14-17. Structures: Complete the following program to print all medicines whose quantity are already below minimum (<=50). ; declarations 14. medicine equ 0 ; medicine code quantity equ 9 stock resb struct*100 mov rcx, 100 mov esi, 0 findMeds: 15. 16. jmp next printMeds: next: prints medicine code. 17. loop findMeds
Q: Windows DNS has three zones: main, secondary, and stub
A: Let's have a look at the response:- Introduction:- A DNS Server is a machine that completes the DNS…
Q: Discuss five (5) operating system functions and identify twenty (20) distinct operating systems and…
A: let's see the correct answer of the question
Q: Identify The underlying causes of many catastrophic software failures in the history of computer…
A: FAILURES OF IMPORTANT SOFTWARE: Some of the most egregious software failures in computer science…
Q: ite a program to comp +2 if x if-1 = cos(x)
A: We need to use the given expression to compute the value of y
Q: 1. Write a program in C to find the number of times a given word 'the' appears in the given string.…
A: A string is a sequence of characters terminated with a null character \0.
Q: Would you be interested in having a conversation on the social and ethical repercussions that might…
A: The following are some examples of probable social and ethical ramifications of information…
Q: When it comes to data backup and recovery, what are some of the most significant considerations?
A: Answer: Data backup: Deciding what data is most important and The most important areas to consider…
Q: Simplify the following expressions by applying Boolean rules. A+ABC
A:
Q: Write a program to print the product of a non-empty list of integers, i.e. the result of multiplying…
A: A for loop is used for iterating over a sequence.
Q: Alia suggestion maked mades made
A: Here is the solution:
Q: How does the fingerprinting algorithm work? To achieve your objectives, one of three options is…
A: Similarly, in computer science, a fingerprinting algorithm translates huge data (such as papers or…
Q: Briefly describe the stack parameter.
A: The above question is answered in step 2 :-
Q: Q4/ Convert the following algebraic expressions into expressions in Mat lab: (2) 13) c = √2-a² + b²…
A: I give the code in Matlab along with output and code screenshot
Q: Dot-matrix printers are output devices.
A: Devices for Output: Dot Matrix Printers are a kind of printer that uses dots instead of pixels.…
Q: What kind of connections may be made between human-computer interaction and information technology?…
A: Introduction: Human-computer interaction (HCI) focuses on the design of computer technology,…
Q: It's hard to think of a better example of information and communication technology than the…
A: Information and Communication Technology: The phrase Information and Communication Technologies…
Q: * Root vertex in a derivation tree must be labeled by the start symbol True O False O Instantaneous…
A:
Q: "basic input/output system" is what the abbreviation "BIOS" refers to.
A: Start: The basic input output system, sometimes known as BIOS, is a programme that is pre-installed…
Q: 1.What kind of influence does information technology have on the field of communication? 2. What…
A: technology is the turn of events, upkeep, or utilization of frameworks - - particularly PC…
Q: One way to protect information is by storing it in a private location or on a private network that…
A: The question is to find the statement is true or false.
Q: B-write a program to compute X 1+2+3++100 X= 1x2+2x4+3x6+-+100x200 Matlab
A: The required code for the Matlab program has been coded in the next step with comments for…
Q: Consider the following code. How many times is the function rec_func_2() called in total? options: 0…
A: #lets trace the given code to find out how many times rec_fun2() called in total: def rec_func_2(n):…
Q: How can netstat be used to detect an infection? Is there a security risk for the ports that are…
A: Introduction: Netstat is a command-line utility that displays the number of incoming and outgoing…
Q: What is the relationship between requirements analysis and design modelling?
A: Introduction: Understanding and working with the user's demands is the goal of requirement analysis.
Q: What kind of methods are two or more methods with the same name but different parameterLists?
A: Answer: Method overloaded
Q: Consider an elementary example where we are interested in the mode of the fol- lowing n = 6 points:…
A: The jackknife estimate of the mode, defined by analogy is: Varjack[θ]=n-1n∑i=1n[θ(i)-θ(.)]2 Where as…
Q: In one move a Turing machine, depending :upon The symbol scanned by the tape head O The state of the…
A: Dear learner , hope you are doing well , I will try my best to answer this question. Thank You!!
Q: Make use of online resources to find out about new developments in wireless networking, as well as…
A: Introduction: Learn more about wireless networking trends and construction costs by doing some…
Q: What precautions should be taken to ensure the dependability and availability of a local area…
A: Introduction: A local area network (LAN) is a collection of small computers or other workstation…
Q: Write a C++ program that prints the following figure using for loop ✰✰ *** **** *** **
A: Algorithm: The algorithm to print given pattern is: Start Initialise the variables i, j, n Read the…
Q: Make a difference between the three data modelling tiers.
A: Data modeling is a method of writing a software system using entity relationship diagram (ER…
Q: After then, what transpired with the United States of America?
A: Introduction: In general, a technological revolution increases output and efficiency. Material or…
Q: What are the most recent breakthroughs that have been made in the fields of information technology,…
A: Introduction: The facilities and services that a company need are referred to as infrastructure.
Q: In your opinion, what are the top five email dos and don'ts, and how would you go about illustrating…
A: An email account is the relationship with the email service, and all the storage, features and the…
Q: When a web client requests access to protected server resources, apply native authentication and…
A: Launch: Layering network protocols and services simplifies them by separating them into smaller,…
Q: The link between the four information system functions will be examined, and a visual to depict the…
A: Introduction: Information system hardware includes computers, tablets, cellphones, and disc drives.…
Q: Gray Hat, Black Hat, and White Hat What's the deal with all these hats?
A: Intro Hackers are usually classified into three categories Black hat hackers White hat hackers…
Q: What does it mean for information technology to be so important?
A: Introduction: The use of a collection of computers for data storage, retrieval, and transmission is…
Q: What advancements in computer technology occurred during the 1950s?
A: Introduction: Significant advances in computer technology were made between 1950 and 1959.
Q: Which model comes to mind first when you think about the Verification and Validation Model?
A: Introduction: Validation and verification The techniques for assessing and gaining confidence in…
Q: The question is, should software engineers who work on safety-related systems be required to obtain…
A: Answer:
Q: Simplify the following expressions by applying Boolean rules. M [ N (M+N) ]
A: Boolean rules user for simplification: 1) A(B+C) = AB+AC //distribution 2) AA = A //idempotent 3)…
Q: It is essential to have a solid understanding of the reasons why operating systems work and the…
A: Solution: In the phases that follow, the reasons why interrupt-driven operating systems have a…
Q: Which of the following Turing machine :does consist of Input tape O head state diagram O All of the…
A: All of the mentioned (about turing machine).
Q: Guice is a popular dependency injection library in the Java programming language. However, there are…
A: Introduction: Dependency Injection handles difficulties like how an application or class can be…
Q: difference between the three data
A: Data modeling: Data modeling is a strategy for composing a software system utilizing element…
Q: Determine two widely used system development approaches. What are the primary benefits and drawbacks…
A: List out two mainly used system development methods and write their pros and cons. There are many…
Q: What skills and knowledge are required to be successful as a systems analyst, and what function do…
A: Role of the Systems Analyst Systems Analyst systematically assesses how users interact with…
Q: Describe how to execute a list-based sequential search.
A: Sequential search: It is one of the basic types of search and is occasionally referred to as…
Q: What is the relationship between Information Technology (IT) and Human Computer Interaction (HCI)?…
A: Launch: Human-computer interaction (HCI) is a multidisciplinary research topic that focuses on…
Step by step
Solved in 2 steps
- 4.23 (Financial application: payroll) Write a program that reads the following information and prints a payroll statement: Employee’s name (e.g., Smith)Number of hours worked in a week (e.g., 10)Hourly pay rate (e.g., 9.75)Federal tax withholding rate (e.g., 20%)State tax withholding rate (e.g., 9%) A sample run is shown below:Enter employee's name: SmithEnter number of hours worked in a week: 10Enter hourly pay rate: 9.75Enter federal tax withholding rate: 0.20Enter state tax withholding rate: 0.09Employee Name: SmithHours Worked: 10.0Pay Rate: $9.75Gross Pay: $97.5Deductions:Federal Withholding (20.0%): $19.5State Withholding (9.0%): $8.77Total Deduction: $28.27Net Pay: $69.22 Requirement: Requirements: Input and output must match the format provided in the exercise sample runs Currency must be displayed properly: You must have a dollar sign ($) and 2 places after the decimal (dollars and cents) You must use printf rather than the goofy trick from earlier chapters Appropriate…CONVERT THIS CODE TO C# Code For ATM Withdraw Sysytem C++ code: #include <iostream>#include <stdlib.h>#include <string.h>using namespace std;class Bank { // Private variables used inside classprivate: string name; int accnumber; char type[10]; int amount = 0; int tot = 0; // Public variablespublic: // Function to set the person's data void setvalue() { cout << "Enter name\n"; cin.ignore(); // To use space in string getline(cin, name); cout << "Enter Account number\n"; cin >> accnumber; cout << "Enter Account type\n"; cin >> type; cout << "Enter Balance\n"; cin >> tot; } // Function to display the required data void showdata() { cout << "Name:" << name << endl; cout << "Account No:" << accnumber << endl; cout << "Account type:" << type << endl; cout << "Balance:" << tot << endl; } // Function to deposit the amount in ATM void deposit()…The following struct relates to the questions below. Assume the structure pointed toby pStudent is initialized somewhere else.struct student { // for this problem only assume these two itemsint testScores[20]; // up to 20 test scores savedunsigned char numtests; // number of test scores in list} *pStudent; Write an expression that will give the value of the last test score in the list for thestudent pointed to by pStudent (may be fewer than 20 in the list). C Programming Please!
- CIS 2275 C++ Programming Part I Program 6 Trivia Game In this program, create a simple trivia game for two players. It will work like this: Starting with player 1, each player gets a turn at answering five trivia questions. There are a total of 10 questions. When a question is displayed, four possible answers are also displayed. Only one of the answers is correct, and if the player selects the correct answer, they earn a point. After the answers have been selected for all of the questions, the program displays the number of points earned by each player and declare the player with the highest number of points to be the winner. The players will have the option of playing another round. The flow of the program will be: 1. Show the Header information. 2. Create an array of Question structs. 3. Read the questions from the text file. 4. If the questions were properly read, start a do-while loop. 5. Declare and initialize: a. playerOnePoints and playerTwoPoints b. questionNumber…CIS 2275 C++ Programming Part I Program 6 Trivia Game In this program, create a simple trivia game for two players. It will work like this: Starting with player 1, each player gets a turn at answering five trivia questions. There are a total of 10 questions. When a question is displayed, four possible answers are also displayed. Only one of the answers is correct, and if the player selects the correct answer, they earn a point. After the answers have been selected for all of the questions, the program displays the number of points earned by each player and declare the player with the highest number of points to be the winner. The players will have the option of playing another round. The flow of the program will be: Show the Header information. Create an array of Question structs. Read the questions from the text file. If the questions were properly read, start a do-while loop. Declare and initialize: playerOnePoints and playerTwoPoints questionNumber start a while loop - while…// Airline.cpp - This program determines if an airline passenger is // eligible for a 25% discount. // Harvey Mark, ITSE 1329#include <iostream> #include <string> using namespace std; int main() { string passengerFirstName = ""; // Passenger's first name string passengerLastName = ""; // Passenger's last name int passengerAge = 0; // Passenger's age // This is the work done in the housekeeping() function cout << "Enter passenger's first name: "; cin >> passengerFirstName; cout << "Enter passenger's last name: "; cin >> passengerLastName; cout << "Enter passenger's age: "; cin >> passengerAge; // This is the work done in the detailLoop() function // Test to see if this customer is eligible for a 25% discount if(passengerAge <= 6) { cout << "You are eligable for a discount!\n"; } if(passengerAge >= 65) { cout << "You are eligable for a…
- IN C LANGUAGE Create a structure called employee that holds information like employee code, name, date of joining, department, designation. Write a program to declare 10 employees using array and enter some data into it. Then ask the user to enter the current date. Display and write in a file named “ emp.txt” the records of those employees who are working for 3 or more than 3 years according to the given current date.1. [LO 1, LO 2, LO 3 & LO 4, Treasure Hunter Description You are in front of a cave that has treasures. The cave can be represented in a grid which has rows numbered from 1 to , and columns numbered from 1 to . For this problem, define (x,y ) as a tile that is in the the-x row and the y-row. There is a character in each tile, which indicates the type of that tile. Tiles can be floors, walls, or treasures which are represented respectively by the characters '.' (period), '#' (hashmark), and '*' (asterisk). You can go through the floor tiles and treasures, but you can't get past the wall tiles.Initially, you are in a tile (??, Sy). You want to visit all the treasure squares, and retrieve the treasure. When you visit a treasure tile, the treasure is instantly retrieved, and the tile turns into a floor.In a move, if you are on a tile (?,y), then you can move to the right tile above (?-1,y), right (?,y + 1), down (? + 1, ), and left (?, 1) of the current tile. The tile you visit must…Circle Properties Write a program that prompts for and accepts the diameter of a circle as a floating point number. The program should calculate and output the area and circumference of the circle. A sample run of the program should look like this: Enter circle diameter: 2.5 The area is 4.91 and the circumference is 7.85. Use 3.14159 as your constant for pi. global main ; exposes program entry point to the linkerextern printf ; declare external functionextern scanf section .text ; start of code segment main: push rbp ; preserve base pointer mov rbp,rsp ; copy stack pointer to base pointer pop rbp ; restore base pointer mov rax, 0 ; exit status (0 = success) ret section .data ; start of initialized data segment section .bss ; start of uninitialized data segment section .dataprompt db "Enter circle diameter: ", 0format db "The area is %0.2f and the circumference is %0.2f.", 0pi dq 3.14159…
- .in c language code: A car showroom wants to put cars on exhibition. The cars are to be displayed pricewise tothe customers. Create a structure for storing three details (model, name and price) of 100cars. Display the names of cars having price less than 10 lakhs separately along with theirpriceC PROGRAMMING Given code: struct record{char name[10];int age;};struct record myfriend = {“Dhang”, 24};struct record *ptrtomyfriend = &myfriend; ANSWER THE FOLLOWING: a. Write a C statement showing how to display the value of first member being pointed by ptrtomyfriend, using ptrtomyfriend.b. Write a C statement showing how to display the value of the second member being pointed by ptrtomyfriend. c. Write a C statement showing how to store new value of the members being pointed by ptrtomyfriend.Assignment Description This program will simulate part of the game of Yahtzee! This is a dice game that involves rolling five dice and scoring points based on what show up on those five dice. The players would record their scores on a score card, and then total them up, and the player with the larger total wins the game. A Yahtzee score card has two portions: The upper portion has spaces for six scores, obtained by adding up all of the 1's, 2's, 3's, etc. The lower portion has special scores for various combinations: Three of a kind -- at least 3 dice are the same number;the score is the sum of all five dice Four of a kind -- at least 4 dice are the same number;the score is the sum of all five dice Small straight -- four consecutive numbers are represented, e.g. 2345;the score is 25 points Large straight -- five consecutive numbers are represented, e.g. 23456;the score is 30 points Full House -- three of one kind, two of another; the score is 30 points Yahtzee! -- five of a kind; the…