Code it Utilizing the following functions headers: Main() Create a program that returns a new list that only has elements that are common between the lists (without duplicates). Please be positive that the program runs on two lists of different sizes. Make sure you use good variable names (for example do no use x) firstlist = [1, 1, 2, 3, 5, 11, 13, 21, 34, 55, 89] secondlist = [1, 1, 2, 3, 4, 5, 6, 7, 11, 9, 10, 11, 12, 13,34] Sample output: [1, 2, 3, 5, 11, 13, 34]?
Q: How will software reliability evolve? development?
A: Answer : If any software have to achieve it's higher reliability than you need to develop a better…
Q: When asked to define RAM, what would they say? Create a two-group index. Do embedded computers use…
A: Although RAM can appear weird, it is a crucial part of computers. A computer will need to utilise…
Q: The phrase "cloud computing" refers to a kind of computing that makes use of the internet.
A: "Cloud computing" refers to the on-demand provision of computer system resources, such as data…
Q: C programming: When running the code, why did the output turn 55? int sum(int k); int main() {…
A:
Q: Justify a WBS's need. Does a typical software project need to follow your SDLC?
A: Introduction: Projects in software development often seem overwhelming. But it becomes manageable…
Q: A computer requiring high reliability has 4 independent components, and functions as long as at…
A: Reliability Engineering:- Reliability Engineering is an engineering field focused on maximizing the…
Q: Discuss the possible threats that insiders pose to a company's security, as well as the incentives…
A: Insiders are the company's employees or managers who work for the company and are responsible for…
Q: Discuss the several versions of Microsoft Windows that are available, as well as the major and new…
A: Service Level Agreement: A Service Level Agreement (SLA) is a contract that specifies, typically in…
Q: Is e-mail a component of your future plans? The route of an email message starts with the sender and…
A: Answer An email is sent via the Simple Mail Transfer Protocol (SMTP) and then delivered to the Mail…
Q: How can you tell whether a software project is doomed to failure? The need for an explanation defies…
A: Answer: The warning signs that a software project is about to fail include the following: The…
Q: Please explain why computers and smartphones don't qualify. Determine whether your reaction is based…
A: Students are developing an unhealthy dependence on their mobile devices, resulting in decreased…
Q: It is recommended that five common network architectures be recognized. Which do you think is the…
A: Topologies: Star topology: All devices are connected to a hub. All nodes connect to this primary…
Q: What types of changes may be made to the computer network system to maintain it virus-free?
A: Answer: We need to write the what are the types of changes and steps taken to protect from the…
Q: Identify some of the possible issues that may arise while developing an information system…
A: Introduction: The system architecture of an organisation is made up of the specialised information…
Q: Explain the key distinction between Type 1 and Type 2 hypervisors.
A: A piece of software called a hypervisor builds virtual computers. Hypervisors may be run on any kind…
Q: Discuss the several versions of Microsoft Windows that are available, as well as the major and new…
A: Service Level Agreement: A Service Level Agreement (SLA) is a contract that specifies, typically in…
Q: Using the BFS algorithm as an example, please explain the role that color codes play in the process.…
A: Algorithm for Breadth First Search (BFS): It is a graph traversal method that begins at the root…
Q: If you say "web pages," please explain what you mean.
A: Web pages are a kind of hypertext document (a collection of text, images, audio, and video, among…
Q: Explain why IT's cost-performance ratio will grow by 100 but performance by 50.
A: Investment in the technology and innovation is fundamental for organisations today and is just one…
Q: What is the RMI remote interface's purpose? Conditions for using the interface
A: To be decided: What role does the remote interface play in the RMI implementation? What criteria…
Q: What variables might contribute to the spread of a virus over an organization's computer network?
A: One of the most well-known threats to computers and networks is the virus. A kind of malicious…
Q: The usage of symmetrical multiprocessing systems is increasing. It is necessary to describe three…
A: Systems using symmetric multiprocessing are increasingly and more common. List three advantages that…
Q: Time Converter 1. Write a program that converts dates from a numerical month-day format to…
A: the Algorithm of the code:- 1. Begin by initializing integer variables month, day, and year. 2.…
Q: et G= (V, E) be an arbitrary flow network with source s and sink t, and a positive integer capacity…
A: In graph theory, a flow network (also known as a transportation network) is a directed graph where…
Q: Think about the importance of wireless networks in today's emerging countries. In many places,…
A: GIVEN: Think about how crucial wireless networks are in today's developing nations. LANs and…
Q: Explain what orthogonal instruction sets are.
A: This inquiry provides information about an orthogonal instruction set. Having a comprehensive set of…
Q: What does it imply when systems are interdependent?
A: Introduction: The notion behind interdependencies is that IoT service providers should be aware of…
Q: Consider how an engineer in charge of producing a system requirements specification may keep track…
A: What the system will perform is described in the functional requirement. Examples of input and…
Q: C programming: I want to turn this code without the use of arrays... void myFunction(int…
A: Introduction Linked List: A linear data structure is a linked list. Every linked list consists of…
Q: End-user requirements must be considered by system analysts on a continual basis.
A: Introduction Analysts make outlines to help programmers and modelers in creating PC systems. PC…
Q: What distinguishes computer science from other academic disciplines? What is the exact order in…
A: The following is your response. Answer: Computer science is a field that includes: Computer science…
Q: Q2. ()Given the recurrence: f(n)=4f()+ √n nz2, F(1)=0 F(0)=1 Solve by Master theorem express…
A: Consider the general recurrence relation is of the following form: T(n)=aT(n/b)+θ(nklogpn) where n =…
Q: write a For loop that iterates through a list of products (any number of products) that are sold in…
A: a) Here is a for loop that iterates through a list of products and prints them: code- products =…
Q: Implement the following: 1) Define a class Course with three attributes title, term, and enrollment.…
A: The Python code is given below with output screenshot
Q: How may proponents of standardizing on a single programming language make their case?
A: We'll review the justifications for a single language for all areas. Single programming language for…
Q: Analyze the capabilities, technology, and management practices that distinguish WANs from LANs.…
A: WAN/LAN: WAN connects numerous LANs across the internet. WAN employs Internet Protocol and is fast.…
Q: s there a separation in the computer business between computer architecture and computer…
A: Computer architecture is a functional description of requirements and design implementation for the…
Q: State the principle of mathematical induction and prove by mathematical induction that for all…
A: The principle of mathematical induction is used in algebra and is used to prove a wide variety of…
Q: Describe the Assembly Registers and explain why they are important throughout the assembly process.
A: Assembly register: The processor that can work with numerical numbers uses the register in assembly.
Q: Mr. sk is new to salesforce and is attending LWC training to become a lightning web component…
A: Lightning web components rely on a reactive wire service to get Salesforce data. Use @wire in the…
Q: Discuss the possible threats that insiders pose to a company's security, as well as the incentives…
A: Insiders may refer to either workers or managers inside a firm. These individuals are employed by…
Q: I need help in constructing the function. Following are the given struct that can't be changed…
A: Structures: Structure is a client characterized datatype in C language which permits us to join…
Q: Your lecturers taught you stress and volume testing. Please use the right software testing tools.…
A: Introduction: Performance testing is a method of software testing used to evaluate a software…
Q: What is the minimum number of trainable parameters if perceptron nodes with hard thresholds are used…
A: Solution: Given, What is the minimum number of trainable parameters if perceptron nodes…
Q: Give an example of how an engineer in charge of generating a system requirements specification may…
A: Give an example of one way in which an engineer who is responsible for developing a system…
Q: Since end-to-end encryption is so complex, application proxies may have trouble decrypting it. A…
A: Dear Student, The answer to your question is given below -
Q: Why is it that adding a data object to a data model is not recommended?
A: A data model, often spelled "datamodel," is an abstract model that specifies how various pieces of…
Q: I was wondering if you could define "Debugging" for me.
A: Debugging: In computer programming and engineering, debugging involves recognizing a problem,…
Q: How well do you grasp the notion of concurrency control?
A: Concurrency Control The management process known as concurrency control is necessary for managing…
Q: 5-39. Write SQL commands for the following: a. Create two different forms of the INSERT command to…
A: The SQL queries are given in the below step with output screenshot
Code it
Utilizing the following functions headers: Main() Create a
Step by step
Solved in 2 steps with 1 images
- 1- Programming Problem Part 1 Write a function that will have a list as an input, the task of the function is to check if all the elements in the list are unique,( i.e. no repetition of any value has occurred in the list), then the function returns true otherwise it returns false. Your program should include a main method that call the method to test it. (If you would use built-in functions in Python, use lists’ or dictionaries’ methods as we studied their time efficiency in class)Algorithm Efficiency 1- Programming Problem Part 1 Write a function that will have a list as an input, the task of the function is to check if all the elements in the list are unique,( i.e. no repetition of any value has occurred in the list), then the function returns true otherwise it returns false. Your program should include a main method that call the method to test it. (If you would use built-in functions in Python, use lists’ or dictionaries’ methods as we studied their time efficiency in class) 2- Algorithm AnalysisFor the function you implemented in part 1, please calculate T(n), which represents the running time of your algorithm in terms of n. Where n is the length of the list. Then find the order of magnitude of your algorithm (Big O). 3- Algorithms Comparison Please find another algorithm that solves part 1, write the code, calculate T(n) and find Big O. Then compare the efficiency with the algorithm from part1 to determine the more efficient one.Yahtzee! Yahtzee is a dice game that uses five die. There are multiple scoring abilities with the highest being a Yahtzee where all five die are the same. You will simulate rolling five die 777 times while looking for a yahtzee. Program Specifications : Create a list that holds the values of your five die. Populate the list with five random numbers between 1 & 6, the values on a die. Create a function to see if all five values in the list are the same and IF they are, print the phrase "You rolled ##### and its a Yahtzee!" (note: ##### will be replaced with the values in the list) Create a loop that completes the process 777 times, simulating you rolling the 5 die 777 times, checking for Yahtzee, and printing the statement above when a Yahtzee is rolled. When you complete the project please upload your .py file to the Project 2 folder by the due date.
- Q1) Using Functions and Lists write a program where a function filterEvens takes a list of mix numbers and return it by filtering all the evens out. You can take list items from user or create static, and then passed it to function. The output should be the list with only evens example input_list = [12, 5, 7, 8, 2, 4, 1] output = [12, 8, 2, 4]. Please do in python. ThanksExercise, maxCylinderVolume F# system function such as min or methods in the list module such as List.map are not allowed Write a function maxCylinderVolume that takes a list of floating-point tuples that represent dimensions of a cylinder and returns the volume of the cylinder that has the largest volume. Each tuple has two floating point values that are both greater than zero. The first value is the radius r and the second value is the height h. The volume of the cylinder is computed using ??2h. The value π is represented in F# with System.Math.PI. If the list is empty, return 0.0. Examples: > maxCylinderVolume [(2.1, 3.4); (4.7, 2.8); (0.9, 6.1); (3.2, 5.4)];;val it : float = 194.3137888> maxCylinderVolume [(0.33, 0.66)];;val it : float = 0.2257988304Q1:Write a function that returns a new list by eliminating theduplicate values in the list. Use the following function header:def eliminateDuplicates(lst):Write a test program that reads in a list of integers, invokes the function,and displays the result. Here is the sample run of the program Enter ten numbers: 2 3 2 1 6 3 4 5 2The distinct numbers are: 1 2 3 6 4 5 Q2:Write a program that reads in your Q1 Pythonsource code file and counts the occurrence of each keyword in the file.Your program should prompt the user to enter the Python source code filename. This is the Q1: code: def eliminateDuplictes(lst):newlist = [] search = set() for i in lst: if i not in search: newlist.append(i) search.add(i) return newlist a=[] n= int(input("Enter the Size of the list:")) for x in range(n):item=input("\nEnter element " + str(x+1) + ":") a.append(item) result = eliminateDuplictes(a) print('\nThe distinct numbers are: ',"%s" % (' '.join(result)))
- Matrix Multiplication by a Scalar Please write a function calculate (matrix, scalar) that takes two arguments: a nested list that represents a matrix and an integer that represents a scalar. The function returns a nested list that corresponds to the result of matrix multiplication by a scalar. Your function should work with the following code: if __name__ == '__main__': scalar 3 A = [[1,0,0], [0,1,0], [0,0,1]] D calculate (A, scalar) assert D == [[3,0,0], [0,3,0], [0,0,3]] Save your function and the main code in a file called matrix.py and upload it here.Count dominators def count_dominators(items): An element of items is said to be a dominator if every element to its right (not just the one element that is immediately to its right) is strictly smaller than it. By this definition, the last item of the list is automatically a dominator. This function should count how many elements in items are dominators, and return that count. For example, dominators of [42, 7, 12, 9, 13, 5] would be the elements 42, 13 and 5. Before starting to write code for this function, you should consult the parable of "Shlemiel the painter" and think how this seemingly silly tale from a simpler time relates to today's computational problems performed on lists, strings and other sequences. This problem will be the first of many that you will encounter during and after this course to illustrate the important principle of using only one loop to achieve in a tiny fraction of time the same end result that Shlemiel achieves with two nested loops. Your workload…Create a soda beverage shopping cart program using C++ implementing the following: Linked List - this will be used as the user's cart. This is where the items that the user will purchased are stored here before checking them out. Array - use arrays to store user's stored products. Pointers Functions - Make sure that the rogram will have user-defined functions (e.g.: function for adding nodes, function for displaying the cart, etc.) The program must have a menu where the user can select an action (e.g. Select product, View cart, Check out, etc.) Soda options: Coca-Cola, Pepsi, Sprite, Royal, Mountain Dew Tabular Format: In the table, you must include the code for each soda options, their price and quantity The program must look like this: Hi! Welcome to ABC GoDrink! Here are the drinks that we offer: CODE PRODUCT SRP a Coca-Cola 24.99 b Pepsi 22.99 c Royal 24.99 d Sprite 24.99 e Mountain Dew 22.99 Menu Select a product. View My Cart and Proceed to Check-Out…
- Create a soda beverage shopping cart program using C++ implementing the following: Linked List - this will be used as the user's cart. This is where the items that the user will purchased are stored here before checking them out. Array - use arrays to store user's stored products. Pointers Functions - Make sure that the rogram will have user-defined functions (e.g.: function for adding nodes, function for displaying the cart, etc.) The program must have a menu where the user can select an action (e.g. Select product, View cart, Check out, etc.) Soda options: Coca-Cola, Pepsi, Sprite, Royal, Mountain Dew Must implement Developer name before the program exits. Please show the entire code and final output.IN PYTHON: DO NOT USE ENUMERATE OR NUMPY Write the following function that returns the location of the largest element in a two-dimensional list: def locateLargest(a): The return value is a one-dimensional list that contains two elements. These two elements indicate the row and column indexes of the largest element in the two-dimensional list. Write a test program that prompts the user to enter a two dimensional list and displays the location of the largest element in the list. Sample Run: Enter the number of rows in the list: 3 Enter a row: 20.6 40 1 4 Enter a row: 5.5 3 42 4.5 Enter a row: 46 32 4.4 12.1 The loacation of the largest element is at (0,2)PYTHON CS1 PROBLEM Define a function that takes a list of lists, glol, as a parameter. You may assume that the inner lists in glol are lists of positive integers. Your function should return True if at least one of the inner lists in glol contains two or more multiples of 10. Otherwise it should return False. For example: If glol = [ ] then your function returns False. If glol = [[ ], [4, 2]] then your function returns False. If glol = [[10, 2, 6, 8], [12, 6], [15, 20, 5]] then your function returns False. If glol = [[10, 2, 6], [12, 6], [10, 2, 70, 15], [15, 10, 5]] then your function returns True as the inner list [10, 2, 70, 15] contains 10 and 70. If glol = [[10, 2, 6], [12, 6], [10, 7, 15], [50, 10, 50, 4, 6]] then your function returns True as the inner list [50, 10, 50, 4, 6] contains 50 twice. 6. If glol = [[10, 20, 6, 90], [12, 6], [ 7, 3, 15], [50, 10, 50, 4, 7]] then your function returns True as the inner lists [50, 10, 50, 4, 7] and [10, 20, 6, 90] contain more…