Q2: Give the output of the following program Matlab 1. S=input('Enter the subject:','s'); 2. fprintf('subject is %s\n',S) 3. M1 = input('Enter the mark l: ',); 4. M2 = input('Enter the mark2: '); 5. fprintf('marks are %i%i average is",M1,M2) 6. M=[M1 M2]; 7. A= sum(M)/2; 8. disp(A)
Q: Write a synopsis of how template files are used in project management and how they help project team…
A: In project management, templates are repeatable project blueprints that help to decrease rework…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: Describe the field of technological equipment and provide a list of probable employment in this…
Q: Write an overview of the utilization of agile approaches based on annual surveys and surveys funded…
A: Write an overview of the utilization of agile approaches based on annual surveysand surveys funded…
Q: Iterated and non-iterated GET requests, authoritative and root server DNS records, and DNS queries…
A: Recursive DNS queries occur when a DNS client requests information: On the Internet, Domain Name…
Q: Give two instances of internal and exterior fragmentation to illustrate the point. Make use of…
A: Fragmentation: Fragmentation is a data storage process in which memory space is used inefficiently,…
Q: 7. Consider the following Java code: O import java.util.Scanner; public class Q8 { public static…
A: Java is an object oriented programming language.
Q: Performing a server database migration might provide a number of risks.
A: Introduction: If the transition process is mismanaged as it frequently is, migration may cause more…
Q: Describe the notion of inheritance and the links between items.
A: Inheritance: It encourages the reuse of software. It's a method for generating new classes from…
Q: Is it possible to sum up what software engineering is all about in just one sentence? What does that…
A: - We need to talk about software engineering.
Q: Consider the URL for the base HTML file and 30 JPEG images residing on the same server,…
A: The page consists of a base HTML file and 30 JPEG images and all 31 of these objects reside on the…
Q: What are the phases in data mining data processing?
A: Given: The practice of extracting interesting patterns and information from massive volumes of data…
Q: What are your thoughts about the FSF?
A: The FSF: The Free Software Foundation (FSF) is a non-profit organization dedicated to the…
Q: private key vs. public key distinction in cryptography
A: The both Public and private keys form the basis for public key cryptography. These both keys are…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: The field of technology equipment consists of distributer and manufacturers of computer systems,…
Q: Look at an airline's database system, which makes use of snapshot isolation. When a non-serializable…
A: Start: Consider a database system that uses snapshot isolation for an airline. Describe a scenario…
Q: sing spaghetti code and the GOTO debate as examples. Give a concise explanation of the Structured…
A: We must first describe what the Structured Programming Theorem stated regarding spaghetti code and…
Q: Write an overview of the utilization of agile approaches based on annual surveys and surveys funded…
A: Given: When used to software development projects, agile methodology is a concept that encourages…
Q: Construct a Deterministic Finite Automata (DFA) for each of the following Languages over Alphabet…
A: L3 = { w | all strings start with 'a' or ended with 'b' } Here, we have to take care of the two…
Q: What are the risks of transferring a server's database to another server?
A: (1) Dependencies: The most typical error involves a lack of understanding about the applications…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: Equipment for technology: Distributors and manufacturers of computer systems, mobile phones, and a…
Q: Finding two peer-reviewed research articles on project management ethics and summarizing them is…
A: Bullying at Work: An Ethical and Leadership Dilemma for All Project Managers" is the title of the…
Q: What is the definition of data-structure? What are the different kinds of data structures?
A: An information storage system used to store and organize data is a "data structure." An information…
Q: What is a function in Matlab, and why are functions crucial for coding in Matlab?
A: The Answer is in step-2.
Q: How does the mindset of a software tester differ from that of a software developer? Why is it…
A: How does the mindset of a software tester differ from that of a softwaredeveloper? -> In the mind…
Q: are some of the advantages of SAS versus
A: Below are some of the advantages of SAS versus SCSI?
Q: When an FIRQ interrupt is acknowledged and being serviced
A: F, I, and E flags are set to 0 sets F=1 and I=1 disabling FIRQ and IRQ requests.
Q: Describe the tools and technology that are utilized to assist with IT project management.
A: Definition: IT project management tools and technologies Tools and approaches for project management…
Q: Where may ICTs have a positive impact on business and education? What are some instances of this?
A: Establishment: The term Information and Communication Technology (ICT) didn't arise in front of me…
Q: Q2: Give the output of the following program 1. for a=0: 5 disp('value of a: %s\n', x); 3. if(a=15)…
A: In the given program a ranges from 0 to 5. We have to display the value of a from 0 to 5. Therefore…
Q: A computer network is defined as a system that connects computers together. What are the system's…
A: When two or more nodes (for example, computers) are linked together, they can share resources (such…
Q: Construct a Deterministic Finite Automata (DFA) for each of the following Languages over Alphabet…
A: DFA takes a string as input and process it. If it reaches final state, it is accepted, else…
Q: What are the benefits of an intranet or extranet for a company?
A: Please find the answer below :
Q: In C#, what is the difference between Const, Read Only, Static, and Non-Static variables?
A: In C#, what is the difference between Const, Read Only, Static, and Non-Staticvariables?
Q: n terms of functionality, technology, and management, WANs and LANs are comparable. Explain what a…
A: The Answer is in given below steps
Q: What kind of files should you upload to the cloud? Why would you upload files to the cloud rather…
A: Cloud storage: The word "cloud" refers to a procedure that allows computer resources to be…
Q: Constructing widely scattered data environments calls for decisions on how best to balance various…
A: provides businesses with the capabilities to generate: In economics, a trade-off is referred to as a…
Q: Temperature of a city in Fahrenheit degree is input through the keyboard. Write a VB.net windows…
A: Program to convert from Fahrenheit to Celsius: Private Sub Button2_Click(sender As Object, e As…
Q: In the case of a data security breach, what are the company's rules for disclosing information?
A: Steps to Create an Emergency Evacuation Plan: A precise plan of action or a thorough grouping of…
Q: Given the following Matrices; 1 -2 0 -2 0 -4 1 B = 1 0 -1 6 8 2 1 -1 A = -2 3 1 0 1 0 -2 0 3 6 -10 3…
A: Forming the matrix: A = [1,-2,0;-2,3,1;0,1,0] B = [-2,0,-4,1;1,0,-1,6;8,2,1,-1] C =…
Q: The intermediary layer between the database and the client servers is referred to as a three-tier…
A: The answer is given in the below step
Q: Assume you work in a corporation where the internal network is protected from the outside Internet…
A: Firewall: Internet-connected private networks, particularly intranets, utilize network firewalls to…
Q: Even if the main (master) database has a "exclusive lock" on changes, this may still happen. Even if…
A: Data Inconsistency: Data inconsistency occurs when a database has various tables that deal with the…
Q: List two essential tools for systems administrators?
A: A system administrator- (sysadmin) is an information technology professional who manages a multiuser…
Q: What kinds of files do you think you'll want to save to the cloud? Why would you want to copy files…
A: The Answer is in step-2.
Q: What is the difference between a TextBox and a MaskedTextBox? How can you make TextBox utilize all…
A: TextBox vs MaskedTextBox S.No. TextBox MaskedTextBox 1. It is mainly used to retrieve…
Q: Show the pictorial representation of the linked list (at each step) once the following sequence of…
A: We need to write a program for linked link as per the given scenario. ***The language used is Python
Q: What is the difference between storing hashed passwords in a file and having an encrypted password…
A: Password Database: The user's password is concatenated with a static salt and a randomly generated…
Q: why is MetaData so important?
A: Data Flow Diagram: It is used to show the flow of data between various elements of a system in…
Q: The data dictionary is used in which of the six DBLC stages?
A: Answer:
Q: Assume you work in a corporation where the internal network is protected from the outside Internet…
A: Firewalls prevent your computer or network from outside cyber attackers by filtering out malicious…
Step by step
Solved in 2 steps with 1 images
- In CORAL LANGUAGE please and thank you! Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray). Given values for red, green, and blue, remove the gray part. Ex: If the input is: 130 50 130 the output is: 80 0 80 Hint: Find the smallest value, and then subtract it from all three values, thus removing the gray.1. Write a pyrhon program that prints out a classic hangman stick figure. The program should ask the user to enter a number from 1-6 and the corresponding hangman should be printed. The value the user inputs corresponds to the number of incorrect guesses in a real hangman game and so the completeness of the hangman will correspond to the number of ‘incorrect guesses’ inputted by the user (e.g., if the user enters 1, then only the head of the hangman will be printed; full example below). Example:Enter a number from 1-6: 1O Enter a number from 1-6: 2O|Enter a number from 1-6: 3O\||Enter a number from 1-6: 4O\|/|Enter a number from 1-6: 5O\|/|/Enter a number from 1-6: 6O\|/|/ \ 2. Modify your program from problem 1 so that the user input is checked to be a validsingle digit (1-6) before printing the corresponding hangman. If the input is not valid, theninstead of a hangman the following message should be printed “Invalid input: you must enter asingle number from 1-6.” Example:Enter a…Write a program in C language to simulate tossing a “fair” coin. Allow the user to enter the number of tosses.Print the number of tosses that yield heads and the number of tosses that yield tails.What should be the percentage distribution of heads and tails? (Use the function rand_int)
- Using Matlab. Monte Carlo methods are a class of computational methods that rely on repeated random sampling to compute their results. In this problem, you will use the Monte Carlo method to estimate the temperature at an arbitrary point in a uniform solid. Specifically, we will consider the solid object shown below. The temperatures of all surfaces are 500 des F with the exception of the two shaded surfaces, which are at 0 deg F. Inputs to the program should be: 1. The number of random walkers. 2. The (x,,2) coordinates of the point at which the temperature is to be estimated. 3. Plot interval (eg., you may want 1,000,000 random walkers in the simulation but may want to plot after every 10,000). Output from the program should be: 1. A graph of the estimated temperature, plotted according to the plot interval 2. Numerical value of the estimated temperature. USING MATLABSPIM simulator (QtSpim). Simulation: Write a MIPS program that computes the expression; y = A * B + C * D Where A, B, C, and D are integersA fish-finder is a device used by anglers to find fish in a lake. If the fish-finder finds a fish, it will sound an alarm. It uses depth readings to determine whether to sound an alarm. For our purposes, the fish-finder will decide that a fish is swimming past if:there are four consecutive depth readings which form a strictly increasing sequence (such as 3 4 7 9) (which we will call "Fish Rising"), orthere are four consecutive depth readings which form a strictly decreasing sequence (such as 9 6 5 2) (which we will call "Fish Diving"), orthere are four consecutive depth readings which are identical (which we will call "Constant Depth").All other readings will be considered random noise or debris, which we will call "No Fish."Create a Python program called "fishfinder_firstname_lastname" that takes 1 input of string of 4 numbers separated with comma. Your program must display "Fish Rising", "Fish Diving.", "Fish At Constant Depth" or "No Fish".Example:30,10,20,20 Must display No…
- 1. What is the size of i after the following code is run in MATLAB, for i=8:3; i-i+3; end a) No output c) 1*1 What will be the output for the following code? b) 0*0 d) Error 2. k=0; i=0; while(k> save Variables [x.y] b) save Variables {x y} c) >> save Variables "x,y" 9. What is the difference between the two code lines? d) >> save Variables x y Ci > P=[91, pi']: C2 Q-191, pi]; a) Code Cl initializes P as a character array while code C2 initializes Q as an integer array b) Both P and Q will be integer arrays c) Code C2 initializes P as a character array while code C1 initializes Q as an integer array d) Both P and Q will be character arays 1Write the pseudocode for the following scenario: A manager at a 2nd hand car dealership wants to keep track of the amount (in Rands) of commission paid to the sales people. You must take the following into consideration: • There may be more than one salesperson (each salesperson has a unique employee code)– input the employee code. An employee code of zero (0) terminates the program. • The salesperson’s commission is based on their sales (in Rands) in the past month- input the sales for each salesperson. • Calculate the total car sales (in Rands). • Calculate a salesperson’s commission (in Rands). Commission is based on the following table: Total value of cars sold Percentage commission earned Less than or equal to R500 000 10% More than R500 000 15% • Calculate the total commission the manager must pay to all of the salespeople. • Display a report for the manager in the following format: Employee Code: 2 Sales: R400000 Commission: R40000 Employee Code: 4 Sales: R650000…Write a simple payroll program that will display employee’s information. Refer to the UMLClass Diagram for the names of the variable and method. This should be the sequence of theprogram upon execution:a. Prompt the user to input the name of the employee.b. Prompt the user to select between full time and part time by pressing either F (fulltime) or P (part time).c. If F is pressed, ask the user to type his monthly salary. Then, display his name andmonthly salaray.d. If P is pressed, ask the user to type his hourly rate and hours worked separated by aspace. Then display his name and wage.
- In this problem, you will be writing a MATLAB script that will compute and display a student's grade in a course. The student (user) will have to input his/her grades for Test 1, Test 2, and the Final Exam. The program computes the course average assuming Test 1 and Test 2 each count 30% and the Final Exam counts 40%. The program should round the course average to the nearest integer using round. The program will output the statement Your Course Average is: followed by the rounded course average. The program will then output the statement: Your Course Grade Is: followed by the course grade. Be sure that your output is clear and well formatted. It should be easy to read and look nice! Assume the following grading scale: > 90 A 80-89 B 70-79 C 60-69 D < 60 F Test the program when it is finished. Be sure the inputs are clearly labeled. Grade inputs can be done in the first few lines of the script. Your script must work for all valid entries.The Classic Triangle Testing Problem, (Myer's Triangle): A program reads three integer values. The three values are interpreted as representing the lengths of the sides of a triangle. The program prints a message that states whether the triangle is scalene, isosceles, or equilateral. Develop a set of test cases (at least 6 ) that you feel will adequately test this program. (This is a classic testing problem and you could find numerous explanations about it on the internet. I would recommend that you try to submit your own answer, based on your understanding of the topic)Write a MATLAB program called PaidPennies that calculates how much a person would earn if the salary were one penny on the first day, two pennies on the second day, and three pennies on the third day, and then would continue to increase in this way each day. The program should prompt the user to enter the number of days of employment. The program should display the answer in a sentence. For example: >> PaidPennies How many days of employment? 10 Being employed for 10 days earns $0.55 IMPORTANT NOTE: Cody does not test the "prompting" code, nor the displayed answer. Cody tests for correctness of the answer only. Name the input variable days . Place the computed value of salary into a variable named s Function O C Reset I MATLAB Documentation 1 function S = PaidPennies(days) 2 %Replace the line below with code to compute the salary and assign it to variable s S = days; 3 4 end