Instructions: 1. Create a console program that will perform the following: Ask the user to enter the pieces of apple. • Ask the user to enter the total price of the apple(s). Print the total price of the entered pieces of apple(s). Convert the entered price into a whole number, then display the values of the original price and the converted price. 2. Name the project as DataTypesApp and the class as DataTypesProgram. 3. Example output: O file///C/Users /Documents/Visual Studio 2015/Projects/ConsoleApp/ConsoleApp/b. - O X Enter the pieces of apple: 6 Enter total price of 6 apple(s): 105.50 The total price of 6 apple(s) is 105.5 The value of original price is 105.5 The value of converted price is 105 Press any key to exit.....
Q: Windows RDP Multi-factor Authentication options- Find an option (Google is your friend for this.) fo...
A: As per my knowledge for enhancing the security with two factor authentication. Windows RDP IS descr...
Q: What are the two most common types of UPSs?
A: Introduction: Usually there are three types of UPSs. Two primary types of UPSs would be:- Online ...
Q: Obtain an image, preferably one with lines in it, and take its Radon transform. Similar to part 1, i...
A: import numpy as npimport matplotlib.pyplot as pltimport cv2 # Get the imageimg = cv2.imread('image.p...
Q: gate with three input signals and one output The operation F(X, Y, Z) - (IX + !Y + IZ) can be implem...
A: Answer is: NAND Gate NAND gate has three input: X, Y, Z and output is F = (X + Y + Z)' = X' + Y' +Z...
Q: a distributed database is composed of several parts known as database _________. A) sections. B)...
A: A distributed database is one in which different parts of the database are kept in different physica...
Q: Give 5 types of website and its features
A: Business Type website : A business website is one that is created to represent a company's online i...
Q: in a database?
A: given - What is the most effective approach to use a sequence in a database?
Q: nformatio
A: To start building a complete, professional job listing for your company, add your information securi...
Q: #include using namespace std; main() { int a=3, b=2,c=a*b; b++; a=b++; b++;
A: INTRODUCTION: We need to tell the output of the code
Q: How would you find the cover page of the DVWA documentation from kali that is located in metasploita...
A: How would you find the cover page of the DVWA documentation from kali that is located in metasploita...
Q: What exactly is a poison package assault, and what does it imply? Please provide two instances of th...
A: Introduction: ARP Poisoning, also known as ARP Spoofing, is a sort of Internet attack on the Local A...
Q: In Javascript, Print out console.log("The page has been fully loaded") after the window has been loa...
A: In this question, we are asked to two ways to know the page is reloaded or not in java script Explai...
Q: We are currently learning about Python. We are tasked to: 1. Receive 2 random numbers as input. 2. D...
A: Start Take two random numbers as input. Find the given numbers are even or odd. Compute the which on...
Q: program accepts the height of a person in centimeter and categorise the person according to their he...
A: Here in this question we have given a incomplete code segment and we have asked to find the correct ...
Q: hy should the DEMS update the catalogue when the database configuration changes? Is it possible for ...
A: Introduction: The System Catalog is where the database information is kept.
Q: Why do you believe CPU scheduling is critical? What's more, why does scheduling use a separate algor...
A: CPU scheduling can be defined as a process of figuring out which cycle will possess CPU for executio...
Q: What are some of the security mechanisms/techniques that might be employed in vehicular or vehicle-t...
A: Because the number of cars on the road nowadays is constantly increasing, many cutting-edge technolo...
Q: What are the notions of functions in Swift again? What are the qualities of Swift's functions that d...
A: Introduction: A function is a collection of statements that accomplish a certain activity. It is giv...
Q: Explain in detail what data security is, as well as the three categories of data ownership and their...
A: The definitions asked are:- Data security The types of data ownership
Q: Determine the first 4 subnets
A: Address 192.168.200.0 11000000.10101000.11001000.00000000 Netmask 255.255.255.0 11111111...
Q: ou need to put counters in the code like you did in lab1. You just have to count all the searches (p...
A: Here, I have to fill the code which is missed.
Q: Which of the following network address will match the wildcard mask 0.0.255.255? O 192.168.1.0 O 192...
A: Given:
Q: What exactly is a set? Is there a connection? A function?
A: Introduction: the question is about What exactly is a set? Is there a connection? A function and her...
Q: 1. How is data exchanged between components acco
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: What is the difference between ASCII and Unicode? What are some of the difference between string and...
A: Introduction: What is the difference between ASCII and Unicode? What are some of the difference betw...
Q: Write a MATLAB program in a script file that finds and displays all the numbers between 100 and 999 ...
A: Use a for loop to iterate over the numbers 100-999 The find the individual digits and check for the ...
Q: 6. This question is about TCP fairness. We know that TCP's AIMD (additive increase, multiplicative d...
A: Answer : The additive-increase/multiplicative-decrease (AIMD) algorithm is a feedback control algori...
Q: Give example of Date class from Simple date format class in JAVA.
A: Introduction: The java.text.SimpleDateFormat class in Java contains methods for formatting and parsi...
Q: Jami works as an intern on a huge insurance company's sales team. Jami is requested to get a list of...
A: INTRODUCTION: There are ethical issues to consider when it comes to this situation. The first issue...
Q: Determine the highest real root of f(x) = x3 – 6x2 + 11x – 6.1 using the Newton Raphson method (thre...
A: Actually, given the information real root of f(x) = x3 – 6x2 + 11x – 6.1.
Q: For this assignment you will be working with arrays and File I/O. Open a new Java file called Nums.j...
A: Step 1 : Start Step 2 : Take user input of the file name from the user. Step 3 : Open the file using...
Q: please answer this question within 1500 words.... with docs or pdf file A Comparative Study of Oper...
A: INTRODUCTION: We want to discuss memory management in Windows, Linux, and Mac.
Q: A body falls from rest in the gravitational field of the earth. The distance travelled in the fifth ...
A: Hi Dear!! Please give positive feedback!! As per the Bartleby guidelines I am giving a solution for ...
Q: Implement a method transfer in class LinkedStack. This method should transfer all elements of a stac...
A: Here, I provide a java solution to the above question.
Q: The reason you purchased a cybercafe internet package (download and upload speeds), as well as the I...
A: Introduction: Individuals and businesses can connect to the Internet through computer terminals, com...
Q: Which of the following encryption method uses the same key to encrypt and decrypt the data? O Data E...
A: Given we know that encryption method uses the same key to encrypt and decrypt the data ...
Q: How can transport protocols be utilised to meet the demands of users? For each service, mention TCP,...
A: Introduction: Consider UDP to be a mailbox and TCP to be a telephone. Both have a phone number that ...
Q: Explain how nested loops are used to assign and report values from multidimensional arrays.
A: Introduction A nested loop is a mechanism where we write a loop inside another loop and for multidi...
Q: Complete the Truth Tables. STATEMENT: (? ∧ ?) ∨ ~? p q p ∧ q ∼p (p ∧ q)∨∼p T T T ...
A: As given, we need to complete the truth tables for the given statements. i) (p ∧ q) ∨∼p ii) ~q → (~...
Q: A Caesar cipher is a simple substitution cipher based on the idea of shifting each letter of the pla...
A: Here is the detailed explanation of the program
Q: In a short paragraph, explain how the DOM tree works, and how elements can be added and removed from...
A: The DOM is frequently alluded to as the DOM tree, and comprises of a tree of objects called hubs. In...
Q: What Tri-state buffer? Discuss briefly unidirectional channel sharing using Tri-state buffer.
A: Given We know about the Tri-state buffer and unidirectional channel sharing using tri state buffer
Q: B) Write a PYTHON script to enter a value of S (between 1 and 3) for (50) entered values of X then f...
A: In this question, we are asked to write a python program or script which sum as per the given condit...
Q: Using binary state encodings, complete a state transition table and output table for the FSM. Write ...
A: Given equation about state machine.
Q: Write a program to calculate y from the equation using (switch) statement (3x-7)if(x=-5) y=(5x')(x=2...
A: Code is given below :
Q: What does the osi model entail? And what are the many types?
A: The OSI model definedThe OSI version (Open systems Interconnection version) is a conceptual framewor...
Q: what is the key Connect records of one kind to records of another.
A: Introduction: A one-to-one connection is a link between two tables of data in which each entry occur...
Q: 6) Write assembly language code that takes an 8-bit signed number in a register as its input and sig...
A: Here is the detailed explanation of the solution
Q: Denial of Service (DoS) is one type of attack, which of the following action-can perform when it acc...
A: Here in this question we have asked about denial of service attack..and among four option we have to...
Q: Consider the following ERD; consider additional attributes if needed Write relational algebra expres...
A: Here i write relational algebra query for all : ====================================================...
please I need help on this...Im using C#, please include screenshots of the code and the output, thank you
Step by step
Solved in 3 steps with 1 images
- !!!FIRST READ EVERYTHING WRITTEN BELOW AND IF YOU CAN DO IT ONLY THEN START AND NO PLAGIARISM!!! Only use C++ to do this task. And I will only give thumbs up if you do not plagiarize from another Chegg or internet source. Also only if you will follow all the below instructions 100%. Only write typed answer. No handwritten. Code must visibly shows the functions and class. Attach the screenshot of output and code must be 100% complete and correct. Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which will be stored in an array with a capacity of 5. These users/followers could be in the form of string or Profile but both must be of same type. (Note that the followers are not stored as users, but as strings or Profiles). At any time, your main program should be able to remove any user, x from following another user, y (i.e., x is no longer in the array of followers of y). You are free to design your program as you…Project Name: ActivitiesClass name: Dollar_Conversion Write a Java program that will accept theamount of US Dollar and convert to PhilippinePeso. The current exchange rate is 1 dollar is to 49.75pesos. Convert 50 dollars to peso. Display the converted value using three (3)decimal places. Using blueJInstructions The files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, remove all syntax and coding errors, and run the program to ensure it works properly. An example of the program is shown below: Enter name Juan Hello, Juan! Task 1: The DebugThree3 class compiles without error. Task 2: The getName() method accepts user input for a name and returns the name value as a String. Task 3: The displayGreeting() method displays a personalized greeting. Task 4: The DebugThree3 program accepts user input and displays the correct output.
- Create pseudocode, flowchart and python code for the Patient Charges program. Thisfinal project requires multiple files (modules, drivers, and your main).Design a class named Patient that has fields for the following data:● First name, middle name, last name● Address, city, state, and ZIP code● Phone number● Name and phone number of emergency contactThe Patient class should have a constructor that accepts an argument for each field. ThePatient class should also have accessor and mutator methods for each field.Next, write a class named Procedure that represents a medical procedure that has beenperformed on a patient. The Procedure class should have fields for the following data:● Name of the procedure● Date of the procedure● Name of the practitioner who performed the procedure● Charges for the procedureThe Procedure class should have a constructor that accepts an argument for each field.The Procedure class should also have accessor and mutator methods for each field.Next, design a…Assume you are working for a company and given the task to build an Email Registration Program. Theemail registration program functions as follows.• Prompt the user four things: first name, last name, security question answer, and birthyear.o Example:Enter first name: LeBronEnter last name: James(Security Question) Favorite car maker: BentleyEnter birth year: 1984• Generate a default Kean email address based on the first name and last name.o The default Kean email address consists of the first letter of the first name, a period, theentire last name all in lower case appended with @kean.edu.o Example: LeBron James → l.james@kean.edu• Generate a default password based on the last name, security question answer, and birthyear.o The default password is a sequence of 3 letters from last name, birthyear, and 3 lettersfrom the security question answer all in upper case.o Example: LeBron, 1984, Bentley → LEB1984BEN• Display the email information with first name, last name, email address, and…Assume you are working for a company and given the task to build an Email Registration Program. Theemail registration program functions as follows.• Prompt the user four things: first name, last name, security question answer, and birthyear.o Example:Enter first name: LeBronEnter last name: James(Security Question) Favorite car maker: BentleyEnter birth year: 1984• Generate a default Kean email address based on the first name and last name.o The default Kean email address consists of the first letter of the first name, a period, theentire last name all in lower case appended with @kean.edu.o Example: LeBron James → l.james@kean.edu• Generate a default password based on the first name, security question answer, and birthyear.o The default password is a sequence of 3 letters from last name, birthyear, and 3 lettersfrom the security question answer all in upper case.o Example: LeBron, 1984, Bentley → LEB1984BEN• Display the email information with first name, last name, email address, and…
- Please use Python for this problem: Please make sure your code is in the correct format and please post a screenshot of the code from Python. When you are finished, test your solutions using a doctest: Develop a class Volume that stores the volume for a stereo that has a value between 0 and 11. Usage of the class is listed below the problem descriptions. Throughout the class you must guarantee that: The numeric value of the Volume is set to a number between 0 and 11. Any attempt to set the value to greater than 11 will set it to 11 instead, any attempt to set a negative value will instead set it to 0. This applies to the following methods below: __init__, set, up, down You must write the following methods: __init__ - constructor. Construct a Volume that is set to a given numeric value, or, if no number given, defaults the value to 0. (Subject to 0 <= vol <=11 constraint above.) __repr__ - converts Volume to a str for display, see runs below. set – sets the volume to…The following question deals with Object Oriented Programming in Python Pseudocode into a flowchart. The question: Design a class named Pet, which should have the following fields: name- holds name of the pet type-holds the type of animal the animal age-holds age of animal The Pet class should also have the following methods: setName: stores string value in the name field setType: stores string value in the type field setAge: stores integer value in age field getName: returns value of the name field getType: returns value of the type field getAge: returns value of the age field. Once you have created the class, design a program in flowchart form that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This data should be stored in the object. Use the object's accessor methods to retrieve the pets name, type, and age and display this data on screen. Also, the class methods should each be illustrated as separate functions. The…Instructions The files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, remove all syntax and coding errors, and run the program to ensure it works properly. An example of the program is shown below: Enter a radius for a circle >> 7 The radius is 7 The diameter is 14 The area is 153.93791 Task 1: The DebugPen class compiles without error. This task is dependent on completing task #2. Task 2: The DebugCircle class methods work without errors. Task 3: The DebugFour1 class compiles without error. Task 4: The DebugFour1 program accepts user input and displays the correct output.
- how to do this?Project Name: Employees’ Information Problem Definition: Create and design a program that will accept employee’s information such as employee number, employee name, employee status (T-Tenured / P-Probitionary / C-Contractual), employee position title, basic salary, year end bonus and year hired. Program Specifications: Create and design a Menu Option for Employee Information with an ASCII Art. A Python class/object concept must be apply to perform the following individual method: Data Entry. Create the Python Methods to accept employee’s information. Salary Entry. Designed a screen message to accept employee’s salary. Gross salary = hours worked multiply (160 hrs) by rate per hour Year End Bonus = Annual Salary * Bonus % (see table below) Annual Salary = Gross salary multiply by 12 months Display Information. Designed the employee’s information pay slip. Consider the following criteria of employees’ salary: Years of Service Year Bonus Employee…Create a main program as MyStore Prompt the user to enter the following details via keyboard Enter a Product Name : ________ Enter Unit Price : ________ Enter Quantity : ________ Instantiate an object of Product class and pass the variables as the parameters for the new Product. ------------------------------------------------------------ Create a Product class Declare the following as private properties: prodName and prodPrice Create a constructor of the Product class * copy the values of the parameters in the constructor to the properties. * Display the following: Product entered : <prodName> Price entered : <prodPrice> Amount : ? Discount : ? Net Amount : ? -------------------------------------------------------------- Enter a Product Name : Noodles Enter Unit Price : 8.50 Enter Quantity : 10…Farrell, Joyce. Microsoft Visual C#: An Introduction to Object-Oriented Programming 4. a. Create a program named WritePatientRecords that allows a doctor’s staff to enter data about patients and saves the data to a file. Create a Patient class that contains fields for ID number, name, and current balance owed to the doctor’s office. b. Create a program named ReadPatientRecords that reads the file created in Exercise 4a and displays each patient’s data on the screen. c. Create a program named FindPatientRecords that prompts the user for an ID number, reads the file created in Exercise 4a, and displays data for the specified record. d. Create a program named FindPatientRecords2 that prompts the user for a minimum balance due, reads the file created in Exercise 4a, and displays Using console application, combine all four parts in one program and name it PatientRecords, please make sure to include exception handling in this program.