Declare variable and assign value, define function that returns text, return number of characters in a string, function to return characters of a string in Upper/lowercase, function to replace character in string, function to add amounts with surcharge, function to get first element of an array, etc.
Q: Describe the UNIX operating system in a brief note Six UNIX file-creation and file-management progra...
A: LINUX is an open-source program or kernel. Its task list is comparable to that of UNIX. A kernel is ...
Q: (The sets (BNA) = B\ complement (A true False
A: Here, we are going to check whether two sets are equivalent or not. Using Venn diagram, we can check...
Q: What is the IFB directive's purpose?
A: Intro IFB directive The IFB directive is used when the argument is blank. The syntax of IFB direct...
Q: Q20-Following Grammar is give (I am using or instead of usual | to avoid confusion) a) Find the Firs...
A: Answers: We have to provide the detailed solution in the below Picture:
Q: Users can interact with a telephone menu system by speaking instead of pressing buttons on the dial ...
A: Two arguments in support of speech recognition technology: Talking is faster than typing! Voice com...
Q: Describe the AWS Global Infrastructure, starting with the largest component and working your way dow...
A: Introduction: Global Infrastructure AWSAWS is a worldwide cloud computing platform. Global infrastru...
Q: Storyboard dialogue Errand Assistance Service Application
A: Let's see the solution in the next steps
Q: Identify any three main conceivable flaws that a computer can develop and suggest any troubleshootin...
A: Given: Identify any three main conceivable flaws that a computer can develop and suggest any trouble...
Q: Given a BST, which traversal method would allow you to turn it into a min heap using N heap insertio...
A: Program Explanation: Import the array list class Define a public class for implementing the given l...
Q: What information is included in a computer printout, and what automated procedures are used?
A: Let us see the answer:- Introduction Explanation for first part:- A document that is printed from a ...
Q: Determine the most important contrast between Internet access and phone service.
A: Introduction: There is a distinction to be made between Internet access and phone service.
Q: Why would we pick a non-BCNF architecture for a relational database?
A: Intro Why would we pick a non-BCNF architecture for a relational database?
Q: Explain what may be done with primary keys to prevent key ripple effects from occurring when a datab...
A: Introduction: Eliminating critical ripple effects: A ripple effect occurs when a relation's primary...
Q: plain CAD &CAM in detail with examp
A:
Q: def f7(n, b = ""): if n > 1: f7(n/3, b + "0") f7 (n/3, b + "1") f7 (n/3, b + "2") f7 (n/3, b + "3") ...
A: Time complexity is the amount of time taken by an algorithm to run, as a function of the length of t...
Q: The process of planning and establishing a successful Web site is described in detail.
A: Introduction: When you talk about electronic commerce, you're referring to the exchange of value (su...
Q: Agile approaches employ quick development cycles to deliver running versions of the system repeatedl...
A: Intro The "agile" methodology is a type of software development where each phase of the software d...
Q: Define the circumstance when smart cards are required for authentication but magnetic stripe cards a...
A: Introduction: Data is saved via a tiny microchip implanted in a smart card, which is comparable in s...
Q: When a conditional test is included in a flow chart or pseudocode, the results may differ. Why is th...
A: Introduction: Good, logical programming is the result of careful pre-code preparation and structure....
Q: Do routers route packets to MAC addresses?
A: Introduction: Do routers route packets to MAC addresses?
Q: The services of two transport-layer protocols are available to some application programs (UDP or TCP...
A: Introduction: TCP is engaged in the communication if the devices are directly linked. If data is sha...
Q: Explain the Unicode Transformation Format in a few words (UTF)
A: Unicode Transformation Format (UTF) The Unicode transformation format is the format of characters en...
Q: Let X be a Poisson random variable with pmf as P.(k) = P(X = k) = e¬k : k! where k = 0,1,2,. (a) Kee...
A: Introduction
Q: What is the most effective strategy for memory management, and why is it the most successful?
A: Introduction: This website has been diverted from the phrase "effective." Side Effect's CD is effect...
Q: 6. Explain different types of Interrupts.
A: Introduction: An interrupt is a signal received by the operating system from a device connected to t...
Q: using the Bacon cipher decrypt the following bacon message:
A: I have answer3ed this question in step 2.
Q: read from a file file.csv list of strings separated by comma as: cat,dog,bird,cat,dog,fish,bird, bir...
A:
Q: Cloud computing has already shown to be the most popular data centre architecture for Big Data Clust...
A: Introduction: Data centres nowadays are very different from those of only a few years ago.
Q: Network protocols are classified using the layers of the.
A: Introduction: Network protocols are classified using the OSI layers.
Q: Which of the following generates a message box with an OK button, an Info icon, "Hatfield Sales" in ...
A: Intro MessageBox.Show MessageBox.Show is a built-in method used in Visual basic that displays a di...
Q: What is gray leval of digital image ? If we use 8 bits for representing pixels, how many gray level ...
A: Grey level of digital image: The grey level or grey value indicates that the brightness of a pixel....
Q: Computer Programming Java Write a method named FirstHalf that receives a String parameter named wo...
A: ALGORITHM:- 1. Take input from the user as string. 2. Compute the first half of the string using sub...
Q: privacy advocates should have about biometrics? Which of the following concerns do you agree with or...
A: given - What are the benefits and drawbacks of biometric identification systems?
Q: The authors claim "Poorly crafted law in this area aimed at protecting imperfect technological solut...
A: The paper "Poorly crafted law in this area aimed at protecting imperfect technological solutions res...
Q: In MC68000, the name addressing modes that are not permitted for destination, as well as the reasons...
A: Given: In MC68000, the name addressing modes that are not permitted for destination, as well as the ...
Q: Find the name of the organization that has the smallest grant contribution.Using mysql
A: Given: Find the name of the organization that has the smallest grant contribution.Using mysql
Q: DA-4 PHP - Poblems O To porfor m aray and String Functoons Cany 10) e 10 perform a yile upload opera...
A: Array and String Function in PHP.
Q: What exactly is exploratory testing?
A: Introduction: Exploratory testing is a time-saving testing method that works in tandem with developm...
Q: 1) Construct K-D tree for the following data (3,6), (17,15), (13,15), (6,12), (9,1), (2,7), (10,19).
A: A K-D Tree(also called as K-Dimensional Tree) is a binary search tree where data in each node is a K...
Q: Write a method to count all words in a string and print the most repeated word. Test Data: Input a s...
A: Php code for find total word and most of time repeated word.
Q: Assuming a 5 stage pipeline that runs AVR assembly language, determine the average latency and throu...
A: AVR Calculation Delay:In the Language of the Assembly Languages, in order to create a time delay one...
Q: Show that (-p q) is equivalent to (p -q).
A: Consider both the expressions and covert to possible disjunction or conjunction and then we can comp...
Q: Is it critical for a company to keep forensic evidence (information security), and if so, why is it ...
A: The question is why keep forensic evidence (information security) is important.
Q: What does window-to-viewport mapping serve? Determine the values of A, B, C, and D given a world win...
A: Introduction World window: It is the rectangular region formed by real-world coordinates. Viewport:...
Q: The Database Administrator or Server Administrator is in charge of making backups of the databases.
A: Introduction: Backup is an essential operation that must be conducted on a regular basis, as we all ...
Q: Who are the people involved in the phases of Waterfall Model
A: Introduction Who are the people involved in the phases of Waterfall Model
Q: Which form of selection structure gives instructions that are only to be executed when its condition...
A: Intro There is three basic control structures in writing any procedure in an application: Sequence ...
Q: Explain the fundamental procedures involved in MapReduce processing.
A: Introduction: MapReduce: Hadoop's processing layer is MapReduce. It's a free and open-source applica...
Q: Develop a java code to save the following string ("Lab", "Assessment", "total" "Marks", "is 5"} in S...
A: - We have to complete the stack program in java.
Q: What is open source in computer science?
A: Here, we are going to discuss what is open source in computer science? What is Open source software?
3.
Step by step
Solved in 4 steps with 3 images
- (List maintenance) The following letters are stored in an alphabet array: B, J, K, M, S, and Z. Write and test a function named adlet(), which accepts the alphabet array and a new letter as arguments, and then inserts the new letter in the correct alphabetical order in the array.(Data processing) A bank’s customer records are to be stored in a file and read into a set of arrays so that a customer’s record can be accessed randomly by account number. Create the file by entering five customer records, with each record consisting of an integer account number (starting with account number 1000), a first name (maximum of 10 characters), a last name (maximum of 15 characters), and a double-precision number for the account balance. After the file is created, write a C++ program that requests a user-input account number and displays the corresponding name and account balance from the file.Create reversit class andWrite a function called reversit () that reverses a C-string (an array of char). Use a forloop that swaps the first and last characters, then the second and next-to-last characters, and so on. The string should be passed to reversit () as an argument. Write a program to exercise reversit (). The program should get a string from the user, call reversit (), and print out the result.using c++
- **********DO NOT USE SOLUTIONS THAT USE C++ STRING OBJECTS!!! THIS MUST USE C-STRINGS (NULL-TERMINATED ARRAYS OF CHARS)!!!****** Implement the following functions. Each function deals with null-terminated C-strings. You can assume that any char array passed into the functions will contain valid, null-terminated data. Your functions must have the signatures listed below. 1. This function returns the last index where the target char can be found in the string. it returns -1 if the target char does not appear in the string. For example, if s is “Giants” and target is ‘a’ the function returns 2. int lastIndexOf(char *s, char target) 2. This function alters any string that is passed in. It should reverse the string. If “flower” gets passed in it should be reversed in place to “rewolf”. To be clear, just printing out the string in reverse order is insufficient to receive credit, you must change the actual string to be in reverse order. void reverse(char *s) 3. This function finds all…- **********DO NOT USE SOLUTIONS THAT USE C++ STRING OBJECTS!!! THIS MUST USE C-STRINGS (NULL-TERMINATED ARRAYS OF CHARS)!!!****** 4. This function returns the index in string s where the substring can first be found. For example if s is “Skyscraper” and substring is “ysc” the function would return 2. It should return -1 if the substring does not appear in the string. int findSubstring(char *s, char substring[]) 5. This function returns true if the argument string is a palindrome. It returns false if it is not. A palindrome is a string that is spelled the same as its reverse. For example “abba” is a palindrome. So is “hannah”, “abc cba”, and “radar”. bool isPalindrome(char *s) Note: do not get confused by white space characters. They should not get any special treatment. “abc ba” is not a palindrome. It is not identical to its reverse. 6. Extra Credit, up to 10 extra points. This function should reverse the words in a string. A word can be considered to be any characters, including…Creat a class reversit and Write a function called reversit () that reverses a C-string (an array of char). Use a forloop that swaps the first and last characters, then the second and next-to-last characters, and so on. The string should be passed to reversit () as an argument. Write a program to exercise reversit (). The program should get a string from the user, call reversit (), and print out the result.by using c++
- Reverse ArrayWrite a function that accepts an int array and the array’s size as arguments. The function should create a copy of the array, except that the element values should be reversedin the copy. The function should return a pointer to the new array. Demonstrate thefunction in a complete program.3."""Code _Write a function validSolution/ValidateSolution/valid_solution()that accepts a 2D array representing a Sudoku board, and returns trueif it is a valid solution, or false otherwise. The cells of the sudokuboard may also contain 0's, which will represent empty cells.Boards containing one or more zeroes are considered to be invalid solutions.The board is always 9 cells by 9 cells, and every cell only contains integersfrom 0 to 9. (More info at: http://en.wikipedia.org/wiki/Sudoku)""" # Using dict/hash-tablefrom collections import defaultdict def valid_solution_hashtable(board): for i in range(len(board)): dict_row = defaultdict(int) dict_col = defaultdict(int) for j in range(len(board[0])): value_row = board[i][j] value_col = board[j][i] if not value_row or value_col == 0: return False if value_row in dict_row: return False else: dict_row[value_row] += 1.Exercise2: Thestrcmp(string1,string2)function comparesstring1to string2. It is a value returning function that returns a negative integer if string1 < string2, 0 if string1 == string2, and a positive integer if string1 > string2. Write a program that reads two names (last name first followed by a comma followed by the first name) and then prints them in alphabetical order. The two names should be stored in separate character arrays holding a maximum of 25 characters each. Use the strcmp() func- tion to make the comparison of the two names. Remember that 'a' < 'b', 'b' < 'c', etc. Be sure to include the proper header file to use strcmp(). Sample Run 1: Please input the first name Brown, George Please input the second name Adams, Sally The names are as follows: Adams, SallyBrown, George Sample Run 2: Please input the first name Brown, George Please input the second name Brown, George The names are as follows: Brown, GeorgeBrown, GeorgeThe names are the same
- Code in Perl Create an array which holds a list of Video Games, consisting of title, the year it was released (guess if you don’t know) , platform (NES, XBOX One, etc) and publisher (in that order). Add at least ten albums to the list. Then, use the split function and a for or foreach loop to display the publisher followed by the title and platform for each list element.Remove Char This function will be given a list of strings and a character. You must remove all occurrences of the character from each string in the list. The function should return the list of strings with the character removed. Signature: public static ArrayList<String> removeChar(String pattern, ArrayList<String> list) Example:list: ['adndj', 'adjdlaa', 'aa', 'djoe']pattern: a Output: ['dndj', 'djdl', '', 'djoe']Question Write a program to create an answer sheet to read the student’s answers for a ten (10) item exam. It should then display a message indicating the score and remarks whether the student passed or failed the exam. (A student must correctly answer 6 of the 10 questions to pass the exam.) Here are the correct answers (key to correction), which should be initialized and stored in an array: TRUE FALSE TRUE FALSE FALSE FALSE TRUE TRUE TRUE FALSE What I need is a C++ program and must use array and C STRING.