def find (target, items): 1-len (items) 1=0 while i<1: if target==items [i]: return i 1+=1 return -1 print (find (3, [1, 2, 3, 4, 5])) print (find (6, [1,2,3,4,5]))
Q: Provide instances of data manipulation, forgery, and web jacking.
A: Data tampering Data tampering refers to a modifying data without authorization before entering a…
Q: The for construct refers to a loop that processes a list of items. Therefore, it continues to…
A: Constructed using a "for" Preposition: One way to create loops is via the "for" construct. It may be…
Q: Seven integers are given in this order: 8, 3, 5, 1, 2, 9, 10. Do each of the following. SHOW YOUR…
A: ANSWER:-
Q: with the following conditions 2> a=strcat(str1,str2) (ii) >> a=strvcat(str1,str2) (iii) >>…
A: Please refer below for your reference: 1) strcat() function concatenates string2 to string1 and…
Q: When faced with a problem in Computational Geometry, why do we go to MATLAB as our tool of choice?
A: Answer : The problems in computational geometry like intersection , convex hulls , Point in polygon.
Q: How does the principle of least privilege aid in the creation of protection Systems?
A: Definition: According to the concept of least privilege, each user, programme, and process should…
Q: use Keil_v5 3. Assume r0- 0xBBFFABCD, r1 - 0x00000014. Write a program (including the 2 steps below)…
A: Assembly language <code> // ro = 0xBBFFABCD, r1 = 0x00000014 // ro &lt;-…
Q: What does distributed data processing include and how does it operate?
A: Data Processing: Data processing entails applying business logic and algorithms to the data to…
Q: Which of the following is the statement that declares a multiple dimensional character array that…
A: Consider the second answer choice: char X[40][10]; This statement declares a two-dimensional…
Q: Question 1 Write three functions to read a string from the keyboard, assign the value of the string…
A: In this question we need to write a python code in which we need to create three functions which…
Q: What distinguishes embedded computers from general-use computers?
A: General purpose computer embedded systems It is designed using a microprocessor as the main…
Q: p-down programming is illustrated by which of the following? ) Writing a program from top to bottom…
A: Top down programming It is software development technique or style of development of application…
Q: Give two example computer applications for which connection-oriented service is appropriate. Now…
A: The data can be sent from one device to another device. There are two ways in which this can be done…
Q: In a relational database, a select operation may reduce the size of a table by removing columns that…
A: The question is about relational databases and determining whether or not a statement is true or…
Q: What is the importance of information security management?
A: Information security management describes the set of policies and procedural controls that IT and…
Q: Assume the sender is aware of a constant round-trip delay between the sender and recipient. Given…
A: Timers are essential for the protocol. In this case, the total delay caused by the roundtrip journey…
Q: Give two example computer applications for which connection-oriented service is appropriate. Now…
A:
Q: What would happen if you changed the default runlevel/target of your system to reboot.target or…
A: According to the question, we have to explain what would happen if changed the default…
Q: USE THE EXAMPLE 2.11 TO ANSWER FOR WRITING THE CODE 2 3 4 5 def find(target, items): """Return first…
A: the python program is an given below :
Q: 2. Do some research on deterministic and non-deterministic finite automata and make a comparative…
A: Deterministic Finite automata is a five-tuple automata. M=(Q, Σ, δ,q0,F) Where Q : Finite set…
Q: Write a file that defines a function called MyFunction that takes three arguments, px, py and pz.…
A: Program Plan: Since no language is specified in the question, the following code is written in the C…
Q: What issues are resolved by the SPEC CPU benchmarks compared to the Whetstone, Dhrystone, and…
A: Linpack Benchmarks: The LINPACK Benchmarks assess the floating-point processing capabilities of a…
Q: UNIX coordinates the activities of the kernel I/O components by manipulating shared in-kernel data…
A: Four Pros are: Very effective, minimal overhead and data transmission. Quick implementation since…
Q: In Kali Linux Describe and show steps to enable the reverse tunnel to listen on the "IP address",…
A: Explanation : Steps to enable the reserve tunnel is : - Set the file permissions of the priavte…
Q: What are some of the possible services that a link-layer protocol can offer to the network layer?…
A: The link layer is responsible for transferring a datagram across an individual link. Examples of…
Q: Recent IBM study among 585 mobile application developers and managers found that just one third of…
A: answer is
Q: Develop a program by using Assimbly Language for PIC16F877a, to turn on a LED is connected to…
A: MOVF PORTB,W ANDLW 0x04 BTFSS STATUS,Z GOTO LED_OFF LED_ON: MOVLW 0x04 MOVWF PORTA GOTO DONE…
Q: Compare symmetric and asymmetric encryption schemes, and discuss under what circumstances a…
A: Symmetric Key Encryption: Encryption is a process of changing the form of any message to protect it…
Q: Write a comparative essay on CPU Scheduling Algorithms.
A: Algorithms for CPU scheduling: Because of the requirement to alter and test operating system a…
Q: How are the access-matrix facility and the role-based access- control facility similar? How do they…
A:
Q: Imagine that three loop iterations on a parallel computer are the same as making a cake. In the…
A: The loop computation will be dependent on the actions taken during cake production: The first oven…
Q: Array_1 25 70 80 99 30 15 86 77 66 89 55 24 31 20 30 40 15 91 65 63 17 30 29 45 18 49 71 46 89 88…
A: Here we have a 2D array with 8 rows and 4 columns. Now in the array, all the elements have their…
Q: The is the file system permission given to a user to access a file. O handle O mode O interface O…
A: A file system stores and sorts out information and can be considered a kind of file for every one of…
Q: Consider where you fit in the value chain. To what end does the value chain exist? What is it that…
A: The value chain consists of a succession of actions that turn input into an output that multiplies…
Q: To explore daemon processes, you must use the –e option with the ps command since they are not tied…
A: Daemon Processes: The programmes that operate in the background are known as daemons. They are…
Q: Which kind of parallelism at the programme level (data or control) is most compatible with SIMD?…
A: Parallelism at the programme level: Program-level parallelism is the process of decentralizing a…
Q: Define a class that named Student. The class has the following elements: - void function called…
A: Answer: Here not a specify the any programming language hence we will do in C++ programming language…
Q: How much quicker is it in nanoseconds compared to milliseconds?
A: Order of magnitude This section defines the first order of magnitude that operates in nanoseconds…
Q: The system writes to VA page 30 if an instruction is not accepted; what does it mean? Compared to a…
A: Introduction: When working with virtual memory, using a TLB is a typical practise (I'm talking about…
Q: Write given a funct the po:
A: Dear Student, As no programing language is mentioned , I am assuming it to be c++. Also, In a Binary…
Q: When faced with a problem in Computational Geometry, why do we go to MATLAB as our tool of choice?
A: Computational Geometry: Computational geometry is an area of computer science that studies…
Q: A program evaluates binary arithmetic expressions that are read from an input file. All of the…
A: Errors detected at compile time mainly include syntax errors, such as missing semi-colons and…
Q: Closing a file O deletes the file object from the filesystem Ofrees up the resources that were tied…
A: About python programming A high-level, interpreted, the general-purpose programming language is…
Q: Alice is working from home and she wants to access her company’s computer from home. She needs to…
A: -Serv-U FTP is a great FTP server software for teams of all sizes. It allows you to safely and…
Q: Typically, at the completion of a device I/O, a single interrupt is raised and appropriately handled…
A: The interrupt-request line is a wire on the CPU hardware that the CPU detects after each instruction…
Q: Array_1 25 70 80 99 30 15 86 77 66 89 55 24 31 20 30 40 15 91 65 63 17 30 29…
A: According to the information given:- We have to define the value in position [2][3] in the mentioned…
Q: Write a code in java that solves 1x2* x3....99 in a loop
A: Below I have provided java Programming. Also, I have attached the screenshot of the code and output…
Q: What is the problem with using strict alternation as a synchronization mechanism? O It does not…
A: What is Strict alteration? Strict Alternation Approach/Turn Variable is the software mechanism…
Q: as a possible congestion control mechanism in a subnet using virtual circuits internally, a router…
A: Using stop and wait protocol.
Q: What is the system function that clears the screen? Group of answer choices system(“cls”);…
A: system("cls"); is the system function that clears the screen.
Please help, what's wrong with this code
Step by step
Solved in 3 steps with 1 images
- https://dcccd.blackboard.com/bbcswebdav/pid-30362192-dt-content-rid-230796624_1/xid-230796624_1 See attachment for details. Due on the final day by the end of the day. No late submission will be accepted even if it is due to technical problems. ) What to use in your completed code Get input from file.Ask user at least a single question and read at least one answer.Use at least a single method from Math class.Use at least one overloaded constructor.Use at least one if-else-if, while, for, and enhanced for loops.Use methods to pass and return identifiers and objects.Pass arrays to/from methods.Use at least a method to sort the array in the project.Use inheritance and polymorphism.Use exception handling.Use input validation.Pass the input and output files as commandline arguments. /** *Description: This program will displays a string without any user interaction *Class: Fall - COSC 1437.81002 *Assignment1: Hello World *Date: 08/15/2011 *@author Zoltan Szabo *@version 0.0.0 */ For each…UnicornBox stores some configuration variables in a config.yml file in a folder separate from the users’ files: The layout of the server storage is as follows: site/ file/ foo1.txt foo2.txt ... config/ config.yml Your task: Gain access to the secrets stored within config.yml. Tip: Most browsers modify URLs before they are truly actually sent to the server. If you are having trouble determining what URLs are sent to the server, consider using the Network tab of your browser’s debugger. Tip: What happens if you try to access a file that your user account doesn’t have access to? Consider what has to be true before a file is “served” from the file system in this website."""return the haversine distance between the two locations.The location should be a tuple of (latitude, longitude)https://en.wikipedia.org/wiki/Haversine_formulaIf you use code from a website as the basis for this function, besure to document that website here::param location1::param location2::return: haversine distance between two locations, measured in miles.""" FILES LOOK LIKE THISID,City,State,Latitude,LongitudeA45419E,Plattsburgh,NY,44.704021,-73.471148A19312D,Aiken,SC,33.554433,-81.69588A90172S,Tuscaloosa,AL,33.170238,-87.616169A19394D,Alexandria,VA,38.819853,-77.059645A27218D,Pittsburgh,PA,40.47441,-79.950968A68626D,Meadville,PA,41.611599,-80.114891A17494D,Allentown,PA,40.602658,-75.469236A86034S,Tonawanda,NY,42.99704,-78.878659A45142D,Asheville,NC,35.602711,-82.567281A38298S,Atlanta,GA,33.844371,-84.47405A14497Y,Roswell,GA,34.055198,-84.370475A25954D,Austin,TX,30.326374,-97.771258B46374X,Fairhope,AL,30.480713,-87.861306B52199S,Cedar…
- If ((string comparison between distance to in is equal to 0) and (string comparison between dist to cm is equal to 0)) then change output to print. acess the source code here: https://drive.google.com/file/d/1KjeFpr-VS-19eiqPDhguJyER84rgx5xB/view?usp=sharing please help me and i'll leave a like <3def wear_a_jacket(us_zip:str) -> bool: This function should use https://openweathermap.org/ API (user account required) to collect its weather information. The purpose of this function is to inform you if you should wear a jacket or not. It will be given a US zip code. This function should query the API to figure out the current temperature in the region associated with the US zip code. If the temperature is less than 60 degrees Fahrenheit (main.feels_like float: This function should use https://openweathermap.org/ API (user account required) to collect its weather information. This function should retrieve the historical temperature in Fahrenheit at a particular US location. You will be given a number of days, hours, and minutes and a United States zip code. The time values given are the cumulative total time in the past minus the current time, you should retrieve the historical temperature (current.temp). In other words, if the parameter days is 4 hours is 0 and minutes is 5.…Complete the exercise described in the attached document. Algorithm Exercise.docx Rubric: 1-Uses pseudo code not actual code 1-Includes prompt output steps before input steps 1-Calculates p 1-Calculates A Assume that there is an available function that will calculate the square root of a value use the name SQRT() https://quincy.instructure.com/courses/15140/files/1261838/download?verifier=pHUEAZhXer74z5lq0g563Ijk84PHhv34VOUZxuzH&wrap=1
- Instructions: Use online editor for doing shell script Use JSLinux online tool to do practicals (Website address : https://bellard.org/jslinux) ===========================================================Write a shell script that reads the price for 6 mobile phones and counts the price of mobile phones whose price is more than 300 OMR. Note : · Use loop and conditional statements. · Display the appropriate output.correct error // testing for uplaoding files WebElement upload=driver.findElement(By.id(“inputGroupFile02));upload.sendKeys("E:\\6th semester\\software testing");Please kindly attach output SS A social networking website hires you to meet the following requirements: User can create their profile User can check for mutual friends User can add new friends User can delete friends Display user’s profile Solution Guidelines: Create a class Profile having name, emailId, city , country, friendlist[] ( Keep the fields private) Profile class will contain following methods: createProfile(String name , String emailId, String city, String country): allow user to set his information addFriends(Profile profile): sends request, if a person accepts the request add the person object into friendlist[] Note: Achieve Method Overloading keep the parameters as (Profile profile , String Message) giving Access to user to send request with a personalized message. removeFriend(Profile profile):can remove a friend from the friendlist showFriends(): display the friendlist search(Profile profile):searches for profile in the list if it…
- Use an API – Application Programming Interface – to retrieve data from via the Internet based on the user’s input. Your program should tell the user what category their selection was (movie, book, etc.) Code should please begin as shown below import urllib.request import urllibimport jsondef get_data(item): payload={'q':item}item=urllib.parse.urlencode(payload)api_url = "https://tastedive.com/api/similar?" + item page=urllib.request.Request(api_url,headers={'User-Agent': 'Mozilla/5.0'}) infile=urllib.request.urlopen(page).read()decoded = infile.decode('utf8')the_dictionary = json.loads(decoded) return the_dictionaryWhen I press 1 and add a contact then when i press number 2 to browse the name , The name wouldn't be added to the file . But when i press 1 and add a contact and then i press 7 return the name can be added to the file . Would you please check what's went wrong in the program. Thanks. #include<iostream>#include <fstream>#include<string>using namespace std;#define M 100int count=0;struct AddressBook{string FullName;int Birthday;string Address;string Email;int PhoneNumber;}Person [M];void WriteToFile();void add();void browse();void searchByName();void searchByBirthday();void removeContact();void order();int main(){fstream file;file.open("Contact'sBook.txt");int choice;do{cout << "Please Enter Your Choise: \n";cout << " 1- Add New Person\n 2- Browse\n 3- Search By Full Name \n 4-Search By Birthday \n 5-Remove a Person" << "\n 6- Alphabetical Order \n 7- Exit\n";cin >> choice;switch(choice){ case 1: add(); break;case 2: browse();break;case 3:…files for the work: https://mega.nz/file/AEJQFZIT#IKKIb5DD9h-5fHiWzEAIg8Lm60syggKnAwL1fqQQ168 Therefore, you should have print statements only where it is explicitly mentioned in the assignment. If you have additional print statements, make sure they are all converted to comments before you submit the assignment. Page 4 of 12 Assignment # 4 Due: Nov. 27th 11:00 PM 1. Text File Format Download the zipped file Files_for_A4 from Brightspace. When you will extract this zipped file you should find the following text files in the folder. The sample text files (datafile) are aTaleOfTwoCities.txt, harry.txt, harryPotter.txt, and invisibleMan.txt. You may assume that the words of the text files are separated by spaces (* ') and newline characters ( *\n'). You will be using these text files to do the analysis. There are two additional files (wordfile) named positivewords.txt and negativewords.txt; each of these files contains a sequence of words (one word per line) and these words will be…