ld -melf_i386 question.o -o answer ./answer here question is code file name and answer is
Q: ANU is a university with three campuses in Nairobi, Rongai and Meru. ANU has contracted you to desig...
A: 1. Local site independence: Each local site can act an independent, autonomous, centralized DB...
Q: Justifying network devices used in my LAN design. Fully justify your choice of network devices with ...
A: So Lets go step by step . First we have to understand that what is TCP protocol. TCP protocol is end...
Q: an I please have the flow chart for this Python Code. current_year = 2021 class Employee:...
A: Here below i make simple flow chart of given python code: ==========================================...
Q: Wait() system call executed by a parent process has the following format: 'a = wait(&b);. What do th...
A: Wait(): The wait() system call is used to suspends execution of the current process until one of it...
Q: ftware archite
A: Software Architecture: Simply said, software architecture is the way a system is organized. This org...
Q: In this VB.net program write in Algorithm (Pseudocode).Thank you Module VBModule Sub Mai...
A: An algorithm is a step-by-step process of solving a problem.
Q: In this two vb.net program write in pseudocode. Thankyou Module Module1 Sub Main() For j...
A: NOTE: As per our company guidelines, we are supposed to solve the first question in multiple questio...
Q: 6. Create a function called word_intersection that prompts the user for two English words, and displ...
A: The user input will be string and then we have to parse them to set and then we can use intersection...
Q: By using the Big-O definition and formal proof, show and prove that a function y=n*+3 can't belong t...
A: For a given function g(n), we have set O(g(n)) = { f(n) : there exist positive constants c and n0 su...
Q: You are to write a simple ANSI C program to input a set of vehicle values from a text file and print...
A: Given The answer is given below.
Q: You are tasked with the development of an E-Scooter ride-share system. It allows registered commuter...
A: Is it still unlawful to ride an e-scooter: Privately run e-scooters, that are freely accessible for ...
Q: In Python write out the Python Code for the following in Jupiter Lab. Show code and outputs. Use a d...
A: arrow_forward Step 1 In questions with many asks, we must answer first. arrow_forward
Q: The negative numbers are stored in a computer as 1's complement form plus 1. O False True
A: Introduction: Since you have asked two questions which are not interlinked, so only 1st question wil...
Q: main.c 5. Only the Even Ones 1 #include by CodeChum Admin 3- int main(void) { I have an array of 100...
A: First of all, I ahve created an array with 100 elements into it. Here I have created a loop to itera...
Q: Buffer is a segment of memory or storage in which items are placed while waiting to be transferred f...
A:
Q: CODING LANGUAGE TO USE :- C SHARP ---------QUESTION BELOW------ You have two integers stored in va...
A: Task :- Write the C sharp Boolean test for given variables if one of them is more than 10 but not bo...
Q: A port is where there is only one receiver fixed to it. QUESTION 12 Vhen using buffer, the producer ...
A: Given :- (a.) A port is-------- where there is only one receiver fixed to it. (b.) When using-------...
Q: What is the catastrophe recovery process's principal objective?
A: Introduction: Catastrophe recovery/ Disaster recovery: Disasters such as fire, flooding, terrorist a...
Q: 3. The equilibrium constant for the reaction of chlorine gas with phosphorus trichloride to form pho...
A: a) Mole balance equation: 0.414 PCl3 + 0.0064 Cl2 ----->0.0086 PCl5 For part b & c mention ...
Q: Write a java program to perform the following operations using method overloading i)Get two strings ...
A: Method overloading is a form of polymorphism in OOP.
Q: Assume that list1 contains 100 items. The number of items in the following slice is list1[-4:-3] ere...
A: Solution:
Q: Using C language, trace this:
A: The major difference between the pass by value and pass by reference is that in case of pass by valu...
Q: To convert the binary number 10101011001 to gray is : * 10100010101 10010001101 None of them 1001001...
A: Answers 1. None of them 2.False
Q: Write a program to read the names stored in three different files: file1.txt, file2.txt and file3.tx...
A: Write a program to read the names stored in three different files: file1.txt, file2.txt and file3.tx...
Q: need a Data Model Design diagram for attendance fingerprint system
A: Solution : In below mentioned screenshot Data Model Design for attendance fingerprint system is sho...
Q: ys to represent a res
A: Below the 3 popular ways to represent a resource in REST
Q: 1ist is best to answer questions such as "What is the item at position n?" À. Lists implemented with...
A: The answer for the given question is as follows.
Q: [0] [1] (2) [3] 5
A: We draw the diagrams for the given data structures after performing each operation. A is a queue, B ...
Q: QI Convert Decimal, to the Octal system.? (540)10 = (????)8 *
A: (540)10=(1034)8
Q: Complete the truth table for the given statements and then determine if the two statements are logic...
A: According to the information given:- we have to create truth table with its logically equivalent.
Q: (а) List FOUR (4) phases of SDLC. The final implementation activity is to change from the old system...
A: a) Four Phases of SDLC model are Development - In this, first we gather the information and start ...
Q: se you want to deposit a certain amount of money into a savings account with a fixed annual interest...
A: Lets see the solution.
Q: Network Address Translation, or NAT, was used very often before IPv6 was fully implemented as a mean...
A: Defined the utility of Network Address Translation(NAT)
Q: Explain any five assembler directives of 8086 microprocessor
A: 8085 microprocessor or the eighty eighty five microprocessor are the 8 bit microprocessor which are ...
Q: Cloud computing is now widely used in many enterprises' information systems. Discuss cloud computing...
A: Find the answer given as below :
Q: Json document: P = { "p": [ { "logType": “PDF, "accountId": “xxxx” }, { "logType": “PDF”, "accountId...
A: Algorithm: Start Import json module Initialize P with given data and store it as JSON Set P=json.lo...
Q: ecution for each line using "call by need" an
A: Draw the run-time stack after the execution for each line using "call by need" and "call by name". A...
Q: 1. Write a Python function called add_daily_temp that is given a (possibly empty) dictionary meant t...
A: 1) Below is program that defines a function add_daily_temp which accept a dictionary containing daya...
Q: 1. (a) 1 A) Design an algorithm that inputs two lists of numbers, A, and B, of lengths n and m re...
A: Given The answer is given below.
Q: y are some connections never purely pinned or purely fixed, site examples of these instances. Note...
A: Lets see the solution.
Q: Explain the salient features of Information System in a hospital. List out various application modul...
A: Answer: Because most procedures in HIS-implemented hospitals are automated and software and servers ...
Q: describe 2 advantages of using higher level socket compared to lower level of the network stack
A: advantages of using higher level socket compared to lower level of the network stack
Q: Which conditional jump instruction is the JNGE instruction's equivalent?
A: POP and PUSH In stack, two operations are possible. PUSH: In the case of a stack, insertion is refer...
Q: Identify a previous technology which has impacts in subsequent technologies and inventions. describe...
A: Technology has improved over the last one hundred years starting from the invention radio in 1849. I...
Q: Consider the following graph: Draw the DFS and BFS spanning trees for the above graph starting from...
A: Breadth-First Search(BFS): In BFS we explore the adjacent nodes first and then we explore the childr...
Q: Compare Microprocessors with microcontrollers. i need clear anwer if possible plz
A: Comparison between microprocessor and microcontroller.
Q: b) For the following circuits, find a Boolean expression and construct the truth table A B
A:
Q: Let A = {P, Q, R} be the set of nodes in a computer network. Show a communication link relation on s...
A: Given set of of nodes in set A= {P, Q, R} The communication link must contain 8 links and each commu...
Q: When surfing online, you get some strange data on an apparently secure website, and you realize you ...
A: The answer is given in the below step
NASM program
X86
should run successfully in nasm in Linux platform while using the below commands for your clarity...
nasm -f elf question.asm
ld -melf_i386 question.o -o answer
./answer
here question is code file name and answer is what we are giving for output file.
Step by step
Solved in 2 steps with 1 images
- capCount.py make a program called capCount.py that has a function that takes in a string and prints the number of capital letters in the first line, then prints the sum of their indices in the second line. The string "hEllo, World" would should look like this: 28Morse code is a code where each letter of the English alphabet, each digit, and various punctuation characters are represented by a series of dots and dashes. Table 8-4 shows part of the code. Write a program that asks the user to enter a string, and then converts that string to Morse code. 366 Chapter 8 More About Strings Table 8-4 Morse code Character Code Character Code Character Code Character Code space space 6 – . . . . G – – . Q – – . – comma – – . . – – 7 – – . . . H . . . . R . – . period . – . – . – 8 – – – . . I . . S . . . question mark . . – – . . 9 – – – – . J . – – – T – 0 – – – – – A . – K – . – U . . – 1 . – – – – B – . . . L . – . . V . . . – 2 . . – – – C – . – . M – – W . – – 3 . . . – – D – . . N – . X – . . – 4 . . . . – E . O – – – Y – . – 5 . . . . . F . . – . P . – – . Z – – . . Gaddis Tony. Starting Out with Python (2-downloads) (p. 366). Pearson Education. Kindle Edition.Palindromes - “A palindrome” is a string that reads the same from both directions. For example: the word "mom" is a palindrome. Also, the string "Murder for a jar of red rum" is a palindrome. - So, you need to implement a Boolean function that takes as input a string and its return is true (1) in case the string is a palindrome and false (0) otherwise. - There are many ways to detect if a phrase is a palindrome. The method that you will implement in this task is by using two stacks. This works as follows. Push the left half of the characters to one stack (from left to right) and push the second half of the characters (from right to left) to another stack. Pop from both stacks and return false if at any time the two popped characters are different. Otherwise, you return true after comparing all the elements. Phrases of odd length have to be treated by skipping the middle element like the word "mom", your halves are "m" and "m". - Hint: (without using STL)
- Write a program that reads a sentence and store it in an array of characters. The program also reads a word and store in it a string variable. The program then conceals the word in the sentence with the character @'. Sample input / output: Enter a sentence: The town in which we live is a green town and big Enter a word: town Result: The @aa@ in which we live is a green @@@@ _and bigpython: a function that counts the number of occurrences of given character in a given string. For example, calling the function with Count(‘j’, ‘just joshin’) returns 2. Note the function counts the character regardless of case.public static String pancakeScramble(String text) This nifty little problem is taken from the excellent Wolfram Challenges problem site where you can also see examples of what the result should be for various arguments. Given a text string, construct a new string by reversing its first two characters, then reversing the first three characters of that, and so on, until the last round where you reverse your entire current string
- Lab Task 04: Include the methods in the file KMP_Implementation.txt in a complete Java program that prompts for and reads a text string and then a text pattern to search for in the text. It then displays the result of the search. Sample program runs: Enter the text: ABABСАВАВАВСАВАВСАВАВСАВАВКККАВАВСАВАВ Enter the pattern to search for: ABABCABAB Pattern found at these text starting indexes: 0 Enter the text: A KFUPM STUDENT Enter the pattern to search for: KFE Pattern not in text. 7 12 17 29Your task is to take 2 strings from the user and then check whether All occurrences of a character of a string must be replaced with another character of another string while preserving the order of characters of strings. Your program just print true or false. Programing language: JavaThe String class is a mutable class. O True O False
- Target The aim of this work is to use control structures and loops. Read carefully the problem and understand what needs to be done. Read your description is given and when you understand how it works, then start designing its solution and its implementation on the computer applying the syntax and semantics of the language Java programming. Write a LongestDupSubstring.java program that accepts a string as input and compute and print the longest sub-string displayed in two times without overlap (see 5th example for overlap). If there are more from one of such sub-strings, the program displays the first one it finds as well the number of characters in the substring. If there is no substring that appears 2 times, then the program will not print anything. Execution examples (the user's input is red and the longer in length 2 substrings) 1 Example Give a string: again and again Longest substring: again Longest substring size: 5 2 Example Give a string: seven saints and seven dinners Longest…A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 python pleaseA contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 LAB 6.21.1: LAB: Contact list 0/ 10 ACTIVITY main.py Load default template... 1 user_input = input() 2 entries = user_input.split() 3 contact_list = dict(pair. split(':') for pair in entries)