Activity 3 The following program reads three students records and creates an array of structure of the students. Information of the records are organized as follows: {student id, student name, student date of birth, city of birth} For example, the following are examples of student records: “17581726", “Mohammad Al-Abdullah", “2002-12-10", “Buriydah" "55382214", "Ibrahim Al-Faris", “2003-05-07", “Riyadh" #include #include typedef struct studentStruct { char id[10]; char name [50]; char ddmmyyyy[11]; char cityBirth[ 20]; }Student; void fillstruct(Student *std, char currentStd[4][5®]); int main(){ char records[3][4][5®] = { {"17581726", "Mohammad Alabdullah", "2002-12-10", "Buriydah"}, {"55382214", "Ibrahim Alfaris", "2003-05-07", "Riyadh"}, {"62111622","Ahmad Almansor","2001-02-22","Buriydah"} };
Q: Explanation of three circumstances in which a surrogate key should be established for the main key…
A: Introduction: It holds a single value for all of the table's records. A user or an application can…
Q: Give examples of real-world SOA uses in various areas of life?
A: EXPLANATION: SOA (Service Oriented Architecture): SOA stands for Service Oriented Architecture. It…
Q: Why are there so many different partitioning algorithms in use by operating systems, and why are…
A: Partitioning algorithm is used to give the allocation order of the processes into these partitions.…
Q: What are the different characteristics between 802.11 b, a, g, and n? Choose three random people and…
A: 802.11a: Operates in the 5.15GHz to 5.35GHz radio spectrum. Speed: Up to 54Mbps (actual throughput…
Q: Is there anything else that connected-car technologies could provide automakers like BMW in terms of…
A: Introduction: Car-to-car communication: Cars that are linked to the internet and the internet of…
Q: Which component of a DFD defines the scope of the system being modelled? External Agent Data flow…
A: Data flow is the component of a DFD that defines the scope of the system being modelled.
Q: prima and foreign keys (arrows) must be identified. BANK BRANCHES BANK BRANCH Code Name Addr Addr…
A: Answers If you have any doubts, please give me comment... BANK(Code, Name, Addr);…
Q: QUESTION 4 One way of organizing a form is to group similar fields into field sets. O True O False
A: Answer the above questions are as follows:
Q: A- System.out.print(Math.floor(5.7); Answer please
A: Here in the given code, we have a print statement. In this statement, we have used the floor()…
Q: "Press the ESC key for starting menu" appears on my HP laptop computer. How can I change it?
A: Introduction: A key (often labeled Esc) is found on the majority of computer keyboards and used for…
Q: How do you know whether a system component should be a source or a sink? or as a method?
A: Introduction: A system component is any procedure, software, utility, or other component of a…
Q: Your task is to develop a Tic-Tac-Toe (also called as “Noughts and Crosses”) game in Java using…
A: The answer starts from step-2.
Q: Would you prefer it if an error was identified during the runtime or during the compile time?
A: Q: Compile Time Errors VS Runtime Errors
Q: Problem 3: Assume that in the WEP algorithm, the initialization vector is 24 bits long. Assuming…
A:
Q: As we have done in the class, provide brief explanations of how to design a Turing machine for the…
A: This question belongs to turing machine and is solved below.
Q: What do you mean by subnet mask?
A: A subnet mask helps in separating an IP address into network and host address.
Q: Why is phyton so popular for cloud computing? Can you tell me why it is favoured over other…
A: let us see the answer:- Introduction:- Python:-Python is a computer programming language that is…
Q: owing directives prevents a macro fro
A: Below directives prevents a macro from growing any further
Q: DFD can be decomposed into different levels. Leveling means - Splitting DFD into different levels…
A: Expanding a process into one with more sub-processes giving more detail
Q: are the benefits of using a methodology when it comes to implementing security? A technique may…
A:
Q: create a one dimensional array of baseball players with size of 100 add three baseball players to…
A: ALGORITHM:- 1. Declare a string array of size 100. 2. Insert the names of 3 baseball players in it.…
Q: Explain the naming convention for data-flow diagrams' various layers.
A: Introduction: In DFD, there are several name conventions for various levels. Different processes,…
Q: Is there anything else that connected-car technologies could provide automakers like BMw in terms of…
A: Technology for connected vehicles Cars that are linked to the internet and IoT make driving more…
Q: What kind of data breach occurred as a result of the Facebook/Cambridge Analytica partnership?
A: INTRODUCTION: What is the sole method of preventing an electrostatic discharge from a CPU? The most…
Q: Illustrate a Crow's Foot model based on the statement and attributes below. A singer (artist) can…
A: The crow foot notation contains entities and attributes. The entities are connected with the…
Q: What considerations should be taken into account while selecting a database management system…
A: INTRODUCTION: A DBMS is a Database Management System used to store and retrieve data. The primary…
Q: Network security is one of the most important aspects, if not the most important aspect, in relation…
A: As network security risks continue to escalate, it has never been more important for you to protect…
Q: Declare a local variable called buffer, which is a 20-byte array.
A: => in this question you did not specify the language so i will answer this question in 2 language…
Q: Describe the guidelines for creating effective data-flow diagrams.
A: Diagrams of data flow (DFD) A data flow diagram is a kind of process diagram that is used to…
Q: Is the message box that appears as soon as CreateWindow is called shown before or after the main…
A: The question belongs to computer science and is solved below.
Q: What is open source in computer science?
A: Foundation This question comes from Internet Technologies which is a paper of computer science.…
Q: What is the role of a central processing unit (CPU)?
A: Introduction: CPU: The central processing unit (CPU) is the hardware that executes the computer…
Q: Please draw the software structure diagram of the Campus used goods trading platform, which should…
A: The software structure diagram of the campus goods trading platform
Q: Big data has become a part of every organization's information technology systems in today's world.…
A: Find the answer given as below :
Q: What exactly do I need to know about computer science?
A: Answer the above questions are as follows:
Q: Why is phyton so popular for cloud computing? Can you tell me why it is favoured over other…
A: Introduction: Python is a computer language designed for general-purpose use. If you look at any…
Q: Please provide a detailed explanation of how hybrid cloud platforms, such as Dropbox, function.
A: The Answer is in step2
Q: Create a tree prefix and postfix for the formula: (A (B + C) * D) / C 5.
A:
Q: According to the following code; you are required to draw the flowchart in details with clear…
A: Find the required flowchart given as below :
Q: PART III. Servo Motor Use tinkercad for circuit and coding Controlling Servo motor rotation using…
A: Code: #include <Servo.h>const int UP_BUTTON_PIN = 7;const int DOWN_BUTTON_PIN = 6;// Arduino…
Q: How do you know whether a system component should be a source or a sink? or as a method?
A: Introduction: Identifying whether parts of the system are sources or sinks or which parts of the…
Q: What are the different ways that each bridge and router lower the collision domain?
A: INTRODUCTION: COLLISION DOMAIN: A collision domain is a network region where concurrent data…
Q: In the context of in formation security, how can you explain the concepts of confusion and…
A: Introduction: Recommendation engines look at a person's history of using digital products, such as…
Q: How can the Requests for Information be tracked down to their source?
A: Introduction: A request for information is a standard business technique used to get written…
Q: What is the sole method of protecting a CPU against electrostatic discharge?
A: According to the question Electrostatic discharge (ESD) is a unexpected and temporary float of…
Q: What role does the data dictionary play in each of the six phases of the DBLC?
A: Dictionary of data The data dictionary is a fundamental component of a relational database…
Q: n security, how can
A: IntroductionConfusion and diffusion are two features that can be used to create secure encryption.…
Q: Is there anything else that connected-car technologies could provide automakers like BMW in terms of…
A: Introduction: Car-to-car communicationCars that are linked to the internet and the internet of…
Q: :the output of (Print "a", "b", "c") is abc O ab c C abc O
A: Option C: a b c
Q: What are the general criteria for observing workers and collecting data?
A: Introduction: The fundamental criteria for assessment, like with other Wenner-Gren prizes, are the…
Step by step
Solved in 3 steps with 1 images
- in c language !! typedef struct {long restaurant_id;char restaurant_name[10];char description[120];double rate;char cuisine[30]; opening_year;long capacity;char city[30];char address[60];char owner[30];} RECORD_t, *RECORD; RECdelete (unsigned long restaurant_id, RECORD *restaurant_array, unsigned long *p_size){int rec;int index;// index <- find the index of the RECORD with given restaurant_id in restaurant_array ????? (I DIDNT)if (index is valid)rec=restaurant_array[index];elserec=NULL;return rec;}Q1 function myFunc() { let a = 10; if (true) { Q3 } } let a = 5; console.log(a); Q4 console.log(a); Q2 const square = num => num * num; console.log(square(3) + 5); myFunc(); let x = 30; let y "200"; console.log(x+y); const nums = [10, 20, 8, 17]; nums.filter(e=> e > 10); console.log(nums); Q5 const nums = [30, 35, 42, 20, 15]; console.log(nums.every (num => num > 20)); January 15int sum = 0; for (int i 0; i < 5; i++){ sum += i; } cout << sum;
- int main(){ long long int total; long long int init; scanf("%lld %lld", &total, &init); getchar(); long long int max = init; long long int min = init; int i; for (i = 0; i < total; i++) { char op1 = '0'; char op2 = '0'; long long int num1 = 0; long long int num2 = 0; scanf("%c %lld %c %lld", &op1, &num1, &op2, &num2); getchar(); long long int maxr = max; long long int minr = min; if (op1 == '+') { long long int sum = max + num1; maxr = sum; minr = sum; long long int res = min + num1; if (res > maxr) { max = res; } if (res < minr) { minr = res; } } else { long long int sum = max * num1; maxr = sum; minr = sum; long long int res = min * num1;…int func(int a, int b) { return (aLOVELY PROFESSIONAL UNIVERSITY Academic Task No. 1 School : of Computer Science and Engineering Name of the faculty member_Ms. Gauri Mathur_ Course Code: CSE202 Faculty of: Technology and Sciences Course Title: Object Oriented Programming Program: Max. Marks: 30 Term: Is Rubric Applicable: No Date of Allotment: 26/02/2021 Date of Submission: 09/03/2021 Important Guidelines: 1. All questions in this Academic Task are compulsory. 2. It is mandatory to attempt all questions of the assignment in your own handwriting on A4 size sheets/pages with a blue colour ink pen. Any other mode of attempt (typed or printed codes or table) except hand written/drawn will not be accepted/considered as valid submission(s) under any circumstances. 3. Every attempted sheet/page should carry clear details of student such as Name, Registration number, Roll number, Question number and Page number. The page numbers should be written clearly on the bottom of every attempted sheet in a prescribed format as: for…Match the C-function on the left to the Intel assemble function on the right. W: cmpl $4 movl %edi , %edi jmp .L4(,%rdi,8) %edi .L3: movl $17, %eax ret .15: movl $3, %eax int A ( int x , int y) { int a ; if ( x == 0 ) else i f ( x == 1 ) a = 3 ; else i f ( x == 2 ) a = 2 0 ; else i f ( x == 3 ) a = 2 ; else i f ( x == 4 ) a = 1 ; ret .L6: a = 17; movl $20, %eax ret .L7: movl $2, %eax ret else a = 0; .L8: return a ; movl $1, %eax .L2: ret . section .rodata . L4: .quad .L3 .quad .L5 .quad .L6 .quad .L7 .quad .L8 X: testl %edi, %edi je cmpl je cmpl je стр1 je cmpl .L16 $1, %edi .L17 $2, %edi .L18 $3, %edi int B (int x, int y) { int a; switch (x) { .L19 $4, %edi %al movzbl %al, %eax case 0: a = 17; break; sete break; case 1: a = 3; case 2: a = 20; break; case 3: a = 2; break; case 4: a = 1; a = 0; } return a; ret .L16: break; movl $17, %eax ret .L17: movl $3, %eax } ret .L18: movl $20, %eax ret .L19: movl ret $2, %eaxData Structures Practice Question Code in C++ You are building a system for a Housing Society, such as Bahria Town. You are supposed to design a very simple system that allows them to keep a record of how many blocks, sectors, streets, and houses the societyhas. Your system also generates unique names for blocks and sectors, and unique numbers of streets andhouses. YA society has many blocks (A Link List), each block has many sectors (A link List), each sector has many streets (A link List), and each street has many houses (A link List). The society has a name, each block hasa name (an alphabet), each sector has a name (an alphabet), each street has a number, and each house alsohas a unique house number. Note:Society is a HEAD NODE.All Other Node Types can have inherited from Node of type Society. So all nodes can point parentor child nodes types in any arbitrary order.When your program starts:• It asks the user the name of the Society as well as the City in which it is located. Your…#define _CRT_SECURE_NO_WARNINGS #include <stdio.h> #define NAME_LEN 25 #define MAX_PARTS 100 struct part { int number; char name[NAME_LEN + 1]; int on_hand; double price; } inventory[MAX_PARTS]; int num_parts = 0; int find_part(int number); void insert(void); void search(void); void update(void); void print(void); int read_line(char str[], int n); int main(void) { char code; for (;;) { printf("Enter operation code: "); scanf(" %c", &code); while (getchar() != '\n') /* skips to end of line */ ; switch (code) { case 'i': insert(); break; case 's': search(); break; case 'u': update(); break; case 'p': print(); break; case 'q': return 0; default: printf("Illegal code\n"); } printf("\n"); } } int find_part(int number) { int i; for (i = 0; i < num_parts; i++) if…C programming pseudocode pointers help. { totalInAGivenHour+=*(rawReadings+ monthNo*30*14*4 + 14*4*nThDateOfMonth+ 4*nThHourOfDateFrom7AM + nThReadingTimeOfHour); // the pointer is to assign the values in the bracket and storing them in totalInAGivenHour }Hef sharks_minnows (minnows, sharks): shark_count = 0 minnow_count = len (minnows) for i in range(minnow_count): curr_shark_height = minnows [i] if curr_shark_height is not None: minnows [i] = None for j in range (i + 1, minnow_count): if minnows [j] == curr_shark_height: minnows [j] = None curr_shark_height -- 1 shark_count += 1 return shark_count <= sharks The provided code is imperfect, in that it sometimes returns True when it should return False, and sometimes returns False when it should return True. (a) Provide an example of a function call where the provided code will correctly return True (i.e. a True Positive) (b) Provide an example of a function call where the provided code will correctly return False (i.e. a True Negative) (c) Provide an example of a function call where the provided code will incorrectly return True (i.e. a False Positive) (d) Provide an example of a function call where the provided code will incorrectly return False (i.e. a False Negative)SEE MORE QUESTIONSRecommended textbooks for youDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill EducationDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education