for eXtensible Markup Language XML was deigned to store and transport data It is similar…
Q: Why is the public-key method of encryption so crucial in internet commerce?
A: IN ELECTRONIC COMMERCE, ENCRYPTION THAT USES THE PUBLIC KEY METHOD IS VERY IMPORTANT : For…
Q: What are the most popular interior and outside routing protocols in today's networks?
A: Foundation: Its internet layer or network layer offers necessary addressing information to enable a…
Q: To demonstrate the notion, provide two examples of internal and external fragmentation. Utilize…
A: Fragmentation: Fragmentation is a problem in computer storage in which storage space, either primary…
Q: 2. Which is semi-decidable? One of the following sets is semi-decidable, and the other is not. Which…
A: The solution for the above-given question is given below:
Q: Which DBMS component is responsible for concurrency control?
A: Introduction: Concurrency control: Concurrency control ensures the serializability of transactions…
Q: Consider the experiment where a penny is flipped, a quarter is flipped, and a 6-sided die is rolled.…
A: In the below step you can find the complete explanation in handwritten.
Q: What is the definition of a popular website? What options are available to small enterprises if they…
A: Website: A group of interlinked and well structured Web pages that exist on the same domain is…
Q: phishing assaults on your network: how to prevent falling victim to their tricks In order to prevent…
A: phishing: Phishing is a sort of social engineering assault that is often used to obtain sensitive…
Q: The Apple Interface Builder in XCode is a complicated tool with many unique capabilities. What about…
A: Interface Builder is a product development tool for Apple's macOS operating system. It is required…
Q: What is the definition of the "Principle of Non-Repudiation"?
A: Introduction: The certainty that someone cannot deny the legitimacy of anything is known as…
Q: What makes Chrome OS computers utilize less internal storage than competing desktop operating…
A: Operating System (OS): OS is the term that acts as an interface between the hardware and the user.…
Q: Database recovery can be done both forward and backward.
A: Database recovery is required in the event of a database instance failure (which is then restarted)…
Q: What makes Chrome OS computers utilize less internal storage than competing desktop operating…
A: Operating System (OS): Operating System (OS): The word "operating system" refers to the software…
Q: are particularly useful with larger teams. Use case diagrams Free form diagrams O Network diagrams O…
A: Let's understand every diagram carefully so that we can know which digram is useful . Use case…
Q: What was the driving force behind the creation of programming languages for computers?
A: Introduction: Computer programming language, for example, is a language for displaying a certain set…
Q: NAME and EXPLAIN in DETAIL the six (6) roles performed by the TCP?
A: TCP: Networking your computers improves their capacity to communicate, and most computers are used…
Q: What are TCP/four IP's abstraction layers?
A: There are Four layers of The TCP/IP Model: Network access, internet, transportation, and application…
Q: fraud in computers: kinds and outcomes What can be done to stop cybercrime?
A:
Q: what are the last two letters ( pronunciation of ed) of these verbs in the box.( hoped, missed ,…
A: Among the words - hoped, missed, laughed, begged, robbed, smelled, ended, presented
Q: What are the possible consequences of a data breach in terms of cyber security? Explain
A: Introduction A data breach occurs when unauthorized parties get access to sensitive information…
Q: Which of the following option is correct about DBMS (Data Base Management System)? Choose an answer…
A: The data is collected from different sources. The raw facts and figures which are collected are…
Q: What is the definition of a popular website? What options are available to small enterprises if they…
A: Enterprise: A for-profit firm or corporation is known as an enterprise, however it is most typically…
Q: Photographs are stored in a database, and the design/structure we've chosen includes some really…
A: That method must be secured to protect all images from malicious actions. We must protect our files,…
Q: al, and technolo
A: Information system is a term used to allude to an organized assortment of symbols and cycles that…
Q: Why Do You Use a Linear Data Structure?
A: Introduction A linear data structure is a data structure in which data components are ordered…
Q: What are the dangers and repercussions of a cyber security breach for a company?
A: Introduction What are the dangers and repercussions of a cyber security breach for a company?
Q: Computer science What are virtual registers? What purpose do they serve?
A: Introduction: A virtual register is a set of fields that are layered on top of a memory, generally…
Q: Which programme loads executable code into the CPU for execution from main memory?
A: Introduction: The executable code is loaded into the programme.
Q: When is it OK to store data in traditional files?
A: Mostly Data redundancy problems occur from traditional files and Inconsistency. In these files…
Q: explain the types in the Interaction Design Pattern
A: The question is to explain the types in the Interaction Design Pattern.
Q: There is thorough coverage of iterated and non-iterated GET requests, authoritative and root server…
A: Initiation: On the Internet, the Domain Name System is known as "the phonebook." Humans may access…
Q: Describe basic C input/output functions. Name and describe standard input and output devices.
A: Hey, since there are a lot of questions, we'll start with the first one. Please only send us the…
Q: What's the difference between procedural and logic programming, and how do they differ?
A: Logic Programming is Declarative, rather that procedural or functional. • Logic Programming…
Q: What are the difficulties in analyzing a system? What are some of the components in examining a…
A: What are the difficulties in analyzing a system? challenges: While working on the system it is…
Q: What is the difference between keeping hashed passwords in a file and using a computer to store an…
A: Password Database: The user's password is concatenated with a static salt and a randomly generated…
Q: Following graph is representing a program, write down, which paths the required tests should cover…
A: That graph shows a program flow. There are some activities/paths or methods i.e A, B, C, D, E, F,…
Q: Describe the features of recursive functions.
A: Introduction: The following are the characteristics of recursive algorithms:
Q: Explain normalised form in a few words.
A: Introduction: The process of building a relational database in normalised form is known as…
Q: What is a port scan, exactly?
A: A port scan can help an attacker find a weak point : A port scan a network server displays which…
Q: Describe basic C input/output functions. Name and describe standard input and output devices.
A: Have been submitted, we will respond to the first one. If you have a particular question that you…
Q: What are the advantages of floating point number over integers.
A: Introduction What are the advantages of floating point number over integers.
Q: How would you describe technology?
A: Introduction: Technology is the application of scientific knowledge to the practical goals of human…
Q: Computer science What is network protocol? Explain the following network protocols (in your own…
A: Introduction: A protocol is a set of rules that govern how data is formatted and processed.
Q: One of the most significant differences between a cell phone and a PDA is that a PDA may be turned…
A: Introduction: In addition to waiting for calls, a mobile phone maintains time synchronisation and…
Q: Describe the relationships between items and how inheritance works
A: Introduction Inheritance is a feature of Object oriented programming languages.
Q: No such port Your uncle has given you a new computer monitor. When you try to connect it, none of…
A: Introduction
Q: Deployment diagrams show the hardware for your system.
A: Introduction: Deployment diagrams are nothing but the UML diagrams that helps in showing the…
Step by step
Solved in 2 steps with 1 images
- MATCH OUTPUT WITH QUESTION OUTPUT --------------------------------------- Write a C++ Program for searching an element on a given list of integers using the Binary Search method.Strictly adhere to the Object-Oriented specifications given in the problem statement. All class names, member variable names, and function names should be the same as specified in the problem statement.Initialize the array size in the constructor of the Search class. Function Description int search(int n, int k) The function defines the logic for searching an element from the given array.If the element is found return '1'. Otherwise, return '0'. Input Format:The first line is an integer 'n' which corresponds to the number of elements in the array.The next 'n' lines correspond to the elements of the array.The last line is an integer 'k' which corresponds to the key element to be searched.Output Format:Print "Element Found" if the element is present in the array otherwise print "Element not Found".[All…Objective: Practice writing recursive functions in python3 Make the five recursive functions described below in python3 by using the starter code recursive_functions.py. For each function, figure out how to solve it conceptually : write down the base case (when recursion stops) and how each recursive function-call moves towards the base case. The functions should not print anything (except you may add temporary print statements to help debug them). You can test your program by using the provided program test_recursive_functions.py. Don't edit the test program. Put it into the same directory (folder) with your recursive_functions.py and run it. It will import your functions as a module, test your functions, and tell you when each function is returning correct results. 1. Factorial In math, if you have a number n, the factorial function (written n!) computes n x (n-1) x (n-2) x (n-3) x ... x 1. For example: 0! is defined to be 1 1! = 1 2! = 2 x 1=2 3! = 3 x 2 x 1=6 4! = 4 x 3…c++ A palindrome is a string that reads the same both forward and backward. For example, the string "madam" is a palindrome. Write a program that uses a recursive function to check whether a string is a palindrome. Your program must contain a value-returning recursive function that returns true if the string is a palindrome and false otherwise. Do not use any global variables; use the appropriate parameter.
- a) Write down a tail recursive implementation of the function sum in python language or programming language of your choice. You may use the helper function in your solution. b) Write down a tail recursive implementation of the function factorial in pythonlanguage or programming language of your choice. You may use the helper function in yoursolution.А C++ program that finds all the ways in which the mouse can move to the cheese and display it with ‘*’. You can get out of a white cube. You can get out of a black cube, but you can't get out of it. Compose a recursive function path (int i, int j), receiving as parameters the coordinates of the current position of the mouse (initially 0.0, and then run with parameters (i-1, j), (i + 1, j), ( i, j-1) or (i, j + 1)).The programming language: C++ The requirements of reports: 1.The algorithm design idea 2.The source code with necessary comments 3.Test case and results (show the screenshot of your terminal); 4.Summary Binary Search [Problem description] Given the grade list of students in a class and your grade, find your position of Ken in the list according to his grade by the binary search method. The grade list is an ordered list and sorted ascendingly. The maximal length of the grade list is 100. [Basic requirements] Use the binary search method. [Example] What you need to show in the terminal(the back part is outputted by you and the blue part is inputted by the user, i.e., teacher): Please input the student grade list: Alice:73 Bob:80Mark:82 David:84 Jenny:89 Maria:93 Please input the grade of Ken: 90 The position of Ken is: 6
- ***Coded in Dr Racket Scheme ONLY (.rkt file)*** #lang racket ***Will downvote if coded in another language*** Write two recursive functions that calculates the leibniz series to 100 terms.In the first version, determine the sign of each term with a named subprogramThe second version of the function that uses lambda instead of a named subprogram.Python only* Use recursive function*. Define concentricCircles with 4 parameters Use def to define concentricCircles with 4 parameters here is the specification for concentricCircles function: It draws a series of concentric circles, where the first parameter specifies the radius of the outermost circle, and the second parameter specifies the number of circles to draw. When viewed as nested rings, all rings should have the same thickness. The third and fourth parameters specify an outer color and an other color, respectively. The outer color is used for the outermost circle, and then every other circle in to the center alternates between that color and the other color. We will test both how many circles are drawn as well as whether the correct circles are drawn in the correct order. Hint: Each function call frame only needs to draw a single circle. Note that you must use the turtleBeads drawDot function to draw each circle Do not use any kind of loop Within the definition of…Python only* Use recursive function*. Define concentricCircles with 4 parameters Use def to define concentricCircles with 4 parameters here is the specification for concentricCircles function: It draws a series of concentric circles, where the first parameter specifies the radius of the outermost circle, and the second parameter specifies the number of circles to draw. When viewed as nested rings, all rings should have the same thickness. The third and fourth parameters specify an outer color and an other color, respectively. The outer color is used for the outermost circle, and then every other circle in to the center alternates between that color and the other color. We will test both how many circles are drawn as well as whether the correct circles are drawn in the correct order. Hint: Each function call frame only needs to draw a single circle. Note that you must use the turtleBeads drawDot function to draw each circle Do not use any kind of loop Within the definition of…
- Which of the following statements are true? Any recursive function can be converted into a nonrecursive function. A recursive function takes more time and memory to execute than a onrecursive function. Recursive functions are always simpler than nonrecursive functions. There is always a selection statement in a recursive function to check whether a base case is reached.Please can be handwritten. Question 2: Implementing a Recursive Function . Write recursive function, recursionprob(n), which takes a positive number as its argument and returns the output as shown below. The solution should clearly write the steps as shown in an example in slide number 59 and slide number 60 in lecture slides. After writing the steps, trace the function for “recursiveprob(5)” as shown in an example slide number 61. Function Output: >> recursionprob(1) 1 >> recursionprob(2) 1 4 >> recursionprob(3) 1 4 9 >>recrusionprob(4) 1 4 9 16Question 2: Implementing a Recursive Function .Write recursive function, recursionprob(n), which takes a positive number as its argument and returns the output as shown below. The solution should clearly write the steps as shown in an example in slide number 59 and slide number 60 in lecture slides. After writing the steps, trace the function for “recursiveprob(5)” as shown in an example slide number 61. Function Output: >> recursionprob(1) 1 >> recursionprob(2) 1 4 >> recursionprob(3) 1 4 9 >>recrusionprob(4) 1 4 9 16