NumPy Operations 16. Get the sum of all the values in matrix 17. Get the standard deviation of the values in matrix In [ ]: In [28]: # DON'T WRITE HERE Out [28]: 1275 In [29]: # Code Here In [30]: # DON'T WRITE HERE Out [30]: 14.430869689661812
Q: 120 host addresses. The administrator has used 192.168.10.0/24 and 192.168
A: The answer is
Q: Is current legislation enough to safeguard kids online? Otherwise, what other choices should…
A: Answer: No, the laws that are now in place do not provide adequate protection for children under the…
Q: List three arguments for the need of user interface design before any coding is done
A: Designers use user interface (UI) design to build user interfaces for software and electronic…
Q: How do you guarantee that each machine utilizing IPsec has its own pair of private keys?
A: The answer is given in the below step
Q: It is essential, before moving on, to define the role of the firewall in terms of the safety and…
A: It is essential to have an understanding of these functions of firewalls in order to properly defend…
Q: What are some of the several methods that you may safeguard your passwords so that others won't be…
A: Introduction: It's impossible to create a password that can't be cracked. Someone with a strong…
Q: with Python Write a function that will allow the user to scramble a sentence given a stride, take…
A: Here in this question we have to use python and write a function that will allow the user to…
Q: What are the benefits of prototyping when it comes to the creation of a new system?
A: Prototype method basically is a digital or paper model. It is one of the majorly and most popularly…
Q: Write a program using an array that accepts five input values from the keyboard. Then it should also…
A: The program is written in C. Check the program screenshot for the correct indentation. Please check…
Q: The field of computer science. In order to increase the security of your Windows system, you need do…
A: Start: Windows is a collection of Microsoft's proprietary graphical operating system families, all…
Q: Draw an Entity Relationship Diagram (ERD) using Unified Modelling Language (UML) notation according…
A: Entity Relationship diagram mainly contains three components, that are Entity, Attribute and…
Q: 4 24 8 37 1- A = a([1,3],[1,6]) 2- Ba(,[1:3,5]) 3- C = a(2:3,:) 4- D = a(1:3,4) 5- E=…
A: According to the information given:- We have to follow the script mention and display the output.
Q: Describe in general terms the kind of cybercrime that primarily affects particular groups of people…
A: Cybercrime Problems: Cybercrime refers to crimes committed via the internet and electronic devices…
Q: What are your thoughts on whether or not social media platforms like Facebook should provide access…
A: Facebook: Facebook, a social media platform, is being utilised by college administrations and law…
Q: The inner workings of computer operating systems are a mystery to us.
A: System software: An OS is software that connects the hardware of a user's computer to the operating…
Q: Write a Python function that will work on three strings. The function will return to the user a…
A: Python code for above : def func(strings): # concantenate in reverse res = "" for…
Q: The creation of software and the writing of papers are compared here to determine whether method is…
A: Differences: A software developer accomplishes the goal by developing computer code. The process…
Q: Left shifting an unsigned int by 1 bit is equivalent to multiplying the value by 2. Write function…
A: Introduction : Left shifting an unsigned int by 1 bit is equivalent to multiplying the value by 2.…
Q: Penetration testers have a multitude of reasons for using the technique of aircracking.
A: Introduction: A penetration tester is a security expert who employs various methods to gain access…
Q: II. Read each problem carefully and present an algorithm with the required running-time to solve…
A: a) update can be implemented in O(n) by traversing each element until the index to be changed is…
Q: User interface design approaches are being affected by the rise of smartphones and tablets because…
A: A user's engagement with a computer system is referred to as the "user interface," which is a word…
Q: vered of 1.00 ion Throughput (high): a measure: O b. a. How fast we can actually receive data…
A:
Q: Send a packet to a host using the fixed route assuming that you are utilising it.
A: Answer: between two starting and ending locations List of delay components in another form is shown…
Q: 1. Fill in the with gaps (a) The plays the same role for discrete- time signals and system that the…
A: As per the guidelines, I'm supposed to answer the first three questions. Repost other questions as…
Q: Q1) A vector is given by x = [7,19,2,14,5,12,4,18,6,13]. Using conditional statements and loops,…
A: Vectors are same as dynamic array that have ability to expand and shrink according to the…
Q: simple C# payroll program that applies object-oriented concepts. you can use jdoodle online IDE
A: As no programming language is mentioned, it is solved using Java Program import…
Q: Privacy is a hot-button topic in today's culture, but it's also a contentious one. What do you…
A: Introduction: Privacy implies avoiding dangers. Personal privacy is freedom. Information privacy…
Q: What is keybord
A: Introduction The keyboard is perhaps one of the most crucial components of a computer.
Q: II. Read each problem carefully and present an algorithm with the required running-time to solve…
A: for the given problem we need to deisgn the DAG algorithm that can solve below mentioned problem.…
Q: Area plots are unstacked by default. Select one: O True O False
A: answer is
Q: Q6. (.. ») Apply the backtracking algorithm for the 3-coloring problem on the graph below,…
A: The Answer is in step-2.
Q: There is no accepted meaning for the phrase "privacy." The following is a list of the top five…
A: Given: Privacy refers to a person's or a group's capacity to separate themselves or certain facts…
Q: ntity Relationship Diagram (ERD) using Unified Modelling Language (UML) notation according to the…
A: The erd has 3 entities and 2 associative Entity to remove the many to many relationship. The entity…
Q: How does the iterative and incremental technique compare and contrast with the waterfall model, and…
A: Introduction: The similarities and differences between the iterative and incremental approaches and…
Q: Where would you start looking if you thought someone was trying to get into your computer?
A: By using the Windows Task Manager, you will be able to check to see if any applications have been…
Q: When it comes to mobile phone usage in the office, are there any potential legal stumbling blocks to…
A: There are, of course, certain legal ramifications to using a cellphone: First and foremost, is the…
Q: There is no accepted meaning for the phrase "privacy." The following is a list of the top five…
A: Introduction: Privacy is the capacity of a person or a group to isolate themselves or specific facts…
Q: What exactly do you mean by "privacy"? Is it really making a difference in the long run? Being…
A: Beginning: The right to privacy is the ability to be free of distraction or interruption.…
Q: When working with dynamic data, ensure that you have a solid understanding of how the heap operates.…
A: Dynamic allocation creates a "new" data area in languages like C++. Dynamic allocation may build a…
Q: Imagine you're installing a new wireless router at a small business. When providing secure wireless…
A: Given: Which form of wireless authentication offers the most protection against unauthorised access?…
Q: Describe the prerequisites for an educational website's functionality.
A: Educational websites are the ones that have different activities and tools for online learning of…
Q: Does Windows 10 have anything else on your mind?
A: Windows: Windows 10 is a new operating system from Microsoft. Microsoft's Windows 10 operating…
Q: When you need to identify yourself but don't want to use a credit card or an ATM, this might be a…
A: Introduction Several steps are taken to safeguard your safety at the ATM. The following are…
Q: Send a packet to a host using the fixed route assuming that you are utilising it. between two…
A: Start: The term "delays" refers to the amount of time that the processing packet takes to complete.…
Q: Please write a program that prints the woodchuck tongue twister when run with the given input…
A: This is very simple. I have written a simple code in python to perform the exact operations…
Q: Does the word "privacy" have an agreed-upon meaning in common usage? Here are five things you can…
A: Introduction: What does it mean to be private? Do you know how to safeguard your personal data? Make…
Q: Is it feasible to get information that is trustworthy via the use of the internet, and if so, how…
A: Internet is a global network that provides information, news, education and more worldwide. In…
Q: What are some of the most popular tools that are utilized in the creation of mobile applications?
A: Consider the following factors while developing an app: Always verify that software resolves a…
Q: The field of computer Describe the concept of a virtual machine in your own words.
A: Introduction: A Virtual Hardware (VM) is a computational resource that uses software to execute…
Q: Q11) Answer carefully the following TRUE / FALSE Questions: 1. A function's workspace shares the…
A: 1. To protect the data's integrity, each function workspace is separated from the base workspace and…
Solve using Python Codes
Step by step
Solved in 2 steps with 1 images
- Create an indexception value of unique consonants and unique vowels.This is the Input: String of the name that was given below. It must be case sensitive.Steps:Step A: In every unique vowel of a name, you need to get the first index of that vowel from the original string.Step B: In each vowel index you get from step A, you will get the unique consonant from that position. if the index is out of scope of the consonant array, ignore that vowel index.Step C: In each unique consonant that you get from step B, you need to get the first index of that consonant from the original string.Step D: You will the value of indexception by adding all index you get from step C.output must be like this: > 2 lists that consist of unique vowels and unique consonants> vowel, the vowel index, the consonant, the consonant indexfinal ouput> total indexception value of the name that was given. ------Input "Tricia O. Reyes"Output:Name: Tricia O. ReyesVowels: ['a', 'e', 'i', 'o']Consonants: ['T', 'r',…(True/False): The ArraySum procedure (Section 5.2.5) receives a pointer to any array ofdoublewords.How many elements are there in arrays x, y, and z? int x[27]; const int base = 10; int y[base + 5]; int z[100][100][100];
- •• R7.10Pointers are addresses and have a numerical value. You can print out the value of a pointer as cout << (unsigned)(p). Write a program to compare p, p + 1, q, and q + 1, where p is an int* and q is a double*. Explain the results.#include <iostream>#include<iomanip>using namespace std; int main(){ const int ROW_HOURS=6; //declare variables const int CL_PAYRATE=2; double total_payout=0; double hours[ROW_HOURS][CL_PAYRATE]={ //declare array {0,12.85}, {0,12.85}, {0,12.85}, {0,11.75}, {0,11.75}, {0,11.15} }; cout<<fixed; cout<<setprecision(2); //setprecision of double values upto 2 decimal point for(int i=0;i<6;i++) //using loop get input from user { cout<<"Enter the hours worked by employee "<<i+1<<": "; cin>>hours[i][0]; //store values into hours } for(int i=0;i<6;i++) { double payout=hours[i][0]*hours[i][1]; //calculate payout of emplyee total_payout=total_payout+payout;…(Random sentences and story writer) Write an app that uses random-number generation to create sentences. Use four arrays of strings, called article, noun, verb andprepostion. Create a sentence by selecting a word at random from each array in the following order: article, noun, verb, preposition, article, noun.As each word is picked, concatenate it to the previous words in the sentence. The words should be separated by spaces. When the sentence is output, it should start witha capital letter and end with a period. The program should generate 10 sentences and output them to a text box. The arrays should be filled as follows:The article array should contain the articles "the", "a", "one", "some" and "any";The noun array should contain the nouns "boy", "girl", "dog", "town", "car";The verb array should contain the past tense verbs "drove", "jumped", "ran", "walked" and "skipped";The preposition array should contain the preposotions "to", "from", "over", "under" and "on";
- This program has two filesqty and amtqty has 10 integersamt has 10 doubles read files, store values in arrays named qtyarray and amtarraycompute the product of each element:prodElement = qtyarray0 x amtarray0...display each prodElement6. sum_highest_five This function takes a list of numbers, finds the five largest numbers in the list, and returns their sum. If the list of numbers contains fewer than five elements, raise a ValueError with whatever error message you like. Sample calls should look like: >>> sum_highest_five([10, 10, 10, 10, 10, 5, -17, 2, 3.1])50>>> sum_highest_five([5])Traceback (most recent call last): File "/usr/lib/python3.8/idlelib/run.py", line 559, in runcode exec(code, self.locals) File "<pyshell#44>", line 1, in <module> File "/homework/final.py", line 102, in sum_highest_five raise ValueError("need at least 5 numbers")ValueError: need at least 5 numbersIn C language please. You are to read 10 numbers from a data file into an array named List. Create another 10 element array named Reverse that is to contain the same items as List but in reverse order. For example, the first element in List will be placed in the last position of Reverse, the second element in List will be placed in the second-to-last position in Reverse, etc. After Reverse has been created, output the contents of both arrays.
- C++ Challenge!! Search Metrics Link to the 100,000 Random Integers: https://1drv.ms/t/s!AuFS4mkcuYyBjHZ_SIudb93bq2uy In this exercise you will explore the performance difference between sequential search and binary search. To do so write a program that performs the following tasks: Prompt the user for a file containing 100,000 unsorted integers Read those integers into an array Prompt the user for a search item Search for that item (using sequential search) and report the number of comparisons required. Sort the array. Note that this will take about a minute. Search for that item again (using binary search) and report the number of comparisons required. You will need to modify both of the search functions to report the number of comparisons that were made during the search. Use your program and the file of 100,000 integers provided here to answer the six questions in the quiz.All code in JAVASCRIPT Write a program that creates two files with the names file4 and file4a two 10 element int arrays with the names arrfile4 and arrfile4a; these arrays are to have different values write the contents of arrfile4 to file4write the contents of arrfile4a to file4aC++ 2D ARRAY, Continue this codes and change the array to seat[6][6]. Include a loop that asks the user if he wants to try again or no. If the user enters the reserved seat again then display "this seat is taken already". Upon trying again, the reserved seat displayed as (X) must be displayed. My Code: #include <iostream> using namespace std; int main() { cout << "Bus Seats:\n"; cout << "* A B C D\n" << "1 * * * *\n" << "2 * * * *\n" << "3 * * * *\n" << "4 * * * *\n"; char seat[5][5]; int row, column; char col; cout << "Enter the row of your selected seat: "; cin >> row; cout << "Enter the column of your selected seat: "; cin >> col; for(int i=0; i<5; i++){ for(int j=0; j<5; j++){ if(i==0){ switch (j) { case 0: seat[i][j]='*'; break; case 1: seat[i][j]='A'; break; case 2: seat[i][j]='B'; break; case 3: seat[i][j]='C'; break; case 4: seat[i][j]='D'; break; } } else if (j==0) { switch(i) { case 1: seat[i][j]='1';…