Write a Java program to take 2 strings from user a and b, return a string of the form short+long+short, with the shorter string on the outside and the longer string on the inside. Given that, both strings are not equal ever.
Q: PROBLEM 06 – 0127: Describe the zoned and packed | formats of the binary coded decimal (BCD) represe...
A: Zoned decimal uses the full byte of each digit, using ASCII (or EBCDIC) representations for each dig...
Q: . Simplify the following Boolean functions, using three-variable Kmaps: (a) F(x, y, z) = Σ(0, 1, 5, ...
A: The question is to simplify the following Boolean functions, using three variable K-maps a) F(x, y, ...
Q: Why is a logic bomb such a popular assault method among disgruntled or former employees? What can be...
A: Introduction: Logic bombs are complex cyberattacks that are difficult to detect, but they can do muc...
Q: Explain how to determine the amount of RAM required for computer hardware maintenance concerns.
A: Introduction: The hard disc is full:- When your hard drive is complete, it may create various issues...
Q: Present the detailed network representation of the scan assignment problem.
A: The Answer is given below step.
Q: using the Bacon cipher decrypt the following bacon message:
A: I have answer3ed this question in step 2.
Q: Present the detailed network representation of the transshipment problem.
A: The Answer is given below step.
Q: xt editor to produce a file? Why? If not, what types of files could you need to create in a text edi...
A: given - Have you ever worked with a text editor to produce a file? Why? If not, what types of files ...
Q: PYTHON CS1 PROBLEM Define a function that takes a list of lists, glol, as a parameter. You may assu...
A: - We need to code the multiple of 10 in a list in python.
Q: Design and simulate a logic circuit of 5 to 1 multiplexer using bas
A:
Q: What exactly is exploratory testing?
A: Introduction: Exploratory testing is a time-saving testing method that works in tandem with developm...
Q: The ramifications and consequences of cloud computing in the context of e-commerce are currently bei...
A: Introduction: Cloud-based e-commerce systems' lower costs and faster deployments allow IT and busine...
Q: 1. Big-O has the highest growth rate. а. О(2") b. O(n) c. O(n*) d. O(n°)
A: A theoretical measure of the execution of an algorithm, usually the time needed, given the problem s...
Q: ctives of the World
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: How are missing character and numeric values represented in the data?
A: representation of missing character and numeric value in data
Q: Question 3 Design push-down automaton that recognises the following languages. a. Ll={a"ba" | n>0} b...
A: Here, we are going to design a Push down automaton (PDA) for given language L1. In PDA, We use stack...
Q: F of functional dependencies. 1. Create an initial matrix S with one row for each relation Ri in D, ...
A: Lossless JOIN property allows to create a table of relations and insert values in the form of bij ...
Q: Consider utilising structured language to describe processes that are not part of a systems analysis...
A: Introduction: Structured analysis employs data flow and entity connection models, process requiremen...
Q: On a single slide, summarise information security and upgrade requirements.
A: Computer Security - An Introduction: In recent years, there has been a movement in the notion of com...
Q: C++ Sort Characters by Frequency, Case, Alphabet Khalid like to play with strings. He has a list of ...
A: ALGORITHM:- 1. Take input for the strings from the user. 2. Pass it to the function. 3. Display the ...
Q: Write a method named stringTimes that is passed a String parameter word and a positive integer num. ...
A: public class Main{ public static String stringTimes(String str,int num){ String ans = ""; // initia...
Q: Java - Data Structure Hello, I have DirectedGraph.java, how can I write the method removeEdge and re...
A: Ans: Code: import java.util.*; class Main{ static void addEdge(Vector<Integer> adj[], ...
Q: Explain the purpose of end-to-end testing and why it is required.
A: Introduction: The process of creating objective assessments of how well a system (device) meets, exc...
Q: Describe the components of a disaster recovery plan. What is the difference between backup plans for...
A: Introduction: Each information system is designed with backup devices to ensure that data and inform...
Q: Write a generic binary search function in its prototype. int binarysearch(int target, void *base, i...
A: int binarysearch(int target, void *base, int n, int esize, int (*compare)(int *, int *)); Generic m...
Q: What is the definition of a disjoint subtype? Please provide an example.
A: Introduction: If an instance of a type corresponds to only one example of a subtype, it is said to h...
Q: Provide an opportunity for debate about the use of tablet devices and smartphones in the workplace.
A: Here are some examples of corporate tablet and smartphone use: Access to Information AnywhereEmploye...
Q: Create a Storybaord about Errand Assistance Service Application
A: The Answer is given below step
Q: nsider: lic static void printAll(int[] a) { N = a.length;
A:
Q: Compound assignment statements must be defined.
A: Intro Compound Assignment Operator: A smaller syntax for assigning an arithmetic or bitwise operato...
Q: Can you tell the difference between an oblique and an orthogonal projection? graphical design in com...
A: Intro A way of looking at it is that with an orthographic projection, the outlines of the projection...
Q: 1. How FLIP-FLOPS performed in HDL explain it in detail?
A: Introduction How FLIP-FLOPS performed in HDL explain it in detail?
Q: What data security and privacy problems rendered the Veterans Administration (VA) and its assets mor...
A: Introduction: To assist veterans adjust to civilian life after serving in the military, they may tak...
Q: I want codes java to customer and citizen @Citizen model nationalNo: int - bDate: Date nationality:...
A: In this program, there are two classes Citizen and Consumer. In Citizen class we have 3 properties n...
Q: What is the definition of information privacy? Make a list of five measures to keep your personal in...
A: Introduction: Data privacy, often known as information privacy, is a facet of information technology...
Q: C++ Demonstration #4: What is the sample output of the program? double total = 0; int counter = 0; d...
A: Here we are accepting the input grades till user enters -999 We have to keep track of the number of ...
Q: H.W Find the Adjoint to the following matrix
A: Given To know about the adjoint of metrix
Q: Agile approaches employ quick development cycles to deliver running versions of the system repeatedl...
A: Intro The "agile" methodology is a type of software development where each phase of the software d...
Q: Sz To SI Bus So Memory unit Address Read AR LD PC INR IR LD Clock Common bus
A: Solution In the basic computer each instruction cycle consists of 4 phases Fetch an instruction fro...
Q: 1. Given the following use case diagram, a. draw the context diagram b. Data Flow Diagram of this sy...
A:
Q: Conduct some research and summarize projects, steps, or examples researchers are currently bringing ...
A: Most of the small kids are suffering with hearing aid problem.so scientific are focusing more to rea...
Q: What is the output: String str = "Hello..."; str += str.length(); System.out.println(str); a. Hello....
A: The Java String class length() method finds the length of a string. The length of the Java string i...
Q: Declare variable and assign value, define function that returns text, return number of characters in...
A: Note: Here in the question programming language is not mentioned, I am doing this program in java. A...
Q: How to systematically improve the security of a Linux machine.
A: Introduction: The ways to increase the security of a Linux machine are listed below.
Q: Part 1: Create a class named Supermarket representing an items show in a supermarket sections with t...
A: 1) Below is C++ Program to define Supermarket class with data memebers, constructor and methods It ...
Q: It's due to the fact that computers are so powerful. Please explain how computers have grown so prev...
A: Introduction: Computers are incredibly powerful for a multitude of reasons. They work at breakneck s...
Q: 17.- Write an assembly code to SET (bit = 1) the 7, 3, 1 bits (positions) of a word stored in data m...
A: The purpose of the memory is to store batch bands, and bring them (processor for upload to registers...
Q: Describe the UNIX operating system in a brief note Six UNIX file-creation and file-management progra...
A: LINUX is an open-source program or kernel. Its task list is comparable to that of UNIX. A kernel is ...
Q: Write a program that displays the numbers from 20 to 10 on a single line.
A: In programming, loops are utilized to rehash a block of code until a predetermined condition is me...
Q: Define the binary operator :) by: aa :) b=8a+4b+9b=8a+4b+9 Find each of the following: 55 ...
A: Provided info: aa :) b=8a+4b+9b=8a+4b+9
Step by step
Solved in 4 steps with 1 images
- IN JAVA Write a function that takes in user input as a string. For all characters which are numeric, double its value and, if it is two digits, then replace it with the sum of its digits (e.g., 6 → 12 → 3 whereas 3 → 6). For all characters which are in uppercase, replace it with lowercase. For all characters which are in lowercase, replace it with uppercase (e.g., m → M and N → n). The program should keep asking the user to enter strings until they either enter ‘q’ or ‘Q’.Write a Java program that asks the user to enter two Strings. Then, uses String method compareTo() to compare them, and prints out whether the first string is less than, equal to, or greater than the second string.Write a code that generates a random lowercase letter. In java programming. Note: Not a string of letters just one letter is generated every time the program is run. meaning the output should not be something like this: a c t c -that's a random string, it should only be one random letter generated randomly.
- Write a program that reads two matrices of integers. It then generates the sum, difference and productof the two matrices.The sum of the two matrices of the same size is a matrix with elements that are the sums of thecorresponding elements of the two given matrices. Addition is not defined for matrices of different sizes.If A and B are matrices of the same size, then we define subtraction as follows: A – B = A + (-B). Thus, tosubtract matrix B from matrix A, we simply subtract corresponding elements.To multiply a matrix by another matrix we need to do the "dot product" of rows and columns. The "DotProduct" is where we multiply matching members, then sum up:(1, 2, 3) • (7, 9, 11) = 1×7 + 2×9 + 3×11 = 58We match the 1st members (1 and 7), multiply them, likewise for the 2nd members (2 and 9) and the3rd members (3 and 11), and finally sum them up.Write a program that reads two matrices of integers. It then generates the sum, difference and productof the two matrices.The sum of the two matrices of the same size is a matrix with elements that are the sums of thecorresponding elements of the two given matrices. Addition is not defined for matrices of different sizes.If A and B are matrices of the same size, then we define subtraction as follows: A – B = A + (-B). Thus, tosubtract matrix B from matrix A, we simply subtract corresponding elements.To multiply a matrix by another matrix we need to do the "dot product" of rows and columns. The "DotProduct" is where we multiply matching members, then sum up:(1, 2, 3) • (7, 9, 11) = 1×7 + 2×9 + 3×11 = 58We match the 1st members (1 and 7), multiply them, likewise for the 2nd members (2 and 9) and the3rd members (3 and 11), and finally sum them up.Use the following definitions:#define ROW 6#define COL 6void add (int matrixResult[] [COL], int matrixA[] [COL], int matrixB[][COL],int row, int…Write a Program that take 2 string from user and print the whole with greetings. Those 2 strings are first name and last name in java
- Is there a way to create a java program on Branching and selecting method on problems like this? Suppose that we are working for an online service that provides a bulletin board for its users. We would like to give our users the option of filtering out profanity. Suppose that we consider the words cat dog and rabbit to be profane. Write a program that reads a string from the keyboard and test whether the string contain any one of these words. Your program should find words like cAt that differ only in case. Have your program reject only lines that contain one or more of the three words exactly. For example, concatenation is a small category should not be considered profane. This problem can be solved easily. If you add a space to the beginning of the string and a space at the end of the string you only need to check if space cat space or space dog space or space rabbit space is in the string. Use three if statements; one for each word. If one or more of the words are there set…Write a program in java to check whether a string is a rotation of another. Take both string from user. In O(1)Write a Java program using at least one for loop that prints pictures of piles of counters of different sizes using ‘=‘ characters as shown below. Each counter should be an odd number of characters wide and be two characters longer than the counter above it. The user should, when asked, type in the size of the top and bottom counters. For example, if the user enters 3 for the top counter and 7 for the bottom counter then the image below should be printed. your program must make use of a counter-controlled for loop be in procedural programming style (not OOP) your program should also be logically correct, solving the core problem, be elegantly written following good style, and be broken into appropriate methods that take arguments and/or return results.
- Use Java Implement a game of Pig where the user plays against a "hold at 20 or goal" computer player that rolls until a 1 ("pig") is rolled, or the turn total is greater than or equal to 20, or the score plus the turn total is greater than or equal to 100. The first player is chosen randomly. An empty input (i.e., Enter) indicates that the user wishes to roll. Any entered line of non-zero length indicates that the user wishes to hold. Before the game, randomly select which player the user will be, and print the line "You will be player #.", where # is the user's player number. Then, print an instruction line "Enter nothing to roll; enter anything to hold." Before each turn, print a line with "Player 1 score: " and player 1's score. Print another line with "Player 2 score: " and player 2's score. Finally, print a line with "It is player #'s turn.", where "#" is replaced by the current player number. Play starts with player 1 and then alternates. For each roll, print a line with…Write a JAVA program that checks phrases to determine if they are palindromes. A palindrome is a word, phrase, or sentence that reads left-to-right the same way it reads right-to-left, ignoring all punctuation and capitalization. For example, the statement “Madam, I’m Adam” is a palindrome as the response of “Eve.” Use a method to determine if a String is a palindrome. Test a single word non-palindrome, a single word palindrome, a phrase that is not a palindrome, and a phrase that is a palindrome. Print the phrase and whether it is a palindrome or not. Some simple palindromes are “racecar,” “taco cat,” and “A man, a plan, a canal, Panama!” There are a few different approaches for the test; choose one of your liking. Hint: extract all letters, change the remaining letters to lowercase, then test if the phrase is a palindrome.Write a java program with a method that reverses a string The method must accept one parameter of type String (string to reverse), and returns every second element from the end to the beginning. For example: String: thisisstringResult is: g i t s s h