Pleas help me to solve this sample code Please help me to solve this I post this three-time and no one do it right Write an ADA program that will be able to accept 2 numbers and perform an addition to them. Display the result of the addition. Next, for every positive result, display the output as "Positive Result". For every negative result, display that the output as "Negative Result". 1. Please submit the softcopy of the programs in 2 format: 1. Copy the program from your compiler and paste in this submission cover page. 2. Screenshot from the online compiler. 2. Please include sample of output.
Q: The figure shown below is the output of: Three functions change with x 100 -Square data -Square-root…
A: In a MATLAB graph, one can draw many functions together as well as separately. Here in the given…
Q: When it comes to software development, what are the functions of design patterns and how may they be…
A: Describe design patterns: Design Patterns: Design patterns describe the best practices used by…
Q: In programming, specify desk checking.
A: It's a way for checking an algorithm's logic: It does not need the use of a computer; rather, a…
Q: Match the following. Each term is only used once. Regulatory program focused on security at…
A: The given question are match the following based questions.
Q: Cluster Analysis is one of the tasks of Data Mining. Explain what Cluster Analysis is, what it is…
A: Clustering is the process of dividing a collection of abstract objects into classes. Cluster…
Q: SOFTWARE
A: Introduction of how to developed a software for a hospital.
Q: What does the acronym FDDI stand for in the field of computer science?
A: Fiber Distributed Data Interface: The Fiber Distributed Data Interface (FDDI) is a local area…
Q: Do Data Structures and Algorithms become outdated as a result of Machine Learning? How likely are…
A: When using a graphical user interface instead of a command-line interface, the following steps are…
Q: How can these companies find out where their data, as well as the data of their consumers, is being…
A: Companies: Because the facts should be contained in the Cloud technology agreement, businesses know…
Q: What are the recommended procedures for assuring a local area network's resilience and availability?
A: The solution to the given question is: INTRODUCTION A local area network (LAN) is a data…
Q: Please clarify what you mean. There are three types of links: single, complete, and average.
A: Hierarchical clustering considers each data point as a singleton cluster, then merges clusters one…
Q: In the field of computer science, what exactly does the term "mobo" refer to?
A:
Q: Which terminal command may be used to find out how many physical connections there are to a certain…
A: Beginning: A traceroute shows how information on the internet travels from its source to its…
Q: Why do we utilise MATLAB to solve difficulties in Computational Geometry?
A: Many professionals and researchers use MATLAB in industry and academia for deep learning and AI,…
Q: Thread scheduling and the differences between processes and threads are discussed.
A: Many computers have only one CPU, so threads must share the CPU with other threads. The execution of…
Q: What are the disadvantages of a register-register vector processing architecture?
A: Vector processing is a Central unit which is performed to complete vector input in individual…
Q: What are the benefits of deploying load balancers in a cloud computing system like a banking system?
A: Cloud computing is the distribution of computing services over the internet (often known as "the…
Q: It is required to develop an application in Java to maintain information about students registered…
A: Program (A) // Course.java : Java code to create Course class public class Course { // attributes…
Q: Is there an in-depth explanation of public key encryption on this page?
A: FOR DESCRATCHING, USE A PUBLIC KEY:Cryptographical encryption is a method of protecting data from…
Q: What is the relationship and differences between cohesion and coupling in software design and…
A: Cohesion and coupling: Coupling represents the interactions between modules, whereas cohesion…
Q: d) Implement a simple "Hello World" HTML page. Using CSS and JavaScript, add a radio button that…
A: Both parts d and e are solved using HTML, CSS, and JavaScript below.
Q: Modbus is a layer 7 protocol. O True False
A: here in this question we have asked that modbus is a layer 7 protocol .weather this statement s…
Q: duling of processes and other tasks should be com
A: Below the scheduling of processes and other tasks should be compared
Q: What does it mean to create a disk hash copy? How many copies do you think are needed to guarantee…
A: Disk hashing: A hash value is the result of a computation (hash algorithm) on a string of text, an…
Q: write DQL statement to do the following (and a screenshot of the result): 1. Find cities that exists…
A: SELECT * FROM Customers, Suppliers WHERE Customers.City = Suppliers.City;
Q: How many different stages are there in the creation of a website? Specify each stage and provide an…
A: Web Developer: Creating a website for the Internet or an intranet is what a web developer does. It…
Q: Which of the following statements is true of normalized scientific notation? a. 3.06 x 10^3 is…
A: Which of the following statements is true of normalized scientific notation?
Q: Explain the potential advantages and disadvantages of artificial intelligence
A: answer is
Q: ng differs in how they are implemented. How do you think the two options compare in terms of merit?
A: Introduction:Cloud computing refers to the on-demand availability of computer system resources, such…
Q: Assume a cache has 16 entries. How many index bits are needed to address the cache? a. 2 b.…
A: As per the answering guidelines solving the first question completely.
Q: Demonstrate digital forensics' ad hoc structured and enterprised stages.
A: Introduction: Digital Forensics identifies, acquires, processes, analyses, and reports…
Q: In the blank, either answer what is an IED (as pertains to Industrial networks), or what the is the…
A: Q: Full term for IED abbreviation
Q: dvantages of a cloud storage application ve
A: Introduction: Below the advantages and disadvantages of a cloud storage application versus a client…
Q: What do we know so far about the design and development of websites, and how far have we gotten?
A: What You Ought to Do: Engage in Conversation Regarding Web Design and Web Development in General.…
Q: use this. in a foreach loop C# the keyword this
A: using System; class Student{ public int id, age; public String name; public Student(int…
Q: Unlike enterprise IT systems, ICS places more importance on confidentiality than on availability.…
A: Unlike enterprise IT systems, ICS places more importance on confidentiality than on availability…
Q: What exactly is DNS monitoring, and why is it so crucial?
A: Introduction: Here we are required to explain what is DNS monitoring and why is it so crucial.
Q: What's the connection between cohesion and coupling in terms of software design?
A: Given: "Good software design needs little coupling and good cohesiveness," says the introduction.…
Q: As a software engineer, how do you come up with an accurate cost estimate for the project you're…
A: Estimating software costs is inherently challenging because people are bad at predicting absolute…
Q: What exactly is the distinction that can be made between normalizing and denormalizing data when it…
A: The above question is solved in step 2:-
Q: Requirements Implement the following two functions: • unsigned max_coins (vector coins) This…
A: C++ Program: #include<bits/stdc++.h> using namespace std; vector<unsigned>…
Q: What is module cohesion?
A: EXPLANATION: The goal of the Design phase of the Software Development Life Cycle is to create a…
Q: Draw an Entity Relationship Diagram (ERD) using Unified Modelling Language (UML) notation according…
A: Entity relationship mainly consists of 3 components that includes Entities, Attributes and…
Q: Where can you locate the status.report file? What is the best command to use to determine the file's…
A: Introduction: Where can you locate the status. Report file? What is the best command to use to…
Q: Cloud computing, in a nutshell, is what? Are there any downsides or advantages to using the cloud…
A: CLOUD COMPUTING: Cloud computing refers to the availability of diverse network resources. These…
Q: A D E F G H
A: In the postorder, we first process the left subtree, then we process the right subtree, and finally…
Q: What does it mean to create a disk hash copy? How many copies do you think are needed to guarantee…
A: Hash value: A hash value results from a computation (hash algorithm) performed on a text string, an…
Q: Explain segmentation vs segregation in relation to ICS network design and architecture. Provide an…
A: The Industrial Control System (ICS) is a network that controls the systems used in industrial…
Q: a) Implement a PHP script that will output a complete, structurally correct simple "Hello World"…
A: PHP is an extremely popular scripting language that is used to create dynamic Web pages. Note: As…
Step by step
Solved in 3 steps with 3 images
- Modify the below program that the input values representingfractions are stored with denominators that are positive integers. You cannot require the user to only enter a positive denominator value; the user should not be inconvenienced by such a restriction. For example, whilst values of 1 / -2 are acceptable inputs for a fraction, the output representation should be -1 / 2. Your solution should check the denominator input; if it is negative, swap the sign of both numerator and denominator instance variables. //Import the essential package import java.util.ArrayList; import java.util.Scanner; //Define the class Fraction class Fraction { private int n, d; public Fraction() { //Initialize the values this.n = this.d = 0; } public Fraction(int n, int d) { //Initialize the variables this.n = n; this.d = d; } //Define the getter function getNum() that returns the numerator public int getNum() {…(Numerical) Write a program that tests the effectiveness of the rand() library function. Start by initializing 10 counters to 0, and then generate a large number of pseudorandom integers between 0 and 9. each time a 0 occurs, increment the variable you have designated as the zero counter; when a 1 occurs increment the counter variable that's keeping count of the 1s that occur; and so on. finally display the number of 0s, 1s, 2s, and so on that occurred and the percentage of the time they occurred.PLEASE SOLVE THIS IN C++ CODE ONLY! PLEASE READ AND DO THE PROGRAM WITH ACCORDING TO THE CONDITIONS GIVEN. PLEASE ALSO WRITE THE USE OR FUNCTIONS OF EACH CODE USED BY INSERTING ITS USE EVERY LINE USING "//" A palindrome is a string that reads the same from front to back as it does from back to front, e.g., "racecar", "radar", "21012". Write a program that will identify whether a given line of input is a palindrome or not. Your program must also be able to determine the following sample inputs as palindromes, aside from identifying one-word inputs: Able was I 'ere I saw Elba. Madam, I'm Adam. A man, a plan, a canal, Panama. These samples require that your program must ignore spaces and punctuations, and consider uppercase and lowercase letters to be the same. Include necessary functions in your program to process the input. You can also use existing functions from the string library.
- odify the guessing-game program so that the user thinks of a number that the computer must guess. The computer must make no more than the minimum number of guesses, and it must prevent the user from cheating by entering misleading hints. Use I'm out of guesses, and you cheated and Hooray, I've got it in X tries as your final output. (Hint: Use the math.log function to compute the minimum number of guesses needed after the lower and upper bounds are entered.) this is what I got so far: ============================================ import random import math smaller = int(input("Enter the smaller number: ")) larger = int(input("Enter the larger number: ")) maxattempt = math.ceil(math.log(larger - smaller)) count = 0 while count != maxattempt: count += 1 guess = int((smaller + larger) / 2) print(smaller, larger) print("Your number is: ", guess) hlp = input("Enter =, <, or >: ") if hlp == '>': smaller = guess + 1 elif hlp == '<':…Question 10 Write a program in Java that finds the Least common multiple of 2 numbers,please include comments and fully explain what the code does because I am not really understanding what loops are doing ! (I need a manual way to calculate the lcm and not use a function(method) or "findlcm"..!(Computation) Among other applications, Pascal’s triangle (see Figure 7.22) provides a means of determining the number of possible combinations of n things taken r at a time. For example, the number of possible combinations of five people (n = 5) taken two at a time (r=2)is10. Each row of the triangle begins and ends with 1. Every other element in a row is the sum of the element directly above it with the element to the left of the one above it. That is, element[n][r]=element[n1][r]+element[n1][r1] Using this information, write and test a C++ program to create the first 11 rows of a twodimensional array representing Pascal’s triangle. For any given value of n less than 11 and r less than or equal to n, the program should display the correct element. Use your program to determine in how many ways a committee of 8 can be selected from a group of 10 people
- When you perform arithmetic operations with operands of different types, such as adding an int and a float, ____________. C# chooses a unifying type for the result you must choose a unifying type for the result you must provide a cast you receive an error messagei want code in python Rahul is a maths genius so he came up with a game and as raj is Rahul's best friend so Rahul decided to play the game with raj. Rahul gives raj two numbers LL and RR and asks raj to find the count of numbers in the range from LL to RR (LL and RR inclusive) which are a digit palindromic. A number is a digit palindromic if its first digit is the same as its last digit. As raj is not very good at maths so your task is to help Raj find out how many numbers are a digit palindromic in the range LL to RR. For example if LL = 88 and RR = 2525 .The following numbers are a digit palindromic in the range of LL to RR: 8, 9, 11, and 22. If LL = 12511251 and RR = 12661266. The digit palindromic numbers are 1251 and 1261. Input format The first line contains an integer denoting the number of test cases. Each test case is described by a single line that contains two integers LL and RR. Output format For each test case output, an integer denoting how many a digit palindromic…In JAVA code (Selection Sort): 1. Prepare a data set containing 10,000 integers (random). 2. Make a code that will create 3 variants of the data: one in best case (data are arranged in ascending order); the other in worst case (data are arranged in descending order); and the last in average case (data are randomly arranged). 3. Each integer is considered as one input in the code. 4. The output of your program should be the number of statements executed in the process of sorting for each of the algorithms. This, therefore, means that you have to embed a counter variable in your program that keeps track of the number of statements executed in the sorting part of your code. 5. The end value of the variable shall be the output of your program.
- C programming( I have asked this in C programming not C++. I have gotten this in C++ I want it in C programming) The field of astronomy has been significantly advanced through the use of computer technology. Algorithms can automatically survey digital images of the night sky, looking for new patterns. For this problem, you should write such an analysis program which counts the number of stars visible in an bitmap image. An image consists of pixels, and each pixel is either black or white (represented by the characters # and -, respectively). All black pixels are considered to be part of the sky, and each white pixel is considered to be part of a star. White pixels that are adjacent vertically or horizontally are part of the same star. Input Each test case begins with a line containing a pair of integers 1≤m, n≤100. This is followed by mm lines, each of which contains exactly nn pixels. Input contains at least one and at most 50 test cases, and input ends at the end of file. Output…In c++ program: Wite a program to print the perimeter of polygons.NB: A polygon is a plane figure that is bounded by a connected finite number of straight-linesegments. Example: Pentagon, Hexagon, etc1. An interactive program to choose the type of polygon, accept the length of the side in millimetres.2. Calculate the perimeter of the chosen polygon3. Display the name of the polygon, the length of the side, and the perimeter of thepolygon.The formula for calculating the perimeter of a Polygon:Perimeter = (number of sides) × (length of one side) The solution for each question should have the following components.i. Algorithmii. Pseudocodeiii. FlowchartThe problem statement is described in the problem_statement.pdf file. Write the solution into the fuzzy_phrases/solution.py. Please do not change the input and output contract of the def phrasel_search(P, Queries) -> [[string]] function as the testing of the code correctness will be done programmatically. Note - You can only use standard python libraries. ex - json, random, etc So in the screenshots below we have one that has the instructions which has to be followed and executed , the next one that follows should be an example, that says sample example python this is the problem statement supposed to be used to give you an idea , showing how you should take the phrases to loop through the queries as a parameter. The other screenshot is called the solution output, that is the sample of how the code should look like but it has to be modified. and the other screenshot that says this is the first sample py, is the json file you want to loop through . Thank you