Write a complete program that read name and GPA for unknown numbers of students (stop when the user enters STOP). Your program should count number of students with GPA greater than 3. Sample Input/Output Enter Student Name: Yusuf Enter Student GPA: 3.5 Enter Student Name: Jasim Enter Student GPA: 2.8 Enter Student Name: Huda Enter Student GPA: 3.01 Enter Student Name: Yasser Enter Student GPA: 3.7 Enter Student Name: Fatima Enter Student GPA: 2.7 Enter Student Name: STOP 3 students have GPA > 3
Q: What precisely is the purpose of a firewall system, particularly one that is regarded as being of…
A: Specify the objective of the firewall system. NOTE: Because you have posed many inquiries, we will…
Q: Place in order from the lowest to highest RF signal blocking for the following materials. Brick,…
A: The question has been answered in step2
Q: Construct a DFA to accept a string containing a zero followed by a one.
A: Deterministic finite automata (or DFA) are limited state machines that acknowledge or dismiss series…
Q: Are you in agreement with the statement that was made by Mukherjee, which argues that an approach to…
A: Natural occurrences are routinely observed and researched in the field of physical sciences. Then, a…
Q: What is the IEEE-754 single precision real number after encodingt the real decimal number -76.0625?…
A: Single-precision floating-point The single-precision floating-point format, often known as FP32 or…
Q: Which two kind of wireless technology are used the vast majority of the time?
A: Multiple technologies: That are used on a regular basis The use of wireless technology is quickly…
Q: Each of the values was added to the same container, and as a result, we now have a hash map that was…
A: Given: Hash tables are groups of arranged things that make it possible for them to be readily found…
Q: You are working with a database table that contains invoice data. The table includes columns for…
A: The answer to the above question is given in step 2
Q: What software development issues can cause software system failure later on? O Increasing system…
A: 1. Option. C should be correct. Because to avoid the system failures agile development is…
Q: Consider the relevance of wireless networks in countries that are still in the emerging stages. When…
A: According to the question, we have to explain the relevance of wireless networks in countries that…
Q: If a student studies more than one major, the "Major" attribute in the "Student" entity is called: *…
A: 1. If a student studies more than one major, the "Major" attribute in the "Student" entity is called…
Q: Diagrams may be used to illustrate the differences between scalar processors and superscalar…
A: scalar processor acts on one piece of data at a time. ... A superscalar processor contains multiple…
Q: I am trying to get rid of duplicate rows in SQL. This is the current code I'm using. Please help me…
A: The correct query is given below
Q: Suppose a list contains marks earned in the courses CSE110, PHY111, and MAT110 of each student…
A: Here I have defined a custom method named sortDict() that takes a dictionary as an input parameter…
Q: Question 8 Which of the following shares a centralized digital video recorder (DVR) with other…
A: Here's the solution:
Q: rs serve if the BIOS already has the code that enables the operating system to communicate with the…
A: In computing, the term "device driver" alludes to an unmistakable classification of programming or…
Q: What kind of actions are needed on the part of the attacker in order for a sniffer attack to be…
A: The attacker must first gain access to a network to install the sniffer. Social engineering offers…
Q: You have to create a program in Clanguage in which the user enters the mass m and radius R of a…
A: Algorithm: 1. Read mass, m. 2. Read radius, r. 3. moment_of_inertia = (m * r * r) / 2. 4. Print…
Q: My laptop's BIOS has been upgraded, and even though all of the components are getting power, there…
A: What is a BIOS update? A BIOS (basic input/output system) update adds features or modifies existing…
Q: ence between logical caching and physical caching, and if so, what does that difference consist of?…
A: Introduction: The primary distinction between a physical caching and a logical caching is that the…
Q: Which mobile operating system works with the iPhone? Which mobile operating system was developed by…
A: The operating system which helps to execute application program software on the mobile devices is…
Q: What is the bit mask design to invert the bits in the position 0 through 3 of the register AL, while…
A: 1) We need to invert bits at position 0 to 3 while retaining bit position 4 to 7 of AL. 2) Below is…
Q: Consider the relevance of wireless networks in countries that are still in the emerging stages. When…
A: Benefits of wireless network (WLAN) : It's a dependable kind of correspondence. As WLAN diminishes…
Q: In the context of wifi, what precisely does it imply when someone refers to something as a "Access…
A: Access point definition: A standalone computer or device that enables wireless computers to connect…
Q: Create a MATLAB program to read input the length of the side of a cube(in cm) and then it displays…
A: The correct answer for the above mentioned question is given in the following steps for your…
Q: please create state diagrams and transition tables of the given DFA examples. thanks ❤ Construct…
A:
Q: Which kinds of network topologies can really be built, and which kinds do you think are the most…
A: Topology is a field of study that has many applications in computer technology and mathematics. It…
Q: What is the bit mask design to invert the bits in the position 0 through 3 of the register AL, while…
A: Answer:
Q: To what kinds of applications do host software firewalls often resort the bulk of the time? Expla
A: Given: Host-based firewalls are pieces of software that run on a single computer or device connected…
Q: For this project, you will create a class for an elementary school that will allow a teacher to…
A: Java Code : - " Do this code in jdoodle"
Q: In order for a network to perform its functions in the most efficient manner, what are the three…
A: In order for a network to perform its functions in the most efficient manner, we need to find the…
Q: Analyze the Python codes given below and write the output result of the program after executed the…
A: Class in python A user-defined class serves as a base or prototype from which entities can be built.…
Q: Create a MATLAB program to read input the length of the side of a cube(in cm) and then it displays…
A: program Please accept the cube's side length. Utilizing the side-3 formula, determine volume. Print…
Q: why the main memory on a mobile device is limited, and then contrast this with the amount of main…
A: The main memory in a computer is called Random Access Memory(RAM). It is used to store operating…
Q: or fault in a computer program or system that causes it to produce an incorrect or unexpected…
A: the solution is an given below :
Q: Write the appropriate method headings using the provided method name for the following processes:…
A: The solution is provided below.
Q: What use do device drivers serve if the BIOS already has the code that enables the operating system…
A: In computing, the term "device driver" refers to a distinct category of software or a particular…
Q: whenever I run this program no matter what I input i always get Low chances of covid-19 never the…
A: Here's the solution:
Q: Concerning a Question Regarding Computer Operating Systems Which of the following approaches is the…
A: Endianness is the arrangement or grouping of bytes representing advanced data in PC memory.…
Q: When it comes to email sent across the internet, what are the most significant differences between…
A: The answer of the question is given below:
Q: What are some ways that you may protect yourself from being a victim of an attack that was carried…
A: Introduction An assault known as a "Man in the Middle" occurs when an outsider—more specifically, a…
Q: ich one is superior, and why do we still need both packet and circuit switches in the 21st century…
A: Introduction: The fundamental building block of all Internet traffic is the idea of packet…
Q: Your great-aunt and -uncle have shown you a great deal of thoughtfulness by providing you with a…
A: LED and LCD screens are the two main categories of displays: These displays will be connected to the…
Q: Which of a switch and a hub is an access point more analogous to in terms of the amount of bandwidth…
A: A switch recognizes a small piece of the device connected to each port and uses this knowledge to…
Q: Microprocessors and the systems that go with them have progressed to the point where limiting…
A: High-performance systems generate high temperatures, which reduce lifetime dependability, increase…
Q: how to make use of programs and services that are located in the cloud and how to get access to…
A: The following is what this question reveals about how cloud-based services and apps are accessed and…
Q: fou have to create a program in C language in which the user enters the mass M and radius of a…
A: Algorithm: 1. Read mass, m. 2. Read radius, r. 3. moment_of_inertia = (m * r * r) / 2. 4. Print…
Q: Using the SQL programming language, how would one go about changing the structure of an existing…
A: ALTER table command The structure of a table can be changed using the ALTER TABLE command. It can…
Q: How can you safeguard yourself from being the target of an attack that is carried out by a…
A: The answer is given in the below step
Q: Think about how important wireless networks are in the nations of the globe that are still growing…
A: The wireless network refers to the computer network which makes the use of the radio frequency…
Step by step
Solved in 2 steps with 1 images
- Given a square matrix with the elements 0 or 1, write a program tofind a maximum square submatrix whose elements are all 1s. Your programshouldprompt the user to enter the number of rows in the matrix. The program then displaysthe location of the first element in the maximum square submatrix and thenumber of rows in the submatrix. Here is a sample run: Enter the number of rows in the matrix: 5 ↵EnterEnter the matrix row by row:1 0 1 0 1 ↵Enter1 1 1 0 1 ↵Enter1 0 1 1 1 ↵Enter1 0 1 1 1 ↵Enter1 0 1 1 1 ↵EnterThe maximum square submatrix is at (2, 2) with size 3 Your program should implement and use the following method to find the maximumsquare submatrix:public static int[] findLargestBlock(int[][] m)The return value is an array that consists of three values. The first two values arethe row and column indices for the first element in the submatrix, and the thirdvalue is the number of the rows in the submatrix.Using Matlab. Monte Carlo methods are a class of computational methods that rely on repeated random sampling to compute their results. In this problem, you will use the Monte Carlo method to estimate the temperature at an arbitrary point in a uniform solid. Specifically, we will consider the solid object shown below. The temperatures of all surfaces are 500 des F with the exception of the two shaded surfaces, which are at 0 deg F. Inputs to the program should be: 1. The number of random walkers. 2. The (x,,2) coordinates of the point at which the temperature is to be estimated. 3. Plot interval (eg., you may want 1,000,000 random walkers in the simulation but may want to plot after every 10,000). Output from the program should be: 1. A graph of the estimated temperature, plotted according to the plot interval 2. Numerical value of the estimated temperature. USING MATLABModify program P34_1.cpp to compute the side area, of a cylinder and the area and volume of a sphere, depending on the choice that the user makes. total area, and volume Your program should ask users to enter 1 to choose cylinder or 2 for sphere, and display an "invalid choice error" for other values. For a cylinder, we want to compute: Side area: (2*PI*r) h Total Area: 2*(PI*r2) + Side area Volume: (PI*r2)*h For a sphere, we want to compute: Surface area: 4 *PI*r2 Volume: (4.0/3.0)*PI*r3. Use overloading whenever possible.
- Write a program that calculates the equivalent resistance of a circuit. n electrical resistors with resistance values R1, R2,.., Rn are said to be connected in parallel if the same voltage is applied across each. Their equivalent resistance Reg is related to the values R1, R2, ..., Rn by: 1 1 1 1 + +...+ R R R, R. "eq Write a program that prompts the user to enter the resistance of n resistors. The user should be prompted continuously by using a while loop until a zero or negative value is entered (the program should count the number of resistors n entered by the user and store the values in an array). Use another separate loop to print the resistance values entered by the user and the equivalent resistance Reg. Test your program with R1= 1 kn, R2= 2 kn, R3= 4 kQ and R4= 8 kQ.Question 3 Write a program that finds the equivalent series and parallel resistance for a collection of resistor values. Your program should first read in the number of resistors and then compute the equivalent series resistance for all resistors in the collection and the equivalent parallel resistance. For example, if there are 3 resistors of 100, 200, and 300 Ohms, respectively, their equivalent series resistance is 100+200+300 and their equivalent parallel resistance is 1(1/100+1/200+1/300). Your program should read each resistance value (R), add R to the series sum (RS) and add 1/R to the parallel sum (RP). After loop exit, display RS and 1/RP.An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Ex: If the input is: Institute of Electrical and Electronics Engineers the output is: IEEE
- Consider records of employees each consists of employee's first name (string), number of hours worked (int)and hourly rate in Bahraini Dinar BD. (double).Write a program that reads from the user multiple records for multiple employees and displays the following onscreen:(a) the salary for each employee (Salary = Hours Worked x Hourly rate.)(b) the number of employees(c) the highest salary with employee name.Reading records of employees should stop when the user enter `stop' for the employee name. Sample I/O of theprogram is shown in the example below.Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outputs the average (using integer division) and max. A negative integer ends the input and is not included in the statistics. Ex: When the input is: 15 20 0 5 -1 the output is: 10 20 Assume that at least one non-negative integer is input.Write a program to keep records and perform stastitical analysis for a class of students. The class may have up to 40 students. There are five quizzes during the term. Each student is identified byfour-digit student number. The program is to print the student scores and calculate and print statistics for each quiz. The outputis in the same order as the input, no sorting is needed. The program should read the input form the user and should print the output similar to the following: Student Quiz1 Quiz2 Quiz3 Quiz4 Quiz5 1234 78 83 87 91 86 2134 67 77 84 82 79 3124 77 89 93 87 71 Low Score 67 77 84 82 71 High Score 78 89 93 91 86 Average 73.4 83.0 88.2 86.6 78.6
- Transient PopulationPopulations are affected by the birth and death rate, as well as the number of people who move in and out each year. The birth rate is the percentage increase of the population due to births and the death rate is the percentage decrease of the population due to deaths. Write a program that displays the size of a population for any number of years. The program should ask for the following data: The starting size of a population P The annual birth rate (as a percentage of the population expressed as a fraction in decimal form)B The annual death rate (as a percentage of the population expressed as a fraction in decimal form)D The average annual number of people who have arrived A The average annual number of people who have moved away M The number of years to display nYears Write a function that calculates the size of the population after a year. To calculate the new population after one year, this function should use the formulaN = P + BP - DP + A - Mwhere N is the…Write a complete program that read name and GPA for unknown numbers of students (stop when the user enters STOP). Your program should count number of students with GPA greater than 3. Sample Input/Output Enter Student Name: Yusuf Enter Student GPA: 3.5 Enter Student Name: Jasim Enter Student GPA: 2.8 Enter Student Name: Huda Enter Student GPA: 3.01 Enter Student Name: Yasser Enter Student GPA: 3.7 Enter Student Name: Fatima Enter Student GPA: 2.7 Enter Student Name: STOP 3 students have GPA > 3Write a program that takes in information for three students. For each student get the student ID and three quiz grades. Use a nested loop, where the inner loop gets the three quiz grades. Print the student’s name and average – formatted to two decimal places. (Python) Input Format A name and then three quiz scores. Constraints Input will be whole numbers. Output Format Name: Average: Sample Input 0 Mary Jones 78 90 91 Kevin Smith 90 77 85 Lauri Reiner 79 83 92 Sample Output 0 Name: Mary Jones Average: 86.33 Name: Kevin Smith Average: 84.00 Name: Lauri Reiner Average: 84.67