The code needs to be done in Coral please A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours. Ex: If the input is 100, the output is: After 6 hours: 50.0 mg After 12 hours: 25.0 mg After 18 hours: 12.5 mg
Q: What type of elements can be saved in the following array? int[] name = new int[10]; Select one: a.…
A: The correct option is option c. Integer
Q: Following this break, we will talk at detail about application layer protocols and network…
A: Network applications: As network functions become virtualized and network control becomes…
Q: Make sure you know the difference between random access memory (RAM) and dynamic random access…
A: Answer:
Q: arable computing, including the Apple Watch and Android Wear, and provide your thoughts on how it…
A: We are acquainting clothing as a way with consider new aspects in the teaching construction of the…
Q: Find and describe five topics or subjects that are concerned with internet governance, including the…
A:
Q: An assault with a poison package is what we refer to as Make a point to provide two examples of this…
A: ARP Poisoning (also known as ARP Spoofing) is a kind of LAN-based cyber attack that involves sending…
Q: Describe the many elements that make up a back-up plan. How are backup strategies for mobile devices…
A: Introduction: Information is obliterated, lost, or adulterated eventually in time. Subsequently, in…
Q: What are some of the most significant benefits and drawbacks associated with storing data on the…
A: Please find the answer below:
Q: It's important to tell users how they can defend themselves against session hijacking attacks.…
A: Hijacking a session: Hijacking a user's session is exactly what it sounds like. An attacker may…
Q: How has the internet changed the way systems are built?
A: Encryption: The Internet has had a significant impact on corporate sectors, businesses, and…
Q: To keep your computer safe from power surges, what can you do to guarantee that it is protected from…
A: A surge protector is the most effective technique to safeguard your computer from a power surge. A…
Q: Explain Automation Migration Strategy (include sketch) with suitable industrial example of how to…
A:
Q: Write out a list of all the components of a quantum computer and explain how they all work together…
A: Introduction: Essential cloud storage is a distributed computing technique in which data is stored…
Q: What are the benefits of utilising IPSec rather than alternative network security solutions, such as…
A: Find the required answer given as below :
Q: The following statement save the value in which row of the 2 dimensional array names as "score"?…
A: Answer in step 2
Q: Show that you can articulate the requirements of users and assess how effectively a design meets…
A: The success of the system depends on how well it meets the needs of the users. User interaction…
Q: For dynamic contexts, adaptive software systems will be developed. As a result, through a protocol…
A: According to the information given:- We have to define for dynamic contexts, adaptive software…
Q: Provide a comprehensive breakdown of the restricted access protocol.
A: Controlled Access Protocol (CAP) is a protocol for controlling access to a Both departments review…
Q: When comparing a quantum computer to an ordinary computer, what are the key differences? What are…
A: Definition: We are in the era of binary computers, which function on a 1 or 0 basis. However,…
Q: What exactly do you mean by program?
A: Answer: Programs stored in computer memory allow the computer to perform various tasks…
Q: Programming is done in a variety of methods. Choosing a programming language requires careful…
A: Programming language any of a number of languages used to express a set of detailed instructions for…
Q: Make a list of the problems that a large amount of data presents, and then examine the solutions.
A: Given: Create a list of and have a conversation on the difficulties associated with big data, which…
Q: What happens if an attacker tries to modify the Tag (the MAC) and the ciphertext in transit when…
A: Answer :
Q: Relate the partial-products method and array you drew for the previous exercise to the steps in the…
A: When you use the array (table, box) approach to the partial products multiplication, you prepare a…
Q: The many models, benefits, and drawbacks of storing data on the cloud are discussed. (at a minimum…
A: Models of cloud: There are the following three types of cloud service models - 1. Infrastructure as…
Q: Give a quick history lesson on how wireless LAN standards have developed
A: Answer:
Q: Describe the dangers of buying software for installation on desktop computers' hard drives. What…
A: Because they have specialized IT employees on staff, businesses that buy and install application…
Q: The many models, benefits, and drawbacks of storing data on the cloud are discussed. (at a minimum…
A: Computing on the Cloud: Computing in the cloud refers to the delivery of information technology…
Q: What kind of connection does a piece of data have to an Internet of Things device?
A: Given: we have to discuss What kind of connection does a piece of data have to an Internet of…
Q: When compared to other approaches to network security, such as application layer security, what are…
A: IPsec (Internet Protocol Security) is a collection of protocols that ensure the integrity,…
Q: in linux, how do i In a single command, show the contents of your grub configuration file.
A:
Q: Q2/A/ Prove the relation is true by using Boolean Algebra method: - xỳ+ xy= xỳ+xy
A: De-Morgan's Theorem: A+B¯ = A¯.B¯ A.B¯ = A¯+B¯ Commutative Law: A+B = B+AA.B = B.A Identity Law:…
Q: Write a program in Coral whose inputs are three integers, and whose output is the largest of the…
A: Write a program in Coral whose inputs are three integers, and whose output is the largest of the…
Q: Q5: Write down 82C55 Control word that set Port B, and Port C Lower as output in mode 1, and set…
A: In 8255, there are varieties of command phrases or manipulate word are to be had. And they are −…
Q: Create a C++ program of Order Menu with billing system like in the bellow pic. Add a system cancel…
A: Please refer to the following steps for the complete solution to the problem above.
Q: Difference between real address mode and Protected virtual address mode.
A: Processor modes control how the processor sees and manipulates the system memory and the tasks that…
Q: D) If x = [1, 5, 7, 9, 13, 20, 6, 7, 8], replace the first five elements of vector x with its…
A: D, E: Code: %Dx=[1 5 7 9 13 20 6 7 8];x(1:5)=max(x) %Ex=[3 2 6 8];y=[4 1 3 5];result=x./y
Q: It was your job to create an interactive, integrated system for the University of Technology and…
A: Introduction: Cologne University of Applied Sciences has established a Master of Science in…
Q: It's important to know what are the most important parts of the Compiler Phases. When responding, be…
A: What is a compiler: A compiler is a special program that translates a programming language source…
Q: Describe a cookie-based online authentication attack.
A: Cookie poisoning is a kind of attack that is sometimes known as session hijacking. It is a tactic in…
Q: "forward lookup zone" of a DNS and what does it do
A: Given : What precisely is the "forward lookup zone" of a DNS and what does it do?
Q: Computer Science Consider the Indian Postal Services as a business firm. One of the competitive…
A: For businesses or apps like the Indian postal service, blockchain technology allows a decentralised…
Q: A discussion is offered on how formative assessment may be utilised to answer user issues and…
A: It refers to the quality of a user's interaction with objects or systems such as websites, software,…
Q: What are the primary benefits and drawbacks of storing data on the cloud, and how do they compare?
A: One of the most common definitions of Internet Governance is the improvement and alertness of shared…
Q: Assignment: Use Keil uvision 5 software to develop an ARM assembly program with the followings…
A: The solution for the above given question is given below:
Q: Consider the following examples. Registers for stack segment and additional segment. The control…
A: The flag register is one of the special purpose register. The flag bits are changed to 0 or 1…
Q: Task 3.3: Basic CMP and JUMP Instruction Create an assembly program to that accepts 2 single digit…
A: The answer is given in the below step
Q: If a data breach occurs, what will happen to cloud security? Some potential countermeasures include,…
A: The impact of a data breach on cloud security In many cases, merely resetting passwords isn't enough…
Q: Describe the many elements that make up a back-up plan. How are backup strategies for mobile devices…
A: Here we have given few elements that make up a back-up plan. Added a brief note on backup strategies…
Q: Contrast procedural versus object-oriented programming (OOP). Is one superior than the other? Why?…
A: In this question we have to understand the difference between procedural versus object-oriented…
The code needs to be done in Coral please
A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.
Ex: If the input is 100, the output is:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 2 images
- Interest on a credit card’s unpaid balance is calculated using the average daily balance. Suppose that netBalance is the balance shown in the bill, payment is the payment made, d1 is the number of days in the billing cycle, and d2 is the number of days payment is made before billing cycle. Then, the average daily balance is: averageDailyBalance = (netBalance * d1 – payment * d2) / d1 If the interest rate per month is, say, 0.0152, then the interest on the unpaid balance is: interest = averageDailyBalance * 0.0152 Instructions Write a program that accepts as input netBalance, d1, payment, d2, and interest rate per month (interestRate). The program outputs the interest. Format your output to two decimal places. Input: 100 30 50 7 9.7 Output: 856.83 Test case 2: Input: 255.76 31 55 3 12.3 output: 3080.38Interest on a credit card’s unpaid balance is calculated using the averagedaily balance. Suppose that netBalance is the balance shown in the bill, payment is the payment made, d1 is the number of days in the billing cycle, and d2 is the number of days payment is made before billing cycle. Then, the average daily balance is:averageDailyBalance = (netBalance * d1 – payment * d2) / d1If the interest rate per month is, say, 0.0152, then the interest on the unpaid balance is:interest = averageDailyBalance * 0.0152Write a program that accepts as input netBalance, payment, d1, d2, and interest rate per month. The program outputs the interest. Format your output to two decimal places.Interest on a credit card’s unpaid balance is calculated using the average daily balance. Suppose that netBalanceis the balance shown in the bill, paymentis the payment made, d1is the number of days in the billing cycle, and d2is the number of days payment is made before the billing cycle. Then the average daily balance is: averageDailyBalance = (netBalance * d1 –payment * d2) / d1 if the interest rate per month is say, 0.0152, then the interest on the unpaid balanceis: interest = averageDailyBalance * 0.0152 Design a program that accepts as input netBalance, payment, d1, d2, and interest rate per month. The program outputs the interest charged. Format your output to two decimal places. C++
- Interest on a credit card’s unpaid balance is calculated using the average daily balance. Suppose that netBalance is the balance shown in the bill, payment is the payment made, d1 is the number of days in the billing cycle, and d2 is the number of days payment is made before billing cycle. Then, the average daily balance is: averageDailyBalance = (netBalance * d1 – payment * d2) / d1 If the interest rate per month is, say, 0.0152, then the interest on the unpaid balance is: interest = averageDailyBalance * 0.0152 Write a program that accepts as input netBalance, d1, payment, d2, and interest rate per month (interestRate). The program outputs the interest. Format your output to two decimal places.Interest on a credit card’s unpaid balance is calculated using the average daily balance. Suppose that netBalance is the balance shown in the bill, payment is the payment made, d1 is the number of days in the billing cycle, and d2 is the number of days payment is made before billing cycle. Then, the average daily balance is: averageDailyBalance = (netBalance * d1 - payment * d2) / d1. The interest on the unpaid balance is: interest = averageDailyBalance * interestRate where interestRate is the interest rate per month. Write a program that accepts as input netBalance, payment, d1, d2, and interestRate. The program outputs the interest. Format your output to two decimal places. Analyze and design this program. Write the code, compile and run it. Upload your analysis and design document and your .cpp source code file here.The quadratic formula is used to solve a very specific type of equation, called aquadratic equation. These equations are usually written in the following form:ax2 + bx + c = 0The Quadratic Formula x = ( -b ± √( b^2 - 4ac ) ) / ( 2a ) Where a, b, and c are constants with a ≠ 0. (If a = 0, the equation is a linear equation.)The discriminant is the part of the formula in the square root. If the value of the discriminant is zero then the equation has a single real root. If the value of thediscriminant is positive then the equation has two real roots. If the value of thediscriminant is negative, then the equation has two complex roots.Write a program that finds the roots of the quadratic equation using the Quadratic Formula. Write a function named discriminant in the file, Disc.py, to calculate and return the discriminant of the formula. Let the main function call the discriminant function and then calculate the solution(s) of the equation. Do not calculate the solutions in the discriminant…
- Exercise III: Catalan numbers For n e N, denote by c, to be the number of ways to form a "mountain range" with n upstrokes (U) and n downstrokes (D) that all stay above a horizontal line. For instance: for n = 1, only UD is allowed, so c = 1; • for n = 2, only UUDD and UDUD are allowed, so c2 = 2. 1. Check that c3 = 5 by writing down or drawing all possible options. 2. Consider the power series +00 g(x) = 2 n=0 (by definition co = 1) called the generating function of the sequence (en). Justify that cn < 4" for each n, and deduce that the radius of convergence of g is at least 1/4. 3. It can be show that for r E (-1/4, 1/4), g(x) = 1+ xg(r)? and therefore 1- VI 4.x g(x) = 2.x Use this formula and the known power series of V1+ x to write the first terms of the power series expansion of g, in the form g(x) = co + c1x + c2x2 + C3x + c4x* + ·.. Show how you obtain a few terms, but you do not need to show all computations and you can use a calculator for fractions. Check that you recover co,…A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: The year must be divisible by 4 If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is 1712, the output is: 1712 is a leap year. Ex: If the input is 1913, the output is: 1913 is not a leap year. 1 2 3 4 5 6 7 8 9 10 11 Put("{} is a leap year.".format(i_year)) print("{} is not a leap year.".format(i_year)) inputYear = Get next input What would be the code?Computer Science CS220 – Programming Project – P07: Brute Force Equation Solver Project Specifications: For every value of x from -10 to 10 For every value of y from -10 to 10 Check if the current x and y satisfy both equations. If so, output the solution, and finish. Ex: If no solution is found, output: You can assume the two equations have no more than one solution. Note: Elegant mathematical techniques exist to solve such linear equations. However, for other kinds of equations or situations, brute force can be handy. in c++ please using namespace std;
- In python, a) In the Hi-Lo game, the player begins with a score of 1000. The player is prompted for the number of points to risk and a second prompt asks the player to choose either High or Low. The player’s choice of either High or Low is compared to a random number between 1 and 13, inclusive. If the number is between 1 and 6 inclusive, then it is considered “low”. A number between 8 and 13 inclusive is “high”. The number 7 is neither high nor low, and the player loses the points at risk. If the player had guessed correctly, the points at risk are doubled and added to the total points. For a wrong choice, the player loses the points at risk. Create a HiLo application based on this specification. Application output should look similar to b) Modify the application to allow the player to continue until there are 0 points left. At the end of the game, display the number of guesses the user took before running out of points.Question Using Java programming language write a program to manage a hotel with 24 rooms;10 rooms are Executive, with price Gh ₵ 2500.00 per night,7 rooms are Chalets, with amounts Gh ₵ 1500.00 per night7 rooms are Ordinary, with amount Gh ₵ 500.00 per night The program should allow customers to book for rooms for a number of nights, and update the number of empty rooms available for each category when a customer has paid fully and has checked-in; also update the number of empty rooms available when customer checks-out.Customers should make bookings with their first names, telephone number A customer should be prompted to know if a room is booked (meaning a another customer has booked it but has not paid fully, or has not checked-in) A customer should be prompted to know if a room is occupied (meaning a booked room has been fully paid for, or the customer has checked-in) A customer should be prompted to know if a room is available (meaning a room has neither been booked nor…Scenario As you surely know, due to some astronomical reasons, years may be leap or common. The former are 366 days long, while the latter are 365 days long. Since the introduction of the Gregorian calendar (in 1582), the following rule is used to determine the kind of year: if the year number isn't divisible by four, it's a common year, otherwise, if the year number isn't divisible by 100, it's a leap year. otherwise, if the year number isn't divisible by 400, it's a common year. otherwise, it's a leap year. none of the above year int(input("enter the year")) if (year%4 1-0) and (year%400 -0) or (year % 1000): print (year is common year") else: print(year, is leap year") year= int(input ("enter the year")) if (years !-0) or (year480 1-0) and (year % 1001-0): print(year is common year") else: print(year, "is leap year") D year= int(input("enter the year"))