12. Write a for loop that sums the odd values from the LIST_SIZE element array list. For example, the sum for this list would be 113 (51 + 17+ 45). Array 1iet liet (0)1iet ta) list taj 1iet (11iet (4) 1iet ( 30 12 51 17 45 62
Q: A typical problem occurs when physical filenames are entered into system code and the file structure…
A: The following are some tips for avoiding system building issues:
Q: In the context of server operating systems, explain Gentoo and its characteristics. Computer…
A: Gentoo and it characteristics
Q: Short remarks on phishing and spyware should be written. Please make sure you do it correctly. What…
A: Introduction: Information security is defined as the processes and methodologies designed and…
Q: Q2. A. write a code to find the number of students who pass CS course, when their marks>=40 . As the…
A: Solution - code with output 1)
Q: In the context of the verification process, define the term "Verification model fulfils the…
A: Introduction: The question requires you to define the phrase "Verification model fulfils the…
Q: Create a c# code with comments that will ask the user to enter a student’s information. Their Last…
A: In the above code, it has been asked to print the user to enter a student’s information. Their Last…
Q: 3. Discuss on the evolution of web technologies ranging from Web 1.0 until Web 5.0 by explaining…
A: Answer the above questions are as follows
Q: What is the role of ransomware in the context of cybersecurity?
A: Introduction: Infected computers are infected with ransomware, which locks the machine and prevents…
Q: Identify and discuss all of the technology, devices, software, and applications that contribute to…
A: We need several software, Devices, technologies, and applications that help to run the internet,…
Q: Registers are temporary data storage locations. CPU. Explain three register types and their…
A: Introduction: A register is a processor's built-in temporary storage memory (CPU).Registers are…
Q: What are some of the similarities and differences between Google Spreadsheets and Microsoft Excel?
A: Introduction: They are the computer software that let the user to manipulate data in a tabular…
Q: Describe how an upper-tier ISP's network administrator can use policy to configure BGP.
A: Solution: A tier-1 ISP B may not to carry transit traffic between two other tier-1 ISPs, say A…
Q: What is the difference between the JAVA and Python programming languages
A: Introduction: Java and Python are both high-level programming languages that allow Object-Oriented…
Q: What are the three types of backups that can be utilised in database recovery? Explain what each…
A: Introduction: Actually, database is a system for storing information. MANAGEMENT SYSTEM FOR DATABASE…
Q: What is the location of the Windows hosts table?
A: Hosts files are used in Windows and other operating systems such as Linux and Mac OS. In each…
Q: (Computer Networking) Examine the parallels and differences between the ARP and ICMPv6 ND…
A: Introduction ARP is an acronym for Address Resolution Protocol.It is a communication protocol used…
Q: What are the three types of backups that can be utilised in database recovery? What does each backup…
A: Database recovery management system: Data recovery is retrieving data that has been lost, deleted…
Q: Describe in your own wrds what does the import command with python responsible for?
A: Import command in python Import command in python same as # include in C or C++, that is used to…
Q: Is the web development process broken down into a set of stages? Explain why you believe the first…
A: Yes, The web development process is broken into a set of stages, in total there are seven stages in…
Q: 2. (Sentinel.java) Write a program that reads several numbers, determines how many positive and…
A: As per guidelines we are supposed to answer only one question. Kindly repost the other questions as…
Q: What are the approaches to MDM in database ?
A: Introduction To be determined - what are the approaches to MDM in database
Q: Describe the impact of computers on decision-making.
A: Lets see the solution.
Q: Explain what you mean by function overloading with code. (In C++)
A: In computer programming, functions are designed with instructions that can serve a specific purpose.…
Q: 3. Please provide professionally crafted solutions to the following: 1. For the following tree A B D…
A: What Is a TREE? A tree is an abstract data type in computer science that depicts a hierarchical tree…
Q: So, what exactly is the difference between active and passive vulnerability scanners when it comes…
A: Introduction: In the network environment, passive scanners are responsible for monitoring…
Q: Consider software that lets a surgeon in one location to do surgery on a patient in a different…
A: NOTE: As per Bartleby guideline, if there are multi parts available then we are allowed to solve…
Q: Given a process with address space of size 32 bytes and page size of 8 bytes, if the CPU asks to…
A:
Q: 7. Write an algorithm to find sum of n numbers.
A: ANSWER:-
Q: What methods may be utilised to secure data while it is in transit or at rest? Computer science
A: Introduction: Data at rest refers to data that is archived or not frequently viewed or updated and…
Q: 1. State the function of the segment register in protected mode memory addressing 2. Mention 1 (one)…
A: The questions are: 1. State the function of the segment register in protected mode memory addressing…
Q: If the passenger is a datagram, what is similar to the connection layer frame?
A: In the transportation analogy, the frame is analogous to:
Q: Distinguish between intrasite and intersite replication.
A: Introduction: Unlike intrasite replication, which uses RPCs to transfer data between servers on the…
Q: The phrase used to describe the physical path that a communication takes from sender to receiver is
A: Introduction: After it has been conveyed, a message is defined as a distinct unit of communication…
Q: Give two reasons why you believe it is critical for a computer programmer to learn about computer…
A: There are several causes for this: 1)If a particular computer programmer wants to determine what has…
Q: Examine the benefits of agile development vs more conventional development approaches.
A: Introduction: The advantages of agile development over traditional, codified techniques include the…
Q: Which of the following is true? Pick one: a. b. KNN clusters data. The lack of labelled training…
A: Third option is correct answer
Q: ques to gather the requirements and produce a requirements specification by taking an appl
A: Below appropriate techniques to gather the requirements and produce a requirements specification by…
Q: Discuss how advancement of Computer and internet technology has deeply affected the global social…
A: Internet The Internet is the definitive innovation of the Information Age, as the electrical motor…
Q: Short answer What is the objective of the interpretive compiler that is creative? Computer science
A: Introduction: An interpreter's job is to help two or more people who don't speak the same language…
Q: write a method that returns true or false if the input integer is an even number(in java)
A: - We have to code in java for method to get true if the input integer is an even number or false if…
Q: What are some of the advantages of virtualization technology?
A: answer is
Q: Write a Python program to display the hex values in string format of all elements of the list given…
A: Program Explanation :- 1) Make the array list inline with variable num. 2) Then make the hex_arry…
Q: Clearly define the fundamental distinctions between multiprogrammed batch processing and time…
A: Introduction: Clearly define the fundamental distinctions between multiprogrammed batch processing…
Q: You are watching a video, playing online games and writing a report, and you suddenly discover that…
A: An operating system has three main functions: (1) manage the computer's resources, such as the…
Q: Compare Bitcoin, Coinjoin, Zerocoin, and Zerocash. 1) the anonymity given 2) how practicable they…
A: Introduction: Bitcoin, Coin join, Zero coin, and Zero cash. 1) the anonymity given 2) how…
Q: What is the importance of file management in computer systems and the necessity for directory…
A: Intro Role Of File Management In Computer System File management on a computer is similar to filing…
Q: What do firewalls do? What type of firewall is best?
A: Find the answer given as below :
Q: Which of the following is true? Pick one: a. b. KNN clusters data. The lack of labelled training…
A: The following statement is true : The lack of labelled training data makes Clustering an…
Q: Explore online nmap tool (nmap.online) for various types of scanning answer the following questions.…
A: c. Use command nmap -sn www.uthm.edu.my to get IP address of www.uthm.edu.my Output:
Q: What does the kernel technique do in the instance of an SVM classifier? Is it possible to use this…
A: Problem Analysis : Kernal Trick : This is a concept that is used in the SVM classifier that enables…
Step by step
Solved in 4 steps with 2 images
- Considering all the elements and its indexes at the right side:Write a sequence of List operations that would result to a LIST that contains ONLY the elements with its respective indexes: {index[00]=104, index[01]=165, index[02]=115, index[03]=384, index[04]=248, index[05]=117}.Create a Numpy List named as marks with six float numbers, showing the final marks of a student in six subjects. Round the marks from marks array from Q-3 a) upto two decimal numbers What if you need to create the same list as Q-3 a), but for five students. Can you still use 1-D array? How many dimensions should be there? Find the highest marks a student has obtained using marks array from Q-3 a) Use seaborn to show marks array from Q-3 a)Create a Numpy List named as marks with six float numbers, showing the final marks of a student in six subjects. Round the marks from marks array from Q-3 a) up to two decimal numbers What if you need to create the same list as Q-3 a), but for five students. Can you still use 1-D array? How many dimensions should be there? Find the highest marks a student has obtained using marks array from Q-3 a) Use seaborn to show marks array from Q-3 a)
- B1. Answer the following: a. Create an ArrayList named Employee of type String. b. Add Ahmed, Mohammed, and Amal to the list? c. Remove Mohammed from the list? d. Write a for loop to print the elements of array list?Consider the 2D array “list”. Each row represent a class say Bangla or English or Math, andthe columns indicates student. A ‘1’ in list[c][s] indicates student s is in class c; a ‘0’ meansstudent s is not in class c. Write a program to display the class number (0/1/2) with the mostnumber of students.Create a Numpy List named as marks with six float numbers, showing the final marks of a student in six subjects. Round the marks from marks array from Q-3 a) upto two decimal numbers What if you need to create the same list as Q-3 a), but for five students. Can you still use 1-D array? How many dimensions should be there?
- Q2. Write a java program to perform the following task: a) Create a collection ArrayList<String> for Customer class b) Add 5 elements into ArrayList c) Display the element at index 4 d) Display all the elements in the ArrayList using for-each loop e) Remove the values at index 2 f) Add “cst2” in location 2. g) Check if st2 existing inside the collection.Please write down the output of following code: ArrayList<String> list = new ArrayList<String>(); list.add("10"); list.add("20"); list.add("30"); System.out.println( list.size()); System.out,println( list.get(1));For the following code, indicate the weighted edge values. List<WeightedEdge> list = new ArrayList<>();list.add(new WeightedEdge(1, 2, 3.5));list.add(new WeightedEdge(2, 3, 4.5));WeightedEdge e = java.util.Collections.max(list);e.u = e.v = e.weight =
- Write a Java application CountryList. In the main method, do the following:1. Create an array list of Strings called countries.2. Add "Canada", "India", "Mexico", "Peru" in that order.3. Use the enhanced for loop to print all countries in the array list, one per line.4. Add "Spain" at index 15. Replace the element at index 2 with "Vietnam". You must use the set method.6. Replace the next to the last element with "Brazil". You must use the set method. You willlose one point if you use 3 in the set method. Do this in a manner that would replace thenext to the last element, no matter the size of the array list.7. Remove the object "Canada" Do not remove at an index. Your code should work if"Canada" was at a different location. There is a version of remove method that willremove a specific object.8. Get and print the first element followed by "***"9. Call method toString() on countries to print all elements on one line.10. Use the enhanced for loop to print all countries in the array list,…Implement a list of employees using a dynamic array of strings.Your solution should include functions for printing list, inserting and removingemployees, and sorting lists (use Bubble sort in C++ language).Keep list of employees sorted within the list after insertion.See the following example:How many employees do you expect to have?5 (Carriage Return)Menu :1 . Print full list of employees2 . Insert new employee3 . Remove employee from list0 . Exit2 (Carriage Return)Input name of new employee : MikeMenu :1 . Print full list of employees2 . Insert new employee3 . Remove employee from list0 . Exit1(Carriage Return)1 . MaryMenu :1 . Print full list of employees2 . Insert new employee3 . Remove employee from list0 . Exitgiven an array of integer values , return true if 6 appears as either the first or last element in the array. firstLast6([1,2,36]) true firstLast([6,1,2,3]) true firstLast([13,6,1,2,3]) false