3.8 Declare a string variable containing the name of your favorite color, initialize it as a null terminated string.
Q: Functions f(x)= x + 2 and g(x)=x²-2x Evaluate (g. g)(-1) 03 -3 05 08 O
A: The following solution is
Q: List the justifications for why a company could want firewalls for physical security measures.
A: Firewall - A firewall is a network device that offers network security based on security policies.…
Q: a. Write an algorithm (step by step procedure to solve the problem) b. Draw a flow-chart c. Write a…
A: Introduction:- C language is a programming language. The Father of C programming is Dennis Ritchie.…
Q: Describe the various VPN types, as well as the technology, protocols, and services that are utilized…
A: The term VPN refers to a virtual private network. Vpn stands for virtual private network, and it…
Q: 3.2 Write a program that contains two instructions: (1) add the number 5 to the EAX register, and…
A: Source Code: The code instructions are as follows: INCLUDE Irvine32.inc.codemain PROC ; consider the…
Q: Identify five (5) threats to modern security architecture and design and Identify the possible…
A: a) The five threats that can occur to the security are: i) Malware: A cybercriminal can inject your…
Q: P and Q are two processes that share a set of variables that is common. The variable includes: seq,…
A: Here either of the process can execute first. Also a process can be preempted by another process.…
Q: JAVA Programming Write a function that returns true if you can partition an array into one element…
A: In this problem we need to design the JAVA program. Input - Array Ouput - Boolean Logic -…
Q: Please convert following figure into a relational schema. In each table, the primary key and foreign…
A: Here the BankBranch entity is a weak entity and therefore we need to include the primary key of Bank…
Q: A nonpipelined processor has a clock rate of 2.5 GHz and an average CPI (cycles per instruction) of…
A: Answer:-
Q: Write a python program to find the potentia energy using the total energy & kinetic energy. All the…
A: I have mentioned answer in below Description : Total energy=potential energy + kinetic energy…
Q: Someone has attempted to censor my strings by replacing every vowel with a *, 1*k* th*s. Luckily,…
A: Someone has attempted to censor my strings by replacing every vowel with a *, 1*k* th*s. Luckily,…
Q: In your own words explain what is Concurrency? Use a concrete example in your explanation. No…
A: According to the information given:- We have to define Concurrency and use a concrete example.
Q: PYTHON!! Solve problem by using PYTHON Program to remove the ith occurrence of the given word in…
A: I have mentioned program code and ouput screenshots in below steps, please find in below
Q: Write c# function code to return sum of 3 numbers provided as parameter
A: HI THEREI AM ADDING C# FUNCTION CODE BELOWPLEASE GO THROUGH ITTHANK YOU
Q: Your task is to create a function that simulates a vending machine. Given an amount of money (in…
A: function vendingMachine(products, money, number) { let coins = [500,200,100,50,20,10], result =…
Q: JAVA Problem Create a function that determines whether elements in an array can be re-arranged to…
A: Algorithm - Take one string as input. Now use the below logic return (arr[arr.length - 1] -…
Q: Given a string, reverse all the words which have odd length. The even length words are not changed.…
A: function reverseOdd(str) { const arr = str.split(" ") const results = []; for(i=0;…
Q: In a royal casino, there is a lottery at 134 number card. If a person is playing that game, find the…
A: Here I have created an array and then used a loop to traverse each element of the array. Inside the…
Q: Write a program in C to count the total number of alphabets, digits and special characters in a…
A: The program is written in C Language. Check the program screenshot for the correct indentation.…
Q: 1 a. If the last operation performed on a computer with an 8-bit word was an addition in which the…
A:
Q: Write a Java program that stores the names of two cites in a single dimension array, and their…
A: Below is the complete solution with explanation in detail for the given question in Java Programming…
Q: What belongs in the XXX and YYY in the statement below in order to generate a random number between…
A: Random generator = new Random(); generator.nextInt(XXX) - YYY; nextInt() method in Random class will…
Q: The odd numbers are the numbers in the sequence 1,3,5,7,9,.... Define the sequence of S-numbers as…
A: Given: Odd Numbers sequence. The S-number sequence is as follows: First S-number is 1. Second…
Q: Fixed-price contracts, where the contractor bids a fixed price to complete a system development, may…
A: Answer :
Q: What effects will the internet of things (IoT) have on how we live our lives? Give an illustration…
A: IoT The Internet of Things (IoT) is an arrangement of interrelated registering gadgets, mechanical…
Q: How about demonstrating and outlining the actual use of virtual servers and services?
A: Virtual servers mimic the functionality of physical dedicated servers. You can deploy multiple…
Q: WHat would be the code using just the Tkinter import to create a simple survey with the question…
A: Python allows programmers to create graphical applications using the Tkinter library. This library…
Q: What fundamentally distinguishes the telephone network from the Internet?
A: In the given question the internet and telephone networks are both switched networks, with circuit…
Q: 1. Do you think that Sony's response to the attack was appropriate? Why or why not? 2. What…
A: Here we have given solution for the multiple question asked. you can find the solution in step 2.
Q: How about demonstrating and outlining the actual use of virtual servers and services?
A: A virtual server should ideally mimic the features of a dedicated server. It is possible to run many…
Q: Use 4-bit version(result 8-bit), do the division with the given data: 9 (dividend) and 3 (divisor).…
A: Restoring divisor algorithm gives a quotient and a remainder when two numbers are divide.
Q: What is an abstract class?
A: The question is to define abstract class.
Q: Question 6 What would be the config of a computer (Address bus and Data Bus) to support a 32-bit…
A: Data bus means the size of processor register and address bus used to transmit the location of…
Q: Question 14 of 20: Seker te best an 14 Use Gauss-Jordan elimination to solve the following linear…
A: Gauss Jordan method is a matrix form method in which row reduced and element get eliminated…
Q: 1 Question 1 A Deep Neural Network is shown in Figure 1. The aim of this network is to classify…
A: Since you have posted a question with multiple sub-parts, we will solve first three sub parts for…
Q: Q1. 4X₁ + 3X₂ + 5X3 = 4 3X₁ + 2X₂ - 4X3 = 7 -2X₁₂ + 4X₂ + 3X3 = 5
A: “Since you have asked multiple question, we will solve the first question for you. If you want any…
Q: Suppose three algorithms A, B, and C, can be implemented to perform a task. The algorithms have the…
A: Algorithms are judged based on their time complexity a lot. The algorithm which takes the least…
Q: Discuss the benefits and drawbacks of utilising HRIS.
A: In the given question HRIS means Human resources information system software is helping companies…
Q: What are the 3 rules of defensive programming?
A: Introduction A computer program is a bunch of guidelines that are run on a computer to do specific…
Q: Write a program in C to count the total number of words in a string. Test Data : Input the string…
A: Find total number of string in given sentence or paragraph using c programming. For example:- Input…
Q: A processor's primary structural components should be mentioned and briefly characterised.
A: Introduction In this question, we are asked that A processor's primary structural components ought…
Q: Hello. Can you assist with the folliwing Q.1.1. List four phases of the project life cycle from…
A: project management process having includes four phases: initiating, planning, executing, closing.
Q: Using string manipulation. Write an Assembly Language program that will replace all vowels in the…
A: Summary Instructions for manipulating strings in the 8086 microprocessor A string is a series of…
Q: What exactly are virtual computers, what can you do with them, and what advantages can they offer?
A: A virtual computer or machine is essentially software that simulates a computer and runs…
Q: Hi, I need help drawing a conceptual map (or a mind map) about the blockchain, its applications and…
A: According to the information given:- We have to define drawing a conceptual map (or a mind map)…
Q: a. If the last operation performed on a computer with an 8-bit word was an addition in which the two…
A: Your answer is given below with solution as you required.
Q: A number is said to be Harshad if it's exactly divisible by the sum of its digits. Create a function…
A: A number is called Harshad if it is exactly divisible by the sum of its digits. logic- return i ==…
Q: How can the practical use of virtual servers and services be shown and explained?
A: Virtualization is becoming more substantial in the world of innovation as people realize how it may…
Q: Assume the following C code is stored in a file named main.c. Please split it into two files where…
A:
Step by step
Solved in 2 steps
- Homework 10-2 Programming Challenge: 12 - Password Verifier Use the string data type. Do not use arrays of type char or any functions in the old "C String" libraries. Six characters? Seriously? Set the minimum password length to twelve characters. We will also require that the password not contain any space characters. In addition to the requirement that the password contain at least one upper case letter, one lower case letter, and one digit, add the additional requirement that the password contain at least one "special" character. We will consider any character that is printable, not alphanumeric, and not a space character to be "special." That includes punctuation, but may include additional non-punctuation characters. Unfortunately at our level of C++ it's more or less impossible for us to actually test passwords like Señor_99 but the ñ (with a tilde) would count as a special character using our rules. Write functions to complete these tasks as appropriate.Task 1: Signup SystemIn the StringAssignment.c file there are two global arrays of String namely emailArr and passArr.Implement the function signupUser() that takes two String as input, one for user email and another for password. You need to do the following checks:1. Is the email in valid format? 2. Does the password contain at least 8 characters?3. Does the password have both uppercase and lowercase letters?4. Does the password contain digits?5. Does the password contain any of the special characters ($ # * @)?If any of the checks returns false, the signup will not be successful. In that case you need to show proper error message, and return FAIL_VAL. Otherwise, the signup will be successful if all of these checks return true. In that case show success message, return the array index, and store the user email and thepassword into emailArr and passAarr respectively.N.B. You need to discard duplicate signup.Task 2: Login SystemImplement the function loginUser() that takes two String…Task 1: Signup SystemIn the StringAssignment.c file there are two global arrays of String namely emailArr and passArr.Implement the function signupUser() that takes two String as input, one for user email and another for password. You need to do the following checks:1. Is the email in valid format? 2. Does the password contain at least 8 characters?3. Does the password have both uppercase and lowercase letters?4. Does the password contain digits?5. Does the password contain any of the special characters ($ # * @)?If any of the checks returns false, the signup will not be successful. In that case you need to show proper error message, and return FAIL_VAL. Otherwise, the signup will be successful if all of these checks return true. In that case show success message, return the array index, and store the user email and thepassword into emailArr and passAarr respectively.N.B. You need to discard duplicate signup.Task 2: Login SystemImplement the function loginUser() that takes two String…
- Q2-Write a C++ code to print the below table by creating which has int value 'Age' moreover to two arrays which have string variables and its names 'Name 'and 'Profession Name Michael Robert Julia Jo Profession Artist Computer Engineer Indoor Actor Designer Age 19 34 27 21(21) 2. Write a Java application that asks the user to enter a car model or 'done' when finished. If the user enters a car model, ask the user to enter the color of that car model. Store the cars and colors in ArrayLists of type String. When the while loop completes, use a for loop to print out the car and color as shown below: Enter a car or 'done if done: Camry Enter color of car: White Enter a car or 'done' if done: Accord Enter color of car: Blue Enter a car or 'done' if done: done car: Camry, color: White car: Accord, color: Blue7. Which one should be executed so that the fifth element in Y to be FF if Y is an array of words? mov Y+5, FFh mov Y+4, FFh mov Y+10, FFh mov Y+8, FFh None of the mentioned.
- Q1 Write a C++ program that declares three arrays, Mark1, Mark2, Result. and carries out the following: 1. Allow the user to fill mark1 and mark2 with 5 integer elements. 2. Find the average of each two corresponding elements of the two arrays mark1 and mark2 then compare the average with 60. If the average is greater than or equal to 60 then fill the corresponding element of the third array with the character (P), Otherwise, file the corresponding element with the character (F). Mark1 70 50 66 90 Mark2 60 30 70 80 60 Result 40 LLGRADEBOOK PROJECT Attached Files: Gradebook.docx (18.278 KB) Gradebook Practicla Project: use the attached code as an exaple and modify where neccesary to fit your situation Write a program that uses an array of string objects to hold the five student names, an array of five characters to hold the five students' letter grades, and five arrays of four doubles to hold each student's set of test scores. The program should allow the user to enter each student's name and his or her four test scores. It should then calculate and display each student's ayerage test score and a letter grade based on the average. Input Validation: Do not accept test scores less than 0 or greater than 100. Use the following test score grades Test Score Letter Grade 80-100 -> A 70-79 -> B 60-69 -> C 50-59 -> D OO HUAWEI P30 lite TRIPLE CAMERA Activate Windows dolto vers1. Which of these is an incorrect Statement? a. Array can be initialized using comma separated expressions surrounded by curly braces b. It is necessary to use new operator to initialize an array c. Array can be initialized when they it is declared d. all of the above
- Q1) Write a program that • Asks for a natural number (Assume that number is n) • Draws the following triangular shape with n lines of numbers. Example: (n = 5) 1. 2 1 3 21 4 3 2 1 5 4 3 21 (n = 3) 1. 21 3 21 In the triangular shape, There is a space character between each neighboring numbers on the same line. • The rightmost number is supposed to be 1. • The numbers are ordered in a descending order. The ith line should contain i numbers. The numbers are aligned right.3.3 Write a function called displayinfo() that will receive the array and the number of elements in the array. Display the list of employees as shown in the example. Example of output: List of employees Surname Simon Johnson Peterson Pule Gumede Green Mokoena Fourie Hours Manager 1 8234556 1020103 6238126 4568752 4536776 2310211 7683587 43427421) Arrays have a built in toString method that returns all of the elements in the array as one String with “\n” insertedbetween each element.