You are tasked to implement an abstract data type class which takes in a given input file called input.txt, and processes, identifies and sorts all unique word instances found in the file. Sample Input Hi hello hi good bye goodbye Bye bye good say Sample Output Bye Hi bye hello hi say The input.txt file is found along with the zip folder where this instructions file also came along with. Note: you are not allowed to use pythonic lists, and its methods and functions, and string methods. However the use of the file handling methods (read readlines and readline) are allowed for this project.
Q: A microprocessor is a device that performs a variety of tasks.
A: Introduction: It is considered a microprocessor when an integrated circuit (IC) contains all of the ...
Q: a) Let r1,., I, be an iid sample from Unif(0,0). Show that 0- mar{#1,..n) is consistent for 0. This ...
A: Answer: I have given answered in the handwritten format in brief explanation
Q: Is it your judgment that the recent security compromise involving access control or authentication t...
A: When private or protected information is compromised, a data/security breach occurs. Your Social Sec...
Q: Modify the unsortedArrayAccess class by adding a method that find the smallest element and average i...
A: According to the Question below the Solution:
Q: Explain the difference between an application programming interface (API) and an application binary ...
A: Introduction: Binary software modules communicate through an application binary interface (ABI). In...
Q: When it comes to purchasing new technology or updating existing systems, how much attention should h...
A: One of the most common types of security breaches is in the hospitality business. On a daily basis, ...
Q: What are the approaches to MDM in database ?
A: What is Master Data: Master data is all the data critical to the operation of a business. This data ...
Q: Exercise 11.4. ¤ Write a function in Python that takes two inputs: • a list of points in R", • a pos...
A: Answer
Q: void squire(int n) { if( n <= ) time++; else { squire (n/2); squire (n/2); for (int i=0; i<n; i++) f...
A: O(N) for(int i=0;i<n;i++) : O(N) -level 1 for(int j=i;j<n;j++) : O(1) -level 2
Q: How did the linked-list operations of car and cdr influence linked-list data structures in Lisp/Sche...
A: The atomic S-Expressions or the basic operations on the contra cell Car and cadre are two programmin...
Q: A common bus system which is capable of transferring 8 bits at time with number of registers are 4 a...
A: Given the information, The total number of registers is four. Each register has an 8-bit value. The ...
Q: A Wireshark trace of TCP traffic between hosts A and B indicated the following segments. A sent a se...
A: The state of connection for the host A and B
Q: 2. FA,B,C,D) - Σ (0,6, 8 , 13, 14) d(A,B,C,D) - Σ (2, 4, 10) %3D
A: C'D' C'D CD CD' A'B' 1 X A'B X 1 AB 1 1 AB' 1 X
Q: Write a python program to get the specific line from a given File and that line number should be ent...
A: Introduction: Python provides inbuilt functions for creating, reading and writing files. There are...
Q: Determine the difference between a virtual machine and a virtual machine.
A: Introduction: Even though it is usually abbreviated as "VM," the term refers to the same thing as an...
Q: b) Datuk Hafiz Arif who is the Chief Minister of Melaka is needed to visit SIX (6) flood evacuation ...
A: Answer: I have given answered in the handwritten format in brief explanation.
Q: 3+1011111111111
A: Note :- You have not mention language to calculate your query , So i am doing in C++ language.
Q: Part C: Normalization. Using the table below normalize the table below to its 3rd normal form. Show ...
A: ANSWER:-
Q: Provide a summary of the security services.
A: Basics Data security refers to the disciplines that manage the requirements of Confidentiality, Inte...
Q: Determine the machine code of the given instructions. Include operand or address size prefix. For th...
A: We have given a assembly code instruction : MOV (DI+9DFH), DEFAH , we have asked to change it to Ma...
Q: Write a Java program to find the second highest number from an user entered array of integers.
A: Answer: Java Code: import java.util.*;public class Main{ public static void main(String[] args) {Sc...
Q: (B) Add a class named Square.java Give it private attributes double side and String color • Make a c...
A: Given The answer is given below. Below is the required code in java and sample output:
Q: An XSS attack requires a website meets two criteria: a. Web browser should have support JavaScript ...
A: Option C
Q: A company database needs to store information about employees (identified by ssn, with salary and ph...
A: Introduction: An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how "en...
Q: Write a Python program that counts the amount of identical values in a list below, and prints them. ...
A: The above question that is given to write a pogram in python lanuage count the duplicate element in...
Q: What does it mean to have a privilege?
A: Given To know about the privilege in computer.
Q: (c) Find the sum-of-products expansion of the following Boolean function: f(a,b,c) = a(b+ €) + ab + ...
A: c) used kmap method to find sum of products
Q: To correctly characterize a variable, one must identify its "type" as well as its "other properties....
A: Introduction: A variable's characteristics The scope and visibility aid in describing the variable's...
Q: if x % 2 == 1: if x % 2 == 0: return 0 else: return 3 * x + 1 else: return x // 2 QSIZE = 2 queue = ...
A: firstly, a list is created which is of size 2. Both the elements of the list are 0. Later, the funct...
Q: Exercise 2.29 Describe an algorithm that, given finite automata accepting lan- guages L1 and L2, det...
A: A branch of theoretical computer science, a deterministic finite automaton also known as determinist...
Q: The transport layer of HTTP, SMTP, and POP3 uses TCP rather than UDP as the underlying protocol.
A: TCP is used instead of UDP for HTTP, SMTP, and POP3 because: 1) Dealing with a large quantity of cus...
Q: An 8 bit computer stores negative integers in TWO's complement form in 8 bit register. Show how the ...
A: Given: An 8 bit computer stores negative integers in TWO's complement form in 8 bit register. evalua...
Q: methods and devices for entering data with a stylus What does it mean to be a digitizer?
A: Pen Input - This feature allows users to interface with the system using a pen. Spot or Pointing the...
Q: Determine the specific type of addressing mode (SMALL LETTERS only) and compute for the address/es. ...
A: We have given an Instruction , we have to find the effective address , physical address , etc. Out o...
Q: A. Write an Assembly program to load the register E with the value 12 and the register H with the va...
A: The question is to write the assembly language code for the given problem.
Q: In a field where an expert system could help you, provide at least five rules for the knowledge base...
A: Answer: The following are the top five tips for building a solid knowledge base: 1. Determine what y...
Q: Using Swift programming language, write a function filter that takes a predicate and a list as argum...
A: //function to return the list of odd elementsfunc filterOdd(arr: [Int]) -> [Int] { return arr.f...
Q: In a bridged network, two bus segments are interconnected via a bridge. There are two hosts attached...
A: Collisions domain names: This default gateway is really a software framework that is coupled by a sh...
Q: Use R program as shown below then apply and construct a suitable graphical display of the generated ...
A: Answer I have done code and also I have attached code and code screenshot as well as output
Q: Explain Symmetric and Asymmetric Encryption that are commonly applied in protecting the client serve...
A: Symmetric encryption : Symmetric encryption is a well established encryption technique that has b...
Q: The four cache replacement policies are explained in this chapter.
A: check further steps for the answer :
Q: The finite state machine (FSM): a b. a A B C generates the regular language, L = {a"b™ | a 2 1 and m...
A: #include <iostream> #include <cassert> #include <string> using namespace std; ...
Q: in python please get_count(aList, item) Returns the number of times item appears in aList. ...
A: Given The answer is given below.
Q: Is there a fundamental distinction between declarative/functional and procedural/imperative programm...
A: Introduction : Programming Paradigms: Generally speaking, the word "paradigm" refers to a model or ...
Q: Reduce the expression [(AB)' + A' + AB]'
A: Given expression : [(AB)' + A' +AB]' reducing it using boolean laws: Demorgan's law: (AB)' = A' + B'...
Q: - Design a logic circuit using only NOR gates F(A,B,C)= (A+B+C)(A+B+C)?
A: A logic circuit is generally used in designing digital logic. It represents the given expression in ...
Q: Write an instruction that divides the content of register ($t1) by 2, and puts the result in the reg...
A: Given Write an instruction that divides the content of register ($t1) by 2, and puts the result...
Q: Develop a PL/SQL block that would go through all the employees from EMPLOYEES table who work in depa...
A: Solution SELECT * FROM departments where department_id =90; BULK COLLECT Clause for Selecting Multip...
Q: Determine the machine code of the given instructions. Include operand or address size prefix. For th...
A: Machine code tables:
Q: Are there any concerns about the company's security?
A: Enterprise protection refers to the method by which a business protects its computer resources (info...
Step by step
Solved in 2 steps
- for c++ A set is a collection of distinct elements of the same type. Design the class unorderedSetType. Design the class unorderedSetType, derived from the class unorderedArrayListType, to manipulate sets. Note that you need to redefine only the functions insertAt, insertEnd, and replaceAt. If the item to be inserted is already in the list, the functions insertAt and insertEnd output an appropriate message. Similarly, if the item to be replaced is already in the list, the function replaceAt outputs an appropriate message. Write a program to test your class.A dynamic array is exactly as it sounds.For this problem set, you will submit java file named Homework.java Return Growing NumList This function will be given a single number, it should return a list of strings of numbers. Each string in the list will only contain a single number repeated an arbitrary amount of times. The number each string will contain will be equal to the current string's index+1. The number in the string should be repeated the same number of times as the string's index+1. Each number in the string should be separated by a space. This list should stop when its size equals the max number specified. Signature: public static ArrayList<String> returnGrowingNumList(int max) Example: INPUT: 3OUTPUT: [1, 2 2, 3 3 3] INPUT: 6OUTPUT: [1, 2 2, 3 3 3, 4 4 4 4, 5 5 5 5 5, 6 6 6 6 6 6]
- In this programming exercise you will implement two functions. The first function will prompt the user for a file containing the number of vertices and entries of the adjacency matrix of a graph. It will return a two-dimensional list (a list of lists) containing the adjacency matrix. The textfile is named inputfilename.txt am trying to read for the matrix 80 1 2 3 100 100 100 1001 0 2 100 3 4 100 1002 2 0 4 4 100 5 1003 100 4 0 100 100 4 100100 3 4 100 0 3 3 3100 4 100 100 3 0 100 1100 100 5 4 3 100 0 2100 100 100 100 3 1 2 0 def readMatrix(inputfilename): ''' Returns a two-dimentional array created from the data in the given file. Pre: 'inputfilename' is the name of a text file whose first row contains the number of vertices in a graph and whose subsequent rows contain the rows of the adjacency matrix of the graph. ''' # Open the file f = open(inputfilename, 'r') # Read the number of vertices from the first line of the file n =…A for construct is a kind of loop that operates on items included in a list. Because of this, it continues to operate for as long as there are objects to be processed in the system. Is this statement correct or does it include an error?A for construct is a type of loop that works with the things in a list. Because of this, it will keep running as long as there are items in the system to be handled. Does this statement make a mistake or is it correct?
- In C++, write a program that reads in an array of type int. You may assume that there are fewer than 20 entries in the array. The output must be a two-column list. The first column is a list of the distinct array elements and the second column is the count of the number of occurences of each element.1. The codewords will be scrambled words. You will read the words used for the codes from a file and store it into an array. There are 60 words in the file that range in size from 3 characters to 7 characters. The file is called wordlist.txt and can be found attached to the assignment in IvyLearn.2. Start with input for an integer seed for the random number generator. There is no need to put a prompt before the cin operation.3. Ask the Player if they are ready to play and only proceed if they type a Y or y. If the user types an N or n then the program should finish. a. INPUT VALIDATION: Make sure the user has typed either y, Y, n, or N4. Create a variable to keep track of the number of guesses the user has made.5. Use the random number generator to pick a word from the list of words.6. Once you have chosen a word as the codeword you will need to scramble the letters to make it into a code. You should use the random number generator to help you mix up the letters.7. Display to the user…Please write a full C++ code The function insert of the class orderedLinkedList does not check if the item to be inserted is already in the list; that is, it does not check for duplicates. Rewrite the definition of the function insert so that before inserting the item, it checks whether the item to be inserted is already in the list. If the item to be inserted is already in the list, the function outputs an appropriate error message. Also, write a program to test your function Also please allow the code to be copied. Don't just provide a screenshot
- The function that will a single items to the list is Oextend (...) Oadd(...) Oappend(...) Olengthen(...)Unique Words (Python) It seems like we need to use linked lists. Summary Specifications:You are tasked to implement an abstract data type class which takes in a given input file called input.txt, and processes, identifies and sorts all unique word instances found in the file. Sample InputHi hello hi good bye goodbye Bye bye good say Sample OutputBye Hi bye hello hi say The input.txt file is found along with the zip folder where this instructions file also came along with. Note: you are not allowed to use pythonic lists, and its methods and functions, and string methods. However the use of the file handling methods (read readlines and readline) are allowed for this project.Using JavaScriptDefine a function getMonth which accepts number from 1 to 12 as an argument and return the descriptive name of the month. For example: getMonth(1) should return January while getMonth(12) returns December, finally getMonth(-1) returns null. Use array or object to define a list of names for the month and refrain from using if statement to check the argument if it's 1, 2, etc.