Write a program named "sort.c" where you will give some number from the command line argument and the program will print the sorted array in descending order. Then, write another
Q: Use the example of a component that implements an abstract data type, like as a stack or a list, to ...
A: Introduction: Demonstrate why it is often essential to expand and adapt components for reuse using a...
Q: Design a signed n-bit multiplier.
A: Design a signed n-bit multiplier.
Q: Show all item num from the item table, and a matching quoted price from the order line table (show b...
A: I have Provided this answer with full description in step-2.
Q: System software should be defined.
A: Computer software is classified into two broad categories: system software and application programme...
Q: Submit just the SQL to: Return all of the contact names, and contact titles for all customers whose ...
A: The SQL query is given below.
Q: What are the societal contributions of this key technologies? -Internet of things
A: Due to company policies I am compelled to solve only the first question. The Internet of things is a...
Q: Why is it important to categorized Network based on their size?
A: We are going to understand why we have categorised Network based on their sizes like LAN,MAN,WAN etc...
Q: how to run multiple regression in Excel (and provide the steps)?
A: Multiple regression formula is used in the analysis of relationship between dependent and multiple i...
Q: Suppose the variable x represents people and F(X): x is friendly T(x): x is tall A(X): x is angry Wr...
A: A) For some people we need to use existential quantifier. The FOL is :
Q: Which entities in 5G cellular can request a retransmission of received information? Explain the rati...
A: 5G cellular: The fifth generation of cell towers, or 5G, is predicted to be one of the most advanced...
Q: Suppose that we have an array: ASM .data array DWORD 1,2,3 If want to rearrange the values to be 3,1...
A: To rearrange the values in the array.
Q: Give an example of when adaptors are typically required when systems are built by merging applicatio...
A:
Q: oll roads have different fees based on the time of day and on weekends. Write a function calc_toll()...
A: def call_toll(x,y,z): if z==True: if y==True: if x<7: print(1.05...
Q: Create a class whose main() holds two integer variables. Assign values to the variables. Create two ...
A: Step 1 : Start Step 2 : Define a method main() and declare two integer variables a and b in it. Step...
Q: Describe the link layer in your own words. Make sure to cover topics such as the purpose, nomenclatu...
A: INTRODUCTION: NODES: There are nodes on the link layer, which are the hosts and routers can talk to ...
Q: Peter finally fixed the DHCP server. He would like to test the connectivity to some websites. He wou...
A: To send the ICMP echo request to any host machine we need it's IP address if it's in the same networ...
Q: TIC – TAC - TOE game (Understanding Alpha – Beta pruning).
A: given - Write a python program to implement TIC – TAC - TOE game (Understanding Alpha – Beta pruning...
Q: Define the term "local wide network."
A: Introduction: A LAN, or local area network, is a kind of network that connects a limited number of p...
Q: Write the Java statement for the following. Declare an array of String named jleague with values “C...
A: Your java program is given below as you required with an output.
Q: Write an UPDATE statement that modifies the Customers table. Change the password column to “reset” f...
A: Let's see the solution in the next steps
Q: n, what are the advantages and disadvantages of distributed data processing that should be taken int...
A: Lets see the solution.
Q: NUMBER SYSTEMS State the steps in converting one number system to another = Decimal to octal = Oc...
A: Decimal to octal This is a direct technique which include partitioning the number to be changed ove...
Q: IoT and WSN involve devices that ca be connected to the Internet true or false
A:
Q: Explain mechanisms that software on a desktop computer can use to securely generate secret keys for ...
A: The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel ...
Q: Regarding to Free Speech in "Net Neutrality Regulations or the Market?" Should companies be permitte...
A: Net Neutrality Regulations or the Market: Direct censorship is not the only factor that can limit th...
Q: 1. What are the different number system? Briefly discuss each.
A: The solution for the above given question is given below:
Q: What is the best indicator that a website is reliable?
A: What is the best indicator that a website is reliable?
Q: Which gate does the following truth table represent? A 1 1 1 1 1 1 1 Select one: O a. AND O b. XOR O...
A: answer d. OR answer is d here we are performing or operation if any of the condition is true the...
Q: Design the circuit with a decoder and external gates.
A:
Q: Create a JavaScript function expression that meets the following requirements: _breakArray(array, ...
A: Actually, array is a collection of elements.
Q: Privacy in the context of information security is a difficult concept to comprehend.
A: Introduction: The term "privacy" in information security refers to protecting user information. It a...
Q: Define the term multicore microprocessor.
A: Introduction: Define the term multicore microprocessor.
Q: Write EER Diagran Libzary Mamgemen Aystem a on
A: Let's see the diagram in the next steps
Q: Please construct the truth table of the following, thank you. a) [p-q] A [-p-q] b) [-p--q]-[p-q] c) ...
A: Actually, given question regarding truth table.
Q: he following are considered model weaknesses as the author described in the text, EXCEPT Group of an...
A: The following are considered model weaknesses as the author described in the text, EXCEPT Group of...
Q: Laboratory Exercises – Java Lesson 5: Creating Classes and Objects 1 a . Create a class named Pizza...
A: JAVA Program: a) For Pizza Class: // Creating class named Pizzapublic class Pizza { // Data fields i...
Q: Describe the security dimensions and security levels
A: Security engineering is a sub-field of the broader field of computer security. It encompasses tools,...
Q: Draw & Describe WIMAX, 1G to 5G, Leo,Meo,Geo & draw 16.1,2,6.
A: WiMAX: It stands for Worldwide Interoperability for Microwave Access (WiMAX) based on IEEE 802.16 se...
Q: Which statute in the United States was expressly designed to cope with the country's encryption poli...
A: Introduction: The ENCRYPT Act would prohibit states and municipal governments in the United States f...
Q: We know that A1,A2,..,An EA if and only if A is true in all worlds where each of A1, A2, .., An are ...
A: Let's see the solution in the next steps
Q: Question 4: a) What is Cyclic Redundancy Check (CRC) and how it works? b) Generate hamming code for ...
A: Application of Cyclic Redundancy Check: The appllocation of cyclic redundancy check only detect erro...
Q: mathematical oper
A: The steps for mathematical operation in different number system as,
Q: Write a description of the eight most important concepts in computer architecture.
A: I have answered this question in step 2.
Q: How can data visualisation make use of the following five graphical data features in order to emphas...
A: Data visualization is a graphic representation of organized or unstructured data that displays infor...
Q: lame the THREE (3) components that are considered to be part of any data Comment on the extent to wh...
A: Lets see the solution.
Q: access advanced audit policy settings, what tool is used
A: A) Group Policy it is used to access advanced policy settings
Q: To utilise computers at college, do you need to develop a set of remote access policies?
A: Introduction: A document that discusses and specifies permitted ways of remotely connecting to the i...
Q: sec and continue until stop the timer .write in program
A: Program Explanation: Include the header file for time. Inside the main function declare the variabl...
Q: write VB 6.0 program to print ali, Date and time after each 3 sec and continue until stop the timer ...
A: Answer in step 2
Q: This function determines the amount of computer instructions required for each source-level statemen...
A: Introduction: Whatever your high-level programming language refers to as a "statement." Frequently,...
Step by step
Solved in 5 steps
- Exercise 2: We are tasked to write a program that shows some information about 12 persons: first name, last name and telephone number. To do this, we have to create 3 arrays and fill them by the information wanted (first name, last name, phone number) respectively. In order to do some changes on this information, we can create a counter to specify the index of the information we want to change or to update; each index is referred to the each one of the people that we need to save their information.Create a LookupNames project. In the main function:Ask the user to enter a number of names, X to quit input.Store the names in an array.Also use a counter variable to count the number of names entered. Write a function displayNames to display the names.The function must receive the array and the counter as parameters. Write a function called lookupNames.The function must receive the array and the counter as parameters.Ask the user to enter a letter.Display all the names with the letter that was entered as the first letter of the name. Call the displayNames and lookupNames functions from the main function. Tip: declare your functions above the main() function: void displayNames(char array[][60], int count){ // function code here} int main(){ // main code here displayNames(names, number); // possible more code here} Tip2: make sure your function parameter matches the data type you send as an argument to that function.In the above example, names and array should have the same data…Write a python or C# program that creates an integer array of size 10 and fills the array with positive numbers set by the programmer (not entered by the user). The range of values in the array should be between 1 and 100. Then, the program will remove the duplicate values found in the array (i.e. each value should be found only once in the array). After removing the duplicate values, the size of the new array should be equal to the number of unique values found in the original array.
- Write a program in java or c# that creates an integer array of size 10 and fills the array with valuesset by the programmer (not entered by the user). Then, the program will remove all theprime numbers from the original array and store them in a new array. Note that afterthe program finishes execution, the original array should not contain any prime number.in c++ Exercise Tasks: Create a project <yourfirstandlastName>Ex8 and .cpp file. When you are finished with the exercise, please submit the corresponding .cpp file using moodle. For tasks 2 through 4 create an integer array with 100 randomly generated values between 0 and 99; pass this array into all subsequent functions. Place code in your main to call all the methods and demonstrate they work correctly. Using just the at, length, and substr string methods and the + (concatenate) operator, write a function that accepts a string s, a start position p, and a length l, and returns a subset of s with the characters starting at position p for a length of l removed. Don’t forget that strings start at position 0. Thus (“abcdefghijk”, 2, 4) returns “abghijk” Create a function that accepts the integer array described above returns the standard deviation of the values in a. The standard deviation is a statistical measure of the average distance each value in an array is from the mean.…Write a program to produce an array of integer random numbers. Yourprogram should find out from the user how many numbers to store. It should then generate and store that many random integers (the random numbers must be between 1 and 999 inclusive). The program should then determine the smallest number, the largest number, and the average of all the numbers stored in the array. Finally, it should print out all the numbers on the screen, five numbers to a line with spaces in between. Once the contents of the array have been printed to screen, display the smallest number, largest number, and average determined previously. You should ensure that your program design in modular.The Random class of Java library (java.util.Random) implements a randomnumber generator. To generate random numbers, you construct an object of q the class Random, and then use the method nextInt(n) which returns a number between 0 (inclusive) and n (exclusive). Eg: import java.util.Random;.....Random generator = new…
- Java OOP Write a complete address book maintenance application. The user of the program has four options: Add a new person, delete a person, modify the data of a person, and search for a person by giving the name. Use the AddressBook class, either the original one from the chapter or the modified one from the previous exercises. You have to decide how to allow the user to enter the values for a new person, display person information, and so forth.You have been hired at an open-air mine. You are to write a program to control a digger. For your task, you have been given a 'map' of all the underground resources in the mine. This map comes as a two-dimensional integer array. The array has n rows and k columns. Each integer is between zero and one hundred (inclusive). This array represents a grid map of the mine – with each row representing a different height level. Each square in the grid can contain valuable resources. The value of these resources can go from zero (no resources) to 100 (max resources). The grid maps the resources just below the surface, and down to the lowest diggable depths. The digger starts at the surface (so, just on top of the topmost row in the grid)—at any horizontal position between 1 and k. The digger cannot dig directly downwards, but it can dig diagonally in either direction, left-down, or right-down. In its first time-step, it will dig onto the first row of the grid. In its second time-step, it'll hit…Write a program to create an answer sheet to read the student’s answers for a ten (10) item exam. It should then display a message indicating the score and remarks whether the student passed or failed the exam. (A student must correctly answer 6 of the 10 questions to pass the exam.) Here are the correct answers (key to correction), which should be initialized and stored in an array: TRUE FALSE TRUE FALSE FALSE FALSE TRUE TRUE TRUE FALSE
- Modify the program below, by adding an option 'f' to your menuprogram. If this option is chosen, the program should ask the user to enter 10integers. The program should store each integer into an array (as each one isentered). Once the array contains the 10 integers, the program should output:- The sum of the 10 numbers entered- The average of the 10 numbers entered- The highest number entered- The lowest number entered import java.util.*; public class Code {static Scanner scan = new Scanner(System.in);public static int bigger(int x, int y, int z) {int large = x;if(x >= y && x >= z)large = x;else if(y>=x && y >=z)large = y;elselarge = z;return large; }public static int smaller(int x, int y, int z) {int small = x;if(x <= y && x <= z)small = x;else if(y<=x && y <=z)small = y;elsesmall = z;return small; }public static void bigSmall() {System.out.print("Enter three numbers: ");int x = scan.nextInt();int y = scan.nextInt();int z =…Create a program in C that stores the information of up to 25 containers loaded on ship.Ask the user for the number of containers to be loaded. If the user enters a number of containersgreater than 25 or less than 3, then re-prompt for the container number until an acceptable number isentered.Create an array of floats with six rows and a number of columns equal to the number of containersprovided by the userDisplay a menu to do the following:- A or a to add a container.- D or d to delete a container.- R or r to retrieve the information of one container.- T or t to retrieve the information of all containers.- W or w to retrieve the total weight of the loaded containers.- C or c to retrieve the total cubic volume of the containers loaded on the ship (array).- V or v to retrieve the total value of the containers loaded on the ship.- X or x to exit the programOption A: for this option check if the array has an empty column to enter the information for acontainer, if not, output a message…Write a C# or a python program that creates an integer array of size 10 and fills the array with values set by the programmer (not entered by the user). Then, the program will remove all the prime numbers from the original array and store them in a new array. Note that after the program finishes execution, the original array should not contain any prime number.