Write a program that will compute for the salesman's commission based from his total sales for the month.
Q: What are the main differences between the OSI and TCP/IP protocol models?
A: Answer:
Q: (Q1):A) Answer the following questions: 1- Current Directory Browser used to? 2- For replacing the…
A: In this question we have to provide answer for the related question with MATLAB program Let's answer
Q: 1) Consider that you have a graph with 8 vertices numbered A to H, and the following edges: (A, B),…
A: Given a graph with 8 vertices numbered A to H and given its edges. we draw a graph for the given…
Q: Problem 4 Write a paragraph to describe your understanding of hash tables in your own words. Give…
A: Hash Table is a data structure which stores data in an associative manner. A hash table is a special…
Q: These models help us to better understand how networks work and how information may be shared (the…
A: Given: Both the OSI Model and the TCP/IP Model are essential resources for gaining an understanding…
Q: What are the many inputs and outputs of the software system design process?
A: A software system is a group of software-based parts that work together and are part of a computer…
Q: What is the concept of an infrastructure-based wireless network? Other than infrastructure, what…
A: The Answer start from step-2.
Q: Oracle database backups using RAID storage? Because handwriting is hard to read, content should be…
A: SOLUTION: Low-Cost Redundant Array (RAID) RAID combines multiple discs into one array. These discs…
Q: Is it possible to determine whether or not a given graph is linked using DFS? A step-by-step…
A: Given: Using DFS, can you identify whether a graph is related? If you can discover it, explain it…
Q: A lack of integration in the information system leads to a variety of issues that need to be…
A: Given that an unintegrated information system creates several problems that must answer, it is…
Q: Add the following binary values: 10101010 11111110 O 111101110 O 110101110 O 111111000 O 110101000
A: binary addition activity works in much the same way to the base 10 decimal framework, then again,…
Q: It's important to understand what an infrastructure-based wireless network is and how it works. When…
A: Base stations (BSs) or access points (APs) are two types of infrastructure-based networks that…
Q: List the arithmetic operators used in BASIC and state their priorities of execution in a statement.…
A: The four basic arithmetic operators are addition for sum, subtraction for difference, multiplication…
Q: Model-driven engineering's advantages are well-known, but how successful is it in actual use?…
A: Model-Driven Engineering: Model-driven engineering, often known as MDE, is an approach to software…
Q: What is a model in the context of System Analysis? Use logic and physical models to distinguish…
A: In system analysis, the design, definition, and analysis of a model may be used to relate particular…
Q: False True Select one: 4ɔļļms joļsisvej e isnĺ Ájdwës si jajdwes
A: Answer: A Transistor switch, which is utilized for opening or shutting of a circuit, that implies…
Q: Discuss the evolution of information systems while focusing on the significant people and events…
A: Given: Discuss the development of information systems, focusing on the significant individuals and…
Q: JAVA Write a METHOD named friendList that accepts a file name as a parameter and reads friend…
A: import java.io.File;import java.io.FileNotFoundException;import java.util.*;//class definitionpublic…
Q: What kinds of Database Schemas and Designs have we become familiar with so far? What are our goals…
A: A well-designed database allows for quick access to data. When picking a database architecture,…
Q: Consider who would be interested in using your warehouse's data. There are a number of ways to…
A: Warehouse of data: Users will be able to access enormous amounts of data quickly and simply using a…
Q: Do you have any thoughts on the current state of the internet and the technology that supports it?
A: The Transmission Control Protocol/Internet Protocol Suite, more often known as TCP/IP, is a standard…
Q: What is the significance of an IP address? An easy-to-remember address is called a mnemonic address.…
A: What is the significance of an IP address?An easy-to-remember address is called a mnemonic address.…
Q: A piece of software that handles a certain duty, such as screening for viruses or compressing data…
A: Computer software, sometimes known as software, is a set of instructions and documentation that…
Q: You need to know in code how to tell if you've picked a RadioButton or a CheckBox control.
A: In code, use a CheckBox or a Radio Button control: Select from the following Radio Button and…
Q: please code in python The following code defines a list of names and also contains a header for the…
A: Find the required code in python given as below and output :
Q: Access to shared memory is simplified in multiprocessor systems. Clusters and grids don't have…
A: Answer: The server creates a shared memory map in its address field and regains access to sync…
Q: Exactly when does antivirus software begin to load during the startup process?
A: The above question that is when does antivirus software begin to load during startup process is…
Q: We'd appreciate it if you could identify any three protocols that are unsecure or prone to attack…
A: Three network protocols that are susceptible to attack must be turned on. The three procedures are…
Q: Make a C program that will prompt the user to input a number from 1-5 and will output its equivalent…
A: The required code for the C program is given below with comments using switch statement and I/O…
Q: 5. Placing a new order whenever the inventory level drops to a specific re-order point is kno a.…
A: The answer is given below:
Q: (a) Why do you think there is an extend» relationship between the two use cases *Search client…
A: Note ?as per our company guidelines we are supposed to answer ?️only first 3️⃣ sub-parts. Kindly…
Q: Is it possible to create an extension without using any specific software? Give examples of each.
A: Explanation There are many different file types on your computer, each with its own file extension.…
Q: What is software that scans for viruses, compresses data, or backs up files called?
A: Utility Software The Utility Software is system software that helps to maintain the proper and…
Q: What does division mean in the context of the cyclic redundancy check (CRC) decoder for two cases?
A: R (Redundancy Check): R is an alternative way to determine whether a frame contains valid data. This…
Q: ow many types of input characters are accepted by this algorithm? a) one b) two c) three d) four
A: Three types of input characters are accepted by this algorithm.
Q: Write a c++ program using class
A: In the above code, it has been asked to print the factorial number out of the two numbers, in the…
Q: When A and B contain the values shown below, give the value of C vector after executing the…
A: + operation on vectors: To add two vectors of same dimensions use the + operator. If the dimensions…
Q: Java programming Computer science I need help with problem 2, The remove method removes a node My…
A: The heap is a memory used by programming languages to store global variables. By default, all global…
Q: Normalize following relation up to 3NF: Bank(acno, cust_name, ac_type, bal, int_rate, cust_city,…
A: According to the information given:- We have to Normalize following relation up to 3NF.
Q: The following instruction is used for: GPIO PORTA_DIR_R&= -0x20; Select one:
A: "&=" specify input If there is "|=" instead of "&=" . It means direction output . The I/O…
Q: This article explains what a file extension is and which software packages are responsible for…
A: A file extension, commonly referred to as a file name extension is the last part of a file name that…
Q: the following protocol used to Synchronous serial interface Select one or more: O 0 O a. interface…
A: Given question are multiple choice selected question.
Q: What exactly does it mean to say that anything is an information system? Define and explain the…
A: Information system: An information system is a term that is used to refer to an integrated…
Q: Use Input to print "< =" and stop the program until the user enters a value and presses the Enter…
A: #include <iostream> using namespace std; int main() { cout<<"Do you want to stop :…
Q: statement using infix evalu
A: Solving the infix expression
Q: What is the concept of an infrastructure-based wireless network? Other than infrastructure, what…
A: When operating in infrastructure mode, each wireless host is connected to the remainder of the…
Q: What are the distinct software system design process inputs and outputs?
A: Successful projects are well managed. In order to manage the project effectively, the manager or…
Q: A look at how technology has shaped the internet's development.
A: Development of the internet and the underlying technical concepts will be described ; ARPANET…
Q: Which protocol layer is best suited for security services? The service should state whether or not…
A: Given: Security is a service that protects the security of systems or data transfers using an open…
Q: What is the difference between reloading a service and restarting it
A: Difference between Reloading and restarting service of linux are as following:
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Write a program calculate the average for 20 student that have these information. using structure averag sum mati St_na stage Year dep study degrees e mes O.R. Prog. Arb Math on 65.66 65.66 65.66 65.66 65.66 ali 1 2020- 1 2021 65.66 65.66 65.66 65.66 65.66 ahme 1 2020- 2021 1 d. 65.66 65.66 65.66 65.66 65.66 abba 1 2020- 1 2021Write a program that uses random function to randomly generate 6 integers between 0 and 99 with 0 and 99 included. Save them in a Bag. Ask a user to make a guess. If the user’s guess is one of the numbers in the Bag, then give user 10 points and remove the number from the Bag. Allow the user to make 10 attempts. Each time give user 10 points if the number user guess is in the Bag. If the Bag is getting emptied before the user reach 10 attempts, then give user an additional 200 points and terminate the program (Game is over!). If the Bag is not empty after the user use up all 10 attempts, then display the user’s score and terminate the program (Game is over!). **Note** I am having trouble figuring out the 10 attempts and random numbers part of the program.The SRC of AIT is trying to find out the eligibility of voters in the school for an upcoming election. On a trial bases you are tasked to come out with a program that request for: i. A student’s program of study ii. Students Year of Admission iii. A student should be eligible to vote if he/she has a valid student ID and the admission year should be between 2019 and 2021. Write an algorithm for this program
- Implement the function total_price, which takes in a list of prices of individual products and needs to find the total price. Unfortunately, any product that is priced greater than or equal to $20 has a 50 percent tax, so include that in the final price. Try to do this in one line! Cast your final answer to an integer to avoid floating point precision errors. For example, if x contains your final answer, return int(x)! def total_price(prices): Finds the total price of all products in prices including a 50% tax on products with a price greater than or equal to 20. >>> total_price ([5, 20, 30, 71) 87 total_price([8, 4, 3]) >>> total_price ([10, 100, 4]) 164 >>> 15 "*** YOUR CODE HERE ***"Write a program that reads an integer age of kids, finds the maximum of them, and counts its occurances, finds the minimum of them, and counts its occurances. And Find the average ages. Assum that the input ends with number -1.A kidnapper kidnaps you and writes a ransom note. He does not write it by hand to avoid having his hand writing being recognized, so he uses a magazine to create a ransom note. We need to find out, given the ransom string and magazine string, is it possible to create a given ransom note. The kidnapper can use individual characters of words. Here is how your program should work to simulate the ransom problem: ▪ your program should prompt the user to enter a long String to represent the magazine and another short String to represent the required ransom note. ▪ your program needs to check if the magazine string contains all required characters in equal or greater number present in the ransom note. ▪ your program should print true if it is possible to create the given ransom note from the given magazine, and print false otherwise. ▪ Break up your code into a set of well-defined functions. Each function should include a comment block that briefly describes it, its parameters and…
- Write a program that reads a list of scores and then assigns grades *10.1 based on the foilowing scheme: The grade is A if score is >= best - 10. The grade is B if score is >= best- 20. The grade is C if score is >= best - 30. The grade is D if score is >= best - 40. The grade is F otherwise. Here is a sample run: Enter scores: 40 55 70 58 Student 0 score is 40 and grade is C Student 1 score is 55 and grade is B Student 2 score is 70 and grade is A Student 3 score is 58 and grade is B EnterWrite a program that reads two matrices of integers. It then generates the sum, difference and productof the two matrices.The sum of the two matrices of the same size is a matrix with elements that are the sums of thecorresponding elements of the two given matrices. Addition is not defined for matrices of different sizes.If A and B are matrices of the same size, then we define subtraction as follows: A – B = A + (-B). Thus, tosubtract matrix B from matrix A, we simply subtract corresponding elements.To multiply a matrix by another matrix we need to do the "dot product" of rows and columns. The "DotProduct" is where we multiply matching members, then sum up:(1, 2, 3) • (7, 9, 11) = 1×7 + 2×9 + 3×11 = 58We match the 1st members (1 and 7), multiply them, likewise for the 2nd members (2 and 9) and the3rd members (3 and 11), and finally sum them up.Write a program that reads two matrices of integers. It then generates the sum, difference and productof the two matrices.The sum of the two matrices of the same size is a matrix with elements that are the sums of thecorresponding elements of the two given matrices. Addition is not defined for matrices of different sizes.If A and B are matrices of the same size, then we define subtraction as follows: A – B = A + (-B). Thus, tosubtract matrix B from matrix A, we simply subtract corresponding elements.To multiply a matrix by another matrix we need to do the "dot product" of rows and columns. The "DotProduct" is where we multiply matching members, then sum up:(1, 2, 3) • (7, 9, 11) = 1×7 + 2×9 + 3×11 = 58We match the 1st members (1 and 7), multiply them, likewise for the 2nd members (2 and 9) and the3rd members (3 and 11), and finally sum them up.Use the following definitions:#define ROW 6#define COL 6void add (int matrixResult[] [COL], int matrixA[] [COL], int matrixB[][COL],int row, int…
- Program in C++ or Java Simple simulation to estimate your likelihood of winning in a game of poker. Assume the game has 6 players.• Repeatedly (500-1000 times):◦ Shuffle the 52-card deck, and deal yourself a 5-card hand.◦ Repeatedly (500-1000 times): ▪ Using the remaining 47 cards, deal the other 5 players their hands ▪ Determine if you would win or lose that hand; that is, if your hand would rank highest.2 Update some counters accordingly. ▪ Reshuffle the deck of 47 cards ◦ Record the proportion of the above hands which you won.• For each rank of hand, report the percentage of hands having that rank, and the average winning percentage (average of the averages) for each rank. Produce 2 output files• A session log output as a CSV (comma-separated value) file, with each hand on a separate line. For each hand: the cards in the hand; what the hand was evaluated as; and its winning percentage.• A summary showing the percentage of hands falling into each rank, and the overall win…Program32.java Write a program that prompts the user for any day of the week. Report the entered day as either a weekend day, or not. Use a switch and "stack" cases that require the same report as shown on page 103. Your program should handle bad inputs, too. Program33.java Write a program that generates a random Fahrenheit oral temperature between 92 and 108, inclusive. Print the temperature, and then report whether the temperature indicates a fever or not using a conditional operator as on page 105. An oral temperature above 100F is feverish. Program34.java Write a program that prints the ordinal for a random integer from 0 to 100, inclusive. Example ordinals might be 31st, 62nd, 43rd, 55th. Program41.javaWrite a program that prompts the user to enter a full name consisting of three names (first middle last) into one String variable. Then use methods of class String to: print the number of characters in the full name, excluding spaces print just the middle name and the number of…This is a JAVA programming assignment. Program a GeneticAlgorithm to find an integer number between 0 and 31 that maximizes the function f (x) = x2.The initial procedure is given as below.• Population size: 6• Crossover probability: 100%• Mutation probability: 5%• Terminating criteria:o When your program produces an average of candidates is equal to or greater than29, then you can accept it as a terminating condition.• Fitness function:o You can use the function itself (f (x) = x2)as your fitness function.1. For the 1st generation, you need to print the process and result of selection, crossover, andmutation operation.you need to print the corresponding integer values and bits (binary values)of selection, crossover, and mutation operation. You also need to decide andprint the crossover point and the mutation point.2. From the 2nd generation, you do not have to print all results of selection, crossover,mutation operations. You can just print the result of each generation. Please provide…