B) Write a PYTHON script to enter a value of S (between 1 and 3) for (60) entered values of X then find and print the following: 1- Sum of the entered numbers between 6 and 60 (if S = 1) 2- Sum of positive numbers (if S = 2) 3- The number of numbers that are divisible by 4 (if S = 3)
Q: the out put of the following is #include using namespace std; int main() { int a= 2, b=5,c=e; C+= a...
A: #include <iostream> using namespace std; int main(){ int a=2, b=5, c=0; c+= a*b++; ...
Q: . How to write and print out a PowerShell of Sunday, March 5th 2022 11:27 AM
A: Ans : Powershell command is : Get-Date -UnixTimeSeconds 1577836800
Q: What is the result of this code segment * Dim x As Integer X = 0 Do While x < 100 Print x X = x + 2 ...
A: what is the result of this code
Q: One of the following hacker is using their programming skills for good ethics and they inform the de...
A: Please find the correct answer and proper explanation for both correct and wrong answers in the foll...
Q: a. Design a two-level page table (Suppose we need to fit each page table into a physical frame). b. ...
A:
Q: let y='a' then cout <<++y will be * a O y O b The part that saves data and programs is Printer O Har...
A: Here is the detailed explanation of the program
Q: Language: C++ A shell sort algorithm is a variation of insertion sort. Your task is to sort the arra...
A: the c++ code is an given below : #include <iostream>using namespace std; void shellSort(int ...
Q: What information is usually provided in a Layer 1 frame?
A: Introduction: Layer 1, or the physical layer, is the lowest layer of a communication system's intern...
Q: What is the difference between ASCII and Unicode? Simple answer please
A: difference between ASCII and Unicode
Q: NW Q3) IP addressing operates at the network layer (Layer 3) of OSI, IP addresses must be able to id...
A: The answer as
Q: What is the most affordable firewall you can find?
A: A firewall protects the system from external traffic. It decides to allow or block the data to enter...
Q: Problem #3 - Search a string. Write a program which counts the number of a particular character foun...
A: I give the code in C along with output and code screenshot
Q: Q1. what is at put gf thie logic gate? A F=?
A:
Q: Two keywords can be used in ACL to replace the address or the wildcard mask. O Host and some O Host ...
A:
Q: Solve: QI/ Print the output System.out.println("Welcome to \nComputer Science"); Q2/Trace the code t...
A: In the given question I have to solve the output of the program and last question is a mathematical ...
Q: Why do you think a JVM's method area is shared by all threads running within the virtual machine?
A: Introduction: The byte codes of all Java programs are stored in class files, which are the machine l...
Q: To allows us to use the cout to generate output and the (manipulator) endl ,use *
A: This is a MCQ question related to C++ , we have to choose the correct option out of 4
Q: Please explain me about these by using key design half - subtractor by using key design full-subtrac...
A: Please refer below for your reference:
Q: A Caesar cipher is a simple substitution cipher based on the idea of shifting each letter of the pla...
A: Caesar cipher is the simplest encryption and decryption technique in which we use a key to encrypt o...
Q: What is the name of the method for limiting access to an object's internal properties?
A: There are some special keyword that gives limiting access to an object's internal properties. Lets t...
Q: Sony PlayStation Network hack in April 2011. Describe the damages that Sony incurred from the hack.
A: Given: Sony PlayStation Network hack in April 2011. Describe the damages that Sony incurred from the...
Q: 6) Write assembly language code that takes an 8-bit signed number in a register as its input and sig...
A: Here is the detailed explanation of the solution
Q: 6. Following data are coming from a biometric system. It has four sensors. The designer decides to r...
A: Solution ::
Q: Explain the decision tree. Illustrate the concept of a decision tree by taking a suitable example wi...
A: Decision Tree: A decision tree is a very specific type of probability tree that enables you to make...
Q: What is the output of this code segment when the input value of X equal 100.
A: Out of range
Q: Justify why deep access is better than shallow access from the standpoint of a coder; avoid making a...
A: Introduction: Deep and shallow binding are two variable access strategies used in computer languages...
Q: Make a Java program that perform arithmetic operations using any variable that you want. For. exampl...
A: Please refer below for your reference: import java.util.*; class Compute { public static void ...
Q: Personal Information ProgramDevelop a program, in which you’ll design a class that holds the followi...
A: ANSWER:-
Q: Give example of Date class from Simple date format class in JAVA.
A: Introduction: The java.text.SimpleDateFormat class in Java contains methods for formatting and parsi...
Q: Java program. 1. Explain the difference between the 9 primitive data types in java.
A:
Q: what is the key Connect records of one kind to records of another.
A: Introduction: A one-to-one connection is a link between two tables of data in which each entry occur...
Q: What is the output of this code segment when the input value of x equal 9, input value of y equal 2 ...
A: Given data: x = 9 y = 2 symbol = "/".
Q: rue/False In Floating Point Addition, the exponents of the two numbers being added need to be made ...
A: To grasp floating-point addition, consider adding real numbers in decimal first, as the reasoning is...
Q: An If contained within another If statement is called
A: None of the above NOTE:- As no value of X is given, none of the cases will run. Missing the us...
Q: What are the risks connected with using the MD5 algorithm to sign certificates?
A: Given: What are the vulnerabilities associated with signing certificates using the MD5 algorithm?
Q: In reviewing CSIS 1500 Introduction to Business Technologies, summarize contents and knowledge you'v...
A: Business Technology are those concepts that describes the use of technology to run any business and ...
Q: Procedure Coding Procedure codes are a very important part of medical billing. They are used to des...
A: ICD diagnostic codes are available for all Medicare claim level and residential level files: Patient...
Q: gate with three input signals and one output The operation F(X, Y, Z) - (IX + !Y + IZ) can be implem...
A: Answer is: NAND Gate NAND gate has three input: X, Y, Z and output is F = (X + Y + Z)' = X' + Y' +Z...
Q: Demonstrate how native authentication and authorization services are utilized when a web client requ...
A: Introduction: Verification is the process of establishing the identity of a person or item or the tr...
Q: Explain how to turn the letters A, B, and C into decimal numbers.
A: Introduction: Decimal Number System The decimal number system is a base-ten system. It has ten sym...
Q: try to run checks it does not work, w
A: //Program #include<iostream.h> #include<conio.h> void main() { int tot_room,days; float...
Q: Let's pretend we have a fully developed m-ary tree. The tree has internal vertices if the value of m...
A: Find the answer with calculation given as below :
Q: In the physical world, what is required to create a database? Make a list of some of the most widely...
A: Introduction: A database is a structured collection of data stored and retrieved electronically in c...
Q: Create an activity diagram with these characteristics (assume that you will go throu these sequentia...
A: activity diagram is given below
Q: What are some of the possible uses for cloud collaboration?
A: Introduction: Cloud collaboration is a sort of team collaboration in which employees communicate on ...
Q: What is the purpose of a Master file, which includes largely permanent data?
A:
Q: Provide pseudocode for a real-life range check. Explain how it works.
A: Pseudocode is an informal way of programming description that does not require any strict programmin...
Q: In the.Net programming language, what is the difference between a function and a stored procedure?
A: Introduction: The function must return a value. However, this is optional with Stored Procedures. Ev...
Q: JS Write a function named find_value that takes a list/array of whole numbers as a parameter. Your f...
A: I give the code in js(javascript ) and provide the output and code screenshot. I also provide the sa...
Q: What are the most important features of a computer processor?
A: Introduction: The logic circuitry that listens to and executes the fundamental instructions that ope...
Step by step
Solved in 4 steps with 2 images
- In python language please Input a sentence from the user and compute the following: Eg: Dont give up Find the ASCII value for each character of each word and calculate the sum. //hint use ord() & chr() function are used to find corresponding ASCII & char values in python. //*if you get any value ranges from 1 to 32 then replace with $ symbol //char[1-32]--->S Dont give up ASCII(D)=68 ASCII (0)=111 ASCII(n)=110 ASCII(t)=116 sum=68+111+110+116=405. The set are (40, 04), (45,54), (05,50). The biggest values in a set is(40, 54, 50). char(40)=( char(54)=6 char(50)=2 ASCII(g)=103 ASCII()=105 ASCII(v)=118 ASCII(e)=101 sum=103+105+118+101-427, The set are(42.24), (47,74),(27,72), The biggest values in a set is (42.74,72) char(42)=* char(74)=) char(72)=H ASCII(u)=117 ASCII (p)=112 sum=117+112=229, The set are (22.22). (29.92). (29.92), The biggest values in a set is(22.92.92) char(22)=$(Replaced with S)3. Consider the following code segment: X = 0 for i in range(3): for j in range(3): х3х+ 1 X = x*2 What is the value of x after the code segment has run? (a) 90 (b) 42 (с) 18 (d) 6hi 30 Write an algorithm to find the value of * Y from the following (X!), 2(X!) + 2 3 4 3(X!) Y = +.......N terms
- Write a function that prints the ASCII values of the char- acters using the following header: void printASCII(char ch1, char ch2, int numberPerLine) This function prints the ASCII values of characters between ch1 and ch2 with the specified number of characters per line. Write a test program that prints 6 ASCII values per line of characters from 'a' to 'm'.simple shell script program: 1.Using gitbash Find the numbers that can be expressed as the product of two nonnegative integers in succession and print them in increasing order. 2.For each number found the program should check whether the number is a multiple of 5 and indicate this in the output. (For example, 30 is such a number as it can be written as the product of 5 and 6 (30=5x6), which are two numbers in succession.) 3.The user should specify how many such numbers they want to print.earning Portal Courses - Reports - e-Services - Academic Departments ETC CIMS - Write the python program to get a mark of a student as input and print the appropriate message according to the given table. Mark Message <50 51-55 56-66 C- 67-73 73-76 C+ 77-79 B- 80-83 84-87 B+ 88-95 A- 96-100 A BI 四 !!
- Q2/ (a) Write a program in C Language to read an integer number (X) to calculate and print Y values, using SWITHC FUČNTION based on the following equations: 3x -7 f x--3 y Sx f x= 2 or 5 x- 4x² if x = -4 or 4 (b) Find the solution of following set of liner equations in MATLAB. 2X-Y+Z=4 X+Y+Z=3 3X-Y-Z1Write the pseudo code and the python code for a function that will accept a dna sequence, start position, stop position: The function should: (a) Return the exon. (b) Set a default value for the stop position to be the length of the sequence (c) Ensure that the number of nucleotides in the coding exon is a multiple of 3Write a python program that takes 2 strings in lowercase as input from the user. 1) First string with a length greater than 2 and less than 5 2) second string with a length greater than 5 After taking the inputs, pass these values as arguments to the function. Your function calculates the summation of the ASCII values of each of the given strings and generates a number according to the following formula. random_number= (summation of ASCII value of string 1% length of 2nd string) + (summation of ASCII value of string2% length of 1st string) For any invalid inputs and your function should print "Invalid input". Otherwise, calculate the random number and print the statements from the following table. 0-3 5-8 9-12 Any other number Input "abc" "efghijk" Function Call: function_name("abc", "efghijk") Output: Ciao Explanation: Here, "abc" is the string1, and "efghijk" is the string2. The sum of string1 is 294 and the length is 3 The sum of string2 is 728 and the length is 7 Random number…
- a) What is "Approximation Error" in floating-point representation? Approximation Error - Since in floating point representation we can not represent all real numbers so there occurs an error.It is difficult to represent some decimal numbers in binary form. b) Why is it happening? Floating point Approximation error occur because it uses fixed no. of bits to represent decimal numbers. It is difficult to represent real numbers with the help of fixed bits of binary numbers. Also some decimal numbers are difficult to represent in binary form. c) How can we minimize it? We can minimise it by- 1.Changing radix 2.Adding numbers of different magnitude value. 3.overflow 4. underflow 5.Subtracting numbers of same magnitude value. Dont use answers from other websites please! Please type your answer not picture d) How can the character codes be a solution for this?Python question please include all steps and screenshot of code. Also please provide a docstring, and comments through the code, and test the given examples below. Thanks. Write a function crypto() that takes as an input a string s and returns an encryptedstring where encryption proceeds as follows: split the text up into blocks of two letterseach and swap each pair of letters (where spaces/punctuation, etc. is treated like letters).If the input string>>> crypto('Secret Message')'eSrcteM seaseg'>>> crypto('Secret Messages')'eSrcteM seasegs'6.use c code to Develop a code that gets two integers from the user and calculates and prints their least common multiplier or LCM. LCM is the smallest number that divides both given integers. Example. lcm (10, 15) = 30, lcm (5,7) = 35 and lcm (12, 24) = 24Hint: we know that lcm(x,y) = xy/gcd(x,y) where gcd is the greatest common divisor (discussed in class). Develop a gcd function in your code, get the two numbers from the user, call your function to calculate their gcd and then use the formula above to calculate and display their lcm GOOD LUCK! Reference This is a list of function prototypes of the C library functions presented in class. You may use any of these functions in your solutions (unless the requirements explicitly indicate otherwise). As you have been provided the function prototypes, you are expected to use the functions correctly in your solutions. double atof(char *string); int atoi(char *string); long atol(char *string); int fclose(FILE *filePointer); char *fgets(char…