Write a program to maintain the library including: i. Add new books ii. Search the library by book number, author, title, subject, keywords. iii. Check out books. Late charges at 50 cent per day if a book is out by more than a month iv. Display the list of books in the library.
Q: Design a flowchart or pseudocode for a program that accepts three numbers from a user and displays a...
A: Below is the Pseudocode, and Flowchart.
Q: 6. This question is about TCP fairness. We know that TCP's AIMD (additive increase, multiplicative d...
A: Answer : The additive-increase/multiplicative-decrease (AIMD) algorithm is a feedback control algori...
Q: Consider the following assembly code: movq %rsi, %rax testq %rdi, %rdi jle .L2 imulq %rsi, %rax ret ...
A: Hi Dear!! Please give positive feedback!!!
Q: How have power supply and heat dissipation limitations influenced microprocessor and system design?
A: Introduction: The power consumption of the overall system must be decreased in order to increase the...
Q: What is DNS stands for? And give some examples.
A: Introduction: What is DNS stands for? And give some examples. Domain Name System
Q: Problem 8: Use the tableau algorithm to prove the validity of the following formula (you have alread...
A: Hi Dear!! Please give positive feedback!! it is valuable To prove the given propositional logic usi...
Q: Explain how nested loops are used to assign and report values from multidimensional arrays.
A: Introduction A nested loop is a mechanism where we write a loop inside another loop and for multidi...
Q: A centralized database management is subject to a problem such as ________. a) growing numbers of re...
A: A centralized database is one that is stored, managed, and accessed from a single location. Most of ...
Q: What algorithm does HIDS use? O pattern matching misuse detection O shallow detection O protocol det...
A: Given :- What algorithm does HIDS use? pattern matching misuse detection shallow detection protocol...
Q: Task - Solve the above problem using a linked list based stack.
A: Here our task is to solve the above problem using a linked list based stack. (In python)
Q: Determine the various network layers, such as the edge, core, and access.
A: Introduction: A network is a collection of computers, servers, mainframes, network devices, peripher...
Q: This code check whether a number is divisible by 5 and 11 or not. * 1.... 2-... 3-... 1-lf ((n Mod 5...
A: Find the answer with explanation given as below :
Q: Create a list for CSI 3680. The list must include the following information: The course number. ...
A: Find the answer below.
Q: 1. Consider a binary number (10101110),. What base-10 number this binary number is equivalent to if ...
A: As given, we need to need to convert the given binary number (10101110)2 into decimal number. a) Fi...
Q: There is a parse element that can act as both a statement or as an expression. Which one is it? Why ...
A: Expressions, Statements, and BlocksVariables and operators, which you met in the previous two sectio...
Q: Discuss various security vulnerabilities linked to memory management.
A: Various security vulnerability linked to memory managment
Q: keyboard to press more when you hold down Value in "Current" tab;
A: The Python interpreter works by loading a source file or reading a line typed at the keyboard, parsi...
Q: Discussion Write a MATLAB program to find the Trigonometric Fourier Series and Co Exponential Fourie...
A:
Q: Create a JavaScript Arrow function that meets the following requirements: Authored using arrow expre...
A: Step 1 : Start Step 2 : Define a function _replaceCharacter() which takes a string as parameter. Ste...
Q: What is the true scope of big data? Is it possible for a student to pursue study without going ba...
A: Introduction: Big data is defined as data that is so huge, quick, or complicated that processing it ...
Q: What are the top level domain? Explain
A: What is top-level domain is given below :
Q: please answer this question within 1500 words.... with docs or pdf file A Comparative Study of Oper...
A: INTRODUCTION: We want to discuss memory management in Windows, Linux, and Mac.
Q: 2.15 2.2, 2.5> Provide the type and hexadecimal representation of the following instruction: sw St3,...
A: Below is the answer to above question. I hope this will be helpful for you...
Q: Java Program 1.Carmens’s Catering provides meals for parties and special events. Write a java progr...
A: As per the given question below is the program and output:
Q: What exactly do you mean by "network security?" Describe the data encryption standard algorithm's op...
A: Introduction: The term "network security" encompasses a wide variety of related concepts, technologi...
Q: Write a MATLAB program in a script file that finds and displays all the numbers between 100 and 999 ...
A: Use a for loop to iterate over the numbers 100-999 The find the individual digits and check for the ...
Q: Programming Practice a) Write a program which allows a teacher to determine the min, max, and averag...
A: Disclaimer: “Since you have asked multiple questions, we will solve the first question for you. If y...
Q: Jami works as an intern on a huge insurance company's sales team. Jami is requested to get a list of...
A: INTRODUCTION: There are ethical issues to consider when it comes to this situation. The first issue...
Q: Which of the following statements creates an array of elements of the integer data type with a lengt...
A: which of the following statement creates an array of element of the integer data type with the lengt...
Q: In JDBC, what is the difference between CLOB and BLOB data types?
A: The full form of CLOB is Character Large Object. The full form of BLOB is Binary Large Object.
Q: Explain how to use Selenium WebDriver to discover broken links on a page.
A: Given: Demonstrate how to use Selenium WebDriver to find broken links on a web page.
Q: ou need to put counters in the code like you did in lab1. You just have to count all the searches (p...
A: Here, I have to fill the code which is missed.
Q: Create a 1-by-1000 row vector called M containing random integer numbers between 8 and 256. Using lo...
A: task 1 :
Q: #include using namespace std; int main() { int x,y; or (x=0 ;x 3) break ; cout << y << endl; }}} O ...
A: Given code is in c++ Using for loop print the loop.
Q: Share TWO best IT applications that support your daily routine.
A: Your routine can either represent the moment of truth every day. Be that as it may, with innovation,...
Q: Compute the CPI, for the sequence below (to the nearest 0.1): Floating Point Operation Graphic Opera...
A:
Q: Give 5 types of website and its features
A: Business Type website : A business website is one that is created to represent a company's online i...
Q: Roles are not typically created for a database application True O False
A: Given We know about the database application .
Q: Write an assembly language program to Sort 100 bytes start from location 3000:2000 ascending.
A: In this question, we are asked to write an assembly program to sort the location from 3000h to 2000h...
Q: In the.Net programming language, what is the difference between a function and a stored procedure?
A: Introduction: The RETURNS and RETURN arguments must be used in a function, but they are not required...
Q: In a distributed database system, try out all of the numerous methods that individuals could ask for...
A: distributed database A distributed website is a website that contains two or more files located on d...
Q: Describe the type of firewall software that is installed on a PC running Windows Server.
A: Introduction: A firewall is a physical or software network security device that monitors incoming an...
Q: #include using namespace std; int main () { for (n = 5; n > e; n--) { int n; %3D cout << n<<" "; if...
A: Solution:
Q: С++ x=2; y=4; cout <<x++<<--y; w 23 34 33 O 24
A: Here, I have to choose an option for the above question.
Q: Give example of Substring from IndexOf in JAVA.
A: Substring refers to the part of the string as when we call substring function then it prints the pa...
Q: Is it possible to safeguard communications using message secrecy and integrity security? Is it the ...
A: Introduction: Because smart objects frequently communicate data across insecure communication medium...
Q: Write a program to calculate y from the equation using (switch) statement (3x-7)if(x=-5) y=(5x')(x=2...
A: Code is given below :
Q: the out put of the following is #include using namespace std; int main() { int a= 2, b=5,c=e; C+= a...
A: #include <iostream> using namespace std; int main(){ int a=2, b=5, c=0; c+= a*b++; ...
Q: The STP cable has its own standards to those of the UTP.(explain) True False
A: yes The STP cable has its own standards to those of the UTP . STP cables include an additional coa...
Q: Which of the listed statements is NOT one of MIPS ISA Design Principles? Group of answer choices Co...
A: Simplicity favors regularity consistent instruction format easier to encode and handle in hardware...
Step by step
Solved in 6 steps
- Create a program in c++ Assume that a library maintains of at most 500 books. Data for each book consists of: • book number • title • author • co-authors • publisher • date published • subject • keywords • check out data: o name, address, phone o date checked out o date returned o charges if any Write a program to maintain the library including: i. Add new books ii. Search the library by book number, author, title, subject, keywords. iii. Check out books. Late charges at 50 cent per day if a book is out by more than a month iv. Display the list of books in the library.INSTRUCTIONS: • You are to answer this activity individually. • You are to create a Python application that makes use of inputs, outputs, and sequence structures in Python. • It must meet all of the following requirements: • The application must create a list with exactly 10 items. The contents and type of list will be up to the student (e.g. Phone Brands, Types of Shoes, Shopping Apps). The application must first display the list after which the application must remove 5 random items from the list. The application must then show the updated list with 5 of the items removed. After this is done, the application must add 7 new items to the list. These items must be completely new and not the ones that were on the list initially. The application must then output the updated list with the added items. The application must then reverse the list and then display the updated list after it has been reversed. • The application must create a tuple with exactly 10 items. The contents and type of…DART PROGRAMMING LANGUAGE Q1 Create database of songs: a. Choose one type of collection b. Initialize with data c. Implement functions: i. find by index, ii. find by title iii. find by artist d. Remove item e. Add item
- c++ We want to build an address book that is capable of storing name, address, Birthday, Email & phone number ofa person. Address book provides functionality in the form of a menu. The feature list includes:• Add – to add a new person record• Delete – to delete an existing person record by name• Search – to search a person record by name· Exit – to exit from applicationCreate a ANIMAL SHELTER ADOPTION MANAGEMENT SYSTEM IN C++ Log in as: Admin User Functions of Admin Login: Add a new record Details to ask: ID number Decription (Dog/Cat) Breed Age Weight Adoption fee Edit a record Delete a record Search a record View list of record Functions of User Login: View list of record Adopt a pet Note: Code should be run in Codeblocks C++Process Scheduling: Select all statements below that are true The waiting time is included in the turnaround time. In interactive systems, short response times are unimportant. The time taken in an interactive program from the issuance of a command to the commencement of a response to that command is known as the response time. The response time is the time required for a particular process to complete, from submission time to completion. Throughput is the number of processes executed per time unit. The concept of virtual (run)time in the Completely Fair Scheduler is used to ensure fairness in the allocation of processor capacity.
- Create a new C# project then write a code equivalent to solve the problem given below. Create a menu driven program that will perform the following operations specified below. The program shall request data needed and display the result accordingly. Operations: - ADD NEW DATA - INSERT DATA - UPDATE DATA - DELETE DATA - RESET - SHOW DATA - EXIT Operations: - ADD NEW DATA – request single data from the user and store to arraylist - INSERT DATA – request index location and data to be inserted - UPDATE DATA – request index location and data to be updated - DELETE DATA – request data to be deleted - RESET – clear or reset the elements of arraylist - SHOW DATA – display all the elements of arraylist in horizontal manner - EXIT – end the execution of the programC++A new video store in your neighborhood is about to open. However, it does not have a program to keep track of its videos and customers. The store managers want someone to write a program for their system so that the video store can operate. The program will require you to design 2 ADTs as described below: [1] VIDEO ADT Data Operations Video_ID (preferably int, auto-generated) Movie Title Genre Production Number of Copies Movie Image Filename [1] Insert a new video [2] Rent a video; that is, check out a video [3] Return a video, or check in, a video [4] Show the details of a particular video [5] Display all videos in the store [6] Check whether a particular video is in the store [2] CUSTOMER PARENT ADT Data Operations Customer_ID (preferably int, auto-generated) Name Address [1] Add Customer [2] Show the customer details [3] Print list of all customers [3] CUSTOMER-RENT CHILD ADT Customer_ID ( Video_ID (of all rented videos of a…using C programming language: Create Struct Employee with his information and input an array of Employees then print it
- Background Information This assignment tests your understanding of and ability to apply the programming concepts we have covered in the unit so far, including the usage of variables, input and output, data types, selection, iteration, functions and data structures. Above all else, it tests your ability to design and then implement a solution to a problem using these concepts. Assignment Overview You are required to design and implement a "Word Game" program in which the user must identify a randomly selected "password" from a list of 8 words. The 8 words are selected at random from the list of 100 words in the starter file (word_game.py) provided to you with this assignment brief. Please use the starter file as the basis of your assignment code. The user has 4 attempts in which to guess the password. Whenever they guess incorrectly, they are told how many of the letters are the same between the word they guessed and the password. For example, if the password is "COMEDY" and…numpy.ipynb 1. addToArray(i) def addToArray(i): # TO DO %time addToArr(10) 2. a function def findDriver(distanceArr, driversArr, customerArr): result = '' ### put your code here return result print(findDriver(locations, drivers, cust)) # this should return Clara 3. The Amazing 5D Music example array([[ 1, 3, -2, -4, -1], [ 0, -1, 1, -1, -2], [ 2, 3, -2, -3, -1], [ 1, -1, 0, -1, -3], [-2, -1, 1, -1, -3], [ 1, 3, -1, -2, -3]]) ``` # TODO array([11, 5, 11, 6, 8, 10]) # TODO array([1, 3, 4, 5, 0, 2]) # TODO # TODO def findClosest(customers, customerNames, x): # TO DO return '' print(findClosest(customers, customerNames, mikaela)) # Should print Ben print(findClosest(customers, customerNames, brandon)) # Should print Ann 4. Numpy drones arr = np.array([-1, 2, -3, 4]) arr2 = np.square(arr) arr2 locations = np.array([[4, 5], [6, 6], [3, 1], [9,5]]) drones = np.array(["wing_1a", "wing_2a",…Question IV: ER Modeling A social recreation club has a system to keep track of club members, committees and activities. Each club has a registration number and a title. Several members form committee. Members are male and females. Each committee has a name, a unique number and a date, which the committee has formed. The system stores the members’ unique identification number, name, address, gender, birth date and club joining date. The club forms committees for different activities. A committee controls and organizes a number of activities, each of which has a unique name, a unique number and description of the event. An event has event ID and description of the event. An activity may consist of several events. Committee publishes many online advertisements about the activities. Advertisement details are ID and a title. Draw the ER diagram to represent the above scenario