What will this code print? def fun_a(): print("aa") def fun_b(): print("bb") def fun_c(): print("cc") def main(): fun_c() fun_a() fun_b() fun_c() Question 13 options: cc aa bb cc aa bb cc aa cc bb cc cc bb aa nothing
Q: 2. Signed 2's Compliment numbers arithmetic For the following signed 2's compliment values form…
A: Signed 2's Compliment numbers arithmetic For the following signed 2's compliment values A = 0xFF B =…
Q: travel agent booked the flight ticket and each traveler collect ticket from his office. Under…
A: Description/Use case diagram: 1) Use-case diagrams represent the excessive-degree functions and…
Q: What are the applications of PSO and ACO?
A: In the given question PSO is inspired by the flock of birds or fishes in food search while ACO is…
Q: Examining and modifying the contents of the 8086's internal registers 1. Use the REGISTER command to…
A:
Q: CSU asks you to design an loT system for smart lights on the Albury-Wodonga campus. Your design…
A: Solution : Smart Lighting System : IoT can be used to create a smart lighting system that allows…
Q: After executing the following piece of code: mass_kg = 1 mass_lb = mass_kg * 2.2 mass_kg = mass_kg +…
A: The complete answer in python language is below:
Q: Which of the following commands will work and which result will provide? number = 25 + 10 fruits =…
A: List A list or sequence is just an abstract data type used in computer science that contains a…
Q: Let EK: {0,1}128 → {0, 1}128 be an ideal block cipher with message space {0, 1}128, ciphertext space…
A: Hash function The purpose of a hash function is to fit a set of inputs of any size into the a table…
Q: Which of the following is true? Group of answer choices Reduce-Reduce conflicts never occur in…
A: It is false that reduce conflicts never occurs in shift reduce parsers. As in shift reduce parsers…
Q: Q.12 Explain TLS.
A:
Q: What type of recursion is present in the method below? public static void mystery (int x, int y) {…
A: When making decisions, if-else statements are used to describe which block of code should be run…
Q: W.X 14 1 1 y2 32 32 1 I 1 (c) 1 1 1 1 1 a. wxyz'+wxy'z'+wx'yz +wx'yz' +wx'y'z'+w'x'yz'…
A: INTRODUCTION: In a Karnaugh map, or truth table, a minterm is a Boolean expression that returns 0s…
Q: --Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user…
A: Please refer to the following step for the complete solution of the problem above.
Q: How can you describe LL(1) grammars? a.They process input right to left producing rightmost…
A: These question answer is as follows,
Q: Using SQL, how do we retrieve all the Employees for which the Birth Date is between 1/1/1955 and…
A: We need to write the query about the above problem.
Q: make Algorithm for Complete labelled branching Input: a base [1,2,...k] for G; the basic…
A: given data: Algorithm for Complete labelled branchingInput: a base [1,2,...k] for G; the basic…
Q: n python. Please do not copy from other websites, as it is incorrect and I'd like to be able to…
A: Introduction: In this question, we are given binary search code and in that code, instead of…
Q: Write a C program using switch statement. The program will read a character (op) and will calculate…
A: Explanation 1) Below is C Program using switch statement to read a character(op) and calculalate and…
Q: Describe in brief the maximum-bipartite-matching (MPM) problem. Present an LP algorithm to solve the…
A: A set of edges in a bipartite graph that are chosen so that no two edges share an endpoint is known…
Q: In the chapter materials and the conference we saw and discussed the various Quotent programs that…
A: ANSWER:-
Q: cumstances is it appropriat both satisfy the union's re-
A: A domain-specific programming language called Structured Query Language (SQL)[5] is utilized to…
Q: Classify genetic algorithms
A: A genetic algorithm is used to train a spam classification model. Neural networks could be that…
Q: The errors that can be pointed out by the compiler are known as _____________ a.Internal errors…
A: Solution: Given, The errors that can be pointed out by the compiler are known as _____________…
Q: Define the criteria that test-driven development must possess in order to succeed. For instance, how…
A: A software development approach known as Test Driven Development (TDD) emphasizes the creation of…
Q: Q.5 Explain ISAKMP protocol for IP sec.
A: ISAKMP It is the name of the key management protocol used in IPSec. The Internet Security…
Q: What is all IP technology?
A: Similar to how computers utilize the internet to transmit information, an All-IP Voice Network uses…
Q: Explain types of Intrusion detection systems (IDS).
A: An Intrusion Detection System (IDS) which are the system that monitors the network traffic which are…
Q: Please make a data flow diagram for an online room reservation system.
A: Data flow diagram is a diagram which maps the flow of information for any systems or processes. This…
Q: Write the code below for the class declarations for the three different types of Computer classes.…
A: Code
Q: Because of how our hash map was constructed, all of the data is held in a single container known as…
A: A hash table is a group of objects that are organised such that it is simple to locate them…
Q: P3. Pangrams are words or sentences containing every letter of the alphabet at least once, A through…
A: Answer:
Q: Similar to the previous one but with some slight changes, what will the following piece of code…
A: Conditional statements in python: In programming languages, we frequently need to manage the flow of…
Q: In python. Please explain so it can be applied to future problems. Thanks. Write a bubble sort that…
A: As per the given question, we need to implement the functions bubble_values and insertion_values.…
Q: 1. Determine the entropy associated with the following method of generating a password. Choose, and…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Question 2: Feature Engineering Having considered missing data, we can now further prepare our…
A: Here I have defined the method named extract_title(). Inside the function, I have used a loop to…
Q: 10 OD DE D 9 B 13 14 15 Q Apply the repeated nearest neighbor algorithm to the graph above. Starting…
A: Answer the above question are as follows
Q: Suppose we want to insert the following elements in the order they appear below: 19 17 13 8 631 If…
A: Data Structure : A specific format known as a data structure is used to organize, process, retrieve,…
Q: Q.5 Explain ISAKMP protocol for IP sec.
A: A framework for dynamically creating security associations and cryptographic keys in an Internet…
Q: Draw a sequence diagram to represent the scenario of "using vending machine to purchase drinks".…
A: I'm providing the Sequence diagram to represent the above-mentioned scenarios & also I provided…
Q: Examining and modifying the contents of the 8086's internal registers 1. Use the REGISTER command to…
A: The correct answer for the above mentioned question is given in the following steps for your…
Q: Given the following recursive method and function call, what is printed out? Enter your answer as a…
A: recursive function is used, which is the function which calls itself.
Q: You have recently learnt about 3-tier architecture programming and how to develop software using…
A: Layered architectures which are said to be the most common and also widely used architectural…
Q: Suppose we want to insert the following elements in the order they appear below: 19 17 13 8 631 If…
A: Data Structure : A specific format known as a data structure is used to organize, process, retrieve,…
Q: MOV RPT: MOV MOV BX, 520H AL. [SI] [BX]. AL
A: The answer is
Q: Write aAlgorithm for Blocks Image Input: a base and strong generating set of a group G acting on fl;…
A: given data:- Input: a base and strong generating set of a group G acting on fl;an invariant…
Q: What is the Statement of the Queens Problem?
A: The above question is solved in step 2 :-
Q: Part One: Short answer questions: 1. Determine the entropy associated with the following method of…
A: Answer: We have explain in very well how to find the entropy for the secure password
Q: What are the applications of PSO and ACO?
A:
Q: Select the answer that best describes the following statements: I. A class may have only one…
A: Answer the above question are as follows
Q: Question 3 Now that we have formatted our data, we can fit a model using sklearn's Ridge()…
A: Python function to fit a model using sklearn's Ridge() class and return the trained model is, from…
What will this code print?
Question 13 options:
|
cc aa bb cc |
|
aa bb cc |
|
aa cc bb cc |
|
cc bb aa |
|
nothing |
Step by step
Solved in 5 steps with 2 images
- Staff # name: String # id: int PartTimer + Staff() + Staff(name: String, id: int) skillLevel: int + getName (): String + getId (): int + calculatePay () : double + toString (): String hoursWorked: int + Part Timer (name: String, id: int, skillLevel: int, hoursWorked: int) + getskillLevel(): int + getHours Worked () : int + tostring () : String java.lang.Comparable compareTo (o: Object): int Figure 1: The relationship between staff, PartTimer and Comparable Skill Level / Tahap Kemahiran Pay Rate Per Hour/ Kadar Bayaran Per Jam 0 ( Basic / Asas) RM50.00 1 (Moderate / Sederhana) RM100.00 RM150.00 2 (Expert / Mahir) Table 1: Skill level and the pay rate per hour Write a complete Java program to create PartTimer class and test class based on the Figure 1, Table 1 and the following requirements: Partimer class is derived from staff and implements Comparable Interface. The calculate Pay()method from the staff class will be implemented in the subclass to calculate the employee's pay. The pay…What will this code print? def fun_a(): print("aa") def fun_b(): print("bb") def fun_c(): print("cc") def main(): fun_c() fun_a() fun_b() fun_c() main()C++HurdleWords The HurdleWords class is mostly provided to you. HurdleWords is constructed from two files in the data/ folder: ● valid_guesses.txt (all 5 letter guesses considered to be valid words to guess), and ● valid_hurdles.txt (all words that may be selected to be the secret Hurdle.) ● Note: you may edit both text files if you’d like to add custom words to your game. HurdleWords stores all potential valid Hurdles from valid_hurdles.txt into a vector of strings (valid_hurdles_), and all valid guesses from valid_guesses.txt into an unordered set of strings (valid_guesses_). A set is simply a data structure that contains no duplicates and allows for a speedy lookup to check if a given element exists within the set. Because there are over 10,000 valid guesses, we store them in an unordered set to leverage their speediness, as you will need to check if a user-submitted guess is considered valid (i.e. their guess is considered a valid guess in the dictionary). You are responsible for…
- Restaurant: Point-of-Sales System Create a software application that can be used for a Restaurant using C language. The expected minimum functionality are as follows: Menu Display It must display at least 10 choices with their corresponding prices On your menu, at least one of the categories/choice should have customization/add-on. You should have at least 3 customization/add-on (e.g. In Starbucks, you can have extra espresso shot). Taking Orders As a customer, I want to select which of the choices I want to order As a customer, everytime I specify select my choice, I want to specify the quantity of my selected choice. After I finished my order, it should ask, "Anything Else?". Afterwards, as a customer, I should be to enter my succeeding choice. In order to stop taking order, the exit should be part of the menu. As a customer, I would only select that choice to exit If the customer selects a choice qualified for customization, after specifying the quantity, I should be asked,…99 question Reza Enterprises sells tickets for buses, tours, and other travel services. Because Reza frequently mistypes long ticket numbers, Reza Enterprises has asked his students to write an application that shows if a ticket is invalid. Your application/program tells the ticket agent to enter a six-digit ticket number. Ticket numbers are designed so that if you lose the last digit of the number, then divide by 7, the remainder of the division is exactly the same to the last dropped digit. This process is shown below: Step 1: Enter the ticket number; for example 123454 Step 2: Remove the last digit, leaving 12345 Step 3: Determine the remainder when the ticket number from step 2 is divided by 7. In this case, 12345 divided by 7 leaves a remainder of 4. Step 4: Display a message to the ticket agent indicating whether the ticket number is valid or not. If the ticket number is valid, save the number to a .txt file called “tickets.txt” and.Textbook: Joyce Farrell, Microsoft® Visual C#®: An Introduction to Object-Oriented Programming, Seventh Edition, ISBN: 9781337102100.Microsoft Visual C# (chapter 5 code case problem 5-2) Assignment instruction: In Chapter 4 of your book, you created an interactive application named MarshallsRevenue that prompts a user for the number of interior and exterior murals scheduled to be painted during a month and computes the expected revenue for each type of mural. The program also prompts the user for the month number and modifies the pricing based on requirements listed in Chapter 4. Now, modify your program so that the user must enter a month value from 1 through 12. If the user enters an incorrect number, the program prompts for a valid value. Also, the user must enter a number between 0 and 30 inclusive for the number of murals of each type; otherwise, the program prompts the user again. In order to prepend the $ to currency values, the program will need to use the…
- Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion of the driver’s license exam. The exam has 20 multiple-choice questions. Here are the correct answers: 1. B 2. D 3. A 4. A 5. C 6. A 7. B 8. A 9. C 10. D 11. B 12. C 13. D 14. A 15. D 16. C 17. C 18. B 19. D 20. A Your program should store these correct answers in an array. The program should read the student’s answers for each of the 20 questions from a text file and store the answers in another array. (Create your own text file to test the application.) After the student’s answers have been read from the file, the program should display a message indicating whether the student passed or failed the exam. (A student must correctly answer 15 of the 20 questions to pass the exam.) It should then display the total number of correctly answered questions, the total number of incorrectly answered questions, and a list showing the question numbers of the incorrectly…PYTHON: In this assignment, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a clear theme and tell a story. You may pick any school-appropriate theme that you like. The program must include a minimum of: 5 circles 5 polygons 5 line commands 2 for loops 1 global variable You may wish to use the standard code for simplegui graphics below: import simplegui def draw_handler(canvas): frame = simplegui.create_frame('Testing', 600, 600) frame.set_canvas_background("Black") frame.set_draw_handler(draw_handler) frame.start()O 0{ 48% 4G* VodaCom-SA ll 2:3 |_DO_SU1 CMPG 122 User Interface Programming I_Do Chapter 2: Introduction to Visual C# 1. Books and Authors (Pg. 130 - 131) Look at the following list of some famous books and their authors. Books Authors Margaret Mitchel Alex Haley Ayn Rand Gone with the Wind Roots Atlas Shrugged Create an application that gives the authors' name for a particular book. The form should have three labels, one for each book. When the user clicks a button, the application should display the name of its author in another Label control.
- Instructions: In the code editor, you are provided with a treasureChestMagic() function which has the following description: Return type - void Name - treasureChestMagic Parameters - an address of an integer Description - updates the value of a certain integer randomly You do not have to worry about how the treasureChestMagic() function works. All you have to do is ask the user for an integer and then call the treasureChestMagic() function, passing the address of that integer you just asked. Finally, print the updated value of the integer inputted by the user. Please create a main code for my function that works with this. This is my code: #include<stdio.h>#include<math.h> void treasureChestMagic(int*); int main(void) { // TODO: Write your code here return 0;} void treasureChestMagic(int *n) { int temp = *n; int temp2 = temp; *n = *n + 5 - 5 * 5 / 5; temp2 = (int) pow(2, 3); if(temp % 3 == 0) { *n = temp * 10; } else if(temp %…Please provide answer in C#: Slot Machine Simulation A slot machine is a gambling device into which the user inserts money and then pulls a lever (or presses a button). The slot machine then displays a set of random images. If two or more of the images match, the user wins an amount of money that the slot machine dispenses back to the user. Create an application that simulates a slot machine. Figure 8-23 (on page 539 of your book) shows an example of how the form should look. The application should let the user enter into a TextBox the amount of money he or she is inserting into the machine. When the user clicks the Spin button, the application should display three randomly selected symbols. (Slot machines traditionally display fruit symbols. You will find a set of fruit symbols attached to this dropbox for your use - from the Student Sample Programs provided by the book author.) If none of the randomly displayed images match, the program should inform the user that he or she has won…Enter the name of Stock: Oracle Corporation Enter the symbol of Stock: URCL Enter the previous closing price: 34.5 Enter the current price: 34.35 Stock name: Oracle Corporation Stock symbol: ORCL Stock ID: 59 Price-change percentage: - 0.434782608695648 Challenge Question - Using GregorianCalendar and Date classes: (Use the GregorianCalendar class) Java API has the Date class and GregorianCalendar class in the java.util package, which you can use to obtain the current date with specific details like current year, current month, current day of a date and so on. Write a program to perform these tasks: 1. Display the current year, month, and day. 2. Display the current date by using the to String() method from the Date class. 3. Display the current time-which is used to display the number of milliseconds- by using getTime() method from the Date class. We will use it in the step 17. 4. - Display the current year by using get(GregorianCalendar.YEAR) method from to GregorianCale class. 5-…