17. The following function takes a parameter that is a list of integers; the list has at least one element. It is supposed to find the integer that is the largest and find the position of that integer in the list. The function has two incorrect lines of code that make the function compute the results incorrectly. Several lines are highlighted (bold, underlined) which COULD be incorrect. In the following questions, choose the correct line of code that should be in the function.
Q: (a) Fxy2) -Σ (1, 3, 7) (b) F(A, В, С, D) -D П (), 1,2,3,4,6,12)
A: In the theory of computation the term minterms whose sum defines the Boolean function are those…
Q: Q2: Give the output of the following program Matlab 1. S=input('Enter the subject:','s'); 2.…
A: First in the given program S will be taken as user input and the print statement will give output…
Q: A logical data flow diagram differs from a physically structured data flow diagram in that it shows…
A: A Data Warehouse's Most Critical Component: A central database, ETL (extract, transform, load)…
Q: The three-sphere paradigm for systems management is summarized here. Avoid using the textbook's…
A: System management as a three-sphere model: System management is divided into three spheres.…
Q: What are the primary distinctions between local area networks and wide area networks when it comes…
A: Spread over a wide geographical area: A LAN, or Local Region Network, a computer network that…
Q: Write a complete definition of child class of AbsParent named ClearChild which has only one method.
A: We need to extend the AbsParent Class and Implement all it's abstract methods. AbsParent has one…
Q: A database's speed may be significantly impacted by how entries are allocated to blocks.
A: Answer:
Q: To depict the structure of a database, you can use either an E-R diagram or DBDL. Which method do…
A: E-R diagram: - Existing databases may be examined using ER diagrams to identify and correct logic or…
Q: Q3: Write a program in MATLAB to enter numbers from 1 to 20 and * .printing only the odd numbers
A: I give the code in Matlab along with output and code screenshot
Q: The many degrees of encryption that may be applied to a database are listed.
A: Level of database encryption: Column level encryption is the process of encrypting individual…
Q: Assume you work in a corporation where the internal network is protected from the outside Internet…
A: Firewall:Firewalls are authentication methods used to prevent or limit illegal access to private…
Q: Give an example of a real-world class and object to illustrate your point.
A: Several individual things of the same kind may be found in the actual world. Many thousands of other…
Q: 4. Show the output of the following code. a) ArrayList topping - new ArrayList (); topping. add…
A: Ans a) : Output of the given code: import java.util.*;public class Main{ public static void…
Q: Describe the field of technological equipment and provide a list of probable employment in this…
A: Technology Equipment means technology assets including mainframe computers, servers, general…
Q: Explain the fundamentals of effective data input fields to us, please. There may be times when these…
A: Data input, an individual based process, is "one of the significant basic" assignments required when…
Q: An intranet or extranet may be used for a variety of reasons.
A: It is true that an intranet or extranet has variety of usages. What is intranet and why it is used?…
Q: Please highlight the sorts of evidence you seek to obtain as a foundation for delivering the…
A: The Fundamentals of Assurance ServicesThey are a type of free professional aid often provided by…
Q: Let's say you want to keep track of all the times the takes relation was modified. Are there any…
A: Given: The core premise of audit trail is the monitoring (or tracking) of database record usage and…
Q: Where may ICTs have a positive impact on business and education? What are some instances of this?
A: Establishment: The term Information and Communication Technology (ICT) didn't arise in front of me…
Q: Iterated and non-iterated GET requests, authoritative and root server DNS records, and DNS queries…
A: Recursive DNS queries occur when a DNS client requests information: On the Internet, Domain Name…
Q: Sort DNS records according on the kind of record they are. Each should be described in detail, with…
A: DNS records are basically instructions written and kept on DNS servers in what is known as a Zone…
Q: In a distributed database system, there are a variety of data access scenarios.
A: The Answer start from step-2.
Q: What are the main distinctions between a local-area network and a wide-area network when it comes to…
A: Local-Area Network(LAN) and Wide-Area Network(WAN): A LAN, or local area network, is a network…
Q: Performing a server database migration might provide a number of risks.
A: Introduction: If the transition process is mismanaged as it frequently is, migration may cause more…
Q: What are the detection mechanisms: a) Sniffing the network (b) Surveillance by wiretap?
A: Sniffing the network: - This technology can be used to test telephone lines and improve call…
Q: Distinguish between functional, matrix, and project organizations. Describe how each structure…
A: Start: A matrix structure is a type of organisational structure where employees are grouped together…
Q: Explain abstraction, encapsulation, information hiding, and formal interfaces in a paragraph.…
A: Abstraction: Abstraction is the practice of displaying just the most important information while…
Q: (a) Fxy2) =Σ (1, 3, 7) (b) F(A, В, С, D) -D П (), 1,2,3,4,6,12)
A: Answer the above questions are as follows
Q: When working with dynamic data, explain the role of the heap. Why would a coder choose dynamic data…
A: A "new" data space is created in certain programming languages (like C++) when dynamic allocation is…
Q: As a means of boosting speed, your organization has opted to clone its product database over many…
A: When it comes to databases, collections of data have been organized so that they are simple to use,…
Q: What is a function in Matlab, and why are functions crucial for coding in Matlab?
A: Answer:
Q: Q1: Write a program to enter the time in second and convert it to hours * .using function called…
A: Code: seconds=input('Enter time in seconds: ');hrs=Seconds_Hour(seconds);fprintf('%d…
Q: If both relationships are not physically sorted, but both have a sorted secondary index on the…
A: Secondary indexes are a critical part of modeling: The merge join and the hybrid merge join are not…
Q: Construct a Deterministic Finite Automata (DFA) for each of the following Languages over Alphabet…
A: The answer for the give question is as follows.
Q: Given the following Matrices; 1 -2 0 -2 0 -4 1 B = 1 0 -1 6 8 2 1 -1 A = -2 3 1 0 1 0 -2 0 3 6 -10 3…
A: Forming the matrix: A = [1,-2,0;-2,3,1;0,1,0] B = [-2,0,-4,1;1,0,-1,6;8,2,1,-1] C =…
Q: Write an overview of the utilization of agile approaches based on annual surveys and surveys funded…
A: Model of flexibility: Agile approach is a development and testing strategy that encourages…
Q: What are the primary distinctions between local area networks and wide area networks when it comes…
A: LAN : Local Area Network is a group of computer and peripheral devices that are connected in a…
Q: A trigger or a process is an option available to you now that you've been employed to work on a…
A: Start: When a given process begins, finishes, or ceases responding, the process trigger initiates a…
Q: Public key cryptography makes extensive use of asymmetric encryption methods.
A: Definition: Symmetric encryption is a kind of data encryption in which two separate but…
Q: In what ways does cloud computing have an edge over on-premises solutions?
A: Cloud Computing: Cloud computing is a method of storing and managing data on distant servers over…
Q: Make a list of all of the different sorts of DNS records. Each one should be explained in detail,…
A: You must do the following tasks in order to answer the questions: - Explain the different kinds of…
Q: What types of in formation system 'Hardware' breaches are most common? Text on a single line.?
A: Hackers are targeting weaknesses in physical device hardware, firmware, and the Unified Extensible…
Q: Constructing widely scattered data environments calls for decisions on how best to balance various…
A: provides businesses with the capabilities to generate: In economics, a trade-off is referred to as a…
Q: Take, for example, a database for an airline, where the database system makes use of snapshot…
A: Presentation: An airline, by definition, is a firm that transports people and goods on aero…
Q: Suppose that there is a long queue of people. The number of people is not known. You have to use a…
A: //find largest height of the person using binary search tree in java /* * To change this license…
Q: In many database systems, processes (also known as threads) communicate with one other by using…
A: Given: A shared-memory multiprocessor architecture is made up of a limited number of processors,…
Q: When it comes to a distributed database, what precisely is meant by "heterogeneous?
A: The Heterogeneous: Homogeneous mixes seem uniform throughout, whereas heterogeneous mixtures contain…
Q: Performing a server database migration may have risks connected with it.
A: If the transition process is mismanaged –which unfortunately occurs frequently migration may cause…
Q: Is it possible to list the Programming Paradigms? What's the point of having so many different…
A: paradigms of programming Programming paradigms are a way of categorizing programming languages based…
Q: Compiled code must be both efficient and accurate, so what factors should programmers consider while…
A: If languages each have a set of grammar rules, and those rules are all the legal expressions, then…
Step by step
Solved in 2 steps with 2 images
- 1. Write a function called `CleanString` that takes one argument, an accounting number formatted as a string, and returns the number as a float. For example, if the argument is the string '$(7,074,619)', the return value should be the float -7074619. This function should be created in the first code cell below. 2. Iterate over the list `data` and "apply" the function `CleanString` to each element of the list. Save the result to a new list, `cleandata` (this iterating should be completed in the second code cell below).Questions P1 and P2 are related to the following code segment. Below is the skeleton of a function that takes a list of integers as an argument and returns True if the sequence [2, 3, 4] appears somewhere in the list. Fill in the blanks (denoted by [P1] and [P2]) with values that make the function operate correctly. def f1(n): for i in range(0,_______[P1]_______): if [1,2,3] == _______[P2]_______: return True return False The value of [P1] isin C++... kth Element Extend the class linkedListType by adding the following operations:a. Write a function that returns the info of the kth element of the linked list. If no such element exists, terminate the program.b. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program. Provide the definitions of these functions in the class linkedListType. PLEASE DON'T reject this question, this is the whole question that I have... so please do it however u can, Thank you!
- in C++ kth ElementExtend the class linkedListType by adding the following operations:a. Write a function that returns the info of the kth element of the linked list. If no such element exists, terminate the program.b. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program. Provide the definitions of these functions in the class linkedListType. please, do not copy from any other sources, give me a fresh new code. Thank youPython question, please use a docstring and have comments throughout the code Write a function makeAllStrings() that takes a 2D list (a list of lists) as a parameter and modifies it. It changes the list so that all non-string objects in the list are replaced with an empty string. Strings in the list are left unchanged, so that a list containing only strings would not be modified. The empty list should also not be modified. The function returns the number of changes made by the function in the list. Recall that you can determine if a variable var holds a string by writing type(var) == str. Please write the condition you want and not the opposite of it. Use nested for loop pattern and if-else. Remember to return the count not the list. Remember you can change the value of an item in a list by using the index operator. Below are some sample executions of the function. Use the nested loop and an if-elif in the solution. Don’t forget to include the docstring and comments. Copy and paste or…Write a function that takes list and a number (x) as parameters. Assume list contains only numbers, the function displays all of the numbers that are greater than x, and return true. If the function does not find any number greater than x, return your false which indicates an error.
- Exercise #3 o Write a program averageLuminance(picture) which takes as input a picture uses functional programming to calculate the average luminance of the picture’s pixels. Use the helper function def luminance(pixel): r = getRed(pixel) g = getGreen(pixel) b = getBlue(pixxel) y = 0.2126 * r + 0.7152 * g + 0.0722 * b return y Within your main program, use map and luminance to create a list of luminances from the list of pixels. This is an example answer to help you formulate an answer for the question above: # Exercise 3 def isDocument(fileName): listOfEndings = [ ".docx", ".txt", ".rtf" ] for ending in listOfEndings: if fileName.endswith(ending): return True return False def recursiveListDocuments(directory=os.getcwd()): files = os.listdir(os.path.normpath(directory)) for file in files: fileName = os.path.normpath(directory + "/" + file) if isDirectory(fileName): recursiveListDocuments(fileName) else: if isDocument(fileName): print fileName1. Write a function named "isBoundedArray" that accepts an array of integersand its size. The function will check the array to see whether the first and the last elementsin the given array are the smallest and largest in the list,or the largest and smallest in the list.If they are, it will return true. Otherwise, it will return false. Requirement: please use only pointer notation in the function. No array notation. For example, the following arrays will return true int numList0[] = {10} ; int numList1[] = {10, 20, 30, 40} ; int numList2[] = {40, 30, 20, 10} ; int numList3[] = {10, 30, 20, 40} ; int numList4[] = {40, 20, 30, 10} ;And these arrays will return false int numList5[] = {10, 40, 20, 30} ; int numList6[] = {40, 20, 30, 50} ; 2. Write a function named “isBinaryString” that accepts a C-string (an array of characterswith a NULL terminating character)and returns trueif that C-string contains a valid binary number and false otherwise. A valid binary string is defined…Hi! I have to make a function that will return a list with all of the prime numbers removed. It should return as a new list. I've already managed to identify the prime numbers on my list but struggled in coding their removal. How do I proceed with this? Thank you!
- 4. Modify the bracketsBalance function so that the caller can supply the brackets to match as arguments to this function. The second argument should be a list of beginning brackets, and the third argument should be a list of ending brackets. The pairs of brackets at each position in the two lists should match; that is, position 0 in the two lists might have [ and], respectively. You should be able to modify the code for the function so that it does not reference literal bracket symbols, but just uses the list arguments. (Hint: The method index returns the position of an item in a list.) the bracketsBalance function: def bracketsBalance(exp):"""exp is a string that represents the expression""" stk = LinkedStack() for ch in exp: if ch in [’[’, ’(’]: stk.push(ch) elif ch in [’]’, ’)’]: if stk.isEmpty(): # Create a new stack # Scan across the expression # Push an opening bracket # Process a closing bracket# Not balanced return FalsechFromStack = stk.pop()# Brackets must be of…Q1:Write a function that returns a new list by eliminating theduplicate values in the list. Use the following function header:def eliminateDuplicates(lst):Write a test program that reads in a list of integers, invokes the function,and displays the result. Here is the sample run of the program Enter ten numbers: 2 3 2 1 6 3 4 5 2The distinct numbers are: 1 2 3 6 4 5 Q2:Write a program that reads in your Q1 Pythonsource code file and counts the occurrence of each keyword in the file.Your program should prompt the user to enter the Python source code filename. This is the Q1: code: def eliminateDuplictes(lst):newlist = [] search = set() for i in lst: if i not in search: newlist.append(i) search.add(i) return newlist a=[] n= int(input("Enter the Size of the list:")) for x in range(n):item=input("\nEnter element " + str(x+1) + ":") a.append(item) result = eliminateDuplictes(a) print('\nThe distinct numbers are: ',"%s" % (' '.join(result)))should be in python: write a function that receives a list as its only parameter. Inside the function remove all the duplicate items from the list and returns a new list and the input should be given by user. For Example: If we call the function with [“dad”, “aunt”, “mom”, “sister”, “mom”] as its user input, the returned value should be [“dad”, “aunt”, “mom”, “sister”]. The order of the items inside the returned list does not matter.