class A Q5: Correct the following code fragment and what will be the final results of the variable a and b {protected int x1,y1,z; public: A(a, b,c):x1(a+2),y1 (b-1),z(c+2) { for(i=0; i<5;i++) x1++; y1++;z++;}}; class B { protected: int x,y; public: B(a,b):x(a+1),y(b+2) { for(i=0; i<5;i++) x+=2; y+=1;}}; class D:public B, virtual public A { private: int a,b; public: D(k,m,n): a(k+n), B(k,m),b(n+2),A(k,m,n) { a=a+1;b=b+1;}}; int main() {D ob(4,2,5);}
Q: Explain what the code instructions are doing: .data SIn WORD 5, 8, 9, 10, 13 SOut WORD 3, 17, 8,…
A: The above program is written in Assembly language and the complete explanation is given below:
Q: 1. Two's complement notation really shows its value in binary addition, where positive and negative…
A: Solution for each addition along with verification is given below. For verification, Binary digits…
Q: Why is working in Cybersecurity such a satisfying career choice?
A: Introduction: Cyber workers are considerably more likely to be driven by their love of technology…
Q: An example of how you may connect to a workstation on the AIT intranet from your home via a virtual…
A: Explanation: Using the AIT network as an example, explain how to connect from home to the intranet…
Q: When it comes to computing's social and personal ramifications, what particularly interests you?
A: Computing's social : The practice of social computing entails interaction and cooperation amongst…
Q: How many different methods are there for functions to interact with one another in order to…
A: Introduction: There are five distinct channels by which functions may exchange information with one…
Q: In what situations would it be better to use RFID instead of a bar code?
A: Introduction RFID Radio Frequency Identification labels, which have been around for quite a long…
Q: veral benefits to being comp
A: SUMMARYTrain well yourself with the knowledge of the digital age The modern business world relies…
Q: Write a program in Java called StringIndex. Create a method called printIndex that passes your…
A: According to the question, we have to write a program in Java called StringIndex and create a method…
Q: Explain the many software testing methods that are utilised in the creation of software.
A: Answer:
Q: What are the three outcomes that may be achieved in a War Room?
A: Start: War rooms, as opposed to a typical office setting, are places where important people gather…
Q: Is it vital to you to integrate computer technology into your everyday life, and why???
A: INTRODUCTION: Computer technology refers to any and all electronic tools and services that the City…
Q: How does the team responsible for networking interact with the rest of the information technology…
A: Start: However, there is no empirical data on the connection between the topology of the…
Q: An interface's limitations may be severe. When a user can't access the Windows desktop or the…
A: limitations to the user interface The ability of a user to do certain actions, such as shutting down…
Q: Please describe how computers have become such an integral component of the educational system over…
A: Please find the detailed explanation in the following steps.
Q: It's not clear to me whether or not implementing object-oriented programming and abstract data types…
A: Object-Oriented Programming (OOP), a computer language, places more emphasis on objects than…
Q: Explain the ethical considerations that researchers in computer science should be aware of while…
A: Ethical Considerations in Data Gathering: Anything that can hurt participants physically or…
Q: Inquire about the different methods used to produce the Microsoft's Windows and Android systems.…
A: Introduction: Android is a touchscreen mobile operating system that is based on a modified version…
Q: Even if hacking is illegal, can it be done ethically? What are the specifics of the situation?
A: Start: One of the best paying and fastest growing careers in modern information technology, ethical…
Q: Do you call it anything particular, like a virus scanner or a file compressor or a backup tool, if…
A: Antivirus software is the class of the program which is designed to prevent , detect and to remove…
Q: On the LAN, how does TCP/IP work? Let's look at two cases.
A: Internet Protocol and Transmission Control Protocol: Computer networking and Internet communication…
Q: What's the connection between telecommunications and data transmissions anyway? Are the two…
A: Answer:
Q: Different memory allocation techniques are used by operating systems, which will be identified and…
A: Introduction: The four well-known memory management strategies are as follows.A single contiguous…
Q: In order to prevent hackers from collecting account information, what kinds of security precautions…
A: Answer:
Q: The look of a button changes when an access key is assigned to it.
A: Inspection: To provide the access key for the label, add an ampersand (&) to its Text attribute.…
Q: Write a program that reads a file consisting of students’ test scores in the range 0–200. It should…
A: Store given score's in a text files and open a files in reading mode using ifstream objects. Then…
Q: Implement the psueodocode in assembely language. use short-circuit evalution where appropriate and…
A: Complete answer is Assembly Language is given below:
Q: Please explain the distributed nature of DNS for the purpose of this debate.
A: Introduction: A hierarchical and decentralised naming system called the Domain Name System (DNS) is…
Q: DFS and BFS are two different types of database management system
A: DIFFERENCE: BFS determines the shortest route to the goal. DFS reaches the lowest level of a…
Q: 2. The prices for traveling between five cities in Manila by bus are given in the table. Represent…
A: Here are N cities located on a straight road and each is divided into a single unit distance. You…
Q: # A password generator creates a 10-character case-sensitive alphanumeric (a-zA-Z0-9) password keyed…
A:
Q: How does the team responsible for networking interact with the rest of the information. technology…
A: However, there is no empirical evidence on the relationship between the topology of the…
Q: Class Library implements the interface Findable and has/should have the following members: -…
A: Program: import java.util.*;import java.util.Map.Entry; /* * Findable interface has one method…
Q: Cyber assaults against an organisation or group may or may not be justified depending on the…
A: Introduction : A cyber attack is any attempt to gain unauthorized access to a computer. A…
Q: ble with 50 s ved using ch niform hash the first 3 s st 3 insertio
A:
Q: Problem: Implement a part of functionality for the Netflix DVD queue. It's a service that allows a…
A: There are 3 files: 1. MovieList.h 2. MovieList.cpp 3. Main.cpp
Q: Suppose we have a dataframe named df and we want to plot a bar chart with the data in column…
A: option b is correct df_temp=df.loc['column_1',my_list] df_temp.bar(figsize=(10,6))
Q: Given this place-weighting, or Horner's Algorithm, convert the following eight-bit two's complement…
A: “Since you have posted a question with multiple sub-parts, we will solve first three subparts for…
Q: Look up popular internet protocols. An effective security strategy requires a thorough understanding…
A: Given: Investigate popular internet protocols. Understanding security's goal, metrics, and intended…
Q: It's not clear to me whether or not implementing object-oriented programming and abstract data types…
A: Object-Oriented Programming: Object-oriented programming includes inheritance, hiding, polymorphism,…
Q: Does the phrase "task-oriented" describe software that is designed to do a specific goal, such as a…
A: Compression Tool: Fortunately, antivirus programmes can and do scan. zip files, although how they do…
Q: computer science - Describe how viewpoint analytics are used to support descriptive and predictive…
A: Introduction: It is concerned with "what is necessary for the work to be done," according to…
Q: Do you call it anything particular, like a virus scanner or a file compressor or a backup tool, if…
A: Utility Software: A utility programme is a system application that carries out a certain duty, often…
Q: Predefined functions are less efficient than those that are defined by the user.
A: Functions defined by the user and used to structure the code are referred to as user-defined…
Q: .Explain why user-defined functions are better than pre-defined ones in terms of performance.
A: A section of well-organized code that can be reused to carry out a specific operation is a function.…
Q: 4. Create an array of 20 fives In [7]: np.fives (20) AttributeError Input In [7], in () ----> 1 np.…
A: Python Code:-import numpy as np if __name__ == '__main__': A = np.empty(shape=20, dtype=int)…
Q: 3. Decode the following substitution cipher S WMBX MBQ XSQE XEHQ XTHIBMD XBRJG XHR SSS XSJJ LT…
A: Decoding:- To decode is to take out of code and put into understandable language. Decoding is the…
Q: names of the columns in the dataframe. What is the correct command to do that? a. b. C.…
A: Options : df.columns.values df[name].column() df.columns.names df.columns df[columns].value()
Q: Are data structures and algorithms outdated in the era of Machine Learning, or is this just an…
A: The answer is obviously no. The term Machine Learning was coined in 1959. Though it was coined long…
Q: What are the three requirements that must be satisfied in order for a network to be successful and…
A: Introduction: Efficient performance is characterized by the capacity to finish a task with the least…
Step by step
Solved in 2 steps with 1 images
- USING C++ Write a simple class named Circle, with three private variables: doubles named x, y and radius. The center of the circle is denoted by coordinates (x,y), and the radius of the circle is denoted by radius. It should have public member functions with the following signatures: void setRadius(double r)void setX(double value)void setY(double value)double getRadius()double getX()double getY()double getArea()bool containsPoint(double xValue, double yValue) The first six member functions are straightforward functions to set and get the private member variables. double getArea() This member function should return the area of the circle. When you are calculating the area you can use 3.14 for pi. The formula is radius * radius * pi. bool containsPoint(double xValue, double yValue) This member function should return true if the point at (xValue, yValue) is contained in the circle, and false if not. You can determine whether or not a point is in a circle by calculating the…Help of what these errors mean. In C# • Create a Class, named Student, to hold properties of Student Last Name, Student First Name, Student ID (9 digits), Course Prefix and Number, and the tests (Test 1, Test 2, Test 3, Test 4). Create appropriate setter and getter accessors, and constructors. Use access modifiers. Example: First Name : Pat Last Name : Smythe Student ID : ABC111333 Course Prefix : CIST Course Name : 2431 Test 1 : 100 Test 2 : 90 Test 3 : 80 Test 4 : 88 • Prompt the user for the Student Last and First Name, Student ID, Course Prefix and Number and the tests. • Include at least one exception handling function. • Use an array to store the 4 test grades. • Use a looping structure to populate the array. • Calculate the numeric average based upon the 4 equally-weighted numeric grades. • Display all the data for each of student using a looping structure. • Display the numeric average for each student. • Create a function that will convert the numeric average to a…class GradedActivity { private: double score; public: GradedActivity() { score = 0.0; } GradedActivity(double s) { score = s; } void setScore(double s) { score = s; } double getScore() { return score; } char getLetterGrade() const; }; Implement the GradedActivity class above. In this C++ assignment, create a new class Assignment which is derived from GradedActivity. It should have three private member ints for 3 different parts of an assignment score: functionality (max 50 points), efficiency (max 25 points), and style (max 25 points). Create member function set() in Assignment which takes three parameter ints and sets the member variables. It should also set its score member, which is inherited from GradedActivity, using the setScore() function, to functionality + efficiency + style. Signature: void Assignment::set(int, int, int) Create a main program which instantiates an Assignment, asks the user…
- Java Questions - (Has 2 Parts). Based on each code, which answer out of the choices "A,B,C,D,E" is correct. Each question has one correct answer. Thank you. Part 1 - 5. In Java, inheritance uses __ relationship. A. is-aB. part-ofC. has-aD. member-ofE. None of the options Part 2 - 6. Given the following code, the output is __. class Apple { int x = 15; }class Banana extends Apple { int x = 25; }public class Sample { public static void main(String[] args) {Apple a1 = new Banana(); System.out.println(a1.x); }} A. Compiler errorB. 25C. 15D. 0E. None of the optionsPLZ help wiith the following: IN JAVA If an inner class contains non static members, then the class name must be modified by the keyword: Final Static Void ProtectedHello, I am having trouble with this homework question for my c++ course. Implement a Rational Number class with the following specifications. Data members a) numerator and denominator Functions a) Constructors: 1) default constructor 2) single parameter constructor to create numerator/1 3) dual parameter constructor to create numerator/denominator 4) Use constructor delegation across all constructors. b) Accessors and Mutators for both data members. c) Static recursive GCD function using Euclid's algorithm. d) Static LCM function for two numbers. e) Reduce function simplify a rational number. This function modifies its calling object. f) Your program should work with the supplied driver program. Notes LCM (Least Common Multiple) This function returns the smallest multiple of a and b. Step 1: Multiply a and b to find a common multiple. Step 2: Divide the common multiple by the GCD of a and b. Step 3: Return the result of Step 2. Reduce: This function reduces a fraction to…
- in c++ Define a new class named “Student” that must inherit from the given User class. This class manages student info: id (integer), name (string) and gpa (double). It must prevent the creation of a Student object with a negative ID or a GPA that is not between the range of 0.0 and 4.0 by generating a BadValueException error. This class will provide at least the following methods: toString method to return a string representation of the Student object in the format of “ID( <id> ) NAME( <name> ) GPA( <gpa> )” Such as ID(1234) NAME(John Smith) GPA(4.00) Note: the GPA must have 2 decimal places. isGPAGreater method that compares its gpa with another student’s gpa. It returns true if its gpa is greater than the other and false otherwise.class temporary { public: void set(string, double, double); void print(); double manipulate(); void get(string&, double&, double&); void setDescription(string); void setFirst(double); void setSecond(double); string getDescription() const; double getFirst()const; double getSecond()const; temporary(string = "", double = 0.0, double = 0.0); private: string description; double first; double second; }; I need help writing the definition of the member function set so the instance varialbes are set according to the parameters. I also need help in writing the definition of the member function manipulation that returns a decimal with: the value of the description as "rectangle", returns first * second; if the value of description is "circle", it returns the area of the circle with radius first; if the value of the description is "cylinder", it returns the volume of the cylinder with radius first and height second; otherwise, it returns with the value -1.A Person has a name (just a first name for simplicity) and friends. Store the names of the friends in a string, separated by spaces. Provide a constructor that constructs a person with a given name and no friends. Provide member functions. c++ void befriend(Person p) void unfriend(Person p) string get_friend_names()
- A(n) ____________ is one instance or variable of a class.C++: True/False: to derive class A from class B, A must have a private member function. A) True B) Falseclass first { public: void setX(); void print() const; protected: int y; void setY(int a); private: int x; }; Suppose that class second is derived from class first using the statement: class second: private first which members of class first are private, protected, and public in class second?