10. When using a std::vector, what values do we expect to get from the size and empty member functions after calling the clear member function? Complete the table below with the expected values. member function value after donations.clear() donations.size() donations.empty()
Q: Software development and modeling are incompatible. Developers should know their roles. Can you…
A: Procedures Involved in the Creation of: The phrase "developmental processes" refers to all of the…
Q: Which equation solutions need numerical approximation?
A: Your answer is given below.
Q: ions. Why are some organizations ditching local area networks and wiring for wireless? How does…
A: A wireless network is a computer network that utilizes wireless data associations between network…
Q: can pure functions
A: In computer programming, a pure function is a function that returns a result based solely on its…
Q: Why is it even necessary to design functions in computer programming?
A: Function A function is just a "chunk" of code that may be used repeatedly rather than having to be…
Q: Malware that is "in the network" may be difficult to find.
A: Malware is a file or piece of code, generally sent over a network, that infects, investigates,…
Q: A "distributed denial of service attack" is what it's termed, and a single individual might be…
A: Introduction: What exactly is a distributed denial-of-service assault, and how is it possible for a…
Q: Explain how the Binary Search works. When is it used? What is/are its benefit(s)
A: Binary search An advanced search method known as a binary search which detects and retrieves data…
Q: This section covers the waterfall system's various stages. Compare and contrast the two techniques.
A: Waterfall system stages: Identifying and analysing requirements: Each step identifies and publishes…
Q: Explain memberwise assignment briefly.
A: Introduction: The process of planning, creating, testing, and maintaining computer software's source…
Q: How may dynamic scoping be better utilized and improved?
A: Dynamic refers to anything that is always evolving, hence "dynamic scoping" describes anything like…
Q: Why build a circular array stack?
A: Circular arrays are data structures that have a fixed size but are capable of holding a varying…
Q: Java serializes objects how?
A: The process of transforming an object's state into a byte stream that might later be transformed…
Q: How can cloud computing be secured after a data breach? What are some vengeance methods?
A: Given: Is it possible to make changes to cloud security after a data breach? When a threat is…
Q: How does an attack using a DDoS work? Who exactly are the participants? What are the aims of a…
A: DDoS:- It stands for Distributed Denial of Service. It is a type of cyberattack that involves…
Q: How will you utilize Excel?
A: Given: Actually, an Excel-related question was asked. Microsoft Excel is a key tool in the business.…
Q: What steps may be taken to reduce the dangers of using a cell phone?
A: The answer is given below step.
Q: Could you describe the recent data breach?
A: Introduction: Data breaches occur when unauthorised parties gain access to and reveal private…
Q: What heuristics can you use to improve your system design in order to achieve this?
A: Improving system design is a complex task that involves a combination of skills and techniques. Here…
Q: Software. Any application software examples? How can business application software improve results?…
A: Software: A program or set of instructions that tells a computer how to operate and what steps must…
Q: Explain firewalls for network security and privacy. Explain the term and provide examples to show…
A: The answer to the question is given below:
Q: Every level of software development must analyze inputs and results.
A: Designing the input: The input is the unprocessed data used to create the result. The developers…
Q: How may a data leak affect cloud security? How can this be resolved?
A: Justification: Depending on the data, the consequences might include database corruption, the…
Q: Imagine being asked session write 10 rules
A: Sure, here are ten rules that attendees should follow when participating in a Joint Application…
Q: Even though privacy is highly valued in today's culture, there are conflicting opinions on it. Do…
A: The concept of privacy implies shielding something from danger. Privacy is the right to individual…
Q: Define the term "firewall" in the context of network security and explain how it operates in…
A: Firewalls: Firewalls are a kind of network security software that may be used to restrict access to…
Q: The different facets of the software design process should be discussed.
A: Introduction : Software design is the process of designing and creating software applications and…
Q: therefore the largest number could occur more than once
A: Given: If the numbers in our list were not unique and therefore the largest number could occur more…
Q: A key team member should be named in system development. Is it feasible for the engineers and other…
A: When done correctly, team development may establish an atmosphere that encourages creativity,…
Q: Discuss the many software system design inputs and outputs.
A: Input refers to the unprocessed data that an information system uses to create output.
Q: Why should students, interns, and company owners learn operations management to succeed in their…
A: Planning, regulating, and supervising the production and distribution of goods and services are all…
Q: Write a code in java programming. After the pandemic, you decide to open a fast-food restaurant.…
A: Here is the Java code for simulating the fast-food restaurant with one burger chef, one fries chef,…
Q: The Global Treps Project needs to have no less than five primary objectives. Using the SMART…
A: Milestone: Milestones are a significant event in the project schedule. It comprises of various…
Q: Overloading? What distinguishes it from coercion and polymorphism?
A: Overloading is a programming concept that allows multiple functions or operators to have the same…
Q: Send a packet to a host via the fixed route while supposing that you are doing so. a path going…
A: Delays in this context refer to the duration of packet processing. In computer networks, the…
Q: For this question you must design and implement a precondition loop in Python that will display the…
A: Pre-condition Loop: It is the set of statements which outline a condition that should be true when…
Q: Describe how firewalls protect network security and privacy. As a business owner, you must define…
A: firewall is important for businesses because it can prevent hackers from gaining access to sensitive…
Q: Which equation solutions need numerical approximation?
A: As computer capabilities have risen, the application of realistic mathematical models in technology…
Q: How does an attack using a DDoS work? Who exactly are the participants? The purpose of a distributed…
A: A DDoS or Distributed Denial of Service attack is a type of cyber attack that aims to make a website…
Q: What should system developers prioritize during the process?
A: Software development:- Software development is the process of designing, building, testing, and…
Q: How can I get Excel help?
A: Your answer is given below.
Q: How does an attack using a DDoS work? Who exactly are the The purpose of a distributed denial of…
A: How does DDoS work? Who plays? DDoS attacks' goal? Cybercriminals exploit normal network…
Q: Internet network layer time ensures data transmission.
A: in-order datagram delivery: A datagram is an independent, self-contained communication that is sent…
Q: Explain the data breach.
A: Introduction: A data breach happens when a hacker obtains unauthorised access to and discloses…
Q: Please supply a parametric polymorphism subprogram and explanation.
A: Please provide an example of parametric polymorphism's usage in a subprogram, along with an…
Q: Why is waterfall system development bad?
A: The Waterfall model is a linear and sequential approach to software development, where each stage of…
Q: Regarding Server 2019 Are there more log categories now that you have been promoted to a domain…
A: Domain controller: A Domain Controller is a server that is responsible for managing access to a…
Q: NFC (Near Field Communication) protocol including its architecture, communication protocol, and use…
A: Introduction Near Field Communication (NFC) Protocol Near Field Communication (NFC) is a…
Q: To do this, there are many other approaches that may be used, but the following are the five that…
A: The only difference between Distributed Denial of Service (DDoS) and Denial of Service assaults is…
Q: The physical platforms can be organized in different ways. For example, we can have an Ethernet LAN…
A: Both the answers are given in the below step
![10. When using a std::vector, what values do we expect
to get from the size and empty member functions after
calling the clear member function? Complete the table
below with the expected values.
member function value after donations.clear()
donations.size()
donations.empty()](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2Fa90fa285-7aeb-4403-ba5d-6c1afb95443f%2Fccd34efa-6bbb-4846-90fa-77ff1cf33581%2Fx7x68i_processed.jpeg&w=3840&q=75)
![](/static/compass_v2/shared-icons/check-mark.png)
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
- C++ Format Please Write a function (named "Lookup") that takes two const references to vectors. The first vector is a vector of strings. This vector is a list of words. The second parameter is a list of ints. Where each int denotes an index in the first vector. The function should return a string formed by concatenated the words (separated by a space) of the first vector in the order denoted by the second vector. Input of Test Case provided in PDF:create using c++ One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector . This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings. The class should have the following A private member variable called dynamicArray that references a dynamic array of type string. A private member variable called size that holds the number of entries in the array. A default constructor that sets the dynamic array to NULL and sets size to 0. A function that returns size . A function named addEntry that takes a string as input. The function should create a new dynamic array one element larger than dynamicArray , copy all elements from dynamicArray into the new array, add the new string onto the end of the new array, increment size, delete the…1- Persistent variables cannot be accessed from outside the function. (True or False 2- Define a 5*1 empty cell array and then fill it with ones. 3- If A=[5 2] and B-[8; 9; 6] then create 3*3 matrix by concatenating A and B. 4- If S=struct([1), then the size(S)= 5- What is the value of I= any([1, 0, 3]&&[0, 8, 0]) in Matlab? I= 6- If K=[2 5 7], then max(K, 5.5)= matlab
- C++ Program You may use the vector and iostream libraries. You are allowed to use three built-in vector member functions (and no others) but you may not have to use them all. The member functions you are allowed to use are size(), at(), and push_back() Write a function that outputs a vector of doubles with each number in the vector separated by a space then a newline after the entire vector is output. The whole vector output should be preceded by a single line saying "Current Vector Contents:". Write a function that takes a vector a doubles and reverses the order of all the elements of the vector. Write a function that fills a vector of doubles with positive numbers using the standard input stream cin, terminate the input when the user enters any negative number. A single output prompt should precede the initial input stating directions for user. Write a main function that creates an empty vector, calls functions from 2 & 3 and calls your output function before and after each…Class Average GPA Create a program that dynamically creates a vector whose size depends on the user's preference. Pass the vector to a CalculateAverage function that is responsible for computing the average GPA of the given vector of GPAs. CalculateAverage Implement a function called CalculateAverage in calculate_avg.cc that calculates the average of a double vector and returns that average. CalculateAverage() will have one parameter, a std::vector<double>& referring to the vector. When the vector size is greater than 0, the function should calculate the average GPA from the given vector of grades. However, when the size of the vector is 0, then the function should return 0. main The main function has mostly been built for you. It is your task to: Construct a double vector based on the inputted class size. Store each student's GPAs into the vector. Pass the vector as input to CalculateAverage to compute the average GPA of the class. Display the students' average GPA. Read…CODE MUST BE IN OCAML LANGUAGE! 1. Create a type slidingTile, consisting of a char matrix and two integers x and y. The integers x and y are the coordinates of an empty tile. 2. Create a function val slide : slidingTile -> int -> int -> slidingTile = that given a slidingTile and two integers, that represent a location in the matrix, it slides the tile from the specified location to the empty tile, then returns the altered slidingTile. If provided location is not adjacent to the empty tile, or out of bounds, then return the slidingTile unaltered. 3. Create a function val print_tile : slidingTile -> unit = that prints a slidingTile on screen with the corresponding characters from the matrix. However, print an empty space where the empty tile is instead # let a=...# print_tile a;;12345678# slide a 2 2;;# print_tile a;;12345678# slide a 3 2;;# print_tile a;;1234567 8# slide a 4 2;;# print_tile a;;1234567 8# slide a 2 2;;# print_tile a;;1234 6758
- Problem DNA: Subsequence markingA common task in dealing with DNA sequences is searching for particular substrings within longer DNA sequences. Write a function mark_dna that takes as parameters a DNA sequence to search, and a shorter target sequence to find within the longer sequence. Have this function return a new altered sequence that is the original sequence with all non-overlapping occurrences of the target surrounded with the characters >> and <<. Hints: ● String slicing is useful for looking at multiple characters at once. ● Remember that you cannot modify the original string directly, you’ll need to build a copy. Start with an empty string and concatenate onto it as you loop. Constraints: ● Don't use the built-in replace string method. All other string methods are permitted. >>> mark_dna('atgcgctagcatg', 'gcg') 'at>>gcg<<ctagcatg' >>> mark_dna('atgcgctagcatg', 'gc')…OCAML Programming language Sliding tiles The mechanics described in this exercise can be used to implement a game sliding tiles. 1. Create a type slidingTile, consisting of a char matrix and two integers x and y. The integers x and y are the coordinates of an empty tile. 2. Create a function val slide : slidingTile -> int -> int -> slidingTile = <fun> that given a slidingTile and two integers, that represent a location in the matrix, it slides the tile from the specified location to the empty tile, then returns the altered sliding Tile. If provided location is not adjacent to the empty tile, or out of bounds, then return the slidingTile unaltered. 3.Create a function val print_tile : slidingTile -> unit = <fun> that prints a sliding Tile on screen with the corresponding characters from the matrix. However, print an empty space where the empty tile is instead.create a C++ class called vector that have the following: Constructors and destructors. Copy operator. Empty the vector. Returns number of items in the vector. Returns whether or not the vector is empty. Then overload the following operators * ,+,-,, [], /,<<,>>, ==,
- C++ Dynamic Programs Hoskins College offers both curriculum and continuing education courses. Write a program that dynamically tracks these courses using an array of object pointers. Every course (both curriculum and continuing education) has a course id, title, room number, and number of contact hours. A curriculum course has credit hours and tuition rate. Tuition is calculated by multiplying the course's credit hours by tuition rate. A continuing education course has a flat fee (cost). Implement a show() function in every class that displays the data in the object. Part A: Create an inheritance-based collection of classes to represent these different courses. Include code in main to test your work by instantiating objects of the two derived classes. Part B: Modify your program. Remove the objects you created in main to test the classes. Modify the base class so that show() becomes a virtual class. In main, create a single array capable of holding pointers to objects of both…in c++ Write a function named “getLowest” that accepts a vector of pointers to Student objects. It will go through the list and return pointers to the Student or GradStudent with the lowest student ID and GPA. Please note that the vector contains pointers to either Student or GradStudent objects. Please show that you have tested with a vector of pointers of mixed Student and GradStudent objects (in the same vector) For example, if these students and grad students are in the list Student(2000, "John Smith", 4.0) GradStudent(3000,"Nancy Brown", 3.5, 2021) ; Student(1000, "Bob Johnson", 3.0) ; GradStudent(4000, "Tim Jackson", 2.0, 2020)) ; It will return pointers to these two objects: Lowest ID: ID(1000) NAME(Bob Johnson) GPA(3.00) Lowest GPA: ID(4000) NAME(Tim Jackson) GPA(2.00) GRADUATION-YEAR(2020)Translator Using as a basis the program that allows to deal cards from a deck to a player's hand, add functionality that allows to update the deck of cards. Updating the deck of cards involves moving the cards from the deck to the beginning of the vector as the player requests a new card. At each deal, the cards in the deck must be printed to make the code in c language. The following functions must be implemented additionally: updateDeck. - This function receives two arguments: a vector with the deck of cards to update and the current size of the deck of cards. It will move the cards in the deck to the beginning of the vector. printVector - This function will receive two parameters: a vector and its dimension. The function will print the vector, and will print the values (the vector) of the initial hand, the updated deck, and the final hand. to make the code in c language Expected output :
![Database System Concepts](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Starting Out with Python (4th Edition)](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Digital Fundamentals (11th Edition)](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![C How to Program (8th Edition)](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Database Systems: Design, Implementation, & Manag…](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Programmable Logic Controllers](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
![Database System Concepts](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Starting Out with Python (4th Edition)](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Digital Fundamentals (11th Edition)](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![C How to Program (8th Edition)](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Database Systems: Design, Implementation, & Manag…](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Programmable Logic Controllers](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)