Q5. (Find the second lowest interger number) Write a program that prompts the user to enter a set of integer numbers, and finally displays the second lowest integer number in the set. To exit from the program enter -1. Here is a sample run Enter a set of integer numbers: 3 57 928-1 The second lowest number is 3
Q: What is output? new list [10, 20, 30, 40, 50] for i in new_list: print(i %3D * 2) O [10, 20, 30, 40,…
A: The correct answer is B. 20,40,60,80,100
Q: When you say "constructors," what do you mean? What is the primary goal of Constructors?
A: In Java, the constructor is similar to the methods. The assets of the constructor is that it have to…
Q: In what sense do you use the term "constructors"? The purpose of Constructors is a mystery to me
A: A constructor is a special method of a class or structure in object-oriented programming that…
Q: nat is output?
A: Solution - IN the given question, we have to tell the output.
Q: SLA malicious threat is always from human threat source. S2:As much no two human beings are alike in…
A: Answer: SLA malicious threat is always from human threat source. As much no two human beings are…
Q: Defintion of end user computing and system tools:
A: Solution: End-user computing (EUC) refers to the technologies used by IT professionals to install,…
Q: What do you think are the most critical data security measures? If data integrity and user…
A: Data security : Data security refers to the practice of preventing unauthorized access to and…
Q: What measures should be followed to assure the stability and availability of a local area network?
A: Introduction: In computing, a local area network (LAN) collects small computers or other workstation…
Q: What internal components enable a computer to run when it is switched on
A: The internal components that allow the computer to run when the computer is turned on are: 1.CPU:…
Q: List eight (8) functional requirements for a Database and explain why you say so.
A: Functional Requirements of a database.
Q: We want to create a MongoDB database. For this purpose, I have already created a new Collection…
A: As per Bartleby rules, we are answering the first 3 subparts of the question The correct answers are…
Q: What is the process through which a computer operates?
A: Processing in computer happens with the component called a processor. The CPU is basically a small…
Q: Which determines if user_unit is in the list accepted_units? accepted_units -[ 'in', 'cm', 'mm',…
A: As per our guideline we can only answer 1st one. The correct answer is C. if user_unit in…
Q: To begin with, what is the difference between starting from scratch and adopting a pre-packaged data…
A: Start: Preparing data before designing an app is similar to planning a construction using…
Q: 5.1 Software architecture The software is placed in a business context. The intent is for the reader…
A: Answer: Project features: Modules of End user: 1)Signup: This will allow the users to register…
Q: 427 in BCD is converted to pure binary integer what is its binary value (a) 010000100111 (b)…
A:
Q: On their anniversary, Luna received a box containing K violet flowers. The number of these flowers…
A: Here in this question we have given that a box containing x violet flower .when no of flowers is…
Q: What is the average time to read or write a 512-byte sector for a typical disk rotating at 15,000…
A: Solution:- Given- Average seek time = 4 ms Disk rotation = 15000 RPM Data rate = 100 MB/Sec =…
Q: And how can you utilise hierarchy to your benefit in terms of size and administrative autonomy?…
A: Given: In the preceding section, we defined "the network" as a collection of interconnected routers.…
Q: What is the most vital component of computer hardware?
A: The most integral and important component of the computer hardware is CPU or the Central processing…
Q: Draw triangle using any line algorithm. Perform all the basic transformations (Translation,…
A: In this question we have to draw triangle using a line algorithm where we will transform the…
Q: Python Favorite food: Samgyeopsal, Ch
A: class Favorite_Food(object): def __init__(self,name): self.name = name# Defining a…
Q: Question 41 Which of the following is a reason to use functions? O To make the code run faster O To…
A: Q41. Here when we define a function, it can be used n number of times. Thus we don't have a piece…
Q: Which of the following is an instance created by the code given below? 0. class Employee: def _init…
A: class Employee: def _init_(self): self.id=0 self.name='ABC'…
Q: Question 38 objects have fixed values that can't be changed. O Mutable O Value O Immutable O Class…
A: The answer is option(3) Immutable Explanation:- The immutable objects are the objects whose value…
Q: (Q1) A: put the stabile word on the brackets: 1- To delete the variables from workspace used ( ). 2-…
A: As per guidelines, I'm supposed to answer the first question, repost the second question as separate…
Q: A relation r(A, B, C) had multi-valued dependencies among all its attributes. It was decomposed for…
A: According to the information given:- we have to find out the mentioned example of what kind of…
Q: This is owing to the fact that computers are now very powerful. What causes have led to computers…
A: Answer to the given question During the 1980s and 1990s, wide-spread computer network…
Q: Consider the code below. Which of the following is an example of an instance attribute? class…
A: Instance attribute in python: Instance attributes are attribute attached to an instance of a class.…
Q: Method overload and method override are distinct concepts.
A: Method overload and Method override: Compile-time polymorphism may be achieved by overloading…
Q: Compare between the different Input-Output control techniques: programmed I/O, interrupt, DMA, and…
A: According to the Bartleby guideline we are suppose to answer only one question at a time. Kindly…
Q: Show how hierarchical routing improves scalability and administrative autonomy. Distinguish between…
A: Introduction: In the previous section, "the network" was described as a collection of routers that…
Q: Explain the various stages of the system development lifecycle.
A: System Development Life Cycle (SDLC): A good System Development Life Cycle (SDLC) should result in a…
Q: I need a java project name "ATM Booth Interface". It should be a simple java project built with Java…
A: I am posting this code in 2 steps. Code:- import javax.swing.JOptionPane; import javax.swing.JFrame;…
Q: Task 2: Understand How Bottom-Up Merge Sort Works 22. Create a table showing how the merge…
A: According to the Bartleby policy I can give answer of first question, so here I will give answer of…
Q: How do know if a function is one to one and onto?
A: Answer the above question are as follows
Q: llowing array. What is
A: Solution - In the given question, we have to find the value of tempArray[9].
Q: A solution to a CSP is the path to the goal O True O False
A: CSP stands for ' Constraint Satisfaction Problems '. The solution to CSP will be - It solution is…
Q: In many aspects, ubiquitous computing varies from conventional desktop computing, which is also…
A: Given: Another word for ubiquitous computing is "pervasive computing."This study topic is about when…
Q: n51 +53. Let n be a positive integer and f(n) = -53n109 Then f(n) is O(logn) O the above. O(n51) the…
A: Correct Answer: O(n109)
Q: Discuss the different ways of securing passwords from unauthorised use in databases. Include such…
A: A database is an organized collection of data stored and accessed electronically.
Q: Talk about how information technology implementation and use have social and ethical consequences.
A: Introduction: The following are some of the social and ethical consequences of using and deploying…
Q: When it comes to expansion and administrative autonomy, how might hierarchy be used to your…
A: Introduction: Here we are required to explain that when it comes to expansion and administrative…
Q: Create a simple app in JavaFX using GUI that saves data into a file and can access data from that…
A: Answer
Q: Q3. Retrieve all the marks of S5 in all three classes. Enter formula into A15. B. C. 1 ID NAME 1 $1…
A: Here we need to extract the data/score whose name is S5. So, here we need to find the row and column…
Q: Generalized Geography (GG) is PSAPCE Complete since the FORMULA-GAME reduces in polynomial time to…
A: import networkx as nx import matplotlib.pyplot as plt import numpy as np # create a graph G =…
Q: blet computers have a number of unique ch
A: Introduction: Below the Tablet computers have a number of unique characteristics.
Q: How crucial is software development? Four more characteristics, in your opinion, should be…
A: Introduction: Software development's ability to create and provide value to its users cannot be…
Q: Computer Science Reference Network Diagram Use the reference network diagram below to answer the…
A: networking
Q: The use of basic building blocks in multimedia is essential. In what ways can you make your…
A: Multimedia Components: Multimedia includes text, audio, graphics, video, and animation. As a whole,…
Step by step
Solved in 4 steps with 5 images
- Q1: (Palindrome number) Write a program that prompts the user to enter a three-digit integer and determines whether it is a palindrome number. A number is palindrome if it reads the same from right to left and from left to right. Here is a sample run of this program: Enter a three-digit integer: 121 121 is a palindrome Enter a three-digit integer: 123 123 not a palindrome12: guess.cpp) Write a program that plays a guessing game with the user. The user should pick a letter, and the computer should try to guess the letter. After each guess, the user should tell the computer whether its guess was too high or too low. With this information, the computer should be able to guess the letter within five tries. The user should be able to give whole words or single upper or lower case letters as responses.Q1:Write C code for a program that reads two positive integer number, checks whether these number are co-prime or not, and prints the result.Note: two numbers are co-prime numbers if they do not have a common factor other than 1. For example, 10 and 11 are co-prime.
- 2: commas.cpp) Write a program that accepts a 7-9 digit integer and echoes the number with commas between every three digits from the right. Test it with the numbers 1234567, 987654321, 20300045, & 10000000.compare loans with various interest rates) Write a programthat lets the user enter the loan amount and loan period in number of years anddisplays the monthly and total payments for each interest rate starting from 5% to10%, with an increment of 1/4. Here is a sample run: Loan Amount: 10000Number of Years: 5Interest Rate Monthly Payment Total Payment5.000% 188.71 11322.745.250% 189.86 11391.595.500% 191.01 11460.70...9.750% 211.24 12674.5510.000% 212.47 12748.239: perfect.cpp) A number is called perfect if the sum of its divisors is equal to the original number. A number is called deficient if the sum of its divisors is less than the original number. A number is called abundant if the sum of its divisors is more than the original number. Write a program that answers the following questions: What numbers below 5000 are perfect? What odd numbers below 5000 are abundant? What are the relative proportions of deficient, abundant, and perfect numbers? 5000 should be in a global constant.
- 5: CheckLetter.cpp) Write a program that adds a check letter to an eight-digit number. The check letter should be computed as follows: Break the number up into 4 two-digit numbers. Add the four numbers together. Find the remainder after division by 26. The check letter is the letter in the alphabet that corresponds to the number just computed. (A=0, B=1, C=2, etc.) Print the original number followed by the check letter. Use at least one function that returns a value when you write this program.5: CheckLetter.cpp) Write a program that adds a checkletter to an eight-digit number. The check letter should becomputed as follows: Break the number up into 4 two-digitnumbers. Add the four numbers together. Find theremainder after division by 26. The check letter is the letterin the alphabet that corresponds to the number justcomputed. (A=0, B=1, C=2, etc.) Print the original numberfollowed by the check letter. Use at least one ffunction thatreturns a value when you write this program.Assignment: Convert feet into meters: Write a program which reads the number in feet, converts it to meters, and displays the result. One foot is 0.305 meters. One foot is 12 inches. Sample Run Enter the number of feet 16.5 16.5 feet is 5.0325 meters 16.5 feet is 198.0 inches
- Q2: Write a program that inputs a five-digit integer, separates the integer into its individual digits and prints the digits separated from one another by three spaces each. For example, if the user types in 42339, the program should print:4 2 33 9.Q2: (Financial: Compare cost) Suppose you shop for rice in two different packages. You would like to write a program to compare the cost. The program prompts the user to enter the weight and price of each package and displays the one with the better price. Here is a sample run: Enter weight and price for package 1: 50 24.59 Enter weight and price for package 2: 25 11.99 Package 2 has a better price.Challenge Problem (pyhton) T E S T S C O R E S Write a program that implements a test scores program. Valid test score entries are between 0 and 100 inclusive. The program should display a welcome message and run everything through the "main" function. have the ability to enter several test scores (try a loop) and print out the total score, as well as, the average score. continuously ask for test scores until the number 99.9 has been entered. test for valid entries and the value 99.9. If a test score is valid, the program should add the current score to the total score and update the number of test scores by one (+1), otherwise it displays an error message. Note : This assignment involves the use of a while loop and if-else decision making controls. You CANNOT use the reserved keywords break and continue for any portion of this program or any program for that matter throughout this course.