So far we have worked on obtaining individual digits from 4 digits of 5 digit numbers. The added them to find the sum of digits. However, now we know about the loop and we can remove the limit of having a specific number of digits. Write a program to print out all Armstrong numbers between 1 and n where n will be an user input. If the sum of cubes of each digit of the number is equal to the number itself, then the number is called an Armstrong number. For example, 153 = (1 * 1* 1)+ ( 5 * 5* 5 ) + ( 3*3*3) In order to solve this problem we will implement the following function: sumDigitCube(): write a function sumDigitCube() that takes a positive integer as a parameter and returns the sum of cube of each digit of the number. Then in the main function, take an integer n as input and generate each number from 1 to n and call the sumDigitCube() function. Based on the returned result, compares it with the value of the generated number and take a decision and print the number if it is Armstrong number

Answers

Answer 1

Answer:

#include<stdio.h>

int sumDigitCube(int n);

int main(){

   int n, i;

   printf("Enter number: ");

   scanf("%d", &n);

printf("The Armstrong numbers are:" );

   for(i=1; i<=n; i++){

       if(sumDigitCube(i)==i){

           printf(" %d", i);

       }

   }

   printf("\n");

   return 0;

}

int sumDigitCube(int n){

   int s = 0;

   int digit;

   while(n>0){

       digit = n%10;

       s += digit * digit *digit;

       n = n/10;

   }

   return s;

}

Explanation:


Related Questions

Print out the value and double it (multiply by 2). Continue printing and doubling (all on the same line, separated by one space each) as long as the current number is less than 1000, or until 8 numbers have been printed on the line.

Answers

Answer:

value=int(input("Enter the value from where the user wants to starts: "))#Take the value from the user.

i=1#intialize the value of a variable by 1.

while(value<1000) and (i<9):#while loop which prints the value.

   print(value,end=" ")# print the value.

   value=value*2#calculate the value to print.

   i=i+1#calculate the value for the count.

Output:

If the user enter 5, then the output is : "5 10 20 40 80 160 320 640".

If the user enter 5, then the output is : "3 6 12 24 48 96 192 384".

Explanation:

The above code is in python language, in which the first line of the program is used to render a message to the user, take the input from the user and store it into value variable after converting it into an integer.Then the loop will calculate the double value and then it prints the value with the help of print function.The end function puts the spaces between numbers.

4. A computer with an IP address of 172.16.25.8 using a subnet mask of 255.255.255.224 pings an IP address of 172.16.25.52. Will 172.16.25.8 send the data packet to its gateway or will it send an ARP request broadcast for 172.16.25.52? Show your work and/or explain your answer.

Answers

Answer:

It will send ARP request broad cast because of security and pubilicity of data to the public.

Participate in a discussion on best practices for IT infrastructure security policies in domains other than the User Domain. Address the following topics: • IT framework selection • When to modify existing policies that belong to other organizations versus creating your own policies from scratch • Policy flexibility • Cohesiveness • Coherency • Ownership

Answers

Explanation:

Security is an essential aspect in any company and for any software organization, through a better protected area or network, the company will be able to maintain important data and operations with access for only authorized users.

Currently, there is a network of hackers and intruders of IT systems whose intention is to steal relevant data and obtain financial benefits from the invasion of company systems, so the IT infrastructure must be a planned and well implemented step in companies, to avoid intruders and failures that could harm an organization's operations.

The ideal IT structure is one developed to meet the needs of a company and its professionals, so there is a need for research, testing and for the implementation of the system to be directed at strategies and organizational objectives.

Another important factor is the development of the policy that will guide the rules and conduct for using the IT system, it is necessary that the policy has the ideal flexibility for the company, so that all its development is focused on coherence and cohesion with the company's strategy must be comprehensive to establish usage rules for users and authentication procedures for specific networks.

The company must have ownership over its system, the data contained therein, its use and privacy, so that the system is always protected, updated and compliant to assist in the improvement of organizational techniques and processes.

Write a C program to multiply matrix A and matrix B of variable. For both A and B, the size of the matrix will be given along with the entries of the matrix in two input files, inA.txt and inB.txt. The first line of the input file will contain the number of rows followed by the number of columns of the matrix. The entries of the matrix are listed on the next line in row-major order. Print the output matrix C to outC.txt in the same format as input files. Be sure to include comments in your code.

Answers

Answer:

Code:

    #include <iostream>

    #include <fstream>

    #include <cctype>

    #include <cmath>

    #include <vector>

    #include <float.h>

   

    using namespace std;

   

    typedef vector<vector<double> > C2DArray;

   

    void Matrix_Mult(bool* error_flag, const int mRows, const int nCols, const int pCols, const C2DArray A_Matrix, const C2DArray B_Matrix, C2DArray& C_Matrix) {      

     int i = A_Matrix.size(), j = A_Matrix[0].size(), k = B_Matrix[0].size();

     double dummy;

     if ((j != B_Matrix.size()) || (i != mRows) || (j != nCols) || (k != pCols))  *error_flag = true;

   

     if ((C_Matrix.size() != i) || (k != C_Matrix[0].size()))  *error_flag = true;

   

     if (!(*error_flag)){

     for (k = 0; k < mRows; k++) { // Do each row of A with each column of B

      for (i = 0; i < pCols; i++) {

       dummy = 0.0;

       for (j = 0; j < nCols; j++) {

        dummy += A_Matrix[k][j]*B_Matrix[j][i];

          } // End for j

          C_Matrix[k][i] = dummy;

      } // End for i

     } // End for k

     }

   

        return;

    } // End Matrix_Mult

   

    int main()

    {char rflag = 0; //Readiness flag  

   

    cout << "                 Mat_Mul1 (7 June 2013)\n";

    cout << "=========================================================================== \n";

    cout << "This program multiplies two matrices, [A] and [B]: [A][B] = [C].\n";

    cout << "[A] is M X N, [B] is N X P, and [C] is M X P\n";

    cout << "The dimensions of the [A] and [B] matrices, M, N, and P, should \n";

    cout << "have been saved beforehand in a file named mulmatdat.\n";

    cout << "mulmatdat should be in the same folder as the Mat_Mul1 executable.\n";

    cout << "The next values of mulmatdat should be the entries for matrix [A],\n";

    cout << "with data for row 1 first, then row 2, then row 3, etc.\n";

    cout << "The entries for the [B] matrix should follow, in the same order.\n";

    cout << "\nThe data is assumed to be of type double. Variables used within this program\n";

    cout << "are type double.\n";

    cout << "\nThe output is written to the file mulmatout.txt.\n";

   

    cout << "\nIs everything ready (are you ready to continue?)? If yes, Enter y. \n";

    cout << "Otherwise Enter any other key. \n";

    cin >> rflag;

   

    if (toupper(rflag) == 'Y') {

    C2DArray A, B, C; // A, B, and C Matrices

    int i, j, mDim, nDim, pDim; // Array index variables and matrix dimensions

    bool erFlag = false;  // Error flag

   

    ifstream in("mulmatdat.txt", ios::in);

   

    if (!in) {

            cout << "\nCannot open the input file.\n";

         cout << "\nEnter any key to continue. \n";

         cin >> rflag;

            return 0;

    }

   

    in >> mDim >> nDim >> pDim; //Input the Matrices' dimensions from the file

     

    if ((mDim < 1) || (nDim < 1) || (pDim < 1)){

            cout << "\nInvalid dimension entered. Program terminated. \n";

         cout << "\nEnter any key to continue. \n";

         cin >> rflag;

            in.close(); //Close the input file before terminating

            return 0;

    }

   

    ofstream out("mulmatout.txt", ios::out);

    if (!out) {

            cout << "\nCannot open the output file. Program terminated.\n";

         cout << "\nEnter any key to continue. \n";

         cin >> rflag;

            in.close(); //Close the input file before terminating

            return 0;

    }

   

    // Beginning of try block, if vector re-sizing unsuccessful

    try {

   

           // Resize the arrays to the appropriate sizes

            A.resize(mDim); // M rows

         B.resize(nDim); // N rows

         C.resize(mDim); // M rows

            for (i = 0; i < mDim; i++){

               A[i].resize(nDim); // M columns

            C[i].resize(pDim); // P columns

            } // End for i

   

         for (i = 0; i < nDim; i++){

               B[i].resize(pDim); // P columns

            } // End for i

   

    } // End of try block

   

    catch (bad_alloc& xa) { // Catch block, for exceptions

   

            in.close();

            out.close();

            cerr << "\nIn catch block, so an exception occurred: " << xa.what() << "\n";

            cout << "\nEnter any key to continue. \n";

            cin >> rflag;

            return 0;

   

    } // End of catch block

   

    for (i = 0; i < mDim; i++){ //Input the A Matrix from the file

            for (j = 0; j < nDim; j++){

              in >> A[i][j];

            }//End for j

    }//End for i

   

    for (i = 0; i < nDim; i++){ //Input the B Matrix from the file

            for (j = 0; j < pDim; j++){

             in >> B[i][j];

            }//End for j

    }//End for i

   

    in.close(); //Close the input file

   

    Matrix_Mult(&erFlag, mDim, nDim, pDim, A, B, C);

   

    if (erFlag){

      cout << "Inconsistent data sent to Matrix_Mult routine. Matrix multiplication NOT performed. Check data before running again.\n";

    }

    else {

   

     out.precision(DBL_DIG);

   

     out << "\nThe A matrix follows:\n";

     out << "\n";

     for (i = 0; i < mDim; i++){

      for (j = 0; j < nDim; j++){

     out << A[i][j] << " ";

      } // End for j

      out << "\n";

     }//End for i

   

     out << "\nThe B matrix follows:\n";

     out << "\n";

     for (i = 0; i < nDim; i++){

      for (j = 0; j < pDim; j++){

     out << B[i][j] << " ";

      } // End for j

      out << "\n";

    }//End for i

   

     out << "\nThe product matrix, C, follows:\n";

     out << "\n";

     for (i = 0; i < mDim; i++){

      for (j = 0; j < pDim; j++){

       out << C[i][j] << " ";

      } // End for j

      out << "\n";

     }//End for i

   

     cout << "\nDone! The solution is in the text file mulmatout.txt \n";

    } // End else !erFlag

    out.close();

    }

    else cout << "\nNot ready. Try again when ready with information. \n";

    cout << "\nEnter any key to continue. \n";

    cin >> rflag;

    return 0;

    }

4.15 LAB: Mad Lib - loops Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways. Write a program that takes a string and integer as input, and outputs a sentence using those items as below. You may assume that the string does not contain spaces.The program repeats until the input is quit 0. Ex: If the input is: apples 5 shoes 2 quit 0 the output is: Eating 5 apples a day keeps the doctor away. Eating 2 shoes a day keeps the doctor away. Note: This is a lab from a previous chapter that now requires the use of a loop. LAB ACTIVITY 4.15.1: LAB: Mad Lib - loops 0 / 10

Answers

Final answer:

This answer provides C++ and Python code for a Mad Libs game that uses loops to generate sentences based on user inputs until 'quit 0' is entered.

Explanation:

This lab activity requires the creation of a Mad Libs game using loops in both C++ and Python programming languages. The game will prompt users to input a string and an integer, and use those inputs to construct and output a humorous sentence. The loop will terminate when the user inputs 'quit 0'. Below you'll find an example code snippets in C++ and Python that accomplish this task.

C++ Example

Write complete code in C++ to create a Mad Libs game that continues to ask for user inputs until 'quit 0' is entered:

#include
#include
using namespace std;

int main() {
   string word;
   int number;
   while (true) {
       cin >> word;
       if (word == "quit") {
           cin >> number;
           if (number == 0) {
               break;
           }
       }
       cin >> number;
       cout << "Eating " << number << " " << word << " a day keeps the doctor away." << endl;
   }
   return 0;
}

Python Example

Write complete code in Python to accomplish the same task:

while True:
   word, number = input().split()
   number = int(number)
   if word == 'quit' and number == 0:
       break
   print(f'Eating {number} {word} a day keeps the doctor away.')

Your friend has a Lenovo IdeaPad N580 laptop, and the hard drive has failed. Her uncle has offered to give her a working hard drive he no longer needs, the Toshiba MK8009GAH 80-GB 4200-RPM drive. Will this drive fit this laptop? Why or why not?a. Yes, the drive form factor and interface connectors match.b. No, the drive form factor matches but the interface does not match.c. Yes, the drive form factor, spindle speed, and interface all match.d. No, the drive form factor and interface do not match.

Answers

Solution:

It will not fit on Lenovo Ideapad N580.

The Ideapad N580 will fit HDD of form factor 2.5" (2.5 Inch) but the form factor of Toshiba mk8009GAH is 1.8" hence won't fit in the slot.

The interface type specifies which type of connector used to connect the motherboard and the HDD and it should be the same in order to use on it.

Ideapad uses the SATA interface type to connect the HDD but the Toshiba mk8009GAH is having an ATA type interface on it hence they cannot be connected with each other.

Final answer:

No, the Toshiba MK8009GAH 80-GB 4200-RPM hard drive will not fit in the Lenovo IdeaPad N580 laptop because it is a 1.8-inch PATA (IDE) drive, while the laptop requires a 2.5-inch SATA drive.

Explanation:

To determine if the Toshiba MK8009GAH 80-GB 4200-RPM hard drive will fit in the Lenovo IdeaPad N580 laptop, we'll need to consider both the drive form factor and interface connector compatibility. Most laptops, including the Lenovo IdeaPad N580, use a 2.5-inch SATA hard drive. The Toshiba MK8009GAH, however, is an older 1.8-inch PATA (IDE) drive (as indicated by its 4200-RPM speed which is more common in older drives, and the MK series which was typically PATA drives).

The answer is d. No, the drive form factor and interface do not match. The physical size (form factor) of the Toshiba drive is smaller and the interface is IDE, not SATA. Therefore, this drive would not fit nor connect properly without an appropriate adapter, which typically is not a feasible solution for replacing a laptop hard drive.

2 – [4 pts] Imagine that you are an application developer. A new version of your operating system is released with several changes made to the transport layer protocols. Specifically, the algorithm for TCP has been changed from Tahoe to Reno. What changes must be made to your application to accommodate these changes?

Answers

Answer:

TCP convention is totally connection oriented, it searches for the information that was going in the system definitely and will guarantee an affirmation on the parcel sent, likewise if the uplayer convention is down, it won't permit to move the information, fundamentally it will guarantee there is no any bundle misfortune during the exchange.  

~ However UDP is connectionless convention, there is no any affirmation business in UDP convention, it regularly utilized where not many datagram misfortune doesn't a make a difference. It was nearly a light gauge convention.  

So underneath are sway we will confront, if TCP is expelled.  

1. There will association foundation required in information move, so the application will work minimal quicker.  

2. without appropriate information control and affirmations, there is gigantic possibility for information misfortune.  

3. Presently the application needs to depend totally on UDP, since UDP doesn't has blockage control, the application will get clogged.  

4. Likewise the communication with top layer convention will be a wreck, it won't look if the layers are down or not. so if any upper layer is down, consequently the information will stuck the system, can't capable arrive at the goal.

Explanation:

Switching to TCP Reno from Tahoe requires adapting to faster congestion recovery and retransmission strategies. Applications should adjust for improved throughput and handling of packet loss signals.

Switching the TCP algorithm from Tahoe to Reno in the operating system affects how your application interacts with the network, particularly in terms of congestion control and handling of packet loss. Here are the key changes you would need to consider and potentially address in your application:

1. Congestion Control Behavior: Reno TCP introduces Fast Recovery and Fast Retransmit mechanisms, which allow faster recovery from packet loss compared to Tahoe. Your application should be aware of these behaviors, especially in scenarios where it needs to manage large data transfers or real-time communications. It may need to adjust its own congestion control strategies or settings to optimize performance with Reno TCP.

2. Handling of Packet Loss: Reno TCP reacts differently to packet loss compared to Tahoe. Instead of immediately halving the congestion window (as Tahoe does), Reno enters Fast Recovery, retransmits the lost packet, and then adjusts its congestion window dynamically. Your application should be prepared for potentially different patterns of packet loss and recovery, which could affect application-level retransmission strategies or timeouts.

3. Performance Monitoring and Tuning: With the change to Reno TCP, monitoring and tuning network performance metrics becomes crucial. Your application may need to adapt its monitoring mechanisms to track parameters specific to Reno's congestion control algorithms, such as congestion window size, packet retransmission rates, and round-trip time estimates.

4. Compatibility and Testing: Ensure compatibility with both Tahoe and Reno TCP variants during transitional periods. Your application should be able to gracefully handle connections with both types of TCP algorithms to support users who have not yet upgraded their operating systems.

5.Documentation and User Communication: Update documentation and inform users about any changes in network behavior or performance optimizations that may result from switching to Reno TCP. Provide guidance on configuring your application to leverage Reno's improvements effectively.

By considering these factors and making necessary adjustments in your application, you can ensure optimal performance and compatibility with the new Reno TCP algorithm introduced in the operating system update.

For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping against the other sides. Use this result to show that a clipper can be implemented as a pipeline of four simple clippers.

Answers

Final answer:

The answer explains the concept of clipping in geometry and how it relates to implementing clippers in a pipeline. It also discusses the proofs and theorems in geometry regarding segments, polygons, and constructions using straight-edge and transferer of segments.

Explanation:

Clipping against the top of the clipping rectangle can be done independently of the other sides due to the nature of line segments. This concept is essential in implementing a clipper as a pipeline of four simple clippers.

Proofs and theorems in geometry demonstrate the relationships and properties of segments, polygons, and shapes in a structured manner.

Understanding the construction using straight-edge and transferer of segments allows for solving a variety of geometrical problems by drawing straight lines and laying off segments.

Suppose Host A wants to send a large file to host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2=2 Mbps, and R3 = 1 Mbps. Assuming no other traffic in the network, what is the throughput for the file transfer? 500 kbps

Answers

Answer:

500kbps

Explanation:

Bandwidth is the actual amount of data that a network is capable of transferring theoretically.

Throughput is the actual amount of data passing through a connection. It is the rate (usually measured in bps- bits per sec or pps - packets per second) at which packets or bits are successfully delivered over a network channel

If R₁=500 kbps, R₂=2 Mbps, and R₃ = 1 Mbps.

Since there is no other traffic in the link from Host A to Host B, the Throughput is the minimum of the links between Host A and Host B. Therefore:

Throughput= Mininum(R₁,R₂,R₃)

=500kbps

Task 2 Design a 1st order low-pass filter with cutoff frequency 1kHz, 1) with roll-off and 2) without roll-off. For each filter, a) Provide the transfer function. b) Plot the step response of these filters. c) Plot the Bode frequency response of these filters. d) Compare the step and frequency responses of these two filters. e) Include the MATLAB code.

Answers

You can get complete answer in attached document.please have a look.

Explanation:

(2) Without rolloff, as given fc =1kHz Let us assume it is a first order RC filter ats transfer function is H(s)-RC RC withou

Then the transfer function becom

and step response is flat zero for without rolloff..

As part of the systems engineering development team, use IDEF0 to develop a functional architecture. The functional architecture should address all of the functions associated with the ATM. This functional architecture should be at least two levels deep and should be four levels deep in at least one functional area that is most complex. Note that you will be graded on your adherence to proper IDEF0 semantics and syntax, as well as the substance of your work.

Pick three scenarios from the operational concept and describe how these scenarios can be realized within your functional architecture by tracing functionality paths through the functional architecture. Start with the external input(s) relevant to each scenario and show how each input(s) is(are) transformed by tracing from function to function at various levels of the functional decomposition, until the scenario's output(s) is(are) produced. Highlight with three different colors (one color for each scenario) the thread of functionality associated with each of these three scenarios.

If your functional architecture is inadequate, make the appropriate changes to your functional architecture.239

As part of the systems engineering development team for the ATM, update your requirements document to reflect any insights into requirements that you obtained by creating a functional architecture. That is, if you added, deleted, or modified any input, controls, or outputs for the system, modify your input/output requirements. Also update your external systems diagram if any changes are needed.

Answers

Answer:

Explanation: see attachment below

Write a method swapArrayEnds() that swaps the first and last elements of its array parameter. Ex: sortArray = {10, 20, 30, 40} becomes {40, 20, 30, 10}.

Answers

Final answer:

The swapArrayEnds() method exchanges the positions of the first and last elements in an array. For an array with two or more elements, the method uses a temporary variable to hold one element during the swap. This method is a basic array manipulation technique in programming.

Explanation:

The method swapArrayEnds() swaps the first and last elements of an array. In a programming language like Java or Python, this task is typically performed by accessing the elements at their respective indices and then swapping their values. Here’s an example of how you might write this method in Java:

void swapArrayEnds(int[] array) {
   if(array != null && array.length > 1) {
       int temp = array[0];
       array[0] = array[array.length - 1];
       array[array.length - 1] = temp;
   }
}

By checking if the array is not null and has more than one element, we ensure that we do not try to swap ends on an empty or single-element array, which would be unnecessary. This is a common operation in array manipulation, and understanding how to implement it is useful in many programming and computer science applications.

Banks often record transactions on an account in order of the times of the transactions, but many people like to receive their bank statements with checks listed in order by check number. People usually write checks in order by check number, and merchants usually cash them with reasonable dispatch. The problem of converting time-of-transaction ordering to check-number ordering is therefore the problem of sorting almost-sorted input. Argue that the procedure INSERTION-SORT would tend to beat the procedure QUICKSORT on this problem.

Answers

Answer: Insertion Sort is more efficient , stable and faster than quick sort in writing sorting algorithms.

Insertion sort saves space without moving blocks of data and ensuring data stability.

Explanation:

Insertion Sort involves sorting given items in an algorithm by taking unsorted items, inserting them in sorted order in front of the other items and repeating until all items are in order.

Insertion sort process is relatively stable and faster compared to both quick sort and merge sort in algorithm manipulation since we are only moving smaller items in front without moving blocks of items.

On the other hand, Quick Sort is an algorithm that involves or chooses a random pivot and sort items smaller than the chosen pivot to the left and items bigger than the chosen pivot to the right till all items are in sorted order.

Quick Sort is a space sorting algorithm with extra stack frame space and has a risk of an unbalanced pivoting point which may cause extra running time and may also be highly unstable compared with Insertion sort method.

Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric cryptography in applications?

Answers

Answer:

Advantage symmetric cryptography

Explanation:

1. The same key is used to both encrypt and decrypt messages.  

2. Symmetric key algorithms are widely applied in various types of computer systems to improve data security.

3. The security of symmetric encryption systems is based on the difficulty of randomly guessing the corresponding key to force them.

4. The Advanced Encryption Standard (AES) widely used in both secure messaging applications and cloud storage is a prominent example of symmetric encryption.

5. For every bit added to the length of a symmetric key, the difficulty of decrypting encryption using a brute force attack increases exponentially.

Answer:

data security and user privacy

Explanation:Symmetric algorithms provide a fairly high level of security while at the same time allowing for messages to be encrypted and decrypted quickly. The relative simplicity of symmetric systems is also a logistical advantage, as they require less computing power than the asymmetric ones. In addition, the security provided by symmetric encryption can be scaled up simply by increasing key lengths. For every single bit added to the length of a symmetric key, the difficulty of cracking the encryption through a brute force attack increases exponentially.

Nicholas Carr says firms shouldn't develop their own IS because any competitive advantage produced by the new system will be lost as a result of dissemination of the new technology into the market. In this statement, he is referring to the process of ______.

Answers

Answer:

Transference

Explanation:

According to carr

Given a set S = {a1, a2, ..., an} of positive integers (denoting asset values), Set partitioning requires to partition S into two subsets S1 and S2 that minimizes the difference in the total (asset) values of S1 and S2. Identify a dynamic programming (DP) algorithm for the Set partition problem. Clarify all relevant details, justifying the DP formulation, and analyze your time-complexity. Illustrate the working of your DP algorithm, partitioning this example set S = {10, 6, 4, 4, 4, 3}

Answers

Answer:

See the pictures attached

Explanation:

1. Update the payroll program, so that if user enters more than 60 hours a week, it should display double time for hours more than 60, one-half time more than 40 and less than or equal to 60. On the end program should display the gross pay for that employee or user. Save the program in payroll.py.

Answers

Answer:

The initial program was not provided.

I'll answer the question base on the following assumptions.

1. I'll declare a rate of payment for hours more than 60 and a different rate of payment for hours between 40 and 60.

2. Gross payment is calculated by rates of payment * hours worked.

# Program starts here

# Comments are used for explanatory purpose

def main():

#accept input for hours

x= input ("Enter Hours Worked per week")

#convert to integer

hours = int(x)

#accept input for rate of payment

y= input ("Enter Rate of payment per week")

#convert to integer

Rate = int(y)

#test the range of values of hours

if(hours>60):

st= "double time for hours more than 60"

elif(hours>=40 && hours<=60):

st= "one-half time more than 40 and less than or equal to 60"

print(st)

Gross = Rate * hours

print(Gross)

public class Robot

{

public Robot() { System.out.println("Tom Servo"); }

public Robot(String name) { System.out.println(name); }

}

public class Cyborg extends Robot

{

public Cyborg() { System.out.println("Robocop");

public Cyborg(String name) { System.out.println(name);

}

public class Cyberman extends Cyborg

{

public Cyberman() { super(); System.out.println("Cyberman"); }

public Cyberman(String name) { super(name); System.out.println(name);

}

Given the class hierarchy above, what output would be generated with the following statement: Cyberman one = new Cyberman("Bob");

Answers

Answer:

Tom Servo

Bob (prints inside Cyborg constructor)

Bob (prints inside Cyberman constructor)

Explanation:

The above type of inheritance is multilevel inheritance where Robot is super class and Cyborg and Cyberman are sub classes.

So in above statement

Cyberman one = new Cyberman("Bob"); it calls the Cyberman(String name) in which super(name) calls Cyborg(String name) but before executing the body inside Cyborg constructor it first calls super class default constructor (i.e., Robot()) so the output of the above statement is

Tom Servo

Bob (prints inside Cyborg constructor)

Bob (prints inside Cyberman constructor)

1. Voltage (V) is a measure of how much electrical energy is in a circuit. Most household circuits operate at 120 volts (120 V). Is this true of the computer?

Answers

Answer:

no

Explanation:

The computer has a PSU(power supply unit )which is a hardware component of a computer that supplies all other components with power. The power supply converts the 120 volt AC (alternating current) into a steady low-voltage DC (direct current) usable by the computer.

parts in a PSU include

   A rectifier that converts AC (alternating current) into DC.

   A filter that smooths out the DC (direct current) coming from a rectifier.

   A transformer that controls the incoming voltage by stepping it up or down.

   A voltage regulator that controls the DC output, allowing the correct amount of power, volts or watts, to be supplied to other computer hardware.

The homework is based on E5.3, write a program that has the following methods. a. int firstDigit(int n) , returning the first digit of the argument b. int lastDigit(int n) , returning the last digit of the argument c. int digits(int n) , returning the number of digits of the argument For example, firstDigit(1729) is 1, last digit(1729) is 9, and digits(1729) is 4. d. a main method that i) ask the user to input a non-negative integer ii) print out the number of digits, the first digit and the last digit of the input by calling the methods you defined iii) repeat the above process (i and ii) until the user input a negative number

Answers

Answer:

C++ code is explained

Explanation:

#include <iostream>

#include <string>

#include <sstream>

using namespace std;

int firstDigit(int n){

// Converting int to string

ostringstream convert;

convert << n;

string s = convert.str();

char first_char = s[0];

int first_int = first_char - '0';

return first_int;

}

int lastDigit(int n){

// Converting int to string

ostringstream convert;

convert << n;

string s = convert.str();

char last_char = s[s.length() - 1];

int last_int = last_char - '0';

return last_int;

}

int digits(int n){

// Converting int to string

ostringstream convert;

convert << n;

string s = convert.str();

int length = s.length();

return length;

}

int main() {

int number;

cout << "Enter integer: " << endl;

cin >> number;

cout << "The first digit of the number is " << firstDigit(number) << endl;

cout << "The last digit of the number is " << lastDigit(number) << endl;

cout << "The number of digits of the number is " << digits(number) << endl;

}

Write a logical expression that is equivalent to the Exclusive OR gate on 2 inputs, called in1, in2: If either one or the other (but not both) input is True, then your expression should evaluate to True. Otherwise (both inputs are True or both inputs are False), then your expression should evaluate to False.

Answers

Answer:

F= in1'.in2' + (in1.in2)' + in1'. in2+ in1.in2'

Explanation:

See the truth table in the attachment

I have used apostropy (') to write complement

Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components: (1) The 32-bit memory address is subdivided into several sections in bits so that each address can map to its cache location (2) The cache itself including the cache storage and other necessary bits in each cache line. Explain your design.

Answers

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:______________.

Answers

Answer:

The severity and likelihood of harm

Explanation:

So that there is no room for a data breach.

Some example questions include: ""How does multithreading affect the throughput of a GetFile Server hosting many very large files?"" or ""How does multithreading affect the average response time for a GetFile server hosting a few small files?""

Answers

How does multithreading affect the throughput of a GetFile Server hosting many very large files?

Answer:

It create multiple threads of large file which eventually causes in slowing down the speed of server which results in slower response time.

How does multithreading affect the average response time for a GetFile server hosting a few small files?

Answer:

Multiple threads in smaller files result in rapid response time and enormous process speed in small files.

Agile methods use rapid development cycles to iteratively produce running versions of the system. How would these shorter cycles affect the ability of the analyst to manage system’s requirements?

Answers

Answer:

The correct answer to the following question will be "Iterative procedure".

Explanation:

Iterative production or procedure seems to be a technique of distinguishing product progression from expansive implementation to littler bits. This including code in regurgitated processes is designed, developed and attempted.

Regularly iterative architecture is used in conjunction with gradual improvement where a certain more sketched-out process of code progress is composed of littler components building on each other.

Time-consuming.Better testing.Better product.Review of code.

This will improve observer performance, as each move is systematic and cheap to run.

The shorter cycles of Iterative production affect the ability of the analyst to manage system’s requirements in a way that improve the observer performance as each move is systematic and cheap to run.

An Iterative production means a technique of distinguishing product progression from expansive implementation to littler bits.

An Iterative production which includes code in regurgitated processes is designed, developed and attempted.

In conclusion, the shorter cycles of Iterative production affect the ability of the analyst to manage system’s requirements in a way that improve the observer performance as each move is systematic and cheap to run.

Read more about Iterative production

brainly.com/question/6019026

Write a function maxTemp which takes a filename as string argument and returns the maximum temperature as float type for the week. Input file will contain temperature readings for each day of the week. Your function should read each line from the given filename, parse and process the data, and return the required information. Your function should return the highest temperature for the whole week. Empty lines do not count as entries, and should be ignored. If the input file cannot be opened, return -1. Remember temperature readings can be decimal and negative numbers.

Answers

Answer:

The solution is written in Python 3

def maxTemp(fileName):    try:        with open(fileName) as file:            raw_data = file.readlines()            highest = 0            for row in raw_data:                if(row == "\n"):                    continue                                data = float(row)                if(highest < data):                    highest = data            return highest    except FileNotFoundError as found_error:        return -1 higestTemp = maxTemp("text1.txt") print(higestTemp)

Explanation:

Firstly, create a function maxTemp that take one input file name (Line 1). Next create an exception handling try and except block to handle the situation when the read file is not found or cannot be open, it shall return -1 (Line 2, Line 15 -16).

Next use the readlines method to read the temperature data from the input file (Line 4). Before we traverse the read data using for loop, we create a variable highest to hold the value of max temperature (Line 5). Let's set it as zero in the first place.

Then use for loop to read the temp data line by line (Line 6) and if there is any empty line (Line 7) just ignore and proceed to the next iteration (Line 7 -8). Otherwise, the current row reading will be parsed to float type (Line 10) and the parsed data will be check with the current highest value. If current highest value is bigger than the current parsed data (), the program will set the parse data to highest variable (Line 11 -12).

After finishing the loop, return the highest as output (Line 14).  

You coded the following class:

try

{

Scanner file = new Scanner( new File("data.txt"));

String s = file.nextLine();

}
catch (ArithmeticException ae)

{

System.out.println(ae.getMessage());

}

Explain what the problem is and how to fix it.

Answers

Answer:

The code above tries to read a file using the scanner class in java programming language.

But it was done properly.

First, the scanner class library is not imported to the program.

Second,the syntax used in this program is an invalid way of reading a file in java programming language using the scanner class.

Lastly, "String s = file.nextLine();" is not a proper way of reading each line

To correct this problem; use the following code;

import java.util.Scanner;

import java.io.File;

import java.io.FileNotFoundException;

public class ReadFileWithScanner {

try

{

public static void main(String args[]) throws FileNotFoundException {

File text = new File("data.txt");

Scanner file = new Scanner(text);

int lines = 1;

while(file.hasNextLine()){

String line = filw.nextLine();

System.out.println("line " + lines + " :" + line);

lines++;

}

catch (ArithmeticException ae)

{

System.out.println(ae.getMessage());

}

}

}

1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way we’ve been generating random numbers in this book, however, there appears to be an error. Can you find it?

Answers

Answer:

Display random(1, 7).

Explanation:

In the following question, some details of the question are missing that is pseudocode.

//  Program shows three random numbers

// the range of 1 to 7.

Declare the Integer count

// Shows three random numbers.

For count = 1 To 3

Display random(7, 1)

End For

In the following pseudocode, it generates three random numbers from 1 to 7 because the for loop statement is starts from 1 and end at 3 so the loop will iterate three times and every time it generates one random number from 1 to 7. So, the following are the reason that describe the answer is correct according to the scenario.

Final answer:

The issue with the pseudocode might be related to the exclusive nature of the upper boundary in many random number generator methods. The programmer may need to add 1 to the function to generate values inclusive of 7.

Explanation:

Without seeing the actual pseudocode, it's tough to give a specific correction. However, the common error in generating random numbers is not considering the exclusive nature of the upper boundary in random number methods. Most methods generate numbers from 0 (inclusive) up to the specified upper limit number (exclusive).  To generate random numbers within the range from 1 to 7 (inclusive), the code should add 1 to the random output. Therefore, a possible correction would be to modify the random number generator function to include 7 and exclude 0.

For example, in many programming languages, one could use a function similar to '1 + Math.floor(Math.random() * 7)', ensuring that we generate random numbers between 1 and 7 inclusive. Kindly refer to the specific programming language practices when implementing.

Learn more about Random Number Generation here:

https://brainly.com/question/32196150

#SPJ3

"Suppose that a program's data and executable code require 1,024 bytes of memory. A new section of code must be added; it will be used with various values 35 times during the execution of a program. When implemented as a macro, the macro code requires 61 bytes of memory. When implemented as a procedure, the procedure code requires 168 bytes (including parameter-passing, etc.), and each procedure call requires 6 bytes. How many bytes of memory will the entire program require if the new code is added as a macro

Answers

Answer:

3,159 bytes

Explanation:

When implemented as a macro, for each of the 35 executions, the program will require enough memory for the whole macro code (61 bytes). Since the program's data and executable code require 1,024 bytes, the number of bytes required by the entire program is:

[tex]M = 1,024+(35*61)\\M=3,159\ bytes[/tex]

The program requires 3,159 bytes if the new code is added as a macro.

Write a class Battery that models a rechargeable battery. A battery has capacity (instance variable) which can be drained. Capacity is a double value measured in milliampere hours (mAh) java

Answers

A battery has capacity (instance variable) which can be drained. Capacity is a double value measured in milliampere hours (mAh) -A typical AA battery has a capacity of 2000 to 3000 mAh

Explanation:

public class Battery

{

     private double fullCharge;

     private double batteryCapacity;

public Battery(doublecapacity)

{

     battery Capacity = capacity;

     full Charge = capacity;

}

public void drain(double amount)

{

    battery Capacity = battery  Capacity - amount;

}

public void charge()

{

     battery Capacity = fullCharge;

}

public double get RemainingCapacity()

{

    return battery Capacity;

}

}  

Other Questions
A company has prepared the operating budget and the cash budget and is now preparing the budgeted balance sheet. The balance of Accounts Receivable can be obtained from the ________. Decrease 620 by 10% If f(x) = 7 + 4x and g(x)= 7x, what is the value of (f/g)(5) Piebald spotting is a condition found in humans in which there are patches of skin that lack pigmentation. The condition results from the inability of pigment-producing cells to migrate properly during development. Two adults with piebald spotting have one child who has this trait and a second child with normal skin pigmentation. Is piebald spotting dominant or recessive I think i know but I probably have it wrong, will give Brainliest Which function has the given properties below? The domain is the set of all real numbers. One x-intercept is (StartFraction pi over 2 EndFraction, 0 EndFraction). The maximum value is 3. The y-intercept is (0, 3). Which actions can be taken to plan for a drought? Check all that apply.Replace low-water plants with grass.Pour excess water down the drain.Repair leaky bathroom faucets.Take longer showers.Turn off water while brushing teeth. Which of the following statements about joint-cost allocation is false? Joint-cost allocation is useful in making a profit determination about individual joint products. Joint-cost allocation is useful in deciding whether to further process a product after split-off. Joint-cost allocation can be accomplished by using several different methods that focus on sales value and product "worth." Joint-cost allocation is helpful in inventory valuation. Joint-cost allocation can be based on the number of units produced. Problem 13-03A a-c (Video) The stockholders equity accounts of Novak Corporation on January 1, 2020, were as follows. Preferred Stock (8%, $52 par, 10,000 shares authorized) $ 442,000 Common Stock ($1 stated value, 1,950,000 shares authorized) 1,350,000 Paid-in Capital in Excess of ParPreferred Stock 115,000 Paid-in Capital in Excess of Stated ValueCommon Stock 1,400,000 Retained Earnings 1,750,000 Treasury Stock (10,500 common shares) 52,500 During 2020, the corporation had the following transactions and events pertaining to its stockholders equity. Feb. 1 Issued 26,000 shares of common stock for $122,000. Apr. 14 Sold 5,700 shares of treasury stockcommon for $32,700. Sept. 3 Issued 5,100 shares of common stock for a patent valued at $36,000. Nov. 10 Purchased 1,000 shares of common stock for the treasury at a cost of $6,000. Dec. 31 Determined that net income for the year was $485,000. No dividends were declared during the year. Explain why the particle in a box and the harmonic oscillator are useful models for quantum mechanical systems: what chemically significant systems can they be used to represent Create a Time Conversion application that prompts the user for a time in minutes and then displays the time in hours and minutes. Be sure to consider times whether the number of minutes left over is less than 10. For example, 184 minutes in hour:minute format is 3:04 (Hint: use the modulus operator). The application output should look similar to: Jan and Dean decided to form a charitable organization, I Love Rock N Rollers, to provide funding to assist former rock and roll group members who have become homeless. They are planning to hold a "mini-Woodstock" event to raise money, with music by groups from the 60s and 70s. The event will offer food and beverages, and the sale of memorabilia related to the event. Before they go any further, Jan and Dean need to:Prepare articles of incorporation and bylaws, obtain an EIN from the IRS if the organization will have employees, apply for permission to solicit charitable contributions and apply for 501(c)(3) status from the IRS.Prepare articles of incorporation and bylaws and file them with the state, obtain an EIN from the IRS if the organization will have employees, apply for permission to solicit charitable contributions and apply for 501(a) status from the IRS.Prepare articles of incorporation and bylaws and file them with the state, obtain an EIN from the IRS, apply for permission to solicit charitable contributions and apply for 501(c)(3) status from the IRS.Prepare articles of incorporation and bylaws, obtain an EIN from the IRS, apply for permission to solicit charitable contributions and apply for 501(a) status from the IRS. Carolina breeds Dachshunds and is an active participant in dog shows. Although her fellow dog enthusiasts hold the values of mainstream society, they also have strong beliefs about the importance of animals and believe animals are as important as humans in society. Carolina is the member of a:________.a. categoryb. collectivec. subcultured. counterculture What is an equation of the line that passes through the points (5,7) and (5,1)? Use the confidence level and sample data to find the margin of error E. Round your answer to the same number of decimal places as the sample mean unless otherwise noted.Weights of eggs: 95% confidence; n=53, /x =1.34 oz, standard deviation = 0.58 ozA.) (0 pts) 0.13 ozB.) (0 pts) 0.02 ozC.) (1 pts) 0.16 ozD.) (0 pts) 0.36 oz Why might construction crews want to install pipes before the foundation is pouredA.Pipes form an important component of the structural integrity of a foundation.B.All utilities, including electrical and HVAC, are installed before the foundation is laid.C.Plumbing must feed into municipal water and sewer lines buried below the foundation.D.Plumbing crews are more expensive than concrete masons; therefore it is cheaper if they do their work first. What is the most common and powerful agent of erosion?A.) windB.) iceC.) waterD.) animal behaviorC.) WATER IS THE ANSWER!! An air-mass source region: a. may consist of both land and water. b. is generally an area characterized by a cyclonic circulation pattern. c. is best typified by the central United States. d. is characterized by a general stagnation of atmospheric circulation. at a farm 15 of the 20 chicken are hens what percent of the chicken in the farms hens Which statements are true about the ordered pair (10, 5) and the system of equations? {2x5y=5 x+2y=11 Select each correct answer. The ordered pair (10, 5) is a solution to the first equation because it makes the first equation true. The ordered pair (10, 5) is a solution to the second equation because it makes the second equation true. The ordered pair (10, 5) is not a solution to the system because it makes at least one of the equations false. The ordered pair (10, 5) is a solution to the system because it makes both equations true. Steam Workshop Downloader