Python question
Q: The main distinction between business intelligence and analytics is ?
A: Introduction: The main distinction between business intelligence and analytics is
Q: Write Scheme expressions to define these named bindings endvalue: principle + interest
A: There are two basic components that make up every mortgage payment: principal and interest. The prin...
Q: Brieefly explains the multi-threading idea in Java. Please provide an execution diagram demonstratin...
A: Intro Concept of multi-threading in java. Execution diagram context switching between the main thr...
Q: Which of these are predefined JavaScript objects? O document O browser O window O htmlDocument O nav...
A: answer is
Q: For database experts, normalization is a critical topic. It is useful for creating, scenario verific...
A: Introduction Normalization is the process of organizing data in a database that includes creating t...
Q: What is the distinction between an object in an object-oriented language and a variable in a structu...
A: introduction of Object-Oriented Language Object-Oriented Programming (OOP) is a programming worldvie...
Q: 1 23 456 789 10 11 12 13 14 15
A: The program is written in C++. Check the program screenshot for the correct indentation. Please chec...
Q: The body mass index (BMI) is calculated as a person's weight (in pounds) times 720, divided by the s...
A: I have provided PYTHON CODE along with CODE SCREENSHOT and also provided OUTPUT SCREENSHOTS-...
Q: USB sticks often utilise drivers that load in order to offer a path to their contents. How would ...
A: Introduction: Malicious code inside driver can be installed from USB drive inside the operating sys...
Q: In terms of applications, distinguish between Web 1.0, Web 2.0, and Web 3.0.
A: Web 1.0It is the “readable” phrase of the World Wide Web with flat data. In Web 1.0, there is only l...
Q: .Real-world instances of embedded systems all around us (Atleast 40)
A: Introduction Actually, An embedded system is a computer system that contains both computer softwar...
Q: Is there a start codon other than AUG? What is it called, and what does it represent?
A: INTRO A reading frame includes a start codon and a stop codon.
Q: List the two primary benefits and two primary drawbacks of a fault-tolerant architecture.
A: Introduction Fault tolerance design: It is a design approach in which the operation is continuing e...
Q: Create a flowchart of the following problem: The manager of a football stadium wants you to ...
A: Start Initialise variables "PremiumCost" as 250, "BoxCost" as 100, "SidelineCost" as 50 and "General...
Q: ... Pl: tA = seq + 1; P2: seq = tA; Q1: tB Q2: seq = seq+ 2; = tB;
A: Here either of the process can execute first. Also a process can be preempted by another process. T...
Q: What is the distinction between sequential and random access?
A: Introduction: We look at how data is written or read to a computer programme when we talk about sequ...
Q: 1. Take ASCII values as input & print corresponding Character. Suppose, input 97 and output a Using ...
A: n=int(input("enter ascii value: "))a=chr(n)print(a)
Q: Network maintenance is an important task in organizations today who entirely rely on their network i...
A: In the third раrty mаintenаnсe (TРM) industry, netwоrk mаintenаnсe is essentiаlly whаt y...
Q: What effect does the sudo iptables --policy INPUT DROP command have on the access to computing resou...
A: INTRODUCTION: Iptables is a firewall that comes pre-installed on all Ubuntu versions (Ubuntu, Kubun...
Q: Hello Could you please help me with Turtle Race in Python Write the name of the winner turtle on the...
A: Turtle race in python
Q: What draws specific people to cybercrime?
A: Introduction: The ambition to become wealthy and the easy way to gain a lot of money leads certain i...
Q: Build a program that can breakthrough whatsapp group
A: # Create word counts by sender as a series word_count_by_sender_series = words_filtered.groupby(['se...
Q: What exactly is the Win32API, PostxAPI, Java API, and Java virtual machine (JVM)?
A: Win32API: Actually, alternatively referred to as the window API and winAPI, win32 is the main set of...
Q: Many people believe that the digital world is separated between 'haves' and 'have nots' — those who ...
A: Introduction Internet access has both benefits and harms for society as a whole like any other scie...
Q: What technology is required to launch a new firm on a shoestring budget?
A: Introduction: What technology is required to launch a new firm on a shoestring budget?
Q: What steps would you use as a Malware Expert to evaluate a portable executable (PE) and determine if...
A: Introduction: The portable executable file format is a kind of format used in Windows (both x86 and ...
Q: Write a program (8086 programming language) to move 100 words from ‘FROM’ to ‘TO’ which are two area...
A: first of all we undestand what is 8086 programing languge? Intel 8086 is a 16-bit CPU from Intel (...
Q: How to Choose a Color Using "Random" in Processing
A: Introduction: random function: random() Generates random numbers. Each time the random() function i...
Q: What is an abstract class?
A: abstract class: abstract class are that class which contains both abstract and non-abstract methods ...
Q: Using the online javadoc for the Java 8 (or later) API fill in the words int he following sentence. ...
A: Java is a renowned language which is widely used since many years. It helps in producing multiple so...
Q: Let G be a directed graph with positive and negative weights. It is known that the shortest paths fr...
A: The algorithm is Bellman- ford.Time complexity is O(ne ),Where n is number of node ,e is number of e...
Q: Question 32 Promiscuous Delta is a metric based on events reported in the Cisco Security Agent (CSA)...
A: Note: As per company guidelines we are supposed to answer only one question. Kindly repost other que...
Q: 23 ___ 2 == 5 Which operator would make this expression true?
A: 23 can be written as 00010111. The Right Shift Operator shifts the bits of the number towards right ...
Q: Name a dynamic scoping scripting language in computer science.
A: Introduction: Name a dynamic scoping scripting language in computer science.
Q: ii) In JAVA language input the elements of an integer array A of size 10 and find the count of all h...
A: Given: An array A of size 10 is given and we have input its elements from the user. All elements of ...
Q: What are the tracability policies in requirement management?
A: Introduction Traceability Policies: 1. It is used to identify the specific design components which i...
Q: In this problem you will implement a function called pagerank which will take as input a numpy array...
A: Editable source code: import numpy as np def page_rank(M,n): P = np.ones(M.shape) A = M for...
Q: What was the motivation behind the development of computer programming languages?
A: Introduction: Language for showing a precise set of digital computer commands, such as computer prog...
Q: In a few words, describe the control characters in ASCII.
A: Solution: Introduction to ASCII control characters A control character is a nonprintable character ...
Q: can someone explain how to do this question step by step I have the question and the answer Write ...
A: Function: A function is a set of statements which usually performs an action or functionality. A fun...
Q: ISA (Instruction Set Architecture) Explained, ISA (Instruction Set Architecture) Types, R-type, J-ty...
A: ISA ISA is an Instruction Set Architecture. These instruction sets are the combinations of instructi...
Q: Identify and explain the five features of an algorithm.
A: Introduction The following are the features of a good algorithm: Precision: a good algorithm must ...
Q: Create two enumerations that hold colors and car model types. You will use them as field types in a ...
A: Enumerations are created using the keyword "enum" . "enum" is a special type of class which represen...
Q: el and a numb
A: P(a vowel and a number less than 3)
Q: Why is a computer cooling system important? What are the different cooling techniques?
A: Solution: Computer cooling is a technique that removes the waste heat generated by computer componen...
Q: A processor's primary structural components should be mentioned and briefly characterised.
A: the primary structural components are :-
Q: A certain college classifies students according to credits earned. A student with less than 7 credit...
A: the code is an given below
Q: How will you check the equality of two integer variables without using the arithmetic comparison ope...
A: Task : Check equality of two numbers without using == operator.
Q: What are hashes? Give an example.
A: Hashing is simply the process of running data through a formula that creates a result known as a has...
Q: Almost all modern appliances can communicate wirelessly thanks to technological advancements. Have t...
A: Introduction: The internet's relevance in business has grown as communication and information techno...
Step by step
Solved in 2 steps
- Write a program that reads the user's first name and last name, and then use them to create a UPM email for the user. If the total number of characters in the user's full name, (first name + last name), is less than 10 letters, you should use the full name to create the user’s email. The general format of the user’s email should look like this: firstName.lastName@upm.edu.sa For example: First name = Ali Last name = Omar Total number of letters in both first and last names = 7 letters (<10 letters) Output = omar.ali@upm.edu.sa If the number of characters in the user's full name, (first name + last name), is greater than or equal to 10 letters, you should only use the first character in the user’s first name, and the whole last name to create an email. For example: First name = Abdullah Last name = Omar Total number of letters in both first and last names = 12 letters (>=10 letters) Output = a.omar@upm.edu.sa Note: you can assume the user will always enter lowercase lettersWrite a program for determining if a year is a leap year. In the Gregorian calendarsystem you can check if it is a leaper if it is divisible by 4 but not by 100 unless it is also divisible by 400.For example, 1896, 1904, and 2000 were leap years but 1900 was not.Write a program that takes in a year as input (as a command line argument) and prints the string "{year} was a leap year'' if true and "{year} was not a leap year'' if false.Note: background on leap year https://en.wikipedia.org/wiki/Leap_yearHere is a possible example call to the program .\isleapyearc 1896 output: 1896 was a leap year Here is a negative example call to the program .\isleapyearc 1897 output: 1897 was not a leap year with note You are supposed to get the year from command line arguments. You are getting it from stdinWrite a program for determining if a year is a leap year. In the Gregorian calendarsystem you can check if it is a leaper if it is divisible by 4 but not by 100 unless it is also divisible by 400.For example, 1896, 1904, and 2000 were leap years but 1900 was not.Write a program that takes in a year as input (as a command line argument) and prints the string "{year} was a leap year'' if true and "{year} was not a leap year'' if false.Note: background on leap year https://en.wikipedia.org/wiki/Leap_yearHere is a possible example call to the program .\isleapyearc 1896 output: 1896 was a leap year Here is a negative example call to the program .\isleapyearc 1897 output: 1897 was not a leap year
- Write a program that asks the user to enter 2 integers of 4 digits and displays thedifferent digits as X and * if they are the same. If the user enters a number which is notof four digits, then a convenient message is displayed.Write a program that translates a letter grade into a number grade. Letter grades are A, B, C, D, and E, possibly followed by + or -. Their numeric values are 4, 3, 2, 1, and 0. There is no F+ or F-. A + increases the numeric value by O.3, a – decreases it by 0.3. However, an A+ has value 4.0. Enter a letter grade: B- The numeric value is 2.7.Write a program that accepts a year written as a four-digit Arabic (ordinary) numeral and outputs theyear written in Roman numerals. Important Roman numerals are V for 5, X for 10, L for 50, C for 100, Dfor 500, and M for 1,000. Recall that some numbers are formed by using a kind of subtraction of oneRoman “digit”; for example, IV is 4 produced as V minus I, XL is 40, CM is 900, and so on. A few sampleyears: MCM is 1900, MCML is 1950, MCMLX is 1960, MCMXL is 1940, MCMLXXXIX is 1989. Assume theyear is between 1000 and 3000. Your program should include a loop that lets the user repeat thiscalculation until the user says she or he is done
- Write a program named Twitter that accepts a users message and determines whether it is short enough for a social networking service that does not accept messages of more than 140 characters.Write a program that reads an integer between0 and 1000 and multiplies all the digits in the integer. For example, if an integeris 932, the multiplication of all its digits is 54.Hint: Use the % operator to extract digits, and use the / operator to remove theextracted digit. For instance, 932 % 10 = 2 and 932 / 10 = 93.Here is a sample run: Enter a number between 0 and 1000: 999The multiplication of all digits in 999 is 729Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is 93, the output is: 93 92 91 90 89 88 Ex: If the input is 77, the output is: 77 Ex: If the input is not between 20 and 98 (inclusive), the output is: Input must be 20-98 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits; do not write a large if-else for all possible same-digit numbers (11, 22, 33, ..., 88), as that approach would be cumbersome for large ranges.
- Write a program that inserts parentheses, a space, and a dash into a string of 10 user-entered numbers to format it as a phone number. For example, 5153458912 becomes (515) 345-8912. If the user does not enter exactly 10 digits, display an error message. Continue to accept user input until the user enters 999.Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…Write a program that coverts a zip code to a bar code. The bar codes use large and small bars. We will use : as a small bar and | as a large bar. Each digit has its own bar pattern. 1 is :::|| 2 is ::|:| 3 is ::||: 4 is :|::| 5 is :|:|: 6 is :||:: 7 is |:::| 8 is |::|: 9 is |:|:: 0 is ||::: The barcode also includes a check digit. The final digit added to the bar code verifies the previous numbers are correct. To Determine the checksum: Add all the digits together Determine what needs to be added to make the total a multiple of 10 The bar code also always starts and ends with a large bar. This is used by the scanner to align the letter. Drexel's Zip Code is 19104 The check digit is 5. The sum of the digits is 1+9+1+0+4 = 15. To make 15 a multiple of 10, we need to add 5. The bar code will be |:::|||:|:::::||||::::|::|:|:|:| The majority of work in this problem is done by digit. It makes sense to store the zip code as a string, not as an integer. Write the function checksum(zip)…