Make a function to crawl through the current directory and display all the available files with .txt extension.
Q: The portion of a machine language instruction that defines object (or target) of a mathematical or…
A: We are going to learn what portion of machine instruction defines object (or target) of a…
Q: What is it about information system design that makes it so susceptible to scope creep in the first…
A: Introduction: The suggestions of clients and other stakeholders are a significant cause of scope…
Q: Write an application that stores nine integers in an array. Display the integers from first to last,…
A: HI THEREI AM ADDING C CODE AS PER REQUIREMENT BELOWPLEASE GO THROUGH IT THANK YOU
Q: What exactly are memory leaks?
A: Memory Leak: Memory leak means whenever programmers will create a memory in heap and whey they…
Q: What role does a processor's register play? Explain what an Interrupt Service Routine (ISR) is and…
A: Explanation: Registers in a processorRegisters are a sort of computer memory that allows the CPU to…
Q: What level of security was standard when computers were initially introduced? Explain
A: INITIATION: In 1822, Charles Babbage invented the first mechanical computer, which did not resemble…
Q: What sort of tree does the Java Standard Library create for ordered data?
A: Introduction: Ordered Data in a Tree: The Tree Set interface of the collections in Java may be used…
Q: make a text-based wordle game in python with 4 to 6 letter words and you have 7 guesses to guess the…
A: Text-based wordle game in python with 4 to 6 letter words and you have 7 guesses to guess the word…
Q: Do you agree with Dr. Ferrucci that one day all computers will be like Watson? What would you do if…
A: Introduction: Watson is the data required by technical support staff to diagnose a software fault on…
Q: Programming in C# write a gui application that prints out all numbers in the range 1 - 100…
A: Algorithm: Start Create a label with name label Initialize s and s1 to empty string Iterate through…
Q: Consider the 00 1E A3 10 UDP header 12 03 00. HOW LONG DOES THE UDP TAKE IN TOTAL?
A: Introduction: In the TCP/IP paradigm, the User Datagram Protocol (UDP) is a transport layer…
Q: Differentiate between the many types of computer networks (based on scale)?
A: Answer:
Q: 5 Six digital media channels are introduced in this chapter. What are they and how do they work to…
A: Exаmрles оf digitаl mediа inсlude sоftwаre, digitаl imаges, digitаl videо, videо gаmes,…
Q: 1. Which regular expression generates the language of ALL alternating strings over E = {a, b},…
A: As per our guidelines only 3 mcqs are answered. So, please repost the remaining questions…
Q: Discuss the networking aspects that impact your Google Meet connection positively and what you can…
A: To provide high-quality video meetings with Google Meet, you must design your network so that Meet…
Q: 1.Consider a complete graph G with 4 vertices. The graph G has. ---- spanning trees. 2. Consider a…
A: 1. The graph can have many cross trees. And a complete graph with n vertices has n (n-2) expandable…
Q: Problem 4.2: Following is a 9 by 9 matrix. 1 represents the obstacle and 0 represents the path. Find…
A: Sample Screenshot:
Q: How would i use python the create a function to display the different stores that made a sale in…
A: The first thing to be done is to copy the csv file in the root folder where python files are…
Q: FUNCTION AND ARRAY ( C++ LANGUAGE) Create a sequence program that will input names to the arrayName…
A: PROGRAM INTRODUCTION: Include the required header files. Declare the required global variable.…
Q: The size of the memory could be given as:
A: The answer is
Q: Kindly draw the Data Flow Diagram (DFG) for code. function parseString(str, a, b) { var cb, options;…
A: The DFD for the given program is as follows.
Q: Where necessary, use correct syntax to define the following notions. Also, explain why these terms…
A: Introduction: Because there are several questions, the first three will be addressed. Please submit…
Q: Make an SRS document for the whole enrollment process.
A: There are specific characteristics that every SRS should have. By reviewing this list and comparing…
Q: • Define a void function called myFunc that takes a 2-by-3 integer array as an argument and performs…
A: The question does not state any particular programming language for the solution to be in. We have…
Q: Explain the characteristics of JavaScript programming language
A: Characteristics of JavaScript programming language: -> It is an open source scripting language…
Q: Convert the code into compiled RISC-V code in simplified solution : for(i=0;i< size;i++) If(B[i]…
A: The solution to the given question is: RISC-V code: f(int*, int*): # @f(int*, int*) addisp, sp, -32…
Q: What are the principles behind cyclic redundancy checks?
A: CRC is an error-detection technique commonly used in digital networks and storage devices to detect…
Q: Explain what a system model is and what it is used for. What considerations should be taken into…
A: Instigation: In the systems modelling framework, the informal flow of information between modules is…
Q: able 1: An alignment and span- Table 2: Another exercise for align- ng exercise for tabular data.…
A: Two tables are made:- Table 1 :- It has four rows And colspan =2 in row 2nd and 3rd is used and…
Q: Describe the circumstances that lead to a system's stalemate.
A: The following conditions cause deadlocks in the system: - Circular Wait Condition Hold and Wait…
Q: What is the logical basis of direct proof and indirect proof?
A: The logical basis of direct proof and indirect proof A statement is any sentence that is either true…
Q: dentitv and describe the eight essential comnonents of communication.
A: Eight essential components of communication are:
Q: Learn about a methodical approach to increasing the security of a Linux machine. Discussion topics…
A: Start: SECURITY FEATURES THAT ARE COMMONLY USED. Linux provides password authentication, file…
Q: What are the three primary cloud computing platforms?
A: Cloud computing is the on-request accessibility of PC system resources, particularly data storage…
Q: Why is it important to balance both organizational needs and human needs in designing software?
A: Software design is a process to transform user requirements into some suitable form, software design…
Q: What are the definitions of database users and what are the functions of a database administrator?…
A: A database management system is a collection of related data which represents some aspect of the…
Q: Analyze a backup plan's components What is the difference between a mobile and PC backup plan?
A: components of a backup plan: A backup plan's components Secure, encrypted offsite backup is one of…
Q: JavaScript 3. How does this programming language differ than other programming languages? 4.…
A:
Q: In the language of your choice, give one example of orthogonality, generality, and uniformity
A: Orthogonality: It is something like when a value is being changed without affecting others For…
Q: Write the SQL code that will create the tables structures for the tables named Books, and Users.…
A: HI THERE I AM ADDING REQUIRED CODE BELOWPLEASE GO THROUGH IT THANK YOU
Q: Which Internet of Things wireless standard is used to connect data from a smartwatch, bike computer,…
A: The answer is ANT+. ANT+ stands for interoperability which implies that ANT+ products from a couple…
Q: Assume that the Ready Queue contains several Processes with varying burst times. If the scheduling…
A: Almost all programmes have a few alternating Processor number loops that are busy crunching numbers…
Q: What exactly are memory leaks?
A: Justification: Memory leaks are a form of resource leak that happens when a computer software poorly…
Q: The receiver corrects errors without requesting retransmission. a. CRC b. FAC c. FEC d. NTC
A: The receiver corrects errors without requesting retransmission.
Q: Reduce the following Boolean expressions to their simplest form *: F = abc + (a + c) + bc (number of…
A: Please refer below for your reference: I have solved the question using two methods by…
Q: In the language of your choice, give one example of orthogonality, generality, and uniformity.
A: Orthogonality: Smalltalk is an example of this. All values are considered objects in Smalltalk, and…
Q: HW1: Write a CPP program that reads items names and items prices of 50 items from KB and stores them…
A: reads items names and items prices of 50 items from KB and stores them in a file (prices.txt)…
Q: Write at least one justification for operating an application in the cloud, which may encounter a…
A: Cloud Computing: The term "cloud computing" refers to the use of the internet to store and process…
Q: Give your thoughts on why parallel processing is required in any computer.
A: In computing, a method of running two or more processors i.e CPUs to handle different/ separate…
Q: Explain why para-virtualization might outperform HW virtualization, which frequently uses system…
A: Those in the computer science sector are frequently required to integrate programs on different…
10
This task is from shell scripting
Step by step
Solved in 2 steps
- instruction- This file should have multiple lines, each line has first name, last name followed by multiple integers “data.txt” file Samantha Johns 43, 32,99, 79, 85 Michael Smith 98, 84, 70, 100, 76, 81 John Michael 82,92, 92 Mary Hernandez 88, 91, 92, 79, 78 George Johnson 92,93,75 Sara Anderson 83,74. Susan John 78, 84,65, 71,81 Mark Smith 69, 67,59,62Create a new file in c++. In this lab, you will add some functionality to the table ofmenu. Your boss (me) has decided that letters should be used for menu items instead of digits (because there are more alpha characters than numeric ones, so more additional menu items could be added in the future). We all know that programmers are lazy, but so are most users! So, the user should be able to enter either uppercase (A) or lowercase (a) for their menu selection. Also, it is important to let the user know if they entered an invalid choice. Write a program that displays the following menu and prompts the user for a selection. Once the selection has been made, display the selection back to the user. Then, ask the user for two numbers and perform the selected operation (+, -, *, /). Display the results back to the user (e.g. 2 + 3 = 5). When dividing, display an error message if the second number is 0. A) Add two numbers B) Subtract two numbers C) Multiply two numbers D) Divide two…The Fibonacci sequence is a sequence of numbers beginning with 0 and 1, in which every number after the first two can be found by adding the two numbers before it. For example, the first 10 numbers in the Fibonacci sequence are as follows: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, … ● Create a new text file called optional_task.txt inside this folder. ● Inside the optional_task.txt file write the pseudocode for the algorithm that asks the user for a number and stores that number in a variable called n. Then the algorithm should calculate and print out the first n numbers in the Fibonacci sequence.
- Please help me with the assignment below The assignment: Make a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups. This assignment needs a resource class and a driver class. The resource class and the driver class will be in two separate files. The driver class needs to have only 5 or 7 lines of code. The code needs to be written in Java. Please help me with exactly what I asked for help.The objective of this question is to generate and read files that contain a list of random numbers. Write a function that generates a file with following parameters: def fillFile(fileSize, fileName): The function should be called to generate files in the following sizes: fileSizes = [1000, 5000, 10000, 20000, 30000, 40000, 50000] The generated files can have names file1000, file 5000, file 10000, file20000, fi130000, file40000, file 50000. You can use random.randint(0.fileSize+1000) to generate a random number. Write another function that reads numbers inside of a file and returns a list. def readFile(fileName): The returned list contains the numbers stored in the file. At each call of fillFile and readFile, record the times before and after the function call as in following example (import time): start = time.time() fillFile(file Size, "file" + str(fileSize)) finish time.time() runTime = finish - start Record the run times of functions into a file named "fileStats.txt". The…In Dist.txt it will add vaccine in storage like how many vaccines are needed and from where is coming and Add search function in which from user it will check how many vaccines are available in storage this will be done in Vaccine.txt somewhat like in image given #include <stdio.h>#include <stdlib.h>#include <string.h> struct vacc{ char vaccName[15]; char vaccCode[2]; char country[15]; int qty; float population; }v[10]; // Function Declarations void create_inventory(); void update_vacc_qty(); int search_vaccine(); void display_vaccine(); // Main Function starts here int main() { //create_inventory(); //display_vaccine(); //search_vaccine(); update_vacc_qty(); return 0; } //Function to Create Vaccine.txt as per the given table void create_inventory() { int option = 1; // variables to collect data as per table given char vaccName[15]; char vaccCode[2]; char country[15]; int qty; float populaion; //File definition FILE *infile; infile = fopen("Vaccine.txt","w");…
- use PYTHON Even though Windows and macOS sometimes hide them, most files have file extensionsLinks to an external site., a suffix that starts with a period (.) at the end of their name. For instance, file names for GIFsLinks to an external site. end with .gif, and file names for JPEGsLinks to an external site. end with .jpg or .jpeg. When you double-click on a file to open it, your computer uses its file extension to determine which program to launch. Web browsers, by contrast, rely on media typesLinks to an external site., formerly known as MIME types, to determine how to display files that live on the web. When you download a file from a web server, that server sends an HTTP headerLinks to an external site., along with the file itself, indicating the file’s media type. For instance, the media type for a GIF is image/gif, and the media type for a JPEG is image/jpeg. To determine the media type for a file, a web server typically looks at the file’s extension, mapping one to the other.…Please help me write the following function (please see the attached photos for context of the problem): find_treasure(start_map_num): Takes an integer between 0 and 9 as input. Loads the corresponding map file, and starts following the trail (at position 0, 0 of that file) as described above. Continues following the trail through other map files as needed. Places an 'X' at the conclusion of the trail and saves the updated treasure map to a new file with 'new_' prepended to the current map filename. Returns a tuple of the row and column index where the 'X' was placed in that file.# file name: w07_markus.py## Complete the following steps:# (1) Complete the following function according to its docstring.# (2) Save your file after you make changes, and then run the file by# clicking on the green Run button in Wing101. This will let you call your# modified function in the Python shell. An asterisk * on the Wing101# w07_markus.py tab indicates that modifications have NOT been saved.# (3) Test your function in the Wing101 shell by evaluating the examples from# the docstring and confirming that the correct result is displayed.# (4) Test your function using different function arguments.# (5) When you are convinced that your function is correct, submit your# modified file to MarkUs. You can find instructions on submitting a file# to MarkUs in Week *2* Perform -> Accessing Part 2 of the# Week 2 Perform (For Credit) on PCRS.# (6) Verify you have submitted the right file to MarkUs by downloading it# and checking that the…
- Please code in python:Create 2 .py files (decorators.py and main.py). Inside the main.py file, write a function that will take a list of integers, calculate the square root of each (use the math library or raise to a fractional power), and write the maximum number of the resulting numbers to the "result.txt" file. Inside the file for decorators, create 2 decorator functions, one must check the type of the input parameter, and if it is not a list of ints, raise a TypeError. The second decorator should leave only positive numbers in the input. Decorate the function from the main file with decorators from the second file. (You will need to import them) Use the data below to check if the program works: [60, -76, -45, 94, -65, -21, -53, 95, 82, -41, 57, 10, 98, -28, -23, -78, 24, 19, 87, -53 ] [-32, "99", -69, 66, 60, -68.98, 35, 23, -32, "-3", -6, -66, 97, 28, -44, 94, -.55, - 26, 58, -15]Fill in the blank question- Only answer without explanation Q. _____________ is the command to see the SELinux permission on a file.Suppose a csv file contains three comma-separated values (strings) on each line (see the leftcolumn of the example table below). Assume, each line of values are, respectively, thewidth, height, and depth of a box. Write a program called box.py and add thefollowing functions to this program.• read_file() takes a csv filename as a parameter that contains the widths, heights, anddepths of all boxes. This function must read the content of the file, store these values ina 2-D list as shown in the right column of the example table below, and return this list.All strings must be converted to integers before they are stored in the list. Example:csv data 2-D list[[15, 6, 3],[3, 7, 4],[6, 9, 3],[15, 6, 11],[6, 5, 5],[13, 10, 9],[9, 10, 3],[14, 5, 4],[4, 6, 11],[12, 10, 9]]• Add another function called max_volume() to this program that takes this 2-D list as aninput parameter. Each item in that list contains 3 integers representing the dimensions ofa box (i.e., width, height, depth). This…