Prints on the screen your name, your student ID and your section number. For example, if your name is "xxx yyy",your ID is 42364 and your section is F2, the main function should print "ID_42364_xxx_yyy_section_F2" Write By c programing Id: 53632 Section:-F1,0 Initializes a variable Y with your student ID. if your ID is 42364, the value of Y will be 42364. Using a FOR loop, prompt the user to enter the salary of Y employees. Calculates and prints the average salary of all employees with salary greater than 1100.
Q: 19. At present, the LAN used basically adopts star topology. a. Right b. Wrong 20. TCP/IP protocol…
A:
Q: Propose a technique to access the history of all t webpages visited by using back button that…
A: 1. Stack is used browser back button : Every web browser has a Back button. As we navigate from web…
Q: parallel programming and distributed systems Suppose you have an application with multiple threads.…
A: Multi-threadingWith multi-threading, you gain the ability to perform tasks concurrently within the…
Q: Peçe 19 ia Is Write in program to print Fibonacci Series (0112358 413 21 34).
A: Step-1: StartStep-2: Declare variable n, a=0, b=1Step-3: Take input nStep-4: Print a and bStep-5:…
Q: What do you think the limits of an organization's data security are? What are the earliest and…
A: Data security is a practice that protects digital information from unauthorized access, damage, or…
Q: For a Windows operating system, what are the top three kernel components?
A: the three kernel components are :
Q: To what extent does a TPM contribute to the encryption of the whole disc?
A: Answer:
Q: Which of the following is a syntactically correct do-while loop? O a. do; O b. printf("counter is…
A: do-while loop: It is a controlled loop used in a programming language. By controlled, we mean that…
Q: Please explain what a challenge-response authentication system is in your own words, if you can. In…
A: The question has been answered in step2
Q: It is impossible to establish a mobile network at all without the usage of wireless technologies.…
A: Answer:
Q: An authentication challenge–response system may be described. Why is this approach more secure than…
A: The question has been answered in step2
Q: Provide a description of an authentication challenge–response scheme while bearing in mind the…
A: Encryption: The fact that challenge-response systems are more secure than password-based systems is…
Q: What does the overall information systems looks like in an organization?
A: Introduction An information system is a formal, technical hierarchical design for a get-together,…
Q: What is distinct difference between Parricide and Infanticide?
A: Here is the explanation:
Q: The following program is written in the assembly language of 8085 processor: LXI B, 20DF LXI H, 2B44…
A: Solution::
Q: What role do regions and availability zones play in increasing the robustness, availability, and…
A: The Answer is in given below steps
Q: After doing the following statement, the linked list becomes Head P.Link Head 4800 10 4900 4800…
A: The correct option is as follows: contains two nodes.
Q: In order to help us better understand a challenge-and-response authentication system, could you…
A: Challenge-reaction authentication is a set of rules used in computer security where one party issues…
Q: The below is considered as an action: int x=7; Select one: O True O False
A: Answer:
Q: Which of the following is not a C language keyword?
A: a. continue: it is a keyword in C that forces next iteration in loop skipping the code in between.…
Q: What is modularity, and how does it differ from other types of architecture? How does C's modular…
A: Ancient Greek and Roman architecture. The style that was widely used in ancient Greece and Rome is…
Q: Requested resources are made available to those who have reached a standstill as a result of…
A: Introduction: A deadlock happens when two computer programmes that share the same resource get…
Q: ?[Q5]??
A: In Q5
Q: For each iteration of a Turing machine, provide a schematic and an input string.
A: Given: Create an exact diagram for each kind of Turing machine and a description of its input…
Q: What are the dangers of using the SSTF method for disc scheduling?
A: Introduction: The shortest search time first (SSTF) method chooses the disc I/O request that needs…
Q: It is possible to share a MAC address across two network interfaces, but how? Do you know why this…
A: The question has been answered in step2
Q: When a software, such as Microsoft Word, chooses to write to a file, briefly explain the transitions…
A: A processor in a computer running Windows has two different modes: 1.User mode and 2.Kernel mode.…
Q: 414141414
A: See second step
Q: Are we better at web design and development as a result of our experiences?
A: Web development: To discuss the creation and growth of websites.Web design refers to the process of…
Q: Explain the problems with pointer type design. In many programming languages, pointers may only…
A: Introduction: Levels of pointers is the term for this. Each compiler must include at least 12 layers…
Q: To what extent may regions and availability zones be utilised to enhance the resilience and…
A: This article explores the usage of regions and availability zones to enhance the performance,…
Q: Given the 1101011011 data frame and generator polynomial G(x)=x^4+x+1. Derive the transmitted frame.
A:
Q: How would you continue in your work as a data centre systems administrator to create and operate a…
A: Introduction : In this case, if I am a data center's systems administrator, what steps will be taken…
Q: Q3: Create a series called 'directors' that contains each director's name and his or her average…
A: Steps for executing code snippet: 1. Copy the code and save it in the .py extension. For example…
Q: When it comes to encrypting the full disc, what function does a trusted platform module (TPM) serve?
A: Introduction: The procedure of encrypting the information on a circle is known as entire plate…
Q: (c) Write structure declaration name product to store information data as below: [C2, SP1] 1.…
A: Answer: Structure Declaration with the name "product": struct product{ string country; int…
Q: What are the many options a corporation may use to adopt a new system? Each one should be explained.
A: Introduction: The following are the several approaches that a company can use to implement a new…
Q: Write a main function that performs the following: • Prompts user to enter 2 values A and B. • If…
A: Here we are using C programming language for solving this question. In main function we are taking…
Q: Using emu8086 write a full code that does the following - write your name in the middle of the…
A:
Q: Value-returning methods must pass parameters. -True or -False
A: Value-returning methods must pass parameters. Anwser :- TRUE
Q: Due to the lack of viable wireless networks at the air interface between phones, antennas, and cell…
A: Viable wireless networks: A network feasibility study is an examination of your broadband project…
Q: A low-level detail picture requires greater intensity levels since it contains less information than…
A: Low-level image: Processing images at a low level. The primary focus of low-level image processing…
Q: • Prints on the screen your name, your student ID and your section number. For example, if your name…
A: We need to write a program for the given scenario. The language used is C++.
Q: 242424
A: 42424241
Q: What could be causing a video monitor to not display any output?
A: Introduction: Your display may not be able to receive an image signal due to a loose video cable,…
Q: There must be at least one instance of wireless technology in order for a mobile network to exist.…
A: Inspection: Remote communications are used by wireless backhaul to transport data between the…
Q: Files in C Language Assume that “GO.TXT” exists with a file size of 2KB. What is new file size of…
A: This is a C space related question Assuming 2KB =2048 Bytes and assuming it is completely filed…
Q: The purpose and objective of an auditor is to form opinions on whether the operations of an entity…
A: Documentation is important because key decisions about how the audit will be performed are contained…
Q: In a situation of chaos, order and structure cannot be created. What specific examples do you have…
A: It is projected that a wide range of system configurations would experience an intermediate state…
Q: Given a single link of length 800 Km and transmission speed of 49 Mbps between a client and a web…
A: Answer:- Given : Distance between sender and receiver over a link = 800 Km => 800,000 m (1…
Step by step
Solved in 3 steps with 1 images
- Please Write a function to validate if the numbers were 1 through 9 if there is a name if email is valid if cell phone i valid if Card number, EXP date and CVV is valid or not if the address is valid or not Below is the html please make the java code as simple as posible as if it was for beginers please. also when ever its false can you make the text print on the bottem for example look at the picture <div class="g"> <div class="n"> <div class="r"> <img class="a" src="#"> <div class="p">+</div> <form id="result" action="#"> <input type="text" id="number" placeholder="Choose from item 1-9"> <input type="text" id="name" placeholder="Name"> <input type="email" emailplaceholder="E-mail@gmial.com" id="email"> <input id="Phonenumber" type="text" placeholder="Phone number">…Create a function that will validate if given parameters are valid geographical coordinates.Valid coordinates look like the following: "23.32353342, -32.543534534". The return value should be either true or false.Latitude (which is first float) can be between 0 and 90, positive or negative. Longitude (which is second float) can be between 0 and 180, positive or negative.Coordinates can only contain digits, or one of the following symbols (including space after comma) -, .There should be no space between the minus "-" sign and the digit after it.Here are some valid coordinates:-23, 2543.91343345, 1434, -3And some invalid ones:23.234, - 23.4234N23.43345, E32.64576.325624, 43.34345.3450, 1,2"""# I'll be adding my attempt as well as my friend's solution (took us ~ 1 hour) # my attempt.I'm trying to create a function to count the mortgage CREATE FUNCTION yen_11_monthlyPayment(mortage_amount numeric,apr numeric,years integer) RETURNS numeric language plpgsql AS $$ begin RETURN power(mortage_amount *(apr / 12) * (1+(apr / 12),years * 12)/ ((1+(apr / 12), years * 12) - 1)); END; $$ but when I'm trying to put the numberselect yen_11_monthlyPayment(250000.00, 0.04125, 30);and it doesn't work
- Write a function, named randomPassword, that generates a random password that takes no parameter. It will return the randomly generated password as its ONLY result. Display the randomly generated password in the main program. Password Criteria: o The password should have a random length of between 7 and 10 characters. o Each character should be randomly selected from positions 33 to 126 from the ASCII table You must import randint function directly and inline within the random package and it must be the first line of code in your program, after your program header comment. o Declaring and using FOUR constants. Constants must be named appropriately and intuitively. o You must use the chr built-in function within your randomPassword function: o Declaring the main function and invoking randomPassword function. o Logical approach to problem solving, computation, and displaying appropriate output.Write a function called HW7B, which returns a String. This String is the value of word 8 of the second paragraph beginning with Runtime of section 14.1 of page 544 of the course textbook (Introduction to Java programming Comprehensive version 2013 Online Walter J. Savitch ). This word begins with the letter ‘r’. This book can be accessed via the library link reachable via the courses ‘Library page’. This is really just a check you know how to find the course text book in case you are having problems with library books.i want code in c language Write a function to convert temperature from Fahrenheit to Celsius named “ConvertFtoC” that takes one double value for Fahrenheit as argument, and returns the equivalent temperature in Celsius(type double). Create a program that exercise this function by obtaining a Fahrenheit value from the user, calling the function, and displaying the value of Celsius it returns. [Formula: Celsius = (Fahrenheit – 32 ) * 5/9 ]
- Write a C++ prorgam with a function named getRandomMidpoint. This function should accept two arguments just like getMidpoint (getMidpoint. This function takes two int parameters, and returns the midpoint of the two integers. It has the following signature: int getMidpoint(int low, int high). But it should return a random number in between the low and high arguments. You can swap this function with the getMidpoint function to change the nature of how the program makes its guesses. Make sure to show output of your program using both getMidpoint and getRandomMidpoint showing different behaviors. Don't forget to add a call to srand() at the beginning of your program in main() to make sure each run of the program generates new "random" numbers.C++:Write a program that determines whether the user entered an item number in the required format: three digits, a hyphen, two digits, a hyphen followed by 4 alphanumerics. Display an appropriate message indicating whether the format is correct or incorrect. Use a sentinel value of -1 to end the program. You must use at least two functions in the solution of this exercise.HOW DOI I CALL THIS USING THE FUNCTION AFTER THIS getchar(); printf("Enter name : "); // Here we are using '^' to be able to use a space in the input - > scanf("%[^\ns]",p->name_1920213); printf("Enter last name : "); scanf("%s",p->lastname_1920213); printf("Enter mobile number : "); scanf("%ld",&p->contactnum_1920213); printf("Enter email : "); scanf("%s",p->email_1920213); void search_person()/* this function allows the user to search a specific contacts using the input name, last name, conatact number or email*/{ int choice_1920213; printf("\nChoose one option search for the contact details: \n\n1.First Name \t\t2.Last Name \n3.Mobile Number \t4.Email address \n ");scanf("%d",&choice_1920213); while(1) { switch(choice_1920213) /*Switch statement tests the value of a variable and compares it with multiple cases. Once the case match is found, a block of statements associated with that…
- please add professional c++ comments in each line after the code using the // command #include <iostream>using namespace std; void avg(int, int, int, int, int); // Function Prototype int main(void){ int val1, val2, val3, val4, val5; // five integer values from user cout << "Please enter 5 integer marks: "; // program prompt cin >> val1; cin >> val2; cin >> val3; cin >> val4; cin >> val5; avg(val1, val2, val3, val4, val5); // code to invoke function avg return 0;} void avg(int a, int b, int c, int d, int e){ int sum; sum = a + b + c + d + e; float avg; avg = sum / 5.0; // avg calculation cout << "The average of those marks is: " << avg << endl; // output return;}Question 3: Write a function that computes the ratio of vowels vs. consonants (????????????????����������������) in a given sentence. The ratio should be given as a floating-point number rounded off to two decimal places. When writing your function, be sure to appropriately cater for the following punctuation marks: apostrophes (') quotations (") full stops (.) commas (,) exclamations (!) question marks (?) colons (:) semicolons (;) Arguments: sentence (string) →→ sentence required to compute the ratio. Return: ratio (float) →→ a ratio that describes the number of vowels to consonants: vowels/consonants. ?HINT? Remember to cater for the white spaces that appear in your sentence. Expected outputs vowel_consonant_ratio("This is a random sentence!")==0.62 vowel_consonant_ratio("Thomas! Where have you been?")==0.83java please Create 2 functions that returns the hundreds andthousands digit from aninteger.int thousandsDigit(int a); // Ex, thousandsDigit(1234) => 1int tensDigit(int a); // Ex, tensDigit(1234) => 3//Use the % operator to return the tenth and thousandth value. %10 and%1000Create a function that counts the number of digits in a positive integer.int countDigits(int a); // Ex, countDigits(1234)=> 4//Convert an integer to String and then returns its length.