In your code, create an enum with 5 options. Then create an array with 5 strings. Each string is a message to show the user the response to each enum the user entered. Take text input from the user that must be one of the enums. Find the variable integer to the enum that the user entered. Then use the variable to do a lookup in the tuple in order to output the appropriate response.
Q: What does "scope" mean when referring to software?
A: The boundaries of the software's scope are clearly defined. This category encompasses everything…
Q: Definition for each OOP (Class, Object, Field, and Method)
A: Class: Classes are user-defined data types that act as the blueprint for individual objects,…
Q: Towers of Hanoi. There is a story about Buddhist monks who are playing this puzzle with 64 stone…
A: Tower of Hanoi is implemented below using C++ with well defined comments. Kindly check it out.…
Q: How does the department guarantee network access in a switched and routed network?
A: The department guarantees network access in a switched and routed network by ensuring that each…
Q: What is SDLC? Which phases are referred to by what names?
A: The answer is given in the below step
Q: What differences exist between the responsive web design strategies of Mobile First and Desktop…
A: Web design is the process of designing websites for the World Wide Web. Unlike software development,…
Q: What role does the reflection vector perform in computer graphics? Show that your claim is accurate…
A: In computer graphics, a reflection vector is defined as: In the world of computer graphics, the term…
Q: Do you know of any examples of the employment of virtual servers in educational settings such as…
A: Computers that you may access and use online are called virtual desktops. Virtual desktops may be…
Q: Give instructions on how to implement finite-state machine control.
A: Finite state machine (FSM) is a term utilized by developers, mathematicians, engineers and different…
Q: Write a C program and the name of the function is bigy and the argument declared is size, where size…
A: Here is the c program to print the pattern of above problem. see below steps.
Q: What benefits do operating systems that are not dependent on a certain hardware platform offer?
A: Operating System: An operating system (OS) is of the software that controls all other application…
Q: What is the purpose of the reflection vector in terms of computer graphics? Explain with at least…
A: Reflection Vector in Computer Graphics: The reflection vector in computer graphics is used to…
Q: Database system implementations often use strict two-phase locking. Why are this protocol's uses and…
A: Here's the solution:
Q: How do cohesion and coupling differ in the context of software design and development, and what is…
A: In software, how the various lines of modules and code written within those modules are linked is…
Q: Do you know how many phases there are in web design? Determine each step's importance and explain…
A: Introduction: Each of the following steps that go into web design must be explained here, along with…
Q: There can be governance concerns when switching from on-premises to IaaS infrastructure, but how?
A: Introduction: Are there any issues with the governance of moving from on-premise servers to an IaaS…
Q: Can the main goal of software engineering be encapsulated in a few words? What's wrong with it?
A: In object-oriented computer programming languages, the notion of encapsulation refers to the…
Q: In what way does the operating system's High Performance File System compress data?
A: concurrent capacity separate date stamps for the creation, last access, and modification of records…
Q: explain some challenge(s) you can face when using a WiFi, and explain what you think could be done…
A: Answer : Some challenges that may be face by users : 1) Costly : Now days the internet plan are high…
Q: It is sometimes difficult to achieve a layered approach if two components of the operating system…
A: The answer is as below:
Q: What does an SDLC show us, and what does the acronym SDLC stand for?
A: Let us see the details related to SDLC.
Q: Three key organs are required for effective hearing.
A: Given: Ears, Eyes, and Brain are the three primary organs engaged in active, effective listening.…
Q: Develop your own functions for performing following operations on strings: (a) To find the leftmost…
A: Program to demonstrate the following question :-
Q: Do hardware interrupts outperform software interrupts in performance? What are a few instances of…
A: Introduction: The question concerns the distinction between hardware and software interrupts. It…
Q: A finite state machine is crucial, but what does it actually mean?
A: please check the solution below
Q: What does "prototyping" in the context of software development mean?
A: We need to discuss "prototyping" in the context of software development
Q: Which level of the memory hierarchy is volatile and usually uses dynamic cells? Main Memory…
A: Main memory
Q: How well do you network computers? list the many kinds of computer networks
A: Computer network is the interconnection of many computers. This computer network is used to transfer…
Q: What should one remember while changing from one system to the next? Why don't you elaborate more?
A: Keep the following in mind when switching between several systems: It is impossible to significantly…
Q: What is the sfortest linkedlist's node count? which one is the longest?
A: Introduction: A linked list is a unique data structure where every component (called a node) is…
Q: For security purposes, the values of a number of relational database attributes may be encrypted.…
A: The following fundamental traits define a primary key: Each data row must contain a unique value.…
Q: In what ways is the modular kernel approach similar to the layered approach? In what ways does it…
A: The similarities and differences between the modular kernel approach and layered approach is given…
Q: To describe the deployment and operating viewpoint, resources, services, virtual entities, and users…
A: IoT (INTERNET OF THINGS): This is a method of connecting using internet devices that may be…
Q: What network commands would you use in order to troubleshoot a fundamental network? Instructions for…
A: Introduction: When two or more computers are linked together to share resources and information, the…
Q: In the Backtracking algorithm, you are allowed to use Depth-first search. True or false
A: Backtracking: Backtracking is a method for problem-solving based on an algorithm. It constructs a…
Q: If the LDAP standard can be applied on top of a database system, what good is it?
A: LDAP: The records are kept in LDAP (Lightweight Directory Access Protocol) directories and related…
Q: Describe how the computer boots in a series of bullet points.
A: Introduction: Booting is a startup sequence that starts a computer's operating system when it is…
Q: The idea behind OOP is grounded in real-world examples, but how can we demonstrate this? What…
A: OOP stands for Object Oriented Programming. In, Object-Oriented Programming (OOP), the program is…
Q: Why use COTS (Cost On The Shelf) selection in software requirement engineering? What are the WSM's…
A: We need to discuss the role of COTS software and pros and cons of WSM's.
Q: Why do we like the event delegation model and its elements for GUI development? How would you react,…
A: Introduction: The delegation event model outlines uniform and standardized methods for creating and…
Q: What differences exist between the responsive web design strategies of Mobile First and Desktop…
A: Designing for mobile first: In a nutshell, the purpose of mobile-first design is to make something…
Q: A simple telephone system consists of two end offices and a single toll office to which each end…
A: 1) Each telephone makes 0.5 calls/hour at 6 minutes each Thus, a telephone occupies a circuit for…
Q: Is switching from on-premise servers to an IaaS architecture problematic from a governance…
A: Architecture: The IaaS model hosted by cloud providers removes the requirement for organisations to…
Q: What is SDLC? Which phases are referred to by what names?
A: Introduction: Systems engineering A quality system that meets or exceeds customer expectations is…
Q: How does Direct Mapping operate? What is it?
A: Here in this question we have asked that how does direct mapping operate and what is it.
Q: What does "scope" mean when referring to software?
A: In ,scope refers to the degree to which a particular piece (such as a requirement, design choice, or…
Q: What are some of the complaints that UEFI has received throughout the years? Which of the…
A: Introduction: Let's look at everything about UEFI, including the benefits and drawbacks, as well as…
Q: Referential integrity of a database might be compromised, which would have serious repercussions.…
A: Referential Integrity:- The accuracy and consistency of data in a relationship within the database…
Q: What distinguishes test requirements from test criteria?
A: Introduction: When developing tests, identify criteria and requirements. Your test criteria measure…
Q: 1. 2. 3. 4. 5. Assign the value 20 to the second element of array age.- Change the fourth value of…
A: Solution : 1. Assign the value 20 to the second element of array age - age[1]=20; 2. Change the…
Step by step
Solved in 4 steps with 3 images
- Using the following two string arrays, output the first item from the first array with the first item from the second array on the same line (OUTPUT: red Ford). Then, output the second item from each array and output the result. Do this for all four items. String[] firstArray = {“red”, “blue”, “yellow”, “black”}; String[] secondArray = {“Ford”, “Honda”, “GM”, “Toyota”};Create a game similar to Hangman named GuessAWord in which a player guessesletters to try to replicate a hidden word. Store at least eight words in an array, andrandomly select one to be the hidden word. (The statements needed to generate arandom number are shown in the Exercises in the “Decision Making” and “Looping”chapters.) Initially, display the hidden word using asterisks to represent each letter.Allow the user to guess letters to replace the asterisks in the hidden word until theuser completes the entire word. If the user guesses a letter that is not in the hiddenword, display an appropriate message. If the user guesses a letter that appears multipletimes in the hidden word, make sure that each correct letter is placed. Figure 6-27shows typical games in progress in a console-based application and in a GUIapplication. In the GUI application, the user has successfully guessed e, and is about toguess r. Hint: If you create the GUI version of the game, you might want to include…Write a program that creates a two dimensional array with 4 rows and 3 columns that contains the below numbers. Let the computer prompt you to enter these numbers. 8 6 1 7 3 0 2 5 9 5 6 7 After that, calculate and print the total and average of these values.
- Write a program that do the following: Ask the user to input his/her first name and store it in a String variable. Create an ArrayList with the type String. Each letter of the inputted name should be stored in a separate element of the ArrayList. Print the ArrayLists. Note: Your answer should have the code as text, as well as a screenshot of the code with the output. The inputted name should be your first name. Name : RababCreate String array with the following values. [ “ee”, “ff”, “gg”, “hh”, “kk”, “mm”, “nn”, “pp”, “ss”, “zz”]Create an array called myArray with 10 elements Store a value which is 10 plus the index in each element. Print out the array elements so you see the index and the value of the array elements. Output should look like this: myArray[0]=10 myArray[1]=11 myArray[2]=12 myArray[3]=13 myArray[4]=14 myArray[5]=15 myArray[6]=16 myArray[7]=17 myArray[8]=18 myArray[9]=19 Note: there are no spaces between any of the characters. code: #include <iostream>using namespace std; main(){// declare array of 10 integers // set each value in the array to the index value plus 10 // print out the array }
- A class with 10 students will take 3 exams. Use 3 arrays to hold the scores for each student and another array to hold the average of the 3 exams for each student. Print a table with scores and the average. SAMPLE OF HOW THE OUTPUT SHOULD BE STUDENT EXAM 1 EXAM 2 EXAM 3 AVERAGE 1 2 3I want to see how one can add 80 elements into an array without manually entering in each element. Given two arrays named numberArray1 and numberAray2 that each have 80 elements, write the code that will copy all the values in numberArray1 to numberArray2.A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991
- A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Using Scanner.input to prompt user, Use the following names and phone numbers: Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers:A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991 import java.util.*; class PhoneNumbers { public static void main(String[] args) { // Write your code here } }