Write a java program that will extract all 13-digit SEU student IDs from a text.
Q: Is there a relationship between the system life cycle and the system development methodology?
A: System Life Cycle and System Development Methodology: The systems development life cycle (SDLC) is a…
Q: The IRS, your state's BMV, and Equifax, a consumer reporting agency, undoubtedly have databases with…
A: Capturing data in each database: The Federal Internal Revenue Service (IRS) is an organisation of…
Q: * What is the output of the following code? ; A=[1 2 3]; A^2 A= [1,4,9] O A= 149 [149] O Inputs must…
A: What is the output of the following code? A=[1 2 3]; A^2 Answer : Inputs must be a scalar or a…
Q: Computer Science Can you write a code in XCODE 11 using Swift language. A user should input a number…
A: "import UIKit" "class ViewController: UIViewController {" "@IBOutlet weak var timerLabel:…
Q: The static data members and static member functions aren't quite what I'm going for in this…
A: Solution: Both C and C++ make use of the term "static" in their respective programming languages.…
Q: Instead of providing a username and password, workers at your organization must now sign in using a…
A: Readers for fingerprints: Instead of typing in a username and password, you can use a fingerprint…
Q: The daily demand for interior paint cannot exceed that for exterior paint by more than 1 ton. Also,…
A: When the isoprofit line becomes parallel to either constraint 1 or the constraint 2 , then the…
Q: Choose the right output of the following code: x= [0,3] y=[3,3] plot (x, y) hold on x= [0,3] y=[4,4]…
A: 1. Given code: x=[0 3] y=[3 3] plot(x,y) hold on x=[0 3] y=[4 4] plot(x,y) This…
Q: Design a MATLAB program to rank the marks which the students took during an exam using CASE…
A: marks = input('Enter marks: '); switch marks case {0,1,2} disp('E') case {3,4}…
Q: In the RGB method of processing pictures, how does a computer monitor display color?
A: The RGB method of picture management begs the question: how exactly does color get shown on a…
Q: Please explain why user-defined functions are preferable than pre-defined ones in the context of…
A: The above question is solved in step 2 :-
Q: Write a complete Java program in a class named Egg that displays the following output:
A: Java program to print the following expected output is given below. This program contains: Class…
Q: * a protocol used at the network layer that transfer data from one host to another .across a router…
A: Let us see the answer below,
Q: Why would you analyse the time complexity of an algorithm? a. To determine how complex the…
A: Time taken by the algorithm to run is called time complexity. There are some different notations to…
Q: Are there any benefits to using pure functions, and if so, how?
A: Introduction: The absence of side effects in pure works is a key benefit. When you seek a clean…
Q: Using your own words, please explain the ramifications that resulted from the data breach that was…
A: Start: A data violation is a cyber attack in which sensitive, confidential, or otherwise protected…
Q: Do you have any idea what kind of computer RAM you're working with right now?
A: Given: The question's context has been provided for our consideration. Various forms of computer…
Q: What is the significance of an argument label in a Swift program?
A: Argument label:-Argument labels are the names of the parameters that functions accept. There are…
Q: How do you address the issue of internet and social media addiction in a speech?
A: internet and social media addiction: Nowadays, social media is one of the most energetic and…
Q: What kind of effects did the data breach at Capital One have on the general population? If things…
A: Explanation: Customers' trust in Capital One's financial goods and services was shaken as a result…
Q: A- Read the text and complete it with a verb from the parentheses in the past tense: (spend, need,…
A: BELOW:
Q: In the next paragraph, you will learn about manual software testing, as well as the advantages of…
A: Manual software testing: It is necessary to have a conversation regarding manual software testing…
Q: A very successful cinema director named "Chef" decided to solve the problem. When a customer wants…
A: Algorithm: Firstly we will take input for the number of test cases. After that we will take the…
Q: what are som
A: Password: A password, some of the time called a passcode (for example in Apple devices), is…
Q: Is there a particular justification for why a computer need both RAM and ROM to function properly?
A: The computer is required because: Due to their precision, speed, and versatility, computers have…
Q: A fingerprint reader, rather than a username and password, is the new way that your organization…
A: A fingerprint reader is a device that identifies a person's fingerprint and can be used as an…
Q: Is there a particular justification for why a computer need both RAM and ROM to function properly?
A: Required for Computer: In recent years, the significance of computers has expanded exponentially…
Q: briefly outline cybercrime targeting certain demographics and possible measures to counteract it…
A: Cybercrime and the category of crimes committed via the Internet and electronic equipment, such as…
Q: ware "in the network" might be difficult to d
A: Introduction: Administrators can use an antivirus solution to detect when a device has been infected…
Q: What are the three tools used for system development in system analytics?
A: Introduction: The evaluation of a system or its components to establish its aims is known as system…
Q: which type of physical topology is more .reliable bus topology O mesh topology O star topology ring…
A: The correct answer of the question is given below
Q: Please, those of you who are experts, find a solution to this issue as quickly and precisely as…
A: Software testing cycle: Find the proper answer to the following question as fast as possible,…
Q: A: write a C++ program that read the number and compute its factorial, Use while staten iteration…
A: the answer is an given below :
Q: Explain the importance of firewalls in maintaining the safety and privacy of a network. As a company…
A: What is a firewall? A firewall is a security tool that can be either software or hardware-based on a…
Q: Please explain why user-defined functions are preferable than pre-defined ones in the context of…
A: Answer is given below. 1.Reduction in Program Size: Since any sequence of statements which are…
Q: 1. Name the advantages of optical fiber over twisted-pair and coaxial cable.…
A: Below are the advantages of optical fiber over twisted pair and coaxial cable:- Speed Optical fibres…
Q: It's important to discuss about the many aspects of the software design process.
A: The process of designing software: The Software Design Process, or SDP for short, is a high-level,…
Q: What are the advantages of making use of pure functions?
A: What are the benefits of using pure functions? Pure functions have many advantages. The fact that…
Q: The static data members and static member functions aren't quite what I'm going for in this…
A: Explanation: Both C and C++ make use of the term "static" in their respective programming languages.…
Q: Define a function called get_total_cost(items_dict, items_list) which takes two parameters as input.…
A: Code:-def get_total_cost(items,selected): #Lets create a variable named no_of_key_errors and…
Q: een allocated to it at the same time.With the use of a single memory management strategy and a few…
A: Answer: The memory management capability assists with allocating the main memory space to their…
Q: - Computer science : How does the system detect thrashing? Once it detects thrashing, what can…
A:
Q: Semantics may be divided into many sorts, each with its own set of pros and downsides.
A: Start: Semantics is a branch of linguistics that focuses on the meaning and understanding of words,…
Q: What are some of the advantages that come with making use of a certain feature?
A: Characteristics, advantages, and advantages: Features, Advantages, and Benefits is what the acronym…
Q: In Windows programmes, default check boxes are common.What is the difference between assertions that…
A: Introduction: Within this area, it is essential to locate the checkboxes that are pre-checked by…
Q: What type of implications may a data breach have for the safety of information stored in the cloud?…
A: Given: Database corruption, leaking of confidential information, intellectual property theft, and…
Q: Do you have to worry about privacy while shopping on a social network like Facebook, which already…
A: Introduction: However, as the use of social media has increased, so has the possibility of data…
Q: using emo8086, display a set of "*"or * base on the user's integers input (0-9) example: enter…
A: Algorithm: Input any number between 0-9 Iterate a loop from 0 to inputted number do Print "*"…
Q: Our friend Vivy realizing that his wallcovering business had a few wrinkles in it, decided to pursue…
A: An ER diagram stands for entity relationship diagram. In an E-R diagram, an entity is a real-world…
Q: What kind of long-term effects does a data breach have on the security provided by the cloud? In…
A: Introduction Here are some of the repercussions of a data breach on cloud security: The loss of…
Step by step
Solved in 2 steps with 2 images
- Python: Data = [ { "creatt": "2022-02-28T13:05:24" }, { "creat": "2022-02-21T23:49:33" }, { "creat": "2022-02-21T11:08:23" }, { "creat": "2022-02-19T10:06:46", "xxx": [ "23", "1", "9" ] }, { "creat": "2022-01-25T13:12:49", "xxx": [ "2" ] } ] How to count "xxx": ["23", "1", "9"] and "xxx": ["2"], then the total should be 4. I would like to return the 4. my desired code: { "total": 4 }4. Write a java program that will extract all 13-digit SEU student IDs from a text. Example: File Contains: Output: 00:04:52.436,00:04:55.436 Hasibul Kabir: 1 2014201010011 2016666600048 00:23:19.281,00:23:22.281 Md. Rafsun Jani: YES sir 2011000000011 00:26:25.296,00:26:28.296 Hasibul Kabir: 2014201010011 00:26:28.150,00:26:31.150 Jubaer Mahmud: 2016666600048 00:26:32.722,00:26:35.722 Farjana Khan: No, I was not present 00:26:26.119,00:26:29.119 Md. Rafsun Jani: 2011000000011 ....IN PYTHON: given the data set where the key: value pair is key = item id and value = volume articles = {0: 54.9763980770002, 1: 45.0029239348998, 2: 61.3426025372739, 3: 80.0, 4: 77.6012305922644, 5: 78.2923783726743, 6: 23.3518777532423, 7: 39.8208126512123, 8: 68.94959337016, 9: 10.4524154059541, 10: 60.4772617438057, 11: 10.0, 12: 79.4241251161082, 13: 50.5316063003593, 14: 10.0, 15: 44.5526777152254, 16: 72.8685047807319, 17: 10.0, 18: 10.0, 19: 46.3487596059364, 20: 10.0, 21: 73.0560543111617} bin_cap = 100 (each bin has the same cap) write a function def binpack(articles,bin_cap): bin_contents= [] that returns bin_contents: A list of lists, where each sub-list indicates the dictionary keys for the items assigned to each bin. Each sublist contains the item id numbers (integers) for the items contained in that bin. The integers refer to keys in the items dictionary.
- IN JAVA SCRIPT Create a function that takes an integer n and reverses it. Examples rev (5121) ➡ "1215" rev (69) ➡ "96" rev (-122157) "751221" (Ctrl)Java Program Make a code about clicking a row in the jTable displays a message with phrase “Are you sure you want to delete the [display name of selected product]?” and Yes and No button. If the button yes is clicked, the selected row in jTable is deleted and updates the total bill.Edit question Write a Java program in java eclipse ide Generate 35 “even” random integer numbers in range [1000, 9999], display these numbers in 4 lines - display 10 numbers per line (10x3=30), display the remaining numbers (5) in the last line Find the maximum and the minimum numbers from these 35 even numbers. Display these 2 values. Find the average of these 35 random numbers. Display average value.
- python programming text files student.txt = P21013088,Kylie Tan Zen Dong,CSC1101 86,CSC1102 75P21013177,Tan Soo Hong,CSC1101 76,CSC1103 76,CSC1104 92,CSC1105 88P21013200,Peh Jia Xuan,CSC1101 88,CSC1102 80,CSC1103 90,CSC1106 75 subjects.txt = CSC1101,Computer FundamentalCSC1102,Computer ArchitectureCSC1103,Fundamentals of DatabasesCSC1104,NetworkingCSC1105,Programming with PythonCSC1106,Design ThinkingCSC1107,Human Computer InteractionCSC1108,Programming with R CSC1109,Systems Analysis and Design CSC1110,Machine LearningCSC1111,Data Structure and AlgorithmsCSC1112,Big Data ArchitectureCSC1113,Fundamentals of Data ScienceTimesheet data is easy to represent in a file, where it can be used to generate a report and help the worker get paid! Given an example set of data where each row represents a day of the week and each entry on the row represents a block of time worked, like this: 0h1.5h 3.25h3.0h 6.0h 1.0h5.5h 2.25h 0.75h2.25h 3.0h 3.0h5.75h 2.25h0h A report could be produced by a program like this: ---------------------------------------0.00h | 0.00h5.25h | 1.50h 3.25h 0.50h10.00h | 3.00h 6.00h 1.00h8.50h | 5.50h 2.25h 0.75h8.25h | 2.25h 3.00h 3.00h8.00h | 5.75h 2.25h0.00h | 0.00h---------------------------------------Weekly Total: 40.00h Notice how in the output file all the numbers are nicely formatted as right-aligned. Hint: you will probably need to use splitting, string slicing, converting data types, and string formatting. For your assignment, create a program that uses a data file that you have created, parses the data in that file to create a calculation per row and a running total, then…Write a c program for a simple student record.Each record should contain the following information:● Surname – a string (surname of the student)● Sex – a character (M for male, F for female)● Year – an integer (year part of student number)● Snum – an integer (last five digits of the student number)● Department – a string (department the student is a part of)Your program should be able to allow the user to:● Add records● Display all records● Display all records filtered by sex/ year/ department● Display record(s) linked to a given snum (last five digits of a student number)Note: student number should be displayed following the format year - snum
- Write a java program to read and store four student's id number and their grade, sort them into an order their id, based on grades from the smallest to the largest, then print them out. The student's id number and their grade values should be typed in by the user in response to a prompt message. Save the file as SortID_2019293060.javaWrite a program to produce the first 100 Fibonacci numbers. A Fibonacci number is one that is the product of the prior two generated numbers. The sequence is seeded with the values of 0 and 1, so that the sequence starts off as 01 123. Fibonacci numbers are used in computing hash table locations for file management systems.java programming language note 1Consider right-shifting. For example, ’a’ is mapped to ’x’ (a → x), if shift is 3. for example, this is what could be in the txt file: axeeh phkew blmtgune ubezb ngboxklbmr the method must dispehere the message with a given shift value