C++ Code is allowed: Sachin has a rectangular paper of his usual work. Sachin knows that he will find more time to work hard if he cuts rectangular sheets into squares. So, with this in mind, he decides to divide his rectangular sheet into smaller pieces of paper, so that each square sheet has the same space, and the square sheets separate the rectangular one evenly. So, your job is to find a small number of square sheets that have the same area, which can be made of rectangular sheet, so that they fit neatly. Input 1 46 Output 6
Q: The processor's requirements must be included in every instruction. Discuss the specifics of what is…
A: The following items are needed by the processor for execution: Operation code Source operand…
Q: Q4/Write a mat lab program call matq3.m that returns the plot of the 2-D space defined by the…
A: % Choose a range for x and use 500 points.X = linspace(-20, 20, 500);% Create YY = X .* cos(X) .*…
Q: Numpy and Pandas libraries are said to be similar in functionality. Briefly describe the…
A: Pandas and NumPy: Pandas and NumPy both are python libraries. Both are libraries and very popular…
Q: A vulnerability assessment is an important part of network security and defence.
A: According to the question, we must describe the relevance of vulnerability assessments as…
Q: Is it true that there are several processing methods? Do you know which of these are sequential and…
A: Several processing methods: It's a computer method. Information is retrieved, transformed, and…
Q: Assume that the public concrete class House is defined, which of the following statements is ALWAYS…
A: Introduction Object class can be defined as the element or the instance of a class. Object can be…
Q: Q.13 Disscuss at least 4 challenges in cloud computing.
A: Answer in step 2
Q: It is possible to get a comprehensive list of all the different types and functions of malware.
A: Given: Malware is a general term that relates to malicious software such as Malware, ransomware, and…
Q: How many select statements from the same table may be combined?
A: Answer:
Q: . If a five-digit number is input through the keyboard, write a progra ew number by adding one to…
A: solution in below step
Q: create a simple payroll program that applies object-oriented concepts. c#
A: The code is given in the below step
Q: 2. Write an algorithm to print the numbers at even positions from a given array A. Assume the array…
A: Let us see the below algorithm.
Q: Create a Java program. Write statements that will output: Hello, my name is “put your name here.”,…
A: Java program with required specifications, is attached in the article. This Java program imports…
Q: Give examples to show at least two different ways to select subset of rows from a dataframe data.
A: #To select multiple rows use :df.loc[[1,5,7]]
Q: Having a solid understanding of computers gives a variety of advantages, not just when it comes to…
A: Adopting Technological: Adoption of technology is a word that describes the process through which a…
Q: Create a Java program in BlueJ called FlowControl. Include your main method. Create three…
A: JAVA PROGRAM: import java.util.*;public class FlowControl{ public static void first_method() {…
Q: Imagine this: Your company's mail server sends you an email warning you that your password been…
A: Phishing is a kind of malware that includes the theft of passwords. The computer system gives the…
Q: Q3/ The electric field at a point situated at a distance d from straight charged conductor is (a)…
A: The electric field at a point situated at a distance d from straight charged conductor is None of…
Q: Construct the context free grammar G and a Push Down Automata (PDA) for each of the following…
A: The context free and PDA : Context free grammar: It is used to generate all possible strings in a…
Q: The curriculum for technology in education has two distinguishing traits. Identify and discuss each…
A: Curriculum for technology: Connecting to the internet is just one aspect of a technology curriculum.…
Q: A description of how Moore's Law influences an organization's ability to manage IS and what an…
A: According to Moore's Law, a single microchip's computer capacity should double every two years as…
Q: Give a real life example of standby sparing technique. Explain necessity of Fault masking &…
A: The standby sparing technique has been applied in many industries to achieve fault-tolerance and…
Q: Learning influences a person's physical and cultural development.
A: Answer in step 2
Q: Q.13 Disscuss at least 4 challenges in cloud computing.
A: INTRODUCTION: Cloud computing alludes to whatever includes offering facilitated types of assistance…
Q: Given a String [] arr, print a pair of items together in one line until all the pairs are printed. A…
A: String array is given and we need to print a pair of item together separated by comma. We can use…
Q: Identify the most crucial SDLC stage and include at least two examples/scenarios to back up your…
A: SDLC: Project planning and requirements are the SDLC's core components. Without initially…
Q: Suppose you build a classifier on a given data set with two classes, namely positive and negative…
A:
Q: Do people with physical or mental limitations benefit from using the internet? What new technology…
A: Given: Is the Internet beneficial for persons with physical or mental disabilities? What new…
Q: A symmetric block cipher's hardware components may be summarised as follows: Explain each of the two…
A: Utilizing a single key, symmetric encryption scrambles (encodes) and unscrambles (interprets)…
Q: What exactly is data encryption? To what extent does it impact network security
A: Network Protection: The word "network security" comprises a broad range of technologies, equipment,…
Q: Encryption is the most effective tool for avoiding the loss of sensitive data.
A: Data encryption: Data encryption converts information into a different form, or code, so that only…
Q: Consider the following MATLAB code: a=1; while a<=6 a=3*a-1; end How many times the loop repeats?…
A: Given a=1 The condition of the while loop is a<=6 1<=6 (condition true) So, the code inside…
Q: Q3 Matlab A) Solve the following linear equations (i.e., determine w,x,y,z values) 4w + y +3z -z =…
A: Code: syms w x y z eqn1 = 4*w+y+3*z-z == 10; eqn2 = 3*w+4*x+2*z == 13; eqn3 = 10*x-5*y-z…
Q: Given the following statement: Paper paper = new Paper("A4", 80); where "A4" is the paper size and…
A: Step 1st: Private Attributes of papersize and paperweight; Step 2nd: Constructor of Paper class Step…
Q: Do you know how to write about the Internet? What are the most important parts of the Internet…
A: The operation of the internet: The internet operates through a packet routing network that adheres…
Q: CONVERT THIS PYTHON CODE TO FLOWCHART def main(): print("Hello World!") #Store the…
A: The flowchart for the program is given below along with the output
Q: Explain the difference between the following with simple example 1. plot and plot3. 2. H1 line and…
A: 1. The main notable difference is that mesh draws a three-dimensional surface while plot3 only draws…
Q: | IF A = -4 0 3 3 -21 -1 The Cofactor Matrix is :- 0
A:
Q: Let's say two students want to sign up for the same course, but there is only room for one more.…
A: Answer: in database we have concept of locks where when we try to update a record we need to acquire…
Q: Q7/ For an electronic circuit, a signal to noise power ratio of 30db and a bandwidth of 2.7kHz, the…
A: Here in this question we have given a Signal noise power ratio of 30 db. bandwidth = 2.7 khz Find…
Q: An electrical interconnection that allows 8 or more bits of data to be sent simultaneously is known…
A: In light of the fact that: What is meant by the term "parallel interface" when referring to an…
Q: Does the latest security breach involving access control and authentication that made news seem to…
A: A data/security breach happens when private or protected information is exposed. A data breach might…
Q: What does the SDLC waterfall model include exactly? Explaintion
A: INTRODUCTION: The systems development life cycle, otherwise called the application development life…
Q: Write and submit a small malware program (both compiled exe and sourcecode copied in a word doc) The…
A: SETTING UP THE ENVIRONMENT pip install pyAesCrypt pip install pyautogui pip install tkinter LOCKER…
Q: Create a simple payroll program that applies object-oriented concepts. For PC users, create a…
A: The solution to the given question is: STUDENT RECORD WINDOWS FORM APPLICATION using System;…
Q: In what ways are serial and parallel processing different? Also, what are some of the…
A: processing, as well as a discussion of their characteristics and cases: The following are some…
Q: Q.65 WAP to plot sine and cosine value by subplot() function.
A: answer: Code : import numpy as npimport matplotlib.pyplot as plta = np.arange(0, 10, 0.1)b =…
Q: Is it possible to explain how integrated circuits evolved into microcomputers?
A: Intro Yes, it is possible to make sense of the incorporated circuits prompted by microcomputers.…
Q: What impact will AI have on the world? Now, which artificial intelligence-based software programmes…
A: INTRODUCTION: Artificial intelligence is a part of science where robots, especially PC frameworks,…
Q: Create the UML Diagram for this java code import java.util.Scanner; interface Positive{…
A: The class diagram is one of the UML diagrams. The class diagram contains all the interfaces and…
Step by step
Solved in 2 steps with 2 images
- Do in C++ programming Super Mario is on the run collecting coins. In level # 1, whenever he takes a coin, the next coin is automatically blocked with an iron brick. Which coins should Mario take in order to maximize his gains?(see image) In level # 2, the same rules of level 1 apply, but with a twist: Mario has a bag that can take only a limited number of coins. Which coins can Mario take in order to maximize his gains (provided that the coins fit inside his bag)? Implement the following function for level# 2 using C++: unsigned max_coins(vector<unsigned> coins, unsigned capacity)i want code in python PrepBuddy And You You and PrepBuddy are standing at the two opposite ends of the line and playing a game. There are NN candies placed in a line. PrepBuddy starts eating candies from left to right and you start from right to left. For each candy, the time needed to finish the candy is given. When the player (PrepBuddy or you) finishes the candy he immediately starts with another. It is not allowed to eat two candies at the same time, to leave the candy unfinished, and to make pauses. If both players start to eat the same bar simultaneously, You leave it to PrepBuddy as a true gentleman. How many candies each of the players will consume. Input format The first line contains a single integer TT - the number of test cases. The first line of each test case contains a single integer NN - the number of cadies. The second line of each test case contains NN - space separated integer T1,T2......TNT1,T2......TN- the time to finish ithith candy. Output format For each test…Python programming It is given a non-negative number x, the decimal portrayal of which contains n digits. You need to shading every its digit in red or dark, with the goal that the number shaped by the red digits is detachable by A, and the number framed by the dark digits is distinct by B. Somewhere around one digit should be shaded in every one of two tones. Consider, the include of digits shaded in red is r and the include of digits hued in dark is b. Among all potential colorings of the given number x, you need to yield any to such an extent that the worth of |r−b| is the base conceivable. Note that the number x and the numbers shaped by digits of each tone, may contain driving zeros. instance of painting the number x=02165 of n=5 digits for A=3 and B=13. The red digits structure the number 015, which is detachable by 3, and the dark ones — 26, which is distinguishable by 13. Note that the outright worth of the distinction between the counts of red and dark digits is 1, it is…
- WRITE CODE IN C LANGUANGE On their way down the river, Jojo and Lili saw two frogs each in position X1 and X2. The two frogs are seen jumping happily towards the same direction that is come to Jojo. After watching the two frogs, Joio and Lili saw that the speed the two frogs are different. The first frog to start jumping from position X1 has a speed of v1, while the second frog that starts to jump from position X2 has a speed of V2. Joig guess that "YES" both frogs will be in the same position in a certain time T, while Bibi guessing "NO" the two frogs will never be in the same position in time. Help Joio and Lili calculate the frog's movements to determine whether the guess they are rightThis is a JAVA programming assignment. Program a GeneticAlgorithm to find an integer number between 0 and 31 that maximizes the function f (x) = x2.The initial procedure is given as below.• Population size: 6• Crossover probability: 100%• Mutation probability: 5%• Terminating criteria:o When your program produces an average of candidates is equal to or greater than29, then you can accept it as a terminating condition.• Fitness function:o You can use the function itself (f (x) = x2)as your fitness function.1. For the 1st generation, you need to print the process and result of selection, crossover, andmutation operation.you need to print the corresponding integer values and bits (binary values)of selection, crossover, and mutation operation. You also need to decide andprint the crossover point and the mutation point.2. From the 2nd generation, you do not have to print all results of selection, crossover,mutation operations. You can just print the result of each generation. Please provide…This program in C++ will obtain from the user a full name, a current annual salary, and apercent increase due on that salary. Assume that the new pay rate should have been ineffect on January 1, and it is now July 1. Calculate, store, and output the new annual salary,the new monthly salary, and the retroactive pay due. Retroactive pay is the differencebetween what they should have received had they gotten their raise on Jan. 1 and whatthey did receive.
- Write a program in C++ that reads HAND_SIZE cards from the user, then analyzes the cards and prints out the type of poker hand that they represent. (HAND_SIZE will be a global constant, typically 5, but your program must still work if it is set to something other than 5.) Poker hands are categorized according to the following hand-types: Straight flush, four of a kind, full house, straight, flush, three of a kind, two pairs, pair, high card. To simplify the program we will ignore card suits, and face cards. The values that the user inputs will be integer values from LOWEST_NUM to HIGHEST_NUM. (These will be global constants. We'll use LOWEST_NUM = 2 and HIGHEST_NUM = 9, but your program must work if these are set to something different.) When your program runs it should start by collecting HAND_SIZE integer values from the user and placing the integers into an array that has HAND_SIZE elements. It might look like this: Enter 5 numeric cards, no face cards. Use 2 - 9. Card 1: 8 Card 2:…Write a program using c++that plays a dice game called "21" It is a variation on BlackJack where one player plays against the computer trying to get as close to 21 as possible without going over. Here are the rules of the game: You will play with dice that have numbers from 1 to 11. To win, the player or the computer has to get to 21, or as close as possible without going over. If the player or computer goes over 21, they instantly lose. If there is a tie, the computer wins. Starting the game: The player is asked to give the computer a name. For now, we'll simply call the computer opponent, "computer." The game starts with rolling four dice. The first two dice are for the player. These two dice are added up and the total outputted to the screen. The other two dice are for the computer. Likewise, their total is outputted to the screen. Player Loop: If a total of 21 has been reached by either the player or the computer, the game instantly stops and the winner is…C++ Write a program that simulates the minute-by-minute operation of a checkout line, such as one you might find in a retail store. Use the following parameters: Customers arrive at the checkout line and stand in line until the cashier is free. When they reach the front of the line, they occupy the cashier for some period of time (referred to as ServiceTime) measured in minutes. After the cashier is free, the next customer is served immediately. Customers arrive at the checkout line at ArrivalRate per minute. Use the function included below (customerArrived()) to return the number of customers arriving in a given minute, determined randomly. The line can only hold so many people, MaxLineSize, until new arriving customers get frustrated and leave the store without purchasing anything. The overall time of the simulation is SimulationTime, measured in minutes. The program should take 5 inputs (to be read from a text file named simtest.txt, one per line): SimulationName - a string…
- write a program in C++ that A user needs to determine the size of squares (let say delta) in a grid, the center of the circle (does not have to lie on a grid but it can!) and the radius. (for example use "cin>>" ) Then you need to plot a circle using parametric equations of circle (you need to increase angle and plot these (in my picture black) points). First plot the first point of the circle and determine in which square of grid it is. (in my picture it is an orange square) and plot the left bottom vertex of this square (in my picture it is a blue point). Then increase an angle and plot next point of circle - check if it lies in different square. -If it is not in different square, you need to increase angle and check again. (because an angle was too small) -If it is the different square, then check, if this square has THE COMMON EDGE with the previous one -> if it has the common edge, then print new left bottom vertex of this square (if does not have common edge,…Write a program in C that, given two points on a two-dimensional graph, outputs a message (string) if the line that connects them is horizontal or vertical, or if the slope is positive or negative.What would you modify or adjust in your code if we move from a 2D cartesian system to a 3D dimensional cartesian system?You need to take into consideration if the system is 3D and therefore you need to ask the user to insert X, Y , and Z.Write a c++ program that asks the user to enter a number and then prints all the divisors of thatnumber. A divisor of an integer, also called a factor of , is an integer that can be multiplied bysome other integer to produce . An integer is divisible by another integer if is a factor of , so thatdividing by leaves no remainder. For example:Enter a number: 12The divisors of 12 are = 1, 2, 3, 4, 6, 12Enter a number: 7The divisors of 7 are = 1, 7