I fileio01.cpp #include #include 4 5日{ int main()) FILE *fptrI, *fptrC; fptrI = fopen ("datafile.dat","r"); fptr0 = fopen("outfile.out","w"); 10 11 12 13 14 15 float MARK1, MARK2, MARK3, AVG; int COUNTER = 0; fprintf(fptrC, "MARK1\TMARK2\TMARK3\TAVERAGE"); fprintf(fptrC, "\n- "); 16 while (COUNTER < 6) 17 B 18 fscanf(fptrI, "%f%f%f", &MARK1, &MARK2, &MARK3); 19 20 AVG = (MARK1 + MARK2 + MARK3) / 3.0; 21 22 23 fprintf(fptrC, "\n%.2f\t%.2f\t%.2f\t%.2f", MARK1, MARK2, MARK3, AVG); COUNTER = COUNTER + 1; 24 25 26 27 fclose (fptrI); fclose (fptrC); return e; 28 29 30 31
Q: What are the benefits and drawbacks of caching disc write operations?
A: Benifits Caching disc write operations improves performance by allowing the operating system to av...
Q: A list of five common network topologies should be included. Which one do you think is the most trus...
A: Introduction: Many topologies exist, such as the Ring topology. Diagram of a bus Topology based on s...
Q: int main() int NUMBER, BALANCE; printf("Please enter a number "); scanf("%d", &NUMBER); BALANCE = NU...
A: Code: #include<stdio.h> int main(){ int N,B; printf("Enter a number: "); scanf("%d ",...
Q: Please Explain when creating a WebService Call or HTTPCallout Why we use the MOCK Class when Writing...
A: Apex Test Class Generated code is saved as an Apex class containing the methods you can invoke for ...
Q: Write a Python program that counts the amount of identical values in a list below, and prints them.
A: def repeatedValue(x): repeated = [] for i in range(len(x)): k = i + 1 for j in range(k, len(x)): ...
Q: In terms of emphasis, what distinguishes the TPC from the SPEC?
A: Answer: Instead of focusing just on performance, TPC assesses the following features of a system: r...
Q: How does routing function and what precisely is it? Learn how to distinguish between two common rout...
A: If you're deciding where to send your data, you're doing something called routing. For example, the ...
Q: What does the first compound notation mean?
A: Introduction: A compound is a substance made up of two or more different elements. Compounds include...
Q: Is backup the responsibility of the database administrator or the database user? a person who manage...
A: Data is the new oil in this 21st century and hence backup is very important in case of databases.
Q: What scientific knowledge serves as a basis for the development of the internet. Explain also how in...
A: What scientific knowledge serves as a basis for the development of the internet. Explain also how in...
Q: A list of five common network topologies should be included. Which one do you think is the most trus...
A: Introduction: The arrangement of a network's connections and nodes, or its topology, is referred to ...
Q: In terms of emphasis, what distinguishes the TPC from the SPEC?
A: TPC and SPEC: The Transaction Procession Council (TPC) is a non-profit organisation that creates be...
Q: Give one benefit and one drawback of the Microkernel OS over the Monolithic OS. Provide evidence to ...
A: Introduction: An operating system's kernel is the most crucial portion of the operating system. Thi...
Q: When is it advisable to implement brouter on your network?
A: Step 1 Find the answer given as below :
Q: What is the expected modeling method, and why was it picked for a certain model?
A: The frameworks model methodology is a cycle situated portrayal that underscores the effect or stream...
Q: Examine the advantages and disadvantages of various system models.
A:
Q: What is a distributed denial of service attack, and how can it be carried out by a single individual...
A: DDoS (distributed denial of service) attack: Following the discovery of the limits of single-system ...
Q: find is the charact3ristic-s of log (1020.20)
A: А lоgаrithm is the роwer tо whiсh а number must be rаised in оrder tо get sоme оthe...
Q: As CISO, you are in charge of developing an information security programme that is backed by a frame...
A: Answer Information security program is based on following 3 principles: confidentiality availability...
Q: What does the first compound notation mean?
A: Introduction: MicrocontrollerMicroprocessor8085. Signed integers may be represented in computers in...
Q: Why do we need cache memory, which is also transistor-based, if RAM (Random Access Memory) is a vola...
A: Memory in the cache is faster than memory in the main system. When compared to main memory, it uses ...
Q: If you're conducting user research, why not separate the overall design into multiple user viewpoint...
A: Introduction: If you're conducting user research, why not separate the overall design into multiple ...
Q: Discuss the use of the NTSC video 'quadrature modulation technology.' Contrast three analogue broadc...
A: The use of the NTSC video 'quadrature modulation technology are defined as NTSC and PAL simple shadi...
Q: In terms of emphasis, what distinguishes the TPC from the SPEC?
A: Difference between TCP & SPEC given below :
Q: A list of five common network topologies should be included. Which one do you think is the most trus...
A: There are six types of topology. Bus topology Ring topology Mesh topology Star topology Tree top...
Q: Allows the use of cout without a prefix std:: a. pre-processor directive b. namespace std c....
A: b. namespace std
Q: • Define 3 variables: x, y, z as a float data type. Assign 4.0/3 to x, 98.543785 to y, and 1e3 to z....
A: 1) Since programming langauage was not specified, I ahve written program in C langauage 2) Below is ...
Q: Was it necessary to use many assessment methodologies in order to provide a more complete picture of...
A: Introduction: Even if checks are currently used for a variety of purposes in the educational system,...
Q: Smart PLDT 2. Cignal
A: funcitonality, It is used to store and process the logical and calculative information, Provide th...
Q: Please write a program that checks if the last data item entered appears earlier in the list. The i...
A: Coded using Python 3.
Q: In terms of emphasis, what distinguishes the TPC from the SPEC?
A: Let's see the solution in the next steps
Q: Filter programmes such as sed and awk are often used to format data in pipelines. Is this a true or ...
A: Explaination As the name suggest filter programs . We already know what is filtering right ? Filter...
Q: Give an inductive definition of the function nodecount(t) which computes the number of internal node...
A: Actually, given question regarding binary tree.
Q: Assume you've been asked to create a hospital patient monitoring system and that you've been provide...
A: Answer: Specifications for the Software Requirements Engineering (SRS) It's a form of software requ...
Q: What factors influenced the evolution of computer security into current information security?
A: Introduction: Computer security, alternatively referred to as cybersecurity or information technolog...
Q: Give one benefit and one drawback of the Microkernel OS over the Monolithic OS. Provide evidence to ...
A: The answer is given below:
Q: Use a request for proposal to gather information on hardware and system software, and explain why it...
A: Request for Proposal is commonly abbreviated as RFP. The word is sometimes used interchangeably with...
Q: What is the function of a firewall, and how can it be employed in your organisation?
A: A firewall is a security device in the form of computer hardware or software which protects our comp...
Q: Write a C# program to find the area of a triangle. The user must capture the inputs. Use the correct...
A: The area of triangle=(base*height)/2 Algorithm: Start Read base b and height h Calculate area=(b*h)...
Q: What do you consider to be critical infrastructure?
A: Critical infrastructure: Critical infrastructure play a vital role in supporting modern society. It ...
Q: Why isn't virtual memory utilised more often in embedded systems?
A: modern computers use virtual memory to allow applications to access a virtually infinite amount of m...
Q: What are the two types of files, in general, that exist? In what ways do these two file formats diff...
A: A document can be characterized as an assortment of information or data. Notwithstanding, the PC dea...
Q: Write a simple console application to accept the item name and item price. The program should calcul...
A: As no programming language is mentioned, it is solved using basic python
Q: Most people confuse computer databases with flat files and directories. In your own words, describe ...
A: A database is a collection of data, They help in data storage and manipulation. Databases help handl...
Q: Asymptotic notation Prove each of the following. You can use either the definitions of the form "exi...
A: I have answered this question in step 2.
Q: Need help wit
A: Coded using C language.
Q: When using magnetic disks, certain databases only use sectors in the outer tracks, leaving sectors i...
A: Introduction: As per our policy, "Since you have asked multiple questions, we will solve the first q...
Q: Describe cloud computing in full, including the benefits of utilising it.
A: Introduction: Cloud Computing: Cloud Computing is a term that refers to the service of providing com...
Q: A machine cycle is a four-part closed-loop process. Explain why the machine cycle is so important. I...
A: Here we have given answer regarding the importance of machine cycle and feasibility to swap.
Q: Write a program that uses a while loop to generate a table showing the 7% sales tax and total charge...
A: import java.util.*;import java.text.*;class Main { public static void main(String[] args) { ...
Rewrite the program with a little bit of changes in the codes
Step by step
Solved in 4 steps with 3 images
- C++: You will create a header file with implementation that performs the task. Together with the header and implementation, you create a test program whose main function demonstrates that your functions work as they should. Two files, A and which they are sorted. The files contain Numbers. Based on the files, create a third file let calles it C . that file C is going to contain all the elements in sorted order from both files A and B. This operation is called a merge..C++: You will create a header file with implementation that performs the task. Together with the header and implementation, you create a test program whose main function demonstrates that your functions work as they should. Two files, A and B which they are sorted. The files contain Numbers. Based on the files, create a third file let calles it C . that file C is going to contain all the elements in sorted order from both files A and B. This algorithm is called a merge..void Pokedex::wakeupProfessorJimi(std::string) − populates the dynamic array of Entries with data from a valid file path, the function should open the file and use the add (Pokemon*, int) function to insert a Pok ́emon into the correct position in the dynamic array of Entries. Once the position is determined, the Pok ́emon should be inserted into the corresponding position in the list of Pok ́emon belonging to the Entries object. i aready have a pokemon class with enum for types, move class and move class setup and working it's just this one part. here is the text file 1,Bulbasaur,45,49,[Grass,Poison],Fire,Water,[[tackle,40,40,100],[vine whip,45,45,100],[growl,10,10,100]] 2,Ivysaur,60,63,[Grass,Poison],Fire,Water,[[leech seed,45,45,90],[razor leaf,55,55,95],[growl,10,10,100]] 3,Venusaur,80,83,[Grass,Poison],Fire,Water,[[tackle,40,40,100],[leech seed,45,45,90],[razor leaf,55,55,95],[growl,10,10,100]] 4,Charmander,39,43,[Fire],Water,Fire,[[growl,10,10,100],[fire fang,65,65,95]]…
- (a) Write a C function readNums() that takes a filename and an integer array, reads the integer numbers in the file and stores into the array, returns the number of numbers stored in the array. Assume that the file only contains integer numbers, and nothing else. Prototype: int readNums(char filename[], int arr[]); (b) Write a C function delWordN() that takes a string and an integer (n) as parameter, removes from the string the words that are n character long. A word is a group of consecutive alphanumeric characters; words are separated by non-alphanumeric characters. ps: please do not copy paste from chegg or anywhere else. write unique code9.12 LAB: File name change PYTHON A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg GrandCanyon1996_photo.jpg IndianaDunes1987_photo.jpg LakeClark2009_photo.jpg…Write a function that takes (i) a FILE pointer (e.g. FILE *fp) type variable, (ii) an array of student struct (that you defined in the previous question), and (iii) the number of valid elements in that array as parameters, and write those elements in a file named "students.dat". This function should return 1 if it can successfully open this file; otherwise, it should return 0.Please use C language
- 9.12 LAB: Movie show time display IN C CODE PLEASE Write a program that reads movie data from a CSV (comma separated values) file and output the data in a formatted table. The program first reads the name of the CSV file from the user. The program then reads the CSV file and outputs the contents according to the following requirements: Each row contains the title, rating, and all showtimes of a unique movie. A space is placed before and after each vertical separator ('|') in each row. Column 1 displays the movie titles and is left justified with a minimum of 44 characters. If the movie title has more than 44 characters, output the first 44 characters only. Column 2 displays the movie ratings and is right justified with a minimum of 5 characters. Column 3 displays all the showtimes of the same movie, separated by a space. Each row of the CSV file contains the showtime, title, and rating of a movie. Assume data of the same movie are grouped in consecutive rows. Hints: Use the…Q. Lseek () is can be used to change the _________ of r/w pointer to move around in file without reading or writing any data.Read Data Write a function that reads in data from a file using the prototype below. The function can define and open the file, read the names and marks into the arrays and keep track of how many names there are in numElts, and then closes the file. The list of names and marks can be found at the end of the lab and copied into a text file. void getNames(string names[], int marks[], int& numElts); Display Data Write a function to display the contents of names and marks using the prototype given below. void displayData(const string names[], const int marks[], int numElts); Linear Search Write the searchList function given the prototype below so that it searches for a given name. The functions returns and int which is the index of the name found. The main program will decide if -1 is returned then it will say name is not found otherwise it will write out the name and the mark for that name. int linearSearch(const string list[], int numElts, string value);…
- Create a new C++ project in Visual Studio (or an IDE of your choice). Add the files listed below to your project: BinaryTree.h Download BinaryTree.h BinarySearchTree.h Download BinarySearchTree.h main.cpp Download main.cpp Build and run your project. The program should compile without any errors. Note that function main() creates a new BST of int and inserts the nodes 12, 38, 25, 5, 15, 8, 55 (in that order) and displays them using pre-order traversal. Verify that the insertions are done correctly. You may verify it manually or use the visualization tool at https://www.cs.usfca.edu/~galles/visualization/BST.html. (Links to an external site.) Do the following: 1. add code to test the deleteNode and search member functions. Save screenshot of your test program run. 2. add code to implement the nodeCount member function of class BinaryTree. Test it and save screenshot of your test program run. 3. add code to implement the leafCount member function of class BinaryTree. Test it and…Word FrequencyWrite a python program that reads the contents of a text file. The program should create a dictio-nary inwhich the keys are the individual words found in the file and the values are the number of timeseach word appears. For example, if the word “the” appears 128 times, the dictionary wouldcontain an element with 'the' as the key and 128 as the value. The program should eitherdisplay the frequency of each word or create a second file containing a list of each word and itsfrequency.. In c write a program that:a) takes an input file name from the command line;b) opens that file if possible;c) declares a C struct with three variables; these will have data types thatcorrespond to the data types read from the file (i.e. string, int, float);d) declares an array of C structs (i.e. the same struct type declared in point c);e) reads a record from the file and stores the values read into the appropriatestruct variable at the appropriate array index (for that record);f) continues reading each record into a struct (as in point 1e), and stores eachstruct containing the 3 values into the array of structs declared in point d;g) closes the file when all records have been read.Note that your program should print an error message in the event that the filecannot be opened successfully.