(21) 2. Write a Java application that asks the user to enter a car model or 'done' when finished. If the user enters a car model, ask the user to enter the color of that car model. Store the cars and colors in ArrayLists of type String. When the while loop completes, use a for loop to print out the car and color as shown below:
Q: Nowadays, you may connect to the Internet using your cell phone or other mobile device, which is…
A: Some of the ways to prevent data loss or theft from a mobile device include: -Avoid using public…
Q: Modern home appliances now come with wireless connection as a given thanks to technical…
A: Wireless technology has helped people in various ways, especially in business where time is profit.…
Q: If the operating system is not routinely patched, what configuration is recommended for each server?
A: Introduction Poor patch management may expose an organization's data to malware and ransomware…
Q: What are the boundaries and scope of cybercrime?
A: Introduction: Cybercrime is defined as any illegal activity carried out with the use of a computer,…
Q: What are the two most frequently used file types? Do these two types of files vary in any way, or…
A: Introduction: A binary code represents text, computer processor instructions, or any other data…
Q: You and a coworker often participate in online role-playing games. Someone recently used malware…
A: Introduction: Three Identity theft hazards when playing: Online gaming is a common danger. Users…
Q: how different operating systems handle files. How can you distinguish NTFS from FAT? no similarity
A:
Q: How do you begin your search for a reporting tool like Tableau? What skills will you need, and how…
A: Introduction: I believe that data visualization is essential to decision-making.Data visualization…
Q: What sets materialized views apart from other views in comparison to the others?
A: In this question we need to explain how materialized views are different from the other views in…
Q: What is TCP/IP protocol model?
A: Let's discuss the TCP/IP protocol model with each layer in detail:- TCP/IP protocol model TCP/IP…
Q: E-commerce has been more and more popular recently. What are the main factors that contributed to…
A: E-commerce has been more and more popular recently. The main factors that contributed to this…
Q: The possibility of Business Process Re-Engineering helping a corporation restructure its Information…
A: Given: Procedures in Business Re-engineering a company's business process refers to the act of…
Q: thanks but can i get this in the java language?
A: Code in java: import java.util.*; public class FindAlpha { static boolean isApha(char c) {…
Q: A data mart is precisely what? What does a data mart serve as?
A: info Mart: - That's why it's put to work for a certain purpose. It's a database for handling…
Q: Describe the Domain Name System, including its many forms, purposes, uses, and problems.
A: DNS security The Domain Name System (DNS) has vulnerabilities that hackers have discovered over time…
Q: What feature of filesystems stands out the most? In your answer, provide one filesystem example.
A: Example of File System: The Network File System (NFS) and the a Andrew File System are two examples…
Q: A cyberattack on the network system had an effect on the protocol.
A: Answer is given below:
Q: What methods and tools are available to deal with issues before and after a release?
A: Introduction: Error in calculations. This may be due to a novice coder. If the programmer is…
Q: What are the best methods for reducing the energy consumption of computer hardware?
A: Introduction: Get an 80%+ certified power adaptor since they are the greatest at keeping your cost…
Q: How does single-user multitasking operate? What is it? Explain using instances from ordinary life…
A: Introduction: A single user multitasking operating system enables a single user to run numerous apps…
Q: What will the value of eax be after this sequence? O 8 09 O 10 mov eax, 10 push eax dec [esp] inc…
A: Answer: 10
Q: Discuss five characteristics of of Decisions Support Systems
A: A decision support system is an internal business element that provides owners, executives, and…
Q: Do you know that a computer is a piece of technology with a lot of parts but no energy needed to run…
A: Computer: The computer is an electrical device capable of storing, retrieving, and processing data.…
Q: Distribution-based systems: Give a definition of the term "distributed systems." What important…
A: provided data: Systems that are distributed: Give a definition of the term "distributed systems. "…
Q: How would you manage the data flow between client and server apps when creating a multimedia…
A: A client/server network is a medium through which clients access resources and services from a…
Q: A storage device that the operating system does not recognize has been connected to your new MacBook…
A: Required: Your brand new MacBook Pro has a storage device attached to it that is not recognised by…
Q: Is it possible to lock yourself out during a transaction? Could you please tell me when this…
A: Introduction: Transaction locks.Locking uses lock modes, lock granularity, and transaction isolation…
Q: Choose one of the names of the next technologies from the list below: Internet of Things or 3D…
A: With these two technologies, we must provide an explanation of the technology and its uses. IOT…
Q: Why are formal software project management techniques required? What are your FYP/research…
A: Give a concise explanation of the necessity for formal software projects in your own words.…
Q: how several manifestations of cybercrime may occur Cybercrime could be avoided by creating new…
A: Introduction: When private information is intercepted or disclosed, whether intentionally or…
Q: 22FA CSC321-PRINCIPLES OF PROGRAMMING LANG 98312 Modify the following ambiguous grammar to…
A: Unambiguous Grammar A grammar can be unambiguous if the grammar does not contain ambiguity that…
Q: What are the advantages and disadvantages of using a probabilistic model for information retrieval?
A: PROBABILISTIC MODELS IN INFORMATION RETRIEVAL DEFINITION: In order to rate the matched documents in…
Q: the characteristics of the microprocessor that affect its speed. What will you say in answer, then?
A: The most important performance characteristic of a microprocessor is the speed at which it can…
Q: The hardware used to replicate Pep/9 has 64K memory. But what is its purpose? So far, just 0x0030 of…
A: Pep/9 equipment: The three parts that make up the Pep/9 hardware are the disc, the CPU, and the main…
Q: How do you add a link to an email message's body on a Windows computer?
A: Given: The first thing you need to do is log in to your Gmail account so that you may embed a link…
Q: What exactly is OWASP Zed Attack Proxy (ZAP), also known as WebScarab? Its place in security testing…
A: Introduction: OWASP ZAP: OWASP (Open Web Application Security Project) ZAP is a popular security…
Q: Modern home appliances now come with wireless connection as a given thanks to technical…
A: Given: Users are able to connect network devices wirelessly, eliminating the need for cables in the…
Q: Why is it possible that when you look at a folder's properties, the Security tab is missing from the…
A: Introduction: Folder security is provided by Security, which prevents anyone from accessing the…
Q: what does the word "computer" mean?
A: A device that accepts information and manipulates it for some result based on a program or sequence…
Q: e potential of artificial intelligence in light of its current developments
A: in the following section we will be discussing about the potential of artificial intelligence in…
Q: In message synchronization, what is a rendezvous? When receive blocks, but send is non-blocking When…
A: Message sychronization , rendezvous
Q: number to month name in dataframe in pandas
A: Lets see the solution.
Q: Depending on what it does, it may also go by the names hub, repeater, firewall, T-connector, or…
A: Introduction: Network devices are the pieces of hardware that allow you to link many sources and…
Q: Given the context Free Grammar G = {{S}, {a, b, +, x), P, S} where P consists of the following…
A: Hi please find the solution below and I hope it would be helpful for you.
Q: Making sure that only approved packets enter the network is the responsibility of a router,…
A: Answer: Among computer networks, a router is a networking device that forwards data packets. On the…
Q: Why should we test and evaluate the performance of neural networks?
A: A neural network is a collection of algorithms that aims to identify underlying links in a piece of…
Q: You and a coworker often participate in online role-playing games. Someone recently used malware…
A: When playing the game Identity Theft, there are three potential risks: It is one of the common risks…
Q: research "primary and foreign keys" and summarize your findings. In your writing be sure to answer:…
A: Primary Key: What are they? An primary key is a field in a table which extraordinarily recognizes…
Q: In this problem, we wish to design and build components of an assessment management system using…
A: import ballerina/io; import ballerina/grpc as grpc; ReposityOfFunctionsClient ep = check new…
Q: What are five examples of software applications that the government and business consider to be…
A: What it mean legal and illegal software applications : Software platforms created especially to…
Step by step
Solved in 4 steps with 3 images
- (Practice) a. Write output statements using cout that can be used to display values from the first, third, and seventh elements of each array declared in Exercise 2. b. Write a for loop that can be used to display values for the complete array declared in Exercise 2.CODE IN JAVA design a program that grades arithmetic quizzes as follows: (Use the below startup code for Quizzes.java and provide code as indicated by the comments) 1. Ask the user how many questions are in the quiz. 2. Use a for loop to load the array. Ask the user to enter the key (that is, the correct answers). There should be one answer for each question in the quiz, and each answer should be an integer. They can be entered on a single line, e.g., 34, 7, 13, 100, 8 might be the key for a 5-question quiz. You will need to store the key in an array called "key". 3. Ask the user to enter the student's answers for the quiz to be graded. There needs to be one answer for each question. Note that each answer can simply be compared to the key as it is entered. If the answer is correct, add 1 to a correct answer counter. need this in a separate for loop from the loop used to load the array. 4. When the user has entered all of the answers to be graded, print the number correct…Task 1: Find the longest word Implement the function findLongestWord that takes as an argument an array of words and returns the longest one. If there are 2 with the same length, it should return the first occurrence. Write the JS code in a separate file. You can use the following array to test your solution: var words = ['mystery', 'brother', 'aviator', 'crocodile', 'pearl', 'orchard', 'crackpott'];
- PART B. Write a program, Passwords, that contains an array of five names and another array of five passwords(your choice). Your program should ask the user to enter a name and a password. If the user enters the correctname with its related password, grant access (e.g. display “Access granted!”). IF the user enters the wrongname/password (can be either or both), allow the user to re-try only once. You don’t have to use nested loops.If the user still cannot enter the correct name/password, display the following: “Sorry, yourusername/password does not match our database. Contact the administrator.PART B. Write a program, Passwords, that contains an array of five names and another array of five passwords(your choice). Your program should ask the user to enter a name and a password. If the user enters the correctname with its related password, grant access (e.g. display “Access granted!”). IF the user enters the wrongname/password (can be either or both), allow the user to re-try only once. You don’t have to use nested loops.If the user still cannot enter the correct name/password, display the following: “Sorry, yourusername/password does not match our database. Contact the administrator.” Scanner in = new Scanner(System.in);// Arrays for usernames and corresponding passwords.// The username at index 0 corresponds to the password at index 0,// the username at index 1 corresponds to the password at index 1,// and so on.// You can customize the login info by modifying the arrays below:String[] usernames = {"user1", "user2", "user3", "user4", "user5"};String[] passwords =…4. In C 8] ► Write a program that will read from the user 5 numbers into an array and later search for themaximum. BUT, the program will ask the user if ALL the numbers will be integers or float (use a flag).The array will be of unions (float and integer). So the program and the array will work for float numbersor integers.
- What is the output of the following code? int[] a = {10, -28, 33, 28, -49, 56, 49}; Arrays.stream(a) .map(Math::abs) .forEach(System.out::println);3.6.5: Printing array elements separated by commas. Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print:90, 92, 94, 95 Your code's output should end with the last element, without a subsequent comma, space, or newline.7.10: Tic Tac Toe (sort of)Write a program that will allow two users to playtic-tac-toe. The program should ask for movesalternately from player X and player O. Theprogram displays the game positions as follows:123456789 The players enter their moves by entering theposition number (a single digit, 1-9) theywish to mark. After eachmove, the program re-displays the changed board.A sample board configuration is as follows:XXO456O89 SAMPLE RUN #1: ./ETest Interactive Session 1 2 34 5 67 8 9Enter move:1X 2 34 5 67 8 9Enter move:2X O 34 5 67 8 9Enter move:3X O X4 5 67 8 9Enter move:4X O XO 5 67 8 9Enter move:5X O XO X 67 8 9Enter move:6X O XO X O7 8 9Enter move:7X O XO X OX 8 9Enter move:8X O XO X OX O 9Enter move:9X O XO X OX O XGame over!
- C++ Problem!! Sort A List Of Integers Given a file of 100,000 unsorted integers, write a program that first prompt user to enter file name and reads those integers into an array and sorts the integers in the array. The program should then prompt the user for an index, and then display the integer at that index. For example, if the array contains ten integers and the contents are 79 4 42 51 12 22 33 17 91 10 after sorting, the integer at index 6 is 42 Download the "List of 100,000 Unsorted Integers" from below link and sort that list, then enter the value at index 10000 (ten thousand) for a screenshot. https://1drv.ms/t/s!AuFS4mkcuYyBjHZ_SIudb93bq2uy?e=CsyvZj2. Identify and correct the errors in each of the following statements: a) if ( c !< 17 ); window.alert( "c is not less than 17" ); b) if ( c =< 17 ) window.alert( "c is equal to or less than 17" ); c) while ( c <= 5 ) { product *= c; ++c; d) if ( gender == 1 ) document.writeln( "Woman" ); else; document.writeln( "Man" ); e)var a = new Array( 20); for ( varj = 0; j = 30, ++i ){ a[ j ] = 0; }3. Write a C# application that asks the user to search for an item in the array. Input an array of 10 elements and the search item. If the item is found in the array, display the location of the item in the array. Otherwise, display appropriate error messages.