3. Write and test a function getDigits(s) that returns a string of all digits found ins (in the same order). For example, getDigits(**1.23a-42') should return '12342'.
Q: 1. Build an adjacency matrix for the graph in the figure below 2. Build a list of successors for the…
A: 1. The thumb rule is to put a 1 if a node is directly connected to each other if A--->B, then…
Q: What does it mean to talk about a "computer"?
A: Introduction: Computers are increasingly employed in banking, medical, finance, and education. With…
Q: In order to decrypt data and system instructions before processing them, many ways have been…
A: Numerous methods have been developed to decrypt data and system instructions before processing…
Q: Write an algorithm to solve the following price-averaging program that asks the user how many…
A: The algorithm and the code are given below with screenshots As the programming language is not…
Q: Suppose you have 20 features and the 20 Principal Components you extracted. Outline the next steps…
A: Answer is given below-
Q: Using Scilab i need the code and Use For Loop to o read the N entries from the user and display the…
A: Scilab Scilab is abbreviation of Scientific Laboratory. It is an open source software where a user…
Q: The objectives for the usability and user experience of the assessment were broken down in what way?
A: The steps below contain the whole solution and explanation. => Practicality It's a crucial…
Q: Identify any significant hardware problems that a computer may have, as well as the underlying…
A: Possible fault: A fault is a mistake or an error that is caused by skipping work, such as updating…
Q: What are the software testing PLANNING RISKS? justify
A: What is risk management. Risk management is the process of identifying, assessing, and prioritizing…
Q: What is "white box testing?" Is white box testing really necessary?
A: Start: White Box Testing: White box testing is concerned with the programing code's inherent logic…
Q: Program in python There is function F. Give an integern (n 2 2), consider the prime factorization n…
A: I have done this program myself. As you can see in the problem value of 125 largest prime factor is…
Q: Explain the need for diverse testing strategies at various stages of the software development life…
A: 1.Testing approach: Testing is like one of the most crucial steps in the Software Development Life…
Q: Exactly what does the abbreviation SDLC stand for, and what does an SDLC show us?
A: The Software Development Life Cycle is like a well-defined procedure for producing high-quality,…
Q: Using JavaScript add CSS create a rectangle changes color and size when the mouse is passed attic…
A: Answer:
Q: Consider the main memory sıze of 128 kB, Cache sıze of 16 kB, Block size of 256 B with Byte…
A: Main memory size = 128KB = 17 bits Total number of cache block = 16KB/256 = 64 Block size = 256 B.…
Q: Suppose we have two 2-dimensional arrays a and b, and consider the following C code. int a[4][4];…
A: Here we have given the cache misses wrt to array a and b. You can find the solution in step 2.
Q: Is SAP HANA capable of implementing OLTP and OLAP?
A: Introduction: SAP HANA is the most recent distributed in-memory database and platform that may be…
Q: Simplify the function F(A,B,C,D)=A'C'D+ A'D+B'C+CD+AB'D' using Kmap. Draw the logic circuit for the…
A:
Q: Write a program in C++ to read a sequence of integer numbers until a negative number is entered,…
A: Input the numbers in a vector. Create a function to find and print the sum of numbers in the vector.
Q: What are the computer's three most basic parts?
A: Explanation: A machine is made up of a few fundamental parts.Hardware, apps, programmers, data, and…
Q: Write a program, which returns the index of the minimum repeating element of the array in Jinear…
A: Given: Write a program, which returns the index of the minimum repeating element of the array in…
Q: Alice and Bob are using the ElGamal cipher with the parameters ?=19p=19 and ?=2α=2. Their parameters…
A:
Q: To what extent do intrusion detection and prevention contribute to overall network safety and…
A: The above question is solved in step 2:-
Q: List and discuss four vulnerability intelligence sources. Which seems to be the most efficient? Why?
A: Given: 1. Vendors as the first step2. Organizations affiliated with CERT 3. Access to public…
Q: (To write a COMPLETE C program) Prepare a menu-driven C program for Inserting and deletion operation…
A: #include<stdio.h>// structure struct student { char st_name[30]; int TC;…
Q: To what extent do intrusion detection and prevention contribute to overall network safety and…
A: Introduction: A network intrusion detection system, often known as an NIDS, is vital for the…
Q: st and discuss four vulnerability intelligence sources. Which
A: 1. Vendors2. Organizations that provide CERT3. Resources available on the public network4. Websites…
Q: What improves the efficacy of intrusion prevention?
A: A network intrusion prevention system (IPS) analyses network traffic patterns to identify and…
Q: Write a program in C++ to read a sequence of integer numbers until a negative number is entered,…
A: ALGORITHM:- 1. Take input for the numbers using the loop until a negative number is entered. 2.…
Q: Q12b) Differentiate these network performance metrics: bandwidth, throughput,goodput and latency.
A: Q12b) Network Performance Metrics: 1.Bandwidth: The concept of network bandwidth can be complicated,…
Q: What is SDLC? What are the names of the various phases?
A: SDLC stands for Software Development Life Cycle it is the process used by software companies to…
Q: IP Addressing and Subnetting Problem Solving Perform what is being asked. Compute the following…
A: Binary numbers Binary number system is base 2 number system in which digits 0-1 must be used to…
Q: Explain what software security is and why it is so important in the software development process.
A: The following are the key benefits of using a secure SDLC: By including all stakeholders in security…
Q: In C, I need help in creating a function that will randomly select a line between 1 till 50 and then…
A:
Q: What are the five most common issues that a computer might suffer from? (B). What are the best…
A: Troubleshooting Abilities: Problem resolution is all about assessing and resolving issues. This…
Q: When doing the evaluation, what was the breakdown of the usability and user experience objectives…
A: Foundation: Usability is a more limited notion than user experience since its primary concentration…
Q: In what ways were the goals for usability and user experience broken down throughout the evaluation?
A: According to the information given:- we have to define the ways were the goals for usability and…
Q: To measure software
A: It should meet the below criterias 1) Size. 2) Complexity 3) Quality. 4)Product Quality.…
Q: What is an Interrupt, and how does it differ from a normal interruption? Detail the various sorts of…
A: Hardware disruptions are expected, and their many sorts will be described: A hardware interrupt is a…
Q: Q3/ A) Create the following matrix by using the MATLAB built-in functions (zeros, ones, eye) 0 0 0…
A: According to the information given:- we have to follow the instruction to write MATLAB script.
Q: Explain the requirements on both the sender side and the receiver side that will ensure both the…
A: Solution 1) Let's see what are the requirements needed on both the sender side and the receiver side…
Q: How does the system life cycle relate to the system development methodology?
A: Define: The system life cycle is a six-stage process that includes feasibility study, system…
Q: Your Windows machine launches to a blue screen with no Start screen or desktop. What is the first…
A: Your Windows system starts up with a blue screen of death and no Start menu or desktop. first you do…
Q: Write a Python funciiviñ called add_daily_temp that is given a (possibly empty) dictionary mea:ni to…
A: 1) Below is program that defines a function add_daily_temp which accept a dictionary containing…
Q: In the C# programming language, provide a code sample of a partial class.
A: Sample of partial class.
Q: What is the most important quality a Software Test Engineer must possess?
A: Test Engineer must possess: T is a fast-paced field in which new technologies are quickly invented…
Q: Are you familiar with SDLC, or do you know what it is? The names of their distinct phases
A: SDLC is like an abbreviation for Software Development Life Cycle. It entails the stages involved in…
Q: What are the things to keep in mind while switching from one system to the next? Why don't you go…
A: When migrating from one system to another, keep the following in mind: Changing a single…
Q: What is an Interrupter? Detail each kind and explain why no hardware failures are anticipated.
A: Introduction: Interrupt Any condition that causes programme execution to halt (or stop) and CPU…
solve in python
Step by step
Solved in 4 steps with 2 images
- Create a function sumofAllOdd(s,e) that will return the sum of all odd numbers in a range of inputted numbers s (starting number), e(ending number). For example: Test Result sumofAllOdd(22,55) sumofAllOdd(5,10) Answer:(penalty regime: 10, 20, ... %)Write a function replace_head_tail that takes a string str1 and replaces the first X and last Y characters of the string and returns the resulting string. For example, replace_head_tail("corona virus", 4, 3) returns "rusna vicoro".uestion 42: Return whether a string consists of a single letter In the function below, return True if the input string parameter consists of a single uppercase letter; otherwise, return False. Most solutions would do this in two logical steps: first testing if the string consists of a single character and, second, testing whether that character is one of the uppercase letters (which can be done by seeing if it is alphabetically between A and Z, inclusive).
- 7. Write a function password_check() that takes as input two stringsnewpassword and oldpassword, and that accepts the new password (i.e., returnsTrue) if newpassword is different from oldpassword and newpassword is atleast 6 letters long. If the new password fails the check, your functions should returnFalse.>>> password_check('E10-s2ff', 'E10.s2ff')True>>> password_check('E10sf', 'E10.s2ff')False>>> password_check('E10-s2ff', 'E10-s2ff')False(Extra Credit) For extra credit, extend your password function so that it also checks thatthe new password contains a digit.>>> password_check('E10-s2ff', 'E10.s2ff') True>>> password_check('Eej-sdff', 'E10.s2ff')False3. Write a function that uses regular expressions to extract SIN numbers with either dashes or spaces between the numbers, but not any other characters. E.g. the string 'My SINs are 123-456-798 and 987 654 321, and 987/432/321' should return the list ['123-456-798', '987 654 321']Complete the below function which takes an integer k and a string s as its arguments and returns a string formed by the every k'th character of s. Forexample, given k = 3 and s = "Burkay Genc is my teacher", your function shouldreturn "rye ae", because:Burkay Genc is my teacher^ ^ ^ ^ ^ ^ ^ ^1231231231231231231231231If there are not k characters in s, then the function should return empty string.
- Write a function str_replace that takes three strings, str1, str2 and str3; and replaces the first occurence (if any) of str2 in str1 with str3, and returns the newly formed string. For example, str_replace("Nuclear Energy Engineering", "Nuclear Energy", "Mechanical") returns "Mechanical Engineering"Write a function called reverse that takes a parameter N which is a string and returns the reverse of the string.Write a function reverse(instring) to take a string and reverse it.
- Write a function that counts and returns the number of vowels in the string. (For the purposes of this exercise, we are talking about the standard 5 vowels -- A, E, I, O, U). Write a function that counts and returns the number of consonants in the string. Write a function that converts the string to all lowercase. Write a function that converts the string to all uppercase. Write the following functions. Each of these functions should have a single parameter -- accepting a c-style string as an argument. The function should only do what is specified (note that none of these functions do any output to the screen). Your functions should use const in the prototype wherever it is appropriate: Write the main function that offers a menu and allows the user to test the functions you have implemented. Program C++, must use c- stylein c++ write a code where: Let a and b be integers such that either a or b is nonzero. The greatest common divisor, written gcd(a, b), of a and b is the largest positive integer that divides both a and b. Your program must contain a function that takes as input two integers and returns the gcd of the integers.C++ : .Write a function that, given two strings, creates another string that contains only the common characters of thetwo strings. One solution is to first remove the duplicate characters from each string before creating the string withcommon characters (Ex 04).