Q1. A script that can be used as a calculator with four major operations, i.e. “+-/*”. The script reads two integers and one operator from command-line argument and prints out the result. For instance: ./calculator.sh 32 – 20 Answer: 12
Q: Ques. WAP Where The binary search is accomplished using Python in the divide and conquer…
A: Given that: We need to write program about binary search tree in python using divide and conquer…
Q: Given a sequence x(n) for 0≤ n ≤ 3, where x(n)=[1 2 3 4] the sampling period and time index for a…
A: This is very simple. The correct answer is option a) T =0.1s and time index = 2 Explanation…
Q: What are your alternatives for maintaining the privacy of your social media accounts?
A: You should create a strong and unique password that no one else can guess. Two-factor…
Q: A6) Finance Mention and discuss the four major approaches to IT-enabled trade finance models
A: Price-related value propositions — their major contributions to helping international trade — are…
Q: Describe the pros and cons of adopting software packages instead of designing unique business apps.
A: Software packages are also known as the software suite or as an assemblage of files and information…
Q: What's the difference between pass-time focus and present focus.
A: Introduction: Present and past-time focus: Present and past-time focus defines a specific…
Q: Although descriptive models are favoured over prescriptive models on the whole, the question…
A: Given: The following is based on the information provided: We must determine whether descriptive or…
Q: Protection of sensitive information What are the most important functions of a database, such as its…
A: The database administrator provides technical leadership to the database support staff. Monitoring…
Q: What are inline functions ? What are their advantages? Give example.
A: The solution to the given question is: When a program executes a function call instruction , the CPU…
Q: It's important to distinguish between "system" and "app." Compare mobile operating systems such as…
A: Introduction: The following is a list of differences between system software and application…
Q: Describe the distinctions between System Prototyping and Throwaway Prototyping, as well as the…
A: Prototyping:- During the prototyping phase of the design process, a design team takes concepts that…
Q: Which of the following is not a member function of STL vector? Answer Choices: a. push_back() b.…
A: Please find the answer below
Q: What are the four divisions of TCSEC? Each category should be described in detail.
A: TCSEC is divided into four divisions:- The TCSEC has defined four divisions: D, C, B, and A, with…
Q: The many types of networks found in the AIS, together with their individual characteristics,…
A: Introduction: Accountants, consultants, business analysts, management, chief financial officers…
Q: When is it necessary for a user to provide a password into the UAC window in order to proceed?
A: The User Account Control (UAC) box is used to safeguard the system from harmful background…
Q: Supply chain measurements for what procedures are most important are a matter of debate.
A: Introduction: The process of delivering a product from the raw material to the customer is known as…
Q: The results of surveys and polls financed by companies that provide agile solutions should be…
A: Agile innovation approaches have changed information technology. Over the last 25 to 30 years, they…
Q: Definitions of computer, hardware, and memory and read-only memory (ROM) how would you say it?
A: Definitions of computer, hardware, and memory and read-only memory (ROM) how would you say it answer…
Q: MP store the higher order 8bit and lower order 8bit of the address in the Z and W registers,…
A: Let us see the answer below,
Q: two different ways to select subset of rows from a dataframe data.
A: Code: import pandas as pd # Reading csv file datadf = pd.read_csv("aqua.csv") # subset of rows from…
Q: As many instances as feasible should be used to back up your argument. Bottom-up or top-down parsers…
A: Bottom-up or top-down parser: Top-down parsing is a parsing strategy that starts at the top of the…
Q: When should a sequential search algorithm be used and when should a binary search algorithm be…
A: Introduction: Looking for anything in a certain sequence. A sorted list is not required. It's…
Q: Iterative and non-iterative queries are discussed, as well as authoritative and root DNS servers and…
A: Introduction: Iterated and non-iterated queries, authoritative and root servers, and DNS records are…
Q: How do software updates operate on Linux and Mac systems, and how do they differ from each other?
A: Definition: Linux is a collection of open-source Unix-like operating systems based on Linus…
Q: Ques. WAP Where The binary search is accomplished using Python in the divide and conquer…
A: Introduction: We are asked to write a python program for the binary search in divide and conquer…
Q: There should be an extensive explanation provided of all aspects of the DNS system including…
A: Introduction The data stream is followed from the starting internet browser to the DNS server and…
Q: Downloading software via the internet vs. booting it up from a DVD has pros and cons. In order to…
A: DVD: A Digital Versatile Disk (DVD) or Digital Video Disk is the full name of the format. Due to the…
Q: What happens to the Windows system if there are too many services running, as represented by several…
A: To be determine: What happens to the Windows system if there are too many services running, as…
Q: Describe FOUR (4) Project Communication Management Processes. List FIVE (5) keys to effective…
A: A communication management plan reports how the project supervisor oversees and controls…
Q: * The order of PUSHS and POPS is not the same true O false O
A: PUSH is the operation that inserts an element at the top of Stack POP is the operation that removes…
Q: How many of the other systems do we not have here, and how many do we have here?
A: Introduction: A system is described as a set of rules, an arrangement of items, or a group of…
Q: MP store the higher order 8bit and lower order 8bit of the address in the Z and W registers,…
A:
Q: Use of pure functions has many advantages.
A: Given: Pure functions' advantages Pure works are beneficial since they have no adverse effects. When…
Q: Whether or not the order in which parameters are specified when invoking a function that accepts…
A: Introduction: Python functions are the Python representation of a program's procedures. While the…
Q: Explore the differences between symmetric and asymmetric multi-processing approaches in this topical…
A: Definition: Symmetric multiprocessing occurs when numerous processors share a standard operating…
Q: 15. An urn contains 5 red marbles and 3 white marbles. If two marbles are picked up at random, what…
A: Answer in step 2
Q: is a set of instructions which is used iteratively in various locations of the program stack…
A: Subroutine is a sequence of program instructions which performs a specific task in the program and…
Q: Qs: Show the output of the following program when executed by computer? #include #include #include…
A: According to the information given:- We have to execute the mentioned code. As we know that every…
Q: Describe the process of prototyping as it relates to the identification of requirements. In what…
A: Please find the answer below :
Q: How the DNS works, from requests to authoritative and root servers to DNS records, is explained in…
A:
Q: Is there a specific reason why a computer needs both RAM and ROM?
A: Computer is required: Due to their great precision, speed, and capacity to handle a broad variety of…
Q: immediate addressing mode is used when data is available in a register and it is indicated by the…
A: The addressing mode different methods/ for specifying the operand address in the instructions The…
Q: Undo statistics are used to fine-tune the undo tablespace. Do undo tablespaces provide any useful…
A: Undo data: Oracle Database makes a copy of the original data before making any changes to it in the…
Q: Models of reasoning may be differentiated according to whether they are rule-based, model-based, or…
A: Models of rule- and case-based reasoning: Rule-based reasoning and case-based reasoning are both…
Q: Create an overview of the use of agile methodology based on the results of yearly polls and surveys…
A: Overview: Continuous testing and iteration are made easier using the Agile approach throughout the…
Q: What are some of the ways that different technologies have contributed to the development of…
A: Introduction: Due to US research and development efforts to construct and connect computer networks,…
Q: Poor transmission quality and poor sound quality are both caused by a number of factors, including…
A: Launch: Wikipedia, the free encyclopedia When an analogue signal is conveyed over a medium with a…
Q: Does this list take into account systems that have been classified in a number of different ways?
A: Start: A system is described as a set of rules, an arrangement of items, or a group of interrelated…
Q: Explain Hardware components of an embedded system.
A:
Q: Consider the relevance of wireless networks in developing countries. Why are some companies choosing…
A: Answer:
Q1. A script that can be used as a calculator with four major operations, i.e. “+-/*”. The script reads two integers and one operator from command-line argument and prints out the result. For instance:
./calculator.sh 32 – 20
Answer: 12
Step by step
Solved in 3 steps with 1 images
- 2 Please help me, I am using Java and it has to be AES As part of this project, you need to consider the following steps in your implementation: 1. With an AES encryption algorithm 2. Sender: Given a document X, write a program that can encrypt X with a passsword. Let’s say the password-protected document is Y 3. Receiver: Given Y, write a program that can ask the user to enter a password and perform decryption process to extract the original document X 4. During your implementation, you can also consider how to incorporate the following case: how a given document can be securely shared with several users. For example, if X is a document, then your platform can support multiple (authorized) users to securely access X.1)Write a shell scriptthat calculate electricity bill.The rates of electricity per unit are as follows: Consume-units>=300 then cost is Rs. 2 per unit Consume-units>300 and <=500 then cost is Rs. 5 per unit Consume-units>500 then cost is Rs. 7 per unit. 2)write a shell script that inputs Salary and Grade. It adds 50% bonus if the gradeis greater than 15. It adds 25% bonus if the grade is 15 or less and then display the total salary. 3)write a shell script that inputs three number and display the maximum number.EWrite a script to find and print current day and time import time now = time.localtime() print(time.strftime("%m/%d/%Y %I:%M:%S %p", now)) Add code which prints a greeting, either "good morning", "good afternoon", "or good evening", depending on the current time.
- Write a program MathOperations.java that will read in command-line argument (assumed to be a number, and not just an integer), and 1. convert the command-line value into a double; 2. store this value into a variable x; 3. use x and Math library to output the result of several mathematical operations, as shown below. Note on using Math library: Math.sqrt(x) returns square root of x. Math.pow(x,2.5) returns x raised to the power 2.5. Math.abs(x) returns an absolute value of x. Math.cos(x) returns cosine of x (in radians). What should your program print out? For example, if your command-line value is 3.14, your program should output the following: Your number is 3.14 ------------------- 3.14 squared = 9.8596 3.14 cubed = 30.959144000000002 square root of 3.14 = 1.772004514666935 3.14 raised to the power 0.5 = 1.772004514666935 The absolute value of 3.14 = 3.14 cosine of 3.14 (in radians) = -0.999998731727539 Or if your input argument is 16, your program should output the following: Your…Write a Java program that prompts the user to enter a password that matches a specific pattern **USING A SINGLE REGEX STATEMENT** as covered in your textbook. Your program must approve the user's entry.. Here is the pattern, in this order: 1 or more upper case letters two lower case letters 1 or 2 digits zero or 1 upper case letters any two of this group @#$%^& If password is not correct user must be prompted to enter a new password until conditions are met4. A) What will be the value of x after the following code is executed? int x, y = 4, z = 6; x = (y++) * (++z); B) Suppose a = 1. What is the value of a after the following code executes? Show the procedure to reach your answer if(a > 0) { switch(a) { case 1: a = a + 3; case 3: a++; case 6: a = a * 2; break; case 8: a--; break; default a++; } else a = a + 2; C) What would be the value of x after the following statements were executed? int x = 10; switch (x) { case 10: x += 15; case 12: x -= 5; break; default: x *= 3; }
- Write a program (BananaCoconut, that lives in BananaCoconut.java). This program should accept multiple numbers as command line arguments and print those numbers out again space separated, but for multiples of 3 print “banana” instead of the number, for multiples of 7 print “coconut” instead of the number, and for the multiples of both 3 and 7 print “banana-coconut” instead of the number. For numbers smaller than 1, print “puttputt”.Can you add class level comments, function level comments and inline comments In this line int i,n=0,s=0; they say the assigned value is not used can you fix that package avgsum;import java.util.Scanner; /**** @author Zaahid*/public class AvgSum { /*** @param args the command line arguments*/public static void main(String[] args) { int i,n=0,s=0;double average;{System.out.println("Enter the 5 numbers : "); }for (i=0;i<5;i++){Scanner in = new Scanner(System.in);n = in.nextInt();s +=n;}average=s/5;System.out.println("The sum of 5 numbers is : " +s+"\nThe Average is : " +average);}Through this programming assignment, the students will learn to do the following: Learn to work with command line options and arguments Gain more experience with Makefiles Gain more experience with Unix Learn to use some of the available math funtions available with C Usage: mortgagepmt [-s] -r rate [-d downpayment] price In this assignment, you are asked to do a mortgage payment calculation. All information needed for this will be passed to the program on the command line. There will be no user input during the execution of the program. You will need a few pieces of information. The price of the home and the amount of the down payment. You will also need to know the interest rate and the term of the mortgage. To figure your mortgage payment, start by converting your annual interest rate to a monthly interest rate by dividing by 12. Next, add 1 to the monthly rate. Third, multiply the number of years in the term of the mortgage by 12 to calculate the number of monthly payments you’ll…
- a. Write Java classMessage that automatically gives each created Message object a unique serial number, starting at 1 for the first message. (Hint: static) b) Write statements that create three Message objects. Show and explain serial numbers for these objects.Create a Java program that declares and initializes a string variable "dayOfWeek" with a value of your choice (e.g., "Monday", "Tuesday", etc.). Use a "switch" statement to check the value of "dayOfWeek" and output a message to the console indicating the corresponding day of the week. For example, if "dayOfWeek" is "Monday", output a message saying "Today is Monday". Use "default" to output a message for any invalid value of "dayOfWeek".Write a Java program correctly that generates a receipt for a delivery company, called “Montréal DeliveryExpress” that delivers goods to its clients. The company is located in Montréal and operates onlyin Québec.Write a program which:1. Display a welcome message.2. Then prompts the user to enter the following• First name of the client.• Last name of the client.• Address of the client (include street number, street name and apt number if applicable).• City of the client.• Postal code of the client.• Day of delivery.• Month of delivery.• Year of delivery.• Distance from source to destination in kilometers.• Value of the goods to be delivered.3. Generate the receipt based on the information entered by the user above, see a sample outputin the next page. First the receipt should display the Company name followed by the deliverydate. Then, the first name and last name of the client. The first letter in first name and last nameshould be displayed in Upper Case letters and the rest should be…