Q6:FIND SUMMATION FOR ODD NEGATIVE AND SUMMATION FOR EVEN NEGATIVE (APPEAR ODD N. & EVEN P. NUMBER IN LIST 1 & LIST2) APPEAR SUM1 IN TEXT1,SUM2 IN TEXT 2,FIND MAX BETWEEN THEM USING IF STATEMENT APPEAR MAX IN COMBOBOX AFTER THAT FIND FACTORIAL FOR MAX APPEAR FACT. IN MASSAGE BOX NOTE APPEAR WORDS AND VALUE (ODD NEGATIVE IN LIST1,EVEN POSITIVE IN LIST2, SUM1 IN TEXT1,SUM2 IN TEXT 2, MAX IN COMBO FACT IN MASSAGE)
Q: Design DFA for the following over {a,b} (i) All strings containing not more than three a's.
A: Given: (i)L= All strings containing not more than three a's over {a,b} Logic to Build DFA for L: -si...
Q: What is the level of node 17, and node 11, respectively? Insert integers 11, 22, 15, 44, 6, 9, 3, 3...
A: Basically we know that BST is defined as the Binary Search Tree. This BST concept is mainly handled ...
Q: What is the binary encoding of the following RISC-V assembly instruction? Please write your answer a...
A:
Q: 2. Write an Algorithm and draw a flow chart based on the following, Calculate the area of circle and...
A: The algorithm is a sequence of a finite number of steps to perform a specific task. An algorithm is ...
Q: What is the difference between Amazon Web Services and an enterprise system?
A: What is the difference between Amazon Web Services and an enterprise system?
Q: 1. Consider a Boolean Algebra (1) a) Show that i. X.y + x'.z + yz = x.y + x'.z (a + b)'(a' + b)' = ...
A: As per our guidelines we are supposed to answer only one question. Kindly repost other questions as ...
Q: Python) Given the code that reads a list of integers, complete the number_guess() function, which sh...
A: import random def number_guess(i): num= random.randint(1,100) if i< num: printf(i, ...
Q: peed dt 0.5 acceleration dt*2 ca
A:
Q: What are Solaris and AIX operating systems? Are they available with AWS?
A: AIX is an open operating system which is owned by IBM. Solaris is a proprietary operating system whi...
Q: Describe what makes a mobile app special.
A: There are so many features that make an app special.
Q: 2. Determine the C, Z, V, S, N flags of the status after the following instructions: 1) LDI R18, 25 ...
A: Dear Student, LDI is used to store a 8-bit constant in registers starting from 16 up to 31 it does n...
Q: Create a procedure for validating the software Encase is working correctly and that the hardware wri...
A: I have answered this question in step 2.
Q: What is the code for SI/DH?
A: The question is what is the code for SI/DH?
Q: You've recently installed a new programme, but users are unable to access it remotely. Which feature...
A: Introduction: A remote application is a type of application distribution system in which the applica...
Q: What is the definition of a local variable?
A: Solution - In the given question we have to define local variables.
Q: What is the next step in deploying the GPO that has been created?
A: GPO stands for group policy object As the name suggest is the group of policies which are in the fo...
Q: Which instruction compares two floating-point numbers before the P6 family?
A: In processors prior to the P6 family FCOM, or FCOMP instruction compares two floating-point values.
Q: 1.) Consider the following series of address references, given as byte addresses: 4. 16, 32, 20, 80,...
A: Direct mapped don't use LRU ,while fully and set associative use LRU for page replacement.
Q: Write a Java program to display the three highest monthly speeding fines recorded for four different...
A: Algorithm: Start Store the given speeds in 2d array named speeds Store cities names in 1d cities ar...
Q: Computer Science code in c++ please .Do NOT use ANY string/character manipulation or arithmeti...
A: Given The answer is given below.
Q: Imagine two teams are playing football and the scores are tied after 120 minutes of play. Now the wi...
A: Code: teamA=0teamB=0p=0for i in range(1,6): if(teamA==3 and teamB==0): print("Team 1 wins ...
Q: What influence does data mining have on personal security and privacy?
A: Introduction: Data extraction from data sets can be done using privacy-protected data mining (PPDM) ...
Q: Explain how programmable real-time graphics have evolved throughout time.
A: Introduction: The ability to handle interrupts is one feature that distinguishes real-time systems f...
Q: How many different numbers can be represented with 16 bits? What is the largest unsigned 32-bit bina...
A: Answer:- 65,536 A 16-bit integer can store 216 or 65,536 distinct values. In an unsigned representa...
Q: What does "Microsoft One Drive" signify in cloud storage?
A: Defined "Microsoft One Drive" signify in cloud storage
Q: Discuss the harmful effects of computers and electronic devices on users and suggest possible soluti...
A: answer is
Q: Suppose you were designing a file of student records for your university’s placement office. One of ...
A: This student record management project can be implemented using basic knowledge of Linked List activ...
Q: Implement THREE (3) Sample Codes in Haskel and Scala. a) Compare and Contrast the Syntax and Sem...
A: SUMMARY: - Hence, we discussed all the points.
Q: SEMBLY KEIL SOFTWARE: Take 6 and add into a register. Then compare that number to 20 and output the ...
A: Lets see the solution.
Q: Project 1: Caesar Cipher Assignment Overview In this assignment, we are going to implement a simple ...
A: Given The answer is given below.
Q: 3. In the following indicate all Write Before Write hazards. Circle the offending registers and conn...
A: Indicate all Write Before write hazard.Circle the offending registers and connect them with a line.A...
Q: You observe five distinct wireless networks accessible when trying to connect to your company's wire...
A: Introduction: Wireless network: It is a network that allows computers and other network-enabled devi...
Q: a) Explain the purpose of using loops, what are the types of loops in C++, write down their syntax, ...
A: INTRODUCTION: With the aid of various examples, we will learn how to utilize while and do...while lo...
Q: mplement a static generic method named problem4_1s Decreasing thá eneric list and returns true if it...
A: In this question, we are asked to write a generic program that checks whether a list is in descendin...
Q: Question 6 (see above) Which of the following are equivalent to the statement "No librarians have ch...
A: Here is the explanation about the statements:
Q: Show that the language {ambn| m ≠ n} is context-free.
A: Context free grammar is a formal grammar which is used to generate all possible strings in a given f...
Q: Create a mind map with the word Information Technology as the center
A: The figure of mind map is given in second step.
Q: What to consider to design interfaces for different environments? please help me to write 1 to 2 pa...
A: INTRODUCTION: An interface is a programming framework or syntax that allows a computer to impose sp...
Q: Q-2 Find the Complexity of the following Algorithm. 1. Initialize sum to 0. 2. Initialize index vari...
A: Complexity of algorithm is a measure of the amount of time and space required by an algorithm for an...
Q: What is the purpose of a Sprint demo or review? Why is it important for a team to hold a retrospect...
A: Introduction: Since you have asked multiple questions only first three will be answered.
Q: In CORAL LANGUAGE please and thank you! Summary: Given integer values for red, green, and blue, sub...
A: integer r integer b integer g integer min r = Get next inputb = Get next inputg = Get next inputmin...
Q: Discuss physical security, the key physical security risks, and how they emerge in organisational at...
A: Introduction: Physical security addresses the design, perpetration, and conservation of countermeasu...
Q: What is the best course of action for dealing with a Denial of Service attack based on the iPremier ...
A: Introduction: Denial of Service -DoS assaults is on the rise, posing severe threats to cyber securit...
Q: What argument values are necessary when calling Function 716Ch to read a binary array from a file th...
A: Introduction: This function reads binary data from a file and returns it as data. The format of the...
Q: et G: (0,1)" (0,1)"+l be defined as follows: (X1. ....x,) = (X, x, OX2, X OX2 O X3,X x2 ... x, X). P...
A:
Q: Exercise 1.13 Convert the following unsigned binary numbers to decimal. Show your work. (a) 1010, (b...
A:
Q: The two types of memory chips, RAM and ROM, are both made with information already stored in them wh...
A: Answer: False
Q: Analyze the following business scenario and create an ERD. For each entity Identified, indicate the ...
A: Explanation. The Employee entity consists of Emp_No as primary key and Dept_No as foreign key. Emplo...
Q: After calling an MS-DOS I/O function, which flag tells you that something went wrong?
A: Introduction: Most of the early versions of the Microsoft Windows operating system were nothing more...
Q: Systems Development
A: Given :- The statements related to Information Technology & software development life cycle is m...
Max Function
Statistical function is of many categories. One of them is a MAX function. The MAX function returns the largest value from the list of arguments passed to it. MAX function always ignores the empty cells when performing the calculation.
Power Function
A power function is a type of single-term function. Its definition states that it is a variable containing a base value raised to a constant value acting as an exponent. This variable may also have a coefficient. For instance, the area of a circle can be given as:
Step by step
Solved in 2 steps with 1 images
- Q5: WRITE THE FACTORIAL FOR EVEN POSITIVE FORN NUMBER ,PUT YOUR RESULT IN MASSAGE BOX Q6:FIND SUMMATION FOR ODD NEGATIVE AND SUMMATION FOR EVEN NEGATIVE (APPEAR ODD N. & EVEN P. NUMBER IN LIST 1 & LIST2) APPEAR SUM1 IN TEXT1,SUM2 IN TEXT 2,FIND MAX BETWEEN THEM USING IF STATEMENT APPEAR MAX IN COMBOBOX AFTER THAT FIND FACTORIAL FOR MAX APPEAR FACT. IN MASSAGE BOX NOTE APPEAR WORDS AND VALUE (ODD NEGATIVE IN LIST1,EVEN POSITIVE IN LIST2, SUM1 IN TEXT1,SUM2 IN TEXT 2, MAX IN COMBO FACT IN MASSAGE) Q7:USING CHECK BOX TO SEPARATED BETWEEN FACTORIAL (POSITIVE &NEGATIVE) NUMBER FOR 20 ELEMENTS Q8:WRITE A PROGRAM TO CALCULATE THE AVERAGE FOR 30 STUDENTS EVERY STUDENT (8 OBJECT) FOR 4 GROUP AND SHOW WHICH DEPARTMENT THE STUDENT BELONGS TO ( YOU HAVE 5 DEPT.)Birthday party At Lili's birthday party, there was a game arranged by Jojo as the host. That game is to distribute Y number of candy to X number of people where all the candy tastes sweet except for one last candy which tasted like rotten nuts. Candy distribution will be sequentially starting from position Z and if past the last position then the distribution of candy continues to the first position. Write down the person in which position will get the last candy. Input FormatThe first line of input is T, which is the number of test cases.The second row and the next number of T rows are X, Y, Z.X is the number of people to whom the candy will be distributed.Y is the number of candy available.Z is the starting position of the person to whom the candy will be distributed. Output FormatA string “Case #N: “ and a number representing the position of the person who got the last candy. Constraints? ≤ ? ≤ ???? ≤ ?, ? ≤ ???? ≤ ? ≤ X Sample Input 43 4 13 5 24 2 24 5 2 Sample OutputCase #1: 1Case…Regular Expression The set of strings where the number of B is a multiple of 3 (and there can be any number of A).
- Birthday party At Lili's birthday party, there was a game arranged by Jojo as the host. That game is to distribute Y number of candy to X number of people where all the candy tastes sweet except for one last candy which tasted like rotten nuts. Candy distribution will be sequentially starting from position Z and if past the last position then the distribution of candy continues to the first position. Write down the person in which position will get the last candy. Input FormatThe first line of input is T, which is the number of test cases.The second row and the next number of T rows are X, Y, Z.X is the number of people to whom the candy will be distributed.Y is the number of candy available.Z is the starting position of the person to whom the candy will be distributed. Output FormatA string “Case #N: “ and a number representing the position of the person who got the last candy. Constraints1 ≤ T ≤ 1001 ≤ X, Y ≤ 1031 ≤ Z ≤ X Sample Input 43 4 13 5 24 2 24 5 2 Sample OutputCase #1: 1Case…Detail code only else downvoted. section grouping is a string containing just characters "(" and ")". A standard section succession is a section arrangement that can be changed into a right math articulation by embedding characters "1" and "+" between the first characters of the grouping. For instance, section successions "()()" and "(())" are standard (the subsequent articulations are: "(1)+(1)" and "((1+1)+1)"), and ")(", "(" and ")" are not. You are given an integer n. You will likely develop and print precisely n diverse customary section arrangements of length 2n. Input :The primary line contains one integer t (1≤t≤50) — the number of experiments. Each experiment comprises of one line containing one integer n (1≤n≤50). Output :For each experiment, print n lines, each containing an ordinary section grouping of length precisely 2n. All section groupings you output for a testcase ought to appear as something else (however they might rehash in various experiments). In case there…Computer Science Question LabThere is only one list of N ingredients in the menu. Every ingredient has its beauty value that does not depend on its taste, but on the way it looks, which is expressed as a positive integer. To order a dish, the customer asks Ramsay to use all the ingredients from L to R (L is strictly less than R). Ramsay knows that the dish will be tasty and not only beautiful if the sum of its ingredients' beauty values is divisible by K. Ramsay does not want to use all the ingredients, so he always excludes one of them. Which one? - The least beautiful one! (in other words - which has the minimal beauty value). Now he wonders - how many segments (L,R) are there such that the sum of their beauty values will be divisible by K after excluding the least beautiful ingredient. Your assignment is to develop a python code that prints the answer for the problem. Sample test case are given below:Input:3 51 2 30utput:1
- Q12: Draw a complete DFA that corresponds to the following regular expression: ((aa|bb|ab|ba)*)(c?)Which of these methods of class String is used to check whether a substring exists at the beginning of the particular string? a) StartsWith() b) EndsWith() c) Starts() d) ends()Write a regular expression that matches the day of year such as "1-1-2018" or "7/4/1776". Dates like "9-31-1955", "3/29-2018", and"5-28/1956" should not be matched. You do not have to worry about leap years (i.e. assume February has 28 days every time). Edit View Insert Format Tools Table 12pt v Paragraph v A To 田 画 D O words
- 4- Sell a book. Ask the user to enter the ISBN of the book he wants to buy, search for books by ISBN. If the book is found in the list and the number of copies is greater than zero then decrease the number of copies for that book by one.Celebrity problem A celebrity among a group of n people is a person who knows nobody but is known by everybody else. The task is to identify a celebrity by only asking questions to people of the form: ”Do you know him/her?” Solution Select two people from the group given, say, A and B, and ask A whether A knows B. If A knows B, remove A from the remaining people who can be a celebrity; if A doesn’t know B, remove B from this group. Solve the problem recursively for the remaining group of people who can be a celebrity Which design strategy does the following solution use? A-)Decrease-by-a-constant factor algorithm B-)Variable-size-decrease algorithm C-)Decrease-by-a-constant algorithm D-)Divide-and-Conquer3. Randomly generate a number in range [1, 12]. Map this number to a season: if the number is 3, 4, or 5, map it to “Spring", if the number is 6, 7, or 8, map it to "Summer", if the number is 9, 10, or 11, map it to "Fall", and if the number 12, 1, or 2, map it to "Winter". Display season name