Write code in assembly language Question 1: Construct a program using 2D array. Define a list of strings in the 2D arrays, the list should be only a string. Get a string from a user as input Search the user's string in the list of strings. If string is found print the string, and a message "String is Found". If string is not found print only a message "String is Not Found".
Q: When discussing telecommunications technology, however, the precise meaning of terms like "4G" and…
A: Networks using either 4G or 5G: In a word, the rise in the number of devices and the aspiration for…
Q: Can you explain the distinction between computer-based organization and architectural design?
A: Introduction 1. Computer Architecture: The needs and design implementation for the various…
Q: It is advisable to give the use of structured language considerable thought when describing…
A: Introduction to System Analysis It is a procedure for gathering and analyzing data, determining the…
Q: Analyze the differences and similarities between cellular, wireless, and wired data transfer.…
A: mobile data connectionsdata links that are connectedData wireless linksA cellular connection sends…
Q: are the differences between the ods vs those on an agile team?
A: Considering that, What is the job of the leader in a predictive project team vs. an agile project…
Q: How does it make sense for a software development lifecycle to be used in conjunction with the idea…
A: To begin, SLMs are graphical representations of the software development process (sometimes called…
Q: Why is a virtual private network (VPN) better for security than the public internet? But things…
A: VPN safer than the public internet, and VPN tunnel mode operate VPN is safer than utilising a…
Q: Examine a few of the challenges involved in developing the information system architecture that…
A: The infrastructure and architecture of the information system are as follows: In order to facilitate…
Q: the penetration testing, find out more. with regard to information security?
A: Jim and Sally's survival in the city of Centerville, where a flood has occurred and a dam has…
Q: When it comes to a local area network, what precautions should be taken to ensure its availability…
A: Answer : Precautions for Local area network : 1) Design a best and suitable firewall for network. 2)…
Q: What are the benefits of utilizing Design Patterns, and how do they work, in software development?…
A: Introduction to Design Patterns Some of the finest practices utilized by skilled developers of…
Q: Give particular examples from your experience and describe the certification and training procedure.
A: Will be clarified Training And Certification Are Important (offer): If a person, thing, or…
Q: 2Wireless networking technologies, topologies, and future developments will be extensively…
A: wireless network technology and topology future development will extensively used discussed
Q: Give a little history of how wireless LAN standards came to be.
A: A local area network (LAN) consists of a series of computers linked together to form a network in a…
Q: What distinguishes Ubuntu from other server operating systems, and what features does it share with…
A: In this question we need to explain what makes Ubuntu different from other server operations systems…
Q: Prove using definitions only that nªlog(n) is not O(nª).
A: Proof by contradiction Assume that nnlog(n) is O(nn) itself. So, by definition of BigO, there exists…
Q: Information systems that are fragmented may have a variety of drawbacks and issues.
A: There are a few key issues that may arise from having fragmented information systems within an…
Q: How do you distinguish between cohesion and coupling while creating software?
A: Software Engineering: The practice of using software programming languages to analyse user demands,…
Q: structure. Create a menu with that gives the user three choices: Grade Book Grade Book O: Exit 1:…
A: Python program to implement a gradebook application''' # create an empty list of gradesgrades = []…
Q: Use C++ to program a Magic Eight Ball.
A: code- #include <cstdlib>#include <string>#include <iostream>#include…
Q: A virtual private network (VPN) is the best option for protecting the perimeter of a network. Can…
A: In terms of network security, virtual private networks, or VPNs, are very crucial. Below are a few…
Q: Think about the WAN wireless access point that you like. Explain why this alternative is better than…
A: Any company or institution that needs to accommodate a large number of wireless Internet users must…
Q: In this session, we'll examine the significance of software architecture at every stage of the…
A: Here, we will discuss the significance of architectural design in the software development process.…
Q: What measures may be taken to prevent DNS tunneling? How can you recognize port scanning attempts…
A: If a question has many parts, we need to respond to the first part. DNS tunneling is a kind of cyber…
Q: Follow these steps: • Code a Python program that will read from the text file inventory.txt and…
A: Python Code
Q: In what other ways has the use of ICT benefited us, and what ways has it hindered us?
A: Information and communications technology is abbreviated as ICT. Innovative apparatuses and…
Q: What does "interdependence" entail in relation to other concepts used to describe systems?
A: Interdependence refers to the idea that complex systems rely on other systems in order to…
Q: We don't know how operating systems accomplish their goals. What does it mean when we speak about a…
A: The solution may be found here. The operating system (OS) of a computer is what connects the user to…
Q: In this article, we will take a look at the Windows Service Control Manager.
A: let us see the answer:- Introduction:- At system boot, the service control manager (SCM) is…
Q: Can you explain the distinction between computer-based organization and architectural design?
A: Computer-Based: All the elements required to collect, process, transfer, store, display, and manage…
Q: Do you know what the newest methods are for keeping a network safe? Please elaborate on each of the…
A: Never before has cyber security been more crucial. A lot of data is constantly traveling the world…
Q: he two primary roles of an OS should be briefly explained here.
A: Operating System "OS" is the interface between the computer user and the computer hardware. An…
Q: End-to-end encryption could be a problem for application-level proxies. Please offer a method for…
A: End-to-end encryption: End-to-end encryption can affect application-layer proxies. Proxy-based…
Q: Which of the following statements about Python is true? A. Python does not support inheritance. B.…
A: Python supports all the features of object-oriented programming. Thus, it supports the concept of…
Q: Which three generations of wireless security innovations have been made so far? To be more specific,…
A: While looking over among WEP, WPA, WPA2 and WPA3 remote security conventions, specialists concur…
Q: The question, "What is the purpose of architecture?" has been posed. Think about a project and…
A: what is purpose of architecture??
Q: In separate chaining, what kind of linked list is appropriate for deletion None of the mentioned…
A: 1) Separate Chaining is one of the techniques that is used to resolve the collision(Collision is a…
Q: In-depth discussion of architectural design's significance in software development.
A: Architectural design's significance in software development: In software development, architectural…
Q: Difference between count (*) and count (col_name). Explain with an example.
A: The difference between count(*) and count(col_name) is explained in the next step.
Q: Does choosing "good enough" quality in software development offer any advantages or disadvantages?
A: The benefits of building software with a quality that is only "good enough" are as follows: All of…
Q: It is advisable to give the use of structured language considerable thought when describing…
A: Structured Analysis is a method of software development that makes use of diagrams to provide the…
Q: The total number of points on the elliptic curve y² = x³ + 2x + 3 (mod 7) is: Select one: Ⓒa. 14 b.…
A:
Q: The difference between deterministic and non-deterministic computers according to their purpose and…
A: INTRODUCTION: When it comes to a determining whether or not machines are deterministic, it is…
Q: In this session, we'll dive deep into why architectural design is so crucial throughout the software…
A: Software Development Software development is a procedure used to generate standalone or independent…
Q: Experiment with Hypercard or another hypertext system if you have access to one. As you work through…
A: Experiment with Hypercard or another hypertext system if you have access to one. As you work through…
Q: In this talk, you'll elaborate on the role that architectural design plays in the software creation…
A: The above question is solved in step 2 :-
Q: Consider the following two sequences of integers • Sequence A: 10000, 9990, 99, 9997, 21 • Sequence:…
A:
Q: What is difference between computed property and stored property?
A: The Stored Property concept is new in Swift 4 and allows for the storage of constant and variable…
Q: Should the OS take extra precautions while reading from memory as opposed to the registers?
A: In-memory databases store data in the computer's random access memory (RAM) or main memory. rather…
Q: Which of the following statements correctly shows the first line of a class definition for…
A: Which of the following statements correctly shows the first line of a class definition for…
Step by step
Solved in 4 steps with 3 images
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name.string GetPhoneNumber(vector<string> nameVec, vector<string> phoneNumberVec, string contactName) #include <iostream>#include <vector>using namespace std; string GetPhoneNumber(vector<string> nameVec, vector<string> phoneNumberVec, string contactName) {} int main()…A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name. string GetPhoneNumber (vector nameVec, vector phoneNumberVec, string contactName) Hint: Use two vectors: One for the string names, and the other for the string phone numbers.Using C++, A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309 A. Create a struct in your program called ContactInfo to store a name and a phone number. B. Define and call the following function. The return value of GetPhoneNumber is the phone number associated with the provided contact name. If the name is not found, the function should return "not found". string GetPhoneNumber(ContactInfo contacts[], int size, string contactName) C. Your main function should declare an array of ContactInfo structs of size…
- java: Run length coding is a method to represent a string in a more compact manner. Each character that occurs more than 2 times in a row is represented by the character and a number following it. Two examples are: "abba" → "abba""abcccbbbba" → "abc3b4a"Write a function that calculates how many characters the encoded string is shorter than the original.Python Scrabble is a word game in which words are constructed from letter tiles, each letter tile containing a point value. The value of a word is the sum of each tile's points added to any points provided by the word's placement on the game board. Write a program using the given dictionary of letters and point values that takes a word as input and outputs the base total value of the word (before being put onto a board). Ex: If the input is: PYTHON the output is: 14 part of the code: tile_dict = { 'A': 1, 'B': 3, 'C': 3, 'D': 2, 'E': 1, 'F': 4, 'G': 2, 'H': 4, 'I': 1, 'J': 8, 'K': 5, 'L': 1, 'M': 3, 'N': 1, 'O': 1, 'P': 3, 'Q': 10, 'R': 1, 'S': 1, 'T': 1, 'U': 1, 'V': 4, 'W': 4, 'X': 8, 'Y': 4, 'Z': 10 }In c program Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with an integer indicating the number of words that follow, Assume that the list will always contain fewer than 20 words. Ex If the input is: 5 hey hi Mark hi mark the output is hey- 1 hi - 2 Mark- 1 hi - 2 mark - 1 Hint: Use two arrays, one array for the strings and one array for the frequencies. 1 #include 2 #include 3 4 int main(void) { /* Type your code here. */ 7 8 return 0; 9 } 10
- Solve in Python: A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. the input is: Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the output is: 867-5309A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Ex: If the input is: 3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the output is: 867-5309 Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name.string GetPhoneNumber(vector<string> nameVec, vector<string> phoneNumberVec, string contactName) Hint: Use two vectors: One for the string names, and the other for the string phone numbers.Write a program that reads a sentence and store it in an array of characters. The program also reads a word and store in it a string variable. The program then conceals the word in the sentence with the character @'. Sample input / output: Enter a sentence: The town in which we live is a green town and big Enter a word: town Result: The @aa@ in which we live is a green @@@@ _and big
- A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. Ex: If the input is: Joe, 123-5432 Linda, 983-4123 Frank, 867-5309 Frank the output is: 867-5309 461710 3116374.qx3zqy7I am having a difficult time with this problem I need help. A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. Ex: If the input is: Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the output is: 867-5309Write in Python: A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes in word pairs that consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Assume the search name is always in the list. Ex: If the input is: Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the output is: 867-5309