In C++, create a Golf Game. Allow for as many players. Prompt for the player names. Each player plays 18 holes. Use an array for each player to hold their scores for each hole. A player has a handicap of [1-6] A player with a handicap of 0 receives no free strokes on any hole. Assume a player takes 4 strokes on a par 4. The total stroke count is 4. Their score to par is 4-4 = 0. She Thus awarded 2 points. Print out the players names, number of strokes for each hole and the number of free strokes awarded.
Q: Assume that there is a constant roundtrip delay between the sender and the recipient, and that the…
A: Introduction: Timers are essential for the protocol.In this case, the total delay caused by the…
Q: The tiers of Flynn's taxonomy should be increased by one, in our opinion. To what extent are more…
A: Introduction: Two things contribute to Flynn's taxonomy's popularity. This includes: Number of…
Q: Data bus is bidirectional. Select one: O True O False
A: Data bus:- A data bus is a system of wires, cables, or other connections that carries data between…
Q: Establishing the firewall's role in ensuring the security of the network is a prerequisite to going…
A: Given:It's crucial to comprehend how firewalls operate to safeguard and secure networks. To…
Q: Consider the scenario when system calls are unavailable but the system still functions properly. Is…
A: Given: OS real-time: This kind of operating system is used when a computer must receive and process…
Q: So, how does the TPC's emphasis differ from that of the SPEC?
A: Introduction The Transaction Procession Council (TPC) replicates a complete compute cluster in which…
Q: How come our rdt protocols required the use of timers?
A: Introduction: In order to ensure that data is transmitted securely, sequence numbers indicate to the…
Q: Understanding the system's authentication and access methods is crucial for reasons of data safety.
A: System authentication: Login: Access control regulates who or what can view or use computer…
Q: The meaning of a file extension must be kept distinct from its visual representation in a file.
A: Introduction: Document file extension purpose must be discussed. The machine should have different…
Q: To better understand what a real-time operating system is, it would be helpful to hear an…
A: REAL TIME OPERATING : An operating system (OS) that ensures real-time applications have a given…
Q: In Network/OS-only contexts, "risk" has a special meaning. Could you provide any concrete instances…
A: Introduction: An operating system designed specifically for a network device, such as a switch,…
Q: You are given the following class definition for an array-based List ADT: public abstract class List…
A: The correct answer for the above mentioned question is given in the following steps for your…
Q: What is holding back the widespread use of virtual memory in embedded systems?
A: There is no virtual memory in embedded devices. Virtual memory is a memory management strategy that…
Q: time slots. What is the maximum number of users that can be sup
A: The answer is
Q: differences between Information Security and Cybersecurity
A: According to the question, the difference between Information Security and Cybersecurity is…
Q: Is there any specific reason why a microkernel must always be part of an OS? This strategy is quite…
A: Answer: We need to write the what is the main reason for the microkernel is part of the operating…
Q: The two most crucial features of an OS should presumably be discussed her
A: Introduction Operating System An OS is an item that goes probably as a point of interaction between…
Q: Can you explain what is meant by the word "virtualization" in the context of cloud computing?
A: Introduction: The presented question requests an example of the cloud virtualization…
Q: Problem 4: For each degree sequence below, determine whether there is a graph with 5 vertices that…
A: Graph: Graph is a non-linear data structure. It consists of vertices and edges. A graph can be…
Q: What is the distinction between integrity and authorization when it comes to security?
A: Introduction: In point of fact, your question concerns integrity constraints as well as…
Q: In case of a security breach, how will information within your company be communicated to the…
A: provided – What are the company's protocols for disclosing the information in the case of a data…
Q: Is dependable data delivery possible with UDP in an application? How would you go about doing that,…
A: In the OSI (Open System Interconnection) reference model, UDP (User Datagram Protocol) is a…
Q: Write an R program that reads the text file into a data frame. Using that data frame, print the…
A: R which offers a wide variety of statistics-related libraries and also it provides a favorable…
Q: True or False 15. The encryption structure for OCB is similar to that of ECB Multiple choice 4. A…
A: OCB and ECB encryptions are the AES encryption methods used to encrypt the messages with symmetric…
Q: While assisting a coworker whose network connection is failing, you discover the machine is trying…
A: Introduction Domain Name System: A occur mainly naming system for all resources linked to the…
Q: What would be the significance if someone found a polynomial time algorithm for the vertex cover…
A: Dear Student, The answer to your question is given below -
Q: Defend the function of each file extension. Give the name of the software that created the files and…
A: INTRODUCTION: The term "file extension," often referred to as "filename extension," refers to the…
Q: What precisely is meant by the phrase "RAID structure" when referring to an operating system? What…
A: Introduction: Redundant Arrays of Independent Drives, or RAID, is a technique for improving speed,…
Q: Compare and contrast the top-down and bottom-up methods of securing information, and explain why one…
A: Top-down strategy: The top-down technique involves breaking down a system into smaller units in…
Q: To manage and troubleshoot the network, you can choose from a wide variety of well-known and…
A: INTRODUCTION: To fix this issue, one must first identify its root cause and the OSI layer…
Q: The two most crucial features of an OS should presumably be discussed here.
A: The answer is given in the below step
Q: To whom does the theory behind software engineering fail to cater? explain?
A: Introduction: Let's define software engineering. Software engineering combines software with…
Q: Could you please explain what you mean by "complete security"?
A: CONCLUSION: For this reason, we went through every single issue. Given a ciphertext, the likelihood…
Q: What are the key differences between Web Services and SOA?
A: Web services are designed to support interoperable interaction between machines over a network. SOA…
Q: If possible, detail exactly how a failed system could compromise the security of the network and…
A: Solution: Risks to computer security: It may be characterized as an action that can harm computer…
Q: Why did people come up with the idea of a RISC architecture?
A: The Reduced Instruction Set Architecture (RISC) is a kind of computer architecture that offers a…
Q: The following are two seprate formulas. is there a way to do the conversion from 2 KB to 2 ^ 11…
A: 1kb= 1024 bytes = 2^10 bytes 2kb = 2*1024 bytes = 2048 bytes = 2^11 bytes
Q: Write an assembly language program to get the 2's complement of a 32-byte array starting at address…
A: Below is the 8086 code for 2's complement:
Q: The telephone network, the oldest and most well-known (wired) communication network in the world,…
A: Introduction: Circuit switching is a telecommunications networking technology. Before two network…
Q: It's not asking about the c code, but the code generated from the C code in assembly
A: Solution: Given, static int NOINLINE function2(int *values, int valuesLen) { int i; int…
Q: True or untrue, and please include a short explanation for your choice: When both the sender's and…
A: To explain: SR: It is a selective repeat protocol that is used in the OSI model's data link layer to…
Q: Implement in masm x86 assembly and show screen shots Implement the following expression in…
A: Solution: Given, result = (val3 + val4) - (val1 – val2) – (30*4)/55
Q: To what extent are more advanced computers different from their more basic counterparts?
A: Introduction : Advanced computers are those that are more powerful, faster, and better equipped than…
Q: 18. Let A = {a₁, ..., an}, B = {b₁, ..., bn}, and C = {C₁, ..., Cn} sets and let f: Ax B C be a…
A: Explanation: This algorithm checks if a given function f is surjective or not. The algorithm begins…
Q: Create the state diagram of a predictable Turing machine that can understand the language displayed…
A:
Q: Create a scenario in which you are in charge of user logins. Keep track of the various means by…
A: Scenario management helps handle several futures and generate situation-specific scenarios. Scenario…
Q: Could you elaborate on the significance of the OS's various parts? In other words:
A: Introduction: The components of an operating system are necessary for the correct operation of many…
Q: Lab 2-2: Matrix Multiplication Input A B i j Output elem function [elem] Type NxN double NXN double…
A: Below I have provided a program for the given question. Also, I have attached a screenshot of the…
Q: The use of watchdog timers is crucial for many embedded systems because of the following reasons.
A: Watchdog timers are crucial in embedded systems. The watchdog timer (WDT), which is a part of the…
Q: Design a payroll program that prompts the user to enter an employee’s hourly pay rate and the number…
A: Here is the approach : Create four files first to get the hourly rate then to take the hours worked…
In C++, create a Golf Game. Allow for as many players. Prompt for the player names. Each player plays 18 holes. Use an array for each player to hold their scores for each hole. A player has a handicap of [1-6]
A player with a handicap of 0 receives no free strokes on any hole. Assume a player takes 4 strokes on a par 4. The total stroke count is 4. Their score to par is 4-4 = 0. She Thus awarded 2 points.
Print out the players names, number of strokes for each hole and the number of free strokes awarded.
Step by step
Solved in 2 steps
- Each of two players rolls a dice and whoever rolls the highest number (between 1 and 6 inclusive) gets 4 points, and if it is a draw, both players get 2 points. The player with the highest number of points after 10 rounds of the game is the winner (or the game could be drawn). The following arrays contain the results of dice rolls of each of two players in 10 consecutive rounds of the game.player1=[3, 2, 5, 6, 2, 5, 1, 6, 4, 5]player2=[4, 2, 4, 3, 6, 5, 3, 2, 4, 1] Write a MATLAB program that computes the running total points of each player and displays one of the following messages (whichever applies) after each round n for n = 1, 2, . . . , 10:Player 1 is leadingPlayer 2 is leadingIt is a tie [Hint: You should use an if construct.]Also, at the end of your program, use the find command to identify (and display) the rounds in which dice rolls were the same for the two players, and use the length command to compute (and display) the number of such rounds. Include appropriate headings in…In C++Monkey Business A local zoo wants to keep track of how many pounds of food each of its three monkeys eats each day during a typical week. Write a program that stores this information in a two-dimensional 3 × 5 array, where each row represents a different monkey, and each column represents a different day of the week. The program should first have the user input the data for each monkey. Then, it should create a report that includes the following information: Average amount of food eaten per day by the whole family of monkeys. The least amount of food eaten during the week by any one monkey. The greatest amount of food eaten during the week by any one monkey. Write functions: average() least() greatest() main()JAVA Your teacher has created two arrays, each holding the results of tests, say Test 1 and Test 2. You need to create a new array which holds the averages of these two tests. You may assume that the first element of the first test array refers to the student who also has the grade in the first element of the second test, and the last element in each array are the grades the last student earned for each test. All students received grades for both tests, meaning both test arrays are of the same length. Complete the method, named makeAverage, in the class named Grades.java. There are two parameters to this method: the first is the integer array representing the grades of the first test, and the second is the array containing the grades of the second test. The new average array should be returned by the method. The grades should be treated as double variables. For example, consider the test grades for the five students in the following arrays: [ 87 ] [ 91 ] [ 76 ] [ 76 ] [ 94 ]…
- In C++ Programming Lanaguage write a program that simulates the rolling of two dice. The sum of the two values should then be calculated. Your program should roll the two dice 36,000,000 times. Use a one-dimensional array to tally the numbers of times each possible sum appears and print it. Also, determine if the totals are reasonable (i.e., there are six ways to roll a 7, so approximately one-sixth of all the rolls should be 7). [Hint: what is the minimum and maximum sum obtained when you roll a die? Some sums are more frequent than the others.]Need help coding in Java Write an application that stores at least five different college courses (such as CIS101), the time it first meets in the week (such as Mon 9 am), and the instructor (such as Johnson) in a two-dimensional array. Allow the user to enter a course name and display the corresponding time and instructor. If the course exists twice, display details for both sessions. If the course does not exist, display Invalid Entry: No Such course. Use the following values: Course Time Instructor CIS101 Mon 9 am Farrell CIS210 Mon 11 am Patel MKT100 Tues 8:30 am Wong ACC150 Tues 6 pm Deitrich CIS101 Fri 1 pm LennonLotto Program C++Write a program that simulates the Powerball lottery. In Powerball, a ticket is comprised of 5 numbers between 1 and 69 that must be unique, and a Powerball number between 1 and 26. The Powerball does not have to be unique. Hint: You can use an array to represent the 5 unique numbers between 1 and 69, and an integer variable to represent the powerball. The program asks the player if they'd like to select numbers or do a 'quickpick', where the numbers are randomly generated for them. If they opt to select numbers, prompt them to type the numbers in and validate that they are unique (except the powerball), and in the correct range. The program then generates a 'drawing' of 5 unique numbers and a Powerball, and checks it against the user's lotto ticket. It assigns winnings accordingly. Because it is so rare to win the lottery, I suggest hard coding or printing values to when testing the part of the program that assigns winnings.
- JAVA Create an application that contains an enumeration (enum) that represents the days of the week. Display a list of the days, then prompt the user for a day. Display business hours for the chosen day. Create your own business hours stored in an array; however, every day of the week should have different hours. Although companies do not normally have different business hours every day of the week, programming your code with this difference will help in finding and fixing coding errors.C# Write a program called DeliveryCharges for the package delivery service in Exercise 4. The program should again use an array that holds the 10 zip codes of areas to which the company makes deliveries. (Note that this array has been created for your and does not need to be changed.) A parallel array has also been created containing 10 delivery charges that differ for each zip code. Prompt a user to enter a zip code, and then display either a message indicating the price of delivery to that zip code or a message indicating that the company does not deliver to the requested zip code. For example, if the zip code is in the delivery area, such as 90210, output Delivery to 90210 ok. Delivery charge is $10.00. If the zip code is not in the delivery area, such as 85205, output Sorry - no delivery to 85205. In order to prepend the $ to currency values, the program will need to use the CultureInfo.GetCultureInfo method. In order to do this, include the statement using System.Globalization; at…You are given the following two dimensional arrays of people and their birth months: String [][] people = {{June, May, March, June, May, March, February, June, May, January, May, March}, {John, Mary, Peter, Bob, Sam, Dan, Judith, Gary, Tiff, Suzy, Jim, Jane}} Create an enum type for the the first six months of the year Randomly select a month from this enum
- IN C++ Write a method that lets you insert a number anywhere in an array that is already full. For instance, if you have an array of size 5: 3,6,1,2,0. You should be able to insert the number 9 in some desired/specified position. E.g 3,6,1,9,2,0.in C#, Visual Basic Write an app for Boston Airlines that allows a customer to reserve a seat on the airline’s only plane (capacity: 10 seats). Radio buttons should allow the choice between First Class and Economy. The app should then assign a seat in the first-class section (seats 1–5) or the economy section (seats 6–10). Use a one-dimensional array of type bool to represent the seating chart of the plane. Initialize all the elements of the array to false to indicate that all the seats are empty. As each seat is assigned, set the corresponding element of the array to true to indicate that the seat is no longer available. Your app should never assign a seat that has already been assigned. When the economy section is full, your app should ask the person if it is acceptable to be placed in the first-class section (and vice versa). If yes, make the appropriate seat assignment. If no, display the message “Next flight leaves in 3 hours."1. Create a struct called Booking that consists of a 3 digit flight number (e.g. 234), type of seat (E or B), the priceof a seat in economic class and the number of seats booked.Declare an array to store at least 30 Booking structs. 2. The user must be able to enter the information for a number of bookings from the keyboard. Ask whether abooking must be made (Y or N). If a booking must be made, a random 3 digit flight number must be generated.The user must be asked to enter the type of seat, the price per seat and the number of seats to book.Example of input: