# See the table and answer the question use Python language: Name Dr. ISA Dr. Mohd Dr. Ali Dr. Mousa Dr.Aqeel Dr. Alia Dr. Zainab Email ikamal@gamil.com malomary@gamil.com aaljunaid@gamil.com mabuhassan@gamil.com aalmeer@gamil.com aalbalooshi@gamil.com zhasan@gamil.com Rank Associate Professor Associate Professor Assistant Professor Assistant Professor Assistant Professor Assistant Professor Assistant Professor Extension Room 7684 S40-2110 7669 $40-2100 7690 S40-1114 7658 S40-2094 7682 S40-2116 7931 S40-1106 7029 S40-1110 Q) Write the code used to count the number of records presented in "CEfaculty.csv".
Q: What are the constituents (or types) of Sof Computing techniques ? Explain each in brief.
A: Soft computing It is the converse of hard computing. It alludes to a gathering of computational…
Q: Which one of the following is correct in virtual firewall? A. Two virtual firewalls can communicate…
A: The question has been answered in step2
Q: shows the complete anagram.cpp program. use a class to represent the word to be anagrammed. Member…
A: complete anagram.cpp program. use a class to represent the word to be anagrammed. Member functions…
Q: Write a java method called countA that accepts a String parameter and returns the number of times…
A: Accept string from the user. Call the function countA and print the return value countA function…
Q: Given the timing Diagram below, Construct a truth table and find write the equation for the function…
A: truth table from timing diagram----> A B C D F 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0…
Q: Q.1 What is Bayes theorem? How to select Hypotheses?
A:
Q: Write detailed code for Fibonacci sequence number print in go programming language code and give…
A: The program is written in Go. Check the program screenshot for the correct indentation. Please check…
Q: Consider the following binary 3 5 8 5 1 2 10) 1 7 6 a) List the nodes visited with a preorder…
A:
Q: Explain decision tree
A: IntroductionMachine learning's classification method consists of two steps: learning and prediction.…
Q: 1. Write a C# Sharp program to compute the sum of the two given integer values. If the two values…
A: The code is given in the below step
Q: All print output should include descriptions as shown in the example output below. a. Create an…
A: Python code:- list1 = [] list1.append(1)list1.append(5)list1.append(3) #To the Create list2 and…
Q: Eral clustering? D
A: Solution - In the given question, we have to tell what is spectral clustering and also specify its…
Q: Write an inheritance hierarchy for the classes quadrilateral, trapezoid, parallelogram, rectangle,…
A: _width = Math.Abs(_width); } } public class Rectangle : Parallelogram { public…
Q: The customer needs an application that creates a report telling how many months it will take to pay…
A: As It is not asked to code in particular programing language, we write it in C++. We use while loop…
Q: A signal with 60 milliwatts power passes through a device with an average noise of 6 microwatts.…
A: given, signal is 60 milliWatt passes through a device (1 device) with each average noise is 6…
Q: mplement the loan calculator discussed in class. The application should be able to handle Exceptions…
A: We have to create the loan calculator as given. Below is the code for the same.
Q: Q.7 Give advantages of fuzzy logic controllers.
A: Numerous industries, including control systems engineering, image processing, power engineering,…
Q: Write the code to creates a hierarchical cluster using Python:
A: An unsupervised learning technique for grouping data points is Hierarchical Clustering. The method…
Q: Given the IP address 194.168.10.23 and the subnet mask 255.255.255.240. Find (a) the number of
A: Given IP address : 194.168.10.23 Sub net mask : 255.255.255.240
Q: You’re in a grooming session (in which you’ve agreed that a simple “add a field to the UI” task is a…
A: Questions you should ask before agreeing that it's a 1 1. What does the story entail? 2. What is…
Q: Examining NIC properties in Windows 10
A: Required Tools and Equipment: Your Windows 10 computer Description: When you describe a NIC as a…
Q: Could you do typing the query here please?
A: To find customers with different order numbers, you need to join the table dbs211_orders with…
Q: Problem 1 Consider language L = {(M) | M loops on at least 2 inputs } Prove HALT ≤m L, Note, HALT…
A: The question has been answered in step2
Q: 150. Write a C# Sharp program to create a new list from a given list of integers removing those…
A: logic:- create a list and insert above elements. Create another list. Iterate previous list and…
Q: Demonstrating Recursion in a Binary Search
A: The goal was to locate a specific cell in an ordered array with the fewest possible comparisons. The…
Q: 2. Create 10 subnets in 10.10.100.0/24 a. What is the network address for subnet #7? b. What is the…
A: Here is the explanation of the above problem. See below steps.
Q: Given a point p and a vertex v of a convex polygon P in the plane, give an algorithm to classify in…
A: Convex Hull:- Convex Hull is defined as the smallest convex polygon/set of points such that all…
Q: Which of the following is another expression of the IPV6 address…
A: The IPv6 address is represented as eight groups of four hexadecimal digits, each group representing…
Q: Using JAVA code: Please make a graphical interface that will convert infix to postfix expression.…
A: The program is written in Java. Check the program screenshot for the correct indentation. Please…
Q: 1 name ('Mary') 2 password = 'swordfish' 3 if name == Mary: 4 5 6 7 8 = print ('Hello, Mary') if…
A: indentation is important in python make sure you give correct indentation in your program you have…
Q: writing a Python program
A: Given :- In the above question, the statement is mention in the above given question Need to write…
Q: 2. How you can use a stack to efficiently check if a String of length n is a palindrome? What is the…
A: The JAVA Code is given below with code and output screenshot Happy to help you ?
Q: Java Write a program that reads all words in a file and prints out how often each word occured.…
A: To count occurance of each word in a file using HashMap.
Q: What kind of message is used to exchange information between switches to create a loop-free tree?…
A: Root switch of the network generates the Configuration BPDU. Configuration BPDU is sent by root…
Q: Create the following matrix by using vector notation for creating vectors with constant spacing…
A: linspace command:- Vectors that are evenly spaced are produced by the linspace function. Compared to…
Q: After the SHR instruction is executed in the code sequence below, what is the final value for AL?…
A: The final value for AL: MOV AL, 1010_1111b SHR AL,2 while doing the shift right instruction highest…
Q: Q.8 What are the applications of fuzzy logic ?
A: 1) Fuzzy refers to things that are not clear or are vague. Many times we encounter a situation when…
Q: After the SHR instruction is executed in the code sequence below, what is the final value for AL?…
A: We need to find the correct option regarding the given assembly statement.
Q: What are the applicat
A: Fuzzy logic: Fuzzy logic is a type of many-valued logic where the truth worth of variables might be…
Q: Suppose function main wants to invoke function max0f6 and store the result in rcx. Which of the…
A: - We have to figure out the line which will follow the instruction :: callq max0f6 - A functions…
Q: State and explain types of information security threats
A: It is crucial to first comprehend what cyber security threats are. Cyber security threats are any…
Q: List any 4 communication technologies that are used by end users
A: Answer is
Q: f its code enhanced to run 2.3
A: Solution - In the given question, we have to find the overall system speed.
Q: Section: Fact Thyroid function is measured using a factor called TSH, which stands for…
A: The answer is given below. Algorithm: Start. Input the TSH value. If value greater than 5.0, print…
Q: they [0.4] 74153 chips have two 4-1 multiplexors, selector bits, so they are not entirely…
A: This is beneficial because it allows the two MUXs to share the same selector bits. This saves on…
Q: d hiker keeps meticulous records of their hikes. During the last hike that took exactly steps, for…
A: Lets see the solution.
Q: What is the contents of the chain referenced by firstNode? none of these is correct 0247-3 a…
A: JAVA linked lists are just dynamic arrays which have 2 data members associated with each node, one…
Q: Explain concepts of weak and eager learner.
A: Weak learner Don't learn anything from the data set; just store it. When test data is received,…
Q: What technology could replace CCD in some future scientific applications? The LDCs The CID The…
A: CCD sensors are being gradually phased out in favor of CMOS sensors.However, there are distinct…
Q: Q.4 List the advantages and disadvantages of decision tree.
A:
Step by step
Solved in 3 steps with 1 images
- + x Online C++ Compiler - online ed + X Menu Path2Code x (1) WhatsApp x Second Semester 2021: al نافذة ضيف path2code.com/p2c/suser/question/read.php?testid=tv816K2r1315sFiP8hfhXepWziksjMuOaTE943AZ.FY-&qid=3KmKN94Igy2S2UV2nv7psw-- A O Challenge task Write a C++ program that reads user's choice as single character then do the following: • If the user entered (A), your program should read a long positive number, and display the positive difference between the first and last digits (the positive difference between the most right digit and the most left digit) i.e. If the number is 5635634, the program should display 1 (5-4-1). If the number is 3635637, the program should display 4 (7-3=4). • If the user entered (B), your program should read 9 integer numbers, then find and print the sum of the odd numbers. • If the user entered (C), your program should read two integer numbers, add three to each of them, swap their values, and print them after swapping. • If the user entered any other…Q2:A company supplies a Tax Returns Automation process to its clients, visiting their sites andinspecting their revenues for a given year, giving advice and completing the necessary formsfor Tax Returns purposes. Once the forms have been completed, they are saved as papercopies; one is kept by the client, the other is filed locally within the company’s paper-basedarchives. The corresponding electronic copies are also saved in a word-processor format andsaved on a local computer.The company is seeking to develop a more fully automated process: the tax consultantvisiting the client's premises periodically would log-in to an on-line application (within thecompany website) and input the data to an on-line form. The data collected would be usedto keep the clients informed of the results of the consultant’s visits and the date of the nextvisit.Considering the above scenario:a) List and describe at least THREE possible risks that the company will be likely to facewhen the new more…Description Greetings! Task: Write a program that will ask for the user's name and output their name mixed with a command line argument given as the greeting. Command line args will be formally introduced next week, however, you're encouraged to do some of your own research for this challenge! Python docs: https://docs.python.org/3/library/sys.html#sys.argv PYTHON 1 import sys 2 3 # e.g. $ python main.py foo bar 4 # Arguments would contain: 5 6 sys.argv[0] # => main.py 7 sys.argv[1] % => foo 8 sys.argv[2] # => bar Your program should read the greeting from command line arguments, ask the user for their name, and then output a custom greeting, like so: Example 1 $ python greet.py Yo! What's your name? Jamal Yo! Jamal Example 2 $ python greet.py "G'day" What's your name? Summer G'day Summer Tip: For G'day, be sure to include in double quotes, so Bash treats it as one argument.
- What are the advantages of a File System Web site over an HTTP Web site? What are the differences between inheritance and encapsulation?Automatic generation of Databases: Python Would anyone have some tips/pointers on writing some code that takes an input file (csv) that contains a number of columns and rows such as Job title, Salary etc. but does not have information such as Name, Address, phone number etc. I have been messing around with the Python Library 'Faker' which has been doing well but I need some advice on making the overal user experience look better. Could someone recommend a good GUI library/package to test with. I love the look of Tableau Dashboards. I would like to be able to display possibly two to six different algorithmic stats to generate the fake data to then be saved in a new output file.A little bit of a strange question I know but any tips greatly appreciated :DPlease implement the following design using Java, C#, or C++. observers Subject subscribe (Subscriber) unsubscribe (Subscriber) notify() GameBoard state getState() playMove ( * Observer update() MatchView gameBoard update()
- Computer Science Assume you are part of a project to develop a novel customized online standalone chatting application for a company. The chat is supposed to support text, audio, video messages; it is also intended to support video and audio streaming. Your role in the project is to coordinate the networking team (efficient data transmission). Other teams handle other parts, such as interface and video capture. Your team's target is also to create your own proprietary library, not relying on other proprietary or open libraries, except the socket API. (i) Describe the structure of your application in general. Will it be a client-server or P2P application? How do clients find the server or each other? Do clients need to connect to the server or each other? (ii) What type(s) of sockets do you need to use in your application? Justify your answer and give example(s). (iii) Do chat media require reliable, in-order packet transfers? If yes, which types of media from the description need it?…In python or perl what is an example script that I could use that would get information from a website link and allow me to input a persons name and have all the content printed out to a text file. regular expression would be used as well. The format of the website would be something like this: CLASS101 10-11:30 David CLASS102 9-10:30 Brown CLASS103 12-1:30 MarkUsing p5* JavaScript on "openprocessing" website
- Explain the distinction between an application programming interface and an application binary interface.Explain 90 word only What is an Interface?QuestionNo:2 Develop a C Program to design the Home page of Billing Software System project like followin Customer Billing Software System ############### Select your Item what you need: ##########################: 1.Computer - 125.500 Rial 2. Table 3.Printer - 17.500 Rial 4.Projector - 85.500 Rial #%##%#3%#3%#3%#3%23%23%#3%#############2# 23%#### ### ##3#3%#3 25.500 Ria1 === Project Developed by 62j12345 - Ahmed DrARajalingan-UTAS-Shinas I I|m I|